{"title":"Maximum Likelihood Estimation and Cramer-Rao Lower Bounds for the Multichannel Spectral Evaluation in Hands-Free Communication","authors":"H. Dam, S. Nordholm, H. H. Dam, S. Low","doi":"10.1109/APCC.2005.1554205","DOIUrl":"https://doi.org/10.1109/APCC.2005.1554205","url":null,"abstract":"This paper investigates the short-term power spectral estimation of the source of interest and the interference in noisy environment for hands-free communication. Models of probability density function for the source, interference and noise covariance matrices are proposed for the evaluation of the power spectral parameters. The analysis are performed to obtain the Cramer-Rao bounds for the evaluation and an exact maximum likelihood (ML) estimation is formulated based on the proposed model. Evaluation of an adaptive beamformer with ML estimation shows significant suppression levels for noise and interference whilst maintaining a low source signal distortion","PeriodicalId":176147,"journal":{"name":"2005 Asia-Pacific Conference on Communications","volume":"16 8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125787208","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Adaptive Receiver Buffer Adjust Algorithm for Voice & Video on IP Applications","authors":"Jing Liu, Z. Niu","doi":"10.1109/APCC.2005.1554146","DOIUrl":"https://doi.org/10.1109/APCC.2005.1554146","url":null,"abstract":"In this paper, a new adaptive receiver buffer adjust algorithm is proposed for voice and video on IP (V2oIP) applications with the consideration of voice and video's characters and network conditions. This algorithm take the voice stream as the main stream, adjust the voice buffer according to the voice characters, and synchronize the video stream with it considering video's characters. This algorithm divides network status into two modes: normal mode and spike mode, according to the delay of the coming packets and the size of buffer. In normal mode, the receiver adjusts the buffer delay at the beginning of every voice's talk-spurt. In spike mode, buffer is adjusted when every packet arrives. The adjust can based on a prediction of the delay according to the delay of former packets, or based on a prearranged way. Simulations and experiments show that this strategy can well conceal the delay jitter and reduce the packet loss rate","PeriodicalId":176147,"journal":{"name":"2005 Asia-Pacific Conference on Communications","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132027699","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Home Network Service Environment for Wide-Area Communications","authors":"T. Okugawa, Hitoshi Masutani, I. Yoda","doi":"10.1109/APCC.2005.1554009","DOIUrl":"https://doi.org/10.1109/APCC.2005.1554009","url":null,"abstract":"Information appliances and broadband networks have become increasingly popular, and home devices have progressed to the stage where they are connected via networks. Although users want to communicate using these networked appliances, it is not easy, or sometimes impossible, for current appliances to set up all the required appliances so that they work together. We propose a home network service management environment that enables interactive coordination between diverse services that target multiple information appliances, including SIP protocol utilization for wide-area network connectivity. By using SIP for wide-area connectivity, home network users can communicate with their friends, not only using communication appliances like telephones, but also any appliance that can input/output sound such as televisions and stereo systems. We successfully confirmed implementation of this environment and sample services using the OSGi service platform","PeriodicalId":176147,"journal":{"name":"2005 Asia-Pacific Conference on Communications","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130130138","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Maximum a posteriori Probability (MAP) Code Acquisition in Multiuser DS/CDMA Systems","authors":"T. A. Khan, N. Eshima, Y. Jitsumatsu, T. Kohda","doi":"10.1109/APCC.2005.1554143","DOIUrl":"https://doi.org/10.1109/APCC.2005.1554143","url":null,"abstract":"Conventional code acquisition techniques don't exploit the entire available information for decision making but only use a part of it. A maximum a posteriori probability (MAP) code acquisition scheme is proposed which efficiently utilizes all the available information by exploiting statistical properties of spreading codes. Computer simulations show significant performance improvements over conventional schemes","PeriodicalId":176147,"journal":{"name":"2005 Asia-Pacific Conference on Communications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130137081","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Mobile Satellite IP Network Architecture and Multiple Interface Manager Integrating Various Satellite and Terrestrial Mobile Communication Systems","authors":"M. Inoue, K. Kamogawa, S. Ueno","doi":"10.1109/APCC.2005.1554027","DOIUrl":"https://doi.org/10.1109/APCC.2005.1554027","url":null,"abstract":"This paper presents the architecture of the mobile satellite IP network (MSIN) and the multiple interface manager (MIM). The MSIN integrates various satellite and terrestrial communication systems using the IP mobility management protocol, which supports a uniformed handoff process irrespective of the underlying link layer. The MIM selects a suitable network interface according to the user preferences and communication environment by supervising triggers that interact between the link layer and the upper layers. The MSIN and MIM expand the scope of applicability, i.e., anytime, anywhere, and any device, for emerging data applications in the mobile satellite communications system. We present an experimental evaluation of media independent handover as an example of the MIM function. The results indicate that the MIM has the potential to provide seamless session continuity","PeriodicalId":176147,"journal":{"name":"2005 Asia-Pacific Conference on Communications","volume":"17 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134426412","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Routing Protocol for Wired-Gum-Wireless Ad Hoc Networks","authors":"M. Yoshida, T. Miki","doi":"10.1109/APCC.2005.1554046","DOIUrl":"https://doi.org/10.1109/APCC.2005.1554046","url":null,"abstract":"Connecting