2011 International Conference on Broadband and Wireless Computing, Communication and Applications最新文献

筛选
英文 中文
Performance of Adaptive Parallel Interference Cancellation for OFDM Mobile Communication Systems OFDM移动通信系统自适应并行干扰消除性能研究
Yung-Fa Huang, Tan-Hsu Tan, Hsing-Chung Chen, Cheng-Min Yeh
{"title":"Performance of Adaptive Parallel Interference Cancellation for OFDM Mobile Communication Systems","authors":"Yung-Fa Huang, Tan-Hsu Tan, Hsing-Chung Chen, Cheng-Min Yeh","doi":"10.1109/BWCCA.2011.82","DOIUrl":"https://doi.org/10.1109/BWCCA.2011.82","url":null,"abstract":"In this paper, the performance of parallel interference cancellation (PIC) multiuser detector in orthogonal frequency division multiple access (OFDMA) mobile communication systems is investigated. In multiuser systems, the multi-user interference (MUI) degraded the system performance, especially in near-far effect environments. The PIC scheme is proposed to reduce the MUIs and to improve the bit error rate (BER) performance for uplink OFDMA systems. Simulation results show that under the near far problems for both block sub carrier assignment scheme (BCAS) and block-interleaved sub carrier assignment scheme (ICAS), the PIC scheme can improve the BER performance for all users.","PeriodicalId":391671,"journal":{"name":"2011 International Conference on Broadband and Wireless Computing, Communication and Applications","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131844623","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A New Scheduling Scheme for Voice Awareness in 3G LTE 一种新的3G LTE语音感知调度方案
R. Musabe, H. Larijani, Brian G. Stewart, T. Boutaleb
{"title":"A New Scheduling Scheme for Voice Awareness in 3G LTE","authors":"R. Musabe, H. Larijani, Brian G. Stewart, T. Boutaleb","doi":"10.1109/BWCCA.2011.46","DOIUrl":"https://doi.org/10.1109/BWCCA.2011.46","url":null,"abstract":"3G Long Term Evolution (LTE) is an all internet protocol (IP) based network and one of its main aims is to improve mobile multimedia services. This is achieved through streamlining the system for packet services. This leads to improvements in the form of higher bit rates, lower latencies, and a variety of service offerings. However, more challenging technical difficulties may be expected to arise when voice traffic flows over an LTE network. There is a major change in the way voice is transmitted in LTE in that it is transmitted in packets instead of through circuits. This has led to the development of new types of resource management schemes, which are quite challenging. In this paper, we propose a new scheduling algorithm for voice traffic over LTE. This algorithm takes into account Voice over Internet Protocol (VoIP) parameters and shows, through simulations, an improvement in overall performance based on throughput and block error rate of up to 30 percent.","PeriodicalId":391671,"journal":{"name":"2011 International Conference on Broadband and Wireless Computing, Communication and Applications","volume":"94 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134204553","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
A Time Constraint Three-Party Encrypted Key Exchange Protocol 一个时间约束的三方加密密钥交换协议
Hsing-Chung Chen, Syuan-Zong Lin, Yung-Fa Huang, Hsien-Yun Chuang
{"title":"A Time Constraint Three-Party Encrypted Key Exchange Protocol","authors":"Hsing-Chung Chen, Syuan-Zong Lin, Yung-Fa Huang, Hsien-Yun Chuang","doi":"10.1109/BWCCA.2011.86","DOIUrl":"https://doi.org/10.1109/BWCCA.2011.86","url":null,"abstract":"We propose a time constraint three-party encrypted key exchange protocol in which both two parties/clients only act as the roles within the relationship of exchanging secure messages constrained by the intersection time periods. The technique of time constraint, in this paper, is that a trusted server generates a serial of secure exchanging messages, which are used to generate multiple session keys by each party individually. Each session key corresponding to one time period which is belonging to the intersection set from both two parties' requesting time bounds. Only both two authorized parties/clients can communicate to each other within the intersection set of time bounds. It can get better performance on when three parties do many times for traditional 3PEKE protocol. Our approach can improve the performance of traditional 3PEKE scheme via the technique of time constraint. Furthermore, we proof the scheme can also against the password guessing attack as well as replay attack.","PeriodicalId":391671,"journal":{"name":"2011 International Conference on Broadband and Wireless Computing, Communication and Applications","volume":"124 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133433913","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Mixed Chromatic Dispersion Compensation Methods for Combined HDWDM Systems 组合HDWDM系统的混合色散补偿方法
V. Bobrovs, A. Udalcovs, S. Spolitis, O. Ozolins, G. Ivanovs
