Several microstrip antenna (MSA) configurations are available to generate the circular polarization (CP), which can be obtained by either single feed or dual feed. The broadband operation would be achieved by either coupling two resonant elements or inserting slots in the original pitch. A circular polarized (CP) Circular micro strip antenna with dual band is proposed to be used in Wi-Fi application. A circular microstrip patch antenna is designed to operate at 2.4 (GHz) with circular polarization, a U slot is inserted thereafter in the original patch to generate the second resonant at 5.2 (GHz). The slot orientation effect on the AR of the original patch is examined. A fabrication to the final design has been implemented, and then a measurement performed to compare the actual results with those simulated.
{"title":"Dual Band Circularly Polarized Microstrip Patch Antenna for Wi-Fi Applications","authors":"Mohammed Y. M. Yousef, A. Gaafar, A. A. A. Elaziz","doi":"10.1109/NGMAST.2010.33","DOIUrl":"https://doi.org/10.1109/NGMAST.2010.33","url":null,"abstract":"Several microstrip antenna (MSA) configurations are available to generate the circular polarization (CP), which can be obtained by either single feed or dual feed. The broadband operation would be achieved by either coupling two resonant elements or inserting slots in the original pitch. A circular polarized (CP) Circular micro strip antenna with dual band is proposed to be used in Wi-Fi application. A circular microstrip patch antenna is designed to operate at 2.4 (GHz) with circular polarization, a U slot is inserted thereafter in the original patch to generate the second resonant at 5.2 (GHz). The slot orientation effect on the AR of the original patch is examined. A fabrication to the final design has been implemented, and then a measurement performed to compare the actual results with those simulated.","PeriodicalId":184193,"journal":{"name":"2010 Fourth International Conference on Next Generation Mobile Applications, Services and Technologies","volume":"231 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114193250","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pathological labs use manual method for detection of cancer cells recognition and techniques which are languorous for cell counting. This paper presents automatic cancer cell detection for squamous epithelia in window based applications in mobile phones and PDAs. The algorithm preprocesses the images to remove the graininess, enhance the contrast between the cytoplasm and nucleus and extra cellular components. After preprocessing steps Fourier transform analysis [4, 5] is done to organize the images. Averaging is done to reduce the noise in Fourier image and a 1-D line plot is done so that the cancerous tissue can be differentiated by the machine. Subsequently, the segmentation algorithm based on Otsu’s threshold, morphological operations, and cell size considerations is performed. Biologists can now prepare and image thousands of samples per day using this automation.
{"title":"A Windows Mobile Based Application for Detection of Cancer in Squamous Cell","authors":"Y. Karunakar, A. Kuwadekar, K. Narayanan","doi":"10.1109/NGMAST.2010.16","DOIUrl":"https://doi.org/10.1109/NGMAST.2010.16","url":null,"abstract":"Pathological labs use manual method for detection of cancer cells recognition and techniques which are languorous for cell counting. This paper presents automatic cancer cell detection for squamous epithelia in window based applications in mobile phones and PDAs. The algorithm preprocesses the images to remove the graininess, enhance the contrast between the cytoplasm and nucleus and extra cellular components. After preprocessing steps Fourier transform analysis [4, 5] is done to organize the images. Averaging is done to reduce the noise in Fourier image and a 1-D line plot is done so that the cancerous tissue can be differentiated by the machine. Subsequently, the segmentation algorithm based on Otsu’s threshold, morphological operations, and cell size considerations is performed. Biologists can now prepare and image thousands of samples per day using this automation.","PeriodicalId":184193,"journal":{"name":"2010 Fourth International Conference on Next Generation Mobile Applications, Services and Technologies","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116061818","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper derives analytical expressions for the probability of link availability and the node degree distribution in mobile ad hoc networks. The expressions (1) account for system parameters such as the node density, node transmission range, and the radio channel fading; and (2) hold for an arbitrary mobility model with initially uniformly distributed spatial nodes that are allowed to move only within a certain bounded area. We validate the efficacy of our expressions through simulations of the SMS mobility model. Our results reveal that the node degree distribution follows a binomial distribution regardless of the initial distribution of nodes’ location. The results presented in this paper are useful in studying the connectivity of mobile nodes, in estimating the capacity of mobile ad hoc networks, and provide a good understanding of the impact of fundamental network parameters in the presence of mobility.
