2014 IEEE REGION 10 SYMPOSIUM最新文献

筛选
英文 中文
Ground plane shape effects on around the body area network at 1.8GHz and 2.45GHz 地平面形状对1.8GHz和2.45GHz环体区域网络的影响
2014 IEEE REGION 10 SYMPOSIUM Pub Date : 2014-04-14 DOI: 10.1109/TENCONSPRING.2014.6863070
M. Shafi, M. I. Khattak, Naeem Khan, Mohammad Saleem
{"title":"Ground plane shape effects on around the body area network at 1.8GHz and 2.45GHz","authors":"M. Shafi, M. I. Khattak, Naeem Khan, Mohammad Saleem","doi":"10.1109/TENCONSPRING.2014.6863070","DOIUrl":"https://doi.org/10.1109/TENCONSPRING.2014.6863070","url":null,"abstract":"In design and synthesis of wearable antenna, the isolation of antenna and human body is always given paramount importance because this shielding has a pronounced effect on antenna parameters such as resonant frequency, input impedance and radiation pattern. This paper deals with the effects of different shapes of ground plane of quarter-wave monopole antenna on on-body communications around the human body model at 1.8 and 2.45GHz. A non line-of-sight (NLOS) situation is demonstrated. Results show that the circular ground plane is providing better communication link than square shape for monopole antenna at mentioned mobile communication frequencies.","PeriodicalId":270495,"journal":{"name":"2014 IEEE REGION 10 SYMPOSIUM","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121150720","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An efficient authentication and key agreement protocol for 4G (LTE) networks 一种适用于4G (LTE)网络的高效认证和密钥协商协议
2014 IEEE REGION 10 SYMPOSIUM Pub Date : 2014-04-14 DOI: 10.1109/TENCONSPRING.2014.6863085
K. A. Alezabi, F. Hashim, S. Hashim, B. Ali
{"title":"An efficient authentication and key agreement protocol for 4G (LTE) networks","authors":"K. A. Alezabi, F. Hashim, S. Hashim, B. Ali","doi":"10.1109/TENCONSPRING.2014.6863085","DOIUrl":"https://doi.org/10.1109/TENCONSPRING.2014.6863085","url":null,"abstract":"Long Term Evolution (LTE) networks designed by 3rd Generation Partnership Project (3GPP) represent a widespread technology. LTE is mainly influenced by high data rates, minimum delay and the capacity due to scalable bandwidth and its flexibility. With the rapid and widespread use LTE networks, and increase the use in data/video transmission and Internet applications in general, accordingly, the challenges of securing and speeding up data communication in such networks is also increased. Authentication in LTE networks is very important process because most of the coming attacks occur during this stage. Attackers try to be authenticated and then launch the network resources and prevent the legitimate users from the network services. The basics of Extensible Authentication Protocol-Authentication and Key Agreement (EAP-AKA) are used in LTE AKA protocol which is called Evolved Packet System AKA (EPS-AKA) protocol to secure LTE network, However it still suffers from various vulnerabilities such as disclosure of the user identity, computational overhead, Man In The Middle (MITM) attack and authentication delay. In this paper, an Efficient EPS-AKA protocol (EEPS-AKA) is proposed to overcome those problems. The proposed protocol is based on the Simple Password Exponential Key Exchange (SPEKE) protocol. Compared to previous proposed methods, our method is faster, since it uses a secret key method which is faster than certificate-based methods, In addition, the size of messages exchanged between User Equipment (UE) and Home Subscriber Server (HSS) is reduced, this reduces authentication delay and storage overhead effectively. The automated validation of internet security protocols and applications (AVISPA) tool is used to provide a formal verification. Results show that the proposed EEPS-AKA is efficient and secure against active and passive attacks.","PeriodicalId":270495,"journal":{"name":"2014 IEEE REGION 10 SYMPOSIUM","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121379440","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 69
QoE-aware cross-layer architecture for video traffic over Internet 面向互联网视频流量的qos感知跨层架构
2014 IEEE REGION 10 SYMPOSIUM Pub Date : 2014-04-14 DOI: 10.1109/TENCONSpring.2014.6863089
Safeen Qadir, A. Kist, Zhongwei Zhang
