{"title":"Frame duration and detection frequency in opportunistic spectrum access systems","authors":"Jun Sun, Hongbo Zhu","doi":"10.1109/ICCT.2010.5688629","DOIUrl":"https://doi.org/10.1109/ICCT.2010.5688629","url":null,"abstract":"In order to maximize the transmission throughput and quality of secondary users (SU) in an opportunistic spectrum access (OSA) systems operating under practical constraints of continuous collisions between the secondary and primary users (PU), we have studied the frame duration behavior and SU's detection frequency under difficult OSA interference and noise conditions. Having analyzed collisions from the SU point of view we first generate a mathematical modeling of the signal to interference and noise rate (SINR) for the SU then, an optimal frame duration is obtained by analyzing characteristics of the SINR in various OSA scenarios. For doing this we have defined the average detection frequency by analyzing the average fading duration of the SINR. This new approach provides a tradeoff between the collision and frequency efficiency as well as improving system's overall performance.","PeriodicalId":253478,"journal":{"name":"2010 IEEE 12th International Conference on Communication Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129874107","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A suboptimal pilot design for NC-OFDM systems","authors":"Youchang Zhang, Xiaodong Xu, Bin Chen, Xuchu Dai","doi":"10.1109/ICCT.2010.5688677","DOIUrl":"https://doi.org/10.1109/ICCT.2010.5688677","url":null,"abstract":"Equispaced and equipowered pilot tones have been proved the optimal pilot design for conventional orthogonal frequency division multiplexing (OFDM) systems, but it does not hold true for non-contiguous OFDM (NC-OFDM) systems. In this paper, the optimal pilot design is derived for NC-OFDM systems with available but non-contiguously distributed spectrum fragments. Based on minimizing the average mean square error (MSE) of the least square (LS) estimate of the channel frequency response (CFR) over the data subcarriers, we provide the optimal pilot placement and its power allocation algorithm. A suboptimal pilot placement scheme is also presented for decreasing the computational complexity. Simulation results indicate that significant gain can be achieved by using the proposed approach.","PeriodicalId":253478,"journal":{"name":"2010 IEEE 12th International Conference on Communication Technology","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128667610","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"WiMAX-WiFi unified network architecture, security, and mobility","authors":"L. Yi, Kai X. Miao","doi":"10.1109/ICCT.2010.5689224","DOIUrl":"https://doi.org/10.1109/ICCT.2010.5689224","url":null,"abstract":"In this paper, we focus on how WiMAX can be used in an enterprise environment under the assumption that a WiMAX network can be hosted by enterprise, together with existing WiFi networks. Three research questions naturally arise when we consider an enterprise wireless infrastructure built with WiMAX and WiFi - what an integrated wireless network architecture would look like, if it is possible to derive a unified security model for such an integrated network, and how unified seamless handoff can be realized between WiMAX and WiFi to support roaming of enterprise users. We will discuss these questions in detail based on our investigation in our research and present the results we have come up with so far.","PeriodicalId":253478,"journal":{"name":"2010 IEEE 12th International Conference on Communication Technology","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127347888","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Xingchuan Liu, Shenmin Zhang, Jinguo Quan, Xiaokang Lin
{"title":"The experimental analysis of outdoor positioning system based on fingerprint approach","authors":"Xingchuan Liu, Shenmin Zhang, Jinguo Quan, Xiaokang Lin","doi":"10.1109/ICCT.2010.5689160","DOIUrl":"https://doi.org/10.1109/ICCT.2010.5689160","url":null,"abstract":"In recent years, the demand of ubiquitous computing and location-based services (LBS) has risen. The most challenge in LBS is the location of mobile terminals. Existing location techniques have poor performance in urban environments due to severe multipath and NLOS propagation. Fingerprint localization based on wireless-LAN (WLAN) has been preferred for those types of environments. Although location fingerprinting has been researched in some previous works, there are only few studies that investigate the performance of outdoor positioning system according to physical parameters and the underlying environment. In this paper, we present an experimental analysis for outdoor fingerprinting system, implemented over the WLAN. On the basis of this experimental analysis, we demonstrate that it is indeed feasible to perform outdoor locating with reasonable accuracy using 802.11-based positioning. Secondly, we further work out certain crucial control parameters, which we can adopt to different cases and scenario, to achieve better positioning accuracy.","PeriodicalId":253478,"journal":{"name":"2010 IEEE 12th International Conference on Communication Technology","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129058439","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A dynamic load balancing algorithm in LAN","authors":"Huang Jie, Hua Bei, Huang Qiu-cen","doi":"10.1109/ICCT.2010.5689319","DOIUrl":"https://doi.org/10.1109/ICCT.2010.5689319","url":null,"abstract":"In network, the information-transfer time will be affected by communication time delay and load-transfer time delay. But in Lan the communication time delay might be ignored. Up to now, there are more papers to dicuss dynamic time delay model for load balancing in distributed heterogeneous system, but the methods computing the load-transfer time delay and the gain coefficient are not provided. In this paper, an improved dynamic load balancing model is designed with tasks for LAN, which the gain coefficient is defined by lots of simulations and computed the load-fransfer time delay. The conclusion is that the improved algorithm not only stints the resources, but also realizes a reliable and efficient operation of the system.","PeriodicalId":253478,"journal":{"name":"2010 