Second International Conference on Future Generation Communication Technologies (FGCT 2013)最新文献

筛选
英文 中文
MIMO channel estimation and tracking using a novel pilot expansion technique with Paley-Hadamard codes for future generation fast speed communications MIMO信道估计和跟踪使用新的导频扩展技术与佩利-哈达玛码为下一代高速通信
Ming Fei Siyau, S. L. Ling, O. Onalaja, M. Ghavami
{"title":"MIMO channel estimation and tracking using a novel pilot expansion technique with Paley-Hadamard codes for future generation fast speed communications","authors":"Ming Fei Siyau, S. L. Ling, O. Onalaja, M. Ghavami","doi":"10.1109/FGCT.2013.6767210","DOIUrl":"https://doi.org/10.1109/FGCT.2013.6767210","url":null,"abstract":"A training-based MIMO channel estimation scheme is presented for future generation wireless systems that operate in both frequency and time selective fading channels. First, the method utilises pilot bits derived from the `Paley-Hadamard' matrix and exploit its orthogonal and `Toeplitz-like' structures to minimise the length of the training overhead. Secondly, by combining with a new pilot expansion technique, the method is able to estimate the length of the channel impulse response by flexibly extending its minimum pilot length as required in order to capture the number of multipath existed within the MIMO channel. Lastly, the pilot expansion technique can also help to reveal the initial channel variation and its Doppler rate which can be subsequently applied to the projection model in the Kalman filter for updating and tracking the MIMO channel in real-time with decision feedback during the actual data payload.","PeriodicalId":200083,"journal":{"name":"Second International Conference on Future Generation Communication Technologies (FGCT 2013)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126333823","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Resource-oriented design towards the convergence of Web-centric and Telecom-centric services 面向资源的设计,实现以web为中心的服务和以电信为中心的服务的融合
T. Ambra, F. Paganelli, A. Fantechi, D. Giuli, Lorenzo Mazzi
{"title":"Resource-oriented design towards the convergence of Web-centric and Telecom-centric services","authors":"T. Ambra, F. Paganelli, A. Fantechi, D. Giuli, Lorenzo Mazzi","doi":"10.1109/FGCT.2013.6767203","DOIUrl":"https://doi.org/10.1109/FGCT.2013.6767203","url":null,"abstract":"Several approaches are currently being discussed for the convergence of Web-centric and Telecom-centric services. They can resort to a resource-oriented design methodology for defining a set of REST APIs in order to allow communication services on the Web. Our work aims at investigating how Telecom capabilities could be exposed on the web and be accessed through web browsers. The contribution of this work is threefold. Firstly, a resource-oriented service design methodology is adopted to specify a set of REST APIs for communication services (e.g. a voice call service). Secondly, we model the call resource behavior through a finite-state machine notation which accounts for the SIP signaling specifications. Thirdly, we design and develop a web application prototype that implements the REST APIs to provide a communication service which is accessible to web browsers and also interworks with SIP User Agents. This prototype supports also a mechanism based on the WebSocket protocol for handling asynchronous notifications.","PeriodicalId":200083,"journal":{"name":"Second International Conference on Future Generation Communication Technologies (FGCT 2013)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126425757","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Evaluation of the di.me trust metric in CRM settings di的评估。CRM设置中的me信任度量
S. Wrobel, M. Heupel, S. Thiel
{"title":"Evaluation of the di.me trust metric in CRM settings","authors":"S. Wrobel, M. Heupel, S. Thiel","doi":"10.1109/FGCT.2013.6767213","DOIUrl":"https://doi.org/10.1109/FGCT.2013.6767213","url":null,"abstract":"The use and disclosure of personal information is a recognisable trend in modern information society. The integration and aggregation of such information introduces potentially critical privacy issues, like unintended information disclosure. The European research project digital.me is focused on the development of a tool empowering users to keep track of disclosed information by offering an intelligent UI and smart trust and privacy advisory. A user-centric trust metric has been developed as a central technique and is being utilised in order to give privacy advisory to users sharing sensitive information. Besides giving those advisory in private context, this functionality is being used in a business scenario, where the di.me platform is connected to a Customer Relationship Management (CRM) tool. In this context, the trust metric was validated against three mediating conditions for technology acceptance: utility, usability and privacy concerns. Field trials involving 447 CRM operators showed positive results for all three conditions.","PeriodicalId":200083,"journal":{"name":"Second International Conference on Future Generation Communication Technologies (FGCT 2013)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114270897","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Natural language requirements specification analysis using Part-of-Speech Tagging 使用词性标注的自然语言需求规范分析
