Pub Date : 2010-12-23DOI: 10.1109/ICTC.2010.5674655
Do-woo Kwon, Seung-Cheol Kim, Eun-Soo Kim
Recently a novel look-up table (N-LUT) method to dramatically reduce the number of pre-calculated interference patterns required for generation of digital holograms was proposed. In this method, principle fringe pattern (PFP) has reflection symmetry in geometry. Thus in this paper, we proposed the memory reduction method using this reflection symmetry of PFP. From some experimental result, the memory could be reduced by 50%.
{"title":"Efficient digital hologram generation using reflection symmetry of principle fringe pattern","authors":"Do-woo Kwon, Seung-Cheol Kim, Eun-Soo Kim","doi":"10.1109/ICTC.2010.5674655","DOIUrl":"https://doi.org/10.1109/ICTC.2010.5674655","url":null,"abstract":"Recently a novel look-up table (N-LUT) method to dramatically reduce the number of pre-calculated interference patterns required for generation of digital holograms was proposed. In this method, principle fringe pattern (PFP) has reflection symmetry in geometry. Thus in this paper, we proposed the memory reduction method using this reflection symmetry of PFP. From some experimental result, the memory could be reduced by 50%.","PeriodicalId":149198,"journal":{"name":"2010 International Conference on Information and Communication Technology Convergence (ICTC)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129808008","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-12-23DOI: 10.1109/ICTC.2010.5674730
Jaehwan Kim, Jindoo Jeong, Hyung-Soo Lee, Sangsung Choi, Jeong-Ki Kim, Do-Wook Kang
This paper presents non-coherent synchronization method for UWB WBAN systems. The non-coherent synchronization including packet detection and SFD detection is described and packet error rate performance in AWGN is provided. Finally, we make a conclusion in view of the implemental aspect.
{"title":"Non-coherent synchronization for WBAN UWB systems","authors":"Jaehwan Kim, Jindoo Jeong, Hyung-Soo Lee, Sangsung Choi, Jeong-Ki Kim, Do-Wook Kang","doi":"10.1109/ICTC.2010.5674730","DOIUrl":"https://doi.org/10.1109/ICTC.2010.5674730","url":null,"abstract":"This paper presents non-coherent synchronization method for UWB WBAN systems. The non-coherent synchronization including packet detection and SFD detection is described and packet error rate performance in AWGN is provided. Finally, we make a conclusion in view of the implemental aspect.","PeriodicalId":149198,"journal":{"name":"2010 International Conference on Information and Communication Technology Convergence (ICTC)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126048154","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-12-23DOI: 10.1109/ICTC.2010.5674778
Goya Choi, Bok-Ki Kim, S. Min
In this paper, we proposed a new MIH handover procedure for resource efficiency and handover delay performance in the wireless link of MIH that offers seamless handover between heterogeneous networks. New transaction messages are proposed to indicate a handover event by the MN. We focus the application of our procedure to a handover scenario from mobile WiMAX to wireless LAN, and consider the qualitative performance analysis of handover delay. Based on its performance result, we can see that our proposed procedure works more efficiently than the existing handover procedure.
