{"title":"User Profile Selection by Means of Ontology Reasoning","authors":"Michael Sutterer, O. Drögehorn, K. David","doi":"10.1109/AICT.2008.47","DOIUrl":"https://doi.org/10.1109/AICT.2008.47","url":null,"abstract":"Service delivery platforms in telecommunication environments aim to host multiple services and to provide context-awareness and personalization features. This calls for an appropriate management of user profiles containing general user information as well as situation-dependent user preferences for the contextual personalization of these services. We present a user profile selection approach that decides on the selection of matching situation-dependent user preferences concerning the user's current situation. The presented approach takes advantage of ontology reasoning and is compared to other approaches. The comparison shows that our ontology reasoning based approach allows for more expressiveness concerning the specification of situation-dependent user preferences and hence leads to an added value for platform users.","PeriodicalId":105735,"journal":{"name":"2008 Fourth Advanced International Conference on Telecommunications","volume":"237 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122374682","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Overlay Topology Based Inter-domain Qos Paths Building","authors":"S. Obreja, E. Borcoci","doi":"10.1109/AICT.2008.83","DOIUrl":"https://doi.org/10.1109/AICT.2008.83","url":null,"abstract":"The transport of multimedia flows over the internet needs to manage and control end to end quality of services (QoS) at transport level. Open issues still exist related to finding and maintaining QoS enabled paths through one or several independently administered domains. Among others, two tasks need to be solved: QoS routing or QoS enabled path finding and then maintaining these paths during data transfer. This paper deals with the problem of establishing QoS enabled aggregated multi-domain paths, to be later used for many individual streams. It is proposed a simple but extendable procedure, running at management overlay level, to find through communication between domain managers, several potential inter-domain end to end paths. Then, through resource negotiation process performed also in the management plane, QoS enabled aggregated pipes are established.","PeriodicalId":105735,"journal":{"name":"2008 Fourth Advanced International Conference on Telecommunications","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116472126","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Kruawan Wongpanya, K. Sripimanwat, K. Jenjerapongvej
{"title":"Simplification of Frequency Test for Random Number Generation Based on Chi-Square","authors":"Kruawan Wongpanya, K. Sripimanwat, K. Jenjerapongvej","doi":"10.1109/AICT.2008.42","DOIUrl":"https://doi.org/10.1109/AICT.2008.42","url":null,"abstract":"This paper presents the simplified method of random test suite based on the frequency (block) test. The test is used to check the first property of random numbers which is to have the same probabilities of being \"1\" and \"0\". Random numbers are used for the secret key generation which is an essential part for cryptographic system. Before encryption, secret keys need to pass the random test in order to make it harder for outsiders to predict the pattern of the secret keys. Basically, the decision making of whether the secret keys are truly random, is based on the test statistics computation. Due to the motivation that the classical method based on the NIST statistical test suite (NIST STS) is complex and redundant, the reduction of this random testing procedure is then proposed. The introduced technique does not need to compute the incomplete gamma function (Igamc) nor the P-value for the decision making of test results unlike that of the classical method. Thus, it results to the reduction in the testing decision time. In this technique, the decision making and conclusion can be determined from the critical value of chi-square (chi2) directly. Its results without having to compute Igamc is compared to that of the classical method. In the test, the significance level (a) is set to be 0.01 or 0.05 in order to obtain the critical values and the critical regions. Resulting to the confidence of 99% or 95% respectively. Next, overall performance is evaluated by computing the percentage difference in order to demonstrate that the proposed value gives the same result as that of the classical method. Therefore, this proposed technique can be applied as that of the conventional based on the frequency (block) test.","PeriodicalId":105735,"journal":{"name":"2008 Fourth Advanced International Conference on Telecommunications","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127595777","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Capacity of Cellular Uplink with Multiple Tiers of Users and Path