{"title":"A Study on Performance of MIMO-Relaying Scheme in Heterogeneous Networks","authors":"D. Byun, Chan-ho An, Dong Ku Kim","doi":"10.1109/ICCIT.2009.123","DOIUrl":"https://doi.org/10.1109/ICCIT.2009.123","url":null,"abstract":"In the future wireless networks, there can be many network entities with different sizes of cells with different level of transmit power to achieve different level of QoS, which we call “heterogeneous network”. The object of this paper is to study on performance of MIMO-relaying scheme for the relay-based scenario in heterogeneous network. We apply the diversity set decision, which is defined as the set consisted of BS and RSs selected by MS, and PF-ZFBF with greedy algorithm for selecting MS served by BS or RS to system level simulator based on IEEE 802.16m type TDD-OFDMA downlink. The performance of MIMO-relaying scheme is evaluated in terms of cell throughput and service coverage at 64 kbps user throughput requirement. The cell throughput of cases with relay shows the maximum cell throughput of 21% compared to case without relay. The cases with relay provide higher service coverage than the case without relay.","PeriodicalId":112416,"journal":{"name":"2009 Fourth International Conference on Computer Sciences and Convergence Information Technology","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114477297","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Dong-Xu Jin, S. H. Chauhdary, Xu Ji, Yi-Ying Zhang, Dong-hyun Lee, Myong-Soon Park
{"title":"Energy-Efficiency Continuous Object Tracking via Automatically Adjusting Sensing Range in Wireless Sensor Network","authors":"Dong-Xu Jin, S. H. Chauhdary, Xu Ji, Yi-Ying Zhang, Dong-hyun Lee, Myong-Soon Park","doi":"10.1109/ICCIT.2009.247","DOIUrl":"https://doi.org/10.1109/ICCIT.2009.247","url":null,"abstract":"Wireless sensor networks (WSNs) can be used in many applications. Object tracking is one of the most important applications. There are many researches about tracking individual object but few researches on tracking continuous object. Continuous object affects a large number of nodes so needs more communication and cooperation to track it comparing with individual object. In this paper we propose an energy-efficiency continuous object tracking (ECOT) protocol. In ECOT, a sensor node identify itself whether a boundary node or not via automatically adjusting its sensing range instead of communicating with neighboring nodes since radio communication which consumes much more energy than adjusting sensing range. Furthermore just a subset of boundary nodes will send data back to sink node with a small-size message by a representative node selection mechanism. Finally the sink node can estimate the object’s position and shape by locating object mechanism. The analysis and simulation results demonstrate that ECOT outperform than previous work and achieves high fidelity and significantly reduces the amount of communication messages.","PeriodicalId":112416,"journal":{"name":"2009 Fourth International Conference on Computer Sciences and Convergence Information Technology","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114893298","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Applied Data Mining Approach in Ubiquitous World of Air Transportation","authors":"Saybani Mahmoud Reza, T. Wah, A. Lahsasna","doi":"10.1109/ICCIT.2009.255","DOIUrl":"https://doi.org/10.1109/ICCIT.2009.255","url":null,"abstract":"Noise is a big problem for people living near airports, therefore the public, airport authorities and pilots are looking for ways to reduce the noise in the vicinity of populated areas. Optimal solution would be flight paths that are farthest from those areas, and worst paths are those, that just go above them. There are two classes of paths, namely optimal and non-optimal ones. This paper is going to use one of successfully used data mining techniques, namely neural network, which is capable of recognizing patterns. We used some coordinates of various flight paths as input for learning purposes of Neural Network, and defined two classes representing the optimal and non-optimal flight paths. The results have shown that this technique is well capable of recognizing the optimal and non-optimal flight paths. This technique can be used to reduce the noise.","PeriodicalId":112416,"journal":{"name":"2009 Fourth International Conference on Computer Sciences and Convergence Information Technology","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127553225","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Optimizing Speed of a True Random Number Generator in FPGA by Spectral Analysis","authors":"Knut Wold, Slobodan V. Petrovic","doi":"10.1109/ICCIT.2009.95","DOIUrl":"https://doi.org/10.1109/ICCIT.2009.95","url":null,"abstract":"Security and speed are two important properties of today's communication systems. In order to generate initialization vectors and keys for such communication fast enough, a true random number generator (TRNG) with a high bit rate is needed. In this paper an FPGA implementation of a TRNG based on several equal length oscillator rings that achieves a high bit rate is analyzed by using spectral analysis. The design is examined by defining a MatLab model of the TRNG and by investigating the frequency spectrum at different locations in order to find the speed increasing potential of the TRNG. Experiments performed on an Altera Cyclone II FPGA have shown that a TRNG, whose parameters were optimized by means of such a model, achieves a bit rate of 300 Mbit/s. Experiments with repeated restarts from a known state have shown that the output of the TRNG contains true randomness and not only pseudo randomness.","PeriodicalId":112416,"journal":{"name":"2009 Fourth International Conference on Computer Sciences and Convergence Information Technology","volume":"5 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125629932","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Multiagent System for Touristic Travel Planning","authors":"Miguel Valdés, C. Cubillos","doi":"10.1109/ICCIT.2009.267","DOIUrl":"https://doi.org/10.1109/ICCIT.2009.267","url":null,"abstract":"This paper presents the progress in the development of a multiagent system for the tourism sector, whose objective is to give support to the tourists before and during his travel. Are presented the changes between an earlier and a stable version of the system, also is described the scenario that corresponds to the creation of a new itinerary and some diagrams designed with the PASSI methodology are shown.","PeriodicalId":112416,"journal":{"name":"2009 Fourth International Conference on Computer Sciences and Convergence Information Technology","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126578104","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Imtiaj Ahmed, Shafiul Alam, M. A. U. Rahman, Naimul Islam
