By Topic

Digital Telecommunications (ICDT), 2010 Fifth International Conference on

Date 13-19 June 2010

Filter Results

Displaying Results 1 - 25 of 43
  • [Front cover]

    Publication Year: 2010 , Page(s): C1
    Save to Project icon | Request Permissions | PDF file iconPDF (2361 KB)  
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2010 , Page(s): i
    Save to Project icon | Request Permissions | PDF file iconPDF (10 KB)  
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2010 , Page(s): iii
    Save to Project icon | Request Permissions | PDF file iconPDF (59 KB)  
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2010 , Page(s): iv
    Save to Project icon | Request Permissions | PDF file iconPDF (123 KB)  
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2010 , Page(s): v - viii
    Save to Project icon | Request Permissions | PDF file iconPDF (176 KB)  
    Freely Available from IEEE
  • Preface

    Publication Year: 2010 , Page(s): ix
    Save to Project icon | Request Permissions | PDF file iconPDF (76 KB) |  | HTML iconHTML  
    Freely Available from IEEE
  • Committee

    Publication Year: 2010 , Page(s): x - xii
    Save to Project icon | Request Permissions | PDF file iconPDF (84 KB)  
    Freely Available from IEEE
  • Reviewers

    Publication Year: 2010 , Page(s): xiii - xiv
    Save to Project icon | Request Permissions | PDF file iconPDF (82 KB)  
    Freely Available from IEEE
  • SVM-MLP-PNN Classifiers on Speech Emotion Recognition Field - A Comparative Study

    Publication Year: 2010 , Page(s): 1 - 6
    Cited by:  Papers (4)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (291 KB) |  | HTML iconHTML  

    In this paper, we present a comparative analysisof three classifiers for speech signal emotion recognition.Recognition was performed on emotional Berlin Database.This work focuses on speaker and utterance (phrase)dependent and independent framework. One hundred thirtythree (133) sound/speech features were extracted from Pitch,Mel Frequency Cepstral Coefficients, Energy and Formantsand were evaluated in order to create a feature set sufficient todiscriminate between seven emotions in acted speech. A set of26 features was selected by statistical method and MultilayerPercepton, Probabilistic Neural Networks and Support VectorMachine were used for the Emotion Classification at sevenclasses: anger, happiness, anxiety/fear, sadness, boredom,disgust and neutral. In speaker dependent framework,Probabilistic Neural Network classifier reached very highaccuracy of 94%, whereas in speaker independent framework,Support Vector Machine classification reached the bestaccuracy of 80%. The results of numerical experiments aregiven and discussed in the paper. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Romanian Spoken Language Resources and Annotation for Speaker Independent Spontaneous Speech Recognition

    Publication Year: 2010 , Page(s): 7 - 10
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (241 KB) |  | HTML iconHTML  

    This paper presents studies and early results with the scope to build a robust spontaneous speech recognition system in Romanian language. We have tried to give solutions to several issues that have arisen like building a large and accurate database within a reasonable time. A short description of the database is given and some statistics are collected in order to show its evolution in several stages of the project. Embedded training technique has been used for training triphones. As a consequence, the alignment problem has been studied and a solution is proposed for it. The final purpose of these attempts is to obtain substantial results in speech recognition for Romanian language that can be used as baseline for further results. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Environment Recognition Using Selected MPEG-7 Audio Features and Mel-Frequency Cepstral Coefficients

    Publication Year: 2010 , Page(s): 11 - 16
    Cited by:  Papers (5)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (386 KB) |  | HTML iconHTML  

    In this paper, we propose a system for environment recognition using selected MPEG-7 audio low level descriptors together with conventional mel-frequency cepstral coefficients (MFCC). The MPEG-7 descriptors are first ranked based on Fisher’s discriminant ratio. Then principal component analysis is applied on top ranked 30 MPEG-7 descriptors to obtain 13 features. These 13 features are appended with MFCC features to complete the feature set of the proposed system. Gaussian mixture models (GMMs) are used as classifier. The system is evaluated using ten different environment sounds. The experimental results show a significant improvement in recognition performance of the proposed system over MFCC or full MPEG-7 descriptor based systems. For example, the best performance is achieved in Restaurant environment where MFCC, full MPEG-7, and the proposed method give 90%, 94%, and 96% accuracy, respectively. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Congestion resistant routing algorithm for a congestion resistant ring road network on chip

    Publication Year: 2010 , Page(s): 17 - 21
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (194 KB) |  | HTML iconHTML  

    Ring Road NoC (R2NoC), which was motivated by smooth flow of traffic in interconnected ring roads, is the base for this paper. Router design and routing algorithm for R2NoC is much simpler. In this paper we have developed the R2NOC's algorithm of routing in two ways. One of them is finding the shortest way between source and destination (θ algorithm) and as the second improvement, when we have a congestion or a link is broken, the CR (Congestion Resistant) algorithm will find another way to send the packet and we maintain that this way is shortest safe way and because of that, our algorithm is congestion resistant. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Innovative Solution for Cloud Computing Authentication: Grids of EAP-TLS Smart Cards

