{"title":"The design and application of mobile awareness mechanism in wireless ad hoc networks without GPS","authors":"Chun-Hung Chen, Ho-Ting Wu, Kai-Wei Ke","doi":"10.1109/APCC.2003.1274330","DOIUrl":"https://doi.org/10.1109/APCC.2003.1274330","url":null,"abstract":"A mobile ad hoc network is a wireless multihop network without any existing infrastructure. Thus when one node wants to transmit data to another node, it should depend on other nodes to forward it. In such a networking environment, the movement of highly mobile nodes may frequently result in the link breakdown, thus causing network inefficiency and data loss. In this paper, we develop a simple heuristic mechanism to characterize the instant mobility of network nodes. We assume that all network nodes can move arbitrarily, and none of them is equipped with any positioning device (such as the GPS system). Each mobile node is (at any time) classified as either a low mobility node or a high mobility node. A mobile node estimates its own mobility type by comparing the signal strength of consecutive received messages sent by its low mobility neighboring nodes. It then broadcasts this mobility type information to its neighbors. The mobility estimation algorithm is thus fully distributed and self organized. We then apply the estimated mobility characteristics to the construction of the end-to-end routing path. Two methods of selecting low mobility nodes as the primary intermediate routing nodes are presented. Performance evaluations via simulations have demonstrated the robustness of such a mobile awareness algorithm.","PeriodicalId":277507,"journal":{"name":"9th Asia-Pacific Conference on Communications (IEEE Cat. No.03EX732)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123460745","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Radiation characteristics of inclined slot antenna on conducting spherical cavity","authors":"C. Phongcharoenpanich, D. Boonrod, M. Krairiksh","doi":"10.1109/APCC.2003.1274241","DOIUrl":"https://doi.org/10.1109/APCC.2003.1274241","url":null,"abstract":"This paper presents theoretical investigations of the characteristics such as radiation pattern, half-power beamwidth, directivity, front-to-back ratio and polarization of an inclined slot on spherical surface. The total fields inside the cavity are formulated by means of the combination of TE and TM modes. The unknown coefficients of the fields are determined by imposing the boundary conditions. The voltage distribution along the slot is reasonably assumed to be the sinusoidal functions. The numerical results of radiation characteristics for various radii of the spherical surface are illustrated. The comparisons between horizontal slot and inclined slot are reported. The result of the analysis shows that this technique is very useful for the design of spherical slot array antenna of any orientation.","PeriodicalId":277507,"journal":{"name":"9th Asia-Pacific Conference on Communications (IEEE Cat. No.03EX732)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123910092","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Kandasamy, Prihandoko, B. Ali, V. Prakash, R. Kalos
{"title":"New call blocking probability (NCBP) in improved adaptive quality of service (AdQoS) for wireless multimedia communications using hierarchical cellular approach","authors":"S. Kandasamy, Prihandoko, B. Ali, V. Prakash, R. Kalos","doi":"10.1109/APCC.2003.1274442","DOIUrl":"https://doi.org/10.1109/APCC.2003.1274442","url":null,"abstract":"The maintenance of quality of service (QoS) in a wireless environment is a difficult problem. Most researchers have already acknowledged adaptive techniques as the appropriate method to deal with the fluctuation of QoS in a wireless cellular network. This paper proposes an improved new call blocking probability (NCBP) from an adaptive QoS (AdQoS) to support the QoS guarantee. Besides using an adaptive technique, this method utilizes a hierarchical cellular approach with a bandwidth reallocation algorithm to determine the acceptance or rejection of a new call. The approach would improve the NCBP performance of the multimedia application over high-speed wireless cellular networks.","PeriodicalId":277507,"journal":{"name":"9th Asia-Pacific Conference on Communications (IEEE Cat. No.03EX732)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128243873","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Z. Zan, S. Hitam, W. Adnan, M. Yaacob, M. Abdullah
{"title":"Design of an optical fiber link employing QPSK format with SCM scheme","authors":"Z. Zan, S. Hitam, W. Adnan, M. Yaacob, M. Abdullah","doi":"10.1109/APCC.2003.1274338","DOIUrl":"https://doi.org/10.1109/APCC.2003.1274338","url":null,"abstract":"The multiplexing technique used in this paper offers many advantages over the traditional multiplexing techniques such as the ability to carry larger capacity in the same bandwidth, the cost-effectiveness of the components and higher service modularity. The quadrature phase shift keying (QPSK) format with sub-carrier multiplexing (SCM) scheme will allow a larger capacity to be transmitted as each waveform represents two bits. In this paper the performance of the two channel- QPSK format with SCM scheme is presented and discussed.","PeriodicalId":277507,"journal":{"name":"9th Asia-Pacific Conference on Communications (IEEE Cat. No.03EX732)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129229247","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Incoercible secure electronic voting scheme based on chaffing and winnowing","authors":"N. C. Kiong, A. Samsudin","doi":"10.1109/APCC.2003.1274478","DOIUrl":"https://doi.org/10.1109/APCC.2003.1274478","url":null,"abstract":"This paper investigates the feasibility of Rivest's chaffing and winnowing (C&W) paradigm in providing incoercibility into electronic voting (e-voting) scheme. We begin with analysis the previous attempts to introduce incoercibility into e-voting scheme and then present the basic idea behind the C&W. We show that by using C&W, we could achieve incoercibility without sacrificing other security requirements or relying on some forms of physical assumption. Our scheme is secure against both passive and active coercers if the adversaries could not prescribe the random value of the number theory in used.","PeriodicalId":277507,"journal":{"name":"9th Asia-Pacific Conference on Communications (IEEE Cat. No.03EX732)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130909741","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Jamaludin, Lee Chang Wei, J. Chan, Ong Con Nie, A. Shahril
