2009 Fifth Advanced International Conference on Telecommunications最新文献

筛选
英文 中文
An Approach on Short Message Service Text Transfer for Turkish GSM Operators 土耳其GSM运营商短消息业务文本传输方法研究
2009 Fifth Advanced International Conference on Telecommunications Pub Date : 2009-05-24 DOI: 10.1109/AICT.2009.24
Ahmet Oguz Yilmaz, Cem Ergün, Y. Bi̇ti̇ri̇m
{"title":"An Approach on Short Message Service Text Transfer for Turkish GSM Operators","authors":"Ahmet Oguz Yilmaz, Cem Ergün, Y. Bi̇ti̇ri̇m","doi":"10.1109/AICT.2009.24","DOIUrl":"https://doi.org/10.1109/AICT.2009.24","url":null,"abstract":"Short Message Service (SMS) has been one of the most popular services in mobile communication for years, and its usage is still growing. However, with the usage of Turkish character(s) in SMS message text, the maximum length of a single message reduces from 160 to 70 characters due to the transmission regulations of SMS designated by Cellular Telecommunications and Internet Association. This results in inconvenient communication for cell phone users and causes extra SMS traffic congestion on GSM networks. In this paper, an algorithm – ThinOn, is proposed to solve problems arising with the usage of Turkish character(s). The proposed algorithm is language independent and can also be a prototype model for other languages having characters not included in GSM alphabet.","PeriodicalId":409336,"journal":{"name":"2009 Fifth Advanced International Conference on Telecommunications","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121730708","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Empirical Study of Self-Similarity in the Per-User-Connection Arrival Process 每个用户连接到达过程中自相似度的实证研究
2009 Fifth Advanced International Conference on Telecommunications Pub Date : 2009-05-24 DOI: 10.1109/AICT.2009.23
G. Verticale
{"title":"An Empirical Study of Self-Similarity in the Per-User-Connection Arrival Process","authors":"G. Verticale","doi":"10.1109/AICT.2009.23","DOIUrl":"https://doi.org/10.1109/AICT.2009.23","url":null,"abstract":"In this paper, we investigate time-correlation of the connection request process of web browsing applications and other Internet applications. Evidence of self-similarity in the Internet traffic has been pointed out in several papers, but mainly with reference to the volume of traffic, to the packet arrival process, or to the connection arrival process of aggregated traffic. In our study, instead, we focus on the process of connection requests coming from a single client and study whether asymptotic self-similarity is evident even when  there is low client activity, the observation window is short, or data is partial. The analysis is performed on publicly available traffic traces that include both Wide Area and Campus Network traffic. To identify time correlations, we use the novel, unbiased estimator of the power-law exponent based on the Modified Allan Variance (MAVAR).  Our results show that self-similarity is evident in web traffic and Domain Name requests, provided that the client is active for more than a few connections.  This study is valuable for researchers interested in the modeling of packet traffic sources or in the monitoring of network activity.","PeriodicalId":409336,"journal":{"name":"2009 Fifth Advanced International Conference on Telecommunications","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121045100","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Method of Admission Control Based on Both Resource Requests and Traffic Measurement and Its Dynamics under On/Off Model Traffic 一种基于资源请求和流量测量的放行控制方法及其在开/关模式下的动态特性
2009 Fifth Advanced International Conference on Telecommunications Pub Date : 2009-05-24 DOI: 10.1109/AICT.2009.16
Y. Kanada
{"title":"A Method of Admission Control Based on Both Resource Requests and Traffic Measurement and Its Dynamics under On/Off Model Traffic","authors":"Y. Kanada","doi":"10.1109/AICT.2009.16","DOIUrl":"https://doi.org/10.1109/AICT.2009.16","url":null,"abstract":"A method of admission control based on both resource requests by applications and class-based traffic measurement results was developed. In this method, a wide range of admission-control policy can be realized by adjusting three parameters, α, β, and γ. A policy-server prototype using this method and simulated voice traffic was used in traffic measurements. The measurements results show that the proposed method improves bandwidth usage and decreases call-blocking ratio while incurring low measurement load. Interesting but possibly harmful dynamics (i.e., system behavior) were observed by the simulations using traffic generated by an on/off model. That is, this admission-control method may cause oscillation or long-term evolution that lasts for 100 to 150 minutes, and it may also cause band-width “overshooting”. The range of parameters with which such effects can be properly suppressed and the admission control correctly works was experimentally obtained.","PeriodicalId":409336,"journal":{"name":"2009 Fifth Advanced International Conference on Telecommunications","volume":"88 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132319557","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Electrical Model to Sierpenski Gasket Patch Antenna Sierpenski衬垫贴片天线的电学模型
