{"title":"Neural Network Based MIMO-OFDM Channel Equalizer Using Comb-Type Pilot Arrangement","authors":"S. Nawaz, S. Mohsin, Ataul Aziz Ikaram","doi":"10.1109/ICFCC.2009.136","DOIUrl":"https://doi.org/10.1109/ICFCC.2009.136","url":null,"abstract":"MIMO (Multiple Input Multiple Output) and OFDM (Orthogonal frequency division multiplexing) bringing along a number of pros; a combination of both stands a good possibility of being the next-generation (4th generation) of mobile wireless systems. The technology however imposes a challenge that is the increased complexity of channel equalization. Wireless channels are multipath fading channels, causing deformation in the signal. To remove the effect (imposed by channel) from received signal, the receiver needs to have knowledge of CIR (Channel impulse response) that is usually provided by a separate channel estimator. This paper is aimed at exploring the use of Neural Network (NN) as a tool for MIMO-OFDM channel estimation and compensation. The research attempts to gauges the usefulness of proposed system by analyzing different algorithms to train NN. Further to ascertain the performance of the proposed technique; length of the known training sequence has been varied over a reasonable range and observations are made. Finally, the results obtained by using different algorithms for training NN have been compared with each-other and against the traditional least squares channel estimator, which along with observations/comments form part of the paper.","PeriodicalId":338489,"journal":{"name":"2009 International Conference on Future Computer and Communication","volume":"100 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117232035","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Novel Framework for M-Government Implementation","authors":"M. Fasanghari, Hossein Samimi","doi":"10.1109/ICFCC.2009.146","DOIUrl":"https://doi.org/10.1109/ICFCC.2009.146","url":null,"abstract":"The advantages of Information Technologies (IT) is changed the service delivery in government. The last changes in service delivery of government to citizens are through mobile technologies. It is necessary to develop the mobile technology usage in government service delivery, but it is not useful unless a development (maturity) model, like e-government development model, a m-government model be used. Therefore, in this paper, a six stages (five phases) m-government model is presented. In this model, all of the required phases for implying mobile technologies in government service delivery to citizens are considered.","PeriodicalId":338489,"journal":{"name":"2009 International Conference on Future Computer and Communication","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127461948","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Capacity Enhancment and Iterference Reduction in Cooperative Cognitive Radio Networks","authors":"Ayman A. El-Saleh, M. Ismail, M. Ali, I. Al-kebsi","doi":"10.1109/ICFCC.2009.80","DOIUrl":"https://doi.org/10.1109/ICFCC.2009.80","url":null,"abstract":"Cognitive radio users are secondary users armed with sensing capability to observe any available spectrum holes which are temporarily and/or spatially unused by the primary users to use them for their own transmission. In this context, the demand for maximizing the secondary users’ network capacity while maintaining high protection level to primary users is very crucial. This research work presents two operational modes for the cognitive users’ network, namely, constant primary user protection (CPUP) and constant secondary user spectrum usability (CSUSU). The simulation results show that cooperating all secondary users in the network does not necessarily lead to attain the optimum performance, but instead, it is achieved by cooperating a certain number of users who possess the highest primary user’s signal-to-noise ratio values at their receivers.","PeriodicalId":338489,"journal":{"name":"2009 International Conference on Future Computer and Communication","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121841847","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Traffic Engineering in Ethernet Networks by Using Shortcut Switching Strategy","authors":"F. Faghani, G. Mirjalily","doi":"10.1109/ICFCC.2009.29","DOIUrl":"https://doi.org/10.1109/ICFCC.2009.29","url":null,"abstract":"IEEE STP is a layer-2 protocol which provides a loop-free connectivity across various network nodes. STP does this task by reducing the topology of a switched network to a tree topology where redundant ports are blocked. This action ensures there is a unique path from any node to every other node. Blocked ports are then kept in a standby mode of operation until a network failure occurs. In STP, there isn’t any traffic engineering mechanism for load balancing. This results in uneven load distribution and bottlenecks especially close to the Root. In this paper, we propose a novel switching strategy that uses blocked ports to forward frames in some special and restricted cases. This decreases the average traffic volume on links and switches specially close to the Root, improves load balancing on links and switches and reduces the average number of switching hops.","PeriodicalId":338489,"journal":{"name":"2009 International Conference on Future Computer and Communication","volume":"411 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126687966","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance Evaluation of Shape Adaptive Discrete Wavelet Transform Based Magnetic Resonance Images Coding","authors":"G. Suresh, S. Sudha, R. Sukanesh","doi":"10.1109/ICFCC.2009.117","DOIUrl":"https://doi.org/10.1109/ICFCC.2009.117","url":null,"abstract":"Region based coding is an important feature in today’s image coding techniques as it follows different regions of the image will be encoded at different bit rates and hence at different qualities rather than encoding the entire image with a single quality constraints. This paper evaluates the features of using Shape Adaptive Wavelet Transform for the region based coding of the brain magnetic resonance images, in which the brain part will be encoded with more importance than the background. Shape Adaptive Discrete Wavelet Transform (SA-DWT) can transform the regions of interest and the background on the images independently and the coefficients can be encoded by using the SPIHT coding at different levels. This algorithm was compared with the existing wavelet based coding techniques and a better PSNR was achieved for the same bit rate by reconstructing the region of interest with high quality than the background.","PeriodicalId":338489,"journal":{"name":"2009 International Conference on Future Computer and Communication","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126908053","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Message Authentication in Vehicular Ad Hoc Networks: ECDSA Based Approach","authors":"S. Manvi, M. Kakkasageri, D. G. Adiga","doi":"10.1109/ICFCC.2009.120","DOIUrl":"https://doi.org/10.1109/ICFCC.2009.120","url":null,"abstract":"Vehicular Ad hoc Networks (VANETs) are promising approach for facilitating road safety, traffic management,and infotainment dissemination for drivers and passengers.However, it is subject to various malicious abuses and security attacks which hinder it from practical implementation.Effective and robust solutions for addressing security and privacy issues are critical for the wide-spread adoption of VANETs. In this paper, we propose an Elliptic Curve Digital Signature Algorithm (ECDSA) based message authentication in a VANET. The operation sequence of the proposed scheme is as follows: 1) Source vehicle generates private key and public key. 2) Public key is made available to all the vehicles in the VANET. 