{"title":"Distribution of the Node Degree in MANETs","authors":"Lifang Guo, K. Harfoush, Huimin Xu","doi":"10.1109/NGMAST.2010.41","DOIUrl":"https://doi.org/10.1109/NGMAST.2010.41","url":null,"abstract":"This paper derives analytical expressions for the probability of link availability and the node degree distribution in mobile ad hoc networks. The expressions (1) account for system parameters such as the node density, node transmission range, and the radio channel fading; and (2) hold for an arbitrary mobility model with initially uniformly distributed spatial nodes that are allowed to move only within a certain bounded area. We validate the efficacy of our expressions through simulations of the SMS mobility model. Our results reveal that the node degree distribution follows a binomial distribution regardless of the initial distribution of nodes’ location. The results presented in this paper are useful in studying the connectivity of mobile nodes, in estimating the capacity of mobile ad hoc networks, and provide a good understanding of the impact of fundamental network parameters in the presence of mobility.","PeriodicalId":184193,"journal":{"name":"2010 Fourth International Conference on Next Generation Mobile Applications, Services and Technologies","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125752475","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this paper a combined block cipher mode of operation is presented that provides an efficient authenticated encryption with associated-data (AEAD) security service for packet-based network communication. Using software simulation we show that our construct, called CYPHER-C3, achieves improvements in processing energy requirement, processing latency and packet throughput when benchmarked against the NIST recommended Counter with Cipher Block Chaining Message Authentication Code (CCM) scheme and the de facto wireless sensor network TinySec-AE scheme.
{"title":"A Resourceful Combined Block Cipher Mode of Operation for Packetised Network Communication","authors":"A. A. Adekunle, S. Woodhead","doi":"10.1109/NGMAST.2010.44","DOIUrl":"https://doi.org/10.1109/NGMAST.2010.44","url":null,"abstract":"In this paper a combined block cipher mode of operation is presented that provides an efficient authenticated encryption with associated-data (AEAD) security service for packet-based network communication. Using software simulation we show that our construct, called CYPHER-C3, achieves improvements in processing energy requirement, processing latency and packet throughput when benchmarked against the NIST recommended Counter with Cipher Block Chaining Message Authentication Code (CCM) scheme and the de facto wireless sensor network TinySec-AE scheme.","PeriodicalId":184193,"journal":{"name":"2010 Fourth International Conference on Next Generation Mobile Applications, Services and Technologies","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127063463","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Digital Video Content is now pervasive and services like IPTV are gaining traction on hand held devices too. Android, a software platform from Google, pioneering middleware and applications for handheld devices does not offer support for content management services by design. Motivated by these observations, we propose an aggregate model software platform to offer content management and value added services (VAS) like IPTV on android. The outline of paper is as follows: First, we discuss few related works to investigate and analyze industry-wide content management and delivery practices. Second, we discuss few characteristics of android architecture and detail the constraints associated with middleware to offer such VAS. Consequently, we describe the proposed software platform which addresses key inherent challenges like Efficiency, Extendibility and Security while achieving efficient content delivery. The Module Interconnection Architecture can be visualized to be constituted by three basic building blocks, namely: VAS Content Management framework, IPTV framework and Application Services framework. The architecture employs a different perspective of classifying content based on applications. We point out the need and rationale behind such a classification to correlate in an end-2-end IPTV architecture. We show the benefits of using the Application Services framework to ensure smooth and swift portability onto various flavors of android. Finally, we conclude by detailing some use-cases indicating content management services like Electronic Service Guide (ESG) on Android.
