{"title":"A Time-Recursive Adaptive Algorithm for Colored Noise Reduction in Speech Enhancement","authors":"R. Udrea, N. Vizireanu, C. Oprea, I. Pirnog","doi":"10.1109/AICT.2010.69","DOIUrl":"https://doi.org/10.1109/AICT.2010.69","url":null,"abstract":"We propose an improved spectral subtraction method for the reduction of colored acoustic noise added to the speech. Our implementation uses a time-recursive algorithm for estimation of the noise power spectral density and a multi-band spectral over subtraction method to reduce the colored noise. Simulations show a better quality in terms of Itakura Saito distance and perceptual evaluation of quality for the enhanced speech. Using the proposed speech enhancement method, a very good speech quality with less musical noise and with minimal speech distortion is obtained.","PeriodicalId":339151,"journal":{"name":"2010 Sixth Advanced International Conference on Telecommunications","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124109072","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cooperative Spectrum Sensing with Double Adaptive Energy Thresholds and Relaying Users in Cognitive Radio","authors":"Hiep-Vu Van, Insoo Koo","doi":"10.1109/AICT.2010.55","DOIUrl":"https://doi.org/10.1109/AICT.2010.55","url":null,"abstract":"Cognitive radio (CR) technology has been proposed to improve spectrum utilization by allowing cognitive radio users to opportunistically access under-utilized frequency band. The requirement of cognitive radio system is reliable detecting signals from licensed users to avoid harmful interference. However, due to the effects of the channel fading and shadowing, individual cognitive radio may not able to reliably detect the presence of a licensed user. In this paper, we propose a cooperative spectrum sensing scheme with double adaptive threshold and relaying users in order to improve sensing performance of both local sensing performance and global sensing performance in a CR network. In the proposed scheme, the detection threshold is changeable to adapt with the fluctuation of the received signal power in each local detector of cognitive user. In addition, the CR users with higher reliability act as a relaying user for the object of helping their neighbors to improve sensing performance. Finally, all the local observations will be sent to the fusion center to determine the global decision by using the Likelihood rule without any requirement on priori information of the licensed user.","PeriodicalId":339151,"journal":{"name":"2010 Sixth Advanced International Conference on Telecommunications","volume":"272 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124404973","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"European Standardization and SDR Certification","authors":"D. Symeonidis, G. Baldini","doi":"10.1109/AICT.2010.44","DOIUrl":"https://doi.org/10.1109/AICT.2010.44","url":null,"abstract":"Standardization and certification of Software Defined Radio (SDR) technologies are closely related. The paper describes the current standardization efforts for SDR technologies in Europe and the related certification processes. The regulatory and technical requirements for the certification of SDR and its components are defined in this paper. The paper presents the study on the development of a European SDR certification procedure through a network approach. Finally, we describe the Waveform Libraries and Issue Tracking System, which are an essential part of the certification process. The output of this study is a comprehensive overview of the SDR standardization and certification landscape.","PeriodicalId":339151,"journal":{"name":"2010 Sixth Advanced International Conference on Telecommunications","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116261142","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Issues of QoS Multipath Routing Protocol for SEN's Data Networks","authors":"A. Zaballos, A. Vallejo, G. Ravera","doi":"10.1109/AICT.2010.20","DOIUrl":"https://doi.org/10.1109/AICT.2010.20","url":null,"abstract":"This paper presents several considerations that must be taken into account in the design of a QoS multipath routing protocol suitable for Smart Electricity Networks (SENs). The main goal is the analysis of routing requirements that will make possible a future formal specification of a QoS aware multipath routing algorithm for the coming SENs’ data networks in high voltage segment, whose long-distance mesh data networks will be a future challenge for engineering and research. In this paper, the study is focused on requirements specification regarding to distance-vector routing algorithms that reduce the overall overhead of routing information needed in the network, preserving the scalability feature.","PeriodicalId":339151,"journal":{"name":"2010 Sixth Advanced International Conference on Telecommunications","volume":"136 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123249068","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Common Operator Bank to Resolve Scheduling Issue on a Complexity Optimized SDR Terminal","authors":"Laurent Alaus, D. Noguet, J. Palicot","doi":"10.1109/AICT.2010.11","DOIUrl":"https://doi.org/10.1109/AICT.2010.11","url":null,"abstract":"In the context of Software Defined Radio (SDR), parameterization technique is an interesting approach for the design of multi-standard terminals. It limits the size of the software to a small set of parameters thereby decreasing the radio reconfiguration time. In the proposed research, we refine the Common Operator (CO) technique, which defines a multi standard terminal, based on a limited set of Common Operators. This method enhances the reconfigurability and the scalability of the design but leads to a complex management of data dependencies and scheduling of each operator for its correct execution in the terminal. In this paper, we present a new organization in bank (COB) not only to mitigate the scheduling issue but also to maintain the flexibility and the optimization inhere in the technique. The COB benefits from the property of the CO though limiting the main part of the scheduling. The COB creates a scalable design, limits the scheduling and reduces the number of operators. Applied in the case of LFSR targets to a tri-standard terminal, it lowers the hardware complexity by up to 40%.","PeriodicalId":339151,"journal":{"name":"2010 Sixth Advanced International Conference on Telecommunications","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124944828","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Joint Multiuser LDPC Coding Scheme for Error Control in DS-CDMA Systems","authors":"Hamid