{"title":"Penang engineering smart-support","authors":"S. Jamaludin, Lee Chang Wei, J. Chan, Ong Con Nie, A. Shahril","doi":"10.1109/APCC.2003.1274340","DOIUrl":"https://doi.org/10.1109/APCC.2003.1274340","url":null,"abstract":"Achieving greater efficiencies in productivity and smart approach of information technology (IT) to fulfill the business needs in a company is always important issues, especially in a challenging research and development (R&D) environment. Today, the need of electronically accessing information and sharing information in a group of people is a must in organization. These needs are important for the peoples to work more efficiency and productivity. This paper is to illustrate the smart approaches taken by CTDG Penang engineering computing supporting total Penang R&D users. These approaches mainly will concentrate more on Windows environment with the implementation of features available using Microsoft Windows 2000 Server operating system. In these paper we will discuss further more on the challenges that GTDG Penang R&D Center facing in Windows base environment, the smart approach by implementation of Microsoft Windows 2000 server, the impact of the implementation to R&D users and the benefits of implementing Microsoft Windows 2000 server achieved through better security, manageability, users support and uptime.","PeriodicalId":277507,"journal":{"name":"9th Asia-Pacific Conference on Communications (IEEE Cat. No.03EX732)","volume":"25 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126370482","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Effectiveness of information systems security in IT organizations in Malaysia","authors":"W. Al-Salihy, J. Ann, R. Sures","doi":"10.1109/APCC.2003.1274451","DOIUrl":"https://doi.org/10.1109/APCC.2003.1274451","url":null,"abstract":"As computers become more and more pervasive, information technology (IT) organizations have become so dependent on information systems (IS) for their daily operations and strategic purposes thus intensify the need for IS security. The lack of concern for IS security is evident that organizations are often victimized by computer abuse incidents. Studies on information systems security in Malaysia's IT industry context is very insufficient. This paper will focus on how deterrent actions, preventive actions and organizational actions lead to IS security effectiveness in an IT organization. A survey of Association of Computer and Multimedia Industry of Malaysia (PIKOM) members were conducted. Based on the results of the statistical analysis, a conceptual model of IS security was developed using statistical package for social sciences (SPSS) 8.0. To test the effectiveness of the conceptual model, a case study was done on a typical IT organization to review its IS security status. Finally, findings from this case study were compared with the results from the statistical analysis. The results from the statistical analysis shows that systems environment security control, codes of ethics, security software control and top management support have a positive significant effect on the level of security effectiveness whereas disincentives certainty and organizational maturity was found to have negative significant effect on the level of security effectiveness. Findings from the case study shows that disincentives certainty, systems environment security control, security software control and organizational maturity are key factors contributing to IS security effectiveness while codes of ethics and top management support are insignificant to IS security effectiveness.","PeriodicalId":277507,"journal":{"name":"9th Asia-Pacific Conference on Communications (IEEE Cat. No.03EX732)","volume":"85 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114040220","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Modified step-size distribution method for evaluating FWM efficiency in WDM transmission systems","authors":"Yan Liu","doi":"10.1109/APCC.2003.1274430","DOIUrl":"https://doi.org/10.1109/APCC.2003.1274430","url":null,"abstract":"In order to realize reliable and fast simulation of FWM power evaluation, USSD (uniform step-size distribution) method is modified and its corresponding simulation results of FWM efficiency and computational time are presented.","PeriodicalId":277507,"journal":{"name":"9th Asia-Pacific Conference on Communications (IEEE Cat. No.03EX732)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126085136","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A new microwave discriminator","authors":"T. Chattopadhyay, S. Chattopadhyay","doi":"10.1109/APCC.2003.1274265","DOIUrl":"https://doi.org/10.1109/APCC.2003.1274265","url":null,"abstract":"This paper presents the theory and experiment of a hybrid microwave FM discriminator that operates on the combined principles of an active and a passive microwave discriminator. This discriminator implemented from passive waveguide components and a Gunn oscillator is found to have a bandwidth equal to the lockband of the Gunn oscillator and frequency sensitivity greater than that of an active discriminator. The overall figure of merit of this discriminator is greater than that of a passive and an active microwave discriminator.","PeriodicalId":277507,"journal":{"name":"9th Asia-Pacific Conference on Communications (IEEE Cat. No.03EX732)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121379429","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Switched real-time Ethernet in industrial applications - deadline partitioning","authors":"H. Hoang, M. Jonsson","doi":"10.1109/APCC.2003.1274315","DOIUrl":"https://doi.org/10.1109/APCC.2003.1274315","url":null,"abstract":"This paper presents work on a switched Ethernet network extended to allow for periodic real-time traffic, using earliest deadline first (EDF) scheduling. A scheme of asymmetrically dividing deadlines of real-time channels between the in and outgoing links to/from the switch is proposed (ADPS). The scheme is compared with the simpler approach of dividing the deadlines in two (SDPS). The results of several software simulations of setting up RT channels over a full-duplex switched Ethernet network are presented. The simulations show that the ADPS performs better than the SDPS when master-slave communication is assumed over the network.","PeriodicalId":277507,"journal":{"name":"9th Asia-Pacific Conference on Communications (IEEE Cat. No.03EX732)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128684787","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}