首页 > 最新文献

2008 Australasian Telecommunication Networks and Applications Conference最新文献

英文 中文
Measuring Available Bandwidth: pathChirp's Chirp Train Structure Remodeled 测量可用带宽:pathChirp的Chirp序列结构重构
Pub Date : 2008-12-01 DOI: 10.1109/ATNAC.2008.4783354
S. Suthaharan, S. Kumar
Measuring available bandwidth over a network path is required by many applications including end-to-end admission control and server selection. In order to measure the available bandwidth, the end hosts need network information, such as packet delay, at intermediate systems. Several techniques have been proposed to address this problem. We have selected the most recently proposed algorithm called pathChirp and proposed an alternative approach. The main goal of pathChirp is to get the delay information at the intermediate systems by using the concept of self-induced congestion (which uses chirp train packets) in order to estimate the available bandwidth. However there are scenarios where pathChirp cannot provide accurate available bandwidth. We use the pathChirp mechanism as our underlying tool and modify its structure of chirp train. In the modified structure, the rate of the odd inter-chirp packet will be the same as the rate of previous even inter-chirp packet. Additionally, rate of inter-chirp packets will be increased exponentially with even power rather than both even and odd power as done in pathChirp scheme. Purpose of this new structure is to capture more network information using three different time-shifted chirp trains, and subsequently to find a better estimate for the available bandwidth. Our theory and simulation results support this claim.
许多应用程序都需要测量网络路径上的可用带宽,包括端到端准入控制和服务器选择。为了测量可用带宽,终端主机需要中间系统的网络信息,如数据包延迟。已经提出了几种技术来解决这个问题。我们选择了最新提出的算法pathChirp,并提出了一种替代方法。pathChirp的主要目标是利用自诱导拥塞(使用chirp列车数据包)的概念获得中间系统的延迟信息,从而估计可用带宽。然而,在某些情况下,pathChirp不能提供准确的可用带宽。我们使用pathChirp机制作为我们的底层工具,并修改其啁啾序列的结构。在改进后的结构中,奇数啁啾间包的速率将与之前的偶数啁啾间包的速率相同。此外,与pathChirp方案的奇偶功率相比,偶数功率下的啁啾间包速率将呈指数级增长。这种新结构的目的是使用三种不同的时移啁啾序列捕获更多的网络信息,然后找到更好的可用带宽估计。我们的理论和模拟结果支持这一说法。
{"title":"Measuring Available Bandwidth: pathChirp's Chirp Train Structure Remodeled","authors":"S. Suthaharan, S. Kumar","doi":"10.1109/ATNAC.2008.4783354","DOIUrl":"https://doi.org/10.1109/ATNAC.2008.4783354","url":null,"abstract":"Measuring available bandwidth over a network path is required by many applications including end-to-end admission control and server selection. In order to measure the available bandwidth, the end hosts need network information, such as packet delay, at intermediate systems. Several techniques have been proposed to address this problem. We have selected the most recently proposed algorithm called pathChirp and proposed an alternative approach. The main goal of pathChirp is to get the delay information at the intermediate systems by using the concept of self-induced congestion (which uses chirp train packets) in order to estimate the available bandwidth. However there are scenarios where pathChirp cannot provide accurate available bandwidth. We use the pathChirp mechanism as our underlying tool and modify its structure of chirp train. In the modified structure, the rate of the odd inter-chirp packet will be the same as the rate of previous even inter-chirp packet. Additionally, rate of inter-chirp packets will be increased exponentially with even power rather than both even and odd power as done in pathChirp scheme. Purpose of this new structure is to capture more network information using three different time-shifted chirp trains, and subsequently to find a better estimate for the available bandwidth. Our theory and simulation results support this claim.","PeriodicalId":143803,"journal":{"name":"2008 Australasian Telecommunication Networks and Applications Conference","volume":"192 7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124329894","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Radiation Losses from a Single Wire Earth Return Power Line with Bends 带弯曲的单线回地电力线的辐射损耗
Pub Date : 2008-12-01 DOI: 10.1109/ATNAC.2008.4783315
C. Kikkert, G. Reid
It is desirable to use existing single wire earth return (SWER) lines for data communication as well as transmitting power in remote areas. The radiation losses of the communication signal is a critical system design parameter. Existing radiation models are not adequate since they assume: firstly that the antenna is a small number of wavelengths long and secondly that the currents along the line are constant, so that no power lost in radiation. The model presented here overcomes these limitations. The model shows that bends in the SWER line significantly effect both the radiated power and the radiation patterns.