{"title":"Implementation of Graph Algorithms in Reconfigurable Hardware (FPGAs) to Speeding Up the Execution","authors":"Imtiaj Ahmed, Shafiul Alam, M. A. U. Rahman, Naimul Islam","doi":"10.1109/ICCIT.2009.302","DOIUrl":"https://doi.org/10.1109/ICCIT.2009.302","url":null,"abstract":"This paper focus on hardware representation and implementation of graph algorithms in Reconfigurable Hardware (FPGAs) to speeding up the execution. Generally, Software implementations of graph algorithms in high level languages such as C or C++ are lack of speed and efficiency, although they are flexible and cost effective. Moreover, since FPGA is used to implement the algorithms, it can be modify and programmed to the desired application or functionality requirements. Three candidate graph algorithms have been selected for this purpose and their dynamic graph representation, modeling and simulation in VHDL using Cadence and Xilinx design tools have been presented.","PeriodicalId":112416,"journal":{"name":"2009 Fourth International Conference on Computer Sciences and Convergence Information Technology","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122768848","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Security of Message Passing Based on Grid Environment","authors":"Heng-Sheng Chen, Tsang-Yean Lee, Huey-Ming Lee","doi":"10.1109/ICCIT.2009.298","DOIUrl":"https://doi.org/10.1109/ICCIT.2009.298","url":null,"abstract":"Grid computing architecture was defined to be a complete physical layer. The message transfer in network must be in secure. In this study, we propose the encryption algorithm in every grid node to keep information in security. Sender requests key code from receiver grid node, uses this key code to encrypt message to produce cipher text and sends out. Receiver also uses this key code to decrypt cipher text to get original message. This key code is kept in both sides. When these algorithms install in all grid nodes, we can keep message process be secure in the system.","PeriodicalId":112416,"journal":{"name":"2009 Fourth International Conference on Computer Sciences and Convergence Information Technology","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121557994","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Option Game Model of Research and Development Investment Timing under Uncertainty","authors":"Yan-mei Sun, Chang-xiong Sun","doi":"10.1109/ICCIT.2009.231","DOIUrl":"https://doi.org/10.1109/ICCIT.2009.231","url":null,"abstract":"The research and development (R&D) investment timing decision-making problem is studied based on option game theory in this paper. The existence and inequality of two businesses operating costs are assumed, and jump diffusion is used to describe sudden events. The duopoly option game model is established to obtain the R&D investment value function and the critical value to invest. The game strategy and profit matrix of both firms are constructed, to discuss the existing forms of equilibrium, so that each timing for sequential equilibrium, preemptive equilibrium and simultaneous equilibrium is achieved.","PeriodicalId":112416,"journal":{"name":"2009 Fourth International Conference on Computer Sciences and Convergence Information Technology","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121782992","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Comparative Analysis of Open Source Software Usage in Germany, Brazil, and India","authors":"D. Richter, Hangjung Zo, Michael Maruschke","doi":"10.1109/ICCIT.2009.169","DOIUrl":"https://doi.org/10.1109/ICCIT.2009.169","url":null,"abstract":"This paper reviews the recent activities of Open Source Software (OSS) adoptions by governments, education sectors, and businesses in Germany, Brazil, and India. It looks at their motivation and focuses on the selected developments of OSS. Typical applications will be discussed as well as consequences from using OSS.","PeriodicalId":112416,"journal":{"name":"2009 Fourth International Conference on Computer Sciences and Convergence Information Technology","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123236120","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analysis on Forgery Patterns for GPS Civil Spoofing Signals","authors":"Xi-jun Cheng, Ke-jin Cao, Jiang-ning Xu, Bao Li","doi":"10.1109/ICCIT.2009.88","DOIUrl":"https://doi.org/10.1109/ICCIT.2009.88","url":null,"abstract":"GPS is widely used by civil aviation, financial institutions and transport sector and other civilian sectors, as well as for military purposes, thus the research on GPS spoof is of considerable merits. This paper analyzes the roots of forgeability and dupability of civil GPS signal; then, according to the characteristics of GPS civil signal, four forgery patterns of GPS spoofing signals are presented, which are navigation message forgery pattern, C/A code modulation forgery pattern, secondary carrier modulation forgery pattern and combination pattern; furthermore, two subpatterns of GPS navigation message forgery pattern, including GPS satellite signal fail forgery subpattern and GPS satellite fixing parameters forgery subpattern, are put forward with their detailed forgery techniques.","PeriodicalId":112416,"journal":{"name":"2009 Fourth International Conference on Computer Sciences and Convergence Information Technology","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123390605","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}