{"title":"Mixed Chromatic Dispersion Compensation Methods for Combined HDWDM Systems","authors":"V. Bobrovs, A. Udalcovs, S. Spolitis, O. Ozolins, G. Ivanovs","doi":"10.1109/BWCCA.2011.50","DOIUrl":"https://doi.org/10.1109/BWCCA.2011.50","url":null,"abstract":"The authors have investigated the most efficient realization of mixed chromatic dispersion (CD) compensation schemes for high speed combined high density wavelength division multiplexing (HDWDM) systems. This research is performed with OptSim 5.1 simulation software. In this research it is shown that chromatic dispersion compensation scheme has a crucial role for guaranteed performance in combined HDWM transmission channels. Dispersion management strategy is needed when increasing the bit rate per channel by a factor of four. Therefore, the most efficient CD compensation scheme must be found for realized combined fiber optical transmission system. Authors have revealed that implementation of asymmetrical CD compensation schemes in pre-compensation and post-compensation modules are the most efficient and that it enables the best possible channel's bit error ratio (BER) values.","PeriodicalId":391671,"journal":{"name":"2011 International Conference on Broadband and Wireless Computing, Communication and Applications","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132920440","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Doppler Shift Distribution of Target Moving above Random Rough Surface 随机粗糙表面上运动目标的多普勒频移分布
K. Uchida, J. Honda, S. Nakashima
{"title":"Doppler Shift Distribution of Target Moving above Random Rough Surface","authors":"K. Uchida, J. Honda, S. Nakashima","doi":"10.1109/BWCCA.2011.78","DOIUrl":"https://doi.org/10.1109/BWCCA.2011.78","url":null,"abstract":"This paper is concerned with an analysis of the back scattering of electromagnetic waves from a target flying just above a random rough surface (RRS) such as desert, hilly terrain, sea surface and so on. First we introduce the discrete ray tracing method (DRTM) for electromagnetic field analyses. Second we investigate the effect of clutter due to the back scattering from RRS. Finally we show some numerical examples for back scattering from a target flying above Gaussian type of RRSs with arbitrary height deviation (dv) and correlation length (cl). It is demonstrated that clutters caused by reflections from RRS are much more predominant than the subtracted back scattering obtained by direct rays between radar and target together with indirect rays between them via reflections from RRS. Statistics of Doppler shift are also discussed.","PeriodicalId":391671,"journal":{"name":"2011 International Conference on Broadband and Wireless Computing, Communication and Applications","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114208394","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Secure RFID Deactivation/Activation Mechanism for Customer Service and Consumer Shopping 用于客户服务和消费者购物的安全RFID停用/激活机制
Yu-Yi Chen, Zhen-Jie Qiu, J. Lu, J. Jan
{"title":"A Secure RFID Deactivation/Activation Mechanism for Customer Service and Consumer Shopping","authors":"Yu-Yi Chen, Zhen-Jie Qiu, J. Lu, J. Jan","doi":"10.1109/BWCCA.2011.67","DOIUrl":"https://doi.org/10.1109/BWCCA.2011.67","url":null,"abstract":"RFID has been regarded as a time and money-saving solution for a wide variety of applications, such as manufacturing, supply chain management, and inventory control, etc. However, there are some security problems on RFID in the product managements. The most concerned issues are the tracking and the location privacy. Numerous scholars tried to solve these problems, but their proposals do not include the after-sales service. In this paper, we propose a purchase and after-sales service RFID scheme for shopping mall. The location privacy, confidentiality, data integrity, and some security protection are hold in this propose mechanism.","PeriodicalId":391671,"journal":{"name":"2011 International Conference on Broadband and Wireless Computing, Communication and Applications","volume":"135 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117352183","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Optimal Performance Study of IEEE 802.11 DCF with Contention Window 具有竞争窗口的IEEE 802.11 DCF的最优性能研究
Chien-Erh Weng, Chun-Yin Chen, Chiung-Hsing Chen, Chien-Hunh Chen
{"title":"Optimal Performance Study of IEEE 802.11 DCF with Contention Window","authors":"Chien-Erh Weng, Chun-Yin Chen, Chiung-Hsing Chen, Chien-Hunh Chen","doi":"10.1109/BWCCA.2011.81","DOIUrl":"https://doi.org/10.1109/BWCCA.2011.81","url":null,"abstract":"The IEEE 802.11 protocol has achieved worldwide acceptance with WLANs with minimum management and maintenance costs. In order to maximize the throughput, stations had to spend many times to find out the best contention window. In this paper, we modified the Wang¡¦s model and took account of the freezing of the back off counter when channel is busy. In the modified model, it is easily to obtain the optimal contention window for a given network scale. The selection of optimal contention window is just based on the network scales. Simulation results showed that the throughput is the same as Wang¡¦s. But, the optimal contention window is less than Wang¡¦s.","PeriodicalId":391671,"journal":{"name":"2011 International Conference on Broadband and Wireless Computing, Communication and Applications","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117065725","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
An Interface Design Secure Measurement Model for Improving Web App Security 一种提高Web应用安全性的界面设计安全度量模型
Sen-Tarng Lai