在偏远地区,利用现有的单线回地(SWER)线路进行数据通信和输电是可取的。通信信号的辐射损耗是一个重要的系统设计参数。现有的辐射模型是不充分的,因为它们假设:首先,天线有少量波长长;其次,沿线路的电流是恒定的,因此辐射中没有功率损失。这里提出的模型克服了这些限制。模型表明,应答线的弯曲对辐射功率和辐射方向图都有显著影响。
{"title":"Radiation Losses from a Single Wire Earth Return Power Line with Bends","authors":"C. Kikkert, G. Reid","doi":"10.1109/ATNAC.2008.4783315","DOIUrl":"https://doi.org/10.1109/ATNAC.2008.4783315","url":null,"abstract":"It is desirable to use existing single wire earth return (SWER) lines for data communication as well as transmitting power in remote areas. The radiation losses of the communication signal is a critical system design parameter. Existing radiation models are not adequate since they assume: firstly that the antenna is a small number of wavelengths long and secondly that the currents along the line are constant, so that no power lost in radiation. The model presented here overcomes these limitations. The model shows that bends in the SWER line significantly effect both the radiated power and the radiation patterns.","PeriodicalId":143803,"journal":{"name":"2008 Australasian Telecommunication Networks and Applications Conference","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129167095","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Servicing Best Effort Traffic Using nrtPS on Fixed WiMAX 在固定WiMAX上使用nrtPS服务最佳努力流量
Pub Date : 2008-12-01 DOI: 10.1109/ATNAC.2008.4783345
S. Perera, Harsha Sirisena
IEEE 802.16 is a wireless metropolitan area broadband access technology which provides layer two service differentiation for many types of traffic flows. In this paper the transport of uplink best effort traffic from the subscriber to the base station is considered. The performance of best effort service class is analyzed and compared with non-real-time polling service class which can also be used for low priority flows such as file transfer and Web traffic. We propose performance enhancements and modifications to increase the efficiency of the nrtPS class. Namely using a dynamic polling period based on the activity on the connection, using dummy keep alive messages when inactive and releasing idle connections to conserve bandwidth.
IEEE 802.16是一种无线城域网宽带接入技术,它为多种类型的业务流提供了第二层业务区分。本文考虑了从用户到基站的上行最大努力业务传输问题。分析了最佳努力服务类的性能,并与非实时轮询服务类进行了比较。非实时轮询服务类也可用于文件传输和Web流量等低优先级流。我们提出性能增强和修改,以提高nrtPS类的效率。即使用基于连接活动的动态轮询周期,在非活动时使用虚拟keep alive消息,并释放空闲连接以节省带宽。
{"title":"Servicing Best Effort Traffic Using nrtPS on Fixed WiMAX","authors":"S. Perera, Harsha Sirisena","doi":"10.1109/ATNAC.2008.4783345","DOIUrl":"https://doi.org/10.1109/ATNAC.2008.4783345","url":null,"abstract":"IEEE 802.16 is a wireless metropolitan area broadband access technology which provides layer two service differentiation for many types of traffic flows. In this paper the transport of uplink best effort traffic from the subscriber to the base station is considered. The performance of best effort service class is analyzed and compared with non-real-time polling service class which can also be used for low priority flows such as file transfer and Web traffic. We propose performance enhancements and modifications to increase the efficiency of the nrtPS class. Namely using a dynamic polling period based on the activity on the connection, using dummy keep alive messages when inactive and releasing idle connections to conserve bandwidth.","PeriodicalId":143803,"journal":{"name":"2008 Australasian Telecommunication Networks and Applications Conference","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130220259","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Design & Implementation of a Secure Sensitive Information System for Wireless Mobile Devices 无线移动设备安全敏感信息系统的设计与实现
Pub Date : 2008-12-01 DOI: 10.1109/ATNAC.2008.4783293
Xianping Wu, Huy Hoang Ngo, P. D. Le, B. Srinivasan
Protecting sensitive information systems from security threats such as unauthorised access, information eavesdropping and information interfering, is significant. Most of the natural approaches employ strong authentication and/or cryptography systems to protect critical data. But those approaches do not stress on the potential amount of risks associated with sensitive information, especially the vulnerability of long term cryptographic keys. Therefore, in this paper, a secure sensitive information system is proposed and implemented based on a dynamic key generation technique. It associates with elliptic curve key exchange protocol as a design solution for wireless mobile devices to achieve critical information data security and network security.
