By Topic

Communication Software and Networks, 2010. ICCSN '10. Second International Conference on

Date 26-28 Feb. 2010

Filter Results

Displaying Results 1 - 25 of 126
  • [Front cover]

    Publication Year: 2010, Page(s): C1
    Request permission for commercial reuse | PDF file iconPDF (192 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2010, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (95 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2010, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (149 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2010, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (129 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2010, Page(s):v - xiii
    Request permission for commercial reuse | PDF file iconPDF (171 KB)
    Freely Available from IEEE
  • Preface

    Publication Year: 2010, Page(s):xiv - xv
    Request permission for commercial reuse | PDF file iconPDF (66 KB) | HTML iconHTML
    Freely Available from IEEE
  • Organizing Committee

    Publication Year: 2010, Page(s): xvi
    Request permission for commercial reuse | PDF file iconPDF (105 KB)
    Freely Available from IEEE
  • Technical Committee

    Publication Year: 2010, Page(s): xvii
    Request permission for commercial reuse | PDF file iconPDF (82 KB)
    Freely Available from IEEE
  • Analytical Evaluation of Timing Offset Error in OFDM System

    Publication Year: 2010, Page(s):3 - 7
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (304 KB) | HTML iconHTML

    This paper proposes an idea of developing a model of estimating timing offset error of OFDM (Orthogonal Frequency Division Multiplexing) system without the use of additional pilots relying on inherent characteristics of the OFDM signal. An analytical expression has been derived and formulated to analyze the effect of bit error rate (BER) due to timing offset introduced by the transmission channel.... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Spectrum Allocation in Cognitive Radio Networks Using Swarm Intelligence

    Publication Year: 2010, Page(s):8 - 12
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (311 KB) | HTML iconHTML

    ¿Cognitive radio¿ is an emerging technique to improve the utilization of radio frequency spectrum in wireless networks. This paper discusses the problem of spectrum sharing among primary users and secondary users, and carries out the centralized spectrum allocation with the following two goals: (1) maximize system's sum bandwidth reward, and (2) maximize second users' access fairness. The spectr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • DCSE: A Dynamic Clustering for Saving Energy in Wireless Sensor Network

    Publication Year: 2010, Page(s):13 - 17
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (363 KB) | HTML iconHTML

    In this paper, a dynamic clustering for saving energy for wireless sensor network suggested. Our goal is to decrease the probability of missing the target and to increase the tracking exactness. First phase is consisting of selecting cluster head and creating clusters. In the next phase, new creating cluster based on moving targets. So that cluster head calculates the current location of target. I... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • New Handover Scheme Based on User Profile: A Comparative Study

    Publication Year: 2010, Page(s):18 - 21
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (239 KB) | HTML iconHTML

    In this paper we have analyzed the number of handover required in different time stamp for a particular user on the quality of service parameters namely handover call blocking probability. This system model is based on the analysis of user mobility profile and assigns a weightage factor to each cell. The mathematical equation of the handover blocking probability derived from stochastic comparisons... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Implementation of OFDM Baseband Trasmitter Compliant IEEE Std 802.16d on FPGA

    Publication Year: 2010, Page(s):22 - 26
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (521 KB) | HTML iconHTML

    Broadband Wireless Access (BWA) is a promising technology which can offer high speed voice, video and internet connection. The leading candidate for BWA is WiMAX, a technology that complies with the IEEE 802.16 family of standards. This paper is focused towards the hardware Implementation of WirelessMAN-OFDM Physical Layer of IEEE Std 802.16d Transmitter on FPGA. The RTL coding style of Verilog HD... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Redundant Audio Watermarking Technique Using Discrete Wavelet Transformation

    Publication Year: 2010, Page(s):27 - 31
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (402 KB) | HTML iconHTML

    A frame based audio watermarking scheme using Discrete Wavelet Transformation (DWT) is presented in this paper. The algorithm embeds the copyright information into the consecutive levels of approximate coefficients of the DWT transformed audio signal. To increase the robustness of the proposed scheme, the information bits are embedded multiple times at the different levels. Embedding of redundant ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A New Strategy of Resource Searching in Unstructured P2P Network

    Publication Year: 2010, Page(s):32 - 36
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (361 KB) | HTML iconHTML

    In the unstructured P2P networks, the flooding resource search method may cause much communication overhead, and severely constrains the scalability of network. In order to overcome this disadvantage, a new search strategy named TTL-Search based on the local caching and the scope of searching requests is proposed in this paper. According to this strategy, the searching process is divided into two ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Directed-Multicast Routing Approach with Path Replication in Content Addressable Network

