Hadi Noureddine, N. Gresset, D. Castelain, R. Pyndiah
{"title":"A new variant of Nonparametric Belief Propagation for self-localization","authors":"Hadi Noureddine, N. Gresset, D. Castelain, R. Pyndiah","doi":"10.1109/ICTEL.2010.5478820","DOIUrl":"https://doi.org/10.1109/ICTEL.2010.5478820","url":null,"abstract":"We consider the problem of relative self-localization of a network of fixed communicating devices that evaluate range measurements between each other. The solution is obtained in two stages: First, a new variant of the Nonparametric Belief Propagation algorithm is used for estimating the beliefs. This variant is based on a Monte-Carlo integration with rejection sampling where a delimited space region is determined for each node in order to reduce the rejection ratio. Then, a new algorithm based on estimation in discrete states space is proposed for solving the flipping ambiguities resulting from the lack of measurements. This solution has the advantage of reducing the amount of communicating particles and the computation cost.","PeriodicalId":208094,"journal":{"name":"2010 17th International Conference on Telecommunications","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115965738","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An achievable rate region for a primary network shared by a secondary link","authors":"John Tadrous, A. Sultan-Salem, M. Nafie","doi":"10.1109/ICTEL.2010.5478813","DOIUrl":"https://doi.org/10.1109/ICTEL.2010.5478813","url":null,"abstract":"We consider a multiple access primary network with N transmitters. A secondary link of one transmitter and a corresponding receiver causes interference to the primary network. An achievable rate region for the primary network and the secondary link is obtained given the following mode of operation. The secondary transmitter employs rate-splitting so that the primary receiver can decode part of the secondary's signal and cancel it. The secondary receiver, on the other hand, treats primary interference as noise. Given a Gaussian channel model, we investigate the effect of rate-splitting on the rate region for two cases. The first case is when the link between the secondary transmitter and the primary receiver supports a higher data rate than that of the link between the secondary transmitter and its corresponding receiver. The second case is the opposite scenario. For each case we determine the optimal rate-splitting that maximizes the sum throughput of the primary network and the secondary link subject to a constraint on primary rate. The optimal solution for the first case does not require rate-splitting. For the second, rate-splitting is needed and the primary rate constraint is met with equality.","PeriodicalId":208094,"journal":{"name":"2010 17th International Conference on Telecommunications","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116928135","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A wire-tap approach to enhance security in communication systems using the encoding-encryption paradigm","authors":"M. Mihaljević, F. Oggier","doi":"10.1109/ICTEL.2010.5478824","DOIUrl":"https://doi.org/10.1109/ICTEL.2010.5478824","url":null,"abstract":"Motivated by the GSM system, we consider communication systems which employ the encoding-encryption paradigm of first encoding the data before encrypting it for transmission. We add one level of security to the existing system designs by introducing a wiretap encoder. We analyze the security from an information theoretical point of view, and prove the enhanced security of the proposed scheme, focusing on the case of known plain text attacks that can endanger not only the confidentiality of some messages but also the safety of the key used for encryption, and thus the security of the whole communication system.","PeriodicalId":208094,"journal":{"name":"2010 17th International Conference on Telecommunications","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124616633","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"IMAN: An Intelligent MANET routing system","authors":"N. Saeed, M. Abbod, H. Al-Raweshidy","doi":"10.1109/ICTEL.2010.5478779","DOIUrl":"https://doi.org/10.1109/ICTEL.2010.5478779","url":null,"abstract":"Currently, in any MANET, one protocol routes packets to their destination regardless of the network context. This ‘one size fits all’ approach is far from optimum. Therefore, in this paper, we introduce an Intelligent MANet routing protocol system (IMAN), which employs Genetic Algorithms to select the most optimum protocol based on the network context. Comprehensive performance models of three MANET routing protocols (AODV, DSR and OLSR) were built based on the Neuro-Fuzzy Inference System. Representative MANET scenarios, with different number of nodes and mobility schemes, were tested by means of simulations. Findings indicated considerable reduction in packets delay and data load when IMAN was utilized.","PeriodicalId":208094,"journal":{"name":"2010 17th International Conference on Telecommunications","volume":"183 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124639356","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mahmoud Elsaadany, T. Khattab, M. Hasna, M. Abdallah, Mohamed S. Khairy
