首页 > 最新文献

Future Generation Communication and Networking (FGCN 2007)最新文献

英文 中文
A Dynamic Network Access Identifier Used for Location Privacy 用于位置隐私的动态网络访问标识符
Pub Date : 2007-12-06 DOI: 10.1109/FGCN.2007.10
C. Wan, A. Hu
Current wireless access authentication mechanisms are mostly based on the network access identifier. It may lead to the location privacy problem. This paper brings out the concept of dynamically generated network access identifier, and gives an example of authentication using the dynamically generated network access identifier. Also this paper proves the security of the authentication procedure using the BAN logic and analyzes the performance of the authentication mechanism based on DNAI.
目前的无线接入认证机制大多基于网络接入标识符。这可能会导致位置隐私问题。提出了动态生成的网络接入标识的概念,并给出了一个使用动态生成的网络接入标识进行认证的实例。本文还利用BAN逻辑证明了认证过程的安全性,并分析了基于dai的认证机制的性能。
{"title":"A Dynamic Network Access Identifier Used for Location Privacy","authors":"C. Wan, A. Hu","doi":"10.1109/FGCN.2007.10","DOIUrl":"https://doi.org/10.1109/FGCN.2007.10","url":null,"abstract":"Current wireless access authentication mechanisms are mostly based on the network access identifier. It may lead to the location privacy problem. This paper brings out the concept of dynamically generated network access identifier, and gives an example of authentication using the dynamically generated network access identifier. Also this paper proves the security of the authentication procedure using the BAN logic and analyzes the performance of the authentication mechanism based on DNAI.","PeriodicalId":254368,"journal":{"name":"Future Generation Communication and Networking (FGCN 2007)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131825297","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Role of Annotation in Electronic Process Guide (EPG) 注释在电子工艺指南(EPG)中的作用
Pub Date : 2007-12-06 DOI: 10.1109/FGCN.2007.196
A. Ibrahim, Ho‐Jin Choi
Annotations play a major part in our daily life. Similarly electronic process guide or EPG plays an important role in software development in an organization. An EPG can guide the developers about the process used or followed in an environment. The paper describes the annotation in electronic process guide for developers. We first introduced the background of the topic and some of the related researched done in the area of annotation systems. Some of the annotation systems for the Web are available either free or commercially. We then focus on the literature survey on the use of annotation tools and technique in different areas along with the usage of EPG in different scenarios. We also focus on Web based annotation for Jasmine EPG and conclusion is given with the future work.
注释在我们的日常生活中扮演着重要的角色。类似地,电子过程指南或EPG在组织的软件开发中起着重要的作用。EPG可以指导开发人员在环境中使用或遵循的过程。本文介绍了开发人员电子流程指南中的注释。我们首先介绍了选题的背景以及在标注系统领域所做的一些相关研究。Web上的一些注释系统是免费的或有商业价值的。然后,我们重点介绍了在不同领域使用标注工具和技术的文献综述,以及EPG在不同场景中的使用情况。本文还对茉莉EPG的Web标注进行了研究,并对今后的工作进行了总结。
{"title":"Role of Annotation in Electronic Process Guide (EPG)","authors":"A. Ibrahim, Ho‐Jin Choi","doi":"10.1109/FGCN.2007.196","DOIUrl":"https://doi.org/10.1109/FGCN.2007.196","url":null,"abstract":"Annotations play a major part in our daily life. Similarly electronic process guide or EPG plays an important role in software development in an organization. An EPG can guide the developers about the process used or followed in an environment. The paper describes the annotation in electronic process guide for developers. We first introduced the background of the topic and some of the related researched done in the area of annotation systems. Some of the annotation systems for the Web are available either free or commercially. We then focus on the literature survey on the use of annotation tools and technique in different areas along with the usage of EPG in different scenarios. We also focus on Web based annotation for Jasmine EPG and conclusion is given with the future work.","PeriodicalId":254368,"journal":{"name":"Future Generation Communication and Networking (FGCN 2007)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124238930","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
An Empirical Study of Spam and Spam Vulnerable email Accounts 垃圾邮件和易受垃圾邮件攻击的电子邮件账户的实证研究
Pub Date : 2007-12-06 DOI: 10.1109/FGCN.2007.61
B. Dhinakaran, Cheol-Joo Chae, Jae-Kwang Lee
