Yang Wenzhong, Huang Chuanhe, Wang Bo, Zhang Zhenyu, Wang Tong
{"title":"A reliable multicast for MANETs based on opportunistic routing and network coding","authors":"Yang Wenzhong, Huang Chuanhe, Wang Bo, Zhang Zhenyu, Wang Tong","doi":"10.1109/WCINS.2010.5544144","DOIUrl":"https://doi.org/10.1109/WCINS.2010.5544144","url":null,"abstract":"Opportunistic routing is a recent routing paradigm that achieves high throughput in the face of universally lossy wireless links in mobile ad hoc networks, likewise, network coding popularly investigated by many institutes is another approach of improving the throughput in wireless networks. How to combine the both techniques is an interesting research. To our knowledge, this is still an open issue to implement the multicast routing in mobile ad hoc networks simultaneously employing the both mechanisms. Due to feedback explosion, most existing wireless network multicast protocols don't guarantee the reliable delivery. In this paper, we propose a novel reliable multicast protocol based on the opportunistic routing and network coding. Additionally, we also provide an ETX (expected number of transmissions) based cost metric formula of the multicast subgroup. Extensive simulation reveals that the performance of the novel presented multicast routing protocol outperforms the conventional multicast routing protocol in ad hoc wireless networks.","PeriodicalId":156036,"journal":{"name":"2010 IEEE International Conference on Wireless Communications, Networking and Information Security","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122716588","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Detection of the CDMA-based transform domain communication system","authors":"Caihua Yin, Yu Zheng, Dawei Ma, G. Yu, Jian Wang","doi":"10.1109/WCINS.2010.5541736","DOIUrl":"https://doi.org/10.1109/WCINS.2010.5541736","url":null,"abstract":"In this paper, basing on the code division multiple access (CDMA) technology, we proposed a new modified implementation of transform domain communication system (TDCS), which is great potential to be applied in the cognitive radio (CR) contexts. Compared with the traditional TDCS, the complex RAKE receiver is avoided in our proposal. The performance of this CDMA-based TDCS is investigated and discussed through theoretical analyses and simulation in Additive White Gaussian Noise (AWGN) and multi-path fading channels. Computer simulation results show that the CDMA-based TDCS is much more superior than the traditional TDCS and can be a promising transmission scheme in CR contexts.","PeriodicalId":156036,"journal":{"name":"2010 IEEE International Conference on Wireless Communications, Networking and Information Security","volume":"93 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124573684","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mei Yu, Jianrong Wang, Qingjie Wang, Xuan Liu, Zheng Zhao, Yan Zhang
{"title":"Semantic-based query routing in P2P social networks","authors":"Mei Yu, Jianrong Wang, Qingjie Wang, Xuan Liu, Zheng Zhao, Yan Zhang","doi":"10.1109/WCINS.2010.5544676","DOIUrl":"https://doi.org/10.1109/WCINS.2010.5544676","url":null,"abstract":"In P2P social networks, query efficiency is always a significant challenge. In this paper we build a semantic-based query routing strategy to improve the searching efficiency. Based on Vector Space Model (VSM), similar semantic ordinary peers set up an unstructured semantic community. Super peers in each community constitute a structured P2P network and store the keywords information in a global inverted file. We exploit Bloom Filters to complete multi-keyword query. Simulation results show that the proposed scheme is able to increase query efficiency and also reduce query cost.","PeriodicalId":156036,"journal":{"name":"2010 IEEE International Conference on Wireless Communications, Networking and Information Security","volume":"338 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115968438","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jian Yu, Jianrong Wang, Xiao Liu, Mei Yu, Zheng Zhao, Yan Zhang
{"title":"Community-based trust mechanism in P2P social networks","authors":"Jian Yu, Jianrong Wang, Xiao Liu, Mei Yu, Zheng Zhao, Yan Zhang","doi":"10.1109/WCINS.2010.5544673","DOIUrl":"https://doi.org/10.1109/WCINS.2010.5544673","url":null,"abstract":"Malicious behaviors is always the problem to solve in P2P social networks. Building the trust model is effective method. In this paper a community-based trust mechanism is presented in the semantic-based P2P Social Networks. The ordinary peers form a community based on similar semantic and intra-community reputation of peers is calculated. The super peers constitute the structured P2P network and intercommunity reputation is evaluated. This mechanism combines the local trust and the global trust. The experiments show that this trust mechanism can be effective in reducing effects caused by a variety of malicious behavior.","PeriodicalId":156036,"journal":{"name":"2010 IEEE International Conference on Wireless Communications, Networking and Information Security","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116358809","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance evaluation of self-similar traffic in multimedia wireless communication networks with power saving class type III in IEEE 802.16e","authors":"Shunfu Jin, Wuyi Yue","doi":"10.1109/WCINS.2010.5544125","DOIUrl":"https://doi.org/10.1109/WCINS.2010.5544125","url":null,"abstract":"In this paper, we present a theoretical analysis to numerically evaluate the system performance of multimedia wireless communication networks with power saving class type III in IEEE 802.16e for self-similar traffic. Our model is based on system operations using a batch arrival, and we suppose the batch size to be a random variable following a Pareto(c, α) distribution in order to capture the self-similar property. By using a discrete-time embedded Markov chain, we derive the probability generating functions of the number of data frames and batches for when the busy period begins and for when the system is in a busy cycle. Using the first and higher moments of the probability generating functions, we give the averages and the standard deviation for the system performance in the diffusion approximation for the operation process of the system. In numerical results, we show the performance measures such as the energy saving ratio, plus the average and the standard deviation for the handover ratio