{"title":"Design and Performance of LDPC Codes for OFDM Based Aeronautical Communication Systems","authors":"S. Basharat, Y. Rao","doi":"10.1109/AICT.2007.19","DOIUrl":"https://doi.org/10.1109/AICT.2007.19","url":null,"abstract":"With recent developments in forward error correction (FEC) schemes, low-density parity check (LDPC) codes are gaining more and more popularity with their performance approaching to near Shannon's limits. In this paper a flexible LDPC codec is designed and optimized for OFDM transceivers in aeronautical channels. We considered OFDM based aeronautical communication systems and investigated en-route and taxi scenarios. The basic aim was to achieve a targeted BER for the proposed OFDM system, despite channel impairments and high Doppler shift (aircraft traveling at twice the supersonic speed).Through simulations, performance was evaluated for best possible system configuration. Performance of both regular and irregular LDPC codes is evaluated as a function of code rate, column weight, number of decoder iterations, coding delay, number of cycles and block length. For OFDM system type of modulation, number of subcarriers and FFT size are used as metrics for performance evaluation.","PeriodicalId":334924,"journal":{"name":"The Third Advanced International Conference on Telecommunications (AICT'07)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121025724","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Federated Knowledge Spaces","authors":"S. Encheva, S. Tumin, M. Solesvik","doi":"10.1109/AICT.2007.23","DOIUrl":"https://doi.org/10.1109/AICT.2007.23","url":null,"abstract":"In this paper we propose a model for automated assessment of learner's knowledge in a well-defined domain. Arranging knowledge states in a distributive lattice based on prerequisite and surmise relationships among them is considered. The suggested framework is intended to be a building block of an intelligent tutoring system.","PeriodicalId":334924,"journal":{"name":"The Third Advanced International Conference on Telecommunications (AICT'07)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129300551","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Agent-Based Location Aware Services in Wireless Mobile Networks","authors":"A. Sutagundar, S. S. Manvi, M. N. Birje","doi":"10.1109/AICT.2007.6","DOIUrl":"https://doi.org/10.1109/AICT.2007.6","url":null,"abstract":"As mobile devices and third generation mobile networks have become a reality, location based services are thought to be a major growing area. Mobile devices are given context sensitiveness so that they can be aware of the users/services surrounding physical environment and state. In this paper we propose location aware services scheme by using an agency, which helps in discovering the required services for the mobile users. The agency consists of five agents: manager agent (MA), route monitoring agent (RMA), local service management agent (LSMA), global service management agent (GSMA) and area monitoring agent (AMA). Agency can manage services in case of service breakdown, node and link failures. The proposed scheme is simulated and tested for different network topologies by considering different mobility scenarios. It is observed that agency offers flexible and adaptable services.","PeriodicalId":334924,"journal":{"name":"The Third Advanced International Conference on Telecommunications (AICT'07)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133712202","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Towards Security Analyses of an Identity Federation Protocol for Web Services in Convergent Networks","authors":"M. T. Beek, C. Moiso, M. Petrocchi","doi":"10.1109/AICT.2007.46","DOIUrl":"https://doi.org/10.1109/AICT.2007.46","url":null,"abstract":"We describe a formal approach to the analysis of security aspects of an identity federation protocol for Web services in convergent networks. This network protocol was proposed by Telecom Italia as a solution to allow end users to access services on the Web through different access networks without explicitly providing any credentials, while the service providers can trust the user's identity information provided by the access networks and access some user data. As a first step towards a fullblown formal security analysis of the protocol, we specify three user scenarios in the process algebra Crypto-CCS and verify the vulnerability of one of these specifications w.r.t. a man-in-the-middle attack with the model checker PaMoChSA.","PeriodicalId":334924,"journal":{"name":"The Third Advanced International Conference on Telecommunications (AICT'07)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114171912","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Metaheuristics for Wireless Network Optimisation","authors":"M. Morgan, V. Grout","doi":"10.1109/AICT.2007.28","DOIUrl":"https://doi.org/10.1109/AICT.2007.28","url":null,"abstract":"This paper introduces two new algorithms for the minimum connected dominating set (MCDS) problem with constraints applicable to wireless network design, based on simulated annealing and tabu search principles. Each algorithm is tested on a selection of random graphs and shown to produce significantly smaller connected dominating sets when compared to a number of established methods. The simulated annealing algorithm is found to favour large, sparse graphs while the tabu search heuristic prefers smaller dense instances. In conclusion, we consider the adaptation of these algorithms to hybrid techniques and comment on the possible use of hyper-heuristics.","PeriodicalId":334924,"journal":{"name":"The Third Advanced International Conference on Telecommunications (AICT'07)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121470327","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Model Driven LMS Platform Integration","authors":"Z. Bizonova, D. Ranc","doi":"10.1109/AICT.2007.29","DOIUrl":"https://doi.org/10.1109/AICT.2007.29","url":null,"abstract":"The growing choice of e-learning platform technologies leads