3) Source vehicle creates a hash of the message using secured hash algorithm. 4) Secured has his encrypted using private key in the source vehicle ands ends it to the destination vehicle. 5) At the destination vehicle, the received encrypted message is decrypted using the public key. The result of the decryption will be the hash of the message. 6) Destination vehicle can then hash the message in the same way as source vehicle did and compare the two hashes. Using this proposed scheme, strong authentication policy is provided for the destination vehicle.Because hashing is relatively unique, any changes in the message would change the message hash.","PeriodicalId":338489,"journal":{"name":"2009 International Conference on Future Computer and Communication","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123465872","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Wang Jinsong, L. Weiwei, Zhang Yan, L. Tao, Wang Zilong
{"title":"P2P Traffic Identification Based on NetFlow TCP Flag","authors":"Wang Jinsong, L. Weiwei, Zhang Yan, L. Tao, Wang Zilong","doi":"10.1109/ICFCC.2009.151","DOIUrl":"https://doi.org/10.1109/ICFCC.2009.151","url":null,"abstract":"P2P flow identification is the precondition of flow control in large-scale network. For the limited practicality existing in P2P flow identification method based on flow characteristic, a novel P2P traffic identification method based on NetFlow TCP Flag is proposed which classified traffic as P2P flow or non-P2P flow. Experiments prove that the method can detect P2P flow very effectively in large-scale network.","PeriodicalId":338489,"journal":{"name":"2009 International Conference on Future Computer and Communication","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121525634","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Dual-Band Coplanar-Waveguide-Fed Slot-Coupled Rectangular Dielectric Resonator Antenna","authors":"A. Omar, M. Al-Hasan","doi":"10.1109/ICFCC.2009.103","DOIUrl":"https://doi.org/10.1109/ICFCC.2009.103","url":null,"abstract":"Dual band antennas are important in communication systems which operate in more than one frequency band. This paper presents a new dual band coplanar waveguide- fed- slot coupled rectangular dielectric resonator antenna operating at the two frequency bands centered at 5.4 and 6.8 GHz. The use of DR allows for unidirectional radiation with a front to back ratio of more than 10 dB. The designed antenna is linearly polarized with a cross polarization level more than 26 dB lower than the co-polarization level.","PeriodicalId":338489,"journal":{"name":"2009 International Conference on Future Computer and Communication","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124496310","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Electromagnetism Metaheuristic Applied to the Problem of Scheduling in FSHs","authors":"K. Zerrouki, K. Belkadi, M. Benyettou","doi":"10.1109/ICFCC.2009.12","DOIUrl":"https://doi.org/10.1109/ICFCC.2009.12","url":null,"abstract":"The métaheuristic are approximate methods which deal with difficult optimization problems. Work that we present in this paper has primarily as an objective of presented the adaptation and the implementation of one of advanced metaheuristic which is the Electromagnetism Metaheuristic (EM) applied to the systems of production of the type Hybrid Flow Shop (FSHs) for the scheduling and the assignment problem. Electromagnetism Metaheuristic is a recent method of optimization which takes its inspiration in the electromagnetic law (attraction and repulsion) of Coulomb on the charged particles. For this metaheuristic, we will start by presenting his general principle, its principle algorithm, its most important main features and parameters like its scopes of application. We will propose then an adaptation of this method to the discrete case on the scheduling problems of the production systems of the type Hybrid Flow Shop (FSHs). We present then the comparison between the metaheuristics (Genetic Algorithms (GA) and Particle Swarm Optimization method (PSO)), and the hybrid metaheuristic (Electromagnetism Metaheuristic EM) applied to the same FSHs problem. Finally we will present the results obtained by this method (EM) applied to FSHs for the two problems: scheduling and assignment.","PeriodicalId":338489,"journal":{"name":"2009 International Conference on Future Computer and Communication","volume":"125 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124515314","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Implementing of IPv6 Protocol Environment at University of Kuala Lumpur: Measurement of IPv6 and IPv4 Performance","authors":"M. Ismail, Z. Abidin","doi":"10.1109/ICFCC.2009.145","DOIUrl":"https://doi.org/10.1109/ICFCC.2009.145","url":null,"abstract":"IPv6 provides a platform for new Internet functionality. It includes support for real-time flows, provider selection, and host mobility, end-to-end security, auto-configuration, and auto-reconfiguration. It solves the Internet scaling problem, provides a flexible transition mechanism for the current Internet, and was designed to meet the needs of new markets such as nomadic personal computing devices, networked entertainment, and device control. The significant of this study is to describe on development of a video conferencing system with multimedia capabilities (Video + Audio) over IPv6 environment at University of Kuala Lumpur (campus environment). The beneficial and apparent of this research is to introduce a new service of the Internet Protocol (IPv6) at the campus environment. The concept of multicasting is be explored as this was used in the development of the video conferencing (Video + Audio). By comparing IPv6 and IPv4 video conferencing performance, we focus on problems that are only present in the IPv6 environments.","PeriodicalId":338489,"journal":{"name":"2009 International Conference on Future Computer and Communication","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125587882","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}