Spam messages muddle up users inbox, consume network resources, and build up DDoS attacks, spread malware. Our goal is to present a definite figure about the characteristics of spam and spam vulnerable email accounts. These evaluations help us to enhance the existing technology to combat spam effectively. We collected 400 thousand spam mails from a spam trap set up in a corporate mail server for a period of 14 months form January 2006 to February 2007. Spammers use common techniques to spam end users regardless of corporate server and public mail server. So we believe that our spam collection is a sample of world wide spam traffic. Studying the characteristics of this sample helps us to better understand the features of spam and spam vulnerable e-mail accounts. We believe that this analysis is highly useful to develop more efficient anti spam techniques. In our analysis we classified spam based on attachment and contents. According to our study the four years old heavy users email accounts attract more spam than four years old light users mail accounts. The 14 months old relatively new email accounts don't receive spam. In some special cases like DDoS attacks, the new email accounts receive spam. During DDoS attack 14 months old heavy users email accounts have attracted more number of spam than 14 months old light users mail accounts.
垃圾邮件扰乱用户的收件箱,消耗网络资源,并建立DDoS攻击,传播恶意软件。我们的目标是提出一个明确的数字关于垃圾邮件和垃圾邮件易受攻击的电子邮件帐户的特点。这些评估有助于我们加强现有的技术,有效地打击垃圾邮件。在2006年1月至2007年2月的14个月期间,我们从公司邮件服务器上设置的垃圾邮件陷阱中收集了40万封垃圾邮件。垃圾邮件发送者使用通用技术向终端用户发送垃圾邮件,而不考虑公司服务器和公共邮件服务器。因此,我们相信我们的垃圾邮件收集是全球垃圾邮件流量的一个样本。研究此样本的特征有助于我们更好地理解垃圾邮件和易受垃圾邮件攻击的电子邮件帐户的特征。我们相信这种分析对开发更有效的反垃圾邮件技术非常有用。在我们的分析中,我们根据附件和内容对垃圾邮件进行分类。根据我们的研究,4岁的重度用户的电子邮件帐户比4岁的轻度用户的电子邮件帐户吸引更多的垃圾邮件。14个月大的相对较新的电子邮件帐户不会收到垃圾邮件。在一些特殊情况下,如DDoS攻击,新的电子邮件帐户收到垃圾邮件。在DDoS攻击期间,14个月的重度用户的电子邮件帐户比14个月的轻度用户的电子邮件帐户吸引了更多的垃圾邮件。
{"title":"An Empirical Study of Spam and Spam Vulnerable email Accounts","authors":"B. Dhinakaran, Cheol-Joo Chae, Jae-Kwang Lee","doi":"10.1109/FGCN.2007.61","DOIUrl":"https://doi.org/10.1109/FGCN.2007.61","url":null,"abstract":"Spam messages muddle up users inbox, consume network resources, and build up DDoS attacks, spread malware. Our goal is to present a definite figure about the characteristics of spam and spam vulnerable email accounts. These evaluations help us to enhance the existing technology to combat spam effectively. We collected 400 thousand spam mails from a spam trap set up in a corporate mail server for a period of 14 months form January 2006 to February 2007. Spammers use common techniques to spam end users regardless of corporate server and public mail server. So we believe that our spam collection is a sample of world wide spam traffic. Studying the characteristics of this sample helps us to better understand the features of spam and spam vulnerable e-mail accounts. We believe that this analysis is highly useful to develop more efficient anti spam techniques. In our analysis we classified spam based on attachment and contents. According to our study the four years old heavy users email accounts attract more spam than four years old light users mail accounts. The 14 months old relatively new email accounts don't receive spam. In some special cases like DDoS attacks, the new email accounts receive spam. During DDoS attack 14 months old heavy users email accounts have attracted more number of spam than 14 months old light users mail accounts.","PeriodicalId":254368,"journal":{"name":"Future Generation Communication and Networking (FGCN 2007)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125165699","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
Architecture of an Intelligent Inter-system Handover Management Scheme 智能系统间切换管理方案的体系结构
Pub Date : 2007-12-06 DOI: 10.1109/FGCN.2007.70
Meriem Kassar, B. Kervella, G. Pujolle
In the next generation of wireless networks, mobile users should move across various access technologies, using multi-interface terminals and different types of services. The most important issue in such heterogeneous environment is the always best connected (ABC) concept. It allows the best connectivity to services anywhere at anytime. For that, a seamless inter-system handover solution is needed. In our paper, we propose an intelligent solution, based on the context-awareness concept, ensuring service continuity and answering user requirements. We focus on the vertical handover decision issue. It performs whether and over which access network to hand over among those available. It uses advanced decision algorithms (for more efficiency and intelligence) and it is governed by handover policies as decision rules (for more flexibility and optimization).
