2010 IEEE 12th International Conference on Communication Technology最新文献

筛选
英文 中文
The model and the security mechanism of the information retrieval system based on mobile multi-agent 基于移动多智能体的信息检索系统模型及安全机制
2010 IEEE 12th International Conference on Communication Technology Pub Date : 2010-11-01 DOI: 10.1109/ICCT.2010.5689164
Xiao-long Xu, Jingyi Xiong, Chunling Cheng
{"title":"The model and the security mechanism of the information retrieval system based on mobile multi-agent","authors":"Xiao-long Xu, Jingyi Xiong, Chunling Cheng","doi":"10.1109/ICCT.2010.5689164","DOIUrl":"https://doi.org/10.1109/ICCT.2010.5689164","url":null,"abstract":"Traditional information retrieval systems have several shortcomings in common, such as delaying in information updating, costing additional host and network resources, and so on. The promise of mobile multi-agent technology is becoming highly attractive. We approach to apply the mobile multi-agent technology to information retrieval in order to build a brand-new system. Although the mobile multi-agent technology advantages information retrieval systems, it also brings several new negative problems. The most serious one is the security problem because of agent's mobility and initiative. In this paper, we firstly analyze the drawbacks of current information retrieval systems, and then describe how to employ the mobile multi-agent technology to the information retrieval system to improve its performance. What we discuss mainly in this paper is the security problems of the information retrieval system based on mobile multi-agent (IRSMMA). We analyze threats to the security of the new system, study out the security policies, and at last establish a robust and secure architecture name MMASA (Mobile Multi-Agent Security Architecture), which can effectively protect our system, and also adapt to other network application based on mobile multi-agent because of its generality.","PeriodicalId":253478,"journal":{"name":"2010 IEEE 12th International Conference on Communication Technology","volume":"293 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127659629","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
A sensing time saving cluster-based cooperative spectrum sensing scheme 一种节省感知时间的基于集群的协同频谱感知方案
2010 IEEE 12th International Conference on Communication Technology Pub Date : 2010-11-01 DOI: 10.1109/ICCT.2010.5689097
Dong Wei, Chunyan Feng, Caili Guo
{"title":"A sensing time saving cluster-based cooperative spectrum sensing scheme","authors":"Dong Wei, Chunyan Feng, Caili Guo","doi":"10.1109/ICCT.2010.5689097","DOIUrl":"https://doi.org/10.1109/ICCT.2010.5689097","url":null,"abstract":"In a cognitive radio network, the cluster-based cooperative spectrum sensing scheme can achieve high detection accuracy when the reporting and inter-user channels both experience fading. However, due to the secondary user selected as the cluster head has to process large number of data from its entire cluster members, the traditional cluster-based scheme consumes too much time and faces the inefficient problem. A sensing time saving cluster-based (STSC) cooperative spectrum sensing scheme is proposed to resolve this problem faced by the traditional cluster-based cooperative sensing scheme. The proposed scheme selects the second user with high reliable sensing result as the cluster member and employs the sequential test in both the cluster head and the fusion center. Both the theory and the simulation results show that with the same target false alarm probability and missing detection probability the sensing time of the proposed scheme can be reduced 88.5% at most compared to the traditional cluster-based cooperative sensing scheme.","PeriodicalId":253478,"journal":{"name":"2010 IEEE 12th International Conference on Communication Technology","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128053953","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
A routing mechanism based on trust relationship for P2P networks 基于信任关系的P2P网络路由机制
2010 IEEE 12th International Conference on Communication Technology Pub Date : 2010-11-01 DOI: 10.1109/ICCT.2010.5689133
Jie Xu, Xiaolin Liu, Keping Long
{"title":"A routing mechanism based on trust relationship for P2P networks","authors":"Jie Xu, Xiaolin Liu, Keping Long","doi":"10.1109/ICCT.2010.5689133","DOIUrl":"https://doi.org/10.1109/ICCT.2010.5689133","url":null,"abstract":"The traditional P2P routing algorithms generally don't consider the routing security. This paper proposes a new trusted routing mechanism based on trust degree for P2P network. The assessment and calculation of trust degree is the key to achieve the secure routing mechanism. In this paper, an improved method to define trust degree is presented. And then, we present the improved trusted routing mechanism based on trust degree. At end of this paper, some simulations and analysis for network problems, such as bad mouthing attacks, self-faults problems and conflict behavior attacks, show that this scheme is helpful to detect which node is more reliable and make honest nodes play a more important part in the network, and make malicious nodes to the edge of network. This study can increase the communication efficiency and improves the survivability of P2P network.","PeriodicalId":253478,"journal":{"name":"2010 IEEE 12th International Conference on Communication Technology","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132824836","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Implementation of high precision and low cost SNR estimator for wireless OFDM system 无线OFDM系统高精度低成本信噪比估计器的实现
