By Topic

IEEE/Sarnoff Symposium on Advances in Wired and Wireless Communication, 2005.

Date 18-19 April 2005

Filter Results

Displaying Results 1 - 25 of 56
  • Antenna dynamic selection strategies in CDMA distributed antenna systems

    Publication Year: 2005, Page(s):1 - 4
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (465 KB) | HTML iconHTML

    To minimize the antenna costs in CDMA distributed antenna (DA) systems, a class of straightforward antenna dynamic selection (ADS) strategies for CDMA DA systems is proposed. In contrast to the traditional antenna static selection (ASS) method adopted in most of the literature that each "virtual cell" (VC) contains same number of antennas, ADS try to allocate as few antennas as possible to each VC... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Ultra low noise low cost multi octave band VCO

    Publication Year: 2005, Page(s):5 - 8
    Cited by:  Papers (7)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (907 KB) | HTML iconHTML

    Modern communication systems are multi-band and multi-mode, therefore requiring an ultra wideband low noise signal source that may allow accessing simultaneously DCS1800, PCS 1900, and WCDMA networks by a single ultra low noise wideband VCO. An ultra low noise, low cost and power efficient VCO is reported that can be tuned over a fairly wide range of frequencies (500-2500 MHz) while maintaining lo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Concepts for entropy-aware image transport over energy-limited, ad-hoc networks

    Publication Year: 2005, Page(s):9 - 12
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (419 KB) | HTML iconHTML

    This paper is a work-in-progress report of an investigation into the transport of still images over energy-limited, ad-hoc, sensor networks with the goal of maximizing the end-to-end throughput of image entropy (in the Shannon sense), while minimizing image distortion and the energy consumed by the network, over some mission duration. We report the progress made during the first year of this inves... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Extending OSPF for large scale MPLS networks

    Publication Year: 2005, Page(s):13 - 16
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (481 KB) | HTML iconHTML

    With the current growth rate that networks are witnessing, it is essential to have routing protocols that can adjust to scale with this growth. OSPF (open shortest path first), the most widely used interior gateway protocol, needs to be adaptive enough to accommodate rapid changes to the complex nature of the Internet and other ISP networks. We present extensions to OSPF and OSPF-TE (OSPF with tra... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A dynamic radio channel allocation scheme for wireless LANs

    Publication Year: 2005, Page(s):17 - 20
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (455 KB) | HTML iconHTML

    With the increased deployment of wireless local area networks (WLAN) in many popular locations with multiple access points (AP), the limited number of usable radio channels provided by the IEEE 802.11 standard has resulted in a worse than expected network performance, such as very low throughput. The existing static radio channel allocation (RCA) schemes can only partially solve the problem in the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mobility prediction aided dynamic multicast routing in MANET

    Publication Year: 2005, Page(s):21 - 24
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (458 KB) | HTML iconHTML

    Nodes in a mobile ad hoc network (MANET) are free to move at anytime and to anywhere. This mobility feature makes multicast in MANET a typical dynamic multicast case, where group members are likely to leave and rejoin the multicast session frequently. To provide an efficient routing scheme in such a dynamic multicast environment, we propose a mobility prediction aided dynamic multicast routing (MP... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A description logic based approach for IDS security information management

    Publication Year: 2005, Page(s):25 - 28
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (751 KB) | HTML iconHTML

    The upsurge of network distributed denial of service (DDoS) attacks on computer networks demands great effort in network security management. Currently, intrusion detection systems (IDS) are used to secure computer networks. However, IDS may generate a huge volume of alerts, making it hard for security administrators to uncover hidden attack scenarios. In this paper, we propose a description logic... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Co-evolving algorithm-to-hardware gateway system design in manageable IP networks

    Publication Year: 2005, Page(s):29 - 32
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (744 KB) | HTML iconHTML

    We address a co-evolving algorithm-to-hardware design and implementation where multiple evolvable units (hardware and software) can be realized in a single embedded traffic manager in a gateway system for manageable IP networks (Jun Kyun Choi et al., ITU-T Recommendation in Progress, Y.NGN-CMIP, 2004). Our proposal eliminates the necessity of providing physical and dedicated memory resources and s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Iterative equalization of frequency selective channels