在下一代无线网络中,移动用户应该跨越各种接入技术,使用多接口终端和不同类型的业务。在这种异构环境中,最重要的问题是始终最佳连接(ABC)的概念。它允许在任何时间任何地点最好地连接到服务。为此,需要一个无缝的系统间切换解决方案。在本文中,我们提出了一种基于上下文感知概念的智能解决方案,以确保服务连续性并满足用户需求。我们重点研究垂直切换决策问题。它在可用的接入网中执行是否和通过哪个接入网移交。它使用先进的决策算法(为了提高效率和智能),并由移交策略作为决策规则进行管理(为了更灵活和优化)。
{"title":"Architecture of an Intelligent Inter-system Handover Management Scheme","authors":"Meriem Kassar, B. Kervella, G. Pujolle","doi":"10.1109/FGCN.2007.70","DOIUrl":"https://doi.org/10.1109/FGCN.2007.70","url":null,"abstract":"In the next generation of wireless networks, mobile users should move across various access technologies, using multi-interface terminals and different types of services. The most important issue in such heterogeneous environment is the always best connected (ABC) concept. It allows the best connectivity to services anywhere at anytime. For that, a seamless inter-system handover solution is needed. In our paper, we propose an intelligent solution, based on the context-awareness concept, ensuring service continuity and answering user requirements. We focus on the vertical handover decision issue. It performs whether and over which access network to hand over among those available. It uses advanced decision algorithms (for more efficiency and intelligence) and it is governed by handover policies as decision rules (for more flexibility and optimization).","PeriodicalId":254368,"journal":{"name":"Future Generation Communication and Networking (FGCN 2007)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132441226","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
Dynamic Call Admission Control for QoS Provisioning in Multimedia Wireless Networks 多媒体无线网络中QoS提供的动态呼叫接纳控制
Pub Date : 2007-12-06 DOI: 10.1109/FGCN.2007.108
G. Kousalya, P. Narayanasamy, J. Park, Y. Kim, Heau-Jo Kang
Next generation wireless networks require guaranteed quality of service (QoS). The proposed dynamic call admission control (DCAC) architecture provides the guaranteed quality of service for real-time and non-real time traffic. DCAC architecture supports future generation wireless networks because it implements a traffic based on different type of call (ToC) with admission control. The bandwidth provisioning model provides bandwidth reallocation and reservation for different ToC. The proposed architecture tries to accomplish the minimum call blocking and handoff dropping rates based on the capacity of the neighboring base stations, current base station and ToC. The system is expected to achieve the required QoS requirements in terms of handoff call dropping probability and new call blocking probability while maintaining efficient bandwidth utilization. The minimal required bandwidth is assigned during the lifetime of high priority calls.
