The Third Advanced International Conference on Telecommunications (AICT'07)最新文献

筛选
英文 中文
Design and Performance of LDPC Codes for OFDM Based Aeronautical Communication Systems 基于OFDM的航空通信系统LDPC码的设计与性能
The Third Advanced International Conference on Telecommunications (AICT'07) Pub Date : 2007-05-13 DOI: 10.1109/AICT.2007.19
S. Basharat, Y. Rao
{"title":"Design and Performance of LDPC Codes for OFDM Based Aeronautical Communication Systems","authors":"S. Basharat, Y. Rao","doi":"10.1109/AICT.2007.19","DOIUrl":"https://doi.org/10.1109/AICT.2007.19","url":null,"abstract":"With recent developments in forward error correction (FEC) schemes, low-density parity check (LDPC) codes are gaining more and more popularity with their performance approaching to near Shannon's limits. In this paper a flexible LDPC codec is designed and optimized for OFDM transceivers in aeronautical channels. We considered OFDM based aeronautical communication systems and investigated en-route and taxi scenarios. The basic aim was to achieve a targeted BER for the proposed OFDM system, despite channel impairments and high Doppler shift (aircraft traveling at twice the supersonic speed).Through simulations, performance was evaluated for best possible system configuration. Performance of both regular and irregular LDPC codes is evaluated as a function of code rate, column weight, number of decoder iterations, coding delay, number of cycles and block length. For OFDM system type of modulation, number of subcarriers and FFT size are used as metrics for performance evaluation.","PeriodicalId":334924,"journal":{"name":"The Third Advanced International Conference on Telecommunications (AICT'07)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121025724","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Federated Knowledge Spaces 联邦知识空间
The Third Advanced International Conference on Telecommunications (AICT'07) Pub Date : 2007-05-13 DOI: 10.1109/AICT.2007.23
S. Encheva, S. Tumin, M. Solesvik
{"title":"Federated Knowledge Spaces","authors":"S. Encheva, S. Tumin, M. Solesvik","doi":"10.1109/AICT.2007.23","DOIUrl":"https://doi.org/10.1109/AICT.2007.23","url":null,"abstract":"In this paper we propose a model for automated assessment of learner's knowledge in a well-defined domain. Arranging knowledge states in a distributive lattice based on prerequisite and surmise relationships among them is considered. The suggested framework is intended to be a building block of an intelligent tutoring system.","PeriodicalId":334924,"journal":{"name":"The Third Advanced International Conference on Telecommunications (AICT'07)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129300551","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Agent-Based Location Aware Services in Wireless Mobile Networks 无线移动网络中基于代理的位置感知服务
A. Sutagundar, S. S. Manvi, M. N. Birje
{"title":"Agent-Based Location Aware Services in Wireless Mobile Networks","authors":"A. Sutagundar, S. S. Manvi, M. N. Birje","doi":"10.1109/AICT.2007.6","DOIUrl":"https://doi.org/10.1109/AICT.2007.6","url":null,"abstract":"As mobile devices and third generation mobile networks have become a reality, location based services are thought to be a major growing area. Mobile devices are given context sensitiveness so that they can be aware of the users/services surrounding physical environment and state. In this paper we propose location aware services scheme by using an agency, which helps in discovering the required services for the mobile users. The agency consists of five agents: manager agent (MA), route monitoring agent (RMA), local service management agent (LSMA), global service management agent (GSMA) and area monitoring agent (AMA). Agency can manage services in case of service breakdown, node and link failures. The proposed scheme is simulated and tested for different network topologies by considering different mobility scenarios. It is observed that agency offers flexible and adaptable services.","PeriodicalId":334924,"journal":{"name":"The Third Advanced International Conference on Telecommunications (AICT'07)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133712202","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Towards Security Analyses of an Identity Federation Protocol for Web Services in Convergent Networks 融合网络中Web服务身份联合协议的安全性分析
The Third Advanced International Conference on Telecommunications (AICT'07) Pub Date : 2007-05-13 DOI: 10.1109/AICT.2007.46
M. T. Beek, C. Moiso, M. Petrocchi
