By Topic

2010 IEEE 12th International Conference on Communication Technology

11-14 Nov. 2010

Filter Results

Displaying Results 1 - 25 of 374
  • The model and the security mechanism of the information retrieval system based on mobile multi-agent

    Publication Year: 2010, Page(s):25 - 28
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (492 KB) | HTML iconHTML

    Traditional information retrieval systems have several shortcomings in common, such as delaying in information updating, costing additional host and network resources, and so on. The promise of mobile multi-agent technology is becoming highly attractive. We approach to apply the mobile multi-agent technology to information retrieval in order to build a brand-new system. Although the mobile multi-a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Equalization of OFDM for doubly very selective channels

    Publication Year: 2010, Page(s):29 - 32
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (956 KB) | HTML iconHTML

    The performance reduction caused by inter-carrier interference (ICI) on orthogonal frequency division multiplexing (OFDM) systems over time-varying channels is relevant especially when large OFDM symbols are employed in order to achieve an higher throughput. In this paper we propose a design method of an equalization scheme using several full-length FFTs operating on non-overlapping windows of the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Spectrum trading in OFDMA-based cognitive radio systems

    Publication Year: 2010, Page(s):33 - 35
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (310 KB) | HTML iconHTML

    This paper briefly presents a novel spectrum trading model for OFDMA-based cognitive radio systems. In this model, primary users are able to trade their spare subcarriers with secondary users. Specifically, each subcarrier is priced by primary users and sold to secondary users for better utilities. Also, the issues of pricing policies and market equilibrium are discussed. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Dynamic channel switching for downlink relay-aided OFDMA systems

    Publication Year: 2010, Page(s):36 - 39
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (917 KB) | HTML iconHTML

    A relay-aided OFDMA system model with dynamic channel switching is introduced in this paper. Specifically, this model allows each user to communicate with the base station either through direct path or relaying path. The investigated problem is formulated as maximizing system capacity with joint consideration of power distribution, subcarrier selection in direct path and subcarrier paring in relay... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A simple cooperative protocol for interference channel using path selection

    Publication Year: 2010, Page(s):40 - 43
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (653 KB) | HTML iconHTML

    In this paper, a simple protocol of cooperative transmission is developed by combining path selection with non-orthogonal amplify-forward (NAF) for the two-user single-antenna interference channel. Three time slots are enough for the proposed protocol to ensure each pair to achieve diversity gain of two, whereas existing cooperative protocols require four time slots. Analytic results, such as outa... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multicast traffic grooming with QoS control in metro-WDM-ring and FTTx access networks

    Publication Year: 2010, Page(s):44 - 47
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (658 KB) | HTML iconHTML

    A heuristic multicasting traffic grooming algorithm which can easily route and assign the wavelength for transmission, and a QoS-promoted scheme for upstream transmission in FTTx optical networks are proposed. The heuristic algorithm can achieve the traffic grooming within a short period of time for any traffic types. The QoS-promoted scheme divides incoming packets of voice, video, data service i... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance analysis of turbo codes in wireless rician fading channel with low rician factor

    Publication Year: 2010, Page(s):48 - 51
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1042 KB) | HTML iconHTML

    We focus on the Bit Error Rate (BER) performance analysis problem of high efficient turbo codes in wireless Rician channels with low Rician factor in this paper. The structure of turbo code in 3GPP LTE standard is referred. The research is investigated in several aspects to evaluate the performance of turbo codes in Rician fading channel with low Rician K-factor, such as using different channel mo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A novel P2P traffic classification approach using back propagation neural network

    Publication Year: 2010, Page(s):52 - 55
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (510 KB) | HTML iconHTML

    To meet the requirements of the network activities and take into account P2P traffic classification challenges, a promising method is to use Machine Learning (ML) techniques and identify network applications based on flow features. We present a novel P2P traffic identification approach using back propagation neural network. It is demonstrated by simulation results that our approach can identify po... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A high precision multi-modulus fractional-N divider for DAB receiver

    Publication Year: 2010, Page(s):56 - 59
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1313 KB) | HTML iconHTML

