2008 10th International Conference on Advanced Communication Technology最新文献

筛选
英文 中文
Rain Effects on SDH-based Networks Using Protection Switching 利用保护交换对基于ssh的网络的雨效应
2008 10th International Conference on Advanced Communication Technology Pub Date : 2008-04-22 DOI: 10.1109/ICACT.2008.4494063
N. Maleki, R. Khosravi, M.K. Shokouhi
{"title":"Rain Effects on SDH-based Networks Using Protection Switching","authors":"N. Maleki, R. Khosravi, M.K. Shokouhi","doi":"10.1109/ICACT.2008.4494063","DOIUrl":"https://doi.org/10.1109/ICACT.2008.4494063","url":null,"abstract":"In this paper, radio relay systems for Synchronous Digital Hierarchy (SDH)-based networks with path type Synchronous transfer Module of order 0 (STM-0) without protection switching and with 1+1 switching configuration as said in Recommendation ITU-R F.750 are considered. Byte Interleaved Parity (BIP) codes are used for error monitoring. Rain causes fading and the blocks are received in errors because of this fading and the SES may occur because of these errored blocks and the system may arrive in unavailable state. In this paper, the unavailability ratios of these two systems are calculated and the results are compared with the objectives in Recommendation ITU-R P.1703 and it is assumed that the link comprises the access portion of a network and forms a part of a national portion of a constant bit rat digital path element.","PeriodicalId":448615,"journal":{"name":"2008 10th International Conference on Advanced Communication Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130056528","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Novel Key Exchange Protocol Based on RSA-OAEP 一种新的基于RSA-OAEP的密钥交换协议
2008 10th International Conference on Advanced Communication Technology Pub Date : 2008-04-22 DOI: 10.1109/ICACT.2008.4494096
Jie Liu, Jianhua Li
{"title":"A Novel Key Exchange Protocol Based on RSA-OAEP","authors":"Jie Liu, Jianhua Li","doi":"10.1109/ICACT.2008.4494096","DOIUrl":"https://doi.org/10.1109/ICACT.2008.4494096","url":null,"abstract":"Optimal asymmetric encryption padding (OAEP) is widely accepted because of its provable security and practicability. In this paper, a novel key exchange protocol based on RSA-OAEP cryptosystem was presented. The protocol is efficient in computation and communication. It is secure against known key attack and eavesdrop attack. It also can provide mutual authentication, forward secrecy and key freshness, which are standard security attributes that key exchange protocols should have.","PeriodicalId":448615,"journal":{"name":"2008 10th International Conference on Advanced Communication Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130150054","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Enhanced MCS for Direct Relaying in Transparent RS of IEEE 802.16j 用于 IEEE 802.16j 透明 RS 中直接中继的增强型 MCS
2008 10th International Conference on Advanced Communication Technology Pub Date : 2008-04-22 DOI: 10.1109/ICACT.2008.4493951
S. Chae, Young-il Kim
{"title":"Enhanced MCS for Direct Relaying in Transparent RS of IEEE 802.16j","authors":"S. Chae, Young-il Kim","doi":"10.1109/ICACT.2008.4493951","DOIUrl":"https://doi.org/10.1109/ICACT.2008.4493951","url":null,"abstract":"We propose an enhanced MCS for demodulation-and-forward scheme in transparent RS. The demodulation-and-forward scheme only demodulates and modulates the received signal to relay in symbol-by-symbol manner. In this scheme, RS can relay the received signal within one frame period. However, RS could suffer from frame delay when it adopts decode and forward scheme. In addition, we think that MR-BS is required to have enhanced MCS for demodulation-and-forward scheme instead of the MCS in existing specifications of 802.16e. With making use of coding rate 2/3 and 5/6 for both QPSK and 16-QAM, which is absent between BS and MS link, the link quality between BS and RS can be enhanced by using lower modulation orders. And also, we want to suggest another encoding slot concatenation and its concatenation rule and parameters and its simulations results will show merits of enhanced MCS than existing MCS performances.","PeriodicalId":448615,"journal":{"name":"2008 10th International Conference on Advanced Communication Technology","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127668922","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Experience of USN MAC based on 424MHz band IEEE 802.15.4 基于424MHz频段IEEE 802.15.4的USN MAC经验
2008 10th International Conference on Advanced Communication Technology Pub Date : 2008-04-22 DOI: 10.1109/ICACT.2008.4493776
Kyeseon Lee, Nae-Su Kim, D. Kim
