{"title":"Realization ofUNB System Based on FIR Filter","authors":"Liang Bin, Zou Weixia, Zhou Zheng, Song Qijun","doi":"10.1109/ISCIT.2008.4700180","DOIUrl":"https://doi.org/10.1109/ISCIT.2008.4700180","url":null,"abstract":"Ultra-narrow-band communications system can greatly improve the spectrum utilization efficiency, therefore it will ease the tension of spectrum. Unfortunately, arguments from academia still focus on its principle as well as the realization. UNB transmission system based on the FIR filter has been explored in this paper. The characteristic of UNB signal after the FIR filter was analyzed. Then information recovery has been performed using maximum likelihood receiver. The rationality of using the energy of continuous spectral side-lobe has also been discussed. As simulation has showed, if the bandwidth of RF filter is equal to the signal's NYQUIST'S bandwidth, the BER performance of UNB transmission system is only 1dB poorer than BPSK when BER dropped to 10-5, while the spectrum utilization efficiency can exceed 100bits/s/Hz.","PeriodicalId":215340,"journal":{"name":"2008 International Symposium on Communications and Information Technologies","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131619639","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Current-Controlled CCTA-Based Novel Current-Mode Schmitt Trigger and Its Application","authors":"M. Siripruchyanun","doi":"10.1109/ISCIT.2008.4700226","DOIUrl":"https://doi.org/10.1109/ISCIT.2008.4700226","url":null,"abstract":"This article presents a new current-mode Schmitt trigger based on MO-CCCCTA (multiple-output current controlled current conveyor transconductance amplifier). The circuit description is very simple, its construction consists of only single MO-CCCCTA, without any external passive element. The hysteresis and amplitude of the output current can be tuned independently/electronically by input bias currents. With mentioned features, it is very suitable to realize in a monolithic chip. The application as a square-wave generator is given here to display the usefulness of the presented Schmitt trigger. The PSPICE simulation results are depicted, and agree well with the theoretical anticipation. The maximum power consumption is approximately 92.5 muW at plusmn1.5 V power supply voltages.","PeriodicalId":215340,"journal":{"name":"2008 International Symposium on Communications and Information Technologies","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115683533","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Pulse Wave Propagation in Bistable Oscillator Arrays under Both Fluctuation and Noise","authors":"T. Endo, K. Shimizu","doi":"10.1109/ISCIT.2008.4700241","DOIUrl":"https://doi.org/10.1109/ISCIT.2008.4700241","url":null,"abstract":"In this paper, we investigate pulse wave propagation phenomenon in a ring of a large number of coupled bistable oscillators. In particular, we focus our attention to such a practical condition that each oscillator has a slightly different intrinsic oscillation frequency in addition to noise. We elucidate numerically that the propagating pulse can be observed by increasing the the coupling strength even for such a practical condition. Moreover, we present the interaction phenomena between two pulses and confirm pulse unification, vanishing, repulsion and passing through phenomena.","PeriodicalId":215340,"journal":{"name":"2008 International Symposium on Communications and Information Technologies","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115872589","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Scintillation in Ku-Band on Earth-Space Paths with Different Locations and Elevation Angles","authors":"K. Southisombath, P. Satahack, T. Wakabayashi","doi":"10.1109/ISCIT.2008.4700267","DOIUrl":"https://doi.org/10.1109/ISCIT.2008.4700267","url":null,"abstract":"This paper presents the measurement results of tropospheric scintillation at frequency Ku band with different locations and elevation angles. The number of occurrence time of satellite signal fluctuations from three sites are compared. The results show that there is a good correlation between the daily temperature and the scintillation occurrence time. The occurrence time of scintillation increases when the daily temperature increases. The maximum value is taken around 14:00 where the daily maximum temperature is occurred and the minimum value during nighttime to early morning where the daily temperature is low.","PeriodicalId":215340,"journal":{"name":"2008 International Symposium on Communications and Information Technologies","volume":"145 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116555738","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design and Implementation of the Thai language voice recognition system for the private phonebook service on the telephony network","authors":"S. Sriratanaprapahd, K. Songwatana","doi":"10.1109/ISCIT.2008.4700197","DOIUrl":"https://doi.org/10.1109/ISCIT.2008.4700197","url":null,"abstract":"This paper reports the implementation of the voice recognition system for the private phonebook service on the telephony network. The system used an intelligent network (IN) [1] to provide the entry functionalities; call control, charging, subscriber data enquiry, play voice prompt and record voice file. The voice recognition core is iSpeech [2] developed by National Electronics and Computer Technology Center (NECTEC). The integration solution: new call flow and service logic in service control point (SCP) and HTTP client are implemented.","PeriodicalId":215340,"journal":{"name":"2008 International Symposium on Communications and Information Technologies","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122387982","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Concept Extraction from Conversational Speech using Segment Graphs","authors":"S. Tangruamsub, P. Punyabukkana, A. Suchato","doi":"10.1109/ISCIT.2008.4700195","DOIUrl":"https://doi.org/10.1109/ISCIT.2008.4700195","url":null,"abstract":"In