Saber, E. Olfat, H. Amindavar","doi":"10.1109/AICT.2010.28","DOIUrl":"https://doi.org/10.1109/AICT.2010.28","url":null,"abstract":"In this paper, we introduce the application of low density parity check (LDPC) codes to multiuser detection through additive white gaussian noise (AWGN) channels. An ensemble of binary LDPC codes with an irregular degree distribution is used. We introduce Joint Multiuser LDPC (JML) Tanner graph for joint decoding of information bits of all users. The decoding of information sources is done by a modified iterative belief propagation (BP) algorithm, which deals with vector messages rather than scalar ones. Good degree distribution pairs are extracted by maximizing the threshold of the decoder. Next, performance of the generated degree distribution pairs is evaluated over AWGN channels. Furthermore, some performance analysis criteria of the proposed method such as multiuser efficiency and bit error rate (BER) are compared with optimum and minimum mean square error (MMSE) receivers and also with receivers, which use convolutional codes. Finally simulation results demonstrate that the new proposed method outperforms these receivers for some good degree distribution pairs.","PeriodicalId":339151,"journal":{"name":"2010 Sixth Advanced International Conference on Telecommunications","volume":"147 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127268150","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Integrating Asterisk with InRule to Detect Suspicious Calls","authors":"Ahmad Hammoud, D. Bourget","doi":"10.1109/AICT.2010.93","DOIUrl":"https://doi.org/10.1109/AICT.2010.93","url":null,"abstract":"Monitoring telecommunications systems is of a crucial importance. Nowadays, PBX software packages can be configured to allow the storage of Call Detail Records in a database. There is a permanent need to analyze those records and allow business owners to detect PBX misuse from inside and outside the company. The word \"misuse\" covers an employee making too many personal phone calls, a salesman making fewer phone calls than expected, a client making an excessive number of phone calls, and other suspicious calls. A data-mining package or any other analytical tool would not be as efficient because it would report what happened when it is too late to take action. In this article, we integrate Asterisk with a rule-based engine called InRule. Asterisk will consult InRule whenever a call is about to be made and thus take appropriate actions.","PeriodicalId":339151,"journal":{"name":"2010 Sixth Advanced International Conference on Telecommunications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129773913","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Providing Security in 4G Systems: Unveiling the Challenges","authors":"Mahdi Aiash, G. Mapp, A. Lasebae, R. Phan","doi":"10.1109/AICT.2010.24","DOIUrl":"https://doi.org/10.1109/AICT.2010.24","url":null,"abstract":"Several research groups are working on designing new security architectures for 4G networks such as Hokey and Y-Comm. Since designing an efficient security module requires a clear identification of potential threats, this paper attempts to outline the security challenges in 4G networks. A good way to achieve this is by investigating the possibility of extending current security mechanisms to 4G networks. Therefore, this paper uses the X.805 standard to investigate the possibility of implementing the 3G’s Authentication and Key Agreement (AKA) protocol in a 4G communication framework such as YComm. The results show that due to the fact that 4G is an open, heterogeneous and IP-based environment, it will suffer from new security threats as well as inherent ones. In order to address these threats without affecting 4G dynamics, Y-Comm proposes an integrated security module to protect data and security models to target security on different entities and hence protecting not only the data but, also resources, servers and users.","PeriodicalId":339151,"journal":{"name":"2010 Sixth Advanced International Conference on Telecommunications","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133455678","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"WiMAX Handover Conditions Evaluation towards Enhancement through Cross-Layer Interaction","authors":"Mihai Constantinescu, E. Borcoci, T. Rasheed","doi":"10.1109/AICT.2010.62","DOIUrl":"https://doi.org/10.1109/AICT.2010.62","url":null,"abstract":"In the context of micro and macro-mobility capabilities defined by IEEE 802.16e/WiMAX standards, the paper presents the simulation campaign undertaken to identify the sets of configuration parameters having a major impact on the handover process for the IEEE 802.16e mobile station. Simulation results could then be used to construct a database for guiding some cross-layer optimization algorithms deciding upon handover trigger, in order to increase the handover performance, from the application point of view.","PeriodicalId":339151,"journal":{"name":"2010 Sixth Advanced International Conference on Telecommunications","volume":"201 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134290741","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Spectrum Occupancy in an Urban Environment: A Cognitive Radio Approach","authors":"Alexandru Martian, I. Marcu, I. Marghescu","doi":"10.1109/AICT.2010.90","DOIUrl":"https://doi.org/10.1109/AICT.2010.90","url":null,"abstract":"Due to the ever-increasing number of radio communication technologies, lack of frequency spectrum has become a serious problem recently. Cognitive Radio (CR) technology promises to be one possible solution to this problem, by allowing access of unlicensed users in licensed bands, based on an opportunistic approach and without interfering with the licensed (primary) user. In order to identify which frequency bands are more suitable for such purposes, it is necessary to evaluate the degree in which licensed bands are actually used. Although some measurement campaigns have already been carried out, most of them were done in the USA and only a few in other locations worldwide. This paper presents results of a measurement campaign conducted in Bucharest, Romania, covering the frequency range from 25 MHz up to 3.4 GHz. The measurement results are confronted with the frequency allocation table published by the national authority for communications and an analysis of the obtained data is being made.","PeriodicalId":339151,"journal":{"name":"2010 Sixth Advanced International Conference on Telecommunications","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114299893","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}