{"title":"Experience of USN MAC based on 424MHz band IEEE 802.15.4","authors":"Kyeseon Lee, Nae-Su Kim, D. Kim","doi":"10.1109/ICACT.2008.4493776","DOIUrl":"https://doi.org/10.1109/ICACT.2008.4493776","url":null,"abstract":"In the building outside, the requirement about the sensor network applications increases, but it is difficult to build the sensor network in the building outside the frequency problem. The frequency band issued for the IEEE802.15.4 processed with the physical layer of the sensor network and standard of the MAC layer is 2.4 GHz and 868 / 915 MHz. As to the frequency, which we can use within Korea, 2.4 GHz is unique. 2.4 GHz node is difficult to operate in the building outside. In Korea, the frequency band that we can use as the narrow band is 424 and 447 MHz band. Therefore, the sensor node of 424 or 447 MHz band can operate in Korea was needed.","PeriodicalId":448615,"journal":{"name":"2008 10th International Conference on Advanced Communication Technology","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116293916","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Link Quality-Aware Packet Forwarding Architecture for Wireless Mesh Network 无线网状网络中链路质量感知的分组转发体系结构
2008 10th International Conference on Advanced Communication Technology Pub Date : 2008-04-22 DOI: 10.1109/ICACT.2008.4493919
Hung Quoc Vo, C. Hong
{"title":"Link Quality-Aware Packet Forwarding Architecture for Wireless Mesh Network","authors":"Hung Quoc Vo, C. Hong","doi":"10.1109/ICACT.2008.4493919","DOIUrl":"https://doi.org/10.1109/ICACT.2008.4493919","url":null,"abstract":"Traffic engineering, as its name, is the art of manipulating traffic around so that traffic from congested links is moved onto the unused capacity on the other links. So, providing traffic engineering support in multi-hop wireless network has become increasingly important due to the low bandwidth nature of wireless channels. In this work, we propose a novel approach to control the traffic to avoid congestion by decoupling forwarding process from the routing process. The proposal is interested in provisioning quality of service guarantees for planned Wireless Mesh Networks which are being used widely as a broadband wireless access network.","PeriodicalId":448615,"journal":{"name":"2008 10th International Conference on Advanced Communication Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125832426","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Design of UWB Diversity Antenna for PDA Applications 用于PDA的超宽带分集天线设计
2008 10th International Conference on Advanced Communication Technology Pub Date : 2008-04-22 DOI: 10.1109/ICACT.2008.4493830
Seokjin Hong, Jaewon Lee, Jaehoon Choi
{"title":"Design of UWB Diversity Antenna for PDA Applications","authors":"Seokjin Hong, Jaewon Lee, Jaehoon Choi","doi":"10.1109/ICACT.2008.4493830","DOIUrl":"https://doi.org/10.1109/ICACT.2008.4493830","url":null,"abstract":"Two elements diversity planar antenna for a multiple-input multiple-output application is proposed. By adopting two Y-shaped radiators, the antenna provides wideband impedance matching characteristic over the desired frequency band. To reduce the mutual coupling between two radiating elements, three stubs are inserted in the ground plane. Good impedance matching and improved isolation characteristics are observed. The measured impedance bandwidth of the proposed antenna ranges from 2.27 GHz to 10.2 GHz for return loss less than 10 dB. Parametric analysis has been conducted to investigate the effect of radiator length and insertion of stubs on the impedance bandwidth and isolation characteristics.","PeriodicalId":448615,"journal":{"name":"2008 10th International Conference on Advanced Communication Technology","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125445177","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Trust Type Based Semantic Web Services Assessment and Selection 基于信任类型的语义Web服务评估与选择
2008 10th International Conference on Advanced Communication Technology Pub Date : 2008-04-22 DOI: 10.1109/ICACT.2008.4494190
Yukyong Kim, Kyung-Goo Doh
{"title":"Trust Type Based Semantic Web Services Assessment and Selection","authors":"Yukyong Kim, Kyung-Goo Doh","doi":"10.1109/ICACT.2008.4494190","DOIUrl":"https://doi.org/10.1109/ICACT.2008.4494190","url":null,"abstract":"As multiple service providers make themselves available on-line, the trustworthiness of services becomes significant. In Web services environments, services from different providers might have to be combined to establish a complete service. Although the individual service can be trusted, the composed service is not guaranteed against trust. Thus there must be a way to determine the composed service is trusted. This paper presents a trust type model to deduce the trust level of composed services. Then, we present a conceptual framework which enables trust based service discovery and selection. Using the inferred trust type of the composed service as the weight, we can evaluate service candidates and select the best match of them. Finally we describe the experiment results to validate our QoS based service selection.","PeriodicalId":448615,"journal":{"name":"2008 10th International Conference on Advanced Communication Technology","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127503343","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Multicast Architecture over Next Generation Network 下一代网络的多播架构
