{"title":"The model and the security mechanism of the information retrieval system based on mobile multi-agent","authors":"Xiao-long Xu, Jingyi Xiong, Chunling Cheng","doi":"10.1109/ICCT.2010.5689164","DOIUrl":"https://doi.org/10.1109/ICCT.2010.5689164","url":null,"abstract":"Traditional information retrieval systems have several shortcomings in common, such as delaying in information updating, costing additional host and network resources, and so on. The promise of mobile multi-agent technology is becoming highly attractive. We approach to apply the mobile multi-agent technology to information retrieval in order to build a brand-new system. Although the mobile multi-agent technology advantages information retrieval systems, it also brings several new negative problems. The most serious one is the security problem because of agent's mobility and initiative. In this paper, we firstly analyze the drawbacks of current information retrieval systems, and then describe how to employ the mobile multi-agent technology to the information retrieval system to improve its performance. What we discuss mainly in this paper is the security problems of the information retrieval system based on mobile multi-agent (IRSMMA). We analyze threats to the security of the new system, study out the security policies, and at last establish a robust and secure architecture name MMASA (Mobile Multi-Agent Security Architecture), which can effectively protect our system, and also adapt to other network application based on mobile multi-agent because of its generality.","PeriodicalId":253478,"journal":{"name":"2010 IEEE 12th International Conference on Communication Technology","volume":"293 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127659629","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A sensing time saving cluster-based cooperative spectrum sensing scheme","authors":"Dong Wei, Chunyan Feng, Caili Guo","doi":"10.1109/ICCT.2010.5689097","DOIUrl":"https://doi.org/10.1109/ICCT.2010.5689097","url":null,"abstract":"In a cognitive radio network, the cluster-based cooperative spectrum sensing scheme can achieve high detection accuracy when the reporting and inter-user channels both experience fading. However, due to the secondary user selected as the cluster head has to process large number of data from its entire cluster members, the traditional cluster-based scheme consumes too much time and faces the inefficient problem. A sensing time saving cluster-based (STSC) cooperative spectrum sensing scheme is proposed to resolve this problem faced by the traditional cluster-based cooperative sensing scheme. The proposed scheme selects the second user with high reliable sensing result as the cluster member and employs the sequential test in both the cluster head and the fusion center. Both the theory and the simulation results show that with the same target false alarm probability and missing detection probability the sensing time of the proposed scheme can be reduced 88.5% at most compared to the traditional cluster-based cooperative sensing scheme.","PeriodicalId":253478,"journal":{"name":"2010 IEEE 12th International Conference on Communication Technology","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128053953","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A routing mechanism based on trust relationship for P2P networks","authors":"Jie Xu, Xiaolin Liu, Keping Long","doi":"10.1109/ICCT.2010.5689133","DOIUrl":"https://doi.org/10.1109/ICCT.2010.5689133","url":null,"abstract":"The traditional P2P routing algorithms generally don't consider the routing security. This paper proposes a new trusted routing mechanism based on trust degree for P2P network. The assessment and calculation of trust degree is the key to achieve the secure routing mechanism. In this paper, an improved method to define trust degree is presented. And then, we present the improved trusted routing mechanism based on trust degree. At end of this paper, some simulations and analysis for network problems, such as bad mouthing attacks, self-faults problems and conflict behavior attacks, show that this scheme is helpful to detect which node is more reliable and make honest nodes play a more important part in the network, and make malicious nodes to the edge of network. This study can increase the communication efficiency and improves the survivability of P2P network.","PeriodicalId":253478,"journal":{"name":"2010 IEEE 12th International Conference on Communication Technology","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132824836","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Implementation of high precision and low cost SNR estimator for wireless OFDM system","authors":"Yong-xu Zhu, Bin Wu, Yumei Zhou, Zhen-dong Zhang","doi":"10.1109/ICCT.2010.5688811","DOIUrl":"https://doi.org/10.1109/ICCT.2010.5688811","url":null,"abstract":"Signal-to-Noise Ratio is regarded as an important parameter for link quality measurement. Focusing on wireless local area network, this paper proposes a SNR measurement using the same frequency domain symbols transmitted in orthogonal frequency division multiplexing system of the physical layer, for instance, the two same parts in the long training sequence. The results show that the estimator is more accurate and lower complicated than methods of time domain and pilot-aided, and it works well both in Additive White Gaussian Noise and multipath fading channel. We adapt Time Division Multiplexing of Multiplier Processor to reduce hardware cost and present Shortened Logarithm Look Up Table Processor to get the base-10 logarithm operation in SNR estimator. The implementation on Field Programmable Gate Array indicates that it can match with the simulation results and provide a good estimation for the development platform of wireless local area network.","PeriodicalId":253478,"journal":{"name":"2010 IEEE 12th International Conference on Communication Technology","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133694081","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"1-D superresolution ISAR imaging algorithm","authors":"C. Peng, Li Hua-qiang, He Wei-chao","doi":"10.1109/ICCT.2010.5688960","DOIUrl":"https://doi.org/10.1109/ICCT.2010.5688960","url":null,"abstract":"A novel 1-D scattering centers extraction algorithm of radar target based on conjugate unitary Root-MUSIC was introduced in this paper. To improve the resolution of 1-D scattering centers, the information of conjugated data was used availably by combining the observation data matrix with its conjugated data matrix. Centro-Hermitian data matrices with hermitian property was constructed by forward-backward(FB) averaging, Unitary transform was applied which convert the FB