2010 International Conference on Communications and Mobile Computing最新文献

筛选
英文 中文
Research on Hardware-in-Loop Simulation Signal Platform for VHF Navigation 甚高频导航硬件在环仿真信号平台研究
2010 International Conference on Communications and Mobile Computing Pub Date : 2010-04-12 DOI: 10.1109/CMC.2010.237
Liansheng Liu, Jianfei Jiang, Lei Zhang
{"title":"Research on Hardware-in-Loop Simulation Signal Platform for VHF Navigation","authors":"Liansheng Liu, Jianfei Jiang, Lei Zhang","doi":"10.1109/CMC.2010.237","DOIUrl":"https://doi.org/10.1109/CMC.2010.237","url":null,"abstract":"VHF (Very High Frequency) navigation system is an important part of the modern airplane, supplying the real-time navigation parameters. In the case of laboratory, in order to shorten the developing time and save the resources, we always use system model replacing the real system to accomplish the assignment. This paper, aiming at VHF navigation, will establish the mathematic model based on Software-Defined Radio theory and the hardware model based on FPGA technology, simulating the whole process of generating the signal from the ground station, receiving and transiting the message by the airplane equipment, and ultimately sending the parameter signal to the terminals.","PeriodicalId":296445,"journal":{"name":"2010 International Conference on Communications and Mobile Computing","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129563415","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Cascade Decision-Tree Improvement Algorithm Based on Unbalanced Data Set 基于非平衡数据集的级联决策树改进算法
2010 International Conference on Communications and Mobile Computing Pub Date : 2010-04-12 DOI: 10.1109/CMC.2010.171
Wang Yi
{"title":"The Cascade Decision-Tree Improvement Algorithm Based on Unbalanced Data Set","authors":"Wang Yi","doi":"10.1109/CMC.2010.171","DOIUrl":"https://doi.org/10.1109/CMC.2010.171","url":null,"abstract":"In the past research, the data mining that using single classifier can not obtain satisfactory results. This paper proposed an improved decision-tree classification algorithm MAdaBoost for solving the customers’ chruning problem. The idea of this algorithm is that using cascaded structure to construct more decision tree classifier based on AdaBoost. This tree have a better classification results according to the experimental results.","PeriodicalId":296445,"journal":{"name":"2010 International Conference on Communications and Mobile Computing","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129639609","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Node Localization with a Mobile Beacon Based on Ant Colony Algorithm in Wireless Sensor Networks 无线传感器网络中基于蚁群算法的移动信标节点定位
2010 International Conference on Communications and Mobile Computing Pub Date : 2010-04-12 DOI: 10.1109/CMC.2010.21
Fu Qin, Chen Wei, Liu Ke-zhong
{"title":"Node Localization with a Mobile Beacon Based on Ant Colony Algorithm in Wireless Sensor Networks","authors":"Fu Qin, Chen Wei, Liu Ke-zhong","doi":"10.1109/CMC.2010.21","DOIUrl":"https://doi.org/10.1109/CMC.2010.21","url":null,"abstract":"A novel node localization scheme using a mobile beacon is proposed. In this scheme, the number and positions of the virtual beacons is determined based on equilateral triple optimal coverage, so sufficient localization information can be obtained for each unknown node. And we apply the ant colony algorithm (ACA) to get the optimal path that mobile beacon tour all the virtual beacons. In order to further improve location accuracy, we propose the optimal filtering method to select the optimal set of virtual beacon points for node localization. Simulation results show that our scheme has higher position accuracy, larger location coverage rate and lower energy consumption in comparison to existing ones.","PeriodicalId":296445,"journal":{"name":"2010 International Conference on Communications and Mobile Computing","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127460069","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Radio Transmitter Fingerprint Identification Using a Novel Method of Weighted Multi-feature Joint Detection Algorithm 基于加权多特征联合检测算法的无线发射机指纹识别
2010 International Conference on Communications and Mobile Computing Pub Date : 2010-04-12 DOI: 10.1109/CMC.2010.240
Qijun Wu, Bingbing Li