下一代无线网络需要保证服务质量(QoS)。提出的动态呼叫接纳控制(DCAC)体系结构为实时和非实时业务提供了有保证的服务质量。DCAC架构支持下一代无线网络,因为它实现了基于不同类型呼叫(ToC)的流量,并具有准入控制。带宽分配模型为不同的ToC提供带宽的重新分配和预留。所提出的架构尝试基于邻近基站、当前基站和ToC的容量来实现最小的呼叫阻塞和切换丢失率。在保持高效的带宽利用率的同时,期望系统在切换呼叫丢弃概率和新呼叫阻塞概率方面达到所需的QoS要求。在高优先级呼叫的生命周期内分配所需的最小带宽。
{"title":"Dynamic Call Admission Control for QoS Provisioning in Multimedia Wireless Networks","authors":"G. Kousalya, P. Narayanasamy, J. Park, Y. Kim, Heau-Jo Kang","doi":"10.1109/FGCN.2007.108","DOIUrl":"https://doi.org/10.1109/FGCN.2007.108","url":null,"abstract":"Next generation wireless networks require guaranteed quality of service (QoS). The proposed dynamic call admission control (DCAC) architecture provides the guaranteed quality of service for real-time and non-real time traffic. DCAC architecture supports future generation wireless networks because it implements a traffic based on different type of call (ToC) with admission control. The bandwidth provisioning model provides bandwidth reallocation and reservation for different ToC. The proposed architecture tries to accomplish the minimum call blocking and handoff dropping rates based on the capacity of the neighboring base stations, current base station and ToC. The system is expected to achieve the required QoS requirements in terms of handoff call dropping probability and new call blocking probability while maintaining efficient bandwidth utilization. The minimal required bandwidth is assigned during the lifetime of high priority calls.","PeriodicalId":254368,"journal":{"name":"Future Generation Communication and Networking (FGCN 2007)","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115910106","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Error Performance Analysis of Multi-User Binary PAM TH UWB Systems with Multiple Receive Antennas 多接收天线的多用户二进制PAM - TH超宽带系统误差性能分析
Pub Date : 2007-12-06 DOI: 10.1109/FGCN.2007.118
Sunyoung Baek, J. An, Sungsin Lee, Sangchoon Kim
In this paper, multiple receive antennas are applied to multi-user binary pulse amplitude modulation (2PAM) time hopping (TH) ultra-wideband (UWB) systems to achieve high-data-rate communications. The effects of spatial diversity on the performance of 2PAM-TH-UWB systems are analytically investigated. We derive the expression for the received SINR after spatially combining and evaluate the bit error rate (BER) performance. Numerical results show that the BER performance can be enhanced by spatial diversity combining.
本文将多个接收天线应用于多用户二进制脉冲调幅(2PAM)跳时(TH)超宽带(UWB)系统中,实现高数据速率通信。分析了空间分集对2PAM-TH-UWB系统性能的影响。我们推导了空间组合后的接收信噪比表达式,并评估了误码率(BER)性能。数值结果表明,空间分集组合可以提高系统的误码率。
{"title":"Error Performance Analysis of Multi-User Binary PAM TH UWB Systems with Multiple Receive Antennas","authors":"Sunyoung Baek, J. An, Sungsin Lee, Sangchoon Kim","doi":"10.1109/FGCN.2007.118","DOIUrl":"https://doi.org/10.1109/FGCN.2007.118","url":null,"abstract":"In this paper, multiple receive antennas are applied to multi-user binary pulse amplitude modulation (2PAM) time hopping (TH) ultra-wideband (UWB) systems to achieve high-data-rate communications. The effects of spatial diversity on the performance of 2PAM-TH-UWB systems are analytically investigated. We derive the expression for the received SINR after spatially combining and evaluate the bit error rate (BER) performance. Numerical results show that the BER performance can be enhanced by spatial diversity combining.","PeriodicalId":254368,"journal":{"name":"Future Generation Communication and Networking (FGCN 2007)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133466979","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The New Decoding Method of Rate Compatible LDPC Codes Based on the IR-HARQ Schemes 基于IR-HARQ的码率兼容LDPC码译码新方法
Pub Date : 2007-12-06 DOI: 10.1109/FGCN.2007.214
Shuya Yang, Hong Wen, Ning He, Liang Zhou
This paper proposes a new decoding method based on IR_HARQ scheme that uses rate-compatible LDPC codes as the FEC codes. And it can use the former decoding result, which can improve the performance of decoding scheme. This paper also evaluates the new decoding method by simulation. The results show that better performance both on system throughput and iterative times can be obtained.