covariance matrix to a real matrix, and the computational efficiency is improved by real-valued eigendecomposition. Theory analysis and simulation result show that the new approach can improve the resolution and reduce significantly computational complexity.","PeriodicalId":253478,"journal":{"name":"2010 IEEE 12th International Conference on Communication Technology","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134184621","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A MAC protocol of cognitive networks based on IEEE 802.11","authors":"Cun Zhao, Jing Hu, Lianfeng Shen","doi":"10.1109/ICCT.2010.5689152","DOIUrl":"https://doi.org/10.1109/ICCT.2010.5689152","url":null,"abstract":"Cognitive Radio permits the secondary users to share the spectrum in the space and time domain. But only while the primary users don't occupy the spectrum, the secondary users could access. In addition to the dynamic nature of the spectrum environment, Media Access Control (MAC) spectrum access protocol design is facing several important issues. The secondary users need to determine when and which channel access to send/receive data without interference with the primary users. First, a detailed classification of the MAC protocols is presented, while considering the infrastructure support, integration of spectrum sensing functionalities, the need for time synchronization, and the number of radio transceivers. Then, A MAC protocol is proposed for the secondary radio based 802.11 networks. Specifically, the cognitive MAC protocols allow secondary users to identify and use the available frequency spectrum without interference with the primary users. This paper proposes a Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) MAC protocol to enable the secondary users dynamically utilize the available frequency spectrum, and analyses its performance. Finally the conclusion is presented.","PeriodicalId":253478,"journal":{"name":"2010 IEEE 12th International Conference on Communication Technology","volume":"292 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134358628","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Service-based survivability scheme in Intelligent Optical Networks","authors":"J. Shen, Zhengkun Mi","doi":"10.1109/ICCT.2010.5688641","DOIUrl":"https://doi.org/10.1109/ICCT.2010.5688641","url":null,"abstract":"A novel service-based survivability scheme in Intelligent Optical Network (ION) is presented which solves the mismatching of different survivability strategies between service side and network side viewpoint. Two implementation mechanisms are proposed including coordination and self-organization schemes. The survivability strategies of control plane are presented along with the numerical analysis of control plane availability.","PeriodicalId":253478,"journal":{"name":"2010 IEEE 12th International Conference on Communication Technology","volume":"141 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134362386","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The improved scheme of orthogonal spreading for TD-SCDMA","authors":"Xiong Liu, H. Fu, Xiangdong Jia","doi":"10.1109/ICCT.2010.5688536","DOIUrl":"https://doi.org/10.1109/ICCT.2010.5688536","url":null,"abstract":"The principle and implementation of the spectrum spreading and scrambling code in the TD-SCDMA system has much difference with that of other 3G standards, the TD-SCDMA standard brings the principle and realization of complex spectrum spreading and complex scrambling code. However, none of the relevant materials has given out its working principle, schematic diagram and performance analysis. Not only the specific principle of those techniques in TD-SCDMA and its implementation schematic diagram would be given in this paper, but also its improved scheme would be presented. Then, performance analyzing and comparison are done by the related simulation results.","PeriodicalId":253478,"journal":{"name":"2010 IEEE 12th International Conference on Communication Technology","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134408320","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A novel throughput optimization approach in wireless systems","authors":"Jian Liu, Jian Sun, Shoutao Lv","doi":"10.1109/ICCT.2010.5689033","DOIUrl":"https://doi.org/10.1109/ICCT.2010.5689033","url":null,"abstract":"In this paper, we propose a mathematical framework to maximize the user throughput in a wireless channel using various parameters such the symbol rate, the packet length, and the constellation size as optimization variables. The optimization equations with each of the above degrees of freedom have been presented. We see a gain in choosing the parameters using a theoretical framework. We also present some implementation constraints and their effects on performance of the system. The analytical results match very well with the simulation results. Simulation results show that the throughput can be improved greatly.","PeriodicalId":253478,"journal":{"name":"2010 IEEE 12th International Conference on Communication Technology","volume":"238 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134613515","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance analysis of the cooperative communications based on opportunistic relaying from MAC layer perspectives","authors":"Nan Li, Naiping Cheng, Xiaotie Xu, Yueming Cai","doi":"10.1109/ICCT.2010.5688633","DOIUrl":"https://doi.org/10.1109/ICCT.2010.5688633","url":null,"abstract":"Opportunistic relaying is an important relay selection scheme for cooperative communication, which can dynamically select relay depending on instantaneous channel condition. A great deal of research has been conducted to study opportunistic relaying from the viewpoint of PHY layer and information theory. However, owing to the impact resulting from opportunistic relaying, there is no guarantee to enhance the network throughput in view of the medium access control (MAC) performance. In this paper, the system throughput of the cooperative communication based on opportunistic relaying is evaluated by exploiting the proposed analytical model, both the cooperative communication and opportunistic relaying are considered in the analytical studies. Simulations are conducted to further validate the effectiveness of the proposed model. In terms of performance analysis, we find the optimum parameter value for opportunistic relaying and reveal the impact of opportunistic relaying on the performance from the MAC layer perspectives.","PeriodicalId":253478,"journal":{"name":"2010 IEEE 12th International Conference on Communication Technology","volume":"407 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115591393","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}