{"title":"Statistical modelling of correlated and independent errors in packet data transmission systems","authors":"J. Sarker, Mahbub Hassan, A.Z.M.E. Hossain","doi":"10.1109/ICPWC.1997.655570","DOIUrl":"https://doi.org/10.1109/ICPWC.1997.655570","url":null,"abstract":"Two types of errors are common in packet data transmission systems, namely the random single bit error and the burst error. We define the burst error as a consequence of the error in bits in a packet. The burst error can be independent or correlated with the single bit error within a packet, depending on the source of errors. Although the conventional models assume either independent or correlated errors, in many practical transmission systems, both types of errors are present. We propose and develop statistical models to compute the average bit error rate by simultaneously considering both the independent and the correlated errors. The results obtained from our models suggest that the conventional models may underestimate the actual bit error rate in certain systems. The proposed models are fairly general and may be applied to any transmission systems, including cellular systems, where the errors are affected by both the independent and correlated phenomena.","PeriodicalId":166667,"journal":{"name":"1997 IEEE International Conference on Personal Wireless Communications (Cat. No.97TH8338)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1997-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125164808","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Effects of controlling target SIR on capacity enhancement in a CDMA system","authors":"S. Won, Whan-woo Kim, Y. Oh, I. Jeong","doi":"10.1109/ICPWC.1997.655513","DOIUrl":"https://doi.org/10.1109/ICPWC.1997.655513","url":null,"abstract":"This paper presents the effects of an algorithm for controlling the base station's received target signal-to-interference ratio (SIR) according to the quality of the received frames on the capacity enhancement. It is proved that the algorithm presented has a smaller mean of the actual SIR received at the antenna than the existing method which applies the fixed target SIR needed for the worst case to all the users at every time instant. It is also shown that the capacity of the system can be further increased by optimizing the system parameters in the algorithm.","PeriodicalId":166667,"journal":{"name":"1997 IEEE International Conference on Personal Wireless Communications (Cat. No.97TH8338)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1997-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121896179","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Preserving privacy in mobile communications: a hybrid method","authors":"V. Varadharajan, Y. Mu","doi":"10.1109/ICPWC.1997.655576","DOIUrl":"https://doi.org/10.1109/ICPWC.1997.655576","url":null,"abstract":"We propose three security protocols for mobile communications, which enable mutual authentication and establish a shared secret key between mobile users. They also provide a certain degree of anonymity of the communicating users to other system users. Our protocols are based on a hybrid scheme involving a combination of public key and symmetric key based systems.","PeriodicalId":166667,"journal":{"name":"1997 IEEE International Conference on Personal Wireless Communications (Cat. No.97TH8338)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1997-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128393358","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Java-based wireless network management system","authors":"Ming-Yi Lee, Jiann-Liang Chen, Shinfeng D. Lin","doi":"10.1109/ICPWC.1997.655540","DOIUrl":"https://doi.org/10.1109/ICPWC.1997.655540","url":null,"abstract":"To support the high quality services with wireless networks, the wireless network management module is indispensable. Based on the Java facility, CORBA engine, and SNMP management protocol, a universal browser-based wireless network management system (WNMS) is designed and reported. We use the CORBA engine for communication between the manager and agent (managed system). The SNMP protocol and Java facility are utilized for the design of the management applications to take the advantage of the platform independence. In the WNMS, two new features, agent discovery and binding operation, are also implemented. From the prototype system, it is observed that with the new features and traditional management functions the WNMS can achieve a high quality in wireless-wireline network management.","PeriodicalId":166667,"journal":{"name":"1997 IEEE International Conference on Personal Wireless Communications (Cat. No.97TH8338)","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1997-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131473781","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Effect of noise in optically-fed phased array antennas for CDMA wireless networks","authors":"","doi":"10.1109/ICPWC.1997.655517","DOIUrl":"https://doi.org/10.1109/ICPWC.1997.655517","url":null,"abstract":"The characteristics of an optically-fed phased array antenna are affected by the amplitude and phase noise introduced by optical amplifiers (EDFA) used in the system. A theoretical derivation and a numerical computation of the effect of phase noise on antenna performance are given. The phase fluctuations make the main beam jitter around a mean value directly related to the mean and the variance of the amplified spontaneous emission induced random phase change.","PeriodicalId":166667,"journal":{"name":"1997 IEEE International Conference on Personal Wireless Communications (Cat. No.97TH8338)","volume":"163 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1997-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116195753","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Soft dropping power control-a