Ming Fei Siyau, S. L. Ling, O. Onalaja, M. Ghavami
{"title":"MIMO channel estimation and tracking using a novel pilot expansion technique with Paley-Hadamard codes for future generation fast speed communications","authors":"Ming Fei Siyau, S. L. Ling, O. Onalaja, M. Ghavami","doi":"10.1109/FGCT.2013.6767210","DOIUrl":"https://doi.org/10.1109/FGCT.2013.6767210","url":null,"abstract":"A training-based MIMO channel estimation scheme is presented for future generation wireless systems that operate in both frequency and time selective fading channels. First, the method utilises pilot bits derived from the `Paley-Hadamard' matrix and exploit its orthogonal and `Toeplitz-like' structures to minimise the length of the training overhead. Secondly, by combining with a new pilot expansion technique, the method is able to estimate the length of the channel impulse response by flexibly extending its minimum pilot length as required in order to capture the number of multipath existed within the MIMO channel. Lastly, the pilot expansion technique can also help to reveal the initial channel variation and its Doppler rate which can be subsequently applied to the projection model in the Kalman filter for updating and tracking the MIMO channel in real-time with decision feedback during the actual data payload.","PeriodicalId":200083,"journal":{"name":"Second International Conference on Future Generation Communication Technologies (FGCT 2013)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126333823","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
T. Ambra, F. Paganelli, A. Fantechi, D. Giuli, Lorenzo Mazzi
{"title":"Resource-oriented design towards the convergence of Web-centric and Telecom-centric services","authors":"T. Ambra, F. Paganelli, A. Fantechi, D. Giuli, Lorenzo Mazzi","doi":"10.1109/FGCT.2013.6767203","DOIUrl":"https://doi.org/10.1109/FGCT.2013.6767203","url":null,"abstract":"Several approaches are currently being discussed for the convergence of Web-centric and Telecom-centric services. They can resort to a resource-oriented design methodology for defining a set of REST APIs in order to allow communication services on the Web. Our work aims at investigating how Telecom capabilities could be exposed on the web and be accessed through web browsers. The contribution of this work is threefold. Firstly, a resource-oriented service design methodology is adopted to specify a set of REST APIs for communication services (e.g. a voice call service). Secondly, we model the call resource behavior through a finite-state machine notation which accounts for the SIP signaling specifications. Thirdly, we design and develop a web application prototype that implements the REST APIs to provide a communication service which is accessible to web browsers and also interworks with SIP User Agents. This prototype supports also a mechanism based on the WebSocket protocol for handling asynchronous notifications.","PeriodicalId":200083,"journal":{"name":"Second International Conference on Future Generation Communication Technologies (FGCT 2013)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126425757","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Evaluation of the di.me trust metric in CRM settings","authors":"S. Wrobel, M. Heupel, S. Thiel","doi":"10.1109/FGCT.2013.6767213","DOIUrl":"https://doi.org/10.1109/FGCT.2013.6767213","url":null,"abstract":"The use and disclosure of personal information is a recognisable trend in modern information society. The integration and aggregation of such information introduces potentially critical privacy issues, like unintended information disclosure. The European research project digital.me is focused on the development of a tool empowering users to keep track of disclosed information by offering an intelligent UI and smart trust and privacy advisory. A user-centric trust metric has been developed as a central technique and is being utilised in order to give privacy advisory to users sharing sensitive information. Besides giving those advisory in private context, this functionality is being used in a business scenario, where the di.me platform is connected to a Customer Relationship Management (CRM) tool. In this context, the trust metric was validated against three mediating conditions for technology acceptance: utility, usability and privacy concerns. Field trials involving 447 CRM operators showed positive results for all three conditions.","PeriodicalId":200083,"journal":{"name":"Second International Conference on Future Generation Communication Technologies (FGCT 2013)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114270897","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Natural language requirements specification analysis using Part-of-Speech Tagging","authors":"A. Fatwanto","doi":"10.1109/FGCT.2013.6767215","DOIUrl":"https://doi.org/10.1109/FGCT.2013.6767215","url":null,"abstract":"This paper proposes a new method for analyzing software requirements specified using a natural language. The aim of this study was to transform requirements which are specified using a natural language into a formal model. A grammatical analysis based on Part-of-Speech Tagging technique and english sentence pattern matching were adopted to analyze the software requirements in order to obtain the structure of sentences of requirements specification that will eventually be transformed into formal models.","PeriodicalId":200083,"journal":{"name":"Second International Conference on Future Generation Communication Technologies (FGCT 2013)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126800923","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Non-saturation throughput analysis of IEEE 802.11 DCF considering short retry limit for single hop ad hoc networks","authors":"N. Gupta, C. Rai","doi":"10.1109/FGCT.2013.6767192","DOIUrl":"https://doi.org/10.1109/FGCT.2013.6767192","url":null,"abstract":"In the last decade, many analytical models have been proposed to compute the performance of IEEE 802.11 DCF under non-saturated conditions. In this paper, we propose a new analytical model which can be employed for computing the performance throughput for both saturated and non-saturated networks. We have considered the presence of first order memory buffer and traffic arrival which obeys Poisson distribution. In comparison to other models, our model can predict the behavior more accurately. The same has been verified by elaborate modeling and simulation results.","PeriodicalId":200083,"journal":{"name":"Second International Conference on Future Generation Communication Technologies (FGCT 2013)","volume":"33 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113971043","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Everything is better with sprinkles: Greedy routing with bounded stretch","authors":"C. Werle, O. P. Waldhorst","doi":"10.1109/FGCT.2013.6767208","DOIUrl":"https://doi.org/10.1109/FGCT.2013.6767208","url":null,"abstract":"Sprinkles is a greedy routing