{"title":"Quantum state swapping in optical quantum communication using Mach-Zehnder interferometer","authors":"S. Salemian, S. Mohammadnejad","doi":"10.1109/ISTEL.2008.4651296","DOIUrl":"https://doi.org/10.1109/ISTEL.2008.4651296","url":null,"abstract":"Quantum state swapping is required for long-distance quantum communication. Quantum state swapping protocols are based on the quantum controlled-NOT (CNOT) or similar quantum logic operations, which are very difficult to implement experimentally. Here we present a feasible scheme for the implementation of Quantum state swapping based on planar lightwave circuit (PLC) implementation of quantum CNOT gate. This quantum gate is realized by using Mach-Zehnder interferometer. By using planar lightwave circuit in implementation, the width of waveguides and the length of CNOT gate were obtained 12 micron and 2.8 cm respectively.","PeriodicalId":133602,"journal":{"name":"2008 International Symposium on Telecommunications","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124121396","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Combination of turbo coding and cryptography in NONGEO satellite communication systems","authors":"D. Abbasi-Moghadam, V. Vakili, A. Falahati","doi":"10.1109/ISTEL.2008.4651384","DOIUrl":"https://doi.org/10.1109/ISTEL.2008.4651384","url":null,"abstract":"Turbo code has the capability of error correction near Shannonpsilas limit. This code is concatenated of 2 recursive convolutional codes with pseudo random interleaving. In this paper secure turbo code performance in Rayleigh, Rician fading and NONGEO satellite channels are simulated and analyzed. Simulation results show that this code has appropriate performance in wireless channel in presence of light shadowing, and good performance in heavy shadowing. This scheme has the advantages of high-speed encryption and decryption with high security, smaller encoder and decoder size and greater efficiency.","PeriodicalId":133602,"journal":{"name":"2008 International Symposium on Telecommunications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125880696","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Virtual topology reconfiguration of WDM optical networks using fuzzy logic control","authors":"N. Farzaneh, M. Moghaddam","doi":"10.1109/ISTEL.2008.4651354","DOIUrl":"https://doi.org/10.1109/ISTEL.2008.4651354","url":null,"abstract":"Bandwidth requirements of the Internet are increasing every day. Wavelength division multiplexing (WDM) is the next step towards leveraging the capabilities of the optical fiber, especially for wide area backbone networks. Reconfiguration is a characteristic of WDM optical networks that allows network operators to arrange the networks in response to the changing traffic demands. As a general assumption, reconfiguration studies are based on the idea that the decision of reconfiguration is sudden, i.e. triggered by an event, hence the virtual topology change is an interrupted process. It has two objectives: finding routes that satisfy the wavelength assignment constraints, and making efficient use of network resources. The complexity involved in the networks may require the consideration of multiple constraints to make the decision. In this paper we proposed a new approach using fuzzy logic control on IP over WDM network to reconfigure virtual topology that allows multiple constraints to be considered in a simple and intuitive way. Five fuzzy sets for the number of deleted lightpaths and average utilization for each wavelength are used to divide the variable space: very high(VH), high(H), medium(M), low(L), very low(VL). Simulation shows that this fuzzy reconfiguration algorithm is efficient and promising.","PeriodicalId":133602,"journal":{"name":"2008 International Symposium on Telecommunications","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128023551","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Relative encryption overhead in 802.11g network","authors":"A. Tripathi, O. Damani","doi":"10.1109/ISTEL.2008.4651339","DOIUrl":"https://doi.org/10.1109/ISTEL.2008.4651339","url":null,"abstract":"We present a performance study of security overheads in 802.11g networks. At 54 Mbps, the security overhead becomes significant in single client scenarios for many of the popular security protocols. However, we find that the most secure protocol, WPA-2, is also the protocol with the lowest security overhead.","PeriodicalId":133602,"journal":{"name":"2008 International Symposium on Telecommunications","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133694246","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Triangulating of Dynamic Bayesian networks for isolated digit recognition","authors":"A. Khanteymoori, M. Homayounpour, M. Menhaj","doi":"10.1109/ISTEL.2008.4651374","DOIUrl":"https://doi.org/10.1109/ISTEL.2008.4651374","url":null,"abstract":"This paper describes the theory and implementation of DYNAMIC Bayesian networks in the context of isolated digit recognition. The common statistical model used in isolated digit recognition is the hidden Markov model. Bayesian networks provide an expressive graphical language for factoring joint probability distributions. The principle of this approach is to build a speech model using the formalism of dynamic Bayesian networks. In this paper we will show that how triangulation methods affect inference algorithms. We present illustrative experiments and our experiments show that this new approach is very promising in the field of isolated digit recognition.","PeriodicalId":133602,"journal":{"name":"2008 International Symposium on Telecommunications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131364542","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
