{"title":"MP&A Mixed Decoding Algorithm for LDPC Codes","authors":"C. L. Ho, Hsu-Hung Yang","doi":"10.1109/CNSR.2007.43","DOIUrl":"https://doi.org/10.1109/CNSR.2007.43","url":null,"abstract":"Because the message passing (MP) method is suboptimum and optimum solutions are not guaranteed, we present a hybrid decoding method by combing the MP and the A* methods. We first make comparison between the MP and A* method and then show their combined performance. Using the hybrid structure, its decoding gain is the same as that of A* method. Moreover, decoding complexity is slightly greater than that of MP one. For codeword length 96 bits and coding rate 1/2 and BER = 10-5 , the hybrid structure outperforms 1.4 dB decoding gain than the MP method. This improvement only required 1% received sequences to be transferred to A* decoding block. Our newly designed hybrid structure can solve both of the high decoding gain and low decoding complexity while it has the ability to yield the optimum solution.","PeriodicalId":266936,"journal":{"name":"Fifth Annual Conference on Communication Networks and Services Research (CNSR '07)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128326403","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Changle Li, J. Almhana, Jiandong Li, Zikuan Liu, R. McGorman
{"title":"An Adaptive IEEE 802.11 Scheme for Voice and Data Services in Wireless LANs","authors":"Changle Li, J. Almhana, Jiandong Li, Zikuan Liu, R. McGorman","doi":"10.1109/CNSR.2007.12","DOIUrl":"https://doi.org/10.1109/CNSR.2007.12","url":null,"abstract":"In this paper we propose an adaptive transmission algorithm over an IEEE 802.11 WLAN that supports integrated voice and data services, where data traffic is transmitted with the Distributed Coordination Function (DCF), while voice transmission is carried out with the Point Coordination Function (PCF). The proposed algorithm defines an updating period. At the beginning of each period and based on the transmission statistics of the previous one, our algorithm adjusts the protocol parameters to improve data transmission without compromising voice transmissions, i.e., maximum allowable delay is respected. To show the efficiency of the proposed algorithm, we compare it with a previous work we did in Li et al. (2006). The simulation results are provided and show the advantage of using such algorithm in term of protocol performance.","PeriodicalId":266936,"journal":{"name":"Fifth Annual Conference on Communication Networks and Services Research (CNSR '07)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133695973","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Topology Optimization for Backbone Wireless Mesh Networks","authors":"Mani Malekesmaeili, M. Shiva, M. Soltan","doi":"10.1109/CNSR.2007.67","DOIUrl":"https://doi.org/10.1109/CNSR.2007.67","url":null,"abstract":"Nowadays, wireless access is experiencing and developing a new technology called, wireless mesh networks (WMNs). Many wireless standards like IEEE 802.11,15, and 16 have included this technology, as it proposes many facilities and enhancements to wireless access schemes. High throughput, and low delay that are the essential requirements of a backbone WMN, as well as any other network infrastructure, demand new algorithms and metrics other than the ones used in conventional ad-hoc networks. In this paper, we introduce a new metric for Topology Control (TC) in WMNs that aims at maximizing the capacity and throughput of these networks. This metric, namely collision domain (CD) load is shown to be superior to conventional metrics, like distance or interference, used in ad-hoc networks. Applications of this metric are shown to have increases up to 150% and even more in the maximum download rate compared to the conventional metrics.","PeriodicalId":266936,"journal":{"name":"Fifth Annual Conference on Communication Networks and Services Research (CNSR '07)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131502631","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Improved Remote User Authentication Scheme Preserving User Anonymity","authors":"Lanlan Hu, Yixian Yang, Xinxin Niu","doi":"10.1109/CNSR.2007.38","DOIUrl":"https://doi.org/10.1109/CNSR.2007.38","url":null,"abstract":"Most of smart card-based remote authentication schemes proposed didn 't protect the users' identities while authenticating the users, even though user anonymity is an important issue in many e-commerce applications. In 2004, Das et al. proposed a remote authentication scheme to authenticate users while preserving the users' anonymity. Their scheme adopted dynamic identification to achieve this function. Then in 2005, Chien and Chen pointed out Das et al. 's scheme fails to protect the user's anonymity and proposed a new remote authentication scheme preserving user anonymity. This paper, however, will demonstrate that Chien and Chen's scheme has also some problems: it cannot resist strong masquerading server/user attack, insider attack, denial of service attack and restricted replay attack; it also has the problem of slow wrong password detection. Therefore, an improved scheme is proposed to conquer these problems.","PeriodicalId":266936,"journal":{"name":"Fifth Annual Conference on Communication Networks and Services Research (CNSR '07)","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127292729","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Antenna Load Mismatch Effects in EER-Based Transmitters for Digital Audio Broadcasting","authors":"S. Melvin, Manmeet