2010 IEEE 12th International Conference on Communication Technology Pub Date : 2010-11-01 DOI: 10.1109/ICCT.2010.5688811
Yong-xu Zhu, Bin Wu, Yumei Zhou, Zhen-dong Zhang
{"title":"Implementation of high precision and low cost SNR estimator for wireless OFDM system","authors":"Yong-xu Zhu, Bin Wu, Yumei Zhou, Zhen-dong Zhang","doi":"10.1109/ICCT.2010.5688811","DOIUrl":"https://doi.org/10.1109/ICCT.2010.5688811","url":null,"abstract":"Signal-to-Noise Ratio is regarded as an important parameter for link quality measurement. Focusing on wireless local area network, this paper proposes a SNR measurement using the same frequency domain symbols transmitted in orthogonal frequency division multiplexing system of the physical layer, for instance, the two same parts in the long training sequence. The results show that the estimator is more accurate and lower complicated than methods of time domain and pilot-aided, and it works well both in Additive White Gaussian Noise and multipath fading channel. We adapt Time Division Multiplexing of Multiplier Processor to reduce hardware cost and present Shortened Logarithm Look Up Table Processor to get the base-10 logarithm operation in SNR estimator. The implementation on Field Programmable Gate Array indicates that it can match with the simulation results and provide a good estimation for the development platform of wireless local area network.","PeriodicalId":253478,"journal":{"name":"2010 IEEE 12th International Conference on Communication Technology","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133694081","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
1-D superresolution ISAR imaging algorithm 一维超分辨率ISAR成像算法
2010 IEEE 12th International Conference on Communication Technology Pub Date : 2010-11-01 DOI: 10.1109/ICCT.2010.5688960
C. Peng, Li Hua-qiang, He Wei-chao
{"title":"1-D superresolution ISAR imaging algorithm","authors":"C. Peng, Li Hua-qiang, He Wei-chao","doi":"10.1109/ICCT.2010.5688960","DOIUrl":"https://doi.org/10.1109/ICCT.2010.5688960","url":null,"abstract":"A novel 1-D scattering centers extraction algorithm of radar target based on conjugate unitary Root-MUSIC was introduced in this paper. To improve the resolution of 1-D scattering centers, the information of conjugated data was used availably by combining the observation data matrix with its conjugated data matrix. Centro-Hermitian data matrices with hermitian property was constructed by forward-backward(FB) averaging, Unitary transform was applied which convert the FB covariance matrix to a real matrix, and the computational efficiency is improved by real-valued eigendecomposition. Theory analysis and simulation result show that the new approach can improve the resolution and reduce significantly computational complexity.","PeriodicalId":253478,"journal":{"name":"2010 IEEE 12th International Conference on Communication Technology","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134184621","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A MAC protocol of cognitive networks based on IEEE 802.11 一种基于IEEE 802.11的认知网络MAC协议
2010 IEEE 12th International Conference on Communication Technology Pub Date : 2010-11-01 DOI: 10.1109/ICCT.2010.5689152
Cun Zhao, Jing Hu, Lianfeng Shen
{"title":"A MAC protocol of cognitive networks based on IEEE 802.11","authors":"Cun Zhao, Jing Hu, Lianfeng Shen","doi":"10.1109/ICCT.2010.5689152","DOIUrl":"https://doi.org/10.1109/ICCT.2010.5689152","url":null,"abstract":"Cognitive Radio permits the secondary users to share the spectrum in the space and time domain. But only while the primary users don't occupy the spectrum, the secondary users could access. In addition to the dynamic nature of the spectrum environment, Media Access Control (MAC) spectrum access protocol design is facing several important issues. The secondary users need to determine when and which channel access to send/receive data without interference with the primary users. First, a detailed classification of the MAC protocols is presented, while considering the infrastructure support, integration of spectrum sensing functionalities, the need for time synchronization, and the number of radio transceivers. Then, A MAC protocol is proposed for the secondary radio based 802.11 networks. Specifically, the cognitive MAC protocols allow secondary users to identify and use the available frequency spectrum without interference with the primary users. This paper proposes a Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) MAC protocol to enable the secondary users dynamically utilize the available frequency spectrum, and analyses its performance. Finally the conclusion is presented.","PeriodicalId":253478,"journal":{"name":"2010 IEEE 12th International Conference on Communication Technology","volume":"292 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134358628","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Service-based survivability scheme in Intelligent Optical Networks 智能光网络中基于业务的生存性方案
2010 IEEE 12th International Conference on Communication Technology Pub Date : 2010-11-01 DOI: 10.1109/ICCT.2010.5688641
J. Shen, Zhengkun Mi