保护敏感信息系统免受未经授权的访问、信息窃听和信息干扰等安全威胁是非常重要的。大多数自然方法采用强身份验证和/或加密系统来保护关键数据。但这些方法并没有强调与敏感信息相关的潜在风险,尤其是长期加密密钥的脆弱性。为此,本文提出并实现了一种基于动态密钥生成技术的安全敏感信息系统。它结合椭圆曲线密钥交换协议作为无线移动设备实现关键信息数据安全和网络安全的设计方案。
{"title":"Design & Implementation of a Secure Sensitive Information System for Wireless Mobile Devices","authors":"Xianping Wu, Huy Hoang Ngo, P. D. Le, B. Srinivasan","doi":"10.1109/ATNAC.2008.4783293","DOIUrl":"https://doi.org/10.1109/ATNAC.2008.4783293","url":null,"abstract":"Protecting sensitive information systems from security threats such as unauthorised access, information eavesdropping and information interfering, is significant. Most of the natural approaches employ strong authentication and/or cryptography systems to protect critical data. But those approaches do not stress on the potential amount of risks associated with sensitive information, especially the vulnerability of long term cryptographic keys. Therefore, in this paper, a secure sensitive information system is proposed and implemented based on a dynamic key generation technique. It associates with elliptic curve key exchange protocol as a design solution for wireless mobile devices to achieve critical information data security and network security.","PeriodicalId":143803,"journal":{"name":"2008 Australasian Telecommunication Networks and Applications Conference","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134288431","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Minimization of Error in Pitch Detection algorithm using Discrete Fractional Cosine Transform 基于离散分数余弦变换的基音检测算法误差最小化
Pub Date : 2008-12-01 DOI: 10.1109/ATNAC.2008.4783358
M. Hasan, M. L. Kabir
A novel Discrete Fractional Cosine Transform implementation for pitch estimation of noisy speech using dominant harmonic is introduced in this paper. The basic idea is to preprocess the speech signal with discrete fractional cosine transform before using the rectified dominant harmonic for signal reshaping. The performance of the proposed method is tested and compared with the latest previous method using Keele pitch extraction reference database. Comparative results show that the proposed method can detect pitch with better accuracy in terms of gross and fine pitch error as compared to the latest technique.
