2010 Second International Conference on Communication Software and Networks最新文献

筛选
英文 中文
Failure Detection and Localization in OTN Based on Optical Power Analysis 基于光功率分析的OTN故障检测与定位
2010 Second International Conference on Communication Software and Networks Pub Date : 2010-02-26 DOI: 10.1109/ICCSN.2010.68
Tingting Huang, F. Qi, Fei Gao
{"title":"Failure Detection and Localization in OTN Based on Optical Power Analysis","authors":"Tingting Huang, F. Qi, Fei Gao","doi":"10.1109/ICCSN.2010.68","DOIUrl":"https://doi.org/10.1109/ICCSN.2010.68","url":null,"abstract":"In consideration of the new features of Optical Transport Networks (OTN), the failure detection and localization has become a new challenging issue in OTN management research area. This paper proposes a scheme to detect and locate the failures based on the optical power analysis. In failure detection section of the scheme, this paper propose a method to detect the performance degradation caused by possible failures based on real optical power analysis and build a status matrix which demonstrates the current optical power deviation of the fiber port of each node in OTN. In failure localization section of the scheme, this paper proposes the multiple failures location algorithm (MFLA), which deals with both single point failure and multi-point failures, to locate the multiple failures based on analyzing the status matrix and the switching relationship matrix. Then, an exemplary scenario is given to present the result of detecting and locating the fiber link failure and OXC device failure with the proposed scheme.","PeriodicalId":255246,"journal":{"name":"2010 Second International Conference on Communication Software and Networks","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124822783","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Modulation Classification of MQAM Signals from Their Constellation Using Clustering 基于聚类的MQAM信号星座调制分类
2010 Second International Conference on Communication Software and Networks Pub Date : 2010-02-26 DOI: 10.1109/ICCSN.2010.45
Changyi Yin, Bingbing Li, Yanling Li
{"title":"Modulation Classification of MQAM Signals from Their Constellation Using Clustering","authors":"Changyi Yin, Bingbing Li, Yanling Li","doi":"10.1109/ICCSN.2010.45","DOIUrl":"https://doi.org/10.1109/ICCSN.2010.45","url":null,"abstract":"Nowadays, automatic modulation classification (AMC) plays an important role in both cooperative and non-cooperative communication applications. And most of the approaches for recognition and classification of modulation have been found on modulated signal’s components. However, one of the best methods of modulation classification is the use of the constellation diagram of the received signal. In this paper, a system for modulation classification is developed. A novel method for carrier frequency estimation from the received data is proposed. The method can estimate the carrier frequency exactly by approaching the real frequency illimitably. And an improved method using clustering is also proposed, which can recognize modulated signal’s components only using one clustering radius. The advantages are simple structure and low computation complexity. Simulation results show that the modulation classification method is robust","PeriodicalId":255246,"journal":{"name":"2010 Second International Conference on Communication Software and Networks","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121978796","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
REDM: Robust and Energy Efficient Dynamic Routing for a Mobile Sink in a Multi Hop Sensor Network REDM:多跳传感器网络中移动Sink的鲁棒节能动态路由
2010 Second International Conference on Communication Software and Networks Pub Date : 2010-02-26 DOI: 10.1109/ICCSN.2010.75
Seong-Yong Choi, Jin-Su Kim, Jung-Hyun Lee, K. Rim
{"title":"REDM: Robust and Energy Efficient Dynamic Routing for a Mobile Sink in a Multi Hop Sensor Network","authors":"Seong-Yong Choi, Jin-Su Kim, Jung-Hyun Lee, K. Rim","doi":"10.1109/ICCSN.2010.75","DOIUrl":"https://doi.org/10.1109/ICCSN.2010.75","url":null,"abstract":"An energy efficient multi hop sensor network cannot avoid the energy hole problem, which is the rapid decrease in the energy of nodes around the sink. Also as a sensor network has a limited node resources and unexpected changes of external environment, its nodes should show energy efficiency, reliable data transmission, and topological adaptation to the change of external environment. This study proposes Robust and Energy efficient Dynamic routing for a Mobile sink (REDM), a routing mechanism that satisfies the above-mentioned conditions at the same time using a dynamic single path and sink mobility in a multi hop sensor network. And we also suggest power aware heuristic (PAH) algorithm in which the sink determines its move by itself in consideration of the energy of nodes within a specific number of hops from the sink. According to the result of simulation, compared to the algorithms with other multi hop routing, REDM proposed in this study extended network lifetime by improving the energy efficiency of the nodes while maintaining the same reliability, and REDM based on the PAH algorithm showed a longer network lifetime than stationary REDM and random REDM.","PeriodicalId":255246,"journal":{"name":"2010 Second International Conference on Communication Software and Networks","volume":"2019 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128043203","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
