{"title":"Randomized cooperative precoding and diversity analysis over doubly selective channels","authors":"T. Sung, A. Bojanczyk","doi":"10.1109/ICUFN.2009.5174305","DOIUrl":"https://doi.org/10.1109/ICUFN.2009.5174305","url":null,"abstract":"Multiple-input multiple-output (MIMO) systems exploit transmit diversity to combat the effect of fading channels. Recently, a new paradigm known as cooperative communication was proposed that achieves the same transmit diversity as the MIMO system. However unlikely MIMO system which requires multiple antennas, cooperative communications use the scheme of sharing single antenna to generate a virtual multi-antenna system. In this paper we explore the attainable diversity of decentralized schemes in cooperative communications using random matrices in doubly-selective channels. We show that the decentralized scheme is easily adapted to block space-time precoding schemes which utilize both spatial and temporal diversity, and characterize the attainable diversity of that scheme.","PeriodicalId":371189,"journal":{"name":"2009 First International Conference on Ubiquitous and Future Networks","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122338640","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Power-aware location-based anti-collision protocol for RFID-sensor networks","authors":"Su Haoru, Doohyun Ko, Sunshin An","doi":"10.1109/ICUFN.2009.5174281","DOIUrl":"https://doi.org/10.1109/ICUFN.2009.5174281","url":null,"abstract":"Radio Frequency Identification (RFID) is a promising technology for ubiquitous computing. To improve its function and capability, it is necessary to integrate RFID with wireless sensor networks (WSNs). Although organized well, the reader collision problem is still one of the critical problems in these networks. In this paper, we propose a collision avoidance protocol called Power-aware Location-based anti-Collision (PLCO) for the cluster constructed RFID-Sensor integrated networks. In this protocol, cluster headers collect location information of nodes and arrange nodes' reading time and transmission power, while gateway schedules clusters' reading sequence in the same way. By using this protocol, the system throughput and efficiency can be highly increased according to the simulation.","PeriodicalId":371189,"journal":{"name":"2009 First International Conference on Ubiquitous and Future Networks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130698688","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cocyclic jacket matrix with public key security protocol for wireless rural network","authors":"Jia Hou, M. Lee","doi":"10.1109/ICUFN.2009.5174310","DOIUrl":"https://doi.org/10.1109/ICUFN.2009.5174310","url":null,"abstract":"In this paper, we present a simple public key security protocol, which uses the cocyclic Jacket matries and their properties. The proposed protocol can be easily applied to be implemented in the wireless rural network.","PeriodicalId":371189,"journal":{"name":"2009 First International Conference on Ubiquitous and Future Networks","volume":"381 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124739468","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A new approach to reduce multi-access interference in DS-CDMA","authors":"E. A. Abu Anas, Atahar Mostafa","doi":"10.1109/ICUFN.2009.5174277","DOIUrl":"https://doi.org/10.1109/ICUFN.2009.5174277","url":null,"abstract":"Direct Sequence Code Division Multiple Access (DSCDMA) is mainly an interference limited channel. When several users are accessed in a common channel and since signature sequences assigned to users are not perfectly orthogonal, so interference is introduced in each user's desired signal. Several interference cancellation methods were proposed to reduce multi-access interference. In this paper, we propose a new method in which a correlation matrix is calculated and then performs some procedures to reduce this interference. To reduce this interference further, multistage scheme can be introduced. We also deal with memory allocation mapping to support this whole interference reduction method.","PeriodicalId":371189,"journal":{"name":"2009 First International Conference on Ubiquitous and Future Networks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124510215","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Wong, T. K. Woo, A. Lee, Xiaoming Xiao, Vincent Wing-Hei Luk, Kwok Wai Cheng
{"title":"An AGPS-based elderly tracking system","authors":"A. Wong, T. K. Woo, A. Lee, Xiaoming Xiao, Vincent Wing-Hei Luk, Kwok Wai Cheng","doi":"10.1109/ICUFN.2009.5174293","DOIUrl":"https://doi.org/10.1109/ICUFN.2009.5174293","url":null,"abstract":"The design of an experimental AGPS-based (Assisted Global Positioning System) elderly tracking system is described. The system includes: a wearable AGPS terminal with HSPA two-way communication capability and designed for 10 days of continuous battery operation, a GPS assistance data server with reference GPS stations, location database and server, application server, and web server and client. Assistance data is retrieved by the wearable AGPS terminal using the SUPL protocol (Secured User Plane Location). This paper describes the design of each component based on key considerations such as accuracy, availability, battery life-time, and user behavior.","PeriodicalId":371189,"journal":{"name":"2009 First International Conference on Ubiquitous and Future Networks","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132782603","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Active scheduling algorithm for intra-ONU Dynamic Bandwidth Allocation in ethernet passive optical networks","authors":"C. Sue, W. Sung, Hung-Yuan Chen","doi":"10.1109/ICUFN.2009.5174319","DOIUrl":"https://doi.org/10.1109/ICUFN.2009.5174319","url":null,"abstract":"An EPON DBA algorithm can be separated into inter-ONU scheduling and intra-ONU scheduling. Intra-ONU scheduling may not predict the bandwidth allocation result from inter-ONU scheduling and waste the allocated bandwidth due to