{"title":"QoE-aware cross-layer architecture for video traffic over Internet","authors":"Safeen Qadir, A. Kist, Zhongwei Zhang","doi":"10.1109/TENCONSpring.2014.6863089","DOIUrl":"https://doi.org/10.1109/TENCONSpring.2014.6863089","url":null,"abstract":"The emergence of video applications and video capable devices have contributed substantially to the increase of video traffic on Internet. New mechanisms recommending video rate adaptation towards delivering enhanced Quality of Experience (QoE) at the same time making room for more sessions. This paper introduces a cross-layer QoE-aware architecture for video traffic over the Internet. It proposes that video sources at the application layer adapt their rate to the network environment by controlling their transmitted bit rate dynamically; and the edge of network at the network layer protects the quality of the active video sessions by controlling the acceptance of new session through a video-aware admission control. In particular, it will seek the most efficient way of accepting new video session and adapting transmission rates to free up resources for more session while maintaining the QoE of active sessions. The proposed framework will contribute to the preparation for the extreme growth of video traffic in the foreseeable future. Simulation results show that the proposed cross-layer architecture guarantees the QoE for the admitted sessions and utilizes the link more efficiently comparing to the rate adaptation only architecture.","PeriodicalId":270495,"journal":{"name":"2014 IEEE REGION 10 SYMPOSIUM","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115508857","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Proportional resource allocation for OFDMA system OFDMA系统的比例资源分配
2014 IEEE REGION 10 SYMPOSIUM Pub Date : 2014-04-14 DOI: 10.1109/TENCONSPRING.2014.6863003
Ka Kien Lo, S. Chien, D. Chieng, Heng-Siong Lim, KwongKae Hsiang
{"title":"Proportional resource allocation for OFDMA system","authors":"Ka Kien Lo, S. Chien, D. Chieng, Heng-Siong Lim, KwongKae Hsiang","doi":"10.1109/TENCONSPRING.2014.6863003","DOIUrl":"https://doi.org/10.1109/TENCONSPRING.2014.6863003","url":null,"abstract":"In this paper, resource allocation for OFDMA system with proportional rate constraints is studied. The objective is to optimize subcarriers and power allocation in order to maximize sum capacity subject to the constraints of total power and proportionality among users' capacity. Optimal solution to the constrained fairness maximization problem is extremely computationally expensive. Previous works have proposed suboptimal solution by separating the subcarrier and channel allocation. Although previous work offered a suboptimal solution which is 95% close to the optimal but the resource allocation algorithm is found biased to the users which suffer deep fading and can only work in high channel-to-noise ratio condition. We propose a resource allocation algorithm to overcome these issues. The numerical results show that the proposed algorithm consistently yields higher sum capacity and better fairness in resource allocation among users.","PeriodicalId":270495,"journal":{"name":"2014 IEEE REGION 10 SYMPOSIUM","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115308757","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
List multi-coloring based fair channel allocation policy for self coexistence in cognitive radio networks with QoS provisioning 提出了基于多色的认知无线网络自共存公平信道分配策略
2014 IEEE REGION 10 SYMPOSIUM Pub Date : 2014-04-14 DOI: 10.1109/TENCONSPRING.2014.6863005
Mishra Vishram, L. C. Tong, Chan Syin
