{"title":"Soft-output MIMO MMSE V-BLAST detector under ML channel estimation and channel correlation","authors":"Jun Wang, Shaoqian Li","doi":"10.1109/ICCS.2008.4737350","DOIUrl":"https://doi.org/10.1109/ICCS.2008.4737350","url":null,"abstract":"In practical wireless multiple-input multiple-output (MIMO) communications system, the channel estimation must be imperfect. Unfortunately, the channel estimation errors have not been taken into account by existing soft-output MIMO minimum mean square error (MMSE) vertical Bell lab space time (VBLAST) detectors when calculating the log-likelihood ratio (LLR) of each coded bit, i.e., the soft information. As a result, the system performance can be significantly degraded. In this paper, we propose a novel soft-output MIMO MMSE V-BLAST detector based on random vector theorem, which takes the estimation error of maximum likelihood (ML) MIMO channel estimation and receiver spatially channel correlation into account in the computation of the MMSE filter and LLR of each coded bit. When compared with existing MIMO MMSE V-BLAST detectors, our simulation results show that the proposed novel detector can obtain significant performance gain.","PeriodicalId":208126,"journal":{"name":"2008 11th IEEE Singapore International Conference on Communication Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126134573","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A GTP stateful inspection method based on network processor","authors":"Xiaoli Zhang, Yue Lai, S. Xie","doi":"10.1109/ICCS.2008.4737332","DOIUrl":"https://doi.org/10.1109/ICCS.2008.4737332","url":null,"abstract":"GPRS tunnelling protocol (GTP) is the protocol used in general packet radio service (GPRS) Core network, and it will also be used in the 3rd Generation (3G) network. In view of that few study concerns about GTP stateful inspection at present, this paper introduces a method of GTP stateful inspection on the foundation of analyzing the GTP protocol and provides the implementation of the method based on Intel network processor IXP28xx. In the implementation, the method employs a data structure adapting to the memory managing and accessing of the network processor. Furthermore, a new hash algorithm named hash_fold_16_4 algorithm is put forward to achieve fast index to the data structure. Experiment results show that the method is practicable and effective.","PeriodicalId":208126,"journal":{"name":"2008 11th IEEE Singapore International Conference on Communication Systems","volume":"15 5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126158286","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Burst mode cooperative mac Protocol in ad hoc wireless networks","authors":"D. Tung, Chong Wong, C. Tham","doi":"10.1109/ICCS.2008.4737388","DOIUrl":"https://doi.org/10.1109/ICCS.2008.4737388","url":null,"abstract":"Cooperative medium access control (MAC) protocols make use of the multi-rate capabilities of IEEE 802.11 to achieve higher throughput and shorter delay. This is achieved through transmitting a packet via a helper node by means of a faster two-hop links rather than a slower direct one-hop link. The cooperative MAC protocol transmits only one packet from the source node for each successful transmission attempt in the channel. In this paper, we extend this cooperative MAC protocol such that it is capable of transmitting multiple packets for each successful transmission attempt in the channel in an ad hoc wireless network. Furthermore, two traffic classes are considered. We call this new proposed MAC protocol as burst mode cooperative MAC. The key idea here is to maximize the successful channel access by transmitting a number of data packets instead of just one data packet as long as the overall data transmission time of multiple packets for the two-hop links is shorter or equal to the slower one-hop data transmission time of multiple packets. This cuts down the channel contention time for transmitting each packet and improves the header-to-payload overheads. Performance metrics like throughput and delay are considered. These performance metrics are evaluated via simulation. Numerical results show that the throughput of the proposed burst mode cooperative MAC can be up to 20% better than that of cooperative MAC, while the delay is still better than IEEE 802.11b MAC.","PeriodicalId":208126,"journal":{"name":"2008 11th IEEE Singapore International Conference on Communication Systems","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123248647","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A multiple home agent deployment scheme to enhance