A Power Control Mechanism for Sensor Node Based on Dynamic Programming 基于动态规划的传感器节点功率控制机制
2010 Second International Conference on Communication Software and Networks Pub Date : 2010-02-26 DOI: 10.1109/ICCSN.2010.30
Somayeh Kianpisheh, Nasrolah Moghadam Charkari
{"title":"A Power Control Mechanism for Sensor Node Based on Dynamic Programming","authors":"Somayeh Kianpisheh, Nasrolah Moghadam Charkari","doi":"10.1109/ICCSN.2010.30","DOIUrl":"https://doi.org/10.1109/ICCSN.2010.30","url":null,"abstract":"Reducing energy consumption is one of the key challenges in sensor networks. Lots of researches have tried to turn the nodes off when not needed to reduce energy consumption. In this paper, we propose a mechanism which dynamically turns on/off different components of the node to conserve energy while maintaining required performance. We model power management problem in a sensor node as an average reward MDP and solve it using dynamic programming. We prove that the MDP is communicating and we use communicating policy iteration algorithm to compute the optimal policy. Simulation results show our approach conserves more energy than always on policy while reaches to the same amount of utility.","PeriodicalId":255246,"journal":{"name":"2010 Second International Conference on Communication Software and Networks","volume":"131 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124556708","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Adaptive Approach for Reducing Energy Consumption, Considering Nodes' Mission in Wireless Sensor Networks 考虑无线传感器网络中节点任务的自适应降低能耗方法
2010 Second International Conference on Communication Software and Networks Pub Date : 2010-02-26 DOI: 10.1109/ICCSN.2010.92
N. Arastouie, M. Sabaei, Hosseinali Shirali Shahreza
{"title":"Adaptive Approach for Reducing Energy Consumption, Considering Nodes' Mission in Wireless Sensor Networks","authors":"N. Arastouie, M. Sabaei, Hosseinali Shirali Shahreza","doi":"10.1109/ICCSN.2010.92","DOIUrl":"https://doi.org/10.1109/ICCSN.2010.92","url":null,"abstract":"The computational cost in a wireless sensor network is usually considered neglected in comparison to the communication cost. While this assumption is considered true, it may fail if data volumes are significantly large. In such situations, it is more rational to consider the computational cost as well as the communication cost for energy related decisions in the network. In this paper, we want to reduce the energy consumed within a wireless sensor network, considering each node in charge of a mission. Every node, obtaining a trade-off between computation and communication energy, does its best to reduce the overall energy. In other words, each node endeavors to reduce network energy consumption adaptively, regarding application type, by means of making a trade-off between data compression at an appropriate level, considering spatial correlation, and sending row data. Simulation results, compared to similar work, show that our approach reduces energy consumption of nodes in the network.","PeriodicalId":255246,"journal":{"name":"2010 Second International Conference on Communication Software and Networks","volume":"159 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132983691","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Research on Winsock Based Wireless Routing Simulation 基于Winsock的无线路由仿真研究
2010 Second International Conference on Communication Software and Networks Pub Date : 2010-02-26 DOI: 10.1109/ICCSN.2010.18
Xiangning Li, Jing Ma
{"title":"Research on Winsock Based Wireless Routing Simulation","authors":"Xiangning Li, Jing Ma","doi":"10.1109/ICCSN.2010.18","DOIUrl":"https://doi.org/10.1109/ICCSN.2010.18","url":null,"abstract":"Routing protocol simulation is the basis for its practical application. Using multithread simulation technology can not only simulate the performance of routing protocols, but also lay good foundation for its hardware porting. By use of the technology and combing with Winsock, the paper researched on routing of wireless communication and brought out a kind of computer simulation method for distributed routing based on technologies of Winsock and multithread, and then constructed distributed routing protocol simulation system. With the communication system, different platform for distributed routing protocol simulation can be built to test the performance of routing protocols.","PeriodicalId":255246,"journal":{"name":"2010 Second International Conference on Communication Software and Networks","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134438732","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Securing Cloud from DDOS Attacks Using Intrusion Detection System in Virtual Machine 利用虚拟机入侵检测系统保护云免受DDOS攻击
2010 Second International Conference on Communication Software and Networks Pub Date : 2010-02-26 DOI: 10.1109/ICCSN.2010.56
Aman Bakshi, Yogesh B. Dujodwala