the unused slot remainder (USR) problem. In this study, we propose an active intra-ONU scheduling to make the result from the inter-ONU scheduling predictable, thus completely preventing USR. When combining with WRR-based inter-ONU scheduling, the simulation results show that compared to the previously proposed method, the bandwidth utilization is improved, the average packet delay is decreased, the optimal fairness is maintained, and differentiated QoS is supported.","PeriodicalId":371189,"journal":{"name":"2009 First International Conference on Ubiquitous and Future Networks","volume":"6 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128759593","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Vitacode: Electrocardiogram representation for biometric cryptography in body area networks","authors":"Jinyang Shi, K. Lam","doi":"10.1109/ICUFN.2009.5174295","DOIUrl":"https://doi.org/10.1109/ICUFN.2009.5174295","url":null,"abstract":"This paper proposes a new representation of electrocardiogram (ECG) for biometric key distribution in body area networks, and investigates the experimental performance for ECG representations with various features in different modalities and different distance metrics. Other than the previous schemes using binary sequence, the proposed VitaCode represents the ECG features in a set with integer elements, which can be combined with the fuzzy biometric cryptography more effectively. Experimental results on the public domain PhysioBank database with 290 subjects show VitaCode can provide a more practical biometric representation basic for ECG-based secure communications in the promising body area healthcare networks.","PeriodicalId":371189,"journal":{"name":"2009 First International Conference on Ubiquitous and Future Networks","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122159852","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jongwoo Kim, Dong-Eun Kim, Suwon Park, S. Rhee, Kiyoung Han, Hyongoo Kang
{"title":"Use of vestigial power management bit within Wi-Fi frame structure of access point for coexistence of Wi-Fi and WiMAX systems in shared bands","authors":"Jongwoo Kim, Dong-Eun Kim, Suwon Park, S. Rhee, Kiyoung Han, Hyongoo Kang","doi":"10.1109/ICUFN.2009.5174315","DOIUrl":"https://doi.org/10.1109/ICUFN.2009.5174315","url":null,"abstract":"Coexistence of more than one wireless communication systems in a shared band such as 2.4GHz ISM band has been one of hot research topics. As an example, there are many research results related to the coexistence of Wi-Fi and Bluetooth systems in the ISM band. Recently, many schemes for coexistence of Wi-Fi and WiMAX systems in shared bands such as 2.4GHz ISM band have been proposed. In this paper, proposed scheme for the coexistence of Wi-Fi and WiMAX systems is TDO (Time Division Operation) using of vestigial power management bit within Wi-Fi frame structure.","PeriodicalId":371189,"journal":{"name":"2009 First International Conference on Ubiquitous and Future Networks","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132172289","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Self-healing key management service for Mobile Ad hoc Networks","authors":"M. Ge, K. Lam","doi":"10.1109/ICUFN.2009.5174307","DOIUrl":"https://doi.org/10.1109/ICUFN.2009.5174307","url":null,"abstract":"This paper presents a robust key management scheme for supporting the secure communication needs of emergency response operations. The proposed scheme aims to tolerate the dynamic nature of such operations where some system and network components may be damaged or redeployed frequently. Mobile Ad hoc Network (MANET) is widely accepted to be a suitable approach to meet the communication needs of emergency response operations. Such operations tend to be carried out in an environment where existing infrastructures have been destroyed by natural disasters. Security is an important feature of the underlying Command, Control and Communication (C3) systems of emergency response operations. Security functions almost invariably require the support of some key management services. Distributed CA (DCA) is one of the most important schemes to key management in MANET; however the key management service may fail if some of the DCA nodes disappear from the system due to the physical damages in the harsh field environment or redeployment of some participating agencies. In this paper, we propose a self-healing key management service which is capable of detecting failure of DCA nodes and reconstructing the key management service automatically without requiring a trusted third party. Network simulation results shows that our scheme is effective in terms of failure detection and recovery and introduces only a very moderate communication overhead to the network in most of the time.","PeriodicalId":371189,"journal":{"name":"2009 First International Conference on Ubiquitous and Future Networks","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134318265","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A new IPTV channel zapping scheme for EPON","authors":"C. Sue, Chi-Yu Hsu, Yu-Shiang Su, Yung-Yi Shieh","doi":"10.1109/ICUFN.2009.5174299","DOIUrl":"https://doi.org/10.1109/ICUFN.2009.5174299","url":null,"abstract":"This paper proposes a new IPTV channel zapping scheme in EPON, and defines two user's operation behavior for channel zapping. Based on such user's operation behavior, this paper defines two channel zapping types that are intra- and inter-stream channel zapping. In addition, we propose two analysis models to evaluate channel zapping time for both channel zapping types, respectively. According to simulation results, our proposed scheme can reduce channel zapping time and satisfy quality criteria (500ms). In addition, some further works are described in this work.","PeriodicalId":371189,"journal":{"name":"2009 First International Conference on Ubiquitous and Future Networks","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121811715","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}