{"title":"Service-based survivability scheme in Intelligent Optical Networks","authors":"J. Shen, Zhengkun Mi","doi":"10.1109/ICCT.2010.5688641","DOIUrl":"https://doi.org/10.1109/ICCT.2010.5688641","url":null,"abstract":"A novel service-based survivability scheme in Intelligent Optical Network (ION) is presented which solves the mismatching of different survivability strategies between service side and network side viewpoint. Two implementation mechanisms are proposed including coordination and self-organization schemes. The survivability strategies of control plane are presented along with the numerical analysis of control plane availability.","PeriodicalId":253478,"journal":{"name":"2010 IEEE 12th International Conference on Communication Technology","volume":"141 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134362386","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The improved scheme of orthogonal spreading for TD-SCDMA TD-SCDMA正交扩展改进方案
2010 IEEE 12th International Conference on Communication Technology Pub Date : 2010-11-01 DOI: 10.1109/ICCT.2010.5688536
Xiong Liu, H. Fu, Xiangdong Jia
{"title":"The improved scheme of orthogonal spreading for TD-SCDMA","authors":"Xiong Liu, H. Fu, Xiangdong Jia","doi":"10.1109/ICCT.2010.5688536","DOIUrl":"https://doi.org/10.1109/ICCT.2010.5688536","url":null,"abstract":"The principle and implementation of the spectrum spreading and scrambling code in the TD-SCDMA system has much difference with that of other 3G standards, the TD-SCDMA standard brings the principle and realization of complex spectrum spreading and complex scrambling code. However, none of the relevant materials has given out its working principle, schematic diagram and performance analysis. Not only the specific principle of those techniques in TD-SCDMA and its implementation schematic diagram would be given in this paper, but also its improved scheme would be presented. Then, performance analyzing and comparison are done by the related simulation results.","PeriodicalId":253478,"journal":{"name":"2010 IEEE 12th International Conference on Communication Technology","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134408320","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A novel throughput optimization approach in wireless systems 一种新的无线系统吞吐量优化方法
2010 IEEE 12th International Conference on Communication Technology Pub Date : 2010-11-01 DOI: 10.1109/ICCT.2010.5689033
Jian Liu, Jian Sun, Shoutao Lv
{"title":"A novel throughput optimization approach in wireless systems","authors":"Jian Liu, Jian Sun, Shoutao Lv","doi":"10.1109/ICCT.2010.5689033","DOIUrl":"https://doi.org/10.1109/ICCT.2010.5689033","url":null,"abstract":"In this paper, we propose a mathematical framework to maximize the user throughput in a wireless channel using various parameters such the symbol rate, the packet length, and the constellation size as optimization variables. The optimization equations with each of the above degrees of freedom have been presented. We see a gain in choosing the parameters using a theoretical framework. We also present some implementation constraints and their effects on performance of the system. The analytical results match very well with the simulation results. Simulation results show that the throughput can be improved greatly.","PeriodicalId":253478,"journal":{"name":"2010 IEEE 12th International Conference on Communication Technology","volume":"238 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134613515","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Performance analysis of the cooperative communications based on opportunistic relaying from MAC layer perspectives 从MAC层角度分析基于机会中继的协同通信性能
2010 IEEE 12th International Conference on Communication Technology Pub Date : 2010-11-01 DOI: 10.1109/ICCT.2010.5688633
Nan Li, Naiping Cheng, Xiaotie Xu, Yueming Cai
{"title":"Performance analysis of the cooperative communications based on opportunistic relaying from MAC layer perspectives","authors":"Nan Li, Naiping Cheng, Xiaotie Xu, Yueming Cai","doi":"10.1109/ICCT.2010.5688633","DOIUrl":"https://doi.org/10.1109/ICCT.2010.5688633","url":null,"abstract":"Opportunistic relaying is an important relay selection scheme for cooperative communication, which can dynamically select relay depending on instantaneous channel condition. A great deal of research has been conducted to study opportunistic relaying from the viewpoint of PHY layer and information theory. However, owing to the impact resulting from opportunistic relaying, there is no guarantee to enhance the network throughput in view of the medium access control (MAC) performance. In this paper, the system throughput of the cooperative communication based on opportunistic relaying is evaluated by exploiting the proposed analytical model, both the cooperative communication and opportunistic relaying are considered in the analytical studies. Simulations are conducted to further validate the effectiveness of the proposed model. In terms of performance analysis, we find the optimum parameter value for opportunistic relaying and reveal the impact of opportunistic relaying on the performance from the MAC layer perspectives.","PeriodicalId":253478,"journal":{"name":"2010 IEEE 12th International Conference on Communication Technology","volume":"407 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115591393","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信