F. Azami, A. Ghorssi, H. Hemesi, A. Mohammadi, A. Abdipour
{"title":"Design and implementation of a flexible 4×4 MIMO testbed","authors":"F. Azami, A. Ghorssi, H. Hemesi, A. Mohammadi, A. Abdipour","doi":"10.1109/ISTEL.2008.4651312","DOIUrl":"https://doi.org/10.1109/ISTEL.2008.4651312","url":null,"abstract":"This paper presents the implementation of a flexible 4times4 MIMO testbed. The subsystems are designed and fabricated in RF section. Then, implementing the baseband section with FPGA and using the flexible MATLAB interfaces, the various performance studies are conducted. To validate the overall system performance, the measurement results are presented. The excellent agreement between the analytical and the measurement results shows the accuracy of the testbed operation.","PeriodicalId":133602,"journal":{"name":"2008 International Symposium on Telecommunications","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132288449","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A comparison of Maximum Likelihood frequency offset estimation methods for OFDM systems","authors":"H. Nezamfar, M. Kahaei","doi":"10.1109/ISTEL.2008.4651304","DOIUrl":"https://doi.org/10.1109/ISTEL.2008.4651304","url":null,"abstract":"Maximum likelihood (ML) estimation of the frequency offset between the transmitter and the receiver from known transmitted preambles is the dominant technique for the estimation of carrier frequency offset (CFO) in OFDM systems. A general formulation of ML detection problem for OFDM systems is provided in this paper and it is described how different ML techniques can be treated as special cases. In addition major newly proposed ML techniques are compared in a unified simulation framework in the presence of AWGN and their performance in terms of estimation range, and their complexity are compared.","PeriodicalId":133602,"journal":{"name":"2008 International Symposium on Telecommunications","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123723912","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Robust voice conversion systems using MFDWC","authors":"M. Farhid, M. Tinati","doi":"10.1109/ISTEL.2008.4651405","DOIUrl":"https://doi.org/10.1109/ISTEL.2008.4651405","url":null,"abstract":"Voice conversion is a method used to transform one speakerpsilas voice into another speakerpsilas voice. New modification approach for voice conversion is proposed in this paper. We take Mel-frequency Discrete Wavelet coefficients (MFDWC) as the basic feature. This feature copes well with small training sets of high dimension, which is a problem often encountered in voice conversion. The proposed voice conversion system assumes parallel training data from source and target speakers and uses the theory of wavelets in order to extract speaker feature information. The satisfactory performance of the voice conversion system can be confirmed through ABX listening test and MOS grade.","PeriodicalId":133602,"journal":{"name":"2008 International Symposium on Telecommunications","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123767212","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
F. G. Gharakhili, G. Dadashzadeh, M. Fardis, A. Abolghasemi
{"title":"A novel planar UWB antenna with WLAN band rejected capability","authors":"F. G. Gharakhili, G. Dadashzadeh, M. Fardis, A. Abolghasemi","doi":"10.1109/ISTEL.2008.4651280","DOIUrl":"https://doi.org/10.1109/ISTEL.2008.4651280","url":null,"abstract":"A novel planar ultra wide band antenna with band rejected capability is presented in this paper. The designed antenna is rectangular slot which is fed by modified triangular ring microstrip. All simulations are performed by using CST Microwave Studio. The results of analysis show that good performance in both impedance bandwidth and radiation pattern have achieved in the frequency range of 3.5 to 11.5 GHz, while a frequency rejected band has occurred from 5.2 to 6 GHz. Moreover, the designed antenna with rejected band capability has good dispersion characteristics in both time and frequency domain.","PeriodicalId":133602,"journal":{"name":"2008 International Symposium on Telecommunications","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121445979","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Designing an illumination effect canceling filter in facial images for multi-view face detection and recognition in images with complex background","authors":"R. S. Ghiass, E. Fatemizadeh, F. Marvasti","doi":"10.1109/ISTEL.2008.4651411","DOIUrl":"https://doi.org/10.1109/ISTEL.2008.4651411","url":null,"abstract":"This paper presents a novel approach for detection and recognition of multi-view faces whose location is unknown and the illumination conditions are varying. The illumination is a big problem in the face detection and recognition aspects. Our proposed method doesnpsilat use the skin color information for face detection. The detection of faces is accomplished after canceling the effect of the various illumination conditions. Two completely different methods are proposed for face detection in this paper. Because of the independency of the approaches to the facepsilas skin color, the persons with every kind of skin colors are detected even in completely dark environments. Next, the detected faces are recognized. The experiments have shown that we can combine some proposed aspects of the feature based methods with the eigenface method and get very successful results. The illumination dependency problem of the eigenface method has also been solved by a new methodology in this paper.","PeriodicalId":133602,"journal":{"name":"2008 International Symposium on Telecommunications","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121529290","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}