1997 IEEE International Conference on Personal Wireless Communications (Cat. No.97TH8338)最新文献

筛选
英文 中文
Evolution towards 3rd generation wireless access 向第三代无线接入的演进
H. Huomo
{"title":"Evolution towards 3rd generation wireless access","authors":"H. Huomo","doi":"10.1109/ICPWC.1997.655467","DOIUrl":"https://doi.org/10.1109/ICPWC.1997.655467","url":null,"abstract":"This paper presents an overview of how current cellular systems are evolving towards the third-generation of wireless personal communication systems dubbed Universal Mobile Telecommunication Systems (UMTS) in Europe. It pays attention to the standardization process globally in general with the focus on Europe.","PeriodicalId":166667,"journal":{"name":"1997 IEEE International Conference on Personal Wireless Communications (Cat. No.97TH8338)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1997-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121948300","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Effect of noise in optically-fed phased array antennas for CDMA wireless networks CDMA无线网络中光馈相控阵天线噪声的影响
{"title":"Effect of noise in optically-fed phased array antennas for CDMA wireless networks","authors":"","doi":"10.1109/ICPWC.1997.655517","DOIUrl":"https://doi.org/10.1109/ICPWC.1997.655517","url":null,"abstract":"The characteristics of an optically-fed phased array antenna are affected by the amplitude and phase noise introduced by optical amplifiers (EDFA) used in the system. A theoretical derivation and a numerical computation of the effect of phase noise on antenna performance are given. The phase fluctuations make the main beam jitter around a mean value directly related to the mean and the variance of the amplified spontaneous emission induced random phase change.","PeriodicalId":166667,"journal":{"name":"1997 IEEE International Conference on Personal Wireless Communications (Cat. No.97TH8338)","volume":"163 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1997-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116195753","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Preserving privacy in mobile communications: a hybrid method 保护移动通信中的隐私:一种混合方法
V. Varadharajan, Y. Mu
{"title":"Preserving privacy in mobile communications: a hybrid method","authors":"V. Varadharajan, Y. Mu","doi":"10.1109/ICPWC.1997.655576","DOIUrl":"https://doi.org/10.1109/ICPWC.1997.655576","url":null,"abstract":"We propose three security protocols for mobile communications, which enable mutual authentication and establish a shared secret key between mobile users. They also provide a certain degree of anonymity of the communicating users to other system users. Our protocols are based on a hybrid scheme involving a combination of public key and symmetric key based systems.","PeriodicalId":166667,"journal":{"name":"1997 IEEE International Conference on Personal Wireless Communications (Cat. No.97TH8338)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1997-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128393358","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Soft dropping power control-a power control backoff strategy 软降功率控制-一种功率控制回退策略
S. Gupta, R. Yates, C. Rose
{"title":"Soft dropping power control-a power control backoff strategy","authors":"S. Gupta, R. Yates, C. Rose","doi":"10.1109/ICPWC.1997.655510","DOIUrl":"https://doi.org/10.1109/ICPWC.1997.655510","url":null,"abstract":"For wireless communications systems, this work considers a power control algorithm in which a user's link quality objective, as measured by the signal to interference ratio (SIR), varies with its transmitter power. In particular, as increased interference or reduced uplink gain leads a mobile to raise its transmitter power, that mobile lowers its SIR target. In this way, the likelihood of an infeasible power control problem in which the users' transmitter powers rise to a maximum, is reduced. This graceful degradation of the SIR is termed soft dropping. Convergence proofs for a soft dropping power control algorithm are presented. Simulation results for a generic CDMA system demonstrate performance improvements over fixed target SIR algorithms.","PeriodicalId":166667,"journal":{"name":"1997 IEEE International Conference on Personal Wireless Communications (Cat. No.97TH8338)","volume":"171 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1997-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128206567","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Effects of controlling target SIR on capacity enhancement in a CDMA system 控制目标SIR对CDMA系统容量增强的影响
S. Won, Whan-woo Kim, Y. Oh, I. Jeong
{"title":"Effects of controlling target SIR on capacity enhancement in a CDMA system","authors":"S. Won, Whan-woo Kim, Y. Oh, I. Jeong","doi":"10.1109/ICPWC.1997.655513","DOIUrl":"https://doi.org/10.1109/ICPWC.1997.655513","url":null,"abstract":"This paper presents the effects of an algorithm for controlling the base station's received target signal-to-interference ratio (SIR) according to the quality of the received frames on the capacity enhancement. It is proved that the algorithm presented has a smaller mean of the actual SIR received at the antenna than the existing method which applies the fixed target SIR needed for the worst case to all the users at every time instant. It is also shown that the capacity of the system can be further increased by optimizing the system parameters in the algorithm.","PeriodicalId":166667,"journal":{"name":"1997 IEEE International Conference on Personal Wireless Communications (Cat. No.97TH8338)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1997-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121896179","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Java-based wireless network management system 一个基于java的无线网络管理系统
Ming-Yi Lee, Jiann-Liang Chen, Shinfeng D. Lin