{"title":"An Aggregate Functional Software Architecture on Android for End-2-End Real-Time Interactive Content Management to Cater IPTV Services on Digital Handheld Devices","authors":"Keyurkumar J. Patel, S. Anand, S. Kumar","doi":"10.1109/NGMAST.2010.37","DOIUrl":"https://doi.org/10.1109/NGMAST.2010.37","url":null,"abstract":"Digital Video Content is now pervasive and services like IPTV are gaining traction on hand held devices too. Android, a software platform from Google, pioneering middleware and applications for handheld devices does not offer support for content management services by design. Motivated by these observations, we propose an aggregate model software platform to offer content management and value added services (VAS) like IPTV on android. The outline of paper is as follows: First, we discuss few related works to investigate and analyze industry-wide content management and delivery practices. Second, we discuss few characteristics of android architecture and detail the constraints associated with middleware to offer such VAS. Consequently, we describe the proposed software platform which addresses key inherent challenges like Efficiency, Extendibility and Security while achieving efficient content delivery. The Module Interconnection Architecture can be visualized to be constituted by three basic building blocks, namely: VAS Content Management framework, IPTV framework and Application Services framework. The architecture employs a different perspective of classifying content based on applications. We point out the need and rationale behind such a classification to correlate in an end-2-end IPTV architecture. We show the benefits of using the Application Services framework to ensure smooth and swift portability onto various flavors of android. Finally, we conclude by detailing some use-cases indicating content management services like Electronic Service Guide (ESG) on Android.","PeriodicalId":184193,"journal":{"name":"2010 Fourth International Conference on Next Generation Mobile Applications, Services and Technologies","volume":"25 15","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131539355","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
J. Niemöller, Eugen Freiter, K. Vandikas, R. Quinet, R. Levenshteyn, I. Fikouras
Telecommunication networks are service centric and therefore benefit from service composition techniques in accordance to Service Oriented Architecture (SOA) principles. Furthermore, services in the telecommunication domain are subject to specific requirements such as support for end-to-end communication sessions and mechanisms for service interaction across technological borders including telecom, enterprise and Internet services. The presented approach uses a technology-agnostic core composition function, which is comprised of high-level abstraction in the description of heterogeneous services, constraint-based dynamic service selection and step-by-step instantiation of abstract composite application models. In order to better support telecommunication services, these concepts were combined with support for sessions, integration with IP multimedia subsystem (IMS) and support for legacy telecommunication technologies such as Intelligent Networks (IN) [1]. The presented composition approach has become part of products and solutions. This paper reports our experiences regarding the applicability of the technology, efficiency of the composite service development and performance of services composed using this approach.
{"title":"Multi-Technology Service Composition for the Telecommunication Domain - Concepts and Experiences","authors":"J. Niemöller, Eugen Freiter, K. Vandikas, R. Quinet, R. Levenshteyn, I. Fikouras","doi":"10.1109/NGMAST.2010.19","DOIUrl":"https://doi.org/10.1109/NGMAST.2010.19","url":null,"abstract":"Telecommunication networks are service centric and therefore benefit from service composition techniques in accordance to Service Oriented Architecture (SOA) principles. Furthermore, services in the telecommunication domain are subject to specific requirements such as support for end-to-end communication sessions and mechanisms for service interaction across technological borders including telecom, enterprise and Internet services. The presented approach uses a technology-agnostic core composition function, which is comprised of high-level abstraction in the description of heterogeneous services, constraint-based dynamic service selection and step-by-step instantiation of abstract composite application models. In order to better support telecommunication services, these concepts were combined with support for sessions, integration with IP multimedia subsystem (IMS) and support for legacy telecommunication technologies such as Intelligent Networks (IN) [1]. The presented composition approach has become part of products and solutions. This paper reports our experiences regarding the applicability of the technology, efficiency of the composite service development and performance of services composed using this approach.","PeriodicalId":184193,"journal":{"name":"2010 Fourth International Conference on Next Generation Mobile Applications, Services and Technologies","volume":"248 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133934332","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Seyed Noorodin Keshavarz, Saeed Hajizadeh, M. Hamidi, Mahdi Gholami Omali
Avoiding interference, one of the efficient methods is to design appropriate pulse waveform. In this paper an optimized pulse design method is proposed as ultra wideband (UWB) pulse shapes that made use of a linear only triple-pulse combination of multiple Gaussian derivatives. So as to gain the best weight coefficient, we proposed to optimize its weight vector and shaping factor by particle swarm optimization (PSO) technique, which is an optimization method inspired by swarm behavior. Then we use the standard Gaussian approximation (SGA) algorithm to evaluate the performance of these pulses in the presence of multiuser interference (MUI). The simulation results show that the linear Gaussian combined UWB pulses meet the power spectral constraint of the Federal Communication Commission (FCC) emission mask rule. Furthermore, its performance is better than single Gaussian derivation pulse or other ways to satisfy some demand.