本文提出了一种新的基于IR_HARQ方案的译码方法,该方法使用速率兼容的LDPC码作为FEC码。并且可以利用原译码结果,提高译码方案的性能。本文还通过仿真对新译码方法进行了评价。结果表明,该方法在系统吞吐量和迭代次数方面都有较好的性能。
{"title":"The New Decoding Method of Rate Compatible LDPC Codes Based on the IR-HARQ Schemes","authors":"Shuya Yang, Hong Wen, Ning He, Liang Zhou","doi":"10.1109/FGCN.2007.214","DOIUrl":"https://doi.org/10.1109/FGCN.2007.214","url":null,"abstract":"This paper proposes a new decoding method based on IR_HARQ scheme that uses rate-compatible LDPC codes as the FEC codes. And it can use the former decoding result, which can improve the performance of decoding scheme. This paper also evaluates the new decoding method by simulation. The results show that better performance both on system throughput and iterative times can be obtained.","PeriodicalId":254368,"journal":{"name":"Future Generation Communication and Networking (FGCN 2007)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133937513","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Transparent IP Mobility Management 透明的IP移动性管理
Pub Date : 2007-12-06 DOI: 10.1109/FGCN.2007.222
Huai-Jen Liu, Chih-Hao Wang, Chih-Lin Tseng
Mobile IP is a protocol that supports the IP mobility of mobile nodes. However, the protocol has the triangular routing problem. Although many routing optimization extension schemes in IPv6 networks can solve the problem, the delivery of routing optimization messages in the handoff period may incur long transmission delay and message loss, and therefore degrade the performance of routing optimization mechanisms. In addition, all schemes require all mobile nodes and their correspondent nodes to be involved in mobility management. A mobile node must inform its correspondent node of its roaming and its new location address. In this paper, we exploit the domain name system (DNS) to develop a mobility management system. Except granting the access to a new wireless link after roaming, the mobility management is transparent for a mobile node and its correspondent node. No routing optimization message is delivered.
移动IP是一种支持移动节点IP可移动性的协议。但是,该协议存在三角形路由问题。虽然IPv6网络中有很多路由优化扩展方案可以解决这个问题,但是在切换期间发送路由优化消息可能会造成较长的传输延迟和消息丢失,从而降低路由优化机制的性能。此外,所有方案都要求所有移动节点及其对应节点参与移动性管理。移动节点必须将其漫游和新的位置地址通知其对应节点。本文利用域名系统(DNS)开发了一个移动管理系统。除了在漫游后授予对新的无线链路的访问权限外,移动管理对移动节点及其对应节点是透明的。没有传递路由优化消息。
{"title":"Transparent IP Mobility Management","authors":"Huai-Jen Liu, Chih-Hao Wang, Chih-Lin Tseng","doi":"10.1109/FGCN.2007.222","DOIUrl":"https://doi.org/10.1109/FGCN.2007.222","url":null,"abstract":"Mobile IP is a protocol that supports the IP mobility of mobile nodes. However, the protocol has the triangular routing problem. Although many routing optimization extension schemes in IPv6 networks can solve the problem, the delivery of routing optimization messages in the handoff period may incur long transmission delay and message loss, and therefore degrade the performance of routing optimization mechanisms. In addition, all schemes require all mobile nodes and their correspondent nodes to be involved in mobility management. A mobile node must inform its correspondent node of its roaming and its new location address. In this paper, we exploit the domain name system (DNS) to develop a mobility management system. Except granting the access to a new wireless link after roaming, the mobility management is transparent for a mobile node and its correspondent node. No routing optimization message is delivered.","PeriodicalId":254368,"journal":{"name":"Future Generation Communication and Networking (FGCN 2007)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133382864","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Novel 3-5GHz Distributed Amplifier Structure Based Matched Filter for UWB Receiver 一种基于匹配滤波器的超宽带接收机3-5GHz分布式放大器结构
Pub Date : 2007-12-06 DOI: 10.1109/FGCN.2007.26
Jisu Jiang, C. Law, Chao Fang
Matched filter is an important component in the Ultra wideband front-end of receiver. This paper proposed an analogue matched filter for 6th -order Gaussian derivative pulse in 3-5 GHz UWB receiver by using pHEMT technology. Simulation results confirm the matched filter function and achieve 11 dB in amplitude gain with 7.4 dB signal-to-noise ratio improvement. The power consumption of the matched filter is 62 mW with a 3-V power supply.