service availability for MIPv6","authors":"Hanwen Zhang, Chao Ma, Yujun Zhang, Zhongcheng Li","doi":"10.1109/ICCS.2008.4737417","DOIUrl":"https://doi.org/10.1109/ICCS.2008.4737417","url":null,"abstract":"In MIPv6, the home agent (HA) is the key entity to ensure a mobile node¿s (MN) reachability. A single HA on the home link will become a performance bottleneck and single point of failure. This paper proposes a Multiple HA Deployment Scheme (MHADS) comprising a dynamic load balancing mechanism based on active overloading prevention and a MN-unaware fault-tolerance mechanism. The results of simulation show that, MHADS can be more efficient in enhancing service availability and improving system performance as compared with the previous mechanisms, when the home link is under different load situations as well as in the presence of HA failure.","PeriodicalId":208126,"journal":{"name":"2008 11th IEEE Singapore International Conference on Communication Systems","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125312312","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yang Feng, Sun Xiaohuan, Chen Guoyue, Wen Tiexiang
{"title":"An improved hybrid model for medical image segmentation","authors":"Yang Feng, Sun Xiaohuan, Chen Guoyue, Wen Tiexiang","doi":"10.1109/ICCS.2008.4737206","DOIUrl":"https://doi.org/10.1109/ICCS.2008.4737206","url":null,"abstract":"An improved hybrid model (FCM_MS) for medical image segmentation is proposed by combining fuzzy C-means (FCM) clustering and Mumford-Shah (MS) algorithm. In the proposed model, fuzzy membership degree from FCM clustering is firstly used to initialize the contour placement, and then incorporated into the fidelity term of the 2-phase piecewise constant MS model to obtain multi-object segmentation. Meanwhile penalizing energy term is introduced into the energy functional to eliminate re-initialization of level set and thus to fasten convergent speed on curve evolution. Experimental results show that the proposed model has advantages both in accuracy and in robustness to noise in comparison with the standard FCM or the classical MS model on medical image segmentation.","PeriodicalId":208126,"journal":{"name":"2008 11th IEEE Singapore International Conference on Communication Systems","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122686117","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A normalized LLR soft information demapping method in DTMB system","authors":"Linqi Song, Jun Wang, Changyong Pan, J. Fu","doi":"10.1109/ICCS.2008.4737392","DOIUrl":"https://doi.org/10.1109/ICCS.2008.4737392","url":null,"abstract":"This paper presents a normalized demapping method with application to the digital terrestrial multimedia broadcasting (DTMB) system. Normalized logarithm likelihood ratio (NLLR) soft information is computed using this new method in which a normalization factor is proposed. Two ways of determining this factor are illustrated and simulation results show that it performs well with comparison to other factors under 16QAM constellation in additive white gaussian noise (AWGN) and fading channels respectively.","PeriodicalId":208126,"journal":{"name":"2008 11th IEEE Singapore International Conference on Communication Systems","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122613377","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A new way to detect DDoS attacks within single router","authors":"Ruoyu Yan, Q. Zheng, Guolin Niu, Sheng Gao","doi":"10.1109/ICCS.2008.4737371","DOIUrl":"https://doi.org/10.1109/ICCS.2008.4737371","url":null,"abstract":"Different from other research work focusing on network-wide traffic, the traffic we focus on for analysis is that of a traffic state viewed from a router¿s interior. In this paper, at first, a kind of Port-to-Port traffic in a router is introduced, which we call IF flow. IF flows can amplify the ratio of attack traffic to normal traffic. Then RLS (recursive least square) filter is used to predict IF flows. After that, a statistical method using residual filtered process is proposed to detect anomalies. Finally we respectively apply the method to three types of traffics: IF flows, input links and output links within a router, and compare the anomaly detection results using ROC curves. Results show that IF flows are more powerful than input links and output links in DDoS attacks detection.","PeriodicalId":208126,"journal":{"name":"2008 11th IEEE Singapore International Conference on Communication Systems","volume":"153 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116731158","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A