power control backoff strategy","authors":"S. Gupta, R. Yates, C. Rose","doi":"10.1109/ICPWC.1997.655510","DOIUrl":"https://doi.org/10.1109/ICPWC.1997.655510","url":null,"abstract":"For wireless communications systems, this work considers a power control algorithm in which a user's link quality objective, as measured by the signal to interference ratio (SIR), varies with its transmitter power. In particular, as increased interference or reduced uplink gain leads a mobile to raise its transmitter power, that mobile lowers its SIR target. In this way, the likelihood of an infeasible power control problem in which the users' transmitter powers rise to a maximum, is reduced. This graceful degradation of the SIR is termed soft dropping. Convergence proofs for a soft dropping power control algorithm are presented. Simulation results for a generic CDMA system demonstrate performance improvements over fixed target SIR algorithms.","PeriodicalId":166667,"journal":{"name":"1997 IEEE International Conference on Personal Wireless Communications (Cat. No.97TH8338)","volume":"171 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1997-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128206567","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Equalization for multipulse modulation","authors":"M. Varanasi","doi":"10.1109/ICPWC.1997.655476","DOIUrl":"https://doi.org/10.1109/ICPWC.1997.655476","url":null,"abstract":"Equalization for inter-symbol interference (ISI) channels for single-pulse modulation schemes such as pulse- and quadrature amplitude modulation (PAM, QAM) is a mature branch of communication theory. However, multipulse modulation, a simple example of which is FSK, is seen as a nonlinear modulation technique, so that equalization of ISI channels for such modulation is described as being difficult (Lee and Messerschmitt, 1994). It is demonstrated here that that is not the case. In particular, we obtain linear and decision feedback zero-forcing equalizers for multipulse modulation. These equalizers are multi-input, multi-output (MIMO) filters and they are the natural counterparts of the single-input, single-output (SISO) linear and decision feedback zero-forcing equalizers for single-pulse modulation.","PeriodicalId":166667,"journal":{"name":"1997 IEEE International Conference on Personal Wireless Communications (Cat. No.97TH8338)","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1997-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115050517","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Location, identity and wireless fraud detection","authors":"S. Patel","doi":"10.1109/ICPWC.1997.655573","DOIUrl":"https://doi.org/10.1109/ICPWC.1997.655573","url":null,"abstract":"The detection of fraud in wireless systems is made easier when the network is continuously aware of the location of mobile handsets. For existing cellular systems, location awareness requires handsets to be powered on. We explore ways to exploit the autonomous registration capabilities of handsets in order to detect the presence of illegitimate clones. Throughout the paper, location awareness is used as a new paradigm for organizing new and existing fraud detection techniques.","PeriodicalId":166667,"journal":{"name":"1997 IEEE International Conference on Personal Wireless Communications (Cat. No.97TH8338)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1997-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125175249","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Gollamudi, S. Nagaraj, S. Kapoor, Yih-Fang Huang
{"title":"Low complexity adaptive receiver for CDMA with multipath fading","authors":"S. Gollamudi, S. Nagaraj, S. Kapoor, Yih-Fang Huang","doi":"10.1109/ICPWC.1997.655477","DOIUrl":"https://doi.org/10.1109/ICPWC.1997.655477","url":null,"abstract":"A new receiver scheme for a DS-CDMA system similar to the IS-95 uplink is proposed in this paper that is of lower complexity and superior bit error rate performance in comparison to the conventional non-coherent RAKE receiver. The proposed receiver consists of a coherent RAKE receiver in the form of a transversal filter, and uses channel estimates obtained by an adaptive channel identification algorithm. Adaptation follows the set-membership filtering methodology, that features fast convergence and lower computational complexity compared to least-squares techniques.","PeriodicalId":166667,"journal":{"name":"1997 IEEE International Conference on Personal Wireless Communications (Cat. No.97TH8338)","volume":"152 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1997-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130007271","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"MAdSim-a simulation environment for ad-hoc mobile networks","authors":"G. Racherla, A. Das, A. Payyoorayil","doi":"10.1109/ICPWC.1997.655541","DOIUrl":"https://doi.org/10.1109/ICPWC.1997.655541","url":null,"abstract":"We present MAdSim-a environment tailored for mobile ad-hoc network simulation. Users and designers can use it for design, analysis and performance evaluation of their mobile ad-hoc network configuration. The input to MAdSim includes the system parameters, the network architecture, communication protocols (standard and user-defined). MAdSim presents, using graphics and text, performance metrics such as total routing and rerouting time, disruption time, buffering requirements, etc. These aid the user in evaluating the system's performance. MAdSim is being developed for PC based systems using MS Visual C++ 5.0 and MFC under Windows 95/NT.","PeriodicalId":166667,"journal":{"name":"1997 IEEE International Conference on Personal Wireless Communications (Cat. No.97TH8338)","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1997-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117144960","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}