Pub Date : 2003-09-21DOI: 10.1109/APCC.2003.1274446
F. Jaswar, A. Sha'ameri
Digital modulation based on FSK is widely used in HF data communication. This is due to simplicity in implementation by noncoherent detection and robustness due noise and phase synchronization error. Hardware based design using FPGA can reduced system size. The proposed modulation integrates both the transmitter and receiver modules into a single FPGA. Further reduction in components is achieved by adopting a multiplierless and parallel algorithm at the receiver module. This is proven by comparing with conventional noncoherent detection algorithm.
{"title":"FPGA implementation of CPFSK modulation techniques for HF data communication","authors":"F. Jaswar, A. Sha'ameri","doi":"10.1109/APCC.2003.1274446","DOIUrl":"https://doi.org/10.1109/APCC.2003.1274446","url":null,"abstract":"Digital modulation based on FSK is widely used in HF data communication. This is due to simplicity in implementation by noncoherent detection and robustness due noise and phase synchronization error. Hardware based design using FPGA can reduced system size. The proposed modulation integrates both the transmitter and receiver modules into a single FPGA. Further reduction in components is achieved by adopting a multiplierless and parallel algorithm at the receiver module. This is proven by comparing with conventional noncoherent detection algorithm.","PeriodicalId":277507,"journal":{"name":"9th Asia-Pacific Conference on Communications (IEEE Cat. No.03EX732)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133257146","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2003-09-21DOI: 10.1109/APCC.2003.1274361
H. Persson, J. Karlsson
Future wireless networks, the systems beyond 3G, will be a combination of different wireless systems. With only one terminal a user should be able to connect to different type of operators, technologies and systems. The issue is also to make the terminal staying online connected, when these changes are made. Both intrasystem handovers and intersystem handovers should be supported by such terminals. The systems will form a hierarchical cell structure, that offer the users several technologies and different type of QoS-levels and bandwidths. To analyze this type of hierarchical cell structure a model has been created, and to verify the model calculations on a Markov-chain have been made. Using the transition probabilities we have calculated the state probabilities, to verify the results from the simulations made of our model. The analytical model and the simulation shows a very good agreement. The results show that the model could be used to show how the WLAN usage will behave as the number of WLANs and WLAN users increase.
{"title":"Maintaining QoS by utilizing hierarchical wireless systems","authors":"H. Persson, J. Karlsson","doi":"10.1109/APCC.2003.1274361","DOIUrl":"https://doi.org/10.1109/APCC.2003.1274361","url":null,"abstract":"Future wireless networks, the systems beyond 3G, will be a combination of different wireless systems. With only one terminal a user should be able to connect to different type of operators, technologies and systems. The issue is also to make the terminal staying online connected, when these changes are made. Both intrasystem handovers and intersystem handovers should be supported by such terminals. The systems will form a hierarchical cell structure, that offer the users several technologies and different type of QoS-levels and bandwidths. To analyze this type of hierarchical cell structure a model has been created, and to verify the model calculations on a Markov-chain have been made. Using the transition probabilities we have calculated the state probabilities, to verify the results from the simulations made of our model. The analytical model and the simulation shows a very good agreement. The results show that the model could be used to show how the WLAN usage will behave as the number of WLANs and WLAN users increase.","PeriodicalId":277507,"journal":{"name":"9th Asia-Pacific Conference on Communications (IEEE Cat. No.03EX732)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134380750","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2003-09-21DOI: 10.1109/APCC.2003.1274230
N. Nakaya, Y. Koui, H. Yoshida, S. Seno, N. Okazaki
Due to the recent increase of computer viruses, anti-virus measures for the safety control of networks occupies the important decision. Since general anti-virus measures depend on the countermeasures by individual users, it is difficult for the network managers to manage these viruses. We propose a novel virus extermination method which enables control of anti-virus measures at the manager level, and evaluate the effectiveness of the proposed method by computer simulations. By using this method, the vaccine which has the infection capability that is equal to the viruses spreads the following viruses and exterminate them. Therefore, it is possible to exterminate all viruses if the network manager prepares some computers that detect and exterminate the viruses.