A. Fatwanto
{"title":"Natural language requirements specification analysis using Part-of-Speech Tagging","authors":"A. Fatwanto","doi":"10.1109/FGCT.2013.6767215","DOIUrl":"https://doi.org/10.1109/FGCT.2013.6767215","url":null,"abstract":"This paper proposes a new method for analyzing software requirements specified using a natural language. The aim of this study was to transform requirements which are specified using a natural language into a formal model. A grammatical analysis based on Part-of-Speech Tagging technique and english sentence pattern matching were adopted to analyze the software requirements in order to obtain the structure of sentences of requirements specification that will eventually be transformed into formal models.","PeriodicalId":200083,"journal":{"name":"Second International Conference on Future Generation Communication Technologies (FGCT 2013)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126800923","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Non-saturation throughput analysis of IEEE 802.11 DCF considering short retry limit for single hop ad hoc networks 考虑单跳自组织网络短重试限制的IEEE 802.11 DCF非饱和吞吐量分析
N. Gupta, C. Rai
{"title":"Non-saturation throughput analysis of IEEE 802.11 DCF considering short retry limit for single hop ad hoc networks","authors":"N. Gupta, C. Rai","doi":"10.1109/FGCT.2013.6767192","DOIUrl":"https://doi.org/10.1109/FGCT.2013.6767192","url":null,"abstract":"In the last decade, many analytical models have been proposed to compute the performance of IEEE 802.11 DCF under non-saturated conditions. In this paper, we propose a new analytical model which can be employed for computing the performance throughput for both saturated and non-saturated networks. We have considered the presence of first order memory buffer and traffic arrival which obeys Poisson distribution. In comparison to other models, our model can predict the behavior more accurately. The same has been verified by elaborate modeling and simulation results.","PeriodicalId":200083,"journal":{"name":"Second International Conference on Future Generation Communication Technologies (FGCT 2013)","volume":"33 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113971043","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Everything is better with sprinkles: Greedy routing with bounded stretch 有了点缀,一切都更好了:有界拉伸的贪婪路由
C. Werle, O. P. Waldhorst
{"title":"Everything is better with sprinkles: Greedy routing with bounded stretch","authors":"C. Werle, O. P. Waldhorst","doi":"10.1109/FGCT.2013.6767208","DOIUrl":"https://doi.org/10.1109/FGCT.2013.6767208","url":null,"abstract":"Sprinkles is a greedy routing protocol with very low average stretch and bounded additive stretch that is inspired by a compact routing scheme for power law graphs. By replacing the hitherto centralized computations of routing information and exact distance labels on trees with a distributed construction, we transfer the additive stretch bound into a distributed routing protocol. Sprinkles is, however, not compact due to potentially unbounded address sizes. Therefore, we introduce mechanisms that lead to reduced, practicable mean and maximum address sizes while still preserving the additive stretch bound. Sprinkles is the first distributed greedy routing protocol providing an additive stretch bound, low mean stretch, and feasible address sizes on relevant topologies. We prove that the stretch bound is maintained by our adapted construction and demonstrate by extensive simulation experiments that address sizes as well as communication overhead are well-behaved on synthetic and realistic topologies of up to 200k nodes while still providing very low mean stretch.","PeriodicalId":200083,"journal":{"name":"Second International Conference on Future Generation Communication Technologies (FGCT 2013)","volume":"54 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124863393","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Wireless LAN packet concatenation algorithm 无线局域网数据包拼接算法
Sung-Jin Ok, Jung-Ha Kang, Eum-Gi Kim
{"title":"Wireless LAN packet concatenation algorithm","authors":"Sung-Jin Ok, Jung-Ha Kang, Eum-Gi Kim","doi":"10.1109/FGCT.2013.6767201","DOIUrl":"https://doi.org/10.1109/FGCT.2013.6767201","url":null,"abstract":"The general frame size in an IEEE 802.11 wireless LAN environment is often much smaller than the specified MTU size. The small size of the frames increases the MAC layer traffic and can cause degradation in network performance. In this paper, we propose new IP packet concatenation methods that are able to merge two or more IP packets with same destination addresses into a MPDU. Our method provides a continuous monitoring of the channel state. If there are IP packets that can be concatenated, the concatenation is carried out at the same time as the channels are allocated to other nodes. At the receiving end, the data size of the received MPDU and the total length field in the IP header are compared to determine whether the received frame is concatenated or not. Our proposed method avoids any packet concatenation delay. When MAC layer traffic is low, our method provides a similar performance to existing wireless LANs. Our method can also improve the transmission performance as an increase in MAC layer traffic results in a decrease in the total traffic.","PeriodicalId":200083,"journal":{"name":"Second International Conference on Future Generation Communication Technologies (FGCT 2013)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117119099","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Leveraging short-lived social networks in vehicular environments 在车辆环境中利用短暂的社交网络