this paper, a concept extraction method, an important element in spoken dialog systems when the nature of users' spoken queries are unstructured, is proposed and tested in a Thai automated international telephone call inquiry service. The method unifies concept constraints with other constraints, ranging from acoustic to language constraints, in a single segment-based probabilistic framework. With concept knowledge available, un-recalled keywords are reduced by 37%. Regarding concept extraction and goal identification, the proposed method is shown to be superior to the baseline system. Concepts are extracted at more than 80% of both recall and precision rates.","PeriodicalId":215340,"journal":{"name":"2008 International Symposium on Communications and Information Technologies","volume":"125 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126015632","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Restoration Method for Images Including Lost Pixels based on A Similarity between A Local Region and A Neighbor Region of A Lost Pixel","authors":"H. Imamura, M. Fujimura, H. Kuroda","doi":"10.1109/ISCIT.2008.4700213","DOIUrl":"https://doi.org/10.1109/ISCIT.2008.4700213","url":null,"abstract":"In the field of image restoration of unnecessary regions, a method based on optical flow has been proposed. This method can accurately restore unnecessary regions in case of changing of edge direction or of plural edges in unnecessary regions. However, when continuity of intensity between a pixel in unnecessary regions and its neighboring pixels is not satisfied, the method can not accurately restore unnecessary regions. In this paper, to solve the problem, we propose a method based on similarity between a local region and a neighboring region of a lost in unnecessary regions.","PeriodicalId":215340,"journal":{"name":"2008 International Symposium on Communications and Information Technologies","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124031813","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Remote Host Fingerprinting based on Clock Skew","authors":"H. Kikuchi, Y. Tominaga, Y. Tanaka","doi":"10.1109/ISCIT.2008.4700187","DOIUrl":"https://doi.org/10.1109/ISCIT.2008.4700187","url":null,"abstract":"This paper studies some properties of clock skews as means of remote hosts fingerprinting. There are several attempts for fingerprinting device from the captured packets so far, e. g., TCP timestamp, IP timestamp, and NTP. Our contribution is the experimental results in terms of the ICMP timestamps, which allow us to identify the upper bound for the number of distinguishable hosts with respects to a period of time. Based on the experiment, we clarify that the clock skew are uniformly distributed depending on machines, and the fluctuation in clock skews for any single hosts is negligibly small in comparison of the variance of clock skews for distinct hosts. In addition, we show that the upper bound of number of unique hosts can be improved by increasing the duration for observation under an assumption of normal distribution of clock skews and the birthday paradox.","PeriodicalId":215340,"journal":{"name":"2008 International Symposium on Communications and Information Technologies","volume":"102 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131259792","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Design of Reversible BCD Digit Adders: Decreasing the Depth of Circuit","authors":"F. Naderpour, A. Vafaei","doi":"10.1109/ISCIT.2008.4700204","DOIUrl":"https://doi.org/10.1109/ISCIT.2008.4700204","url":null,"abstract":"Reversible circuits, nowadays, have found grounds in many applications such as low power CMOS design and quantum computing. In reversible circuit design, decreasing three parameters is of interest: quantum cost, depth of the circuit and the number of garbage outputs. On the other hand, recently, decimal computer arithmetic, for the sake of its preciseness, gains popularity. Given that the BCD digit adder is the basic unit in decimal arithmetic, in this paper we propose a new reversible design for this unit with the aim of minimizing the depth of the circuit. Furthermore, we show that the proposed designing method can be applied to any other reversible circuit for reaching the minimum depth.","PeriodicalId":215340,"journal":{"name":"2008 International Symposium on Communications and Information Technologies","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114514665","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Robust Beamforming Based Interference Control Technique and its Performance for Cognitive Radios","authors":"K. Cumanan, R. Krishna, V. Sharma, S. Lambotharan","doi":"10.1109/ISCIT.2008.4700145","DOIUrl":"https://doi.org/10.1109/ISCIT.2008.4700145","url":null,"abstract":"Cognitive radios have the ability to efficiently utilize the spectrum, by intelligently sensing absence of licensed users and transmitting signal through the frequency bands that are not occupied. Spatial diversity techniques at the cognitive base station could further help in controlling the interference temperature levels of the licensed users when signals are transmitted to unlicensed users. This paper analyses performance of such interference control techniques in terms of bit error rate of the licensed and unlicensed users and proposes a worst-case performance optimization based robust technique to mitigate effect of inaccurate channel state information (CSI) on the performance of both the licensed and unlicensed users. We use an ellipsoid based convex hull for the CSI errors and demonstrate robust technique has the ability to force the interference temperature of the licensed users below a target value all the time, while the non robust technique does not satisfy this target most of the time.","PeriodicalId":215340,"journal":{"name":"2008 International Symposium on Communications and Information Technologies","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134002051","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}