with different system parameters as examples.","PeriodicalId":156036,"journal":{"name":"2010 IEEE International Conference on Wireless Communications, Networking and Information Security","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114156876","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on voice codec algorithms of SIP phone based on embedded system","authors":"Jinhe Zhou, Tonghai Wu, Junmin Leng","doi":"10.1109/WCINS.2010.5541916","DOIUrl":"https://doi.org/10.1109/WCINS.2010.5541916","url":null,"abstract":"Session Initiation Protocol (SIP) as a new multimedia communicating and instant messaging protocol drew more and more attentions recently. The software and hardware architecture of SIP phone which based on ARM920T core is demonstrated in this paper. The comparison of three voice codec algorithms including PCM, SPEEX and iLBC are implemented by porting these algorithms to embedded SIP phone platform. After several experiments, the result indicates that voice quality (e.g. MOS and R value) almost varies depending on the bandwidth, which also fit for theoretical analysis perfectly. Brings forward an effective conclusion that iLBC speech codec have excellent performance in low bit rates and it is superior to PCM and SPEEX encoding in abominable packet loss conditions. The experimental results also demonstrate that the SIP phone is suitable for voice communication and it can meet practical engineering requirements well.","PeriodicalId":156036,"journal":{"name":"2010 IEEE International Conference on Wireless Communications, Networking and Information Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114288521","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Average filtered blind separation of DS-CDMA signals with ICA method","authors":"Miao Yu, Jianzhong Chen, Shiju Li","doi":"10.1109/WCINS.2010.5541927","DOIUrl":"https://doi.org/10.1109/WCINS.2010.5541927","url":null,"abstract":"In DS-CDMA system, the pseudo random sequences are none correlation and the information sequences of different user's are independent, thus Independent Component Analysis (ICA) is appropriate for the blind separate the DS-CDMA signals with little prior knowledge. Original blind separation method of DS-CDMA signals with ICA utilized only one sample value in each chip. However, in common DS-CDMA communication systems, the sample rate is much faster than the chip rate, so there are many samples during a chip interval. A method of average filtered blind separation of DS-CDMA signals with ICA is proposed in this paper. When noise is stationary, the method proposed could increase the input SNR of ICA greatly. The validity of the method is proved by the simulation results at last.","PeriodicalId":156036,"journal":{"name":"2010 IEEE International Conference on Wireless Communications, Networking and Information Security","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114467610","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Adaptive detection for spread spectrum audio watermarking","authors":"Lili Li, Xiangzhong Fang","doi":"10.1109/WCINS.2010.5541888","DOIUrl":"https://doi.org/10.1109/WCINS.2010.5541888","url":null,"abstract":"This paper presents an adaptive detection algorithm for spread-spectrum-based audio watermarking. Aiming at the watermark adaptively embedded in the audio signal, our improvements to the correlation-based detection algorithms include the adaptive normalization coefficients for correlation calculating and the adaptive threshold for decision comparing. Experimental results show that the proposed detector has high robustness to normal attacks, such as cropping, low pass filtering, noise addition, re-quantization, re-sampling, MPEG compression, and so on.","PeriodicalId":156036,"journal":{"name":"2010 IEEE International Conference on Wireless Communications, Networking and Information Security","volume":"269 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116162757","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A simple channel estimation method in MIMO-OFDM systems with virtual subcarriers","authors":"Wanlu Sun, Wei Yang, Lihua Li","doi":"10.1109/WCINS.2010.5541881","DOIUrl":"https://doi.org/10.1109/WCINS.2010.5541881","url":null,"abstract":"In multiple input multiple output (MIMO) orthogonal frequency division multiplexing (OFDM) systems, some subcarriers are often retained as virtual subcarriers for easier filter implementation. In this case, the performance of Discrete Fourier Transform (DFT)-based channel estimation will be degraded significantly due to dispersive distortion of actual channel impulse response (CIR). To deal with this problem, we analyze the effect of virtual subcarriers on channel estimation in theory and propose an effective channel estimation scheme in the present paper. The proposed method, which is based on Schur recursive algorithm, can expand channel frequency response (CFR) into all subcarriers with quite concise operations. Finally, simulation results show that the proposed scheme outperforms LS estimator and DFT-based channel estimator, in terms of both MSE and FER.","PeriodicalId":156036,"journal":{"name":"2010 IEEE International Conference on Wireless Communications, Networking and Information Security","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114923729","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yanbin Huang, Shoubao Yang, Da Teng, Weiqing He, Lihua Xie
{"title":"A Fair Rate-Balance link Scheduling in WiMAX Mesh network","authors":"Yanbin Huang, Shoubao Yang, Da Teng, Weiqing He, Lihua Xie","doi":"10.1109/WCINS.2010.5544135","DOIUrl":"https://doi.org/10.1109/WCINS.2010.5544135","url":null,"abstract":"In order to ensure the fairness of links and network stability, this paper analyzes the link scheduling model in WiMAX Mesh network and proposes a Fair Rate-Balance link Scheduling scheme (FRBS). FRBS calculates the scheduling parameter <Dx, p> under stability constraint making the arrival data rate of the link equal to outgoing rate. At the grant step, FRBS assigns bandwidth using a max-min fair Round Robin algorithm for link fairness. Simulation results show that FRBS has much better performance than the greedy scheduling in both light load and heavy load network.","PeriodicalId":156036,"journal":{"name":"2010 IEEE International Conference on Wireless Communications, Networking and Information Security","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127140914","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}