{"title":"Novel Two-Stage Synchronization for UWB System","authors":"Qu Jing, Tiejun Lv","doi":"10.1109/AICT.2007.32","DOIUrl":"https://doi.org/10.1109/AICT.2007.32","url":null,"abstract":"In this paper, a novel two-stage synchronization algorithm is proposed employing an energy capture scheme in the first stage and a correlation-and- comparison method in the second stage, fully exploiting adequate multipath component. Only one symbol observation is required to achieve frame synchronization, which speeds up the overall synchronization process with higher accuracy and lower complexity. Simulations are performed to demonstrate the promising performance of the presented algorithm.","PeriodicalId":334924,"journal":{"name":"The Third Advanced International Conference on Telecommunications (AICT'07)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124741261","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
V. Armoogum, K. Soyjaudah, N. Mohamudally, T. Fogarty
{"title":"Comparative Study of Path Loss Using Existing Models for Digital Television Broadcasting for Summer Season in the North of Mauritius","authors":"V. Armoogum, K. Soyjaudah, N. Mohamudally, T. Fogarty","doi":"10.1109/AICT.2007.17","DOIUrl":"https://doi.org/10.1109/AICT.2007.17","url":null,"abstract":"Field strength, carrier-to-noise ratio and bit-error- rate were measured at two antenna heights (4 m and 6 m) in the north of Mauritius Island following the launching of digital broadcasting in October 2005 at UHF Bands (470 to 862 MHz). Results show that the path loss is not constant at various locations for a constant distance around the base station. This shows the irregularity of the terrain. Furthermore, it is observed that for a particular location, the path loss for an antenna height of 6 m is lower than that of 4 m. This justifies the presence of multipath effects and the deviation of the results from the expected values. This means that the probability of signal errors is less at an antenna height of 6 m than that of 4 m. The calculated path loss is compared with other existing propagation models such as free- space, Lee, Hata and extended COST-231. The results show that Hata model is closer to the calculated path loss, that is, better agreement in sub-urban area.","PeriodicalId":334924,"journal":{"name":"The Third Advanced International Conference on Telecommunications (AICT'07)","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129580870","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Google Muni Wifi Network--Can it Compete with Cellular Voice?","authors":"Andres Arjona, Sami Takala","doi":"10.1109/AICT.2007.41","DOIUrl":"https://doi.org/10.1109/AICT.2007.41","url":null,"abstract":"Muni WiFi deployments have been widely covered by the media during the last two years. However, the economical feasibility and performance of such deployments as an alternative for voice services has not been proven. In this paper we measure the voice performance and coverage of the Google network. Then we evaluate the economical feasibility versus cellular deployments. The results show that providing a good service level for voice requires a much more expensive investment. Thus, Google's network is not a competitor for cellular voice. In the current deployment, VoIP is possible only in static scenarios and coverage across the city is not adequate except for the downtown area. For this reason, even though it is possible to use VoIP services in certain locations, the voice quality is far from optimal except for areas with excellent signal conditions. Unfortunately, such areas are rare. Likewise, access points are not densely deployed and lack coverage overlapping. Therefore, it is not possible to provide mobility to VoIP services. In mobility scenarios, voice quality degrades when the wireless link weakens and eventually the call is dropped before reaching coverage from the adjacent access point.","PeriodicalId":334924,"journal":{"name":"The Third Advanced International Conference on Telecommunications (AICT'07)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130933747","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"E-Learning at the Faculty of Computer Science of Valencia: A Report.","authors":"E. Vendrell, E. Arnal, A. Terrasa","doi":"10.1109/AICT.2007.20","DOIUrl":"https://doi.org/10.1109/AICT.2007.20","url":null,"abstract":"Over the last few years, the Faculty of Computer Science of the Universidad Politecnica de Valencia (UPV) has been offering part of the subjects included in its degrees as non-present teaching, providing a facility for the students that share their studies with a job. This facility can be seen as a virtual learning environment (VLE) that includes, in most cases, the possibility of following theoretical lectures by getting the related subject information from Websites and contacting with teachers by means of e-mail, chats and forums. Nowadays, the UPV has developed a new education platform called PoliformaT, which is available for all subjects. This new tool is intended to support a complete e-learning process, ranging from theoretical lectures to practical activities and assessment tools. This paper describes how the Faculty of Computer Science has been introducing these resources in its degrees, in order to help the learning process of the students.","PeriodicalId":334924,"journal":{"name":"The Third Advanced International Conference on Telecommunications (AICT'07)","volume":"152 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132256026","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On Anomalies in Annotation Systems","authors":"Matthias R. Brust, S. Rothkugel","doi":"10.1109/AICT.2007.33","DOIUrl":"https://doi.org/10.1109/AICT.2007.33","url":null,"abstract":"Today's computer-based annotation systems implement a wide range of functionalities that often go beyond those available in traditional paper-and- pencil annotations. Conceptually, annotation systems are based on thoroughly investigated psycho-sociological and pedagogical learning theories. They offer a huge diversity of annotation types that can be placed in textual as well as in multimedia format. Additionally, annotations can be published or shared with a group of interested parties via well-organized repositories. Although highly sophisticated annotation systems exist both conceptually as well as technologically, we still observe that their acceptance is somewhat limited. In this paper, we argue that nowadays annotation systems suffer from several fundamental problems that are inherent in the traditional paper-and-pencil annotation paradigm. As a solution, we propose to shift the annotation paradigm for the implementation of annotation system.","PeriodicalId":334924,"journal":{"name":"The Third Advanced International Conference on Telecommunications (AICT'07)","volume":"84 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122624831","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Michele Albrigo, R. Burro, O. Forlani, Franco Bersani, C. Ferreri, G. Bianco