fast method for downlink cell search in TD-SCDMA","authors":"Wei Jian, Jianguo Yu, Jianxin Wang, Lin Wang","doi":"10.1109/ICCS.2008.4737447","DOIUrl":"https://doi.org/10.1109/ICCS.2008.4737447","url":null,"abstract":"TD-SCDMA cell search is performed in three scenarios: downlink guide slot (DwPTs) position search, downlink synchronization code (SYNC_DL) position search and frame synchronization control. A fast method for every scenarios of downlink cell search in TD-SCDMA is proposed. Based on characteristics of frame and slot structure in TD-SCDMA, power-matching stencil method is used to find the position of downlink guide slot (DwPTs) and definition stencil method is proposed to decide the position of downlink synchronization code (SYNC_DL). Moreover, the problem of channel estimation for TD-SCDMA mobile communication system is investigated and a new fast method for detecting downlink guide channel is derived to control frame synchronization. This new method simplifies calculation complexity, realizes fast and high efficiency network test system and can be applied to TD-SCDMA network planning and optimization. The conclusion can be proved by simulations and field testing which are mentioned.","PeriodicalId":208126,"journal":{"name":"2008 11th IEEE Singapore International Conference on Communication Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117013506","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yongli Zhao, Jie Zhang, Dahai Han, Lei Wang, Yu Yao, W. Gu, Yuefeng Ji
{"title":"Research on the complex mechanism and control strategy of transport adaptability in all-optical networks","authors":"Yongli Zhao, Jie Zhang, Dahai Han, Lei Wang, Yu Yao, W. Gu, Yuefeng Ji","doi":"10.1109/ICCS.2008.4737280","DOIUrl":"https://doi.org/10.1109/ICCS.2008.4737280","url":null,"abstract":"This paper analyzes the development tendency of optical networks under multi-service in the future, proposes an original ideology of transport adaptability in reconfigurable all-optical networks, researches on the key techniques of the complex coupling mechanism and dynamic controlling in the process of selecting lightpaths and tuning, such as the architecture of complex adaptability system (CAS) in all-optical networks, the transmission performance model and tuning algorithms, the transport adaptability strategy and protocol extension solution, the system simulation and modeling algorithm in complex all-optical networks. Interdiscipline is the main character of the research method in the paper in which the complex system theory is first introduced into optical networks, providing the scientific support for the new research direction of complex all-optical networks.","PeriodicalId":208126,"journal":{"name":"2008 11th IEEE Singapore International Conference on Communication Systems","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128376758","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Connecting trapped civilians to a wireless ad hoc network of emergency response robots","authors":"G. Loukas, S. Timotheou","doi":"10.1109/ICCS.2008.4737254","DOIUrl":"https://doi.org/10.1109/ICCS.2008.4737254","url":null,"abstract":"During a disaster, communications are usually impaired. In order for the rescuers and endangered civilians to communicate, we suggest the use of mobile robots that can act as wireless routers. We describe how they can locate trapped civilians and initiate an ad hoc network connection between them and the rescuers, so that the latter can better assess the situation and plan the rescue operation accordingly. The novel problem that arises is the optimal allocation of these robots so that they connect as many civilians as possible, while maintaining their multi-hop connection with a static wireless sink that represents the group of rescuers. We present a centralised formulation, which stems from a combination of characteristics typically found in assignment and network flow optimisation problems. We consider both exact locations for the civilians and uncertain locations with a probabilistic representation. We also present a distributed heuristic with which the robots start from the location of the sink and move autonomously trying to connect the civilians while maintaining connectivity. We evaluate our distributed heuristics in a building evacuation simulator and compare them with the centralised approach.","PeriodicalId":208126,"journal":{"name":"2008 11th IEEE Singapore International Conference on Communication Systems","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130320085","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}