    Publication Year: 2010 , Page(s): 22 - 27
    Cited by:  Papers (4)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (462 KB) |  | HTML iconHTML  

    The increase of authenticating solutions based on RADIUS servers questions the complexity of their administration whose security and confidentiality are often at fault especially within Cloud Computing architectures. More specifically, it raises the concern of server administration in a secure environment for both the granting access’ company and its clients. This paper aims to solve this issue by proposing an innovative paradigm based on a grid of smart cards built on a context of SSL smart cards. We believe that EAP-TLS server smart cards offer the security and the simplicity required for an administration based on distributed servers. We specify the design of a RADIUS server in which EAP messages are fully processed by SSL smart cards. We present the scalability of this server linked to smart card grids whose distributed computation manages the concurrence of numerous authenticating sessions. Lastly, we relate the details of the first experimental results obtained with the RADIUS server and an array composed of 32 Java cards, and demonstrate the feasibility and prospective scalability of this architecture. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Intelligent Energy-Saving Service System

    Publication Year: 2010 , Page(s): 28 - 31
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (790 KB) |  | HTML iconHTML  

    Energy-saving is a very important issue in resent years. To provide a management platform of energy-saving in the digital home can save more power when using the home appliances. In this paper, we design a management platform for energy-saving based on open service gateway initiative (OSGi), remote management server (RMS) and home automatic network (HAN) technologies. Simulation results show that the proposed system is a better solution for home energy-saving. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Indoor Localization with Closely Spaced Vivaldi Antennas in Ultra-Wideband

    Publication Year: 2010 , Page(s): 32 - 37
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (372 KB) |  | HTML iconHTML  

    In this paper a positioning algorithm, based on the utilization of the receiving antenna properties is presented. The algorithm can be applied in Time of Flight (TOF) based localization systems with closely spaced receiving antennas additionally to the time estimation. In this work we present the practical measurements. But better result may be achieved using optimal receiving antennas and antenna spacing. The aim of the paper is to verify the concept in Ultra-Wideband by practical measurements. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • C4I2-Tools for the Future Battlefield Warriors

    Publication Year: 2010 , Page(s): 38 - 43
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (367 KB) |  | HTML iconHTML  

    The Future Battlefield Commander relies on Command, Control, Communications, Computers, Information, Intelligence (C4I2) tools to perform optimally in his given tasks in versatile and hostile environments. The concept of war has changed from traditional wars to the asymmetric wars. This paper describes main use cases of a new network concept, the Wireless Polling Sensor Network (WPSN) for the Dismounted Future Warrior. The appearance of Unmanned Vehicles (UVs) gives an edge to gain and transmit information from designated hostile areas to decision making process ensuring mission success and reduced fratricide. New principles determine how this new technology can be adapted in Future Warriors at different levels. The main use cases are solutions of this technology in road bomb detection, location in built up areas, and, finally, in Special Operations. This paper is based on a study of the main use cases of the WSPN and thereby discusses the usage principles, and the results representing the ideas of applying the WPSN technology. The three questions to be answered are: What is the structure of the WPSN like? What are the main advantages of the WPSN over the Wireless Sensor Network (WSN)? Which are the typical scenarios in which the WPSN can be benefitted of? Main output of the paper is to point out the possibilities to utilize the WPSN via use cases. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Management of Device Group for Home Automation Network

    Publication Year: 2010 , Page(s): 44 - 47
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (809 KB) |  | HTML iconHTML  

    In the past years, the service of digital home almost focuses on the automatic surveillance, automatic controlling and health-care. Currently, how to provide an automatic interconnection and control for different devices on the heterogeneous home network is a very pressing problem. In this paper, we implement a systemic design to connect the heterogeneous networks and devices in the home automation network (HAN). The all devices of remote family can be easy controlled, found, and communicated without manual setting by local family. Simulation results show that the proposed system is a better mechanism for digital home and smart appliances. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Updated MediaSense Framework

    Publication Year: 2010 , Page(s): 48 - 51
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (198 KB) |  | HTML iconHTML  

    Mobile telecommunication is evolving rapidly. People no longer only communicate with each other regardless of time and place, but also share other information that is important for the tasks with which they are involved. In response to this growing trend, the Media Sense framework addresses the intelligent delivery of any information to any host, anywhere, based on context-aware information regarding personal preferences, presence information, and sensor values. The focus of this paper is the overall framework, the handling of user profiles, management of context information, real-time distribution and proof of concepts. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mitigating Free-Riding on BitTorrent Networks

    Publication Year: 2010 , Page(s): 52 - 56
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (506 KB) |  | HTML iconHTML  

    The fundamental operational principle of the Bit-Torrent protocol is based on peers sharing partial data. That is, peers download data they don’t have, while uploading data they have already downloaded. The protocol allows peers to get some data to get them started. Free-riders exploit such aspects of the protocol to maximize their downloads and minimize uploads, resulting in crippling the system and benefiting only themselves. This paper looks at free-riding in detail, and presents experimental results that show the benefits of an enhancement to mitigate free-riding. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Botnet Detection System Based on Neural Networks

