2009 First International Conference on Ubiquitous and Future Networks最新文献

筛选
英文 中文
Randomized cooperative precoding and diversity analysis over doubly selective channels 双选择性信道随机合作预编码与分集分析
2009 First International Conference on Ubiquitous and Future Networks Pub Date : 2009-06-07 DOI: 10.1109/ICUFN.2009.5174305
T. Sung, A. Bojanczyk
{"title":"Randomized cooperative precoding and diversity analysis over doubly selective channels","authors":"T. Sung, A. Bojanczyk","doi":"10.1109/ICUFN.2009.5174305","DOIUrl":"https://doi.org/10.1109/ICUFN.2009.5174305","url":null,"abstract":"Multiple-input multiple-output (MIMO) systems exploit transmit diversity to combat the effect of fading channels. Recently, a new paradigm known as cooperative communication was proposed that achieves the same transmit diversity as the MIMO system. However unlikely MIMO system which requires multiple antennas, cooperative communications use the scheme of sharing single antenna to generate a virtual multi-antenna system. In this paper we explore the attainable diversity of decentralized schemes in cooperative communications using random matrices in doubly-selective channels. We show that the decentralized scheme is easily adapted to block space-time precoding schemes which utilize both spatial and temporal diversity, and characterize the attainable diversity of that scheme.","PeriodicalId":371189,"journal":{"name":"2009 First International Conference on Ubiquitous and Future Networks","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122338640","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Power-aware location-based anti-collision protocol for RFID-sensor networks 基于功率感知的rfid传感器网络防碰撞协议
2009 First International Conference on Ubiquitous and Future Networks Pub Date : 2009-06-07 DOI: 10.1109/ICUFN.2009.5174281
Su Haoru, Doohyun Ko, Sunshin An
{"title":"Power-aware location-based anti-collision protocol for RFID-sensor networks","authors":"Su Haoru, Doohyun Ko, Sunshin An","doi":"10.1109/ICUFN.2009.5174281","DOIUrl":"https://doi.org/10.1109/ICUFN.2009.5174281","url":null,"abstract":"Radio Frequency Identification (RFID) is a promising technology for ubiquitous computing. To improve its function and capability, it is necessary to integrate RFID with wireless sensor networks (WSNs). Although organized well, the reader collision problem is still one of the critical problems in these networks. In this paper, we propose a collision avoidance protocol called Power-aware Location-based anti-Collision (PLCO) for the cluster constructed RFID-Sensor integrated networks. In this protocol, cluster headers collect location information of nodes and arrange nodes' reading time and transmission power, while gateway schedules clusters' reading sequence in the same way. By using this protocol, the system throughput and efficiency can be highly increased according to the simulation.","PeriodicalId":371189,"journal":{"name":"2009 First International Conference on Ubiquitous and Future Networks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130698688","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Cocyclic jacket matrix with public key security protocol for wireless rural network 无线农村网络公钥安全协议共环套阵
2009 First International Conference on Ubiquitous and Future Networks Pub Date : 2009-06-07 DOI: 10.1109/ICUFN.2009.5174310
Jia Hou, M. Lee
{"title":"Cocyclic jacket matrix with public key security protocol for wireless rural network","authors":"Jia Hou, M. Lee","doi":"10.1109/ICUFN.2009.5174310","DOIUrl":"https://doi.org/10.1109/ICUFN.2009.5174310","url":null,"abstract":"In this paper, we present a simple public key security protocol, which uses the cocyclic Jacket matries and their properties. The proposed protocol can be easily applied to be implemented in the wireless rural network.","PeriodicalId":371189,"journal":{"name":"2009 First International Conference on Ubiquitous and Future Networks","volume":"381 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124739468","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A new approach to reduce multi-access interference in DS-CDMA 一种减少DS-CDMA多址干扰的新方法
2009 First International Conference on Ubiquitous and Future Networks Pub Date : 2009-06-07 DOI: 10.1109/ICUFN.2009.5174277
E. A. Abu Anas, Atahar Mostafa
{"title":"A new approach to reduce multi-access interference in DS-CDMA","authors":"E. A. Abu Anas, Atahar Mostafa","doi":"10.1109/ICUFN.2009.5174277","DOIUrl":"https://doi.org/10.1109/ICUFN.2009.5174277","url":null,"abstract":"Direct Sequence Code Division Multiple Access (DSCDMA) is mainly an interference limited channel. When several users are accessed in a common channel and since signature sequences assigned to users are not perfectly orthogonal, so interference is introduced in each user's desired signal. Several interference cancellation methods were proposed to reduce multi-access interference. In this paper, we propose a new method in which a correlation matrix is calculated and then performs some procedures to reduce this interference. To reduce this interference further, multistage scheme can be introduced. We also deal with memory allocation mapping to support this whole interference reduction method.","PeriodicalId":371189,"journal":{"name":"2009 First International Conference on Ubiquitous and Future Networks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124510215","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