    Publication Year: 2010, Page(s):37 - 41
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (319 KB) | HTML iconHTML

    In order to improve the efficiency of routing and resource location under large scale failure of Content Addressable Network, a directed-multicast routing approach is proposed to solve the backtrack problem of the traditional greedy approach. Possessing the advantages of directed routing approach and multicast, this new approach also has an extending coefficient to increase its feasibility. Meanwh... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Research on Degree Control Resistance to Frangibility of Scale-Free Networks

    Publication Year: 2010, Page(s):42 - 45
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (289 KB) | HTML iconHTML

    Since the small-world effect and the scale-free characteristic discovery, the research of complex network obtained rapidly development in the past several years, the complex networks' anti-frangibility is one of research focal points. This article analysised the scale-free networks' frangibility, and obtained that the scale-free networks' frangibility is mainly caused by combining attack to the hu... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Failure Detection and Localization in OTN Based on Optical Power Analysis

    Publication Year: 2010, Page(s):46 - 51
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (400 KB) | HTML iconHTML

    In consideration of the new features of Optical Transport Networks (OTN), the failure detection and localization has become a new challenging issue in OTN management research area. This paper proposes a scheme to detect and locate the failures based on the optical power analysis. In failure detection section of the scheme, this paper propose a method to detect the performance degradation caused by... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Implementation of HVAC System Through Wireless Sensor Network

    Publication Year: 2010, Page(s):52 - 56
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (300 KB) | HTML iconHTML

    A wireless sensor network (WSN) in its simplest form can be defined as a network of sensors denoted as nodes that blankets a region and provides information about it. They can sense the environment and communicate the data gathered from the monitored field through wireless links. Processing is done at the sensor level. WSN have numerous applications ranging from indoor deployment scenarios in the ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Research on Winsock Based Wireless Routing Simulation

    Publication Year: 2010, Page(s):57 - 60
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (241 KB) | HTML iconHTML

    Routing protocol simulation is the basis for its practical application. Using multithread simulation technology can not only simulate the performance of routing protocols, but also lay good foundation for its hardware porting. By use of the technology and combing with Winsock, the paper researched on routing of wireless communication and brought out a kind of computer simulation method for distrib... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Hermite Interpolation Based Motion Vector Recovery Algorithm for H.264/AVC

    Publication Year: 2010, Page(s):63 - 67
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (366 KB) | HTML iconHTML

    Error Concealment is a very useful method to improve the video quality. It aims at using the maximum received video data to recover the lost information of the picture at the decoder. Lagrange interpolation algorithm is the most effective interpolation for error concealment while it lost some detail information. Hermite interpolation algorithm considers the change rate of the motion vector as well... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Scheduling Jobs in a Heterogeneous System with Unreliable Network Links by DLT

    Publication Year: 2010, Page(s):68 - 72
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (252 KB) | HTML iconHTML

    During the last decade, the use of parallel and distributed systems has become more common. In these systems, a huge chunk of data or computation is distributed among many systems in order to obtain better performance. Dividing data is one of the challenges in this type of systems. Divisible Load Theory (DLT) is proposed method for scheduling data distribution in parallel or distributed systems. I... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • RCPC-Encoded V-BLAST MIMO with MMSE-Based Detection

    Publication Year: 2010, Page(s):73 - 77
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (285 KB) | HTML iconHTML

    A Rate-Compatible Punctured Convolutional (RCPC)-encoded Vertical Bell Laboratories Layered Space-Time (V-BLAST) MIMO system to provide a robust wireless communication link is proposed. The V-BLAST detection is based on Minimum Mean-Squared Error (MMSE) criterion, to alleviate the noise enhancement commonly found in the original V-BLAST scheme based on Zero Forcing criterion. Different code rates ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A User-Centered Context-Sensitive Privacy Model in Pervasive Systems

    Publication Year: 2010, Page(s):78 - 82
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (346 KB) | HTML iconHTML

    With emerging of pervasive computing, computers have increasingly become a part of in our life routines. Ubiquitous computing (also known as pervasive computing) is known as the age of calm technology where technology becomes as necessity and tends to be virtually invisible in our daily life without realizing. Privacy is a major problem in an individual's daily routine and being a treat in a perva... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance Evaluation of Handoff Queuing Schemes

    Publication Year: 2010, Page(s):83 - 87
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (276 KB) | HTML iconHTML

    One of the main advantages of new wireless systems is the freedom to make and receive calls anywhere and at any time; handovers are considered a key element for providing this mobility. This paper presents the handoff queuing problem in cellular networks. We propose a model to study three handoff queuing schemes, and provide a performance evaluation of these ones. The paper begin by a presentation... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.