2012 IEEE International Conference on Communication, Networks and Satellite (ComNetSat)

12-14 July 2012

Filter Results

Displaying Results 1 - 25 of 48
  • [Title pages]

    Publication Year: 2012, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (292 KB)
    Freely Available from IEEE
  • Foreword from general chair

    Publication Year: 2012, Page(s):i - iii
    Request permission for commercial reuse | PDF file iconPDF (632 KB) | HTML iconHTML
    Freely Available from IEEE
  • Foreword from conference chair

    Publication Year: 2012, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (570 KB) | HTML iconHTML
    Freely Available from IEEE
  • Sponsors and organizers

    Publication Year: 2012, Page(s): v
    Request permission for commercial reuse | PDF file iconPDF (198 KB)
    Freely Available from IEEE
  • Committee and reviewers

    Publication Year: 2012, Page(s):vi - viii
    Request permission for commercial reuse | PDF file iconPDF (403 KB)
    Freely Available from IEEE
  • Program schedule

    Publication Year: 2012, Page(s):ix - x
    Request permission for commercial reuse | PDF file iconPDF (329 KB)
    Freely Available from IEEE
  • Keynote speaker [Convergence of communications towards smart era]

    Publication Year: 2012, Page(s):2 - 3
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (477 KB)

    Convergence of communications refers to digital convergence of communications, broadcasting and Internet on the foundation of Internet Protocol platform. Internet played a winning play throughout the digital convergence process and survived fierce competitions, thereby becoming the communications platform in the converged communications. In recent years, digital convergence has shifted gear to enc... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Plenary speaker [Cognitive radio networks: design issues and security threats]

    Publication Year: 2012, Page(s): 4
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (463 KB)

    This talk will introduce the notion of cognitive radionetworks (CRNs) and will then discuss dynamic spectrum access (DSA)methods for CRNs. Later, the talk will focus on spectrum sensing andits associated security issues. Some of our recent work on Byzantineattacks in collaborative spectrum sensing will be described in somedetail. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Technical program

    Publication Year: 2012, Page(s):xi - xvii
    Request permission for commercial reuse | PDF file iconPDF (426 KB)
    Freely Available from IEEE
  • Author index

    Publication Year: 2012, Page(s):xviii - xix
    Request permission for commercial reuse | PDF file iconPDF (226 KB)
    Freely Available from IEEE
  • Auction-based vs. incentive-based Multiple-Cloud orchestration mechanisms

    Publication Year: 2012, Page(s):1 - 5
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (894 KB) | HTML iconHTML

    With the vast number of isolated and independent Cloud Service Providers (CSP) existing at present, it is challenging for the users to choose an appropriate CSP. In this paper, we propose two Multiple-Cloud orchestration mechanisms, one based on auction theory and the other based on incentives to address this issue. By connecting the CSPs and users through a Broker, we create a marketplace in whic... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Efficient normal peers group recovery in hierarchical peer-to-peer

    Publication Year: 2012, Page(s):6 - 10
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (783 KB) | HTML iconHTML

    While structured peer-to-peer (P2P) offers benefits on its scalability and efficiency in performing a successful query lookup, its stability is suffered from the dynamics of the overlay structure caused by churn. In a structured hierarchical P2P, in addition to potential decreases of the system performance, the superpeer failure cases also forced the normal peers under its responsibility to discon... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • FPGA implementation of ANN for reactive routing protocols in MANET

    Publication Year: 2012, Page(s):11 - 14
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (725 KB) | HTML iconHTML

    This paper presents Artificial Neural Network (ANN) based Ad-hoc On-demand Distance Vector (AODV) routing protocol for Mobile Ad-Hoc Networks (MANETs). Limited bandwidth and transmission characteristic impose administrative and control information to update the dynamic change in the MANET topology. Information update at some fixed time interval can cause unnecessary traffic in the wireless network... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Credit-based low latency packet scheduling algorithm for real-time applications

    Publication Year: 2012, Page(s):15 - 19
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (796 KB) | HTML iconHTML

    The number of real-time applications are growing dramatically at an unprecedented rate. Efficient bandwidth allocations and strict delay requirements are indispensable for real-time flows such as audio streaming. Unfortunately, most of the well-known packet scheduling algorithms like Weighted Fair Queueing (WFQ) and Start-time Fair Queueing (SFQ) can not guarantee low and stable latencies for real... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fault notification extension in support of BSS 2G siemens

    Publication Year: 2012, Page(s):20 - 24
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1436 KB) | HTML iconHTML

    Fault management system has critical responsibility in telecommunication networks to guarantee the networks reliability. One of important functions of fault management is fault notification. In this paper, fault notification extension for BSS 2G Siemens is proposed. Application to process and send the BSS 2G alarms automatically to sites engineers in form of Short Message Service (SMS) is designed... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A fast and seamless route repairing algorithm for ad-hoc networks

    Publication Year: 2012, Page(s):25 - 29
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (880 KB) | HTML iconHTML