{"title":"Virus extermination by vaccine with pursuit function","authors":"N. Nakaya, Y. Koui, H. Yoshida, S. Seno, N. Okazaki","doi":"10.1109/APCC.2003.1274230","DOIUrl":"https://doi.org/10.1109/APCC.2003.1274230","url":null,"abstract":"Due to the recent increase of computer viruses, anti-virus measures for the safety control of networks occupies the important decision. Since general anti-virus measures depend on the countermeasures by individual users, it is difficult for the network managers to manage these viruses. We propose a novel virus extermination method which enables control of anti-virus measures at the manager level, and evaluate the effectiveness of the proposed method by computer simulations. By using this method, the vaccine which has the infection capability that is equal to the viruses spreads the following viruses and exterminate them. Therefore, it is possible to exterminate all viruses if the network manager prepares some computers that detect and exterminate the viruses.","PeriodicalId":277507,"journal":{"name":"9th Asia-Pacific Conference on Communications (IEEE Cat. No.03EX732)","volume":"116 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133383455","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2003-09-21DOI: 10.1109/APCC.2003.1274451
W. Al-Salihy, J. Ann, R. Sures
As computers become more and more pervasive, information technology (IT) organizations have become so dependent on information systems (IS) for their daily operations and strategic purposes thus intensify the need for IS security. The lack of concern for IS security is evident that organizations are often victimized by computer abuse incidents. Studies on information systems security in Malaysia's IT industry context is very insufficient. This paper will focus on how deterrent actions, preventive actions and organizational actions lead to IS security effectiveness in an IT organization. A survey of Association of Computer and Multimedia Industry of Malaysia (PIKOM) members were conducted. Based on the results of the statistical analysis, a conceptual model of IS security was developed using statistical package for social sciences (SPSS) 8.0. To test the effectiveness of the conceptual model, a case study was done on a typical IT organization to review its IS security status. Finally, findings from this case study were compared with the results from the statistical analysis. The results from the statistical analysis shows that systems environment security control, codes of ethics, security software control and top management support have a positive significant effect on the level of security effectiveness whereas disincentives certainty and organizational maturity was found to have negative significant effect on the level of security effectiveness. Findings from the case study shows that disincentives certainty, systems environment security control, security software control and organizational maturity are key factors contributing to IS security effectiveness while codes of ethics and top management support are insignificant to IS security effectiveness.
{"title":"Effectiveness of information systems security in IT organizations in Malaysia","authors":"W. Al-Salihy, J. Ann, R. Sures","doi":"10.1109/APCC.2003.1274451","DOIUrl":"https://doi.org/10.1109/APCC.2003.1274451","url":null,"abstract":"As computers become more and more pervasive, information technology (IT) organizations have become so dependent on information systems (IS) for their daily operations and strategic purposes thus intensify the need for IS security. The lack of concern for IS security is evident that organizations are often victimized by computer abuse incidents. Studies on information systems security in Malaysia's IT industry context is very insufficient. This paper will focus on how deterrent actions, preventive actions and organizational actions lead to IS security effectiveness in an IT organization. A survey of Association of Computer and Multimedia Industry of Malaysia (PIKOM) members were conducted. Based on the results of the statistical analysis, a conceptual model of IS security was developed using statistical package for social sciences (SPSS) 8.0. To test the effectiveness of the conceptual model, a case study was done on a typical IT organization to review its IS security status. Finally, findings from this case study were compared with the results from the statistical analysis. The results from the statistical analysis shows that systems environment security control, codes of ethics, security software control and top management support have a positive significant effect on the level of security effectiveness whereas disincentives certainty and organizational maturity was found to have negative significant effect on the level of security effectiveness. Findings from the case study shows that disincentives certainty, systems environment security control, security software control and organizational maturity are key factors contributing to IS security effectiveness while codes of ethics and top management support are insignificant to IS security effectiveness.","PeriodicalId":277507,"journal":{"name":"9th Asia-Pacific Conference on Communications (IEEE Cat. No.03EX732)","volume":"85 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114040220","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2003-09-21DOI: 10.1109/APCC.2003.1274355
J. Won, Gilsoo Chang, Hakseong Jeon, Dong-Seung Kwon
This paper is written for finding out what strategies are in order to succeed in MGcN (next generation convergence network) in Korea. Three kinds of view point - technical, economical, political- are used.
{"title":"How to succeed in NGcN of Korea","authors":"J. Won, Gilsoo Chang, Hakseong Jeon, Dong-Seung Kwon","doi":"10.1109/APCC.2003.1274355","DOIUrl":"https://doi.org/10.1109/APCC.2003.1274355","url":null,"abstract":"This paper is written for finding out what strategies are in order to succeed in MGcN (next generation convergence network) in Korea. Three kinds of view point - technical, economical, political- are used.","PeriodicalId":277507,"journal":{"name":"9th Asia-Pacific Conference on Communications (IEEE Cat. No.03EX732)","volume":"135 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114670705","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2003-09-21DOI: 10.1109/APCC.2003.1274437
Yichuan Wu, Jianping Zheng, Kui Huang
In future all IP cellular system, the requirement in terms of voice quality and spectrum efficiency for voice over IP services will reasonably be similar to current requirement on the circuit switched voice services. Hence, comparing with payload, the relatively large IP/UDP/RTP headers of wireless VoIP must be reduced in size by header compression. This paper detailedly analyzes two main header compression algorithms used in current wireless VoIP services. By simulation, the performance of these algorithms in cellular links is evaluated and compared.