{"title":"A novel MIH handover procedure for efficient PMIPv6 network","authors":"Goya Choi, Bok-Ki Kim, S. Min","doi":"10.1109/ICTC.2010.5674778","DOIUrl":"https://doi.org/10.1109/ICTC.2010.5674778","url":null,"abstract":"In this paper, we proposed a new MIH handover procedure for resource efficiency and handover delay performance in the wireless link of MIH that offers seamless handover between heterogeneous networks. New transaction messages are proposed to indicate a handover event by the MN. We focus the application of our procedure to a handover scenario from mobile WiMAX to wireless LAN, and consider the qualitative performance analysis of handover delay. Based on its performance result, we can see that our proposed procedure works more efficiently than the existing handover procedure.","PeriodicalId":149198,"journal":{"name":"2010 International Conference on Information and Communication Technology Convergence (ICTC)","volume":"245 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127538333","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-12-23DOI: 10.1109/ICTC.2010.5674735
Dongmyoung Kim, H. Yim, B. Lee, Seunghyun Choi, Sunghyun Choi, K. Lee
In the cellular systems, the performance can be severely degraded if the loads are imbalanced among cells. We consider a joint optimization of association control and beamforming to maximize a system-wide utility function as a means to balance the load across multiple cells. The beamforming weight vector can be adapted as the channel status varies, but it is not practical to change the user association from a cell to another at the same frequency. Accordingly, we propose algorithms to adapt the beamforming weight vectors according to the channel status variation during the runtime while the association control and the beamforming policy, affecting the runtime beamforming weight vector determination, are selected in a longer time scale. Simulation results demonstrate that the proposed algorithms significantly improve the system-wide performance compared with legacy schemes by balancing the load.
{"title":"Load-aware beamforming and association for system-wide utility maximization","authors":"Dongmyoung Kim, H. Yim, B. Lee, Seunghyun Choi, Sunghyun Choi, K. Lee","doi":"10.1109/ICTC.2010.5674735","DOIUrl":"https://doi.org/10.1109/ICTC.2010.5674735","url":null,"abstract":"In the cellular systems, the performance can be severely degraded if the loads are imbalanced among cells. We consider a joint optimization of association control and beamforming to maximize a system-wide utility function as a means to balance the load across multiple cells. The beamforming weight vector can be adapted as the channel status varies, but it is not practical to change the user association from a cell to another at the same frequency. Accordingly, we propose algorithms to adapt the beamforming weight vectors according to the channel status variation during the runtime while the association control and the beamforming policy, affecting the runtime beamforming weight vector determination, are selected in a longer time scale. Simulation results demonstrate that the proposed algorithms significantly improve the system-wide performance compared with legacy schemes by balancing the load.","PeriodicalId":149198,"journal":{"name":"2010 International Conference on Information and Communication Technology Convergence (ICTC)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114078816","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-12-23DOI: 10.1109/ICTC.2010.5674785
Bo Hyun Kim, H. Ahn, Jin-Oh Kim, M. Yoo, K. Cho, D. Choi
This paper presents the application of M2M communication technology for automated intelligent manufacturing system. M2M technology allows exchanging and gathering information between sensors and controllers during collaborative machining process and motion control.
{"title":"Application of M2M technology to manufacturing systems","authors":"Bo Hyun Kim, H. Ahn, Jin-Oh Kim, M. Yoo, K. Cho, D. Choi","doi":"10.1109/ICTC.2010.5674785","DOIUrl":"https://doi.org/10.1109/ICTC.2010.5674785","url":null,"abstract":"This paper presents the application of M2M communication technology for automated intelligent manufacturing system. M2M technology allows exchanging and gathering information between sensors and controllers during collaborative machining process and motion control.","PeriodicalId":149198,"journal":{"name":"2010 International Conference on Information and Communication Technology Convergence (ICTC)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127448398","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-12-23DOI: 10.1109/ICTC.2010.5674260
N. Ullah, M. S. Chowdhury, Pervez Khan, Kyung Sup Kwak
We investigate the maximum throughput and minimum delay for the unlostted version of the IEEE 802.15.4a using Ultra Wide Band (UWB). The throughput and delay limits are calculated for different data rates along with the formulae. UWB based 802.15.4a can achieve maximum throughput of 701 Kbps with a data rate of 851 Kbps.
