2010 IEEE International Conference on Wireless Communications, Networking and Information Security最新文献

筛选
英文 中文
A reliable multicast for MANETs based on opportunistic routing and network coding 基于机会路由和网络编码的manet可靠组播
Yang Wenzhong, Huang Chuanhe, Wang Bo, Zhang Zhenyu, Wang Tong
{"title":"A reliable multicast for MANETs based on opportunistic routing and network coding","authors":"Yang Wenzhong, Huang Chuanhe, Wang Bo, Zhang Zhenyu, Wang Tong","doi":"10.1109/WCINS.2010.5544144","DOIUrl":"https://doi.org/10.1109/WCINS.2010.5544144","url":null,"abstract":"Opportunistic routing is a recent routing paradigm that achieves high throughput in the face of universally lossy wireless links in mobile ad hoc networks, likewise, network coding popularly investigated by many institutes is another approach of improving the throughput in wireless networks. How to combine the both techniques is an interesting research. To our knowledge, this is still an open issue to implement the multicast routing in mobile ad hoc networks simultaneously employing the both mechanisms. Due to feedback explosion, most existing wireless network multicast protocols don't guarantee the reliable delivery. In this paper, we propose a novel reliable multicast protocol based on the opportunistic routing and network coding. Additionally, we also provide an ETX (expected number of transmissions) based cost metric formula of the multicast subgroup. Extensive simulation reveals that the performance of the novel presented multicast routing protocol outperforms the conventional multicast routing protocol in ad hoc wireless networks.","PeriodicalId":156036,"journal":{"name":"2010 IEEE International Conference on Wireless Communications, Networking and Information Security","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122716588","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Detection of the CDMA-based transform domain communication system 基于cdma变换域通信系统的检测
Caihua Yin, Yu Zheng, Dawei Ma, G. Yu, Jian Wang
{"title":"Detection of the CDMA-based transform domain communication system","authors":"Caihua Yin, Yu Zheng, Dawei Ma, G. Yu, Jian Wang","doi":"10.1109/WCINS.2010.5541736","DOIUrl":"https://doi.org/10.1109/WCINS.2010.5541736","url":null,"abstract":"In this paper, basing on the code division multiple access (CDMA) technology, we proposed a new modified implementation of transform domain communication system (TDCS), which is great potential to be applied in the cognitive radio (CR) contexts. Compared with the traditional TDCS, the complex RAKE receiver is avoided in our proposal. The performance of this CDMA-based TDCS is investigated and discussed through theoretical analyses and simulation in Additive White Gaussian Noise (AWGN) and multi-path fading channels. Computer simulation results show that the CDMA-based TDCS is much more superior than the traditional TDCS and can be a promising transmission scheme in CR contexts.","PeriodicalId":156036,"journal":{"name":"2010 IEEE International Conference on Wireless Communications, Networking and Information Security","volume":"93 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124573684","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Semantic-based query routing in P2P social networks P2P社交网络中基于语义的查询路由
Mei Yu, Jianrong Wang, Qingjie Wang, Xuan Liu, Zheng Zhao, Yan Zhang
{"title":"Semantic-based query routing in P2P social networks","authors":"Mei Yu, Jianrong Wang, Qingjie Wang, Xuan Liu, Zheng Zhao, Yan Zhang","doi":"10.1109/WCINS.2010.5544676","DOIUrl":"https://doi.org/10.1109/WCINS.2010.5544676","url":null,"abstract":"In P2P social networks, query efficiency is always a significant challenge. In this paper we build a semantic-based query routing strategy to improve the searching efficiency. Based on Vector Space Model (VSM), similar semantic ordinary peers set up an unstructured semantic community. Super peers in each community constitute a structured P2P network and store the keywords information in a global inverted file. We exploit Bloom Filters to complete multi-keyword query. Simulation results show that the proposed scheme is able to increase query efficiency and also reduce query cost.","PeriodicalId":156036,"journal":{"name":"2010 IEEE International Conference on Wireless Communications, Networking and Information Security","volume":"338 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115968438","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Community-based trust mechanism in P2P social networks 基于社区的P2P社交网络信任机制
Jian Yu, Jianrong Wang, Xiao Liu, Mei Yu, Zheng Zhao, Yan Zhang