Loss","authors":"D. Kaltakis, E. Katranaras, M. Imran, C. Tzaras","doi":"10.1109/AICT.2008.49","DOIUrl":"https://doi.org/10.1109/AICT.2008.49","url":null,"abstract":"With the emergence and continuous growth of wireless data services, the value of a wireless network is not only defined by how many users it can support, but also by its ability to deliver higher data rates. Information theoretic capacity of cellular systems with fading is usually estimate.d using models originally inspired by Wyner's gaussian cellular multiple access channel (GCMAC). In this paper we extend this model to study the cellular system with users distributed over the cellular coverage area. Based on the distance from the cell-site receiver, users are grouped as tiers, and received signals from each tier are scaled using a distance dependent attenuation factor. The optimum capacity in fading environment is then found by calculating the path-loss for users in each tier using a specific path-loss law and some interesting insights are derived. The results correspond to a more realistic model which boils down to Wyner's model with fading, with appropriate substitutions of parameter values. The results are verified using Wyner's model with fading and Monte-Carlo simulations. Insights are provided for the real world scenarios.","PeriodicalId":105735,"journal":{"name":"2008 Fourth Advanced International Conference on Telecommunications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129113789","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Less Faulty and Simpler Statistical Prediction of Sun-Synchronous Polar LEO Satellite Visions for Ground Stations","authors":"A. Modiri, L. Mohammady, N. Molanian","doi":"10.1109/AICT.2008.23","DOIUrl":"https://doi.org/10.1109/AICT.2008.23","url":null,"abstract":"Remote sensing satellites can send almost complete images of whole earth surface in period of few days, if they are launched in sun-synchronous polar low orbits. The volume of daily received information can affect the predetermination of station location and the design of data archiving devices; that's why this paper has focused on daily satellite visions by each station. The number of satellite daily passes over each ground station and the duration of these passes depend on the station position and satellite altitude. Although exact analytical relations have been introduced for predicting visions' number and duration in literature, but they are too complicated; some simplified equations have also been introduced but some significant errors appears in results; these errors have been revealed and compared with the results of simpler statistical equations, in this paper in comparison with real statistical data.","PeriodicalId":105735,"journal":{"name":"2008 Fourth Advanced International Conference on Telecommunications","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130513247","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Improving Performance of Finite-Buffered Blocking Delta Networks with 2-Class Priority Routing through Asymmetric-Sized Buffer Queues","authors":"D. C. Vasiliadis, G. Rizos, C. Vassilakis","doi":"10.1109/AICT.2008.13","DOIUrl":"https://doi.org/10.1109/AICT.2008.13","url":null,"abstract":"In this paper the performance of asymmetric-sized finite-buffered Delta Networks with 2-class routing traffic is presented and analyzed in the uniform traffic conditions under various loads using simulations. We compare the performance of 2-class priority mechanism against the single priority one, by gathering metrics for the two most important network performance factors, namely packet throughput and delay. We also introduce and calculate a universal performance factor, which includes the importance aspect of each of the above main performance factors. We found that the use of asymmetric-sized buffered systems leads to better exploitation of network capacity, while the increments in delays can be tolerated. The goal of this paper is to help network designers in performance prediction before actual network implementation and in understanding the impact of each parameter factor.","PeriodicalId":105735,"journal":{"name":"2008 Fourth Advanced International Conference on Telecommunications","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133178282","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Topology Design of Hierarchical Hybrid Fiber-VDSL Access Networks with ACO","authors":"R. Zhao, Hanjie Liu, R. Lehnert","doi":"10.1109/AICT.2008.60","DOIUrl":"https://doi.org/10.1109/AICT.2008.60","url":null,"abstract":"As one of the most efficient access solutions, VDSL technology is becoming a highlight in the next generation network. This paper addresses the topology design of hierarchical hybrid fiber-VDSL access networks as NP-hard problem. A complete strategy is proposed to find a cost-effective and high-reliable network with heuristic algorithms in a short time. The ant colony optimization (ACO) has been implemented for a clustering problem. An ant-based algorithm is proposed to solve nondeterministic positioning problems. In terms of numerical results, the performance of ACO is compared with some previous approaches and discussed.","PeriodicalId":105735,"journal":{"name":"2008 Fourth Advanced International Conference on Telecommunications","volume":"214 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122377400","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Ab-Rahman, M. F. Ibrahim, Ashrani Aizzuddin Abd. Rahni