{"title":"Radio Transmitter Fingerprint Identification Using a Novel Method of Weighted Multi-feature Joint Detection Algorithm","authors":"Qijun Wu, Bingbing Li","doi":"10.1109/CMC.2010.240","DOIUrl":"https://doi.org/10.1109/CMC.2010.240","url":null,"abstract":"Radio transmitter identification is a technology used to identify the target transmitter by the subtle characters marked the individual transmitter. However, how to extract some characteristics from a transmitter and how to use the relation between different characters to identify the transmitters is very difficult task in the radio transmitter identification. In order to overcome the deficiencies based on single character in the traditional method which has a low correct recognition rate, a novel classification method based on multi-feature joint detection for radio transmitter identification is proposed in this paper. This method has remarkably improved the correct recognition rate, and its rationality and validity can be shown by the simulation results.","PeriodicalId":296445,"journal":{"name":"2010 International Conference on Communications and Mobile Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131031850","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A New Design of Low Cost Security Coprocessor for Portable Electronic Devices 一种新型便携式电子设备低成本安全协处理器的设计
2010 International Conference on Communications and Mobile Computing Pub Date : 2010-04-12 DOI: 10.1109/CMC.2010.127
Chao Li, Yuan Jiang, Dan Su, Yongjun Xu, Zuying Luo
{"title":"A New Design of Low Cost Security Coprocessor for Portable Electronic Devices","authors":"Chao Li, Yuan Jiang, Dan Su, Yongjun Xu, Zuying Luo","doi":"10.1109/CMC.2010.127","DOIUrl":"https://doi.org/10.1109/CMC.2010.127","url":null,"abstract":"Security processing provides user authentication and secure communication for portable electronic devices. Security processors for portable electronic devices should occupy small area, consume low power, handle several cryptography algorithms, and provide acceptable performance. This paper presents a low cost security coprocessor architecture based on the design ideas of reconfigurability, scalability and tightly coupled structure, which can achieve four kinds of standard cryptography algorithms on a universal architecture. The new architecture can reduce the area and power consumption of security chip, and improve universality, flexibility and security of the whole system. A new algorithm is implemented by changing the contents of the instruction register in this paper. The low cost security coprocessor targets portable electronic products. Finally, simulation and experiment results are provided to verify the ideas of the paper.","PeriodicalId":296445,"journal":{"name":"2010 International Conference on Communications and Mobile Computing","volume":"18 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130686005","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
An Optimal Cross-Layer Model for Maximum Lifetime Routing in Wireless Sensor Networks 无线传感器网络中最大生存期路由的最优跨层模型
2010 International Conference on Communications and Mobile Computing Pub Date : 2010-04-12 DOI: 10.1109/CMC.2010.182
Tong Zhao, Tiande Guo, Wenguo Yang, Ge Chen
{"title":"An Optimal Cross-Layer Model for Maximum Lifetime Routing in Wireless Sensor Networks","authors":"Tong Zhao, Tiande Guo, Wenguo Yang, Ge Chen","doi":"10.1109/CMC.2010.182","DOIUrl":"https://doi.org/10.1109/CMC.2010.182","url":null,"abstract":"In this paper, we firstly propose a maximum lifetime routing: the path cumulative power consumption routing(PCPC), based on the information of the two layers: medium access and routing. Secondly, a min-max optimal programming model is presented to describe the routing strategy. It aims to maximize the sensor network lifetime with minimal network power consumption by exploiting the cross-layer optimization. By solving this model, the number of transmitted packets of each relay node can be estimated precisely and it is the foundation of maximize sensor network lifetime. Detailed analytical and numerical results are given to verify the feasibility and efficiency of our programming model.","PeriodicalId":296445,"journal":{"name":"2010 International Conference on Communications and Mobile Computing","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132518213","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Anti-PUE Attack Based on Joint Position Verification in Cognitive Radio Networks 认知无线网络中基于联合位置验证的反pue攻击
2010 International Conference on Communications and Mobile Computing Pub Date : 2010-04-12 DOI: 10.1109/CMC.2010.26
Lianfeng Huang, Liang Xie, Han Yu, Wumei Wang, Yan Yao
{"title":"Anti-PUE Attack Based on Joint Position Verification in Cognitive Radio Networks","authors":"Lianfeng Huang, Liang Xie, Han Yu, Wumei Wang, Yan Yao","doi":"10.1109/CMC.2010.26","DOIUrl":"https://doi.org/10.1109/CMC.2010.26","url":null,"abstract":"Cognitive Radio (CR) has been regarded as one of the options to solve the problem of low spectrum utilization. However, security problems of CR networks limit its applications. Most of the proposed security schemes are aiming at the location verification for incumbent transmitter, such as the verification technologies of Distance Ratio Test (DRT) and Distance Difference Test (DDT), but all of these methods have certain shortcomings. In this paper, a joint position verification method is proposed to enhance the positioning accuracy. Simulation results show that our method is simple and achieves high accuracy on transmitter location verification in CR network, which can improve the ability to resist PUE attack.","PeriodicalId":296445,"journal":{"name":"2010 International Conference on Communications and Mobile Computing","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130910075","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 38