    AODV is one of the most widely studied routing protocols for the networks, which have high topology variance. It can quickly build and repair the route from source to destination to recover the broken connection. In this paper, we propose a fast and seamless route repairing (FSRR) algorithm to improve the route recreation procedure in AODV. To seamlessly repairing the route, the FSRR monitors the ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Sum rate maximization for spectrum sharing multiuser MIMO network under rayleigh fading

    Publication Year: 2012, Page(s):30 - 34
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (680 KB) | HTML iconHTML

    We study the sum rate maximization problem for spectrum sharing multiple input multiple output (MIMO) broadcast channels (BC) under Rayleigh fading. We assume that the receiver side has the perfect channel state information (CSI), however the transmitter side has partial CSI in the form of channel covariance matrix feedback. Based on multiple auxiliary variables, Karush-Kuhn-Tucker (KKT) optimalit... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Notice of Violation of IEEE Publication Principles
    Blind spectrum sensing for cognitive radio using discriminant analysis

    Publication Year: 2012, Page(s):40 - 43
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (838 KB) | HTML iconHTML

    Notice of Violation of IEEE Publication Principles"Blind Spectrum Sensing for Cognative Radio Using Discriminant Analysis"by Kris Sujatmoko, Gunawan Wibisono, Dadang Gunawanin the Proceedings of the 2012 International Conference on Communication, Networks and Satellite (ComNetSat), July 2012, pp. 40-43After careful and considered review of the content and authorship of this... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A taxonomy for congestion control algorithms in Vehicular Ad Hoc Networks

    Publication Year: 2012, Page(s):44 - 49
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (716 KB) | HTML iconHTML

    One of the main criteria in Vehicular Ad hoc Networks (VANETs) that has attracted the researchers' consideration is congestion control. Accordingly, many algorithms have been proposed to alleviate the congestion problem, although it is hard to find an appropriate algorithm for applications and safety messages among them. Safety messages encompass beacons and event-driven messages. Delay and reliab... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Adaptive beamforming schemes for SC-FDMA systems with insufficient cyclic prefix

    Publication Year: 2012, Page(s):50 - 54
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (771 KB) | HTML iconHTML

    When the duration of the cyclic prefix is shorter than that of the channel impulse response duration in single carrier-frequency division multiple access (SC-FDMA) systems, inter-symbol interference (ISI) and inter-carrier interference (ICI) will degrade the system performance. Previously, this problem was solved by a blind beamforming scheme with considering the effects of carrier frequency offse... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The development of 3D curve dynamic path planning simulation in cluttered environment

    Publication Year: 2012, Page(s):55 - 59
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (977 KB) | HTML iconHTML

    3D path planning for intercepting of moving target becomes one of the open research problems recently. For intercepting of moving target, the path planning has to be set in dynamic condition. This research is aim to develop 3D curve dynamic path planning simulation for this dynamic condition. In most situations, the UAV has to encounter cluttered environment. Thus, we develop a simulation in C lan... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance analysis of Open and Closed Loop Spatial Multiplexing in LTE Downlink Physical Layer

    Publication Year: 2012, Page(s):60 - 63
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (594 KB) | HTML iconHTML

    LTE is the evolutionary step towards fourth-generation mobile to cope up with the increasing throughput requirements of the future wireless cellular systems. This paper investigates the performance of LTE Downlink Physical Layer. LTE utilizes MIMO data transmission to provide spatial diversity and spatial multiplexing, to obtain higher channel capacity, compared with traditional SISO system. Perfo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Capacity analysis of Device-to-Device resource reusing modes for cellular networks

    Publication Year: 2012, Page(s):64 - 68
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1001 KB) | HTML iconHTML

    It is quite important for Device-to-Device (D2D) communication to make decision in selecting which part of the celluar radio resource, namely uplink (UL) resource or downlink (DL) resource, to be reused for the purpose of higher system capacity. In this paper, we propose an interference control scheme in DL mode to limit the base station's (BS) interference to D2D user equipments (DUEs) by selecti... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mobile geotagged data gathering for disaster remediation

    Publication Year: 2012, Page(s):69 - 73
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (704 KB) | HTML iconHTML

    Devastating floods in Thailand during the final quarter of 2011 caused almost 600 deaths as well as severe damage to the country's infrastructure and economy. The crisis prompted us to very quickly develop a system using mobile devices to survey the status of industrial facilities in disaster-affected areas. Our objective was to create a system that would allow an untrained user equipped with a mo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Time-oriented care-of address for mobile IPv6 networks

    Publication Year: 2012, Page(s):74 - 78
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (783 KB) | HTML iconHTML

    Duplicate Address Detection (DAD) is a necessary process which is time-consumimg for ensuring the uniqueness of Care-of Address (CoA) when a mobile node (MN) moves from access medium to another. However, the duplicate CoA impacts the delays imposed by the DAD process. In this paper, we propose a Time-Oriented Care-of Address (TOCoA) generation scheme to reduce the probability of duplicate CoA. Ana... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.