to new difficulties. In particular, it becomes hard to manage or to compare available platforms and to re-use existing course material from different kinds of platforms because of technological discrepancy. This paper proposes a tentative solution of this difficulty - a common platform- independent framework that can be used to specify and classify existing or future learning management systems (LMS) and possibility of their cooperation. The proposed framework is based on OMG's Model Driven Architecture.","PeriodicalId":334924,"journal":{"name":"The Third Advanced International Conference on Telecommunications (AICT'07)","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114262310","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Network Complexity: Cross-Layer Models and Characteristics","authors":"V. Zaborovsky, A. Gorodetsky, A. Lapin","doi":"10.1109/AICT.2007.31","DOIUrl":"https://doi.org/10.1109/AICT.2007.31","url":null,"abstract":"Many fundamental important questions regarding Internet processes and protocols cross-layer interaction are still remained unexplored. One of the questions is network complexity as a character of network behavior. Today complexity has three distinct and almost opposite meanings. In one case, complexity is synonymous with fluctuation in traffic dynamics and the lack of predictable structure. The second sense of complexity refers instead to how structured, hierarchical, and sophisticated a network process is. That is, \"complexity\" is an indicator of how many layers of order is embedded in a process. The third sense is Kolmogorov Complexity or measure of compactness of algorithmic code that can be used to modeling process. This paper considers complexity as a on of fundamental property that can be applied to describe cross-layer interaction, fractal characteristics and invariant properties caused by elastic dynamics of the virtual TCP connection and statistical distribution of retransmission.","PeriodicalId":334924,"journal":{"name":"The Third Advanced International Conference on Telecommunications (AICT'07)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121283795","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Advance Detection Techniques for Beyond 3G Wireless","authors":"N. Al-Dabbous, B. Sharif","doi":"10.1109/AICT.2007.5","DOIUrl":"https://doi.org/10.1109/AICT.2007.5","url":null,"abstract":"One of the main challenges that face wireless multimedia communications is spectral limitations. Current second generation (2G) systems cannot support the demanding throughput requirements of the ever increasing wireless services. Third generation (3G) systems, which promised to provide a data rate of 2 Mbps for indoor users and 384 kbps for mobile users, are also unable to support the requirements of bandwidth intensive services such as streaming video. In this paper the spatial processing is investigated to improve date rate provisions in future generation mobile communication systems. Adaptive antenna and interference cancellation are employed for Multicarrier CDMA in order to achieve robust multi-user detection.","PeriodicalId":334924,"journal":{"name":"The Third Advanced International Conference on Telecommunications (AICT'07)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125083470","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Implementation of Distributed E-Learning System on Power Line Network","authors":"K. Bahrami, M. Abedi, B. Daemi","doi":"10.1109/AICT.2007.25","DOIUrl":"https://doi.org/10.1109/AICT.2007.25","url":null,"abstract":"This study introduces a distributed e-learning system on power line network. E-learning system, in general, consists of learning management system (LMS) for managing users and courses, learning content management system (LCMS) for offering educational contents to learners and course authoring for course and content design. Today, there is a great deal of requests, issued simultaneously by worldwide users from any place at any time, for e-learning systems. Because of enormous amount of requests and simultaneous connections of users, server's performance and response time may degrade. Power line communication has high influence and is high speed medium that can be utilized as platform for e-learning. On the other hand, it is possible to implement distributed e-learning system on a power line network to distribute load of requests on multiple servers and improve their performances. In this paper, we propose software architecture and network design for distributed e-learning system on power line network.","PeriodicalId":334924,"journal":{"name":"The Third Advanced International Conference on Telecommunications (AICT'07)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125537255","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Practical Security Testing of Telecommunications Software--A Case Study","authors":"R. Savola, K. Karppinen","doi":"10.1109/AICT.2007.37","DOIUrl":"https://doi.org/10.1109/AICT.2007.37","url":null,"abstract":"In order to obtain evidence about the security strength in products we need automated information security analysis, validation, evaluation and testing approaches. Unfortunately, no widely accepted practical approaches are available. Information security testing of software-intensive and telecommunications systems typically relies heavily on the experience of the security professionals. In this study, we argue that security requirements are within the focus of the information security testing process. Information security requirements can be based on iterative risk, threat and vulnerability analyses, and technical and architectural information. We discuss security testing process, security objectives and security requirements from the basis of the experiences of a security testing case study project.","PeriodicalId":334924,"journal":{"name":"The Third Advanced International Conference on Telecommunications (AICT'07)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116270241","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}