Pub Date : 2010-12-23DOI: 10.1109/ICTC.2010.5674824
R. Kim
Machine-to-Machine (M2M)communication is expected to be one of major communication methods in the future. In M2M communications, there are important requirements: extremely low power consumption of devices and mass device transmission. In order to meet the requirements, a novel snoop based relaying method in cellular M2M communications is proposed in this paper. The proposed scheme consists of two steps: 1. snooping group formation including group head selection and group members assignment based on link quality or location, 2 snooping and relaying packets to/from group members. By employing the proposed scheme, efficient M2M communication can be achieved without changing physical layer of wireless communication standards while meeting the requirements of extremely low power consumption and mass device transmission.
{"title":"Snoop based group communication scheme in cellular Machine-to-Machine communications","authors":"R. Kim","doi":"10.1109/ICTC.2010.5674824","DOIUrl":"https://doi.org/10.1109/ICTC.2010.5674824","url":null,"abstract":"Machine-to-Machine (M2M)communication is expected to be one of major communication methods in the future. In M2M communications, there are important requirements: extremely low power consumption of devices and mass device transmission. In order to meet the requirements, a novel snoop based relaying method in cellular M2M communications is proposed in this paper. The proposed scheme consists of two steps: 1. snooping group formation including group head selection and group members assignment based on link quality or location, 2 snooping and relaying packets to/from group members. By employing the proposed scheme, efficient M2M communication can be achieved without changing physical layer of wireless communication standards while meeting the requirements of extremely low power consumption and mass device transmission.","PeriodicalId":149198,"journal":{"name":"2010 International Conference on Information and Communication Technology Convergence (ICTC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130956822","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-12-23DOI: 10.1109/ICTC.2010.5674825
J. Choi, Young-Bae Ko
To support reliable communication in tactical area networks, multi-path routing protocols can be utilized. Multipath routing protocol makes decisions to select primary route and alternative path by using routing metrics. Link quality routing metrics are popularly used for route selection but it may cause bottleneck and congestion problems. To overcome these problems, we can consider the traffic loads or congestion level into routing metric. In this paper we propose a load-aware routing metric which is based on Airtime link cost metric and combines traffic loads measured from MAC layer. To maximize load balancing effect, we utilize our proposed load-aware routing metric into a multipath routing protocol. The performance of the proposed metric is evaluated with the OPNET simulator and compared with other routing metrics.
{"title":"Multi-path routing with load-aware metric for tactical ad hoc networks","authors":"J. Choi, Young-Bae Ko","doi":"10.1109/ICTC.2010.5674825","DOIUrl":"https://doi.org/10.1109/ICTC.2010.5674825","url":null,"abstract":"To support reliable communication in tactical area networks, multi-path routing protocols can be utilized. Multipath routing protocol makes decisions to select primary route and alternative path by using routing metrics. Link quality routing metrics are popularly used for route selection but it may cause bottleneck and congestion problems. To overcome these problems, we can consider the traffic loads or congestion level into routing metric. In this paper we propose a load-aware routing metric which is based on Airtime link cost metric and combines traffic loads measured from MAC layer. To maximize load balancing effect, we utilize our proposed load-aware routing metric into a multipath routing protocol. The performance of the proposed metric is evaluated with the OPNET simulator and compared with other routing metrics.","PeriodicalId":149198,"journal":{"name":"2010 International Conference on Information and Communication Technology Convergence (ICTC)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114673051","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-12-23DOI: 10.1109/ICTC.2010.5674671
Hyeonsu Lee, S. Rhee, Yong-Hoon Choi, Suwon Park, T. Jeong
In wireless sensor networks, centralized data collection at sink leads to funneling effect which causes traffic intensity. This phenomenon results in significant packet collision, congestion, and loss. Researcher has proposed a localized, sink-oriented funneling-MAC to mitigate this funneling effect. Actually, this MAC protocol contributes to reduce this problem. However, funneling-MAC is difficult to control when important traffic is outside of intensity region. In this paper, we propose the mechanism ensuring throughput and JSR when specific traffic such as emergency traffic is generated in the region using CSMA mechanism. For ensuring throughput and JSR(Job Success Rate), we allocate time slot to node that has a specific traffic. The results of simulation using NS2 show that the proposed algorithm clearly ensures throughput and JSR for specific traffic.
