{"title":"A Mobile Infrastructure Based VANET Routing Protocol in the Urban Environment","authors":"Jie Luo, Xinxing Gu, Tong Zhao, W. Yan","doi":"10.1109/CMC.2010.113","DOIUrl":"https://doi.org/10.1109/CMC.2010.113","url":null,"abstract":"The vehicular ad hoc network (VANET) is an emerging new technology. Developing multi-hop routing protocols for urban VANETs is a challenging task due to many factors such as frequent network disconnections. Many VANET routing protocols use a carry-and-forward mechanism to deal with the challenge. However, this mechanism introduces a large packet delay, which might be unacceptable for some applications. In this paper, we first analyze the unique features of urban VANET that vehicles have different types, and move like clusters due to the influence of traffic lights. So, the concept of using buses as the mobile infrastructure to improve the network connectivity is proposed. We also develop a novel routing protocol named MIBR (Mobile Infrastructure Based VANET Routing Protocol). This protocol makes full use of the buses, making them a key component in route selecting and packet forwarding. Simulation results show significant performance improvement in terms of packet delivery ratio and throughput.","PeriodicalId":296445,"journal":{"name":"2010 International Conference on Communications and Mobile Computing","volume":"220 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113969321","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"TFS: A Novel File System for Mobile Multimedia System","authors":"Jun Lu, Jian Huang, Xi-shun Yue, Ly Ren, Ms Hou","doi":"10.1109/CMC.2010.157","DOIUrl":"https://doi.org/10.1109/CMC.2010.157","url":null,"abstract":"This paper presents a novel high performance file system for mobile multimedia system: Track File System (TFS) based on the researches of the character of modern disk drive. This paper firstly analyses the non-linear seek latency character of modern disk drive, and then indicate the drawback of UNIX fast file system (FFS) due to small writes of mobile multimedia files. Then, this paper describes a novel disk layout of TFS: putting the meta-data and data into the same track. This disk layout of TFS can effectively depress the seek overhead of access for mobile multimedia files and greatly improve file system throughput. The experiments of this paper show that TFS is a high performance file system for mobile multimedia system.","PeriodicalId":296445,"journal":{"name":"2010 International Conference on Communications and Mobile Computing","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126559878","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cooperative Spectrum Sensing under Imperfect Channel Estimation","authors":"Qinghua Shen, Xuanli Wu, X. Sha, Naitong Zhang","doi":"10.1109/CMC.2010.250","DOIUrl":"https://doi.org/10.1109/CMC.2010.250","url":null,"abstract":"Recently proposed cooperative spectrum sensing method suggests that Cognitive Radio (CR) users can detect the primary users at low SNR with less time and higher accuracy through user cooperation. However, previous works assume CR users can acquire fully channel state information by pilot symbols, which is impractical. In this paper, the performance with imperfect channel estimation in cooperative spectrum sensing method is analyzed and the trade-offs between false alarm probability and leakage alarm probability on the decision of threshold under imperfect channel estimation is presented. Simulation results show that the imperfect channel estimation would reduce the benefits obtained from cooperation. When estimation error grows to 0.3 there would be a 0.11 loss in detection probability and the false alarm probability, which is important to CR system, would increase from 0.1 to 0.4.","PeriodicalId":296445,"journal":{"name":"2010 International Conference on Communications and Mobile Computing","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128161846","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Xuejing Ning, Hu Li, Lei Fan, Jia Wang, Zhisen Wang
{"title":"Wireless Multi-hop Self-Organizing Network in Tunnels","authors":"Xuejing Ning, Hu Li, Lei Fan, Jia Wang, Zhisen Wang","doi":"10.1109/CMC.2010.199","DOIUrl":"https://doi.org/10.1109/CMC.2010.199","url":null,"abstract":"The communications in tunnels is always a severe problem for its special environment. The multi-hop wireless self-organizing network, which uses many wireless points (WPs) to relay the signal as a virtual Base Station(BS), with characteristics of lower power, self-organizability can be the most appropriate solution to it. This paper analyzes system power efficiency of this multi-hop network and numerical simulation is conducted to evaluate the effects. Finally the conclusion is drew that with the increasing of the numbers of WPs and the maximum number of allowable hops, the required system power will be reduced obviously.","PeriodicalId":296445,"journal":{"name":"2010 International Conference on Communications and Mobile Computing","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125604045","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Wireless Communications Network Design Based on the LPC2138","authors":"J. Xiaolin, Miao Yu, Gu Xuemai, Zhou Yang","doi":"10.1109/CMC.2010.178","DOIUrl":"https://doi.org/10.1109/CMC.2010.178","url":null,"abstract":"In the framework of the hardware platform, CC2420 chip which supports IEEE 802.15.4 protocol is used as RF transceiver controlling chip. 32-bit high-performance ARM processor LPC2138 is used as both protocol controller and data acquisition. Through the OP to improve the transmitting power and receiving sensitivity. The system adapts to the Universal 2.4 GHz band and it has a high transfer rate and multi-channel features. Finally, the testing result shows that the transmitting power for the platform is more than 25 dBm, the communication distance is more than 3km. It realizes the communication between platforms.","PeriodicalId":296445,"journal":{"name":"2010 International Conference on Communications and Mobile Computing","volume":"35 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134092346","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Channel Assignment Problem in Cellular Mobile Network: A Distributed Constraint Satisfaction Approach","authors":"Visale Kim, Wei Liu, W. Cheng","doi":"10.1109/CMC.2010.296","DOIUrl":"https://doi.org/10.1109/CMC.2010.296","url":null,"abstract":"Since