    The implementation of a high precision fractional-N divider, which is one of the components of a phase-locked loop (PLL) fractional-N frequency synthesizer for Digital Audio Broadcasting (DAB) and other modern communication systems, is presented. Unconditionally stable Δ-Σ modulators of the third order (namely MASH-1-1-1) are implemented in the frequency synthesizer and they can prov... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A frequency domain algorithm of UWB channel estimation based on Recursive Least Squares

    Publication Year: 2010, Page(s):60 - 63
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (527 KB) | HTML iconHTML

    We propose an ultra-wide band channel estimation algorithm which is applicable to TH-PPM modulation. The algorithm is based on features of the frequency domain and Recursive Least Squares to estimate channel parameters. The algorithm has low complexity and can easily be applied to engineering. The algorithm can estimate multiple channels with no ambiguity in either the amplitude or the phase of th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A topology recovery algorithm of underwater wireless sensor networks

    Publication Year: 2010, Page(s):64 - 67
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (579 KB) | HTML iconHTML

    Underwater sensor networks will find many oceanic applications in near future, and the topology recovery problem in 3D sensor networks has not been paid enough attention at present. In order to maximize the network lifetime, a topology recovery algorithm (UTR) for underwater sensor networks in ocean environment is proposed. UTR will restore connectivity by amplifying the communication power of nod... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A measurement study of neighbor selection mechanism in a P2P live streaming system

    Publication Year: 2010, Page(s):68 - 71
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1094 KB) | HTML iconHTML

    Live streaming video has become one of the most popular P2P applications with its high-quality performance and playing effect. Since the real-time requirement, live streaming systems have to adopt an appropriate neighbor selection mechanism to realize effective content distribution. This paper takes PPLive which is a classic P2P IPTV system as the object to measure and analysis. We pay our attenti... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A QoS channel allocation algorithm for multi-hop Dynamic Spectrum Access networks

    Publication Year: 2010, Page(s):72 - 75
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (781 KB) | HTML iconHTML

    Combined Dynamic Spectrum Access (DSA) with wireless multi-hop networks, a QoS guaranteed multi-hop channel allocation algorithm is proposed. The algorithm could enhance the spectral efficiency of primary users and guarantee the QoS requirements of cognitive users through a specific optimal channel allocation criterion. The multi-hop relay nodes are selected by the upper and lower power thresholds... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A novel space-time block code design with high rates

    Publication Year: 2010, Page(s):76 - 79
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (596 KB) | HTML iconHTML

    This paper proposes two novel non-orthogonal space-time block coding schemes with code rates of 2 and 1.5 complex symbols per channel use for four and three transmit antennas. The proposed coding scheme with rate-2 is designed by four Alamouti codes. In order to reduce the decoding complexity effectively, the simplified maximum likelihood algorithm is adopted at the receiver. From the point of vie... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Packet reachability of VANET in bidirectional road scenario

    Publication Year: 2010, Page(s):80 - 83
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (570 KB) | HTML iconHTML

    Bidirectional road is the basic and ordinary scenario of Vehicular Ad hoc Network (VANET) which is an emerging and challenging research applying mobile ad hoc technology to transportation system. According to different forwarding mechanisms in routing protocol of such network, the connections are divided into end-to-end (E2E) type and Store-Carry-Forward (SCF) type. The packet reachability probabi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Self-configuration model of HeNB within LTE

    Publication Year: 2010, Page(s):84 - 87
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1088 KB) | HTML iconHTML

    Home NodeB (aka femtocells) is developed to improve indoor coverage and network capacity. Since there maybe large quantities of these devices, HeNB capable of self-configuration is promising for operators to save operational expenditures (OPEX) through substantially reducing the necessary human intervention. And at the same time, self-configuration ability of HeNB is benefit for improving quality ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A novel scheme of multicast WDM-PON using modified NRZ signal format

    Publication Year: 2010, Page(s):88 - 90
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (635 KB) | HTML iconHTML

