{"title":"Research on Hardware-in-Loop Simulation Signal Platform for VHF Navigation","authors":"Liansheng Liu, Jianfei Jiang, Lei Zhang","doi":"10.1109/CMC.2010.237","DOIUrl":"https://doi.org/10.1109/CMC.2010.237","url":null,"abstract":"VHF (Very High Frequency) navigation system is an important part of the modern airplane, supplying the real-time navigation parameters. In the case of laboratory, in order to shorten the developing time and save the resources, we always use system model replacing the real system to accomplish the assignment. This paper, aiming at VHF navigation, will establish the mathematic model based on Software-Defined Radio theory and the hardware model based on FPGA technology, simulating the whole process of generating the signal from the ground station, receiving and transiting the message by the airplane equipment, and ultimately sending the parameter signal to the terminals.","PeriodicalId":296445,"journal":{"name":"2010 International Conference on Communications and Mobile Computing","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129563415","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Cascade Decision-Tree Improvement Algorithm Based on Unbalanced Data Set","authors":"Wang Yi","doi":"10.1109/CMC.2010.171","DOIUrl":"https://doi.org/10.1109/CMC.2010.171","url":null,"abstract":"In the past research, the data mining that using single classifier can not obtain satisfactory results. This paper proposed an improved decision-tree classification algorithm MAdaBoost for solving the customers’ chruning problem. The idea of this algorithm is that using cascaded structure to construct more decision tree classifier based on AdaBoost. This tree have a better classification results according to the experimental results.","PeriodicalId":296445,"journal":{"name":"2010 International Conference on Communications and Mobile Computing","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129639609","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Node Localization with a Mobile Beacon Based on Ant Colony Algorithm in Wireless Sensor Networks","authors":"Fu Qin, Chen Wei, Liu Ke-zhong","doi":"10.1109/CMC.2010.21","DOIUrl":"https://doi.org/10.1109/CMC.2010.21","url":null,"abstract":"A novel node localization scheme using a mobile beacon is proposed. In this scheme, the number and positions of the virtual beacons is determined based on equilateral triple optimal coverage, so sufficient localization information can be obtained for each unknown node. And we apply the ant colony algorithm (ACA) to get the optimal path that mobile beacon tour all the virtual beacons. In order to further improve location accuracy, we propose the optimal filtering method to select the optimal set of virtual beacon points for node localization. Simulation results show that our scheme has higher position accuracy, larger location coverage rate and lower energy consumption in comparison to existing ones.","PeriodicalId":296445,"journal":{"name":"2010 International Conference on Communications and Mobile Computing","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127460069","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Radio Transmitter Fingerprint Identification Using a Novel Method of Weighted Multi-feature Joint Detection Algorithm","authors":"Qijun Wu, Bingbing Li","doi":"10.1109/CMC.2010.240","DOIUrl":"https://doi.org/10.1109/CMC.2010.240","url":null,"abstract":"Radio transmitter identification is a technology used to identify the target transmitter by the subtle characters marked the individual transmitter. However, how to extract some characteristics from a transmitter and how to use the relation between different characters to identify the transmitters is very difficult task in the radio transmitter identification. In order to overcome the deficiencies based on single character in the traditional method which has a low correct recognition rate, a novel classification method based on multi-feature joint detection for radio transmitter identification is proposed in this paper. This method has remarkably improved the correct recognition rate, and its rationality and validity can be shown by the simulation results.","PeriodicalId":296445,"journal":{"name":"2010 International Conference on Communications and Mobile Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131031850","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Chao Li, Yuan Jiang, Dan Su, Yongjun Xu, Zuying Luo
{"title":"A New Design of Low Cost Security Coprocessor for Portable Electronic Devices","authors":"Chao Li, Yuan Jiang, Dan Su, Yongjun Xu, Zuying Luo","doi":"10.1109/CMC.2010.127","DOIUrl":"https://doi.org/10.1109/CMC.2010.127","url":null,"abstract":"Security processing provides user authentication and secure communication for portable electronic devices. Security processors for portable electronic devices should occupy small area, consume low power, handle several cryptography algorithms, and provide acceptable performance. This paper presents a low cost security coprocessor architecture based on the design ideas of reconfigurability, scalability and tightly coupled structure, which can achieve four kinds of standard cryptography algorithms on a universal architecture. The new architecture can reduce the area and power consumption of security chip, and improve universality, flexibility and security of the whole system. A new algorithm is implemented by changing the contents of the instruction register in this paper. The low cost security coprocessor targets portable electronic products. Finally, simulation and experiment results are provided to verify the ideas of the paper.","PeriodicalId":296445,"journal":{"name":"2010 International Conference on Communications and Mobile Computing","volume":"18 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130686005","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Optimal Cross-Layer Model for Maximum Lifetime Routing in Wireless Sensor Networks","authors":"Tong