本文提出了一种新的离散分数阶余弦变换方法,利用主谐波对含噪语音进行基音估计。其基本思想是对语音信号进行离散分数阶余弦变换预处理,然后利用整流后的优势谐波进行信号重构。利用Keele基音提取参考数据库对该方法进行了性能测试,并与现有方法进行了比较。对比结果表明,该方法在基音粗误差和基音细误差检测精度上均优于现有方法。
{"title":"Minimization of Error in Pitch Detection algorithm using Discrete Fractional Cosine Transform","authors":"M. Hasan, M. L. Kabir","doi":"10.1109/ATNAC.2008.4783358","DOIUrl":"https://doi.org/10.1109/ATNAC.2008.4783358","url":null,"abstract":"A novel Discrete Fractional Cosine Transform implementation for pitch estimation of noisy speech using dominant harmonic is introduced in this paper. The basic idea is to preprocess the speech signal with discrete fractional cosine transform before using the rectified dominant harmonic for signal reshaping. The performance of the proposed method is tested and compared with the latest previous method using Keele pitch extraction reference database. Comparative results show that the proposed method can detect pitch with better accuracy in terms of gross and fine pitch error as compared to the latest technique.","PeriodicalId":143803,"journal":{"name":"2008 Australasian Telecommunication Networks and Applications Conference","volume":"90 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116481260","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Capacity and power control in spread spectrum macro-diversity radio networks revisited 扩频宏分集无线网络的容量和功率控制
Pub Date : 2008-12-01 DOI: 10.1109/ATNAC.2008.4783335
V. Rodriguez, R. Mathar, A. Schmeink
Macro-diversity - all base stations decode cooperatively each received signal - can mitigate shadow fading, and increase the capacity of a spread-spectrum communication network. Assuming that a terminal's transmission power contributes to its own interference, the literature determines whether a vector of quality-of-service targets is feasible through a simple formula, which is insensitive to the terminals' channel gains. Herein, through Banach' contraction-mapping principle - and without the self-interference approximation - a new low-complexity capacity formula is derived. Through its dependence on relative channel gains, the new formula adapts itself in a sensible manner to special conditions, such as when most terminals can only be heard by a subset of the receivers. Under such conditions, the original may significantly overestimate capacity.
宏分集——所有基站对每个接收到的信号进行协同解码——可以减轻阴影衰落,并增加扩频通信网络的容量。假设终端的发射功率对其自身的干扰有贡献,文献通过一个简单的公式确定服务质量目标向量是否可行,该公式对终端的信道增益不敏感。在此基础上,利用Banach收缩映射原理,在不考虑自干扰近似的情况下,导出了一个新的低复杂度容量公式。通过对相对信道增益的依赖,新公式以一种合理的方式适应特殊情况,例如当大多数终端只能被一部分接收器听到时。在这种情况下,原厂可能会大大高估容量。
{"title":"Capacity and power control in spread spectrum macro-diversity radio networks revisited","authors":"V. Rodriguez, R. Mathar, A. Schmeink","doi":"10.1109/ATNAC.2008.4783335","DOIUrl":"https://doi.org/10.1109/ATNAC.2008.4783335","url":null,"abstract":"Macro-diversity - all base stations decode cooperatively each received signal - can mitigate shadow fading, and increase the capacity of a spread-spectrum communication network. Assuming that a terminal's transmission power contributes to its own interference, the literature determines whether a vector of quality-of-service targets is feasible through a simple formula, which is insensitive to the terminals' channel gains. Herein, through Banach' contraction-mapping principle - and without the self-interference approximation - a new low-complexity capacity formula is derived. Through its dependence on relative channel gains, the new formula adapts itself in a sensible manner to special conditions, such as when most terminals can only be heard by a subset of the receivers. Under such conditions, the original may significantly overestimate capacity.","PeriodicalId":143803,"journal":{"name":"2008 Australasian Telecommunication Networks and Applications Conference","volume":"185 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121191426","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
On Multi-Channel MAC Protocols in Cognitive Radio Networks 认知无线网络中的多通道MAC协议研究
Pub Date : 2008-12-01 DOI: 10.1109/ATNAC.2008.4783340
A.K.-L. Yau, P. Komisarczuk, Paul D. Teal
Cognitive Radio (CR) exploits underutilized licensed spectrums to improve its bandwidth availability. Using CR technology, a node is able to adapt its transmission and reception radio parameters including channel frequency dynamically according to local spectrum availability. For channel access between wireless nodes, a cognitive Medium Access Control (MAC) protocol is necessary to coordinate the CRs. Multi-channel MAC protocol extensions have been proposed in IEEE802.11 to enable a node to operate in multiple channels in order to improve network-wide throughput. These multi-channel MAC protocols have several functions that can be leveraged by cognitive MAC protocols due to their similarities in certain aspects, though the CR has an additional requirement to cope with the existence of licensed users that have higher authority over the channels. Current research in cognitive MAC protocols assumes the availability of a common control channel at all times, which is an approach in the multi-channel MAC protocols. This approach has certain hardware requirements that may not be readily available at CR nodes. Hence, other approached may be necessary. In this paper, various types of multi-channel MAC protocols are reviewed, followed by discussion of their merits and demerits in multi-channel environments. The purpose is to show the additional functionalities and challenges that each multi-channel MAC protocol has to offer and address in order to operate in multihop CR networks. By providing discussion on possible technology leverage from multi-channel to cognitive MAC protocols, we aim to establish a foundation for further research and discussion.