the natural resources of electromagnetic spectrum are strictly administrated, the channel assignment problem (CAP) has been an important issue for cellular mobile network. CAP is a well-known NP-hard problem, which is to minimize the maximum of channel utilization, while guaranteeing the voice quality. In this paper, we model CAP as a Distributed Constraint Satisfaction Problem (DCSP) with fully considerations on all kinds of interference constraints. A kind of distributed backtracking algorithm (DBA) is proposed to solve this DCSP problem. Simulation results show that, comparing with the similar previous work in [10], our approach can achieve much tight lower bounds on the number of required channels with related less computation time and cost.","PeriodicalId":296445,"journal":{"name":"2010 International Conference on Communications and Mobile Computing","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132622814","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Tracking Maneuvering Target with Angle-Only Measurements Using IMM Algorithm Based on CKF","authors":"Mingjie Wan, Pengfei Li, Tao Li","doi":"10.1109/CMC.2010.239","DOIUrl":"https://doi.org/10.1109/CMC.2010.239","url":null,"abstract":"The interacting multiple model (IMM) algorithm is specially designed to track accurately targets whose state and measurement models changes during motion transition. However, when these models are nonlinear, the IMM algorithm must be modified in order to guarantee an accurate track. Recently, the cubature Kalman filter (CKF) has been proposed to estimate the nonlinear system, and could perform better than unscented Kalman filter (UKF). In this paper, the IMM algorithm CKF based (IMM-CKF) is presented to track the maneuvering target using angular measurements. The simulation results demonstrate the improved performance of IMM-CKF over IMM-UKF, and the execution time of the former algorithm is shorter than the latter.","PeriodicalId":296445,"journal":{"name":"2010 International Conference on Communications and Mobile Computing","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130685139","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Enhanced Location Estimation Approach Based on Fingerprinting Technique","authors":"Xuejing Jiang, Ye Liu, Xiaolei Wang","doi":"10.1109/CMC.2010.124","DOIUrl":"https://doi.org/10.1109/CMC.2010.124","url":null,"abstract":"This paper aims to locate the target position by using RFID Readers and tags with minimum error. After investigating the existing fingerprinting location technique, we find that the distribution of RSSI-value at each sample point is fluctuant even in the same position. Therefore, we propose an enhanced algorithm to the existing deterministic algorithms. The proposed enhancement approach collects ranges of possible RSSI-values from either sample point or target object to build the probability model, which is different from original algorithm that only saves one single RSSI-value at each point into a database, then several sets of RSSI-values are got for further location by using permutation and combination. Unlike the existing techniques, more than one locations are computed and the final location is the weighted average of those computed locations. simulation results and experimental comparisons are shown, in order to prove the accuracy of location estimation is improved.","PeriodicalId":296445,"journal":{"name":"2010 International Conference on Communications and Mobile Computing","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130785461","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Peeraphong Boonlert, S. Sae-Wong, T. Kamolphiwong, S. Kamolphiwong
{"title":"Design Framework and Architecture of Unified Presence Service","authors":"Peeraphong Boonlert, S. Sae-Wong, T. Kamolphiwong, S. Kamolphiwong","doi":"10.1109/CMC.2010.284","DOIUrl":"https://doi.org/10.1109/CMC.2010.284","url":null,"abstract":"Unified Communication and Collaboration (UCC) system is the converging service of all communications. IMS (IP Multimedia Subsystem) is expected to be a core service for both Internet and mobile phones. Hence, UCC certainly involves with IMS to provide a future service to both world. Presence service is crucial component in UCC system. It provides notifications and presence information of users and any devices to a particular user who requires this service. However, a traditional presence service system is inadequate to satisfy rich features services of UCC. Since users have a large number of presence information sent by many services in system, how a system gives all presence information a user appropriately. This scenario is so called ‘ massive PI’. There are several challenging issues on this topic. In this paper, we have proposed ‘Unified Presence Service’ (or UPS) to deliver a massive PI in UCC environment. A system framework and architecture of UPS is presented. In this design framework, all related signals and components are illustrated, its description and functions are presented. We have shown some sample scenarios to demonstrate its benefits and advantages which cannot be delivered by those previous works. We believe that this service framework is significant for future services in a convergence world like UCC.","PeriodicalId":296445,"journal":{"name":"2010 International Conference on Communications and Mobile Computing","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130800196","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Attribute Reduction Method Applied to IDS","authors":"Xiang Cheng, B. Liu, Yi-lai Zhang","doi":"10.1109/CMC.2010.202","DOIUrl":"https://doi.org/10.1109/CMC.2010.202","url":null,"abstract":"In this paper, we apply a new linear correlation attribute reduction algorithm to feature selection. The algorithm is valuable when the features are marginally unrelated but jointly related to the response variable. A new technique is introduced to remove redundant attributes and it is effective to reduce the false selection rate in the feature selection stage. We train and test the new algorithm on KDD1999 data set, and compare the experiment results to illustrate the methodology.","PeriodicalId":296445,"journal":{"name":"2010 International Conference on Communications and Mobile Computing","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130911764","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}