{"title":"Proposal and implementation of a system to remotely watch the health conditions of elderly persons","authors":"Hiroyuki Yamagishi, Daichi Kato, Kazunori Teshima, Hidekazu Suzuki, Osami Yamamoto, A. Watanabe","doi":"10.1109/ISCIT.2011.6089965","DOIUrl":"https://doi.org/10.1109/ISCIT.2011.6089965","url":null,"abstract":"In Japan, senior citizen population is rapidly increasing as a result of the progress in super-aging society, while many younger generation people live separately from their elderly relatives under the current societal environment. Nevertheless, young people often have a desire for constantly watching health conditions of their elderly relatives even remotely. In this paper, we propose a system to constantly trace the moves of elderly people and accumulate the information obtained through Smart-Phone in the management server so that watchers (families and/or relatives) are able to cope with the situation urgently, should any abnormal conditions be detected. We have implemented part of our proposed system and confirmed the effectiveness of the system.","PeriodicalId":226552,"journal":{"name":"2011 11th International Symposium on Communications & Information Technologies (ISCIT)","volume":"97 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115666371","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Call admission control policy for multiclass traffic in heterogeneous wireless networks","authors":"Shusmita Anwar Sharna, M. R. Amin, M. M. Murshed","doi":"10.1109/ISCIT.2011.6089966","DOIUrl":"https://doi.org/10.1109/ISCIT.2011.6089966","url":null,"abstract":"An increasing demand for wireless access to packet-based services has, in turn, driven the need for call admission control strategies to make network roaming more seamless. This paper investigates the optimal call admission control (CAC) policy for heterogeneous wireless networks based on Markov Decision Process (MDP) and Value Iteration Algorithm (VIA). We concentrate on the optimization problems of when different type of calls (i.e., new calls, vertical handoff calls, and horizontal handoff calls) can be admitted into the system where each call may have single or multiple channel requirements (multiclass). Experimental results confirm that the proposed technique can effectively control call admission of a highly dynamic heterogeneous system, which will be crucial for accommodating vertical handoff decision algorithms.","PeriodicalId":226552,"journal":{"name":"2011 11th International Symposium on Communications & Information Technologies (ISCIT)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123660944","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Near-maximum-likelihood detection in spatially correlated MIMO systems using semi-definite relaxation with cutting planes","authors":"Peng Sun, Xing Yang, Daoben Li, Li Fang","doi":"10.1109/ISCIT.2011.6089961","DOIUrl":"https://doi.org/10.1109/ISCIT.2011.6089961","url":null,"abstract":"In this paper, a new efficient scheme is proposed for the fast detection in spatially correlated MEMO systems. By adding cutting planes to the original semi definite relaxation scheme, the new method shows more robustness than other fast detection schemes towards the increasing condition number of the channel matrix, which is always caused by the correlation between different antennas. In order to prove its advancement, the bit error rate performance of the new scheme is compared with other detection schemes like lattice reduction, serial interference cancelation and the original semi definite relaxation. Simulation results show clearly that with the ill conditioned channel matrix, the new detection strategy outperforms the other schemes, while its complexity remains cubic to the number of antennas plus the number of cutting planes added.","PeriodicalId":226552,"journal":{"name":"2011 11th International Symposium on Communications & Information Technologies (ISCIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122879755","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Qin-long Qiu, Liang Zhao, Ling-di Ping, Chunming Wu, Qiang Yang