{"title":"Towards Security Analyses of an Identity Federation Protocol for Web Services in Convergent Networks","authors":"M. T. Beek, C. Moiso, M. Petrocchi","doi":"10.1109/AICT.2007.46","DOIUrl":"https://doi.org/10.1109/AICT.2007.46","url":null,"abstract":"We describe a formal approach to the analysis of security aspects of an identity federation protocol for Web services in convergent networks. This network protocol was proposed by Telecom Italia as a solution to allow end users to access services on the Web through different access networks without explicitly providing any credentials, while the service providers can trust the user's identity information provided by the access networks and access some user data. As a first step towards a fullblown formal security analysis of the protocol, we specify three user scenarios in the process algebra Crypto-CCS and verify the vulnerability of one of these specifications w.r.t. a man-in-the-middle attack with the model checker PaMoChSA.","PeriodicalId":334924,"journal":{"name":"The Third Advanced International Conference on Telecommunications (AICT'07)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114171912","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Metaheuristics for Wireless Network Optimisation 无线网络优化的元启发式
The Third Advanced International Conference on Telecommunications (AICT'07) Pub Date : 2007-05-13 DOI: 10.1109/AICT.2007.28
M. Morgan, V. Grout
{"title":"Metaheuristics for Wireless Network Optimisation","authors":"M. Morgan, V. Grout","doi":"10.1109/AICT.2007.28","DOIUrl":"https://doi.org/10.1109/AICT.2007.28","url":null,"abstract":"This paper introduces two new algorithms for the minimum connected dominating set (MCDS) problem with constraints applicable to wireless network design, based on simulated annealing and tabu search principles. Each algorithm is tested on a selection of random graphs and shown to produce significantly smaller connected dominating sets when compared to a number of established methods. The simulated annealing algorithm is found to favour large, sparse graphs while the tabu search heuristic prefers smaller dense instances. In conclusion, we consider the adaptation of these algorithms to hybrid techniques and comment on the possible use of hyper-heuristics.","PeriodicalId":334924,"journal":{"name":"The Third Advanced International Conference on Telecommunications (AICT'07)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121470327","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Model Driven LMS Platform Integration 模型驱动的LMS平台集成
The Third Advanced International Conference on Telecommunications (AICT'07) Pub Date : 2007-05-13 DOI: 10.1109/AICT.2007.29
Z. Bizonova, D. Ranc
{"title":"Model Driven LMS Platform Integration","authors":"Z. Bizonova, D. Ranc","doi":"10.1109/AICT.2007.29","DOIUrl":"https://doi.org/10.1109/AICT.2007.29","url":null,"abstract":"The growing choice of e-learning platform technologies leads to new difficulties. In particular, it becomes hard to manage or to compare available platforms and to re-use existing course material from different kinds of platforms because of technological discrepancy. This paper proposes a tentative solution of this difficulty - a common platform- independent framework that can be used to specify and classify existing or future learning management systems (LMS) and possibility of their cooperation. The proposed framework is based on OMG's Model Driven Architecture.","PeriodicalId":334924,"journal":{"name":"The Third Advanced International Conference on Telecommunications (AICT'07)","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114262310","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Network Complexity: Cross-Layer Models and Characteristics 网络复杂性:跨层模型和特征
The Third Advanced International Conference on Telecommunications (AICT'07) Pub Date : 2007-05-13 DOI: 10.1109/AICT.2007.31
V. Zaborovsky, A. Gorodetsky, A. Lapin
{"title":"Network Complexity: Cross-Layer Models and Characteristics","authors":"V. Zaborovsky, A. Gorodetsky, A. Lapin","doi":"10.1109/AICT.2007.31","DOIUrl":"https://doi.org/10.1109/AICT.2007.31","url":null,"abstract":"Many fundamental important questions regarding Internet processes and protocols cross-layer interaction are still remained unexplored. One of the questions is network complexity as a character of network behavior. Today complexity has three distinct and almost opposite meanings. In one case, complexity is synonymous with fluctuation in traffic dynamics and the lack of predictable structure. The second sense of complexity refers instead to how structured, hierarchical, and sophisticated a network process is. That is, \"complexity\" is an indicator of how many layers of order is embedded in a process. The third sense is Kolmogorov Complexity or measure of compactness of algorithmic code that can be used to modeling process. This paper considers complexity as a on of fundamental property that can be applied to describe cross-layer interaction, fractal characteristics and invariant properties caused by elastic dynamics of the virtual TCP connection and statistical distribution of retransmission.","PeriodicalId":334924,"journal":{"name":"The Third Advanced International Conference on Telecommunications (AICT'07)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121283795","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Advance Detection Techniques for Beyond 3G Wireless 超3G无线的先进检测技术