认知无线电(CR)利用未充分利用的许可频谱来提高其带宽可用性。利用CR技术,节点可以根据本地频谱的可用性动态调整其发送和接收无线电参数,包括信道频率。对于无线节点之间的信道访问,需要一种认知介质访问控制(MAC)协议来协调cr。在IEEE802.11中提出了多通道MAC协议扩展,使节点能够在多个通道中运行,以提高全网吞吐量。由于认知MAC协议在某些方面的相似性,这些多通道MAC协议具有一些可以被认知MAC协议利用的功能,尽管CR有一个额外的要求,以应对在通道上具有更高权限的许可用户的存在。当前认知MAC协议的研究假设在任何时候都有一个共同的控制通道可用,这是多通道MAC协议中的一种方法。这种方法有某些硬件要求,在CR节点上可能不容易获得。因此,可能需要其他方法。本文综述了各种类型的多通道MAC协议,然后讨论了它们在多通道环境中的优缺点。目的是展示为了在多跳CR网络中运行,每个多通道MAC协议必须提供和解决的附加功能和挑战。通过讨论从多渠道到认知MAC协议的可能技术杠杆,我们的目标是为进一步的研究和讨论奠定基础。
{"title":"On Multi-Channel MAC Protocols in Cognitive Radio Networks","authors":"A.K.-L. Yau, P. Komisarczuk, Paul D. Teal","doi":"10.1109/ATNAC.2008.4783340","DOIUrl":"https://doi.org/10.1109/ATNAC.2008.4783340","url":null,"abstract":"Cognitive Radio (CR) exploits underutilized licensed spectrums to improve its bandwidth availability. Using CR technology, a node is able to adapt its transmission and reception radio parameters including channel frequency dynamically according to local spectrum availability. For channel access between wireless nodes, a cognitive Medium Access Control (MAC) protocol is necessary to coordinate the CRs. Multi-channel MAC protocol extensions have been proposed in IEEE802.11 to enable a node to operate in multiple channels in order to improve network-wide throughput. These multi-channel MAC protocols have several functions that can be leveraged by cognitive MAC protocols due to their similarities in certain aspects, though the CR has an additional requirement to cope with the existence of licensed users that have higher authority over the channels. Current research in cognitive MAC protocols assumes the availability of a common control channel at all times, which is an approach in the multi-channel MAC protocols. This approach has certain hardware requirements that may not be readily available at CR nodes. Hence, other approached may be necessary. In this paper, various types of multi-channel MAC protocols are reviewed, followed by discussion of their merits and demerits in multi-channel environments. The purpose is to show the additional functionalities and challenges that each multi-channel MAC protocol has to offer and address in order to operate in multihop CR networks. By providing discussion on possible technology leverage from multi-channel to cognitive MAC protocols, we aim to establish a foundation for further research and discussion.","PeriodicalId":143803,"journal":{"name":"2008 Australasian Telecommunication Networks and Applications Conference","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131515295","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Joint Time-domain/Frequency-domain Impulsive Noise Reduction in OFDM-based Power Line Communications 基于ofdm的电力线通信时域/频域脉冲噪声联合降噪
Pub Date : 2008-12-01 DOI: 10.1109/ATNAC.2008.4783311
K. Al-Mawali, A. Sadik, Z. M. Hussain
Impulsive noise is one of the major challenges in power line communications and can cause serious problems in OFDM-based PLC systems. In this paper, we propose a combined Time-Domain/Frequency-domain technique for impulsive noise reduction in OFDM-based PLC systems. The performance of the proposed technique is studied against well known time-domain nonlinearities by means of computer simulations. The obtained simulation results show that the Combined TD/FD technique performs better than practically used nonlinearities and can reduce the adverse effect of impulsive noise significantly.