{"title":"An adaptive MAC protocol for ensuring throughput in wireless sensor networks","authors":"Hyeonsu Lee, S. Rhee, Yong-Hoon Choi, Suwon Park, T. Jeong","doi":"10.1109/ICTC.2010.5674671","DOIUrl":"https://doi.org/10.1109/ICTC.2010.5674671","url":null,"abstract":"In wireless sensor networks, centralized data collection at sink leads to funneling effect which causes traffic intensity. This phenomenon results in significant packet collision, congestion, and loss. Researcher has proposed a localized, sink-oriented funneling-MAC to mitigate this funneling effect. Actually, this MAC protocol contributes to reduce this problem. However, funneling-MAC is difficult to control when important traffic is outside of intensity region. In this paper, we propose the mechanism ensuring throughput and JSR when specific traffic such as emergency traffic is generated in the region using CSMA mechanism. For ensuring throughput and JSR(Job Success Rate), we allocate time slot to node that has a specific traffic. The results of simulation using NS2 show that the proposed algorithm clearly ensures throughput and JSR for specific traffic.","PeriodicalId":149198,"journal":{"name":"2010 International Conference on Information and Communication Technology Convergence (ICTC)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115005279","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-12-23DOI: 10.1109/ICTC.2010.5674688
H. Kim, Tae-Chul Hong, K. Kang, B. Ku, Sooyoung Kim, S. Yeo
In this paper, we introduce a new satellite radio interface technology to provide efficient IMT-Advanced services. Maximizing the commonalities with the terrestrial system is one of the most important factors for cost-effective service delivery, which will finally bring successful deployment of the system. For this purpose, we adopt an OFDM based radio interface. At the same time, the interface should be tailored in order to compensate a long round trip delay of satellite systems. In this paper, we present a number of satellite specified techniques which was developed for this purpose, including frequency reuse technique, uplink synchronization technique, random access technique, and interleaving technique combined with adaptive modulation and coding.
{"title":"A satellite radio interface for IMT-Advanced system using OFDM","authors":"H. Kim, Tae-Chul Hong, K. Kang, B. Ku, Sooyoung Kim, S. Yeo","doi":"10.1109/ICTC.2010.5674688","DOIUrl":"https://doi.org/10.1109/ICTC.2010.5674688","url":null,"abstract":"In this paper, we introduce a new satellite radio interface technology to provide efficient IMT-Advanced services. Maximizing the commonalities with the terrestrial system is one of the most important factors for cost-effective service delivery, which will finally bring successful deployment of the system. For this purpose, we adopt an OFDM based radio interface. At the same time, the interface should be tailored in order to compensate a long round trip delay of satellite systems. In this paper, we present a number of satellite specified techniques which was developed for this purpose, including frequency reuse technique, uplink synchronization technique, random access technique, and interleaving technique combined with adaptive modulation and coding.","PeriodicalId":149198,"journal":{"name":"2010 International Conference on Information and Communication Technology Convergence (ICTC)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125052443","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-12-23DOI: 10.1109/ICTC.2010.5674769
S. Moon, Junho Kim, Hoongee Yang, Kyung-Bin Bae, W. Lee, Young-Seek Chung
Direction estimation of signal of interest has been an important issue in radar and communication system. Generally, DOA(Direction Of Arrival) methods have been researched in the field of signal processing with ideal array sensors. However, there are some problems in array antennas such as the input signal distortions in amplitude and phase, due to the mutual coupling between array elements. Therefore, the compensation techniques of mutual coupling effects in the array antenna are required for the accurate estimation of DOA. In this paper, we propose a new method of the compensation of the mutual coupling effects for the DOA estimation in the dipole array antenna by using the method of moment (MoM). Also, the proposed method is applied to the estimation of azimuth (Ф) and elevation (θ) angles using uniformly linear dipole array under noisy environments.
