Mobile Future and Symposium on Trends in Communications, 2003. SympoTIC '03. Joint First Workshop on

26-28 Oct. 2003

Filter Results

Displaying Results 1 - 25 of 42
  • On structured trellises of some best [n,k,d] codes

    Publication Year: 2003, Page(s):47 - 50
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (291 KB) | HTML iconHTML

    The paper presents new linear binary block codes, with codeword length, n, number of information symbols in codewords, k, and code distance, d, which reach the upper or lower bounds on maximal code-distance, using the construction of M. Kasahara et al. (see IEEE Trans. on Inform. Theory, vol.IT-22, p.462-8, 1976) for some combination of the mentioned parameters. The paper presents, as well, the st... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Further results on the capacity estimation of two-dimensional run-length constrained channels using fractals

    Publication Year: 2003, Page(s):41 - 46
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (349 KB) | HTML iconHTML

    A capacity estimation method has been proposed for two-dimensional channels with constraints (Macica, J. and Farkas, P., 2003). Specific constraints are defined by two-dimensional binary patterns that satisfy one-dimensional (d,k) runlength constraints both horizontally and vertically and, for some of the patterns, also diagonally. Fractals are used for finding the state-transition matrices. The c... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Two-dimensional quasi orthogonal complete complementary codes

    Publication Year: 2003, Page(s):37 - 40
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (275 KB) | HTML iconHTML

    Construction of a new family of two-dimensional quasi orthogonal complete complementary codes (2D-QOCCC) is presented The new 2D-QOCCC retain most of the properties of the 2D-OCCC except the ideal sum of correlation values within the zero horizontal shift. The benefit is a several times larger number of signatures for a given number of elements, thus the enlargement of a maximum number of communic... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance analysis of binary-CDMA transceivers in AWGN channel

    Publication Year: 2003, Page(s):33 - 36
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (287 KB) | HTML iconHTML

    In binary CDMA (B-CDMA) schemes, the envelope of multiple CDMA signals is quantized into a small number of levels to minimize power amplifier burden while keeping the advantages of CDMA such as the soft capacity and robustness to interference. The performance of the B-CDMA system is analytically evaluated in the additive white Gaussian noise channel (AWGN). The performance of the B-CDMA system is ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Block coded modulation of combined Huffman and run length limited/error control codes

    Publication Year: 2003, Page(s):29 - 32
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (331 KB) | HTML iconHTML

    A technique to combine the three processes of a digital communication system, namely source coding, channel coding and modulation, is presented. The proposed system employs Huffman code for source coding, run length limited/error control codes (RLL/ECC) for channel coding and binary frequency shift keying/multi-phase shift keying (BFSK/MPSK) for modulation. It is shown that a reduction of the over... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On decoding of multidimensional single parity turbo product codes

    Publication Year: 2003, Page(s):25 - 28
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (314 KB) | HTML iconHTML

    The paper deals with an iterative decoding algorithm for two or more dimensional turbo product codes, built using single parity block codes. Decoding is based on soft-input/soft-output (SISO) decoders for decoding component codes. The soft inputs of the decoder include two values, the soft channel value and an a priori value. The soft output of the component's decoder is an extrinsic value, which ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Using GSM/UMTS for single sign-on

    Publication Year: 2003, Page(s):138 - 145
    Cited by:  Papers (2)  |  Patents (7)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (549 KB) | HTML iconHTML

    At present, network users have to remember a user-name and a corresponding password for every service with which they are registered. Single sign-on (SSO) has been proposed as a solution to the usability, security and management implications of this situation. Under SSO, users authenticate themselves only once to an entity termed the 'authentication service provider' (ASP) and subsequently use dis... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Two-dimensional orthogonal complete complementary codes

    Publication Year: 2003, Page(s):21 - 24
    Cited by:  Papers (12)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (240 KB) | HTML iconHTML