{"title":"Avoiding the evolved node B buffer overflow by using advertisement window control","authors":"Qin-long Qiu, Liang Zhao, Ling-di Ping, Chunming Wu, Qiang Yang","doi":"10.1109/ISCIT.2011.6089746","DOIUrl":"https://doi.org/10.1109/ISCIT.2011.6089746","url":null,"abstract":"In the Long Term Evolution (LTE) network, buffer overflows often occur in the evolved Node B (eNB) when dealing with the traffic bursts from the wired part due to restricted bandwidth or environmental interferences in the wireless part. In this paper, a novel approach is proposed to protect the buffer from overflow by appropriately controlling the advertisement window to enhance the Transmission Control Protocol (TCP) when the buffer becomes congested. The sender will slow down the data sending rate upon the receipt of reduced advertisement window, and hence the buffer overflow will be alleviated. To evaluate the suggested solution, a LTE network model is implemented and validated through extensive numerical experiments. It is demonstrated that the proposed approach can enhance the end to end system performance in terms of network throughput, average packet delay and jitter, as well as packet loss rate.","PeriodicalId":226552,"journal":{"name":"2011 11th International Symposium on Communications & Information Technologies (ISCIT)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125413156","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Daichi Kato, Hiroyuki Yamagishi, Hidekazu Suzuki, E. Konaka, A. Watanabe
{"title":"Proposal of a remote watching system utilizing a smartphone and sensors","authors":"Daichi Kato, Hiroyuki Yamagishi, Hidekazu Suzuki, E. Konaka, A. Watanabe","doi":"10.1109/ISCIT.2011.6089955","DOIUrl":"https://doi.org/10.1109/ISCIT.2011.6089955","url":null,"abstract":"There is an increasing tendency that elderly people live separately from their children or relatives with the advance of low-birth-rate, aging society and the changes in living environment. Under such circumstances, a number of systems to remotely watch vulnerable people by utilizing sensor devices and communication functions have been proposed. Existing systems to watch vulnerable people are, however, mainly aiming at health management or obtaining merely locational information of vulnerable people, and they are not able to perform a high-level observation to grasp the actual situation of those people. In this paper, we introduce a new system to remotely watch conditions of vulnerable people while they are walking or driving a car, by utilizing various types of sensors embedded in a smartphone. In our system, information obtained is periodically sent to and accumulated in the management server on the Internet, and watching people can observe their vulnerable relatives from anywhere and cope with emergency situations promptly.","PeriodicalId":226552,"journal":{"name":"2011 11th International Symposium on Communications & Information Technologies (ISCIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131236236","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
P. Phaneendra, C. Vudadha, Syed Ershad Ahmed, S. Veeramachaneni, N. Muthukrishnan, M. Srinivas
{"title":"Increment/decrement/2's complement/priority encoder circuit for varying operand lengths","authors":"P. Phaneendra, C. Vudadha, Syed Ershad Ahmed, S. Veeramachaneni, N. Muthukrishnan, M. Srinivas","doi":"10.1109/ISCIT.2011.6092152","DOIUrl":"https://doi.org/10.1109/ISCIT.2011.6092152","url":null,"abstract":"Algorithms based Media applications operate on operands of varying data lengths. Although much work has been done in designing adder and multiplier architectures which operate on varying data lengths, there has been little work on implementing other operations like increment/decrement, 2's complement etc. This paper presents an architecture which can perform increment/decrement/2's complement/priority-encode operations on varying data lengths. A 32-bit implementation of the proposed multifunctional architecture is presented, which can operate on four 8-bit operands, two 16-bit operands or one 32-bit operand.","PeriodicalId":226552,"journal":{"name":"2011 11th International Symposium on Communications & Information Technologies (ISCIT)","volume":"798 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120877172","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Green optical networks with availability guarantee","authors":"Shufang Tan, Xiaoning Zhang, Lemin Li, Sheng Wang","doi":"10.1109/ISCIT.2011.6092192","DOIUrl":"https://doi.org/10.1109/ISCIT.2011.6092192","url":null,"abstract":"In this paper, we study green (energy efficient) optical networks with availability guarantee. After introducing a power consumption model for green optical network design, we propose a design method called Availability-Guaranteed Energy-Efficient Design (AGEED). In AGEED, we employ dedicated path protection as backup capacity in order to improve the availability. Based on iterative routing by modifying link weight, we can make some resources be switched to sleep mode, thus obtain an energy-saving effect if there is no heavy traffic. Our simulation shows that AGEED is more advantageous to achieve energy-efficient purposes and guarantee satisfied availability levels in comparison with other methods.","PeriodicalId":226552,"journal":{"name":"2011 11th International Symposium on Communications & Information Technologies (ISCIT)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125258958","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Gengfa Fang, E. Dutkiewicz, M. A. Huq, R. Vesilo, Yihuai Yang