{"title":"Priority-based scheduling for limited energy cognitive relaying","authors":"Mahmoud Elsaadany, T. Khattab, M. Hasna, M. Abdallah, Mohamed S. Khairy","doi":"10.1109/ICTEL.2010.5478826","DOIUrl":"https://doi.org/10.1109/ICTEL.2010.5478826","url":null,"abstract":"We study the problem of cognitive relaying with limited-energy constraint in opportunistic spectrum access cognitive networks. Under this network setting, the cognitive user increases the spectrum availability for its own packets by relaying the unsuccessfully transmitted packets of the licensed user. We develop scheduling strategy at the cognitive user that maintains a strict spectrum access priority for licensed user packets and improves the average transmission delay for the cognitive and primary users. We study the effect of the relative location of the cognitive node with respect to the licensed user and its primary destination on the average transmission delay of both cognitive and primary users as well as the lifetime of the cognitive user. Our results show that there exists a tradeoff between average packet delay of the cognitive and primary users and lifetime of the cognitive user with respect to the cognitive user location. In particular, we demonstrate that there exists an optimal cognitive relay location that minimizes the average transmission delay of the primary packets.","PeriodicalId":208094,"journal":{"name":"2010 17th International Conference on Telecommunications","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114197644","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An enhanced heuristic technique for AP selection in 802.11 handoff procedure","authors":"A. Rebai, M. F. Rebai, H. Alnuweiri, S. Hanafi","doi":"10.1109/ICTEL.2010.5478848","DOIUrl":"https://doi.org/10.1109/ICTEL.2010.5478848","url":null,"abstract":"We study the problem of next Access Point (AP) selection in IEEE 802.11 wireless LANs (WLANs) operating in infrastructure mode. In a large wireless network with multiple collocated APs, it is necessary for a Mobile Station (MS) to perform an effective next-AP selection as part of a successful handoff process. Most of the algorithms proposed for this problem use only the received signal strength indicator (RSSI), may cause all the MS to be associated to AP without taking into account geographical constraints, and result in an overall network performance degradation. In this paper we propose a heuristic model to enhance the choice of the next AP from the actual neighbor APs. From available APs, the new technique will not select the next one based only on RSSI measurements but also on other new added factors to perform a valuable handoff for the actual MS.","PeriodicalId":208094,"journal":{"name":"2010 17th International Conference on Telecommunications","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114430770","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Asad, M. Zafrullah, Muhammad Khawar Islam, M. Amin
{"title":"Development of short backfire antenna fed by H-shaped excitation structures","authors":"M. Asad, M. Zafrullah, Muhammad Khawar Islam, M. Amin","doi":"10.1109/ICTEL.2010.5478793","DOIUrl":"https://doi.org/10.1109/ICTEL.2010.5478793","url":null,"abstract":"Cross aperture patch excitation structure of short backfire antenna blocks radiations between primary reflector and sub-reflector and provides non reconfigurable circular polarization (CP) characteristics. H-shaped cross dipole excitation structure for short backfire antenna is presented in this paper. The cross dipole consists of two orthogonal H-shaped dipoles. This excitation structure reduces blockage of radiations between sub-reflector and primary reflector and provides reconfigurable circular polarization characteristics. H-shaped cross dipole is mounted on the outer conductor of the slotted coaxial line. Based on this excitation structure, different other excitation structures are developed to get elliptical, linear polarizations, and dual impedance bandwidth characteristics of the antenna. The antenna is developed on elliptical ground plane with inexpensive dielectric and metallic rims. It is demonstrated that H-shaped cross dipole excited short backfire antenna can achieve voltage standing wave ratio bandwidth of 21.28% for 2:1 VSWR, axial ratio of 0.82 dB with axial ratio (≤ 3dB) bandwidth of 2.34% and a gain of 12 dBi. The simulation and experimental results are presented and discussed.","PeriodicalId":208094,"journal":{"name":"2010 17th International Conference on Telecommunications","volume":"97 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123861668","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Skrzypczak, Y. Louët, C. Lehobey, Stéphane Molton, Olivier Rousset