{"title":"Community-based trust mechanism in P2P social networks","authors":"Jian Yu, Jianrong Wang, Xiao Liu, Mei Yu, Zheng Zhao, Yan Zhang","doi":"10.1109/WCINS.2010.5544673","DOIUrl":"https://doi.org/10.1109/WCINS.2010.5544673","url":null,"abstract":"Malicious behaviors is always the problem to solve in P2P social networks. Building the trust model is effective method. In this paper a community-based trust mechanism is presented in the semantic-based P2P Social Networks. The ordinary peers form a community based on similar semantic and intra-community reputation of peers is calculated. The super peers constitute the structured P2P network and intercommunity reputation is evaluated. This mechanism combines the local trust and the global trust. The experiments show that this trust mechanism can be effective in reducing effects caused by a variety of malicious behavior.","PeriodicalId":156036,"journal":{"name":"2010 IEEE International Conference on Wireless Communications, Networking and Information Security","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116358809","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Performance evaluation of self-similar traffic in multimedia wireless communication networks with power saving class type III in IEEE 802.16e IEEE 802.16e标准下III类省电多媒体无线通信网络中自相似流量的性能评估
Shunfu Jin, Wuyi Yue
{"title":"Performance evaluation of self-similar traffic in multimedia wireless communication networks with power saving class type III in IEEE 802.16e","authors":"Shunfu Jin, Wuyi Yue","doi":"10.1109/WCINS.2010.5544125","DOIUrl":"https://doi.org/10.1109/WCINS.2010.5544125","url":null,"abstract":"In this paper, we present a theoretical analysis to numerically evaluate the system performance of multimedia wireless communication networks with power saving class type III in IEEE 802.16e for self-similar traffic. Our model is based on system operations using a batch arrival, and we suppose the batch size to be a random variable following a Pareto(c, α) distribution in order to capture the self-similar property. By using a discrete-time embedded Markov chain, we derive the probability generating functions of the number of data frames and batches for when the busy period begins and for when the system is in a busy cycle. Using the first and higher moments of the probability generating functions, we give the averages and the standard deviation for the system performance in the diffusion approximation for the operation process of the system. In numerical results, we show the performance measures such as the energy saving ratio, plus the average and the standard deviation for the handover ratio with different system parameters as examples.","PeriodicalId":156036,"journal":{"name":"2010 IEEE International Conference on Wireless Communications, Networking and Information Security","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114156876","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Research on voice codec algorithms of SIP phone based on embedded system 基于嵌入式系统的SIP电话语音编解码算法研究
Jinhe Zhou, Tonghai Wu, Junmin Leng
{"title":"Research on voice codec algorithms of SIP phone based on embedded system","authors":"Jinhe Zhou, Tonghai Wu, Junmin Leng","doi":"10.1109/WCINS.2010.5541916","DOIUrl":"https://doi.org/10.1109/WCINS.2010.5541916","url":null,"abstract":"Session Initiation Protocol (SIP) as a new multimedia communicating and instant messaging protocol drew more and more attentions recently. The software and hardware architecture of SIP phone which based on ARM920T core is demonstrated in this paper. The comparison of three voice codec algorithms including PCM, SPEEX and iLBC are implemented by porting these algorithms to embedded SIP phone platform. After several experiments, the result indicates that voice quality (e.g. MOS and R value) almost varies depending on the bandwidth, which also fit for theoretical analysis perfectly. Brings forward an effective conclusion that iLBC speech codec have excellent performance in low bit rates and it is superior to PCM and SPEEX encoding in abominable packet loss conditions. The experimental results also demonstrate that the SIP phone is suitable for voice communication and it can meet practical engineering requirements well.","PeriodicalId":156036,"journal":{"name":"2010 IEEE International Conference on Wireless Communications, Networking and Information Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114288521","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Average filtered blind separation of DS-CDMA signals with ICA method DS-CDMA信号的ICA平均滤波盲分离
Miao Yu, Jianzhong Chen, Shiju Li