An AGPS-based elderly tracking system 基于agps的老人跟踪系统
2009 First International Conference on Ubiquitous and Future Networks Pub Date : 2009-06-07 DOI: 10.1109/ICUFN.2009.5174293
A. Wong, T. K. Woo, A. Lee, Xiaoming Xiao, Vincent Wing-Hei Luk, Kwok Wai Cheng
{"title":"An AGPS-based elderly tracking system","authors":"A. Wong, T. K. Woo, A. Lee, Xiaoming Xiao, Vincent Wing-Hei Luk, Kwok Wai Cheng","doi":"10.1109/ICUFN.2009.5174293","DOIUrl":"https://doi.org/10.1109/ICUFN.2009.5174293","url":null,"abstract":"The design of an experimental AGPS-based (Assisted Global Positioning System) elderly tracking system is described. The system includes: a wearable AGPS terminal with HSPA two-way communication capability and designed for 10 days of continuous battery operation, a GPS assistance data server with reference GPS stations, location database and server, application server, and web server and client. Assistance data is retrieved by the wearable AGPS terminal using the SUPL protocol (Secured User Plane Location). This paper describes the design of each component based on key considerations such as accuracy, availability, battery life-time, and user behavior.","PeriodicalId":371189,"journal":{"name":"2009 First International Conference on Ubiquitous and Future Networks","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132782603","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 49
Active scheduling algorithm for intra-ONU Dynamic Bandwidth Allocation in ethernet passive optical networks 以太网无源光网络中onu内动态带宽分配的主动调度算法
2009 First International Conference on Ubiquitous and Future Networks Pub Date : 2009-06-07 DOI: 10.1109/ICUFN.2009.5174319
C. Sue, W. Sung, Hung-Yuan Chen
{"title":"Active scheduling algorithm for intra-ONU Dynamic Bandwidth Allocation in ethernet passive optical networks","authors":"C. Sue, W. Sung, Hung-Yuan Chen","doi":"10.1109/ICUFN.2009.5174319","DOIUrl":"https://doi.org/10.1109/ICUFN.2009.5174319","url":null,"abstract":"An EPON DBA algorithm can be separated into inter-ONU scheduling and intra-ONU scheduling. Intra-ONU scheduling may not predict the bandwidth allocation result from inter-ONU scheduling and waste the allocated bandwidth due to the unused slot remainder (USR) problem. In this study, we propose an active intra-ONU scheduling to make the result from the inter-ONU scheduling predictable, thus completely preventing USR. When combining with WRR-based inter-ONU scheduling, the simulation results show that compared to the previously proposed method, the bandwidth utilization is improved, the average packet delay is decreased, the optimal fairness is maintained, and differentiated QoS is supported.","PeriodicalId":371189,"journal":{"name":"2009 First International Conference on Ubiquitous and Future Networks","volume":"6 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128759593","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Vitacode: Electrocardiogram representation for biometric cryptography in body area networks Vitacode:身体区域网络中生物识别密码术的心电图表示
2009 First International Conference on Ubiquitous and Future Networks Pub Date : 2009-06-07 DOI: 10.1109/ICUFN.2009.5174295
Jinyang Shi, K. Lam
{"title":"Vitacode: Electrocardiogram representation for biometric cryptography in body area networks","authors":"Jinyang Shi, K. Lam","doi":"10.1109/ICUFN.2009.5174295","DOIUrl":"https://doi.org/10.1109/ICUFN.2009.5174295","url":null,"abstract":"This paper proposes a new representation of electrocardiogram (ECG) for biometric key distribution in body area networks, and investigates the experimental performance for ECG representations with various features in different modalities and different distance metrics. Other than the previous schemes using binary sequence, the proposed VitaCode represents the ECG features in a set with integer elements, which can be combined with the fuzzy biometric cryptography more effectively. Experimental results on the public domain PhysioBank database with 290 subjects show VitaCode can provide a more practical biometric representation basic for ECG-based secure communications in the promising body area healthcare networks.","PeriodicalId":371189,"journal":{"name":"2009 First International Conference on Ubiquitous and Future Networks","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122159852","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Use of vestigial power management bit within Wi-Fi frame structure of access point for coexistence of Wi-Fi and WiMAX systems in shared bands 在接入点的Wi-Fi帧结构中使用残余电源管理位,实现Wi-Fi和WiMAX系统在共享频段内共存