{"title":"List multi-coloring based fair channel allocation policy for self coexistence in cognitive radio networks with QoS provisioning","authors":"Mishra Vishram, L. C. Tong, Chan Syin","doi":"10.1109/TENCONSPRING.2014.6863005","DOIUrl":"https://doi.org/10.1109/TENCONSPRING.2014.6863005","url":null,"abstract":"Recently cognitive radio has gain considerable interest by research community as a viable solution to mitigate the problems of spectrum scarcity and spectrum under-utilization. A cognitive radio selects a vacant channel opportunistically and perform its own transmission on it. Detecting an incumbent user along with self-coexistence has become one of the important aspects of the cognitive radio. The former problem is solved by spectrum sensing while the latter problem requires complex techniques. To this end we propose a graph coloring based fair channel allocation policy for self-coexistence in cognitive radio networks. The proposed scheme allows multiple cognitive radio network operating over a given region to allocate channels on non-interfering basis with a certain grade of QoS. The scheme allows fair allocation of channels among multiple participating opportunistic networks with varying priorities. Simulation analysis has been done to show the effectiveness of the proposed approach.","PeriodicalId":270495,"journal":{"name":"2014 IEEE REGION 10 SYMPOSIUM","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115462162","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Singular point detection in fingerprint images: An investigation on quantization approach 指纹图像奇异点检测:量化方法的研究
2014 IEEE REGION 10 SYMPOSIUM Pub Date : 2014-04-14 DOI: 10.1109/TENCONSPRING.2014.6863106
S. C. Chua, E. K. Wong, Alan Wee Chiat Tan
{"title":"Singular point detection in fingerprint images: An investigation on quantization approach","authors":"S. C. Chua, E. K. Wong, Alan Wee Chiat Tan","doi":"10.1109/TENCONSPRING.2014.6863106","DOIUrl":"https://doi.org/10.1109/TENCONSPRING.2014.6863106","url":null,"abstract":"This paper presents a quantization approach to the detection of singular points in fingerprint images. Singular points in fingerprint images referred to the core and delta points. They are the global features found in the orientation field image of a fingerprint. A singular point is normally detected at the intersection of three gray levels of a quantized orientation field image at quantization level-3 but no study has been carried out for higher quantization level. In this paper, the singular point detection has been investigated up to quantization level-8 by employing two performance measures: sensitivity and precision. The performance at level-5 has been found to be optimal when both measures are combined.","PeriodicalId":270495,"journal":{"name":"2014 IEEE REGION 10 SYMPOSIUM","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131660470","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Adapting geographical DTN routing for enhanced connectivity in partitioned VANETs on highways 调整地理DTN路由以增强高速公路上分区vanet的连通性
2014 IEEE REGION 10 SYMPOSIUM Pub Date : 2014-04-14 DOI: 10.1109/TENCONSPRING.2014.6863006
Mostofa Kamal Nasir, Syed Adeel Ali Shah, M. A. Qureshi, M. Oche, R. M. Noor
{"title":"Adapting geographical DTN routing for enhanced connectivity in partitioned VANETs on highways","authors":"Mostofa Kamal Nasir, Syed Adeel Ali Shah, M. A. Qureshi, M. Oche, R. M. Noor","doi":"10.1109/TENCONSPRING.2014.6863006","DOIUrl":"https://doi.org/10.1109/TENCONSPRING.2014.6863006","url":null,"abstract":"Vehicular Ad hoc Networks (VANETs) have significant potential to host diverse applications associated with traffic safety, traffic efficiency and infotainment. VANETs have distinct characteristics and adapting routing protocols for effective communication is a subject of interest for many researchers in this domain. In this paper, we propose a position based Delay Tolerant Network (DTN) routing protocol in VANET for the highways. The solution is designed for partitioned environments which suffer from frequent network disconnections. Our solution presents the most suitable next hop selection mechanism through a filtration process. The filtration process utilizes node position, current direction, speed and the predicted direction that are acquired by Direction Indicator Light (DIL). NS-2 is used to evaluate the performance of the proposed routing protocol. The results show increment in packet transmission as compared to previous works. Finally, the proposed protocol contributes to route stability in VANET.","PeriodicalId":270495,"journal":{"name":"2014 IEEE REGION 10 SYMPOSIUM","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131141359","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Towards virtual honeynet based on LXC virtualization 基于LXC虚拟化的虚拟蜜网研究