J. Bravo-Torres, Martín López Nores, Y. Blanco-Fernández, J. Pazos-Arias
{"title":"Leveraging short-lived social networks in vehicular environments","authors":"J. Bravo-Torres, Martín López Nores, Y. Blanco-Fernández, J. Pazos-Arias","doi":"10.1109/FGCT.2013.6767199","DOIUrl":"https://doi.org/10.1109/FGCT.2013.6767199","url":null,"abstract":"The interactions enabled by the popular sites of the Web 2.0 are largely confined to the virtual world of the Internet, thus failing to engage people in relevant interactions with people, contents or resources in their physical environment. In this paper, we motivate the potential of automatically establishing sporadic social networks among people (acquaintances or strangers) who happen to be physically close to one another at a certain moment. We present the design of one platform intended to provide solutions from the lowest level of establishing ad-hoc connections among nearby mobile devices, up to the highest level of automatically identifying the most relevant pieces of information to deliver at any time. Specific scenarios are discussed considering vehicular environments, as well as the results from pilot experiments with a representative application.","PeriodicalId":200083,"journal":{"name":"Second International Conference on Future Generation Communication Technologies (FGCT 2013)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131301583","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A new service description for communication services as basis for automated functional testing 通信服务的新服务描述,作为自动化功能测试的基础
Patrick Wacht, U. Trick, W. Fuhrmann, B. Ghita
{"title":"A new service description for communication services as basis for automated functional testing","authors":"Patrick Wacht, U. Trick, W. Fuhrmann, B. Ghita","doi":"10.1109/FGCT.2013.6767211","DOIUrl":"https://doi.org/10.1109/FGCT.2013.6767211","url":null,"abstract":"The advances in the telecommunication domain to support complex communication services has resulted in a need for a new approach to automatically verify that the communication services meet the demands of the customers. This paper presents a concept for automated functional testing by means of a novel test framework. Within the framework, the tests are automatically derived from a proposed new sort of requirements specification for communication services, the Service Description, and afterwards generated by means of predefined test modules. Finally, the test cases are executed against the System under Test, the communication service.","PeriodicalId":200083,"journal":{"name":"Second International Conference on Future Generation Communication Technologies (FGCT 2013)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126967722","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Strong authentication on smart wireless devices 智能无线设备的强认证
V. Mora-Afonso, P. Caballero-Gil, J. Molina-Gil
{"title":"Strong authentication on smart wireless devices","authors":"V. Mora-Afonso, P. Caballero-Gil, J. Molina-Gil","doi":"10.1109/FGCT.2013.6767206","DOIUrl":"https://doi.org/10.1109/FGCT.2013.6767206","url":null,"abstract":"The rapid deployment of wireless technologies has given rise to the current situation where mobile phones and other wireless devices have become essential elements in all types of activities, including in the home. In particular, smartphones and laptops are used for wirelessly sharing photos and documents, playing games, browsing websites, and viewing multimedia, for example. This work describes a proposal for both desktop and mobile applications that use Identity-Based Cryptography (IBC) to protect communications between smart wireless devices in the home. It combines the use of IBC for Wi-Fi and Bluetooth communication, with the promising Near Field Communication (NFC) technology for secure authentication. The proposed scheme involves NFC pairing to establish as public key a piece of information linked to the device, such as a phone number or an IP address. In this way, such information can be then used in an IBC scheme for peer-to-peer communication. Preliminary implementations of prototypes on several mobile platforms have already produced some promising results.","PeriodicalId":200083,"journal":{"name":"Second International Conference on Future Generation Communication Technologies (FGCT 2013)","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126491548","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信