2010 Fifth International Conference on Digital Telecommunications

13-19 June 2010

Filter Results

Displaying Results 1 - 25 of 43
  • [Front cover]

    Publication Year: 2010, Page(s): C1
    Request permission for commercial reuse | PDF file iconPDF (2361 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2010, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (10 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2010, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (59 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2010, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (123 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2010, Page(s):v - viii
    Request permission for commercial reuse | PDF file iconPDF (176 KB)
    Freely Available from IEEE
  • Preface

    Publication Year: 2010, Page(s): ix
    Request permission for commercial reuse | PDF file iconPDF (76 KB) | HTML iconHTML
    Freely Available from IEEE
  • Committee

    Publication Year: 2010, Page(s):x - xii
    Request permission for commercial reuse | PDF file iconPDF (84 KB)
    Freely Available from IEEE
  • Reviewers

    Publication Year: 2010, Page(s):xiii - xiv
    Request permission for commercial reuse | PDF file iconPDF (82 KB)
    Freely Available from IEEE
  • SVM-MLP-PNN Classifiers on Speech Emotion Recognition Field - A Comparative Study

    Publication Year: 2010, Page(s):1 - 6
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (291 KB) | HTML iconHTML

    In this paper, we present a comparative analysisof three classifiers for speech signal emotion recognition.Recognition was performed on emotional Berlin Database.This work focuses on speaker and utterance (phrase)dependent and independent framework. One hundred thirtythree (133) sound/speech features were extracted from Pitch,Mel Frequency Cepstral Coefficients, Energy and Formantsand were evaluat... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Romanian Spoken Language Resources and Annotation for Speaker Independent Spontaneous Speech Recognition

    Publication Year: 2010, Page(s):7 - 10
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (241 KB) | HTML iconHTML

    This paper presents studies and early results with the scope to build a robust spontaneous speech recognition system in Romanian language. We have tried to give solutions to several issues that have arisen like building a large and accurate database within a reasonable time. A short description of the database is given and some statistics are collected in order to show its evolution in several sta... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Environment Recognition Using Selected MPEG-7 Audio Features and Mel-Frequency Cepstral Coefficients

    Publication Year: 2010, Page(s):11 - 16
    Cited by:  Papers (13)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (386 KB) | HTML iconHTML

    In this paper, we propose a system for environment recognition using selected MPEG-7 audio low level descriptors together with conventional mel-frequency cepstral coefficients (MFCC). The MPEG-7 descriptors are first ranked based on Fisher’s discriminant ratio. Then principal component analysis is applied on top ranked 30 MPEG-7 descriptors to obtain 13 features. These 13 features are appe... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Congestion resistant routing algorithm for a congestion resistant ring road network on chip

    Publication Year: 2010, Page(s):17 - 21
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (194 KB) | HTML iconHTML

    Ring Road NoC (R2NoC), which was motivated by smooth flow of traffic in interconnected ring roads, is the base for this paper. Router design and routing algorithm for R2NoC is much simpler. In this paper we have developed the R2NOC's algorithm of routing in two ways. One of them is finding the shortest way between source and destination (θ algorithm) and as the second ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Innovative Solution for Cloud Computing Authentication: Grids of EAP-TLS Smart Cards

    Publication Year: 2010, Page(s):22 - 27
    Cited by:  Papers (12)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (462 KB) | HTML iconHTML

    The increase of authenticating solutions based on RADIUS servers questions the complexity of their administration whose security and confidentiality are often at fault especially within Cloud Computing architectures. More specifically, it raises the concern of server administration in a secure environment for both the granting access’ company and its clients. This paper aims to solve this ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Intelligent Energy-Saving Service System

    Publication Year: 2010, Page(s):28 - 31
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (790 KB) | HTML iconHTML

    Energy-saving is a very important issue in resent years. To provide a management platform of energy-saving in the digital home can save more power when using the home appliances. In this paper, we design a management platform for energy-saving based on open service gateway initiative (OSGi), remote management server (RMS) and home automatic network (HAN) technologies. Simulation results show that ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Indoor Localization with Closely Spaced Vivaldi Antennas in Ultra-Wideband

    Publication Year: 2010, Page(s):32 - 37
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (372 KB) | HTML iconHTML

    In this paper a positioning algorithm, based on the utilization of the receiving antenna properties is presented. The algorithm can be applied in Time of Flight (TOF) based localization systems with closely spaced receiving antennas additionally to the time estimation. In this work we present the practical measurements. But better result may be achieved using optimal receiving antennas and antenna... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • C4I2-Tools for the Future Battlefield Warriors

