{"title":"Coexistence between Cognitive Radio Network and Digital TV","authors":"Hongjie Liu, Shufang Li, Min Yi","doi":"10.1109/ICCSN.2009.56","DOIUrl":"https://doi.org/10.1109/ICCSN.2009.56","url":null,"abstract":"In order to study the coexistence between cognitive radio network and incumbent services, two representative systems of WRAN and DTV were selected. A simple interference analysis method was proposed through a coexistence scenario. Through calculation and simulation, a series of critical values were found. 8km and 20km of WRAN cell radius are of great significance to control the interference to DTV. If WRAN cell radius less than 8km, more than one tier of interferers are permitted. On the other hand, when WRAN cell radius exceeds 20km, the distance from DTV receiver to WRAN BS should be larger than the sum of the two radiuses (R+r).","PeriodicalId":177679,"journal":{"name":"2009 International Conference on Communication Software and Networks","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-02-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128494619","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Verification and Analysis of Access Control Policy with Colored Petri Net","authors":"Fujun Feng, Junshan Li","doi":"10.1109/ICCSN.2009.58","DOIUrl":"https://doi.org/10.1109/ICCSN.2009.58","url":null,"abstract":"A Trust and Context based Access Control model (TCAC) is proposed in this paper, which integrates trust value and context information of users into traditional role based access control. TCAC is flexible and dynamic to limit the authorizations to users. Verification and analysis of access control policy can help us understand the security requirements and states of systems. Colored Petri Net (CPN) extends the traditional Petri net, it can simply the net structure, and analyze the security and correctness of complicated systems before really constructing them. We present a CPN model of role activation/ deactivation of TCAC policy, and discuss the color sets, places, arc expressions and guard functions in CPN model. The consistency of TCAC policy is verified based on CPN model and reachability analysis.","PeriodicalId":177679,"journal":{"name":"2009 International Conference on Communication Software and Networks","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-02-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129090490","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on Designing and Implementing an Experimental MANET Testbed","authors":"Lixin Li, Huisheng Zhang","doi":"10.1109/ICCSN.2009.165","DOIUrl":"https://doi.org/10.1109/ICCSN.2009.165","url":null,"abstract":"A very large number of simulation models have been developed to study ad hoc network architectures and protocols. Evaluating and deploying all sorts of protocols and applications designed for wireless ad hoc networks in a real environment is an important and urgent task. In recognition of this need, and to further our research objectives in the area of wireless ad hoc networks, we have built the E2WMANT testbed, which enables us to gain real-world experience with research concepts as we develop them and use results from outdoor field tests to further enhance the testbed. This paper describes our experience in designing and implementing the E2WMANT prototype system. We believe that they may be useful to others who want to build ad hoc network testbeds.","PeriodicalId":177679,"journal":{"name":"2009 International Conference on Communication Software and Networks","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-02-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129360945","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Distributed Multichannel Spectrum Sharing Algorithm for Cognitive Radio Networks","authors":"Zengqin Xu, Qinyu Zhang","doi":"10.1109/ICCSN.2009.182","DOIUrl":"https://doi.org/10.1109/ICCSN.2009.182","url":null,"abstract":"In this paper, we study the distributed multichannel spectrum sharing problem for the cognitive radio networks (CRNs). We are interested in dynamic spectrum sharing schemes that maximize the spectrum utilization of the cognitive network while appropriately protecting primary users. Existence and optimality of the Nash Equilibrium (N.E.) are investigated. Distributed Multichannel Spectrum Sharing(MCSS) algorithm is proposed to approach the optimal N.E. Simulation results are obtained to verify the validity of the proposed algorithm.","PeriodicalId":177679,"journal":{"name":"2009 International Conference on Communication Software and Networks","volume":"112 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-02-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124003073","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Xu Shenglei, SungDae Jung, Usman Hassan, Sangsun Lee
{"title":"A Tangent Area Method to Restrict the RREQ Braodcasting Frame","authors":"Xu Shenglei, SungDae Jung, Usman Hassan, Sangsun Lee","doi":"10.1109/ICCSN.2009.99","DOIUrl":"https://doi.org/10.1109/ICCSN.2009.99","url":null,"abstract":"Ad-hoc networks have become a novel area of research and development in mobile computing. In this part, routing protocol is important to improve efficiency of Ad-hoc networks. Recently, Ad-hoc routing protocols have been studied and developed, such as DSDV, AODV, DSR, and LAR. In this paper, we propose a new routing protocol that is named by advance-LAR based on radio-range of destination node. This protocol is designed to reduce duplicate RREQ messages in the network by restrict the nodes who have a right to propagate the RREQ messages in a fixed area. In order to make sure that the RREQ message should be propagated by some nodes, there should be some nodes can get this right, so that fixed area can be changed in a special way.","PeriodicalId":177679,"journal":{"name":"2009 International Conference on Communication Software and Networks","volume":"26 