匹配滤波器是接收机超宽带前端的重要组成部分。提出了一种基于pHEMT技术的3- 5ghz UWB接收机六阶高斯导数脉冲模拟匹配滤波器。仿真结果证实了滤波器的功能匹配,实现了11 dB的幅值增益,信噪比提高了7.4 dB。匹配滤波器的功耗为62 mW,电源为3v。
{"title":"A Novel 3-5GHz Distributed Amplifier Structure Based Matched Filter for UWB Receiver","authors":"Jisu Jiang, C. Law, Chao Fang","doi":"10.1109/FGCN.2007.26","DOIUrl":"https://doi.org/10.1109/FGCN.2007.26","url":null,"abstract":"Matched filter is an important component in the Ultra wideband front-end of receiver. This paper proposed an analogue matched filter for 6th -order Gaussian derivative pulse in 3-5 GHz UWB receiver by using pHEMT technology. Simulation results confirm the matched filter function and achieve 11 dB in amplitude gain with 7.4 dB signal-to-noise ratio improvement. The power consumption of the matched filter is 62 mW with a 3-V power supply.","PeriodicalId":254368,"journal":{"name":"Future Generation Communication and Networking (FGCN 2007)","volume":"123 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116027857","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Grant Model for Message Detour in Electronic Business System 电子商务系统中信息绕行的授权模型
Pub Date : 2007-12-06 DOI: 10.1109/FGCN.2007.141
Young-Soo Kim, Seok-Soo Kim
Today, electronic message is being used in everyday life. We are facing spam problems. Spam message is widely used for marketing e-Commerce. To block these spam messages, we use filtering or pricing systems. But these solutions raise other problems such as impediment in reception or availability caused by false positive or payment resistance. To solve these problems, we propose a grant model for filter of message detour in e- Business system which controls an unsolicited electronic message and prevents useful electronic message from being discarded. We designed and implemented the grant model for filter of message detour in e-Business system to enhance the usefulness and availability of electronic message. Tests of grant model for filter of message detour in e-Business system proved very successful in it's usability and efficiency.
今天,电子信息被用于日常生活中。我们正面临垃圾邮件的问题。垃圾邮件在电子商务营销中被广泛使用。为了阻止这些垃圾邮件,我们使用过滤或定价系统。但这些解决方案也带来了其他问题,如误报或支付阻力导致的接收或可用性障碍。为了解决这些问题,我们提出了一种电子商务系统中信息迂回过滤的授权模型,该模型可以控制未经请求的电子信息,防止有用的电子信息被丢弃。我们设计并实现了电子商务系统中信息迂回过滤的授权模型,以提高电子信息的有用性和可用性。对电子商务系统中消息迂回过滤的授权模型进行了测试,证明了该模型的可用性和有效性。
{"title":"Grant Model for Message Detour in Electronic Business System","authors":"Young-Soo Kim, Seok-Soo Kim","doi":"10.1109/FGCN.2007.141","DOIUrl":"https://doi.org/10.1109/FGCN.2007.141","url":null,"abstract":"Today, electronic message is being used in everyday life. We are facing spam problems. Spam message is widely used for marketing e-Commerce. To block these spam messages, we use filtering or pricing systems. But these solutions raise other problems such as impediment in reception or availability caused by false positive or payment resistance. To solve these problems, we propose a grant model for filter of message detour in e- Business system which controls an unsolicited electronic message and prevents useful electronic message from being discarded. We designed and implemented the grant model for filter of message detour in e-Business system to enhance the usefulness and availability of electronic message. Tests of grant model for filter of message detour in e-Business system proved very successful in it's usability and efficiency.","PeriodicalId":254368,"journal":{"name":"Future Generation Communication and Networking (FGCN 2007)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116907433","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Future Generation Communication and Networking (FGCN 2007)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1