{"title":"Dynamic traffic prioritization scheme for multihop tactical networks","authors":"Dongho Lee, Kwangsung Ju, K. Chung","doi":"10.1109/ISCIT.2011.6089960","DOIUrl":"https://doi.org/10.1109/ISCIT.2011.6089960","url":null,"abstract":"Multihop tactical network applications require that mission-critical data should be guaranteed to be delivered to their corresponding targets in time. However, end-to-end QoS (Quality of Service) assurance in multihop networks is a very challenging topic. Several schemes have been proposed to provide end-to-end delay assurance for multihop wireless network environment. However, these schemes do not consider the situation that the network is overloaded and burst collision is occurred. In this paper, we propose the dynamic traffic prioritization scheme for multihop tactical networks. The proposed scheme dynamically assigns priorities to traffic according to network status and the newly defined traffic categories in order to achieve guaranteed end-to-end QoS in multihop tactical networks. In addition, when the burst collision is occurred, the proposed scheme satisfies the requirement of mission-critical data by sacrificing the QoS requirement of non-mission-critical data.","PeriodicalId":226552,"journal":{"name":"2011 11th International Symposium on Communications & Information Technologies (ISCIT)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132746133","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Optimal power control for secondary system based on spectrum sharing","authors":"Xiaozhi Gao, Weijia Lei, Xianwei Xie","doi":"10.1109/ISCIT.2011.6092189","DOIUrl":"https://doi.org/10.1109/ISCIT.2011.6092189","url":null,"abstract":"In this paper, the optimal power control strategies under four different types of power constraints are derived via convex optimization to maximize the ergodic capacity of secondary system based on spectrum sharing while guaranteeing QoS of the primary system transmission. The interference from primary user to secondary system is simultaneously considered in the analysis process besides the interference from secondary user to primary system. It is shown that both the transmission power of primary user and different power constraint parameters affect the ergodic capacity of secondary system severely, furthermore, the proposed power control strategies outperform the existing schemes without considering the effects of the transmission power of primary user via the achievable capacities during the simulation results.","PeriodicalId":226552,"journal":{"name":"2011 11th International Symposium on Communications & Information Technologies (ISCIT)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131038016","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Proposal on the concealment of the network topology in IPv6","authors":"Toru Kuboshiki, Hidekazu Suzuki, A. Watanabe","doi":"10.1109/ISCIT.2011.6092167","DOIUrl":"https://doi.org/10.1109/ISCIT.2011.6092167","url":null,"abstract":"With a possible exhaustion of global IPv4 addresses, shifting to IPv6 is thought to be inevitable. However, when the shifting to IPv6 actually occurs, network topology could be inferred from addresses in the organization. Thus, as a means to conceal network topology, various methods, including the use of Mobile IPv6 and the setting-up of routers for host routes, are being proposed. However, redundant routings become a problem in the case of Mobile IPv6, and increases in the routing tables become a problem in the case of host routing. In this paper, we define new addresses to conceal network topology and propose a communication method using these addresses. We also describe our idea of implementing our method.","PeriodicalId":226552,"journal":{"name":"2011 11th International Symposium on Communications & Information Technologies (ISCIT)","volume":"134 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134106377","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A model for privacy policy agreement in online services","authors":"B. Bhumiratana","doi":"10.1109/ISCIT.2011.6089950","DOIUrl":"https://doi.org/10.1109/ISCIT.2011.6089950","url":null,"abstract":"Today, several online services are provided for free in exchange for the users private information/interaction online. It is common for these services on the internet to also act as data warehouse, gathering the usage information and all interaction of its users. The collection and dissemination of the data is governed by the service provider's privacy policy, which users must agree to prior to using the service. Once agreed to the policy, the user no longer has any say in regard to how the service provider uses the data. In this paper, we propose a model for 3 parties policy architecture that allows the consumer, the data warehouse, and a 3rd party service provider that want to use the data stored by the data warehouse to negotiate the privacy policy and the need to access the data. We propose an application architecture utilizing this policy model, and discuss how it can be used. Lastly, we discuss the dataset we perform simulation experiment on, and our findings.","PeriodicalId":226552,"journal":{"name":"2011 11th International Symposium on Communications & Information Technologies (ISCIT)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125576573","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Kanokphan Lertniphonphan, S. Aramvith, T. Chalidabhongse