{"title":"Improving a DVB-T/H modulator performance by using Deep Clipping","authors":"A. Skrzypczak, Y. Louët, C. Lehobey, Stéphane Molton, Olivier Rousset","doi":"10.1109/ICTEL.2010.5478741","DOIUrl":"https://doi.org/10.1109/ICTEL.2010.5478741","url":null,"abstract":"This paper aims to overcome the salient deficiency of Orthogonal Frequency Division Multiplexing (OFDM) modulation, namely its high Peak to Average Power Ratio (PAPR). This study is carried out in Digital Video Broadcasting (DVB) context. By first mitigating PAPR with Deep-Clipping solution, the paper dwells on tradeoffs between Modulation Error Rate (MER) and Power Spectral Density (PSD). It is revealed that the proposed technique is very simple and fits DVB standard requirements very well. This solution has been recently successfully implemented in DVB terrestrial and portable modulators.","PeriodicalId":208094,"journal":{"name":"2010 17th International Conference on Telecommunications","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121755040","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"ICA-based blind symbol detection for compound system MIMO-OFDM in CDMA context","authors":"A. Hamza, E. Meftah, S. Chitroub, R. Touhami","doi":"10.1109/ICTEL.2010.5478756","DOIUrl":"https://doi.org/10.1109/ICTEL.2010.5478756","url":null,"abstract":"Independent Component Analysis (ICA) based method for detection in the compound system MIMO-OFDM and in the context of CDMA is proposed. ICA algorithm is used as a post processor attached to a subspace based CDMA receiver. The proposed architecture of receiver reduces the bias caused by the channel noise and further decreases the noise by dimensionality reduction. A downlink CDMA based MIMO-OFDM channel is investigated given that only the code of the wanted mobile user is known. So, the blind symbol separation is then performed with the proposed receiver. We compare the proposed receiver and the ICA ability to the conventional matched filter, the well-known linear MMSE receiver, the ZF detector. The obtained simulation results for the Additive White Gaussian Noise (AWGN) channel demonstrate that the proposed scheme achieves significant Bit Error Rate (BER) performance and is suitable for CDMA based MIMO-OFDM system.","PeriodicalId":208094,"journal":{"name":"2010 17th International Conference on Telecommunications","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116926423","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Peixoto, M. J. Santana, J. C. Estrella, T. C. Tavares, B. Kuehne, R. Santana
{"title":"A Metascheduler architecture to provide QoS on the cloud computing","authors":"M. Peixoto, M. J. Santana, J. C. Estrella, T. C. Tavares, B. Kuehne, R. Santana","doi":"10.1109/ICTEL.2010.5478877","DOIUrl":"https://doi.org/10.1109/ICTEL.2010.5478877","url":null,"abstract":"In this paper, a Metascheduler architecture is proposed to be used on Cloud Computing environments. The aim of this Metascheduler architecture is to handle the submission of a service and to manage the infrastructure of the Grid resources belonging to the Cloud. Futhermore, this Metascheduler also aims of building the best pool of available resources for the implementation of the requests issued by a user. For this, an economy model based in approach of supply/demand is adopted. Additionally, it is proposed in this paper a novel approach for the communications between pairs of entities of the collaborative environment. This communications is implemented through the hierarchical P2P scheme, a model that extend the hierarchical model. The central idea on this model is the use of the upper level Metascheduler (named Superscheduler) to control partial overload and to impose performance under service demand.","PeriodicalId":208094,"journal":{"name":"2010 17th International Conference on Telecommunications","volume":"176 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115005913","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}