    Publication Year: 2010, Page(s):38 - 43
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (367 KB) | HTML iconHTML

    The Future Battlefield Commander relies on Command, Control, Communications, Computers, Information, Intelligence (C4I2) tools to perform optimally in his given tasks in versatile and hostile environments. The concept of war has changed from traditional wars to the asymmetric wars. This paper describes main use cases of a new network concept, the Wireless Polling Sensor Network (WPSN) for the Dism... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Management of Device Group for Home Automation Network

    Publication Year: 2010, Page(s):44 - 47
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (809 KB) | HTML iconHTML

    In the past years, the service of digital home almost focuses on the automatic surveillance, automatic controlling and health-care. Currently, how to provide an automatic interconnection and control for different devices on the heterogeneous home network is a very pressing problem. In this paper, we implement a systemic design to connect the heterogeneous networks and devices in the home automatio... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Updated MediaSense Framework

    Publication Year: 2010, Page(s):48 - 51
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (198 KB) | HTML iconHTML

    Mobile telecommunication is evolving rapidly. People no longer only communicate with each other regardless of time and place, but also share other information that is important for the tasks with which they are involved. In response to this growing trend, the Media Sense framework addresses the intelligent delivery of any information to any host, anywhere, based on context-aware information regard... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mitigating Free-Riding on BitTorrent Networks

    Publication Year: 2010, Page(s):52 - 56
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (506 KB) | HTML iconHTML

    The fundamental operational principle of the Bit-Torrent protocol is based on peers sharing partial data. That is, peers download data they don’t have, while uploading data they have already downloaded. The protocol allows peers to get some data to get them started. Free-riders exploit such aspects of the protocol to maximize their downloads and minimize uploads, resulting in crippling the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Botnet Detection System Based on Neural Networks

    Publication Year: 2010, Page(s):57 - 62
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (441 KB) | HTML iconHTML

    A concerted fight against botnets is needed in order to avoid them from becoming a serious threat to global security in the forthcoming years. Zombie detection is currently performed at the host and/or network levels, but these options have important drawbacks: antivirus, firewalls and anti-spyware are not effective against this threat because they are not able to detect hosts that are compromised... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • FMC: The Convergence of Networks, Devices and Services

    Publication Year: 2010, Page(s):63 - 69
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (541 KB) | HTML iconHTML

    As communications services are evolving, users are increasingly faced with a confusion of devices, subscriptions and numbers. Consumers are growing to expect ubiquitous, constant connectivity and access to all manner of information applications. Service providers, large and small, must simultaneously find ways to offset the declines in traditional sources of revenues while drive top-line growth. F... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Throughput and Coverage Analysis of WCDMA and HSDPA Networks

    Publication Year: 2010, Page(s):70 - 76
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (797 KB) | HTML iconHTML

    This research deals with a study of case, unifying theoretical and practical aspects, regarding the cell-planning of Wideband Code Division Multiplexing (WCDMA) Release 99 (Rel99) and High Speed Downlink Packet Access (HSDPA) Rel. 5 networks. The used methodology, validated by the close agreement between field and numerical results for throughput and cell coverage, is a useful tool to have first o... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Efficient Signal Detection Algorithm for 3GPP LTE Downlink

    Publication Year: 2010, Page(s):77 - 81
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (295 KB) | HTML iconHTML

    In this paper, we investigate an efficient signal detection algorithm, which combines lattice reduction (LR) and list decoding (LD) techniques for the 3rd generation long term evolution (LTE) downlink systems. The resulting detector, called LRLD based detector, is carried out within the framework of successive interference cancellation (SIC), which takes full advantages of the reliable LR detectio... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Automatic Speech Broadcast System for Mobility Disabled Elders Based on RSS Network News

    Publication Year: 2010, Page(s):82 - 85
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1292 KB) | HTML iconHTML

    Elder lives are inconvenience, because they move slow, suffering from chronic diseases, bone sclerosis, atrophy of finger, vision aging, etc. How to provide a better user interface (UI) for elder is a very important issue. In this paper, we implement an automatic news text-to-speech broadcast system for mobility disabled elder. The RSS (rich site summary) format and website information of news tit... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • New Cache System-Based Power-Aware Algorithm in MANET

    Publication Year: 2010, Page(s):86 - 91
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (308 KB) | HTML iconHTML

    The increasing use of mobile devices in wireless environments led to many studies about power-aware algorithms and protocols to improve the lifetime of device’s battery. This paper studies the implementation and testing of a new power-aware algorithm, PSWA, associated with a Cache System, and tested with the WRP routing protocol, in a Mobile Ad hoc Network scenario. A scheme that does not ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.