{"title":"Medical Body Area Networks: Opportunities, challenges and practices","authors":"Gengfa Fang, E. Dutkiewicz, M. A. Huq, R. Vesilo, Yihuai Yang","doi":"10.1109/ISCIT.2011.6089699","DOIUrl":"https://doi.org/10.1109/ISCIT.2011.6089699","url":null,"abstract":"Medical Body Area Network (MBAN) is a new wireless communications technology designed to sense human's vital signals through tiny nodes in, on and around the human body wirelessly. MBAN will play an important role in enabling ubiquitous and non-invasive telemetry and healthcare systems in the future. In this paper, we firstly explore the opportunities of MBAN from the point of new applications, and then we analyze the enabling technologies and challenges to achieve the goal of MBAN, which includes energy efficiency, robustness, high data rate for video support and network co-existence issues. Finally, we describe our MQWIN400 radio platform which was designed to work at 400MHz MICS band, as well as the related research activities and experimental results.","PeriodicalId":226552,"journal":{"name":"2011 11th International Symposium on Communications & Information Technologies (ISCIT)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127833163","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On the performance of dual-hop regenerative cooperative relaying of IR-UWB system","authors":"Yongjie Xu, Zhiquan Bai, K. Kwak","doi":"10.1109/ISCIT.2011.6089758","DOIUrl":"https://doi.org/10.1109/ISCIT.2011.6089758","url":null,"abstract":"In this paper, a dual-hop regenerative cooperative relaying UWB communication system with detect-and-forward (DTF) and decoded-and-forward (DF) is studied. The average system bit error rate (BER) and the system performance with DTF and DF relaying schemes are provided. The DF relaying with convolutional coding is employed in this cooperative relaying UWB system. The Gaussian quadrature numerical method is used to obtain the Moment-Generating Function (MGF) of the received energy. Our simulation results show the advantages of the DF based cooperative IR-UWB system over IEEE 802.15.3a channels.","PeriodicalId":226552,"journal":{"name":"2011 11th International Symposium on Communications & Information Technologies (ISCIT)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128957886","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A new CAC scheme based on adaptive SINR threshold using fuzzy logic for CDMA system","authors":"Jiping Li, Shixun Wu, Shouyin Liu","doi":"10.1109/ISCIT.2011.6089718","DOIUrl":"https://doi.org/10.1109/ISCIT.2011.6089718","url":null,"abstract":"Signal to interference plus noise ratio (SINR) based call admission control (CAC) scheme admits incoming calls as long as the measured SINR is higher than threshold value (SINRth). If a high value of SINRth is chosen, the signal quality will improve but this will increase the blocking probability (pb), and as a result, will decrease the network utilization. On the other hand, a low value of SINRth will reduce pb, however degrades the signal quality and increases outage probability (pout). Hence, how to choose appropriate SINRth is very important. In this paper, we focus on the following aspects. Firstly, an accurate upper bound of SINRth is derived. Secondly, based on the upper bound of SINRth and a lower bound from other literature, we design a fuzzy logic controller (FLC), which can adaptively adjust SINRth according to the number of active users (AUs) in a cell and average arriving traffic intensity (AATI) in Erlang per cell. Finally, network performance based on FLC is compared with that based on optimal fixed SINRth. Numerical results show that the proposed scheme based on FLC has better performance than the optimal fixed threshold CAC scheme.","PeriodicalId":226552,"journal":{"name":"2011 11th International Symposium on Communications & Information Technologies (ISCIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131387416","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}