Dynamic Bandwidth Allocation and Scheduling for OVSF-WCDMA Systems OVSF-WCDMA系统的动态带宽分配与调度
2010 International Conference on Communications and Mobile Computing Pub Date : 2010-04-12 DOI: 10.1109/CMC.2010.241
Chun-Chao Yeh, Pai Wang
{"title":"Dynamic Bandwidth Allocation and Scheduling for OVSF-WCDMA Systems","authors":"Chun-Chao Yeh, Pai Wang","doi":"10.1109/CMC.2010.241","DOIUrl":"https://doi.org/10.1109/CMC.2010.241","url":null,"abstract":"OVSF (Orthogonal Variable Spreading Factor) codes are used as channelization codes in WCDMA system. OVSF codes are getting popular due to his efficiency and flexibility to allocate variable bite rates for different bandwidth requirement of applications. A core design issue of OVSF code allocation schemes is to utilize the codes efficiently such that more data can be forwarded to subscribers and as soon as possible. In literal, there are different OVSF code-allocation schemes have been proposed and evaluated. In this paper, we proposed an alternate OVSF code allocation scheme for single and dedicate code allocation in WCDMA systems. The code allocation scheme consists of two parts: rate allocation and code assignment. First, we decide the rate for each active connection according to user profiles of the connection and available data in data buffer. Second, we assign OVSF code for each active connection according to the results of the rate allocation in the first stage. We compared our propose scheme with other schemes proposed in recent years. Results showed that our scheme outperforms the others, regarding data throughput and delay.","PeriodicalId":296445,"journal":{"name":"2010 International Conference on Communications and Mobile Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130926695","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Study on a Sea Radio-Wave Propagation Loss Model 海洋无线电波传播损耗模型的研究
2010 International Conference on Communications and Mobile Computing Pub Date : 2010-04-12 DOI: 10.1109/CMC.2010.57
Mingyi Zhu, Xiangyang Zhao, Yu Zhang
{"title":"Study on a Sea Radio-Wave Propagation Loss Model","authors":"Mingyi Zhu, Xiangyang Zhao, Yu Zhang","doi":"10.1109/CMC.2010.57","DOIUrl":"https://doi.org/10.1109/CMC.2010.57","url":null,"abstract":"In mobile communication, the covering range and the interference is considered to be so important in each base station that it is necessary to know the regional transmission loss. Currently, there is a high margin of error in actual transmission loss model on the sea. This paper presents a propagation loss model. After doing many experiments, the results show that the error between the models predicted levels and measured levels of models is less than 3dB within the radio line of sight. Once over the radio line of sight, the model prediction accuracy will decrease, which is to be considered the Earth's curvature on the impact of propagation loss.","PeriodicalId":296445,"journal":{"name":"2010 International Conference on Communications and Mobile Computing","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125546440","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
To Predict HF Communication Interruption Events Using VLF Method 利用VLF方法预测高频通信中断事件
2010 International Conference on Communications and Mobile Computing Pub Date : 2010-04-12 DOI: 10.1109/CMC.2010.309
You-tian Niu, Zhong-yuan Zhang, Haibing Wang, Fang-yu Wang, Xiao-nian He, Xin-fa Wang
{"title":"To Predict HF Communication Interruption Events Using VLF Method","authors":"You-tian Niu, Zhong-yuan Zhang, Haibing Wang, Fang-yu Wang, Xiao-nian He, Xin-fa Wang","doi":"10.1109/CMC.2010.309","DOIUrl":"https://doi.org/10.1109/CMC.2010.309","url":null,"abstract":"When a solar flare bursts, the sun radiates a mass of X-rays and high energy particles. X-rays arrive at the earth in the velocity of light, cause the sudden ionosphere disturbance(SID) event. The solar flare makes the VLF phase advance, brings the fall of short wave(HF) communication quality, even interrupts the HF communication. This paper gives the feasibility of predicting the HF communication interruption using VLF and the predicting method. The users may adopt preventions to improve the HF communication quality.","PeriodicalId":296445,"journal":{"name":"2010 International Conference on Communications and Mobile Computing","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123194054","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信