2010 IEEE International Conference on Wireless Communications, Networking and Information Security最新文献

筛选
英文 中文
Study of frequency domain equalization for chirp spread spectrum systems 啁啾扩频系统的频域均衡研究
Kewu Huang, R. Tao, Yue Wang
{"title":"Study of frequency domain equalization for chirp spread spectrum systems","authors":"Kewu Huang, R. Tao, Yue Wang","doi":"10.1109/WCINS.2010.5541905","DOIUrl":"https://doi.org/10.1109/WCINS.2010.5541905","url":null,"abstract":"Recent research has shown that chirp spread spectrum (CSS) is an attractive technology in broadband wireless communications and the single carrier frequency domain equalization (SC-FDE) is widely used in practical applications for its low complexity and high efficiency. In this paper, a novel CSS-FDE approach is proposed to resist the multipath fading degradation, which consists of the cyclic prefix insertion (CPI) designed for the channel estimation, the equalization criterion based on the computational load and the chirp demodulation. Theoretical analysis and simulation results show that this approach can significantly enhance the performance of the traditional CSS in the multipath fading channels. With its low computational cost and high equalization precision, the CSS-FDE can be conveniently applied in practice.","PeriodicalId":156036,"journal":{"name":"2010 IEEE International Conference on Wireless Communications, Networking and Information Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128887634","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A boundary-scan test bus controller design for mixed-signal test 一种混合信号测试的边界扫描测试总线控制器设计
Shengjian Chen, Lei Xu
{"title":"A boundary-scan test bus controller design for mixed-signal test","authors":"Shengjian Chen, Lei Xu","doi":"10.1109/WCINS.2010.5541878","DOIUrl":"https://doi.org/10.1109/WCINS.2010.5541878","url":null,"abstract":"IEEE Std 1149.4 has been widely adopted in the mixed signal circuits' test and fault diagnosis. Successful application of this important standard will depend on the availability of test structures, strategies and boundary scan test bus controller. A novel boundary scan test bus controller design for mixed-signal test is presented in this paper. The uniquely designed test hardware provides the accesses not only needed for measurements of the Circuit Under Test's (CUT) analog and digital portion, but also used to interaction with the outside. A new integrated software structure has been developed to automatically generate functional tests for target boards. The proposed design is verified by experiments and can reduce test cost and time to market significantly in comparison with the existing techniques for mixed signal board testing.","PeriodicalId":156036,"journal":{"name":"2010 IEEE International Conference on Wireless Communications, Networking and Information Security","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127802541","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Railway passenger dynamic E-business based on Web services and RFID 基于Web服务和RFID的铁路客运动态电子商务
Jingdong Sun, Yibin Zhang
{"title":"Railway passenger dynamic E-business based on Web services and RFID","authors":"Jingdong Sun, Yibin Zhang","doi":"10.1109/WCINS.2010.5541845","DOIUrl":"https://doi.org/10.1109/WCINS.2010.5541845","url":null,"abstract":"E-business is a great challenge and opportunity to the railway passenger transportation. Through detailed analysis of the current situation of railway passenger transportation system, the logic structure and function framework of dynamic E-business system based on Web services and RFID technology in railway passenger transport are designed, which is excellent interoperability, reliability and maintainability, and will be the trend of railway passenger E-business development. Considering the current situation of railway ticket system and the operation features of the future passenger-dedicated line, the general framework of RFID-based China railway ticket system is put forward, and the key technologies of the system include: safety control system which consists of information coding, key management, access authentication, data integrity audit; the design of ticket reader compatible with multi-tickets; and the application whose characteristics reflected in the flexible check-rule control strategies, efficient gate access and fast payment self-service ticketing. An E-payment system based on the SSL protocol in railway E-business is proposed, according to the reality and need of the railway passenger E-business. The security of the E-payment system was improved to some degree by adding the technology of Double Signature to the SSL protocol, and the railway passenger dynamic E-business system becomes more effective and the cost is cut down.","PeriodicalId":156036,"journal":{"name":"2010 IEEE International Conference on Wireless Communications, Networking and Information Security","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127818666","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Research on modulation classification using empirical mode decomposition method 基于经验模态分解方法的调制分类研究
Ning An, Bingbing Li, M. Huang