脉冲噪声是电力线通信的主要挑战之一,在基于ofdm的PLC系统中会造成严重的问题。在本文中,我们提出了一种结合时域/频域的技术用于ofdm PLC系统的脉冲降噪。通过计算机仿真研究了该方法在时域非线性条件下的性能。仿真结果表明,TD/FD组合技术比实际使用的非线性性能更好,可以显著降低脉冲噪声的不利影响。
{"title":"Joint Time-domain/Frequency-domain Impulsive Noise Reduction in OFDM-based Power Line Communications","authors":"K. Al-Mawali, A. Sadik, Z. M. Hussain","doi":"10.1109/ATNAC.2008.4783311","DOIUrl":"https://doi.org/10.1109/ATNAC.2008.4783311","url":null,"abstract":"Impulsive noise is one of the major challenges in power line communications and can cause serious problems in OFDM-based PLC systems. In this paper, we propose a combined Time-Domain/Frequency-domain technique for impulsive noise reduction in OFDM-based PLC systems. The performance of the proposed technique is studied against well known time-domain nonlinearities by means of computer simulations. The obtained simulation results show that the Combined TD/FD technique performs better than practically used nonlinearities and can reduce the adverse effect of impulsive noise significantly.","PeriodicalId":143803,"journal":{"name":"2008 Australasian Telecommunication Networks and Applications Conference","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121474204","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 40
Self-restraint Admission Control for adhoc WLANs 自适应无线局域网的自我约束准入控制
Pub Date : 2008-12-01 DOI: 10.1109/ATNAC.2008.4783320
Hushairi Zen, D. Habibi, I. Ahmad
Admission control is an important mechanism for sustaining throughput and supporting quality of service (QoS) for real-time traffic in a wireless local area network (WLAN). In an adhoc WLAN scenario where no access point (AP) is available, admission control has to be self-managed by each node. We propose a self-restraining admission control mechanism that works by monitoring the congestion level of the network in the adhoc WLAN. Wireless nodes can listen to all nodes within their range and be aware of the collision rates. A node wishing to join the network measures the current collision rate, and predicts the post-admission collision rate, on the basis of which the self-restraining mechanism in the node decides if it can join the network. We analyse the impact of key parameters, such as the collision threshold level, on the performance of the self-restraining mechanism and show that this mechanism works effectively in sustaining traffic in an adhoc WLAN.