2009 First International Conference on Ubiquitous and Future Networks Pub Date : 2009-06-07 DOI: 10.1109/ICUFN.2009.5174315
Jongwoo Kim, Dong-Eun Kim, Suwon Park, S. Rhee, Kiyoung Han, Hyongoo Kang
{"title":"Use of vestigial power management bit within Wi-Fi frame structure of access point for coexistence of Wi-Fi and WiMAX systems in shared bands","authors":"Jongwoo Kim, Dong-Eun Kim, Suwon Park, S. Rhee, Kiyoung Han, Hyongoo Kang","doi":"10.1109/ICUFN.2009.5174315","DOIUrl":"https://doi.org/10.1109/ICUFN.2009.5174315","url":null,"abstract":"Coexistence of more than one wireless communication systems in a shared band such as 2.4GHz ISM band has been one of hot research topics. As an example, there are many research results related to the coexistence of Wi-Fi and Bluetooth systems in the ISM band. Recently, many schemes for coexistence of Wi-Fi and WiMAX systems in shared bands such as 2.4GHz ISM band have been proposed. In this paper, proposed scheme for the coexistence of Wi-Fi and WiMAX systems is TDO (Time Division Operation) using of vestigial power management bit within Wi-Fi frame structure.","PeriodicalId":371189,"journal":{"name":"2009 First International Conference on Ubiquitous and Future Networks","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132172289","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Self-healing key management service for Mobile Ad hoc Networks 移动自组织网络的自修复密钥管理服务
2009 First International Conference on Ubiquitous and Future Networks Pub Date : 2009-06-07 DOI: 10.1109/ICUFN.2009.5174307
M. Ge, K. Lam
{"title":"Self-healing key management service for Mobile Ad hoc Networks","authors":"M. Ge, K. Lam","doi":"10.1109/ICUFN.2009.5174307","DOIUrl":"https://doi.org/10.1109/ICUFN.2009.5174307","url":null,"abstract":"This paper presents a robust key management scheme for supporting the secure communication needs of emergency response operations. The proposed scheme aims to tolerate the dynamic nature of such operations where some system and network components may be damaged or redeployed frequently. Mobile Ad hoc Network (MANET) is widely accepted to be a suitable approach to meet the communication needs of emergency response operations. Such operations tend to be carried out in an environment where existing infrastructures have been destroyed by natural disasters. Security is an important feature of the underlying Command, Control and Communication (C3) systems of emergency response operations. Security functions almost invariably require the support of some key management services. Distributed CA (DCA) is one of the most important schemes to key management in MANET; however the key management service may fail if some of the DCA nodes disappear from the system due to the physical damages in the harsh field environment or redeployment of some participating agencies. In this paper, we propose a self-healing key management service which is capable of detecting failure of DCA nodes and reconstructing the key management service automatically without requiring a trusted third party. Network simulation results shows that our scheme is effective in terms of failure detection and recovery and introduces only a very moderate communication overhead to the network in most of the time.","PeriodicalId":371189,"journal":{"name":"2009 First International Conference on Ubiquitous and Future Networks","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134318265","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
A new IPTV channel zapping scheme for EPON 一种新的EPON IPTV信道分割方案
2009 First International Conference on Ubiquitous and Future Networks Pub Date : 2009-06-07 DOI: 10.1109/ICUFN.2009.5174299
C. Sue, Chi-Yu Hsu, Yu-Shiang Su, Yung-Yi Shieh
{"title":"A new IPTV channel zapping scheme for EPON","authors":"C. Sue, Chi-Yu Hsu, Yu-Shiang Su, Yung-Yi Shieh","doi":"10.1109/ICUFN.2009.5174299","DOIUrl":"https://doi.org/10.1109/ICUFN.2009.5174299","url":null,"abstract":"This paper proposes a new IPTV channel zapping scheme in EPON, and defines two user's operation behavior for channel zapping. Based on such user's operation behavior, this paper defines two channel zapping types that are intra- and inter-stream channel zapping. In addition, we propose two analysis models to evaluate channel zapping time for both channel zapping types, respectively. According to simulation results, our proposed scheme can reduce channel zapping time and satisfy quality criteria (500ms). In addition, some further works are described in this work.","PeriodicalId":371189,"journal":{"name":"2009 First International Conference on Ubiquitous and Future Networks","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121811715","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信