infrastructure with ad hoc network enables expansion of communication area. Under this environment, two different type of route exist between nodes that belong to ad hoc network. One is the route using wireless links only. The other is the route using both infrastructure and wireless links. However, most of existing routing protocols select a route by minimum hop count from originator to destination, and do not consider differences of communication performance between infrastructure and ad hoc network. This paper proposes a new routing protocol for ad hoc network with infrastructure environment. The main feature of proposed routing is to use a simple formula to judge if a route using both infrastructure and wireless links is more effective than routes using wireless links only. The formula used for judging a route is introduced from results of throughput tests on simple network models. As a result of evaluation, proposed routing protocol improves throughput compared to AODV in high traffic situation","PeriodicalId":176147,"journal":{"name":"2005 Asia-Pacific Conference on Communications","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134370501","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Secure Routing with the AODV Protocol","authors":"A. Pirzada, C. McDonald","doi":"10.1109/APCC.2005.1554018","DOIUrl":"https://doi.org/10.1109/APCC.2005.1554018","url":null,"abstract":"Ad-hoc networks, due to their improvised nature, are frequently established in insecure environments, which makes them susceptible to attacks. These attacks are launched by participating malicious nodes against different network services. Routing protocols, which act as the binding force in these networks, are a common target of these nodes. Ad-hoc on-demand distance vector (AODV) is one of the widely used routing protocols that is currently undergoing extensive research and development. AODV is based on distance vector routing, but the updates are shared not on a periodic basis but on an as per requirement basis. The control packets contain a hop-count and sequence number field that identifies the freshness of routing updates. As these fields are mutable, it creates a potential vulnerability that is frequently exploited by malicious nodes to advertise better routes. Similarly, transmission of routing updates in clear text also discloses vital information about the network topology, which is again a potential security hazard. In this paper we present a novel and pragmatic scheme for securing the ad-hoc on-demand distance vector routing protocol that protects against a number of attacks carried out against mobile ad-hoc wireless networks","PeriodicalId":176147,"journal":{"name":"2005 Asia-Pacific Conference on Communications","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131712157","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Background TCP data transfer with Inline network measurement","authors":"Tomoaki Tsugawa, G. Hasegawa, M. Murata","doi":"10.1093/ietcom/e89-b.8.2152","DOIUrl":"https://doi.org/10.1093/ietcom/e89-b.8.2152","url":null,"abstract":"In the present paper, ImTCP-bg, a new background TCP data transfer mechanism that uses an inline network measurement technique, is proposed. ImTCP-bg sets the upper limit of the congestion window size of the sender TCP based on the results of the inline network measurement, which measures the available bandwidth of the network path between the sender and receiver hosts. ImTCP-bg can provide background data transfer without affecting the foreground traffic, whereas previous methods cannot avoid network congestion essentially. ImTCP-bg also employs an enhanced RTT-based mechanism so that ImTCP-bg can detect and resolve network congestion, even when reliable measurement results cannot be obtained. The performance of ImTCP-bg is investigated through simulation experiments, and the effectiveness of ImTCP-bg in terms of the degree of interference with foreground traffic and the link bandwidth utilization is also investigated","PeriodicalId":176147,"journal":{"name":"2005 Asia-Pacific Conference on Communications","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131715784","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Study on Establishment of Secure RFID Network Using DNS Security Extension","authors":"YoungHwan Ham, Naesoo Kim, C. Pyo, Jinwook Chung","doi":"10.1109/APCC.2005.1554115","DOIUrl":"https://doi.org/10.1109/APCC.2005.1554115","url":null,"abstract":"RFID network mainly consists of three components, such as ODS(object directory service), OTS (object traceability service), OIS(object information service). The RFID information is very important, so the security between RFID network components is critical. The DNS technology already have defined the security standard such as DNS security extension & DNS dynamic update, so RFID network security can be achieved using current DNS security model. For the dynamic update of OIS URI mapping on RFID code, the DNS dynamic update technology can be used. The authentication, authorization and confidentiality need between RFID network components can be accomplished by PKI certificate system, and DNS server can be used as PKI certificate repository for the storing & retrieval of each other's certificate. So we proposed the secure integration of RFID network components by using DNS security extensions","PeriodicalId":176147,"journal":{"name":"2005 Asia-Pacific Conference on Communications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130821492","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Blind Symbol Synchronization in Cyclic Prefixed OFDM System","authors":"H. Guo, Qi Cheng, R. Liyana-Pathirana","doi":"10.1109/APCC.2005.1554172","DOIUrl":"https://doi.org/10.1109/APCC.2005.1554172","url":null,"abstract":"We present two new blind symbol time and carrier frequency offset estimators for OFDM systems, in a AWGN channel. The proposed estimators do not require the prior knowledge of the signal and noise powers at the receiver and can be a substitute for an existing ML estimator","PeriodicalId":176147,"journal":{"name":"2005 Asia-Pacific Conference on Communications","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132953401","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}