    Publication Year: 2005, Page(s):33 - 36
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (644 KB) | HTML iconHTML

    This paper addresses the channel equalization when multiple codes are under consideration. Multiple codes are designed by concatenating turbo codes in parallel fashion. Multiple turbo coded sequences are mapped to phase shift keying signals before passing throughout the severe intersymbol interface (ISI) channels. At the receiver, multistage decoding is utilized along with a group set partitioning... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance evaluation of security architecture for wireless local area networks by indexed based policy method

    Publication Year: 2005, Page(s):37 - 40
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (764 KB) | HTML iconHTML

    In this paper, we investigated existing and proposed WLAN security technologies designed to improve the IEEE 802.11 standard by applying security policies. We have extensively analyzed the effect of crypto parameters over WLAN based on packet level characteristics by applying the security policy to an individual packet. We have also analyzed the effect of TCP and UDP traffic over our proposed WLAN... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Analytical model of a virtual backbone stability in mobile environment

    Publication Year: 2005, Page(s):41 - 44
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (692 KB) | HTML iconHTML

    We present a probabilistic model of the stability of a virtual backbone in ad hoc networks. The model allows the computation of several metrics characterizing the dynamics of a node's random movement: (1) average time for the number of link changes of the node (i.e., instances of link creation and failure) or just failures to either drop below or exceed a given threshold, and, analogously, (2) ave... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Speech and Image Compression Using Discrete Wavelet Transform

    Publication Year: 2005, Page(s):45 - 48
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (780 KB) | HTML iconHTML

    Efficient speech and image compression solutions are becoming critical with the recent growth of data intensive, multimedia based applications. In this paper, we describe the application of the discrete wavelet transform (DWT) for analysis, processing and compression of multimedia signals like speech and image. More specifically we explore the major issues concerning the wavelet based speech and i... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Detection and mitigation of spam in IP telephony networks using signaling protocol analysis

    Publication Year: 2005, Page(s):49 - 52
    Cited by:  Papers (10)  |  Patents (21)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (724 KB) | HTML iconHTML

    We propose an innovative method to detect and block spam (unsolicited bulk calls) in IP telephony networks. Rapid adoption of voice over IP (VoIP) technology introduces new powerful options for spammers and telemarketers to increase their productivity and effectiveness. To date a few concepts have already been proposed in the VoIP spam prevention area. These prior solutions focus mainly on identit... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Adaptive control network for an intelligent RF front-end amplifier

    Publication Year: 2005, Page(s):53 - 56
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (796 KB) | HTML iconHTML

    The paper describes a novel approach for adjusting the matching networks of an RF front-end amplifier to maintain system performance using an adaptive control network (ACN). To maintain system performance, the matching networks of the amplifier are dynamically adjusted as a function of frequency. The ACN consists of a back-propagation neural network that was trained for gain as a function of frequ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Simulating an indoor ultra wideband channel based on a niching particle swarm optimizer

    Publication Year: 2005, Page(s):57 - 60
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (857 KB) | HTML iconHTML

    A new approach to the modeling of indoor ultra wideband radio channel is presented. We first characterize the scattering by local clutter using a set of canonical structures. Subsequently, the channel can be regarded as a continuous multimodal cost function of the scatterer locations. Each local maximum and its surrounding area are the result of closely associated objects that are part of a very s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design and time domain characterization of UWB conical antennas

    Publication Year: 2005, Page(s):61 - 64
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (934 KB) | HTML iconHTML

    The design and time domain characterization of conical antennas have been studied. This kind of antenna is well known for its wide bandwidth and omni-directional radiation pattern, and is suitable for ultra-wideband (UWB) communications. Two fabricated conical antennas show good performance over the UWB frequency band (3.1-10.6 GHz). The transmission and reception transfer functions of these anten... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Blind source separation based on moments matching

    Publication Year: 2005, Page(s):65 - 68
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1166 KB) | HTML iconHTML

    Blind source separation (BSS) is a fundamental and challenging problem in signal processing. A new method based on the fractional moments and simulated annealing is presented in this paper. Fractional moments are used as a new measure of separation criterion contrary to the traditional integer moments. This is inspired by the fact that fractional moments lead to an enhanced estimation of the proba... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Prioritized traffic recovery over GMPLS networks