    Two families of two-dimensional orthogonal complete complementary codes (2D-OCCC) are presented They can be constructed, for example, over binary or complex symbols. The new 2D-OCCC retain most of the properties of the 1D-OCCC. The autocorrelation function is equal to zero for all nonzero shifts in both dimensions of any signature selected from the code. The cross-correlation for any pair of diffe... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reputation methods for routing security for mobile ad hoc networks

    Publication Year: 2003, Page(s):130 - 137
    Cited by:  Papers (12)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (620 KB) | HTML iconHTML

    Mobile ad hoc networks have inherently very different properties to conventional networks. These new characteristics present major security vulnerabilities; in particular, one side effect of the unique way in which routing protocols operate in ad hoc networks is that many new threats arise. Selfish nodes are those which do not perform certain operations that the protocol specifies that they should... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An improved second-order power control iterative algorithm

    Publication Year: 2003, Page(s):118 - 121
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (285 KB) | HTML iconHTML

    The paper proposes an improved second-order power control (ISOPC) algorithm for code division multiple access (CDMA) systems. The ISOPC uses current and previous power levels for power updates and it has fast convergence speed. Convergence analysis is performed and the condition of ISOPC convergence is provided for feasible systems. The ISOPC algorithm is then simulated in a DS-CDMA system. The re... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Power-line high-frequency characteristics: analytical formulation

    Publication Year: 2003, Page(s):106 - 109
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (336 KB) | HTML iconHTML

    The design of digital communication systems via overhead high voltage power-lines, namely digital power line carrier (dPLC), requires knowledge of the power-line high frequency characteristics. The paper derives an analytical formulation for high-voltage power-line high-frequency characteristics: amplitude and phase characteristics and group delay. Analytical expressions are derived for a power-li... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A modified Blahut algorithm for decoding Reed-Solomon codes beyond half the minimum distance

    Publication Year: 2003, Page(s):17 - 20
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (348 KB) | HTML iconHTML

    A modification of the Blahut algorithm is proposed for decoding Reed-Solomon codes beyond half the minimum distance. An RS code is described as an (n, k) code, where the codeword consists of n symbols from a Galois field of q elements, k of which are information symbols, with r=(n-k) check symbols. We define the minimum distance, d=r+1, and the maximum number of error symbols that can be corrected... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Quality of service provision assessment for campus network

    Publication Year: 2003, Page(s):75 - 78
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (370 KB) | HTML iconHTML

    The paper presents a methodology for assessing the quality of service (QoS) provision for a campus network. The author utilizes the Staffordshire University's network communications infrastructure (SUNCI) as a testing platform and discusses a new approach and QoS provision, by adding a component of measurement to the existing model presented by J.L. Walker (see J. Services Marketing, vol.9, no.1, ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Image transmission using unequal error protection combined with two-fold turbo coding

    Publication Year: 2003, Page(s):i - v
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (381 KB) | HTML iconHTML

    Two-fold turbo codes have recently been introduced as the least complex member of the multifold turbo code family, and they have been shown to outperform their conventional symmetric and asymmetric cousins in the waterfall region. The article introduces a simple method that allows two-fold turbo codes to offer bilevel unequal error protection. Also, the application of the unequal error protection ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The utilization of the DWDM/CWDM combination in the metro/access networks

    Publication Year: 2003, Page(s):160 - 162
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (272 KB) | HTML iconHTML

    We present the basic principles of WDM and then introduce some characteristics of various WDM approaches to the metro/access telecommunication networks. A goal of any WDM system is to multiply an optical fiber's transmission capacity by sending signals simultaneously at multiple wavelengths. Substantial attention is dedicated to presenting a new possibility of utilizing WDM technologies in buildin... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Computational intelligence in call admission control

    Publication Year: 2003, Page(s):94 - 97
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (382 KB) | HTML iconHTML

    The paper discusses the call admission control problem from a computational point of view. The use of various mathematical approaches to solving the call admission control problem is described, namely the use of the Markov decision process, neural nets, fuzzy logic and genetic algorithms. All these approaches are explained as used with a guard channel policy. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Digital building block for frequency synthesizer and fractional phase locked loops

    Publication Year: 2003, Page(s):126 - 129
    Cited by:  Papers (3)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (362 KB) | HTML iconHTML