{"title":"Human action recognition using direction histograms of optical flow","authors":"Kanokphan Lertniphonphan, S. Aramvith, T. Chalidabhongse","doi":"10.1109/ISCIT.2011.6089701","DOIUrl":"https://doi.org/10.1109/ISCIT.2011.6089701","url":null,"abstract":"Recognizing human actions is a challenging research area due to the complexity and variation of human's appearances and postures, the variation of camera settings, and angles. In this paper, we introduce a motion descriptor based on direction of optical flow for human action recognition. The directional value of a silhouette is divided into small regions. In each region, the normalized direction histogram of optical flow is computed. The motion vector is the values of a histogram in every region respective concatenation. The vectors are smoothed in time domain by moving average to reduce the motion variation and noise. For the training process, the motion vectors of the training set are clustered by K-mean to represent action. The clustered data group the similar posture together and is represented by the cluster centers. The centers are used to compare input frames by computing distance and using K-nearest neighbor to classify action. The experimental results show that K-mean clustering can group the similar pose together. The motion feature can be used to classify action in a low resolution image with a small number of reference vectors.","PeriodicalId":226552,"journal":{"name":"2011 11th International Symposium on Communications & Information Technologies (ISCIT)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114691732","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Coordinated multi-point transmission with limited feedback for LTE-advanced","authors":"Yan Li, J. Ge, Cheng Shen, Jing Li, Wang Miao","doi":"10.1109/ISCIT.2011.6092185","DOIUrl":"https://doi.org/10.1109/ISCIT.2011.6092185","url":null,"abstract":"Coordinated Multi-Point transmission (CoMP) has been recognized as one of the most promising technologies in the 4th generation (4G) cellular systems. It can significantly increase the spectral efficiency by combining the data from different eNBs. However, the benefits come at the cost of the increased feedback overhead. In the downlink frequency division duplex (FDD) systems, UEs need to feedback their channel state information (CSI) to the eNBs. As the feedback channel is limited, the quantization of the channel coefficients is necessary. In the conventional noncooperative networks, the feedback overhead can be reduced by allowing UEs with good channel qualities to feedback their CSIs, which is known as the selective feedback. In this paper, we extend this scheme to CoMP systems by the introduction of concatenated codebook. Since the quantization of the channel will result in quantization error, we define a new method to calculate the received SNRs from a specific channel taking quantization error into account. Based on this new method, UEs with weak link would not feedback the CSIs to the cooperative eNBs, which reduces the feedback overhead. We also derive the closed-form expression for the feedback overhead in terms of the SNR threshold. Finally, numerical simulations are provided to prove the effectiveness of our new method.","PeriodicalId":226552,"journal":{"name":"2011 11th International Symposium on Communications & Information Technologies (ISCIT)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125380542","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Peng Shao, A. Matsumoto, S. Aust, Tetsuya Ito, P. Davis
{"title":"A collision detection method based on power sensing and time-domain signal processing for wireless LAN","authors":"Peng Shao, A. Matsumoto, S. Aust, Tetsuya Ito, P. Davis","doi":"10.1109/ISCIT.2011.6089730","DOIUrl":"https://doi.org/10.1109/ISCIT.2011.6089730","url":null,"abstract":"Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) access control protocol is used in the wireless LAN (WLAN) to suppress interferences. According to the CSMA/CA, if the transmitter does not receive an acknowledgment (ACK) control frame from the receiver after transmission, it will assume the previous transmission has failed and repeat the transmission. In order to evaluate the transmission channel and optimize the transmission parameters for improving the efficiency of data transmission it is necessary to distinguish the reason for transmission failure — collisions or attenuation in the transmission channel. Some enhanced