N. Al-Dabbous, B. Sharif
{"title":"Advance Detection Techniques for Beyond 3G Wireless","authors":"N. Al-Dabbous, B. Sharif","doi":"10.1109/AICT.2007.5","DOIUrl":"https://doi.org/10.1109/AICT.2007.5","url":null,"abstract":"One of the main challenges that face wireless multimedia communications is spectral limitations. Current second generation (2G) systems cannot support the demanding throughput requirements of the ever increasing wireless services. Third generation (3G) systems, which promised to provide a data rate of 2 Mbps for indoor users and 384 kbps for mobile users, are also unable to support the requirements of bandwidth intensive services such as streaming video. In this paper the spatial processing is investigated to improve date rate provisions in future generation mobile communication systems. Adaptive antenna and interference cancellation are employed for Multicarrier CDMA in order to achieve robust multi-user detection.","PeriodicalId":334924,"journal":{"name":"The Third Advanced International Conference on Telecommunications (AICT'07)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125083470","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Implementation of Distributed E-Learning System on Power Line Network 电力网分布式电子学习系统的实现
The Third Advanced International Conference on Telecommunications (AICT'07) Pub Date : 2007-05-13 DOI: 10.1109/AICT.2007.25
K. Bahrami, M. Abedi, B. Daemi
{"title":"Implementation of Distributed E-Learning System on Power Line Network","authors":"K. Bahrami, M. Abedi, B. Daemi","doi":"10.1109/AICT.2007.25","DOIUrl":"https://doi.org/10.1109/AICT.2007.25","url":null,"abstract":"This study introduces a distributed e-learning system on power line network. E-learning system, in general, consists of learning management system (LMS) for managing users and courses, learning content management system (LCMS) for offering educational contents to learners and course authoring for course and content design. Today, there is a great deal of requests, issued simultaneously by worldwide users from any place at any time, for e-learning systems. Because of enormous amount of requests and simultaneous connections of users, server's performance and response time may degrade. Power line communication has high influence and is high speed medium that can be utilized as platform for e-learning. On the other hand, it is possible to implement distributed e-learning system on a power line network to distribute load of requests on multiple servers and improve their performances. In this paper, we propose software architecture and network design for distributed e-learning system on power line network.","PeriodicalId":334924,"journal":{"name":"The Third Advanced International Conference on Telecommunications (AICT'07)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125537255","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Practical Security Testing of Telecommunications Software--A Case Study 电信软件的实际安全测试——一个案例研究
The Third Advanced International Conference on Telecommunications (AICT'07) Pub Date : 2007-05-13 DOI: 10.1109/AICT.2007.37
R. Savola, K. Karppinen
{"title":"Practical Security Testing of Telecommunications Software--A Case Study","authors":"R. Savola, K. Karppinen","doi":"10.1109/AICT.2007.37","DOIUrl":"https://doi.org/10.1109/AICT.2007.37","url":null,"abstract":"In order to obtain evidence about the security strength in products we need automated information security analysis, validation, evaluation and testing approaches. Unfortunately, no widely accepted practical approaches are available. Information security testing of software-intensive and telecommunications systems typically relies heavily on the experience of the security professionals. In this study, we argue that security requirements are within the focus of the information security testing process. Information security requirements can be based on iterative risk, threat and vulnerability analyses, and technical and architectural information. We discuss security testing process, security objectives and security requirements from the basis of the experiences of a security testing case study project.","PeriodicalId":334924,"journal":{"name":"The Third Advanced International Conference on Telecommunications (AICT'07)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116270241","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信