2009 Fifth Advanced International Conference on Telecommunications Pub Date : 2009-05-24 DOI: 10.1109/AICT.2009.55
F. Abdelhak, S. Noureddine, G. Ali
{"title":"An Electrical Model to Sierpenski Gasket Patch Antenna","authors":"F. Abdelhak, S. Noureddine, G. Ali","doi":"10.1109/AICT.2009.55","DOIUrl":"https://doi.org/10.1109/AICT.2009.55","url":null,"abstract":"This paper covers the design of electrical model of Sierpenski fractal antenna. The proposed model is based on the electrical model of triangular patch. Each elementary triangle of Sierpenski patch is replaced by its model and then the whole model is built. The return loss of the model is compared to both a physical patch and another electrical model. The proposed model has the same resonant frequency with the antenna and a few differences in band width and it’s very useful for parametric analysis of the Sierpenski gasket antenna. This work can open other opportunities in the electrical modeling of fractal antennas.","PeriodicalId":409336,"journal":{"name":"2009 Fifth Advanced International Conference on Telecommunications","volume":"33 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114121226","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
System Model Performance Coupled with DPSK Modulation over Flat Rayleigh Fading Channels 在平坦瑞利衰落信道上耦合DPSK调制的系统模型性能
2009 Fifth Advanced International Conference on Telecommunications Pub Date : 2009-05-24 DOI: 10.1109/AICT.2009.40
O. Sidek, A. Yahya, M. Salleh
{"title":"System Model Performance Coupled with DPSK Modulation over Flat Rayleigh Fading Channels","authors":"O. Sidek, A. Yahya, M. Salleh","doi":"10.1109/AICT.2009.40","DOIUrl":"https://doi.org/10.1109/AICT.2009.40","url":null,"abstract":"In this paper performance enhancement of the system has been investigated by employing large girth Quasi-Cyclic low-density parity-check (QC-LDPC) codes as forward error correction code, coupled with differential phase shift keying (DPSK) over Rayleigh fading channels. Performance of the system is evaluated by measuring bit error rate (BER) for a given value of . Simulation results at diversity level L=4 have confirmed the robustness of the system with a gain of about 1.5 dB as compared to the results of known differential detection system over Rayleigh Fading Channels at a BER of10^-5 .","PeriodicalId":409336,"journal":{"name":"2009 Fifth Advanced International Conference on Telecommunications","volume":"276 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127293842","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Smart Card Benefits for Trusted Processing of Keys-Tree in WLANs 智能卡对无线局域网中密钥树可信处理的好处
2009 Fifth Advanced International Conference on Telecommunications Pub Date : 2009-05-24 DOI: 10.1109/AICT.2009.70
P. Urien
{"title":"Smart Card Benefits for Trusted Processing of Keys-Tree in WLANs","authors":"P. Urien","doi":"10.1109/AICT.2009.70","DOIUrl":"https://doi.org/10.1109/AICT.2009.70","url":null,"abstract":"In this paper we introduce ASN.1 scripts, securely computing cryptographic keys-trees, in smart cards. Keys-trees are used by various protocols such as AKA or EAP that are going to be deployed in next generations of wireless networks (WLAN, WiMAX, EUTRAN…). They provide services such as fast re-authentication, handover management, or Mobile IP support. We propose a trusted computing architecture for these structures, based on smart cards. We suggest two kinds of approaches, static trees working with embedded pre-defined keys generators, and dynamic trees, built from scripts. Finally we detail ASN.1 scripts, designed for dynamic keys-trees computing.","PeriodicalId":409336,"journal":{"name":"2009 Fifth Advanced International Conference on Telecommunications","volume":"177 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124781834","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performance Evaluation of Multicast Routing over Multilayer Multistage Interconnection Networks 多层多级互连网络中组播路由的性能评价
2009 Fifth Advanced International Conference on Telecommunications Pub Date : 2009-05-24 DOI: 10.1109/AICT.2009.72
D. C. Vasiliadis, G. Rizos, C. Vassilakis, E. Glavas
{"title":"Performance Evaluation of Multicast Routing over Multilayer Multistage Interconnection Networks","authors":"D. C. Vasiliadis, G. Rizos, C. Vassilakis, E. Glavas","doi":"10.1109/AICT.2009.72","DOIUrl":"https://doi.org/10.1109/AICT.2009.72","url":null,"abstract":"Multilayer MINs have emerged mainly due to the increased need for routing capacity in the presence of multicast and broadcast traffic, their performance prediction and evaluation however has not been studied sufficiently insofar. In this paper, we use simulation to evaluate the performance of multilayer MINs with switching elements of different buffer sizes and under different offered loads. The findings of this paper can be used by MIN designers to optimally configure their networks.","PeriodicalId":409336,"journal":{"name":"2009 Fifth Advanced International Conference on Telecommunications","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122323113","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A Framework for Access Control and Management in Dynamic Cooperative and Federated Environments 动态合作与联邦环境下的访问控制与管理框架