{"title":"Throughput limits of UWB based 802.15.4a","authors":"N. Ullah, M. S. Chowdhury, Pervez Khan, Kyung Sup Kwak","doi":"10.1109/ICTC.2010.5674260","DOIUrl":"https://doi.org/10.1109/ICTC.2010.5674260","url":null,"abstract":"We investigate the maximum throughput and minimum delay for the unlostted version of the IEEE 802.15.4a using Ultra Wide Band (UWB). The throughput and delay limits are calculated for different data rates along with the formulae. UWB based 802.15.4a can achieve maximum throughput of 701 Kbps with a data rate of 851 Kbps.","PeriodicalId":149198,"journal":{"name":"2010 International Conference on Information and Communication Technology Convergence (ICTC)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127578757","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-12-23DOI: 10.1109/ICTC.2010.5674783
Sung-han Kim, S. Y. Lee
This paper reviewed brief transition of TV services and new challenge from existing TV service domains. We reviewed different service roles for each TV service domains, as well common direction and goals. Recently, new types of TV service are emerging, for example, IPTV from network providers, more competitive portal TV from content providers and advanced TV terminal from TV manufacturers. Also, we suggest a seamless TV service scenario between TV domain and mobile domain, which demands several service requirements to provide such kind of seamless TV service in current vertical TV environments. From this example, we focused on existing relevant standardization requirements from W3C and ITU-T. As well, further requirements are considered for harmonization of current standards.
{"title":"Requirements of seamless TV service among multi-domains","authors":"Sung-han Kim, S. Y. Lee","doi":"10.1109/ICTC.2010.5674783","DOIUrl":"https://doi.org/10.1109/ICTC.2010.5674783","url":null,"abstract":"This paper reviewed brief transition of TV services and new challenge from existing TV service domains. We reviewed different service roles for each TV service domains, as well common direction and goals. Recently, new types of TV service are emerging, for example, IPTV from network providers, more competitive portal TV from content providers and advanced TV terminal from TV manufacturers. Also, we suggest a seamless TV service scenario between TV domain and mobile domain, which demands several service requirements to provide such kind of seamless TV service in current vertical TV environments. From this example, we focused on existing relevant standardization requirements from W3C and ITU-T. As well, further requirements are considered for harmonization of current standards.","PeriodicalId":149198,"journal":{"name":"2010 International Conference on Information and Communication Technology Convergence (ICTC)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127909284","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-12-23DOI: 10.1109/ICTC.2010.5674662
Dong-Won Kum, Won-Kyeong Seo, Jae-In Choi, You-Ze Cho
We propose a Network Allocation Vector (NAV) based Load Aware Routing (NA-LAR) protocol for Wireless Mesh Networks. NA-LAR is basically based on the Directional AODV (D-AODV)) to reduce the number of route request packet broadcast by using a restricted directional flooding technique. It also considers network conditions with NAV which indicates the busyness of the medium in IEEE 802.11, and it is used to find load balanced routing path. Thus, NA-LAR can find a less loaded route, and it leads to network performance improvement. Simulation results show that NA-LAR compared with D-AODV could increase the total throughput and reduce the end-to-end delay.
{"title":"NAV-based Load Aware Routing protocol in Wireless Mesh Networks","authors":"Dong-Won Kum, Won-Kyeong Seo, Jae-In Choi, You-Ze Cho","doi":"10.1109/ICTC.2010.5674662","DOIUrl":"https://doi.org/10.1109/ICTC.2010.5674662","url":null,"abstract":"We propose a Network Allocation Vector (NAV) based Load Aware Routing (NA-LAR) protocol for Wireless Mesh Networks. NA-LAR is basically based on the Directional AODV (D-AODV)) to reduce the number of route request packet broadcast by using a restricted directional flooding technique. It also considers network conditions with NAV which indicates the busyness of the medium in IEEE 802.11, and it is used to find load balanced routing path. Thus, NA-LAR can find a less loaded route, and it leads to network performance improvement. Simulation results show that NA-LAR compared with D-AODV could increase the total throughput and reduce the end-to-end delay.","PeriodicalId":149198,"journal":{"name":"2010 International Conference on Information and Communication Technology Convergence (ICTC)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129215575","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-12-23DOI: 10.1109/ICTC.2010.5674803
Sunhee Yoon, Young-Bae Ko
Jamming attack by adversaries is the critical threat in Network Centric Warfare that uses tactical wireless networks. Thus research on developing new networking protocols that are resilient to such attacks are of high importance. Geocasting is a prominent routing mechanism in tactical networks to send critical messages such as alarm about chemical attack, guerrilla detection etc, to the nodes within a specific geographical region. To apply geocast protocols in the tactical environment, it should provide assurance that the packet delivery is reliable despite of jamming attacks. In this paper, we propose two jamming resilient geocasting schemes for tactical mobile ad hoc networks. Our first scheme called the “Failure-Based Learning” in which the sender nodes are not aware of the jamming attacks and try to send packets repeatedly. This method is enhanced by another scheme called “Detour by Anchor Point” with information about the jamming attack which sent to the source node, such that it can proactively avoid the jamming region for successful packet delivery. The simulation results show that our proposed schemes significantly outperform single and dual path geocasting protocols under jamming attack and mobile scenarios.