S. Goldy, J. Ilow","doi":"10.1109/CNSR.2007.16","DOIUrl":"https://doi.org/10.1109/CNSR.2007.16","url":null,"abstract":"As terrestrial audio broadcasting is moving from the analog to the digital era, there is an interest from the broadcasting industry to re-examine the existing amplitude modulation (AM) and frequency modulation (FM) hardware. The objective is to identify potential problems which may arise when using digital signals with the existing systems. In particular, this paper analyzes the effects that an antenna impedance mismatch has on the spectrum regrowth of a hybrid analog-digital AM signal at the passband. The interest in this research stems from the difficulty in controlling the antenna impedance as it may vary with weather conditions e.g., icing on the antenna. Spectrum regrowth results are first presented in this paper when modelling the antenna load as a resonant circuit for both series and shunt load topologies when the inverse Chebychev reconstruction filter is deployed in the envelope elimination and restoration (EER) amplifier. Different selectivity factors, Q, for antenna resonant circuit are considered. Following this, attempts to design more robust filters are offered that would be of the same order and would provide improved spectral performance when working with the antenna impedance deviations from the nominal resistive value of 50 Omega.","PeriodicalId":266936,"journal":{"name":"Fifth Annual Conference on Communication Networks and Services Research (CNSR '07)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116721709","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Security-Centric Comparative Study of PLEASE with Existing GKM Protocols","authors":"V. R. Uthariaraj, T. C. Rangarajan, S. Srinivasan","doi":"10.1109/CNSR.2007.7","DOIUrl":"https://doi.org/10.1109/CNSR.2007.7","url":null,"abstract":"Since group communication is an upcoming technology, research on secure multicasting has been attracting wide attention. In this context, the already proven PLEASE, p' LEAder SElection model has much to contribute to the security and key management of the multicast group communication. In this paper, the PLEASE model is mathematically compared with other well-known group key management protocols like GKMP, DEP, Iolus etc, in terms of security related parameters. The IGKMP has been implemented in NS-2 and compared with PLEASE model graphically.","PeriodicalId":266936,"journal":{"name":"Fifth Annual Conference on Communication Networks and Services Research (CNSR '07)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127858029","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"GUMSAWS: A Generic User Modeling Server for Adaptive Web Systems","authors":"Jie Zhang, A. Ghorbani","doi":"10.1109/CNSR.2007.35","DOIUrl":"https://doi.org/10.1109/CNSR.2007.35","url":null,"abstract":"In this paper we focus on the architecture, design and implementation of a generic user modeling server for adaptive web systems (GUMSAWS), reaching the goals of generality, extendability and replaceability. GUMSAWS acts as a centralized user modeling server to assist several adaptive Web systems (possibly in different domains) concurrently. It incrementally builds up user models, provides functions of storing, updating and deleting entries in user profiles, and maintains consistency of user models. Our system is also able to infer missing entries in user profiles from different information sources, including direct information, groups information, association rules and general facts. We further evaluate its inference performance within the context of e-commerce. Experimental results show that the average accuracy of inferring user missing property values from different information resources is found to be almost 70%. We also use a personalized electronic news system to demonstrate the example of our system in use.","PeriodicalId":266936,"journal":{"name":"Fifth Annual Conference on Communication Networks and Services Research (CNSR '07)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115141067","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Risk Analysis in Critical Infrastructure Systems based on the Astrolabe Methodology","authors":"E. Bagheri, A. Ghorbani","doi":"10.1109/CNSR.2007.56","DOIUrl":"https://doi.org/10.1109/CNSR.2007.56","url":null,"abstract":"Critical infrastructure systems are complex networks of adaptive socio-technical systems that provide the most fundamental requirements of the society. Their importance in the smooth conduct of the society has made their role more and more prominent. A failure in any of these important components of todays industrial society can well affect the lives of millions of people. For this reason it is required that proper risk analysis and management models be devised so that the vulnerabilities, threats, and risks of/to critical infrastructure systems are exhaustively understood and revealed. In this paper, we show how the Astrolabe risk analysis methodology can be exploited to perform a comprehensive risk analysis process on any critical infrastructure system. The strength of the Astrolabe risk analysis methodology is that it focuses on the deviation of a system from its original goals. It also incorporates information from multiple sources through the notion of perspectives.","PeriodicalId":266936,"journal":{"name":"Fifth Annual Conference on Communication Networks and Services Research (CNSR '07)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116851823","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}