2009 Fifth Advanced International Conference on Telecommunications Pub Date : 2009-05-24 DOI: 10.1109/AICT.2009.81
Malohat Ibrohimovna, S. Groot
{"title":"A Framework for Access Control and Management in Dynamic Cooperative and Federated Environments","authors":"Malohat Ibrohimovna, S. Groot","doi":"10.1109/AICT.2009.81","DOIUrl":"https://doi.org/10.1109/AICT.2009.81","url":null,"abstract":"Personal devices can form a person-centric network, which is known as a Personal Network (PN). Besides person-oriented communications, there is a growing tendency for group-oriented communications, since it enables the users to enjoy cooperation and promises exciting opportunities for different applications in various fields, such as, entertainment, business healthcare, emergency and education. A Federation of PNs (Fednet) is a group-oriented network that enables the users to federate their personal networks and to share personal resources and services to achieve a common objective. One of the challenges in Fednets is managing a secure dynamic cooperation of PNs. In this paper, we present a secure access control and management framework for Fednets. The framework is based on the two-level approach to the access control: the access to the Fednet and the access to Fednet resources and services. The access control contains authentication, authorization and token granting processes. Furthermore, in this paper, we describe our initial prototyping experience of this framework. Preliminary results showed that the approach is suitable for Fednets of small sizes and therefore, further work is required to investigate the scalability issues. Finally, we briefly discuss the related work.","PeriodicalId":409336,"journal":{"name":"2009 Fifth Advanced International Conference on Telecommunications","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115094454","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
The Outage Probability and Fade Duration of the SSC Combiner Output Signal in the Presence of Rice Fading 水稻衰落下SSC合成器输出信号的中断概率和衰落持续时间
2009 Fifth Advanced International Conference on Telecommunications Pub Date : 2009-05-24 DOI: 10.1109/AICT.2009.57
D. Krstić, M. Stefanovic, P. Nikolic, S. Jovkovic, C. Stefanovic
{"title":"The Outage Probability and Fade Duration of the SSC Combiner Output Signal in the Presence of Rice Fading","authors":"D. Krstić, M. Stefanovic, P. Nikolic, S. Jovkovic, C. Stefanovic","doi":"10.1109/AICT.2009.57","DOIUrl":"https://doi.org/10.1109/AICT.2009.57","url":null,"abstract":"The level crossing rate, the outage probability and the average time of fade duration of the Switch and Stay Combiner output signal, in the presence of Rice fading at the input, are determined in this paper. The results are shown graphically for different variance values, decision threshold values and signal and fading parameters values.","PeriodicalId":409336,"journal":{"name":"2009 Fifth Advanced International Conference on Telecommunications","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133663741","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Modelling Limited-Availability Groups with BPP Traffic and Bandwidth Reservation 基于BPP流量和带宽预留的有限可用组建模
2009 Fifth Advanced International Conference on Telecommunications Pub Date : 2009-05-24 DOI: 10.1109/AICT.2009.21
M. Głąbowski, M. Sobieraj, M. Stasiak
{"title":"Modelling Limited-Availability Groups with BPP Traffic and Bandwidth Reservation","authors":"M. Głąbowski, M. Sobieraj, M. Stasiak","doi":"10.1109/AICT.2009.21","DOIUrl":"https://doi.org/10.1109/AICT.2009.21","url":null,"abstract":"The article proposes a new method for calculating occupancy distribution and blocking/loss probability in the limited availability group with bandwidth reservation. The proposed method makes it possible to model groups servicing multi-service BPP traffic streams (Binomial--Poisson--Pascal). The proposed method is based on the analysis of the service process occurring in the considered system on the basis of the one-dimensional Markov chain. Significant increase in the accuracy and precision of the proposed method, in relation to other methods known from the literature, was obtained as the result of a modification of service streams within the reservation space. The accuracy of the proposed method has been verified by simulation studies.","PeriodicalId":409336,"journal":{"name":"2009 Fifth Advanced International Conference on Telecommunications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133506307","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信