{"title":"A Java-based wireless network management system","authors":"Ming-Yi Lee, Jiann-Liang Chen, Shinfeng D. Lin","doi":"10.1109/ICPWC.1997.655540","DOIUrl":"https://doi.org/10.1109/ICPWC.1997.655540","url":null,"abstract":"To support the high quality services with wireless networks, the wireless network management module is indispensable. Based on the Java facility, CORBA engine, and SNMP management protocol, a universal browser-based wireless network management system (WNMS) is designed and reported. We use the CORBA engine for communication between the manager and agent (managed system). The SNMP protocol and Java facility are utilized for the design of the management applications to take the advantage of the platform independence. In the WNMS, two new features, agent discovery and binding operation, are also implemented. From the prototype system, it is observed that with the new features and traditional management functions the WNMS can achieve a high quality in wireless-wireline network management.","PeriodicalId":166667,"journal":{"name":"1997 IEEE International Conference on Personal Wireless Communications (Cat. No.97TH8338)","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1997-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131473781","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Managing mobile communication network for performance 管理移动通信网络的性能
Hyung-Deug Bae
{"title":"Managing mobile communication network for performance","authors":"Hyung-Deug Bae","doi":"10.1109/ICPWC.1997.655529","DOIUrl":"https://doi.org/10.1109/ICPWC.1997.655529","url":null,"abstract":"This paper presents a management model for handling performance degradation of cellular mobile network due to service failure of an entire or partial cell. It provides a simple and practical method for deployment of performance management control functions. The model consists of monitoring, analysing, controlling and tracing phases. The criteria and activities in each phase are discussed. The management model described is useful for predictable long-term traffic jamming of a single cell or cluster of cells.","PeriodicalId":166667,"journal":{"name":"1997 IEEE International Conference on Personal Wireless Communications (Cat. No.97TH8338)","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1997-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116599070","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Location, identity and wireless fraud detection 定位,身份和无线欺诈检测
S. Patel
{"title":"Location, identity and wireless fraud detection","authors":"S. Patel","doi":"10.1109/ICPWC.1997.655573","DOIUrl":"https://doi.org/10.1109/ICPWC.1997.655573","url":null,"abstract":"The detection of fraud in wireless systems is made easier when the network is continuously aware of the location of mobile handsets. For existing cellular systems, location awareness requires handsets to be powered on. We explore ways to exploit the autonomous registration capabilities of handsets in order to detect the presence of illegitimate clones. Throughout the paper, location awareness is used as a new paradigm for organizing new and existing fraud detection techniques.","PeriodicalId":166667,"journal":{"name":"1997 IEEE International Conference on Personal Wireless Communications (Cat. No.97TH8338)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1997-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125175249","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Adaptive binary coding for diversity communication systems 分集通信系统的自适应二进制编码
M. Kousa, S. Al-Semari
{"title":"Adaptive binary coding for diversity communication systems","authors":"M. Kousa, S. Al-Semari","doi":"10.1109/ICPWC.1997.655483","DOIUrl":"https://doi.org/10.1109/ICPWC.1997.655483","url":null,"abstract":"Coding and diversity are two powerful techniques to combat fading effects on communication channels. In this paper the available diversity channels are utilized by forward error correction coding in an adaptive fashion to improve the reliability of the system. Based on the quality of the diversity channels, the code rate over each channel is determined using discrete optimization of the overall error probability, subject to the constraint of fixed overall throughput rate. It is found that the proposed system provides noticeable gain over the classical diversity system when binary BCH codes with hard-decision decoding are used. Moreover, the proposed system offers flexibility in choosing the throughput of the system, which the diversity system lacks. The advantages of the proposed system are obtained at only slight increase in implementation complexity.","PeriodicalId":166667,"journal":{"name":"1997 IEEE International Conference on Personal Wireless Communications (Cat. No.97TH8338)","volume":"125 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1997-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115600621","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
MAdSim-a simulation environment for ad-hoc mobile networks madsim - ad-hoc移动网络的仿真环境
G. Racherla, A. Das, A. Payyoorayil
{"title":"MAdSim-a simulation environment for ad-hoc mobile networks","authors":"G. Racherla, A. Das, A. Payyoorayil","doi":"10.1109/ICPWC.1997.655541","DOIUrl":"https://doi.org/10.1109/ICPWC.1997.655541","url":null,"abstract":"We present MAdSim-a environment tailored for mobile ad-hoc network simulation. Users and designers can use it for design, analysis and performance evaluation of their mobile ad-hoc network configuration. The input to MAdSim includes the system parameters, the network architecture, communication protocols (standard and user-defined). MAdSim presents, using graphics and text, performance metrics such as total routing and rerouting time, disruption time, buffering requirements, etc. These aid the user in evaluating the system's performance. MAdSim is being developed for PC based systems using MS Visual C++ 5.0 and MFC under Windows 95/NT.","PeriodicalId":166667,"journal":{"name":"1997 IEEE International Conference on Personal Wireless Communications (Cat. No.97TH8338)","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1997-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117144960","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信