By Topic

Telecommunications and Signal Processing (TSP), 2012 35th International Conference on

Date 3-4 July 2012

Filter Results

Displaying Results 1 - 25 of 162
  • 2012 35th International Conference on Telecommunications and Signal Processing (TSP) [Covers]

    Publication Year: 2012, Page(s):c1 - c4
    Request permission for commercial reuse | PDF file iconPDF (1662 KB)
    Freely Available from IEEE
  • 2012 35th International Conference on Telecommunications and Signal Processing - TSP Proceedings [Title page]

    Publication Year: 2012, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (1662 KB)
    Freely Available from IEEE
  • [Conference organization]

    Publication Year: 2012, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (28 KB)
    Freely Available from IEEE
  • Committees

    Publication Year: 2012, Page(s):v - vi
    Request permission for commercial reuse | PDF file iconPDF (39 KB)
    Freely Available from IEEE
  • Preface

    Publication Year: 2012, Page(s):vii - viii
    Request permission for commercial reuse | PDF file iconPDF (40 KB)
    Freely Available from IEEE
  • Contents

    Publication Year: 2012, Page(s):ix - xix
    Request permission for commercial reuse | PDF file iconPDF (64 KB)
    Freely Available from IEEE
  • The methodology for the selection of ICT technologies for Smart Grids

    Publication Year: 2012, Page(s):1 - 5
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1175 KB) | HTML iconHTML

    The paper introduces Smart Grids and the methodology for the selection of ICT technologies for them. It describes the quality and implementation-operating parameters for evaluation ICT technologies and services and applications running in Smart Grids. The methodology is based on a comparison of these parameters. This methology is also based on the availability and reliability of ICT technologies. ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Secure and QoS-aware communications for smart home services

    Publication Year: 2012, Page(s):11 - 17
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1613 KB) | HTML iconHTML

    In this paper, we present the combination of two concepts addressing important aspects for smart home services: a new quality of service concept and a new integrated concept for a smart home security system. We assume that every flat in a house has its own smart device to perform local services and act as an interface for the different sensors and actors inside the flat. These smart computers are ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Hardware implementation of programmable cellular automata encryption algorithm

    Publication Year: 2012, Page(s):18 - 21
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1169 KB) | HTML iconHTML

    In this paper, programmable cellular automata (PCAs) are used to design a symmetric key cryptosystem. Based on PCAs state transitions certain fundamental transformations are defined which represents block ciphering functions of the proposed enciphering scheme. In order to verify the proposed encryption algorithm, an experimental hardware platform based on a reconfigurable FPGA of type Spartan 3E X... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An optimized model for interference and traffic aware topology control in WSNs

    Publication Year: 2012, Page(s):22 - 26
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1172 KB) | HTML iconHTML

    Energy conservation and interference reduction are the two important goals of any topology control algorithm in wireless multi-hop sensor networks, but impacts of traffic on interference have been largely ignored in mostly all previous works on topology control. Inspired by this challenge, we set out to investigate the impact of traffic load on nodes' energy consumption and having demonstrated its... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Delay-constraint load-aware topology control in wireless sensor networks

    Publication Year: 2012, Page(s):27 - 31
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1186 KB) | HTML iconHTML

    In this paper, we investigated the problem of finding an efficient topology for delay-constrained data in WSNs. As we know topology control is one of the important mechanisms designed for decreasing energy consumption in WSNs. Since topology control may increase the end-to-end delay, one of the criteria's should be considered in topology control algorithms is delay constraint. Most existing works ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An algorithm for central point estimation in WSNs

    Publication Year: 2012, Page(s):32 - 36
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1276 KB) | HTML iconHTML

    Wireless sensor networks possess many challenges. One of the most significant is routing. In this paper, we focus on so-called Self-organizing Coordinate Systems, which are perceived as the current state of the art. Protocols included in this class are intended to create a virtual coordinate system within the network, applying principles of geographical routing. We aim to find a solid starting poi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Packet loss analysis in wireless sensor networks routing protocols

    Publication Year: 2012, Page(s):37 - 41
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1145 KB) | HTML iconHTML

    In this paper we analyze the importance of packet loss consideration (PLC) within inter node communication of a WSN. We evaluate the link quality between network nodes based on the link packet loss and not on the received signal strength indicator (RSSI). Our assessment is based on in field measurements obtained using the IRIS Crossbow WSN. The measurements are used to show the impact of packet lo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Application of M/G/1/K model for aggregated VoIP traffic packet loss estimation

    Publication Year: 2012, Page(s):42 - 46
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1092 KB) | HTML iconHTML

    The paper analyses packet loss probabilities in network elements of VoIP networks. It utilizes statistical properties of classical telecommunication networks to derive proper characteristics of aggregated VoIP packet flow and to define mathematical model of network element queue. Finally model results are compared with simulation results for various traffic load levels. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Providing security and energy efficiency in wireless ad-hoc sensor networks through Secure Cluster-Head Election (SEC-CH-E)