    The paper describes a new architecture of a digital building block, which can be used in frequency synthesizers and phase locked loops. The circuit is based on generators, counters and a register. The technique described here is much simpler then other methods. The presented synthesizer is the most suitable for the design of VLSI architectures or for programmable large scale integration (or in-sys... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • QoS-aware power minimization for OFDM-based radio systems

    Publication Year: 2003, Page(s):114 - 117
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (342 KB) | HTML iconHTML

    The requirement for high-performance, flexible, QoS-aware, low-power digital transceivers is one of the key challenges for future mobile/wireless systems. Within this framework, a reduced-complexity algorithm for fast, joint optimization of the transmission parameters in OFDM indoor wireless systems is proposed. The algorithm, based on the subcarrier switching concept, is handled by the "superviso... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Ubiquitous discovery service platform for mobile applications via a cell phone

    Publication Year: 2003, Page(s):5 - 8
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (402 KB) | HTML iconHTML

    We propose a service infrastructure for richer ubiquitous services that assume access via a cell phone. We call it UDSP (ubiquitous discovery service platform). It can associate a variety of IDs in the real world with a variety of services on the communication network. It can also provide appropriate services for cell phone users. Furthermore, since it supports conventional IDs and service systems... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • SMART EDU - a new TV video enabled interactive e-learning platform

    Publication Year: 2003, Page(s):167 - 175
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (774 KB) | HTML iconHTML

    SMART EDU is a new e-learning platform which enhances CBT (computer based training) and WBT (Web based training) systems, but differing from them by its ability to transmit TV quality video and audio to trainees, thus allowing a significant increase in the attraction of e-learning training to the trainees. SMART EDU provides a complex set of tools and technologies for smooth provisioning of traini... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fading characteristics for indoor wireless channels at 5 GHz unlicensed bands

    Publication Year: 2003, Page(s):102 - 105
    Cited by:  Papers (11)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (353 KB) | HTML iconHTML

    The paper reports on experiments undertaken at the University of Wollongong to characterise fading profiles of indoor wireless channels at the 5 GHz bands. The measurements were undertaken at different locations around the campus with results recorded for post-processing to calculate the Rician k-factor, the level crossing rate and the average fade duration. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • STRIKE: spectrally efficient fixed wireless network based on dual standards

    Publication Year: 2003, Page(s):13 - 16
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (388 KB) | HTML iconHTML

    One of the major challenges of the telecommunication community for the coming years will be to make multimedia services available to everyone, even to those who are in remote places. Broadband fixed wireless access (BFWA) is one of the best positioned radio access technologies to provide broadband access with performances that surpass current 3G mobile data rates and are similar to wired xDSL syst... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A reduced-reference perceptual quality metric for in-service image quality assessment

    Publication Year: 2003, Page(s):71 - 74
    Cited by:  Papers (30)  |  Patents (6)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (378 KB) | HTML iconHTML

    User-oriented image quality assessment has become a key factor in multimedia communications. However, existing image quality metrics such as peak signal-to-noise ratio (PSNR) are inappropriate for in-service quality monitoring, since they require the original image to be available at the receiver. Although PSNR and others are objective metrics, they are not based on human visual perception. In ord... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • New mobile services based on agent technology

    Publication Year: 2003, Page(s):156 - 159
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (406 KB) | HTML iconHTML

    A system based on agent technology is proposed to prepare, develop, and maintain new services for mobile users. The proposed agent server is a software for safely executing program agents working as assistants for mobile phone users. Two new groups of agent services are proposed - personal information services and groupware communication services. A personal agent is created for each user of a mob... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Intelligent methods for simulation in ATM networks

    Publication Year: 2003, Page(s):90 - 93
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (314 KB) | HTML iconHTML

    The paper presents results from a number of investigations into the problems of implementing intelligent methods in the prediction and simulation of ATM traffic, based on time series and state models. A prognosis method based on a neuro-fuzzy model and learning vector quantization (LVQ) is suggested The implementation for stochastic and long range dependence source models is shown. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.