2014 IEEE REGION 10 SYMPOSIUM Pub Date : 2014-04-14 DOI: 10.1109/TENCONSPRING.2014.6863084
Nogal Memari, K. Samsudin, S. J. Hashim
{"title":"Towards virtual honeynet based on LXC virtualization","authors":"Nogal Memari, K. Samsudin, S. J. Hashim","doi":"10.1109/TENCONSPRING.2014.6863084","DOIUrl":"https://doi.org/10.1109/TENCONSPRING.2014.6863084","url":null,"abstract":"Honeynet represents the new theory in network protection. Unlike purely defensive methods such as Intrusion Detection Systems (IDS), Data Encryption and Firewalls that try to avoid interaction with the attacker, Honeynet is based on the idea of interaction with the attacker. During this interaction, the Honeynet records all of the attacker's actions and tools used without the attacker knowing, representing them to the security analyzers to study and prepare defensive methods. A hybrid honeynet including both the high-interaction and low-interaction honeypots was developed and implemented utilizing virtualization technology, representing a typical laboratory environment.","PeriodicalId":270495,"journal":{"name":"2014 IEEE REGION 10 SYMPOSIUM","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124511035","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
Adaptive Chebyshev polynomial analysis for fusion of remote sensing vegetation imagery 基于自适应切比雪夫多项式分析的遥感植被影像融合
2014 IEEE REGION 10 SYMPOSIUM Pub Date : 2014-04-14 DOI: 10.1109/TENCONSPRING.2014.6863094
Z. Omar, N. Hamzah, T. Stathaki
{"title":"Adaptive Chebyshev polynomial analysis for fusion of remote sensing vegetation imagery","authors":"Z. Omar, N. Hamzah, T. Stathaki","doi":"10.1109/TENCONSPRING.2014.6863094","DOIUrl":"https://doi.org/10.1109/TENCONSPRING.2014.6863094","url":null,"abstract":"This paper describes a novel approach of an adaptive fusion method by using Chebyshev polynomial analysis (CPA) for use in remote sensing vegetation imagery. Chebyshev polynomials have been effectively used in image fusion mainly in medium to high noise conditions, though its application is limited to heuristics. In this research, we have proposed a way to adaptively select the optimal CPA parameters according to user specifications. Performance evaluation affirms the approach's ability in reducing computational complexity for remote sensing images affected by noise.","PeriodicalId":270495,"journal":{"name":"2014 IEEE REGION 10 SYMPOSIUM","volume":"108 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124067120","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performance of fractional frequency reuse with comp at the cell-edge 基于小区边缘比较的分数频率复用性能
2014 IEEE REGION 10 SYMPOSIUM Pub Date : 2014-04-14 DOI: 10.1109/TENCONSPRING.2014.6863004
A. Mahmud, K. Hamdi, N. Ramli
{"title":"Performance of fractional frequency reuse with comp at the cell-edge","authors":"A. Mahmud, K. Hamdi, N. Ramli","doi":"10.1109/TENCONSPRING.2014.6863004","DOIUrl":"https://doi.org/10.1109/TENCONSPRING.2014.6863004","url":null,"abstract":"Fractional Frequency Reuse (FFR) is a simple and efficient method to suppress inter-cell interference (ICI) in multi-cell OFDMA networks. Base station cooperation, or a coordinated multipoint (CoMP) multiple access strategy in the FFR cell-edge, will further improve the performance of the systems. This paper presents analytical performance analysis for the downlink FFR scheme in a cluster of three or seven cells with CoMP over generalized composite fading consisting of Nakagami-m fading, path-loss and log-normal shadowing. Our analysis include the effect of full and partial loading of inter-group interference (IGI) on the capacity of the cellular system. We demonstrate that by reducing the number of participating CoMP base stations in cooperating cluster, the IGI is reduced, maximizing the capacity of the system. Our framework able to compute the spectral efficiency via a single numerical integral and is applicable to arbitrary fading distribution. Numerical and simulation results are provided.","PeriodicalId":270495,"journal":{"name":"2014 IEEE REGION 10 SYMPOSIUM","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122065962","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信