Zhao, Tiande Guo, Wenguo Yang, Ge Chen","doi":"10.1109/CMC.2010.182","DOIUrl":"https://doi.org/10.1109/CMC.2010.182","url":null,"abstract":"In this paper, we firstly propose a maximum lifetime routing: the path cumulative power consumption routing(PCPC), based on the information of the two layers: medium access and routing. Secondly, a min-max optimal programming model is presented to describe the routing strategy. It aims to maximize the sensor network lifetime with minimal network power consumption by exploiting the cross-layer optimization. By solving this model, the number of transmitted packets of each relay node can be estimated precisely and it is the foundation of maximize sensor network lifetime. Detailed analytical and numerical results are given to verify the feasibility and efficiency of our programming model.","PeriodicalId":296445,"journal":{"name":"2010 International Conference on Communications and Mobile Computing","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132518213","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Lianfeng Huang, Liang Xie, Han Yu, Wumei Wang, Yan Yao
{"title":"Anti-PUE Attack Based on Joint Position Verification in Cognitive Radio Networks","authors":"Lianfeng Huang, Liang Xie, Han Yu, Wumei Wang, Yan Yao","doi":"10.1109/CMC.2010.26","DOIUrl":"https://doi.org/10.1109/CMC.2010.26","url":null,"abstract":"Cognitive Radio (CR) has been regarded as one of the options to solve the problem of low spectrum utilization. However, security problems of CR networks limit its applications. Most of the proposed security schemes are aiming at the location verification for incumbent transmitter, such as the verification technologies of Distance Ratio Test (DRT) and Distance Difference Test (DDT), but all of these methods have certain shortcomings. In this paper, a joint position verification method is proposed to enhance the positioning accuracy. Simulation results show that our method is simple and achieves high accuracy on transmitter location verification in CR network, which can improve the ability to resist PUE attack.","PeriodicalId":296445,"journal":{"name":"2010 International Conference on Communications and Mobile Computing","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130910075","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Dynamic Bandwidth Allocation and Scheduling for OVSF-WCDMA Systems","authors":"Chun-Chao Yeh, Pai Wang","doi":"10.1109/CMC.2010.241","DOIUrl":"https://doi.org/10.1109/CMC.2010.241","url":null,"abstract":"OVSF (Orthogonal Variable Spreading Factor) codes are used as channelization codes in WCDMA system. OVSF codes are getting popular due to his efficiency and flexibility to allocate variable bite rates for different bandwidth requirement of applications. A core design issue of OVSF code allocation schemes is to utilize the codes efficiently such that more data can be forwarded to subscribers and as soon as possible. In literal, there are different OVSF code-allocation schemes have been proposed and evaluated. In this paper, we proposed an alternate OVSF code allocation scheme for single and dedicate code allocation in WCDMA systems. The code allocation scheme consists of two parts: rate allocation and code assignment. First, we decide the rate for each active connection according to user profiles of the connection and available data in data buffer. Second, we assign OVSF code for each active connection according to the results of the rate allocation in the first stage. We compared our propose scheme with other schemes proposed in recent years. Results showed that our scheme outperforms the others, regarding data throughput and delay.","PeriodicalId":296445,"journal":{"name":"2010 International Conference on Communications and Mobile Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130926695","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Study on a Sea Radio-Wave Propagation Loss Model","authors":"Mingyi Zhu, Xiangyang Zhao, Yu Zhang","doi":"10.1109/CMC.2010.57","DOIUrl":"https://doi.org/10.1109/CMC.2010.57","url":null,"abstract":"In mobile communication, the covering range and the interference is considered to be so important in each base station that it is necessary to know the regional transmission loss. Currently, there is a high margin of error in actual transmission loss model on the sea. This paper presents a propagation loss model. After doing many experiments, the results show that the error between the models predicted levels and measured levels of models is less than 3dB within the radio line of sight. Once over the radio line of sight, the model prediction accuracy will decrease, which is to be considered the Earth's curvature on the impact of propagation loss.","PeriodicalId":296445,"journal":{"name":"2010 International Conference on Communications and Mobile Computing","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125546440","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"To Predict HF Communication Interruption Events Using VLF Method","authors":"You-tian Niu, Zhong-yuan Zhang, Haibing Wang, Fang-yu Wang, Xiao-nian He, Xin-fa Wang","doi":"10.1109/CMC.2010.309","DOIUrl":"https://doi.org/10.1109/CMC.2010.309","url":null,"abstract":"When a solar flare bursts, the sun radiates a mass of X-rays and high energy particles. X-rays arrive at the earth in the velocity of light, cause the sudden ionosphere disturbance(SID) event. The solar flare makes the VLF phase advance, brings the fall of short wave(HF) communication quality, even interrupts the HF communication. This paper gives the feasibility of predicting the HF communication interruption using VLF and the predicting method. The users may adopt preventions to improve the HF communication quality.","PeriodicalId":296445,"journal":{"name":"2010 International Conference on Communications and Mobile Computing","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123194054","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}