{"title":"Research on modulation classification using empirical mode decomposition method","authors":"Ning An, Bingbing Li, M. Huang","doi":"10.1109/WCINS.2010.5541922","DOIUrl":"https://doi.org/10.1109/WCINS.2010.5541922","url":null,"abstract":"Automatic modulation classification (AMC) is a scheme to identify the data samples automatically. Empirical mode decomposition (EMD) is a self-adaptive signal processing method that can be applied to non-linear and non-stationary process perfectly. This paper presents a new method for AMC, using empirical mode decomposition (EMD) method. By utilizing the proposed feature extraction method, the disadvantages of conventional AMC algorithms, such as the feature value is sensitive to outliers in the data, the sample sequence is long and so on could be overcome. The advantage of our new algorithm is we don't need the channel information as a priori. Simulation results show that the performance of the proposed algorithm is comparable with other existing AMC algorithm.","PeriodicalId":156036,"journal":{"name":"2010 IEEE International Conference on Wireless Communications, Networking and Information Security","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133837883","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
VANETs-based real-time traffic data dissemination 基于vanets的实时交通数据发布
Wenping Chen
{"title":"VANETs-based real-time traffic data dissemination","authors":"Wenping Chen","doi":"10.1109/WCINS.2010.5544131","DOIUrl":"https://doi.org/10.1109/WCINS.2010.5544131","url":null,"abstract":"Traffic congestion is a very serious problem in large cities. With the number of vehicles increasing rapidly, especially in cities whose economy is booming, the situation is getting even worse. In this paper, by leveraging the techniques of Vehicular Ad hoc Networks (VANETs) we present a real-time abnormal traffic data dissemination protocol. Specifically, all vehicles running on the same road segment are regarded as a cluster to generate traffic message about this segment. To reduce communication cost, only abnormal traffic data is issued and spread to nearby road segments. By employing event-driven and period combined mechanism, the abnormal traffic messages are disseminated to the vehicles that probably need the messages in time. We propose a distance dependent forwarder selection method to disseminate traffic message. When transmitted inside a cluster, messages are forwarded along the segment from one end to the other based on the least hops principle; while transmitted among clusters, messages are transmitted in epidemic routing mode, which ensure the fast and reliable dissemination. To evaluate the performance of our protocol, we use the real traffic data of Beijing at peak hour. The simulation results demonstrate that our protocol is feasible and efficient for metropolitan-size city.","PeriodicalId":156036,"journal":{"name":"2010 IEEE International Conference on Wireless Communications, Networking and Information Security","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124319660","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Notice of Violation of IEEE Publication PrinciplesSimulation and evaluation of routing protocols in wireless mobile Ad Hoc network 违反IEEE发布原则的通知无线移动Ad Hoc网络中路由协议的仿真与评估
M. Shakeri, Ebrahim Hosseini
{"title":"Notice of Violation of IEEE Publication PrinciplesSimulation and evaluation of routing protocols in wireless mobile Ad Hoc network","authors":"M. Shakeri, Ebrahim Hosseini","doi":"10.1109/WCINS.2010.5545215","DOIUrl":"https://doi.org/10.1109/WCINS.2010.5545215","url":null,"abstract":"Recently, Ad Hoc networks are getting more popularity since their ease of deployment. These networks do not have any pre-existing infrastructures and users of such a network are relieved from a centralized administration. Since an Ad Hoc network consists of wireless host which may be mobile, its topology changes dynamically. Such an environment requires special routing protocols which are different with those used in fixed networks. A variety of routing protocols capable of adapting Ad Hoc networks topologies have been proposed. This thesis presents studying of five famous wireless Ad Hoc routing protocols which are WRP, DSR, FSR, LAR and DREAM. Simulation results have been used to compare efficiency and effectiveness of above-mentioned routing protocols. The Simulation results show that on-demand protocols are better suited for mobile Ad Hoc networks. They generate less control overhead messages and manage the mobility of nodes more efficiently. However they produce extra delay in acquiring routes which reduces their efficiency in delivering real-time traffic. Also it can be seen that all of the protocols operates much better with the group mobility model than with the random waypoint model.","PeriodicalId":156036,"journal":{"name":"2010 IEEE International Conference on Wireless Communications, Networking and Information Security","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114993826","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
The constitution of the transmission network for the next generation cable digital TV signals 下一代有线数字电视信号传输网络的构成
Youwei Sun, Rong Chen, Guangning Xu