{"title":"An Interface Design Secure Measurement Model for Improving Web App Security","authors":"Sen-Tarng Lai","doi":"10.1109/BWCCA.2011.70","DOIUrl":"https://doi.org/10.1109/BWCCA.2011.70","url":null,"abstract":"In the internet age, the high efficiency and high profit activities must incorporate with the internet. Web Applications (Web App) is an important IT product in the internet age. However, the network intrusions and security vulnerabilities have continued to threaten the operation of Web App. In order to avoid Web App security vulnerabilities and defects cause user significant loss, how to improve security of Web App has become a topic worthy of further exploration. In Web App development process, interface design is a critical operation. However, it is also the major factors to inject the security vulnerabilities and defects. For this, four layers of Web App interface design will be discussed in this paper. And based on inspections of interface design, proposes an Interface Design Secure Measurement (IDSM) model. Applying IDSM model, the security vulnerabilities and defects of interface design can be identified. And assist in timely to adjust and revise the security vulnerabilities and defects of interface design, effectively and concretely enhance the Web App security.","PeriodicalId":391671,"journal":{"name":"2011 International Conference on Broadband and Wireless Computing, Communication and Applications","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131636434","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Node's Power Source Type Identification in Wireless Sensor Networks 无线传感器网络中节点电源类型的识别
Konstantin Mikhaylov, J. Tervonen
{"title":"Node's Power Source Type Identification in Wireless Sensor Networks","authors":"Konstantin Mikhaylov, J. Tervonen","doi":"10.1109/BWCCA.2011.84","DOIUrl":"https://doi.org/10.1109/BWCCA.2011.84","url":null,"abstract":"Contemporary Wireless Sensor Network (WSN) nodes can use one of the three options for their power supply: the electricity grid, the batteries or the wide range of energy harvesting systems. The possibility of identification for power source type used on the WSN node provides valuable information on the node potential resources, that could be used e.g. for the improvement of the whole WSN lifetime. Additionally, the possibility of WSN node Power Source Type Identification (PSTID) allows unifying the node's software through implementing the methods for WSN node operation adaptation based on the information about identified power source type and allows the support of efficient WSN node power source changeability without node reprogramming. To the best of our knowledge, this article is the first one which focuses on the problem of WSN node PSTID and suggests the appropriate solution. The suggested method allows implementing efficient PSTID with minimum resource consumption while not requiring any hardware components added to the WSN node. The suggested method has been implemented and tested in practice using different WSN node platforms and power source options. The evaluation results are presented in the paper as well.","PeriodicalId":391671,"journal":{"name":"2011 International Conference on Broadband and Wireless Computing, Communication and Applications","volume":"2010 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132406753","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Wireless Sensing System for Healthcare Monitoring Thermal Physiological State and Recognizing Behavior 医疗保健热生理状态监测与行为识别的无线传感系统
C. Sugimoto, R. Kohno
{"title":"Wireless Sensing System for Healthcare Monitoring Thermal Physiological State and Recognizing Behavior","authors":"C. Sugimoto, R. Kohno","doi":"10.1109/BWCCA.2011.44","DOIUrl":"https://doi.org/10.1109/BWCCA.2011.44","url":null,"abstract":"The introduction of ICT in the areas of medicine and welfare has created new systems and services for healthcare and can help promote disease prevention and health maintenance through wirelessly delivered healthcare and ubiquitous medicine. The availability of information about a person's physiological state and daily activity makes it possible to judge their health condition and provide predictive diagnoses and treatment. Therefore, a wireless sensing system for monitoring thermal physiological state in the living environment was developed and its functions were evaluated. The system consists of an ear-worn temperature sensor, two thermo-hygrometers, four skin temperature sensors, and an ECG sensor. The level of data loss in wireless communication was low making it possible to estimate physiological state using more than 10 sensors, even though both the IEEE 802.15.4 radio and the specified low power radio coexist. The system was evaluated for the prevention of indoor heat stroke among the elderly. The thermal physiological state and the location were monitored along with ambient temperature and humidity. We propose a method to detect the activities closely linked with heat stroke prevention and change in physiological state and to give appropriate warnings.","PeriodicalId":391671,"journal":{"name":"2011 International Conference on Broadband and Wireless Computing, Communication and Applications","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130467406","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信