    Publication Year: 2005, Page(s):69 - 72
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (894 KB) | HTML iconHTML

    The paper proposes a prioritized traffic recovery model for generalized multiprotocol label switching (GMPLS) networks. The network traffic is differentiated into four classes, with the highest prioritized class achieving dedicated protection, the second prioritized class obtaining shared restoration, the third prioritized class attaining on-line restoration, and no recovery for the lowest priorit... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Combined asterism and sphere decoder for large asymmetric MIMO systems

    Publication Year: 2005, Page(s):73 - 76
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (831 KB) | HTML iconHTML

    Multiple input multiple output (MIMO) communications systems have received enormous attention recently as they can provide a roughly linear increase in data rate by using multiple transmit and receive antennas. The optimal detection strategy for a MIMO receiver is to perform a maximum-likelihood (ML) search over all possible transmitted symbol combinations which has an exponential complexity when ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Towards scalable clustering of infrastructured mobile ad hoc networks

    Publication Year: 2005, Page(s):77 - 80
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (936 KB) | HTML iconHTML

    Recently, much research has been dedicated to the development of a reliable infrastructure for mobile ad hoc networks. A hierarchal approach has been a major player, especially its clusterhead based scheme. Many techniques have been proposed for the clustering and selection of clusterheads in mobile ad hoc networks. However, almost all techniques use only a single quality measure to distinguish be... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A low voltage/ low power 1.57 GHz low noise amplifier

    Publication Year: 2005, Page(s):81 - 84
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (840 KB) | HTML iconHTML

    This paper describes the design of a 1.57 GHz low noise amplifier. The LNA uses a modified cascode architecture and was implemented in CMOS 90 nm technology. Powered by a 1.0-V supply the LNA features 19 dB of gain and a 1.2 dBm noise figure. The LNA draws only 1.1 mA current and is stable over a wide frequency range. Input and output return losses of -5 dB and -15 dB have been achieved View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A new data gathering paradigm for wireless sensor networks

    Publication Year: 2005, Page(s):85 - 89
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (936 KB) | HTML iconHTML

    Wireless sensor networks constitute a special kind of ad hoc network. In this paper, we consider the problem of routing between the base station and remote data sources via intermediate sensor nodes in a hierarchical sensor network. Sensor nodes having limited and unreplenishable power resources, both path length and path energy cost are important metrics affecting sensor lifetime. In this paper, ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A low complexity soft-output MIMO decoding algorithm

    Publication Year: 2005, Page(s):90 - 93
    Cited by:  Papers (1)  |  Patents (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (822 KB) | HTML iconHTML

    The K-best Schnoff-Euchner (KSE) decoding algorithm is shown to be capable of supporting soft-outputs for MIMO detection. A modified KSE (MKSE) decoding algorithm is further proposed to improve the performance of the soft-output KSE with minor modifications. Simulation results show that the proposed MKSE algorithm can approach near-optimal performance with lower complexity and is suitable for code... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Implementing artificial neural-networks in wireless sensor networks

    Publication Year: 2005, Page(s):94 - 97
    Cited by:  Papers (2)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1348 KB) | HTML iconHTML

    The development of wireless sensor networks is accompanied by several algorithms for data processing which are modified regression techniques from the field of multidimensional data series analysis in other scientific fields, with examples like nearest neighbor search, principal component analysis and multidimensional scaling (Guestrin, C. et al., Proc. IPSN'04, 2004). We argue that some algorithm... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A tri-polarized ultra-wideband MIMO system

    Publication Year: 2005, Page(s):98 - 101
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1301 KB) | HTML iconHTML

    We investigate the performance of an ultra-wideband multiple-input multiple-output (UWB-MIMO) system that employs three colocated, orthogonally polarized antennas at both ends of the communications link. Results show that, at 1% outage probability, such a system can achieve 24 b/s/Hz spectral efficiency, which indicates a predicted capacity of up to 180 Gb/s for a full-band (3.1-10.6 GHz) UWB-MIMO... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.