2008 10th International Conference on Advanced Communication Technology Pub Date : 2008-04-22 DOI: 10.1109/ICACT.2008.4493748
Jong Min Lee, Juyoung Park, S. Kang, J. Choi
{"title":"Multicast Architecture over Next Generation Network","authors":"Jong Min Lee, Juyoung Park, S. Kang, J. Choi","doi":"10.1109/ICACT.2008.4493748","DOIUrl":"https://doi.org/10.1109/ICACT.2008.4493748","url":null,"abstract":"ITU-T SG13 is standardizing multicast framework architecture of next generation network. This specifies the architecture and functions of next generation network multicast services that make use of next generation network architecture and its features. In this paper, we describe the functional architecture of next generation network for multicast services in NGN release 2.","PeriodicalId":448615,"journal":{"name":"2008 10th International Conference on Advanced Communication Technology","volume":"134 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127592811","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Design of Unified Authentication for Multi-mode Terminal between Service and Access network in NGN NGN中业务与接入网间多模终端统一认证设计
2008 10th International Conference on Advanced Communication Technology Pub Date : 2008-04-22 DOI: 10.1109/ICACT.2008.4493999
Kwihoon Kim, Hyun-Woo Lee, Seoung-kyun Jo, Won Ryu
{"title":"Design of Unified Authentication for Multi-mode Terminal between Service and Access network in NGN","authors":"Kwihoon Kim, Hyun-Woo Lee, Seoung-kyun Jo, Won Ryu","doi":"10.1109/ICACT.2008.4493999","DOIUrl":"https://doi.org/10.1109/ICACT.2008.4493999","url":null,"abstract":"Presently, while the various accesses come out, it is necessary to have the separate authentication process if it wants to connect to each access. The various accesses are accommodated in the future NGN leading in ITU-T and TISPAN. Service providers become to provide a service based on them. The important access network is the XDSL, WLAN, WiMax and WCDMA. The ongoing wireless LAN standardization and R&D activities worldwide, which target bit rates higher than 100 Mb/s, combined with the recent successful deployment of WLANs in numerous hotspots justify the fact that WLAN technology will play a key role in wireless data transmission. Cellular network operators have recognized this fact, and strive to exploit WLAN technology and integrate this technology into their cellular data networks. In order that the service continuity is guaranteed while crossing the access network, the mobility management technology and integrated authentication and authorization technology are needed. In order that the seamless handover is provided, the various modes which are the same as those of the fast handover are considered. However, it has an effect that it is moreover many with authentication process. In this paper, we suppose that the various accesses are passed through. We propose for a single-sign-on for crossing from various accesses to the service level about the efficient integrated authentication technology. We focus on these interworking mechanisms, which effectively combine the various data access networks into integrated fixed, wireless and mobile data environments capable of ubiquitous data services and very high data rates in hotspot locations..","PeriodicalId":448615,"journal":{"name":"2008 10th International Conference on Advanced Communication Technology","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127646201","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Novel Semantic-Based Image Retrieval Method 一种新的基于语义的图像检索方法
2008 10th International Conference on Advanced Communication Technology Pub Date : 2008-04-22 DOI: 10.1109/ICACT.2008.4493928
A. Lakdashti, M. Moin, K. Badie
{"title":"A Novel Semantic-Based Image Retrieval Method","authors":"A. Lakdashti, M. Moin, K. Badie","doi":"10.1109/ICACT.2008.4493928","DOIUrl":"https://doi.org/10.1109/ICACT.2008.4493928","url":null,"abstract":"In this paper, we design a fuzzy system for image retrieval to reduce the semantic gap in the content-based image retrieval systems. Our main contribution is three-fold: (1) designing a fuzzy modeling approach to model the expert human behavior in the image retrieval task, (2) a fuzzy system for semantic-based image retrieval, and (3) a training algorithm for creating the fuzzy rules. The proposed solution not only is a novel idea in the semantic-based image retrieval field, but has enough potential in learning semantics from the user and making a powerful approach to improve the performance of CBIR systems, as our experiments on a set of 2000 images supports our claim.","PeriodicalId":448615,"journal":{"name":"2008 10th International Conference on Advanced Communication Technology","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127646775","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信