{"title":"The constitution of the transmission network for the next generation cable digital TV signals","authors":"Youwei Sun, Rong Chen, Guangning Xu","doi":"10.1109/WCINS.2010.5541926","DOIUrl":"https://doi.org/10.1109/WCINS.2010.5541926","url":null,"abstract":"The next generation of digital TV network constructed according to the notion that “transmission is separated from programs while services providing is separated from users' residence” is able to embody the favorable competitive advantages of the network operator, offer the utmost convenience for users, and further bring the government's regular administration into play. It is one of the effective projects for advancing the plan of “three in one network”.","PeriodicalId":156036,"journal":{"name":"2010 IEEE International Conference on Wireless Communications, Networking and Information Security","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115047595","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Compressive sensing based measurement of time-frequency shifts system 基于压缩感知的时频移测量系统
Xie Xiao-Chun
{"title":"Compressive sensing based measurement of time-frequency shifts system","authors":"Xie Xiao-Chun","doi":"10.1109/WCINS.2010.5541896","DOIUrl":"https://doi.org/10.1109/WCINS.2010.5541896","url":null,"abstract":"Compressive sensing theory can exploit the information of sparsity/compressibility signal efficiently. It is useful when measurements are expensive. This paper introduces a simple and effective measurement process based on compressive sensing of time-frequency shifts system. Numerical simulations verify that better performance can be achieved in practice.","PeriodicalId":156036,"journal":{"name":"2010 IEEE International Conference on Wireless Communications, Networking and Information Security","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117019639","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A novel vertical handoff decision algorithm in heterogeneous wireless networks 一种新的异构无线网络垂直切换决策算法
Qing He
{"title":"A novel vertical handoff decision algorithm in heterogeneous wireless networks","authors":"Qing He","doi":"10.1109/WCINS.2010.5544150","DOIUrl":"https://doi.org/10.1109/WCINS.2010.5544150","url":null,"abstract":"Next generation wireless communications will integrate multiple wireless access networks, including WLAN and WWAN. Vertical handoff decision plays an important role in heterogeneous networks. In this paper, we propose a vertical handoff decision algorithm (VHDA) to provide ubiquitous access at any time. We consider received signal strength (RSS), available network bandwidth (B), monetary cost (C) and user preference (PF) as the vertical handoff decision criteria. Handoffs are divided into two classes: handoffs initiated by mobile nodes (MNs) and handoffs initiated by attachment points (e.g., base stations or access points). Our proposed algorithm consists of two parts: fuzzy logic based VHDA and cost function based VHDA. For the handoffs initiated by MNs, fuzzy logic based VHDA is used to evaluate the performance of the network and make handoff decisions to choose the most appropriate network. For the handoffs initiated by attachment points, cost function based VHDA is utilized to select the MNs with lower cost values. Then the selected MNs are handed over to relieve heavy load of the current network. A performance evaluation using the integration of WLAN and TD-SCDMA as an example shows that fuzzy logic based VHDA is able to make accurate handoff decisions, reduce unnecessary handoffs and eliminate the ping-pong effect. Cost function based VHDA can make selections quickly, balance the network resources and decrease the probability of call blocking and dropping.","PeriodicalId":156036,"journal":{"name":"2010 IEEE International Conference on Wireless Communications, Networking and Information Security","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123602583","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 25
Trust management for mobile agent system based on trusted computing platforms 基于可信计算平台的移动代理系统信任管理
Zhidong Shen, Xiaoping Wu, Jing Zhan
{"title":"Trust management for mobile agent system based on trusted computing platforms","authors":"Zhidong Shen, Xiaoping Wu, Jing Zhan","doi":"10.1109/WCINS.2010.5541873","DOIUrl":"https://doi.org/10.1109/WCINS.2010.5541873","url":null,"abstract":"Mobile agent, as a promising distributed computing technology, can be used in many fields. The security problem of mobile agent is important for applications based on mobile agent technology. In this paper, we proposed a trust management model for mobile agent system to improve the security of the mobile agent system. In this model, the security of mobile agent is improved by using the trusted computing platform integrated with trusted hardware. The trust-supporting environment can proved the trust management for entities in mobile agent system through the trusted software stacks which can communicate with the lower trusted hardware. In this model system, some important services for trust management, such as mobile agent authentication, mobile agent credential application, mobile agent proxy service, mobile agent trusted connection, and integrity measurement among mobile agents and computing platforms, are provided by using trusted computing technology.","PeriodicalId":156036,"journal":{"name":"2010 IEEE International Conference on Wireless Communications, Networking and Information Security","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122142896","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信