2013 36th International Conference on Telecommunications and Signal Processing (TSP)

2-4 July 2013

Filter Results

Displaying Results 1 - 25 of 190
  • [Front cover]

    Publication Year: 2013, Page(s):1 - 2
    Request permission for commercial reuse | PDF file iconPDF (2666 KB)
    Freely Available from IEEE
  • [Front matter]

    Publication Year: 2013, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (339 KB)
    Freely Available from IEEE
  • Conference information

    Publication Year: 2013, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (24 KB)
    Freely Available from IEEE
  • Organizing committee members

    Publication Year: 2013, Page(s):v - vi
    Request permission for commercial reuse | PDF file iconPDF (36 KB)
    Freely Available from IEEE
  • Preface

    Publication Year: 2013, Page(s): vii
    Request permission for commercial reuse | PDF file iconPDF (125 KB)
    Freely Available from IEEE
  • Contents

    Publication Year: 2013, Page(s):ix - xix
    Request permission for commercial reuse | PDF file iconPDF (73 KB)
    Freely Available from IEEE
  • Optimization of the RBF localization algorithm using Kalman filter

    Publication Year: 2013, Page(s):1 - 5
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1252 KB) | HTML iconHTML

    In this paper an optimization of the Rank Based Fingerprinting (RBF) algorithm using the Kalman filter will be introduced. In our previous papers it was shown that RBF localization algorithm seems to be more immune and accurate compared to traditional deterministic fingerprinting algorithms. We still decided to improve accuracy of the algorithm in dynamic applications, like navigation or user trac... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Comparison of hardware and software based encryption for secure communication in wireless sensor networks

    Publication Year: 2013, Page(s):6 - 10
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3081 KB) | HTML iconHTML

    This paper deals with the energy efficient issue of cryptographic mechanisms used for secure communication between devices in wireless sensor networks. Since these devices are mainly targeted for low power consumption appliances, there is an effort for optimization of any aspects needed for regular sensor operation. On a basis of utilization of hardware cryptographic accelerators integrated in mic... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fuzzy tool for customer satisfaction analysis in CRM systems

    Publication Year: 2013, Page(s):11 - 14
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1661 KB) | HTML iconHTML

    Nowadays, the concept of CRM systems is very popular. Important aspect of CRM system is customer satisfaction analysis which evaluates customer preferences using questionnaire survey. Currently, there are two main approaches for customer satisfaction analysis. Rough set approach uses decision rules for evaluation of customer preferences. Based on this approach the fuzzy tool for customer analysis ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fuzzy tool for efficient searching in information system

    Publication Year: 2013, Page(s):15 - 19
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1607 KB) | HTML iconHTML

    In today's information systems various heterogeneous information are stored. Users usually search in these systems using search forms. In this article, the fuzzy tool for searching in information systems is proposed. The fuzzy tool helps user to find suitable data in cases when he doesn't know exactly all criteria for searching. For definition of searching criteria the linguistic expressions and v... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A methodology for testing of information system under uncertainty

    Publication Year: 2013, Page(s):20 - 22
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1678 KB) | HTML iconHTML

    Current approach to testing of an information system/application and its results lacks the informative value that could evaluate the system in a more complex manner. This article follows already published part of research and enables complex qualitative testing of an information system conducted by multiple testers or multiple repetitive testing tasks. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Efficient security solution for privacy-preserving cloud services

    Publication Year: 2013, Page(s):23 - 27
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2189 KB) | HTML iconHTML

    In this paper, we present a novel privacy-preserving security solution for cloud services. We deal with user anonymous access to cloud services and shared storage servers. Our solution provides registered users with anonymous access to cloud services. Our solution offers anonymous authentication. This means that users' personal attributes (age, valid registration, successful payment) can be proven... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • DOAF — A development framework for distributed applications

    Publication Year: 2013, Page(s):28 - 32
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1589 KB) | HTML iconHTML

    In this paper we present an application development framework that has the goal of supporting the development of distributed applications. The Distributed Operation Application Framework (DOAF) provides standardized interfaces to software developers with the purpose of facilitating the development of distributed applications without caring for topics like: node/replica localization, operation sync... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • DOAF — Replica localization module

    Publication Year: 2013, Page(s):33 - 37
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1602 KB) | HTML iconHTML

    We present in this paper the detailed architecture of the replica localization module implemented inside the Distributed Operation Application Framework (DOAF). DOAF is a development framework designed to speed up the development and deployment of distributed applications. The replica localization module (PathFinder) provides standardized interfaces and default implementation for replica managemen... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • QoS optimization in congested multimedia networks

    Publication Year: 2013, Page(s):38 - 42
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1579 KB) | HTML iconHTML

    In multimedia networks, maintaining the agreed QoS (Quality of Service) level is fundamental. VoIP (Voice over IP) and other multimedia applications such as video conferencing, video-on-demand, media streaming, data traffic etc. impose strict requirements and arise various factors that may alter the QoS in the network. The QoS may easily be affected by delaying or dropping packets, as a consequenc... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Interactive video audio system and its performance evaluation