{"title":"Thermal Noise Effect in FTTH Communication Systems","authors":"M. Ab-Rahman, M. F. Ibrahim, Ashrani Aizzuddin Abd. Rahni","doi":"10.1109/AICT.2008.71","DOIUrl":"https://doi.org/10.1109/AICT.2008.71","url":null,"abstract":"Thermal noise is generated naturally by thermal agitation of electrons in a conductor commonly found in opto-electronic devices. The fact that the optical medium is totally immune to noise does not exclude its occurrence in receiver parts. In communication, thermal noise has a major influence to the quality of the receiver. The lower the thermal noise the higher and more expensive is receiver sensitivity. This paper starts with a tutorial on thermal noise in common communication technologies. The major contribution factor to thermal noise power is also discussed analytically. For more comprehensive view, the includes a study on thermal noise effects network performance in terms of BER, maximum Q-factor, eye height and maximum distance. The fiber-to-the-home network is used as a test field to study the impact of two different values of thermal noise on network parameters. At the end of this paper, thermal noise minimizing techniques are also listed.","PeriodicalId":105735,"journal":{"name":"2008 Fourth Advanced International Conference on Telecommunications","volume":"303 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124228542","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Clock Drift Estimation in Networks with Symmetric Exponential Link Delays","authors":"Q. Chaudhari, E. Serpedin","doi":"10.1109/AICT.2008.82","DOIUrl":"https://doi.org/10.1109/AICT.2008.82","url":null,"abstract":"Wireless sensor networks (WSN) are rapidly gaining importance for distributed sensing, control and automation tasks. Many of their applications require the individual nodes of the network to have their logical clocks running close to each other for reliable conveyance of information. Although a linear model of first order (i.e., involving the clock offset and skew) is enough in most cases, some applications such as efficient duty cycling and synchronized sampling require long term clock synchronization in the network which eventually increases its whole lifetime by spending lesser energy on communications for resynchronization. In this paper, we have proposed a quadratic model for better modeling the relationship between a node's clock with the reference and derived the Maximum Likelihood Estimator (MLE) for the corresponding clock drift, skew, offset and the fixed link delay assuming an exponential distribution for variable link delays. In addition, the algorithm to find such an estimator is also explained in detail.","PeriodicalId":105735,"journal":{"name":"2008 Fourth Advanced International Conference on Telecommunications","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128939214","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance Validation of Carrier Super-Positioning Satellite System with Multi-component Code","authors":"Shoko Kuroda, T. Hara, M. Okada","doi":"10.1109/AICT.2008.73","DOIUrl":"https://doi.org/10.1109/AICT.2008.73","url":null,"abstract":"The carrier super-positioning satellite system is a promising telecommunication system because the frequency efficiency is double that of existing satellite systems. In this technique, we use the same frequency band for inbound and outbound signals that is currently used in separated bands. So, we need to cancel the undesired signal and pick up the desired signal from the received signal to implement this system. Our research group has proposed some methods for signal canceling over the last several years. This time, we focus on a distance measuring method for a signal canceller using multi-component code (MCC) and validate its precision for distance measuring. We evaluated the usability of MCC in the case in which actually modulated signal is added to MCC with higher power than MCC. According to the results of simulation and theoretical validation, the longer the time required for distance measurement, the smaller the error probability of the calculation for measurement. And it is observed that the MCC method works well in the actual environment of satellite networks that suffer from severe interference and level variation.","PeriodicalId":105735,"journal":{"name":"2008 Fourth Advanced International Conference on Telecommunications","volume":"06 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129070511","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}