    Publication Year: 2012, Page(s):47 - 51
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1100 KB) | HTML iconHTML

    Data sensed and transferred between sensor nodes should be secure and preserve battery life. Some algorithms, such as LEACH (Low Energy Adaptive Clustering Hierarchy), have been proposed to efficiently organize sensor nodes into clusters, where a cluster-head, is elected to represent that cluster. To save energy, the cluster-head coordinates the cluster and forwards data generated within the clust... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A survey on clustering algorithms for vehicular ad-hoc networks

    Publication Year: 2012, Page(s):52 - 56
    Cited by:  Papers (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (676 KB) | HTML iconHTML

    In the past few years we are witnessing increased interest in the research of inter-vehicle communications. Due to vehicle specific movement patterns new algorithms and solutions have to be developed. Clustering is a technique for grouping nodes in geographical vicinity together, making the network more robust and scalable. This article presents an overview of proposed clustering algorithms for us... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Location based data dissemination in mobile ad hoc networks

    Publication Year: 2012, Page(s):57 - 61
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1212 KB) | HTML iconHTML

    In line with traditional communication systems, more and more attention is given to autonomous, self-organized networks with no central infrastructure, based on peer-to-peer communication, like mobile ad hoc networks. Designing multihop broadcast protocols for ad hoc networks is a complex problem as the task of these protocols is to disseminate messages in a network effectively while avoiding unne... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Simulation framework for adaptive overlay content caching

    Publication Year: 2012, Page(s):62 - 66
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1095 KB) | HTML iconHTML

    Current Internet architecture is challenged by the overwhelming multiplication of available content and the increasing requirements of the content delivery applications. Content Delivery Networks have been playing a catalytic role in content delivery solutions, replicating (caching) content at the edges of the network. In this paper, we investigate the role and the benefits of a more flexible and ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Agent based patient scheduling system

    Publication Year: 2012, Page(s):72 - 76
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1537 KB) | HTML iconHTML

    The continuous evolution of technology can be used to further improvements in our daily lives. Embedded smart technologies follow the same increasing trend of evolution. These technologies can greatly improve medical systems where, along with the services they provide, they can mimic intelligent behavior in hospitals. One such behavior allows doctors to be contacted in a short period of time in or... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Influence of input flow character on network dimensioning

    Publication Year: 2012, Page(s):77 - 80
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2741 KB) | HTML iconHTML

    The character of the input flow changes with an increasing amount of multimedia services. The most common classical stochastic models suppose an exponential distribution of interarrival times, i.e. the Poisson input flow. This paper shows the significant influence of probability distribution functions of interarrival times, such as the exponential, the hyper-exponential and the Erlang's of the ord... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fuzzy tool for reasoning in object relational mapping of information system

    Publication Year: 2012, Page(s):81 - 85
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1125 KB) | HTML iconHTML

    This paper describes the design of the tool for supporting decision making process in the object relational mapping. The paper describes the main differences between object and relational model and the current state of object relational mapping, which addresses the discrepancy between them. In the paper a fuzzy expert system based on information from the object model will be proposed. This expert ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Computationally efficient E-model improvement of MOS estimate including jitter and buffer losses

    Publication Year: 2012, Page(s):86 - 90
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1208 KB) | HTML iconHTML

    In the article we propose a method of improving ITU-T E-model MOS estimate of VoIP call quality. The improvement consists of including the effects of network jitter as measured and distributed in RTCP packets; jitter buffer size at receiver and codec packetization settings as input parameters of E-Model. Our method uses Pareto/D/1/k system for modeling general VoIP input traffic stream interarriva... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Simulation environment based on smartphones for Cloud computing robots

    Publication Year: 2012, Page(s):96 - 100
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1376 KB) | HTML iconHTML

    Cloud computing and smartphone technologies are becoming pervasive in daily life. Cloud robotics, which apply such technologies to robots, is capturing the spotlight as an attractive implementation example. However, when implementing a real time robot service on a wide-range network, it is desirable to grasp the influence of network delay on the robot's actions and the user's experience in advance... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IQRF wireless technology utilizing IQMESH protocol

    Publication Year: 2012, Page(s):101 - 104
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1233 KB) | HTML iconHTML

    This paper describes advantages, limitations and specifics of one particular low power wireless communication technology based on mesh network topologies: The IQRF platform utilizing the IQMESH protocol. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Protection of passive optical network by using ring topology

    Publication Year: 2012, Page(s):105 - 110
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1522 KB) | HTML iconHTML

    This article proposes an innovative method of passive optical networks' protection by using ring topology. Passive optical networks (PONs) are typically used in modern high-speed access networks, but there are also several specific applications, such as in business, office, army or science sector, which require a complex protection and backup system against failures and malfunctions. A standard tr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.