    Publication Year: 2013, Page(s):43 - 46
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1628 KB) | HTML iconHTML

    The paper discusses the Interactive Audio Video System - IVAS which has been developed for INDECT project. The INDECT project aims at developing the tools for enhancing the security of citizens and protecting the confidentiality of recorded and stored information and is a part of the 7 FP EU. The presented paper is a result of applied research and is a contribution into the portal which integrates... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Rakeness test for coherent signal combining in mobile receivers

    Publication Year: 2013, Page(s):47 - 51
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1723 KB) | HTML iconHTML

    This work introduces the Rakeness test as a signal processing technique to assess the fitness of a cascaded coherent combining, such as implemented by a Rake receiver, or one simpler matched filter. Our testing procedure discriminates between one dominant path (detectable by a matched filter) and few dominant paths (possibly corresponding to the Rake fingers). This corresponds to measure how much ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A signal processing algorithm for multi-constant modulus equalization

    Publication Year: 2013, Page(s):52 - 56
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2594 KB) | HTML iconHTML

    This work introduces an adaptive equalizer, namely the multi-constant modulus algorithm (MCMA), for blind equalization of QAM signals. The novelty of our approach is to combine, by means of its new cost function, the fast convergence performance of the constant modulus algorithm (CMA), as well as the ability of joint blind equalization and carrier-phase recovery of the multi-modulus algorithm (MMA... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Trade-off between signature aggregation and batch verification

    Publication Year: 2013, Page(s):57 - 61
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2398 KB) | HTML iconHTML

    The paper deals with optimization techniques of digital signatures applied in information and communication architectures. The techniques called the signature aggregation and batch verification cause two contrary benefits: small computational overhead or small communication overhead, shorter chain of signatures or faster verification process, respectively. In this paper, we analyze and compare agg... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Creating a programming language for the AL5 type robotic arms

    Publication Year: 2013, Page(s):62 - 65
    Cited by:  Papers (19)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2014 KB) | HTML iconHTML

    This paper presents all the steps involved in the development of a new and friendly programming language for the AL5 type robotic arm. The AL5 can be controlled via the RS-232 serial port using SCPI (Standard Commands for Programmable Instruments) commands, but this method can control one motor at a time. The robotic arm has 5 + 1 motors; the last motor is an optional motor used to rotate the grip... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Subchannel ordering scheme for LDPC-coded OFDM transmission over selective channels

    Publication Year: 2013, Page(s):66 - 70
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1636 KB) | HTML iconHTML

    OFDM modulation seems to be a good choice to deal with highly distorted transmission channels, and LDPC error correction codes allow the system performance to get close to the Shannon capacity. Performance improvement of the LDPC-coded OFDM system can be accomplished by use of irregular binary LDPC codes along with an appropriate match between the bits of the codeword and the OFDM subchannels. Non... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance analysis and comparison of the TAYGA and of the PF NAT64 implementations

    Publication Year: 2013, Page(s):71 - 76
    Cited by:  Papers (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1661 KB) | HTML iconHTML

    The transition mechanisms for the first phase of IPv6 deployment are surveyed and the most important NAT64 solutions are selected. The test environment and the testing method are described. As for the selected NAT64 implementations, the performance of the TAYGA running under Linux and of the Packet Filter (PF) of OpenBSD was measured and compared. The stability of the tested NAT64 solutions was an... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Security gap performance of some LDPC code constructions

    Publication Year: 2013, Page(s):77 - 81
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1626 KB) | HTML iconHTML

    In this paper, we assess the behavior of some low-density parity-check (LDPC) code design techniques over the additive white Gaussian (AWGN) wire-tap channel, in terms of security gap. We consider the progressive edge growth (PEG) construction algorithm as a reference, and compare its performance with that of four approaches for designing structured LDPC codes. We consider both systematic and non-... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The FPGA implementation of dictionary; HW consumption versus latency

    Publication Year: 2013, Page(s):82 - 85
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1638 KB) | HTML iconHTML

    This paper presents a study on the possibilities of dictionary implementation for a dictionary compression system in FPGA. The possibilities of creation of the dictionary using the registers and the RAM memory are described. For these implementations, the interdependence of hardware consumption and latency during basic dictionary processes like writing, reading and searching a match is described. ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Throughput performance analysis of the multipath communication library MPT

    Publication Year: 2013, Page(s):86 - 90
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1717 KB) | HTML iconHTML

    Although the currently used mobile communication equipments (laptops, tablets, phones) usually have many network interfaces, the Internet communication technology uses only a single communication path for a connection. In this paper we would like to introduce a new architecture, which gives an easy-to-use extension for the current TCP/IP protocol stack and offers the possibility of using multiple ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.