在无线局域网(WLAN)中,准入控制是维持吞吐量和支持实时流量的服务质量(QoS)的重要机制。在没有接入点(AP)可用的临时WLAN场景中,每个节点必须自我管理准入控制。我们提出了一种自我约束的准入控制机制,该机制通过监测无线局域网中的网络拥塞水平来工作。无线节点可以监听其范围内的所有节点,并了解碰撞率。希望加入网络的节点测量当前的碰撞率,并预测进入后的碰撞率,节点中的自约束机制以此来决定它是否可以加入网络。我们分析了碰撞阈值等关键参数对自约束机制性能的影响,并表明该机制有效地维持了无线局域网的业务。
{"title":"Self-restraint Admission Control for adhoc WLANs","authors":"Hushairi Zen, D. Habibi, I. Ahmad","doi":"10.1109/ATNAC.2008.4783320","DOIUrl":"https://doi.org/10.1109/ATNAC.2008.4783320","url":null,"abstract":"Admission control is an important mechanism for sustaining throughput and supporting quality of service (QoS) for real-time traffic in a wireless local area network (WLAN). In an adhoc WLAN scenario where no access point (AP) is available, admission control has to be self-managed by each node. We propose a self-restraining admission control mechanism that works by monitoring the congestion level of the network in the adhoc WLAN. Wireless nodes can listen to all nodes within their range and be aware of the collision rates. A node wishing to join the network measures the current collision rate, and predicts the post-admission collision rate, on the basis of which the self-restraining mechanism in the node decides if it can join the network. We analyse the impact of key parameters, such as the collision threshold level, on the performance of the self-restraining mechanism and show that this mechanism works effectively in sustaining traffic in an adhoc WLAN.","PeriodicalId":143803,"journal":{"name":"2008 Australasian Telecommunication Networks and Applications Conference","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114999094","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Source Localisation in Wireless Sensor Networks Based on Optimised Maximum Likelihood 基于优化最大似然的无线传感器网络源定位
Pub Date : 2008-09-01 DOI: 10.1109/ATNAC.2008.4783329
Mohammed Rahman, Edith Cowan, D. Habibi, I. Ahmad, M. Z. Rahman
Maximum likelihood (ML) is a popular and effective estimator for a wide range of diverse applications and currently affords the most accurate estimation for source localisation in wireless sensor networks (WSN). ML however has two major shortcomings namely, that it is a biased estimator and is also highly sensitive to parameter perturbations. An Optimisation to ML (OML) algorithm was introduced that minimises the sum-of-squares bias and exhibits superior performance to ML in statistical estimation, particularly with finite datasets. This paper proposes a new model for acoustic source localisation in WSN, based upon the OML estimation process. In addition to the performance analysis using real world field experimental data for the tracking of moving military vehicles, simulations have been performed upon the more complex source localisation and tracking problem, to verify the potential of the new OML-based model.
最大似然(ML)是一种广泛应用于各种应用的流行且有效的估计器,目前为无线传感器网络(WSN)中的源定位提供了最准确的估计。然而,ML有两个主要缺点,即它是一个有偏估计器,对参数扰动也高度敏感。介绍了一种ML优化(OML)算法,该算法可以最小化平方和偏差,并在统计估计中表现出优于ML的性能,特别是在有限数据集上。本文提出了一种基于OML估计过程的WSN声源定位新模型。除了使用真实世界现场实验数据进行跟踪移动军用车辆的性能分析外,还对更复杂的源定位和跟踪问题进行了仿真,以验证新的基于oml的模型的潜力。
{"title":"Source Localisation in Wireless Sensor Networks Based on Optimised Maximum Likelihood","authors":"Mohammed Rahman, Edith Cowan, D. Habibi, I. Ahmad, M. Z. Rahman","doi":"10.1109/ATNAC.2008.4783329","DOIUrl":"https://doi.org/10.1109/ATNAC.2008.4783329","url":null,"abstract":"Maximum likelihood (ML) is a popular and effective estimator for a wide range of diverse applications and currently affords the most accurate estimation for source localisation in wireless sensor networks (WSN). ML however has two major shortcomings namely, that it is a biased estimator and is also highly sensitive to parameter perturbations. An Optimisation to ML (OML) algorithm was introduced that minimises the sum-of-squares bias and exhibits superior performance to ML in statistical estimation, particularly with finite datasets. This paper proposes a new model for acoustic source localisation in WSN, based upon the OML estimation process. In addition to the performance analysis using real world field experimental data for the tracking of moving military vehicles, simulations have been performed upon the more complex source localisation and tracking problem, to verify the potential of the new OML-based model.","PeriodicalId":143803,"journal":{"name":"2008 Australasian Telecommunication Networks and Applications Conference","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116969468","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
期刊
2008 Australasian Telecommunication Networks and Applications Conference
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1