{"title":"Average filtered blind separation of DS-CDMA signals with ICA method","authors":"Miao Yu, Jianzhong Chen, Shiju Li","doi":"10.1109/WCINS.2010.5541927","DOIUrl":"https://doi.org/10.1109/WCINS.2010.5541927","url":null,"abstract":"In DS-CDMA system, the pseudo random sequences are none correlation and the information sequences of different user's are independent, thus Independent Component Analysis (ICA) is appropriate for the blind separate the DS-CDMA signals with little prior knowledge. Original blind separation method of DS-CDMA signals with ICA utilized only one sample value in each chip. However, in common DS-CDMA communication systems, the sample rate is much faster than the chip rate, so there are many samples during a chip interval. A method of average filtered blind separation of DS-CDMA signals with ICA is proposed in this paper. When noise is stationary, the method proposed could increase the input SNR of ICA greatly. The validity of the method is proved by the simulation results at last.","PeriodicalId":156036,"journal":{"name":"2010 IEEE International Conference on Wireless Communications, Networking and Information Security","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114467610","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Adaptive detection for spread spectrum audio watermarking 扩频音频水印的自适应检测
Lili Li, Xiangzhong Fang
{"title":"Adaptive detection for spread spectrum audio watermarking","authors":"Lili Li, Xiangzhong Fang","doi":"10.1109/WCINS.2010.5541888","DOIUrl":"https://doi.org/10.1109/WCINS.2010.5541888","url":null,"abstract":"This paper presents an adaptive detection algorithm for spread-spectrum-based audio watermarking. Aiming at the watermark adaptively embedded in the audio signal, our improvements to the correlation-based detection algorithms include the adaptive normalization coefficients for correlation calculating and the adaptive threshold for decision comparing. Experimental results show that the proposed detector has high robustness to normal attacks, such as cropping, low pass filtering, noise addition, re-quantization, re-sampling, MPEG compression, and so on.","PeriodicalId":156036,"journal":{"name":"2010 IEEE International Conference on Wireless Communications, Networking and Information Security","volume":"269 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116162757","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
A simple channel estimation method in MIMO-OFDM systems with virtual subcarriers 带有虚拟子载波的MIMO-OFDM系统中一种简单的信道估计方法
Wanlu Sun, Wei Yang, Lihua Li
{"title":"A simple channel estimation method in MIMO-OFDM systems with virtual subcarriers","authors":"Wanlu Sun, Wei Yang, Lihua Li","doi":"10.1109/WCINS.2010.5541881","DOIUrl":"https://doi.org/10.1109/WCINS.2010.5541881","url":null,"abstract":"In multiple input multiple output (MIMO) orthogonal frequency division multiplexing (OFDM) systems, some subcarriers are often retained as virtual subcarriers for easier filter implementation. In this case, the performance of Discrete Fourier Transform (DFT)-based channel estimation will be degraded significantly due to dispersive distortion of actual channel impulse response (CIR). To deal with this problem, we analyze the effect of virtual subcarriers on channel estimation in theory and propose an effective channel estimation scheme in the present paper. The proposed method, which is based on Schur recursive algorithm, can expand channel frequency response (CFR) into all subcarriers with quite concise operations. Finally, simulation results show that the proposed scheme outperforms LS estimator and DFT-based channel estimator, in terms of both MSE and FER.","PeriodicalId":156036,"journal":{"name":"2010 IEEE International Conference on Wireless Communications, Networking and Information Security","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114923729","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Fair Rate-Balance link Scheduling in WiMAX Mesh network WiMAX Mesh网络中公平速率均衡链路调度
Yanbin Huang, Shoubao Yang, Da Teng, Weiqing He, Lihua Xie
{"title":"A Fair Rate-Balance link Scheduling in WiMAX Mesh network","authors":"Yanbin Huang, Shoubao Yang, Da Teng, Weiqing He, Lihua Xie","doi":"10.1109/WCINS.2010.5544135","DOIUrl":"https://doi.org/10.1109/WCINS.2010.5544135","url":null,"abstract":"In order to ensure the fairness of links and network stability, this paper analyzes the link scheduling model in WiMAX Mesh network and proposes a Fair Rate-Balance link Scheduling scheme (FRBS). FRBS calculates the scheduling parameter <Dx, p> under stability constraint making the arrival data rate of the link equal to outgoing rate. At the grant step, FRBS assigns bandwidth using a max-min fair Round Robin algorithm for link fairness. Simulation results show that FRBS has much better performance than the greedy scheduling in both light load and heavy load network.","PeriodicalId":156036,"journal":{"name":"2010 IEEE International Conference on Wireless Communications, Networking and Information Security","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127140914","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信