    Publication Year: 2010 , Page(s): 57 - 62
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (441 KB) |  | HTML iconHTML  

    A concerted fight against botnets is needed in order to avoid them from becoming a serious threat to global security in the forthcoming years. Zombie detection is currently performed at the host and/or network levels, but these options have important drawbacks: antivirus, firewalls and anti-spyware are not effective against this threat because they are not able to detect hosts that are compromised via new or target specific malicious software and were not designed to protect the network from external attacks or vulnerabilities that are already present inside the local area network. To overcome these limitations, we propose a new botnet detection approach based on the identification of traffic patterns: since each network application, whether it is licit or illicit, has a characteristic traffic pattern that can uniquely identify it, the detection framework will rely on an Artificial Neural Network to identify the licit and illicit patterns. After the identification phase, the system will generate alarms to the system administrator, that can trigger the most appropriate security actions, like blocking the corresponding IP addresses, putting them under a deeper surveillance or acting over some suspicious network segment. A general detection framework was developed in order to incorporate the detection methodology itself, as well as the data collection and storage modules and all the necessary management functions. Some performance tests were already carried out on the proposed system and the results obtained show that the system is stable and fast and the detection approach is efficient, since it provides high detection rates with low computational overhead. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • FMC: The Convergence of Networks, Devices and Services

    Publication Year: 2010 , Page(s): 63 - 69
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (541 KB) |  | HTML iconHTML  

    As communications services are evolving, users are increasingly faced with a confusion of devices, subscriptions and numbers. Consumers are growing to expect ubiquitous, constant connectivity and access to all manner of information applications. Service providers, large and small, must simultaneously find ways to offset the declines in traditional sources of revenues while drive top-line growth. Fixed Mobile Convergence (FMC) solutions are promising to offers advantages for both consumers and service providers and is gaining momentum in the marketplace as operators are realizing the market opportunities for creating new revenue-generating services. FMC solutions are promising to deliver the long awaited hand off of calls/calling features between wire-line and wireless networks. This article first defines the concept of FMC and it then several prominent concepts in the fixed mobile-convergence are analyzed. The article l addresses the business model, architecture, competitive and technological issues and summarizes the progress being made toward this network evolution. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Throughput and Coverage Analysis of WCDMA and HSDPA Networks

    Publication Year: 2010 , Page(s): 70 - 76
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (797 KB) |  | HTML iconHTML  

    This research deals with a study of case, unifying theoretical and practical aspects, regarding the cell-planning of Wideband Code Division Multiplexing (WCDMA) Release 99 (Rel99) and High Speed Downlink Packet Access (HSDPA) Rel. 5 networks. The used methodology, validated by the close agreement between field and numerical results for throughput and cell coverage, is a useful tool to have first order throughput/coverage prediction results for dimensioning and optimization purposes of advanced wireless networks. The field and analytical results also have confirmed that the HSDPA Rel. 5 allow a higher performance with a similar coverage in relation to that one obtained with a WCDMA Rel. 99 network. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Efficient Signal Detection Algorithm for 3GPP LTE Downlink

    Publication Year: 2010 , Page(s): 77 - 81
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (295 KB) |  | HTML iconHTML  

    In this paper, we investigate an efficient signal detection algorithm, which combines lattice reduction (LR) and list decoding (LD) techniques for the 3rd generation long term evolution (LTE) downlink systems. The resulting detector, called LRLD based detector, is carried out within the framework of successive interference cancellation (SIC), which takes full advantages of the reliable LR detection. Simulation results show that the proposed LRLD based detector provides a near maximum likelihood (ML) performance with a significantly reduced complexity. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Automatic Speech Broadcast System for Mobility Disabled Elders Based on RSS Network News

    Publication Year: 2010 , Page(s): 82 - 85
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1292 KB)  

    Elder lives are inconvenience, because they move slow, suffering from chronic diseases, bone sclerosis, atrophy of finger, vision aging, etc. How to provide a better user interface (UI) for elder is a very important issue. In this paper, we implement an automatic news text-to-speech broadcast system for mobility disabled elder. The RSS (rich site summary) format and website information of news titles are used and gotten. Every website of news will be abstracted, analyzed, and automatically text-to-speech broadcasted main text to elder. Simulation results show that the propose system is a better solution than general UI, such as remote controller. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • New Cache System-Based Power-Aware Algorithm in MANET

    Publication Year: 2010 , Page(s): 86 - 91
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (308 KB) |  | HTML iconHTML  

    The increasing use of mobile devices in wireless environments led to many studies about power-aware algorithms and protocols to improve the lifetime of device’s battery. This paper studies the implementation and testing of a new power-aware algorithm, PSWA, associated with a Cache System, and tested with the WRP routing protocol, in a Mobile Ad hoc Network scenario. A scheme that does not use the sleep schedule for the nodes it was used, nodes automatically fall asleep if they do not deal with data and routes. In the simulation scenario the WRP was chosen because it has a better performance in real-time traffic, and this type of traffic is commonly used today. The simulation results show an important decrease in energy consumption close to 10% with the association of the new power-aware algorithm. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.