{"title":"A Novel UWB Pulse Waveform Design Method","authors":"Seyed Noorodin Keshavarz, Saeed Hajizadeh, M. Hamidi, Mahdi Gholami Omali","doi":"10.1109/NGMAST.2010.42","DOIUrl":"https://doi.org/10.1109/NGMAST.2010.42","url":null,"abstract":"Avoiding interference, one of the efficient methods is to design appropriate pulse waveform. In this paper an optimized pulse design method is proposed as ultra wideband (UWB) pulse shapes that made use of a linear only triple-pulse combination of multiple Gaussian derivatives. So as to gain the best weight coefficient, we proposed to optimize its weight vector and shaping factor by particle swarm optimization (PSO) technique, which is an optimization method inspired by swarm behavior. Then we use the standard Gaussian approximation (SGA) algorithm to evaluate the performance of these pulses in the presence of multiuser interference (MUI). The simulation results show that the linear Gaussian combined UWB pulses meet the power spectral constraint of the Federal Communication Commission (FCC) emission mask rule. Furthermore, its performance is better than single Gaussian derivation pulse or other ways to satisfy some demand.","PeriodicalId":184193,"journal":{"name":"2010 Fourth International Conference on Next Generation Mobile Applications, Services and Technologies","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130413320","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper provides a study to one of the web application and summarizes the concept of using dynamic websites in the Internet, so as to provide decision in education institutions with a suitable maters environment in order to achieve their tasks in a perfect way, also to help instructors and students to realize the educational objectives of the institution. In this paper the aspects and the importance of exchanging information between all the parties involved in the institution through reaching a high speed in performing tasks is addressed. In order to execute this work efficiently, a secure transformation and granting the right to access in a secure manner with respect to priorities were the first task to look at.
{"title":"Enhancement of Educational Institutions Dynamic Websites by Adding Security and Accesibility","authors":"E. Fgee, Hassan Abdoulaye Abakar, A. Elhounie","doi":"10.1109/NGMAST.2010.29","DOIUrl":"https://doi.org/10.1109/NGMAST.2010.29","url":null,"abstract":"This paper provides a study to one of the web application and summarizes the concept of using dynamic websites in the Internet, so as to provide decision in education institutions with a suitable maters environment in order to achieve their tasks in a perfect way, also to help instructors and students to realize the educational objectives of the institution. In this paper the aspects and the importance of exchanging information between all the parties involved in the institution through reaching a high speed in performing tasks is addressed. In order to execute this work efficiently, a secure transformation and granting the right to access in a secure manner with respect to priorities were the first task to look at.","PeriodicalId":184193,"journal":{"name":"2010 Fourth International Conference on Next Generation Mobile Applications, Services and Technologies","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126282204","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this paper, we investigate the application and benefits of Transmit Antenna Selection in 802.11n MIMO systems. Our goal is to find a combination of transmitting antennas, which can provide high system reliability. In addition, we consider a channel with partial Channel State Information (CSI). Using a simulation model we study the behavior of the system for a particular Transmit Antenna Selection (TAS) algorithm. Finally, we present the results from different scenario simulations with different number of transmitting and receiving antennas and demonstrate to what extend the imperfect CSI affects the performance of the wireless system.
{"title":"Application of Transmit Antenna Selection in Wireless Local Area Networks","authors":"Filip Mestanov, G. Iliev","doi":"10.1109/NGMAST.2010.38","DOIUrl":"https://doi.org/10.1109/NGMAST.2010.38","url":null,"abstract":"In this paper, we investigate the application and benefits of Transmit Antenna Selection in 802.11n MIMO systems. Our goal is to find a combination of transmitting antennas, which can provide high system reliability. In addition, we consider a channel with partial Channel State Information (CSI). Using a simulation model we study the behavior of the system for a particular Transmit Antenna Selection (TAS) algorithm. Finally, we present the results from different scenario simulations with different number of transmitting and receiving antennas and demonstrate to what extend the imperfect CSI affects the performance of the wireless system.","PeriodicalId":184193,"journal":{"name":"2010 Fourth International Conference on Next Generation Mobile Applications, Services and Technologies","volume":"06 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121441755","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In a pervasive environment, user is in front of an enormous amount of information and heterogeneous contents. Thus, he could see on his interface varied information. However, at some moment, user could need certain information and find the others completely useless: this choice depends necessarily on his preferences and his individual requirements. In this paper we present a model-based approach for User Requirements (UR) deduction by using Petri-Nets (PN) generation technology. This deduction is mainly based on the current context of use involving the user’s task.
{"title":"User Requirements Deduction in a Pervasive Environment","authors":"B. Ismail Imen, Moussa Faouzi","doi":"10.1109/NGMAST.2010.21","DOIUrl":"https://doi.org/10.1109/NGMAST.2010.21","url":null,"abstract":"In a pervasive environment, user is in front of an enormous amount of information and heterogeneous contents. Thus, he could see on his interface varied information. However, at some moment, user could need certain information and find the others completely useless: this choice depends necessarily on his preferences and his individual requirements. In this paper we present a model-based approach for User Requirements (UR) deduction by using Petri-Nets (PN) generation technology. This deduction is mainly based on the current context of use involving the user’s task.","PeriodicalId":184193,"journal":{"name":"2010 Fourth International Conference on Next Generation Mobile Applications, Services and Technologies","volume":"08 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123619162","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}