{"title":"DOA with linear array antennas based on MoM","authors":"S. Moon, Junho Kim, Hoongee Yang, Kyung-Bin Bae, W. Lee, Young-Seek Chung","doi":"10.1109/ICTC.2010.5674769","DOIUrl":"https://doi.org/10.1109/ICTC.2010.5674769","url":null,"abstract":"Direction estimation of signal of interest has been an important issue in radar and communication system. Generally, DOA(Direction Of Arrival) methods have been researched in the field of signal processing with ideal array sensors. However, there are some problems in array antennas such as the input signal distortions in amplitude and phase, due to the mutual coupling between array elements. Therefore, the compensation techniques of mutual coupling effects in the array antenna are required for the accurate estimation of DOA. In this paper, we propose a new method of the compensation of the mutual coupling effects for the DOA estimation in the dipole array antenna by using the method of moment (MoM). Also, the proposed method is applied to the estimation of azimuth (Ф) and elevation (θ) angles using uniformly linear dipole array under noisy environments.","PeriodicalId":149198,"journal":{"name":"2010 International Conference on Information and Communication Technology Convergence (ICTC)","volume":"125 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129681610","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-12-23DOI: 10.1109/ICTC.2010.5674791
L. Leng, Jiashu Zhang, Jing Xu, M. Khan, K. Alghathbar
Discrimination power analysis (DPA) is a statistical analysis combining discrimination concept with discrete cosine transform coefficients (DCTCs) properties. Unfortunately there is not a uniform and effective criterion to optimize the shape and size of premasking window on which the effect of DPA excessively relies. Proper premasking is an auxiliary process to select the feature coefficients that have more discrimination power (DP). Dynamic weighted DPA (DWDPA) is proposed in this paper to enhance the DP of the selected DCTCs without premasking window, in other words, it does not need to optimize the shape and size of premasking window. The DCTCs are adaptively selected according to their discrimination power values (DPVs). More DCTCs with higher DP are preserved. The selected coefficients are normalized and dynamic weighted according to their DPVs. Normalization assures that the DCTCs with large absolute value don't destroy the DP of the other DCTCs that have less absolute value but high DPVs. Dynamic weighting gives larger weights to the DCTCs with larger DPVs which optimizes and enhances the recognition performance. The experimental results on ORL, Yale and PolyU databases show that DWDPA outperforms DPA obviously.
{"title":"Dynamic weighted discrimination power analysis in DCT domain for face and palmprint recognition","authors":"L. Leng, Jiashu Zhang, Jing Xu, M. Khan, K. Alghathbar","doi":"10.1109/ICTC.2010.5674791","DOIUrl":"https://doi.org/10.1109/ICTC.2010.5674791","url":null,"abstract":"Discrimination power analysis (DPA) is a statistical analysis combining discrimination concept with discrete cosine transform coefficients (DCTCs) properties. Unfortunately there is not a uniform and effective criterion to optimize the shape and size of premasking window on which the effect of DPA excessively relies. Proper premasking is an auxiliary process to select the feature coefficients that have more discrimination power (DP). Dynamic weighted DPA (DWDPA) is proposed in this paper to enhance the DP of the selected DCTCs without premasking window, in other words, it does not need to optimize the shape and size of premasking window. The DCTCs are adaptively selected according to their discrimination power values (DPVs). More DCTCs with higher DP are preserved. The selected coefficients are normalized and dynamic weighted according to their DPVs. Normalization assures that the DCTCs with large absolute value don't destroy the DP of the other DCTCs that have less absolute value but high DPVs. Dynamic weighting gives larger weights to the DCTCs with larger DPVs which optimizes and enhances the recognition performance. The experimental results on ORL, Yale and PolyU databases show that DWDPA outperforms DPA obviously.","PeriodicalId":149198,"journal":{"name":"2010 International Conference on Information and Communication Technology Convergence (ICTC)","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128329196","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-12-23DOI: 10.1109/ICTC.2010.5674726
Jeehwan Noh, Hyemin Song, Chungyong Lee
Iterative signal detection based on energy spreading transform (EST) in multiple input multiple output systems has been shown to perform close to the genie bound with the complexity of linear receivers [2]. In this paper, we consider a transmit antenna selection scheme for the EST based iterative receiver and propose some transmit selection criteria. Simulation results are provided to verify the usefulness of the proposed schemes.
{"title":"Transmit antenna and mode selection for the EST based MIMO systems","authors":"Jeehwan Noh, Hyemin Song, Chungyong Lee","doi":"10.1109/ICTC.2010.5674726","DOIUrl":"https://doi.org/10.1109/ICTC.2010.5674726","url":null,"abstract":"Iterative signal detection based on energy spreading transform (EST) in multiple input multiple output systems has been shown to perform close to the genie bound with the complexity of linear receivers [2]. In this paper, we consider a transmit antenna selection scheme for the EST based iterative receiver and propose some transmit selection criteria. Simulation results are provided to verify the usefulness of the proposed schemes.","PeriodicalId":149198,"journal":{"name":"2010 International Conference on Information and Communication Technology Convergence (ICTC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128560760","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-12-23DOI: 10.1109/ICTC.2010.5674682
S. Song, Young-il Kim
In this paper, we proposed enhanced receiver algorithm for obtaining macro diversity gain in MBS environment. The main idea is from diversity technique of MIMO system. Proposed algorithm improves receiver performance using space-time/frequency block code. The advantage of proposed method do not need additional antennas. Also, the performance is enhanced than previous configuration defined as next generation standards. We provided computer simulation result to prove system performance.