{"title":"Securing Cloud from DDOS Attacks Using Intrusion Detection System in Virtual Machine","authors":"Aman Bakshi, Yogesh B. Dujodwala","doi":"10.1109/ICCSN.2010.56","DOIUrl":"https://doi.org/10.1109/ICCSN.2010.56","url":null,"abstract":"Innovation is necessary to ride the inevitable tide of change. The buzzword of 2009 seems to be \"cloud computing\" which is a futuristic platform to provides dynamic resource pools, virtualization, and high availability and enables the sharing, selection and aggregation of geographically distributed heterogeneous resources for solving large-scale problems in science and engineering. But with this ever developing cloud concept, problems are arising from this “golden solution” in the enterprise arena. Preventing intruders from attacking the cloud infrastructure is the only realistic thing the staff, management and planners can foresee. Regardless of company size or volume and magnitude of the cloud, this paper explains how maneuver IT virtualization strategy could be used in responding to a denial of service attack. After picking up a grossly abnormal spike in inbound traffic, targeted applications could be immediately transferred to virtual machines hosted in another data center. We’re not reinventing the wheel. We have lots of technology and standardized solutions we can already use to engineer into the stack. We are just introducing them in the way least expected.","PeriodicalId":255246,"journal":{"name":"2010 Second International Conference on Communication Software and Networks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129533900","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 78
Testability Models for Structured Programs 结构化程序的可测试性模型
2010 Second International Conference on Communication Software and Networks Pub Date : 2010-02-26 DOI: 10.1109/ICCSN.2010.112
Chhattar Singh Lamba
{"title":"Testability Models for Structured Programs","authors":"Chhattar Singh Lamba","doi":"10.1109/ICCSN.2010.112","DOIUrl":"https://doi.org/10.1109/ICCSN.2010.112","url":null,"abstract":"In this paper I investigate factors of the testability of structured programs. The starting point is given by a study of the literature to obtain both an initial model of testability and existing models related to testability. The main objective of this paper is to propose models for the estimation of testability (Tb), on the basis of various affecting attributes. The values of the attributes were estimated for programs under consideration with the help of software developed for this purpose. The models proposed conform to our intuitive reasoning","PeriodicalId":255246,"journal":{"name":"2010 Second International Conference on Communication Software and Networks","volume":"1 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113954279","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
The Application of Service-Oriented Architecture in E-complaint System 面向服务体系结构在电子投诉系统中的应用
2010 Second International Conference on Communication Software and Networks Pub Date : 2010-02-26 DOI: 10.1109/ICCSN.2010.107
A. Najar, Hassan Awad Hassan Al-Sukhni, Navid Aghakhani
{"title":"The Application of Service-Oriented Architecture in E-complaint System","authors":"A. Najar, Hassan Awad Hassan Al-Sukhni, Navid Aghakhani","doi":"10.1109/ICCSN.2010.107","DOIUrl":"https://doi.org/10.1109/ICCSN.2010.107","url":null,"abstract":"in this study researcher tried to improve relation between citizens and government by presenting a new model based on Service Oriented Architecture (SOA). With utilizing the presented model in government body on one hand governments will have the ability to minimize citizens’ dissatisfaction and on the other hand it can encourage citizens to participate in controlling government body such as governments’ staffs and organizations. This study can also be helpful in other fields of e-government in terms of citizen adoption and citizen loyalty. Results of this study can be a good reference to find out users needs from e-complaint and the importance of complaint in the body of government.","PeriodicalId":255246,"journal":{"name":"2010 Second International Conference on Communication Software and Networks","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117104402","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Performance of UWB MIMO Systems with Rake Receive Processing 采用Rake接收处理的UWB MIMO系统性能研究
2010 Second International Conference on Communication Software and Networks Pub Date : 2010-02-26 DOI: 10.1109/ICCSN.2010.11
J. An, Sangchoon Kim
{"title":"Performance of UWB MIMO Systems with Rake Receive Processing","authors":"J. An, Sangchoon Kim","doi":"10.1109/ICCSN.2010.11","DOIUrl":"https://doi.org/10.1109/ICCSN.2010.11","url":null,"abstract":"In this paper, a rake diversity combining scheme for detection of a single data stream in ultra-wideband (UWB) multiple input multiple output (MIMO) systems is considered as an extension of single input multiple output (SIMO) systems. The BER performance of a linear receive rake diversity scheme is presented in a log-normal multipath fading channel. It is shown that the increase of an antenna dimension happens to degrade the performance in the range of high SNRs. It is seen that as the number of transmit and receive antennas increases, the rake diversity combining system improves the performance at low SNRs or in the case of large antenna dimension at high SNRs.","PeriodicalId":255246,"journal":{"name":"2010 Second International Conference on Communication Software and Networks","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116428810","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信