{"title":"SFIDE: Challenges Towards Synchronous Interaction in e-Learning","authors":"Michele Albrigo, R. Burro, O. Forlani, Franco Bersani, C. Ferreri, G. Bianco","doi":"10.1109/AICT.2007.39","DOIUrl":"https://doi.org/10.1109/AICT.2007.39","url":null,"abstract":"History of the development of a synchronous tool for e-learning, with University of Verona in the unusual role of services provider.","PeriodicalId":334924,"journal":{"name":"The Third Advanced International Conference on Telecommunications (AICT'07)","volume":"150 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115307973","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Optimizing Bandwidth Allocation of Different Traffic Classes for Traffic between an ISP and a Future Home Area Network","authors":"Eugene K. W. Ng, A. Alfa","doi":"10.1109/AICT.2007.35","DOIUrl":"https://doi.org/10.1109/AICT.2007.35","url":null,"abstract":"In this paper, we use the continuous- time PH/M/n/m preemptive priority queue to model the traffic behaviour between the ISP and a future HAN. From the simulated results of the model, one can then approximate the amount of bandwidth required for each traffic class per household so that the total bandwidth required is minimized while the QoS requirements (delay and blocking probability) of the home devices are met. Thus this model could potentially be used as a network planning tool for ISPs to estimate how much bandwidth they need to provide per household for homes that use home area network. Alternatively, it could also be used to estimate what quality of service (e.g. what is the mean delay and blocking probability expected) given a certain amount of bandwidth per household.","PeriodicalId":334924,"journal":{"name":"The Third Advanced International Conference on Telecommunications (AICT'07)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125342731","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
V. Armoogum, K. Soyjaudah, A. Jugurnauth, N. Mohamudally, T. Fogarty
{"title":"Adjacent Channel Interference for DVB-T at UHF Bands in the South of Mauritius for Summer Season","authors":"V. Armoogum, K. Soyjaudah, A. Jugurnauth, N. Mohamudally, T. Fogarty","doi":"10.1109/AICT.2007.4","DOIUrl":"https://doi.org/10.1109/AICT.2007.4","url":null,"abstract":"Government decided to launch digital broadcasting as from October 2005. The implementation has been carried out at the national broadcasting carrier (MCML). Digital transmission is being done on channel 28 while analogue television (TV) is on channel 27. Adjacent channel interference occurs between analogue TV signal and Digital TV signal as the spacing between the signals is only 20 MHz. In this paper we present measurements made to determine the degradation caused by an analogue PAL television interference on digital television signal. The experiment was done at distances 5 km, 10 km and 15 km around the base station at various locations. At each site, measurements were made using a log-periodic antenna at heights of 4 m and 6 m above the ground. It is shown that most measuring sites selected satisfy the lower adjacent protection ratio recommended by ITU-R. However, in 12 sites the power ratio is lower than the recommended ITU-R value of -11 dB. Secondly, the results show that there is negligible effect on the channel interference at the predefined heights. The results for distances of 5 km, 10 km and 15 km prove that the power ratio due to the overlapping of the two spectra remains constant and does not depend upon distance from the base station. Finally, a test was carried by increasing the transmitted power from 200 W to 250 W. The test shows that there is no difference in the lower adjacent channel interference despite the fact that theoretically there should have been an improvement. Further investigation should be carried out to determine its cause.","PeriodicalId":334924,"journal":{"name":"The Third Advanced International Conference on Telecommunications (AICT'07)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123794482","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An e-Learning Framework Based on Semantic Weblogs","authors":"S. Berman, V. Katoma","doi":"10.1109/AICT.2007.10","DOIUrl":"https://doi.org/10.1109/AICT.2007.10","url":null,"abstract":"Blogging is so easy to do and so appealing, that nowadays even very young children are active on sites like Myspace. We believe that weblogs are the most promising technology for e-learning, and define a framework for turning a semantic webblog into an effective educational tool. This paper describes our approach to harnessing the power and allure of blogging to promote collaborative learning and to develop students' critical thinking and writing skills. The technology behind blogs facilitates evaluation of items and individuals, as well as a means of using this to automatically improve the weblog. Initial experiments with our e-learning blog indicate that blogs and the way we use them are a useful educational tool.","PeriodicalId":334924,"journal":{"name":"The Third Advanced International Conference on Telecommunications (AICT'07)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127612238","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Adaptive IEEE 802.11i Security for Energy-Security Optimization","authors":"M. R. Doomun, K. Soyjaudah","doi":"10.1109/AICT.2007.3","DOIUrl":"https://doi.org/10.1109/AICT.2007.3","url":null,"abstract":"As computing devices and wireless connectivity become ubiquitous, the need for efficient secure wireless networks becomes a critical concern. Low power consumption is currently one of the major issues for all wireless application. Emerging wireless and mobile appliances are severely constrained in the resources they possess, namely, processor, battery, and memory. Energy consumed by computation and communication intensive wireless security protocols used to provide data privacy, integrity and authenticity is a function of the size of the data transferred and the security level of the session. In this paper we propose an adaptive security scheme for wireless networks to optimize battery energy consumption. We base our model on well-established simulation results and methodologies that leads to rigorous modularization for energy-conscious and energy-conserving wireless security design.","PeriodicalId":334924,"journal":{"name":"The Third Advanced International Conference on Telecommunications (AICT'07)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128285199","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}