    A novel modified Non Return to Zero (NRZ) format is proposed to realize multicast WDM-PON. By adjusting downstream Extinction Ratio (ER), multicast signals can be delivered to designated subscribers with acceptable performance. At Optical Network Unit (ONU) side, upstream data can be remodulated on the downstream wavelength by a Reflective Semiconductor Optical Amplifier (RSOA), which is configure... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Cooperative compressed sensing for wide-band spectrum detection with sequential measurements

    Publication Year: 2010, Page(s):91 - 95
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (916 KB) | HTML iconHTML

    Compressed sensing is a novel technology on signal information processing. It offers a new wide-band spectrum detection scheme in cognitive radio. A major challenge of this scheme is how to determinate the required measurements while the signal sparsity is not known a priori. This paper presents a cooperative detection scheme based on sequential compressed sensing where sequential measurements are... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Optimization of base station coordination and power allocation in cellular networks downlink

    Publication Year: 2010, Page(s):96 - 99
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (417 KB) | HTML iconHTML

    Base station (BS) coordination is a promising technique to improve the downlink throughput of cellular systems. However, limitations of both backhaul rate and computation capabilities of BSs pose a limit on the practically achievable downlink throughput. In this paper we propose a technique to select a sub-set of BSs serving each mobile terminal in order to limit the required backhaul information ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Migratable mobility proxy based session continuity control

    Publication Year: 2010, Page(s):100 - 103
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (580 KB) | HTML iconHTML

    With the rapid evolution of mobile communication networks towards heterogeneity, it becomes very important for operators to support session continuity. Now, the IMS based infrastructure has been accepted widely, but it lacks of advanced technology to reduce handoff delays, especially during vertical handoff. In this article, an optimized mechanism is originated for session continuity. This mechani... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Square patch resonator bandstop filter

    Publication Year: 2010, Page(s):104 - 107
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (986 KB) | HTML iconHTML

    Rectangular patch resonator is analyzed, and dual-mode and multi-mode bandstop filters using square loop resonator are proposed. Compared with traditional dual-mode filter with single operation band, the new design takes fully advantage of the dominant mode and its degenerate mode, even higher order mode to implement operation band, respectively, and tri-band bandstop filters are developed by usin... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Dual-band right-angled triangular resonator bandpass filter

    Publication Year: 2010, Page(s):108 - 111
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1026 KB) | HTML iconHTML

    Triangular patch resonators have important applications in microwave filters and antennas design. In this report, new isosceles right-angled triangular patch resonator bandpass filters with two-path coupling are developed to perform dual-passband, low passband insertion loss and miniaturization, and performances of the proposed filters are compared. New dual-band bandpass filter using single right... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Research of sampling method applied to traffic classification

    Publication Year: 2010, Page(s):112 - 115
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (440 KB) | HTML iconHTML

    For the purpose of reducing computational complexity and improving classification accuracy, we proposed an efficient method which applies mask-match sampling to machine learning for traffic classification. By picking an optimal sampling rate, the overhead for capturing flow characteristics is greatly reduced, while maintaining the traffic pattern. It is more suitable for today's high-speed network... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An analysis of UDP traffic classification

    Publication Year: 2010, Page(s):116 - 119
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (419 KB) | HTML iconHTML

    Accurate and timely classification of network applications is fundamental to numerous network activities. The traditional methods based on the “well-known” ports and packet payload analysis could no longer meet the need to accurately identify the IP traffic. Therefore, a promising approach using the machine learning techniques has received more and more attention. There are a lot of ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A fast two-dimension Discrete Fractional Fourier Transform algorithm and its application on digital watermarking

    Publication Year: 2010, Page(s):120 - 123
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (584 KB) | HTML iconHTML

    In order to improve the computing efficiency and accuracy of Discrete Fractional Fourier Transform (DFRFT), a fast algorithm derived from Fast Fourier Transform is introduced on the basis of the study on the periodicity of the eigenvalues of Fractional Fourier Transform (FRFT). Moreover, the algorithm is generalized to implement the two-dimension DFRFT, by which the fractional order spectrum of th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.