IEEE 12th International Conference on Communication Technology","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126963940","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Multi-Hop Broadcast scheme for propagation of emergency messages in VANET","authors":"Qiong Yang, Lianfeng Shen","doi":"10.1109/ICCT.2010.5688509","DOIUrl":"https://doi.org/10.1109/ICCT.2010.5688509","url":null,"abstract":"In this paper, a multi-hop broadcast scheme called LDMB (Link-based Distributed Multi-hop Broadcast) is proposed to broadcast emergency messages efficiently in VANET (Vehicular Ad Hoc Network). The forwarding scheme in LDMB is completely distributed, where each vehicle who receives the emergency message estimates its link status firstly and then computes the waiting time before forwarding this message. LDMB does not need any handshakes and there may be several candidates to forward the message which guarantees the reliability of the multi-hop broadcast. Simulation results show that LDMB can have close performance in reliability but offer lower latency compared with other multi-hop broadcast protocols.","PeriodicalId":253478,"journal":{"name":"2010 IEEE 12th International Conference on Communication Technology","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130696846","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Energy Balance Algorithm based on LEACH","authors":"Wen Liu, Zhiyuan Ma, Z. Deng, Lianming Xu","doi":"10.1109/ICCT.2010.5688501","DOIUrl":"https://doi.org/10.1109/ICCT.2010.5688501","url":null,"abstract":"For the weakness in the cluster head election of LEACH algorithm in Wireless Sensor Network(WSN),We propose an improved algorithm based on LEACH from point of view that regional energy balance of the network. Proposed algorithm can make the node that has more remaining energy to serve as the cluster head(CH). Meanwhile, when the sensor nodes choose the CHs, it will depend on not only the distance between the sensor nodes and the CHs, but also the capacity of the CHs to join. Simulation results show that the proposed algorithm is effective in balancing the network energy consumption and prolonging the network lifetime.","PeriodicalId":253478,"journal":{"name":"2010 IEEE 12th International Conference on Communication Technology","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130218872","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on voice conversion based codebook and GMM","authors":"Wei-chao Xie, Linghua Zhang","doi":"10.1109/ICCT.2010.5689017","DOIUrl":"https://doi.org/10.1109/ICCT.2010.5689017","url":null,"abstract":"Voice conversion (VC) is a technique used in order to change the personality characteristics of a source speaker's voice into the target speaker's, while preserving the original semantic information. This paper mainly studies a method of voice conversion with better quality by codebook. Firstly, personality parameters of both source and target speaker are time aligned to create the source and target codebook. Then compare the parameters which to be converted with the source codebook. If they are near enough, the corresponding parameters of target codebook are regarded as the converted parameters. Otherwise, we will use GMM to realize the conversion of LSF parameters and get residual excitation signal by pitch frequency estimated from converted LSF parameters. This method is better than the conversion only using GMM.","PeriodicalId":253478,"journal":{"name":"2010 IEEE 12th International Conference on Communication Technology","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128805999","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The design of two-dimension iterative decoder for network coded cooperation","authors":"Huang Xue-jun, Zhu Hong-bo","doi":"10.1109/ICCT.2010.5689057","DOIUrl":"https://doi.org/10.1109/ICCT.2010.5689057","url":null,"abstract":"Combining network code with cyclic redundancy check (CRC), a two-dimension iterative decoder is proposed for network coded cooperation. The decoder organizes the network code as a row decoder, and CRC as a column decoder. The log-likelihood ratios (LLR) of received signal are used as soft information for iterations. The performances are evaluated by the simulations, and its results show that CRC can be used to improve the decoding performance.","PeriodicalId":253478,"journal":{"name":"2010 IEEE 12th International Conference on Communication Technology","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125475491","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An improved TOPSIS vertical handoff algorithm for heterogeneous wireless networks","authors":"Liu Sheng-mei, Pan Su, Xu Ming-hai","doi":"10.1109/ICCT.2010.5688617","DOIUrl":"https://doi.org/10.1109/ICCT.2010.5688617","url":null,"abstract":"In this paper, we propose a SINR(Signal to Interference plus Noise Ratio), AHP(Analytic Hierarchy Process) and information Entropy weight method based TOPSIS (SAE-TOPSIS) vertical handoff algorithm which uses the combined effects of SINR with SINR value from one network being converted to equivalent SINR value to the target network for getting the same data rate, user required bandwidth, user traffic cost and available bandwidth of the participating access networks to construct the attribute matrix and make handoff decisions for multi-attribute QoS consideration according to the features of the traffic. For performance evaluation, four traffic classed defined by 3GPP are considered. The subjective weight relations of decision elements are determined by eigenvalue method of AHP. Next, the information entropy method is employed to derive the objective weights of the evaluation criteria and on the basis, the comprehensive weight is obtained. Finally we use TOPSIS algorithm to make decision according to the attribute matrix and weight vector. The results show that our proposed scheme can achieve excellent performance according to the characteristics of the traffic by considering the relations of multiple attributions synthetically.","PeriodicalId":253478,"journal":{"name":"2010 IEEE 12th International Conference on Communication Technology","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122349904","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}