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-02-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120896300","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Efficient Static Compressed Data Management System for an Embedded DBMS","authors":"Jin-Ho Hwang, J. Lee, Gun-Woo Kim, H. Kim, J. Son","doi":"10.1109/ICCSN.2009.155","DOIUrl":"https://doi.org/10.1109/ICCSN.2009.155","url":null,"abstract":"Recently, an embedded DBMS is widely used for mobile computing devices to manage information efficiently. Moreover, flash memory is prevalent in the devices as data storage. However, since it has restriction on the number of data I/O and is more expensive than the conventional magnetic hard disk, the high memory utilization has become necessary. Therefore, we present a Compressed Data Management System to efficiently manage the memory for embedded DBMS. In addition, we clarify the efficiency of the proposed system by the various experimental results.","PeriodicalId":177679,"journal":{"name":"2009 International Conference on Communication Software and Networks","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-02-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126308380","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yanbo Zhang, Zhengqi Zheng, Yingni Jin, Xiuzhen Wang
{"title":"Load-Balanced Algorithm in Wireless Sensor Networks Based on Pruning Mechanism","authors":"Yanbo Zhang, Zhengqi Zheng, Yingni Jin, Xiuzhen Wang","doi":"10.1109/ICCSN.2009.104","DOIUrl":"https://doi.org/10.1109/ICCSN.2009.104","url":null,"abstract":"Wireless sensor networks (WSNs) have captured considerable attention recently due to their enormous potential applications. Energy has become the bottle-neck problem and has constrained WSNs widely applications. Cluster mechanism has been widely pursued by the research community in order to prolong the life of WSNs. In this paper, we propose an energy-balanced mechanism based on pruning mechanism to tackle the “hot point” problem appeared in WSNs. In order to keep energy-balance, we synthetically use node’s location, residual energy and the count as cluster-head to form an evaluation function that is based on the pruning mechanism. Experimentations show that the proposed strategy can keep the energy-balance of whole cluster as well as prolong the lifetime of WSNs.","PeriodicalId":177679,"journal":{"name":"2009 International Conference on Communication Software and Networks","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-02-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126466506","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Frequency-Domain Method for UWB Pulse Design","authors":"J. Hu, Yongchong Liu, Jie Yang","doi":"10.1109/ICCSN.2009.167","DOIUrl":"https://doi.org/10.1109/ICCSN.2009.167","url":null,"abstract":"This paper presents a new method, the frequency-domain method, to design UWB pulse. The frequency-domain method has the flexibility of designing pulses to fit different power spectral constraints. It designs two UWB pulses using the new method. The designed pulses have short time duration, meet the power spectral constraint of FCC, and have high mask-filling efficiency.","PeriodicalId":177679,"journal":{"name":"2009 International Conference on Communication Software and Networks","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-02-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126481914","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Fast Independent Component Analysis Based Digital Modulation Recognition Method","authors":"Xu Yi-qiong, G. Lindong, Wang Bo","doi":"10.1109/ICCSN.2009.174","DOIUrl":"https://doi.org/10.1109/ICCSN.2009.174","url":null,"abstract":"This paper proposes an efficient Independent Component Analysis (ICA) based modulation feature extraction method applied in digital modulation identification. In modulation identification, important information may be contained in the high-order relationship among sampling points. ICA is sensitive to high-order statistic in the data and finds not-necessarily orthogonal bases, so it may better identify and reconstruct high-dimensional communication signal data than traditional time and frequency domain features. ICA algorithms are time-consuming and sometimes converge difficultly. So a modified FastICA algorithm is developed in this paper, which only need to computer Jacobian Matrix once time in one iteration and achieves the correspondent effect of FastICA. After obtaining all independent components, a genetic algorithm is introduced to select optimal independent components (ICs). The experiment results show that modified FastICA algorithm fast convergence speed and genetic algorithm optimize recognition performance. ICA based features extraction method is innovative and promising for digital modulation identification.","PeriodicalId":177679,"journal":{"name":"2009 International Conference on Communication Software and Networks","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-02-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132020661","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Method of Text Categorization on Imbalanced Datasets","authors":"Li Xin-fu, Yu Yan, Yin Peng","doi":"10.1109/ICCSN.2009.70","DOIUrl":"https://doi.org/10.1109/ICCSN.2009.70","url":null,"abstract":"In practical applications, datasets are usually imbalanced, but traditional approaches usually lead a low recognition rate. To address this problem, in this paper, over-sampling of the minority class has been proposed to increase the number of minority class, so as to achieve balance, thereby enhancing recognition rate of minority class. The experiments show that this approach achieved satisfactory results.","PeriodicalId":177679,"journal":{"name":"2009 International Conference on Communication Software and Networks","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-02-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130194033","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}