protocol with very low average stretch and bounded additive stretch that is inspired by a compact routing scheme for power law graphs. By replacing the hitherto centralized computations of routing information and exact distance labels on trees with a distributed construction, we transfer the additive stretch bound into a distributed routing protocol. Sprinkles is, however, not compact due to potentially unbounded address sizes. Therefore, we introduce mechanisms that lead to reduced, practicable mean and maximum address sizes while still preserving the additive stretch bound. Sprinkles is the first distributed greedy routing protocol providing an additive stretch bound, low mean stretch, and feasible address sizes on relevant topologies. We prove that the stretch bound is maintained by our adapted construction and demonstrate by extensive simulation experiments that address sizes as well as communication overhead are well-behaved on synthetic and realistic topologies of up to 200k nodes while still providing very low mean stretch.","PeriodicalId":200083,"journal":{"name":"Second International Conference on Future Generation Communication Technologies (FGCT 2013)","volume":"54 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124863393","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Wireless LAN packet concatenation algorithm","authors":"Sung-Jin Ok, Jung-Ha Kang, Eum-Gi Kim","doi":"10.1109/FGCT.2013.6767201","DOIUrl":"https://doi.org/10.1109/FGCT.2013.6767201","url":null,"abstract":"The general frame size in an IEEE 802.11 wireless LAN environment is often much smaller than the specified MTU size. The small size of the frames increases the MAC layer traffic and can cause degradation in network performance. In this paper, we propose new IP packet concatenation methods that are able to merge two or more IP packets with same destination addresses into a MPDU. Our method provides a continuous monitoring of the channel state. If there are IP packets that can be concatenated, the concatenation is carried out at the same time as the channels are allocated to other nodes. At the receiving end, the data size of the received MPDU and the total length field in the IP header are compared to determine whether the received frame is concatenated or not. Our proposed method avoids any packet concatenation delay. When MAC layer traffic is low, our method provides a similar performance to existing wireless LANs. Our method can also improve the transmission performance as an increase in MAC layer traffic results in a decrease in the total traffic.","PeriodicalId":200083,"journal":{"name":"Second International Conference on Future Generation Communication Technologies (FGCT 2013)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117119099","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
J. Bravo-Torres, Martín López Nores, Y. Blanco-Fernández, J. Pazos-Arias
{"title":"Leveraging short-lived social networks in vehicular environments","authors":"J. Bravo-Torres, Martín López Nores, Y. Blanco-Fernández, J. Pazos-Arias","doi":"10.1109/FGCT.2013.6767199","DOIUrl":"https://doi.org/10.1109/FGCT.2013.6767199","url":null,"abstract":"The interactions enabled by the popular sites of the Web 2.0 are largely confined to the virtual world of the Internet, thus failing to engage people in relevant interactions with people, contents or resources in their physical environment. In this paper, we motivate the potential of automatically establishing sporadic social networks among people (acquaintances or strangers) who happen to be physically close to one another at a certain moment. We present the design of one platform intended to provide solutions from the lowest level of establishing ad-hoc connections among nearby mobile devices, up to the highest level of automatically identifying the most relevant pieces of information to deliver at any time. Specific scenarios are discussed considering vehicular environments, as well as the results from pilot experiments with a representative application.","PeriodicalId":200083,"journal":{"name":"Second International Conference on Future Generation Communication Technologies (FGCT 2013)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131301583","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A new service description for communication services as basis for automated functional testing","authors":"Patrick Wacht, U. Trick, W. Fuhrmann, B. Ghita","doi":"10.1109/FGCT.2013.6767211","DOIUrl":"https://doi.org/10.1109/FGCT.2013.6767211","url":null,"abstract":"The advances in the telecommunication domain to support complex communication services has resulted in a need for a new approach to automatically verify that the communication services meet the demands of the customers. This paper presents a concept for automated functional testing by means of a novel test framework. Within the framework, the tests are automatically derived from a proposed new sort of requirements specification for communication services, the Service Description, and afterwards generated by means of predefined test modules. Finally, the test cases are executed against the System under Test, the communication service.","PeriodicalId":200083,"journal":{"name":"Second International Conference on Future Generation Communication Technologies (FGCT 2013)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126967722","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Strong authentication on smart wireless devices","authors":"V. Mora-Afonso, P. Caballero-Gil, J. Molina-Gil","doi":"10.1109/FGCT.2013.6767206","DOIUrl":"https://doi.org/10.1109/FGCT.2013.6767206","url":null,"abstract":"The rapid deployment of wireless technologies has given rise to the current situation where mobile phones and other wireless devices have become essential elements in all types of activities, including in the home. In particular, smartphones and laptops are used for wirelessly sharing photos and documents, playing games, browsing websites, and viewing multimedia, for example. This work describes a proposal for both desktop and mobile applications that use Identity-Based Cryptography (IBC) to protect communications between smart wireless devices in the home. It combines the use of IBC for Wi-Fi and Bluetooth communication, with the promising Near Field Communication (NFC) technology for secure authentication. The proposed scheme involves NFC pairing to establish as public key a piece of information linked to the device, such as a phone number or an IP address. In this way, such information can be then used in an IBC scheme for peer-to-peer communication. Preliminary implementations of prototypes on several mobile platforms have already produced some promising results.","PeriodicalId":200083,"journal":{"name":"Second International Conference on Future Generation Communication Technologies (FGCT 2013)","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126491548","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}