{"title":"JRGP: Jamming resilient geocasting protocol for mobile tactical ad hoc networks","authors":"Sunhee Yoon, Young-Bae Ko","doi":"10.1109/ICTC.2010.5674803","DOIUrl":"https://doi.org/10.1109/ICTC.2010.5674803","url":null,"abstract":"Jamming attack by adversaries is the critical threat in Network Centric Warfare that uses tactical wireless networks. Thus research on developing new networking protocols that are resilient to such attacks are of high importance. Geocasting is a prominent routing mechanism in tactical networks to send critical messages such as alarm about chemical attack, guerrilla detection etc, to the nodes within a specific geographical region. To apply geocast protocols in the tactical environment, it should provide assurance that the packet delivery is reliable despite of jamming attacks. In this paper, we propose two jamming resilient geocasting schemes for tactical mobile ad hoc networks. Our first scheme called the “Failure-Based Learning” in which the sender nodes are not aware of the jamming attacks and try to send packets repeatedly. This method is enhanced by another scheme called “Detour by Anchor Point” with information about the jamming attack which sent to the source node, such that it can proactively avoid the jamming region for successful packet delivery. The simulation results show that our proposed schemes significantly outperform single and dual path geocasting protocols under jamming attack and mobile scenarios.","PeriodicalId":149198,"journal":{"name":"2010 International Conference on Information and Communication Technology Convergence (ICTC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129219598","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-12-23DOI: 10.1109/ICTC.2010.5674817
T. Kang, Junho Ok, Dong-joon Shin
In this paper, an adaptive constellation scheme for two-way relay communication systems with asymmetric channels is proposed. In this scheme, each node transmits codeword generated by the same turbo encoder to a relay node using different signal power and the relay node decodes the received codeword from each node. Then, the relay node re-encodes and combines these two decoded data sequences using new constellation mapping and broadcasts the resulting signal to each node. This new constellation scheme adaptively adjusts the power level for each user's data by considering the channel conditions. It is shown that the proposed scheme has better frame error rate than the fixed constellation case and XOR case.
{"title":"Adaptive constellation scheme for two-way relay communications","authors":"T. Kang, Junho Ok, Dong-joon Shin","doi":"10.1109/ICTC.2010.5674817","DOIUrl":"https://doi.org/10.1109/ICTC.2010.5674817","url":null,"abstract":"In this paper, an adaptive constellation scheme for two-way relay communication systems with asymmetric channels is proposed. In this scheme, each node transmits codeword generated by the same turbo encoder to a relay node using different signal power and the relay node decodes the received codeword from each node. Then, the relay node re-encodes and combines these two decoded data sequences using new constellation mapping and broadcasts the resulting signal to each node. This new constellation scheme adaptively adjusts the power level for each user's data by considering the channel conditions. It is shown that the proposed scheme has better frame error rate than the fixed constellation case and XOR case.","PeriodicalId":149198,"journal":{"name":"2010 International Conference on Information and Communication Technology Convergence (ICTC)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128418586","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}