{"title":"A method of Obtaining Macro diversity gain for multicast and broadcast service (MBS)","authors":"S. Song, Young-il Kim","doi":"10.1109/ICTC.2010.5674682","DOIUrl":"https://doi.org/10.1109/ICTC.2010.5674682","url":null,"abstract":"In this paper, we proposed enhanced receiver algorithm for obtaining macro diversity gain in MBS environment. The main idea is from diversity technique of MIMO system. Proposed algorithm improves receiver performance using space-time/frequency block code. The advantage of proposed method do not need additional antennas. Also, the performance is enhanced than previous configuration defined as next generation standards. We provided computer simulation result to prove system performance.","PeriodicalId":149198,"journal":{"name":"2010 International Conference on Information and Communication Technology Convergence (ICTC)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116725701","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-12-23DOI: 10.1109/ICTC.2010.5674666
Sung-Il Kim, J. Heo
This paper is on the bit error probability (BEP) of opportunistic decode-and-forward (DF) relaying with coded cooperation, where cooperation diversity is achieved through both channel coding method and spatial diversity of relay selection. Codewords are partitioned into two parts which are source's data and parity, these are transmitted from source's antenna or selected relay's antenna. In this scheme, relay selection is performed in relay subset which consists of relay nodes that successfully decode source's data and parity is transmitted from selected relay node's antenna. If all the relay nodes are fail to decode source's data the source transmits its parity to the destination instead of the relay node. We derive the closed-form of bounds on BEP of this scheme based on Viterbi's upper bound. These results illustrate diversity gain with multiple relay nodes in coded cooperation and present the performance analysis of proposed scheme in numerical results.
{"title":"Performance analysis of opportunistic coded cooperation in Rayleigh fading channels","authors":"Sung-Il Kim, J. Heo","doi":"10.1109/ICTC.2010.5674666","DOIUrl":"https://doi.org/10.1109/ICTC.2010.5674666","url":null,"abstract":"This paper is on the bit error probability (BEP) of opportunistic decode-and-forward (DF) relaying with coded cooperation, where cooperation diversity is achieved through both channel coding method and spatial diversity of relay selection. Codewords are partitioned into two parts which are source's data and parity, these are transmitted from source's antenna or selected relay's antenna. In this scheme, relay selection is performed in relay subset which consists of relay nodes that successfully decode source's data and parity is transmitted from selected relay node's antenna. If all the relay nodes are fail to decode source's data the source transmits its parity to the destination instead of the relay node. We derive the closed-form of bounds on BEP of this scheme based on Viterbi's upper bound. These results illustrate diversity gain with multiple relay nodes in coded cooperation and present the performance analysis of proposed scheme in numerical results.","PeriodicalId":149198,"journal":{"name":"2010 International Conference on Information and Communication Technology Convergence (ICTC)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121357895","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-12-23DOI: 10.1109/ICTC.2010.5674691
B. Shin, Kwang-Won Lee, Sun-Ho Choi, Joo-Yoen Kim, Woo Jin Lee, H. Kim
WiFi positioning system has been studying in many fields since the past. Recently, a lot of mobile companies are competing for smartphones. Accordingly, this paper proposes an indoor WiFi positioning system using Android-based smartphones.
{"title":"Indoor WiFi positioning system for Android-based smartphone","authors":"B. Shin, Kwang-Won Lee, Sun-Ho Choi, Joo-Yoen Kim, Woo Jin Lee, H. Kim","doi":"10.1109/ICTC.2010.5674691","DOIUrl":"https://doi.org/10.1109/ICTC.2010.5674691","url":null,"abstract":"WiFi positioning system has been studying in many fields since the past. Recently, a lot of mobile companies are competing for smartphones. Accordingly, this paper proposes an indoor WiFi positioning system using Android-based smartphones.","PeriodicalId":149198,"journal":{"name":"2010 International Conference on Information and Communication Technology Convergence (ICTC)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121418082","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}