collision detection methods for IEEE 802.11 WLAN have been proposed. In these schemes, the exchange of detection information is necessary, which could lead to additional collisions. So the detection information itself might not be received correctly due to collisions. In this paper, we propose a novel collision detection method, based on signal power sensing and time-domain signal processing, for transmitting stations in WLAN, which does not require the feedback of information from the receiver. With the calculation of collision frequency, the transmission parameters can be adjusted to improve the efficiency of data transmission. The effectiveness of the proposed collision detection method is verified in an experiment.","PeriodicalId":226552,"journal":{"name":"2011 11th International Symposium on Communications & Information Technologies (ISCIT)","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116439105","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Constructing (k, r)-connected dominating sets for robust backbone in wireless sensor networks","authors":"Chan Zheng, Yiqing Zhang, Ling Yin","doi":"10.1109/ISCIT.2011.6089724","DOIUrl":"https://doi.org/10.1109/ISCIT.2011.6089724","url":null,"abstract":"Connected dominated subsets (CDS) of nodes in wireless sensor network are always selected to form a virtual backbone. Construction of r-hop connected k-dominating sets ((k, r)-CDS) can reduce the size of CDS and the total amount of information to be transmitted. Their multiple dominating properties can provide higher fault tolerance and robustness as well. In this paper a (k, r)-CDS construction approximation algorithm for wireless sensor and ad-hoc networks is presented. The main strategy is partition to clusters, from which the r-hop k-dominating set nodes ((k, r)-DS) are selected separately. Then (k, r)-DS are connected together to form (k, r)-CDS. Extensive simulations according to the algorithm steps have been conducted. Performance with detailed analysis has been shown at last.","PeriodicalId":226552,"journal":{"name":"2011 11th International Symposium on Communications & Information Technologies (ISCIT)","volume":"303 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114523936","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design and analysis of a MAC protocol for wireless body area network using wakeup radio","authors":"M. A. Ameen, N. Ullah, K. Kwak","doi":"10.1109/ISCIT.2011.6089719","DOIUrl":"https://doi.org/10.1109/ISCIT.2011.6089719","url":null,"abstract":"Wireless sensor networks are widely used for healthcare applications. A new field known as wireless body area networks (WBAN) has emerged to support this area. An energy efficient medium access control (MAC) protocol can increase the performance of such a network. The major requirements for a WBAN MAC protocol are energy efficiency and low delay. In this paper, we propose a MAC protocol for WBAN using wakeup radio mechanism. We present a detailed analytical model for both energy consumption and delay. We have simulated the proposed MAC and compared the results. It is found that the proposed MAC has improved the performance in terms of energy consumption and delay.","PeriodicalId":226552,"journal":{"name":"2011 11th International Symposium on Communications & Information Technologies (ISCIT)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115061374","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A novel MIMO relay FM-DCSK UWB system for low-rate and low-power WPAN applications","authors":"Yi Fang, Shaohua Hong, L. Wang","doi":"10.1109/ISCIT.2011.6089721","DOIUrl":"https://doi.org/10.1109/ISCIT.2011.6089721","url":null,"abstract":"In this paper, we propose a novel multi-access multiple-input multiple-output (MIMO) relay frequency-modulated differential chaos shift keying (FM-DCSK) ultra-wideband (UWB) system with decode-and-forward (DF) relaying protocol, where the relay intelligently employs multiple antennas to greatly strengthen the robustness against signal fading in wireless networks. Simulation results show that the bit error rate (BER) performance of the proposed system is remarkably better than the conventional multi-access FM-DCSK UWB systems under indoor residential environments of the IEEE 802.15.4a standard by means of obtaining the spatial diversity gain. Furthermore, the influence of antenna number of relay to the proposed system is also investigated to provide a good compromise between the system performance and implementation complexity. For these advantages above, the proposed system can be seen as a viable alternative to other FM-DCSK UWB schemes for the low-rate and low-power applications in wireless personal area networks (WPAN).","PeriodicalId":226552,"journal":{"name":"2011 11th International Symposium on Communications & Information Technologies (ISCIT)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121165585","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}