{"title":"The performance analysis and simulation of header compression in VoIP services over cellular links","authors":"Yichuan Wu, Jianping Zheng, Kui Huang","doi":"10.1109/APCC.2003.1274437","DOIUrl":"https://doi.org/10.1109/APCC.2003.1274437","url":null,"abstract":"In future all IP cellular system, the requirement in terms of voice quality and spectrum efficiency for voice over IP services will reasonably be similar to current requirement on the circuit switched voice services. Hence, comparing with payload, the relatively large IP/UDP/RTP headers of wireless VoIP must be reduced in size by header compression. This paper detailedly analyzes two main header compression algorithms used in current wireless VoIP services. By simulation, the performance of these algorithms in cellular links is evaluated and compared.","PeriodicalId":277507,"journal":{"name":"9th Asia-Pacific Conference on Communications (IEEE Cat. No.03EX732)","volume":"89 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117084530","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2003-09-21DOI: 10.1109/APCC.2003.1274302
M. Zafruullah, M. Waris, M.K. Islam
The simulation of EDFA using a long span of Er-doped fiber for the amplification of optical solitons is presented. Various parameters can be varied as a control to optimize soliton amplification. Instead of using lumped amplifiers, a distributed amplification is employed. It is possible to design EDFA for different input pulse widths depending upon the dispersion and loss of the fiber. The effective values of the pump range, fiber dispersion, doping concentration have been varied with in the recommended criterion of the on going progress in carrying out data successfully to the horizon limits. To study amplification, the FWHM of solitons is considered in pica second range only as ultra short soliton pulses suffer from various other effects of higher order dispersion, Raman effect and SSFS. The simulations worked out in this perspective are providing leverage to the existing research on conventional techniques of the signal amplification, development of the EDFAs based on the previous research, as the soliton exploitation approach for the development of EDFAs lead to cope with the long standing desire of long haul communication to pierce through the horizon. The results obtained provide a future guideline to implement them practically. The new systematic trends is available for the researchers to go ahead to explore the hidden nooks of the future optical development.
{"title":"Simulation and design of EDFAs for long-haul soliton based communication systems","authors":"M. Zafruullah, M. Waris, M.K. Islam","doi":"10.1109/APCC.2003.1274302","DOIUrl":"https://doi.org/10.1109/APCC.2003.1274302","url":null,"abstract":"The simulation of EDFA using a long span of Er-doped fiber for the amplification of optical solitons is presented. Various parameters can be varied as a control to optimize soliton amplification. Instead of using lumped amplifiers, a distributed amplification is employed. It is possible to design EDFA for different input pulse widths depending upon the dispersion and loss of the fiber. The effective values of the pump range, fiber dispersion, doping concentration have been varied with in the recommended criterion of the on going progress in carrying out data successfully to the horizon limits. To study amplification, the FWHM of solitons is considered in pica second range only as ultra short soliton pulses suffer from various other effects of higher order dispersion, Raman effect and SSFS. The simulations worked out in this perspective are providing leverage to the existing research on conventional techniques of the signal amplification, development of the EDFAs based on the previous research, as the soliton exploitation approach for the development of EDFAs lead to cope with the long standing desire of long haul communication to pierce through the horizon. The results obtained provide a future guideline to implement them practically. The new systematic trends is available for the researchers to go ahead to explore the hidden nooks of the future optical development.","PeriodicalId":277507,"journal":{"name":"9th Asia-Pacific Conference on Communications (IEEE Cat. No.03EX732)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116184207","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2003-09-21DOI: 10.1109/APCC.2003.1274281
C. Dethe, D. Wakde
Today's complex network traffic is the aggregation of traffic generated by individual sources on network. Therefore access pattern of users is of immense importance in order to model and simulate the network traffic using user characteristics. In this study we identify the parameter matrix to characterise the individual user and compute their correlation analysis in order to find their independence, useful criterion for modeling.
{"title":"User based network (WAN) traffic analysis","authors":"C. Dethe, D. Wakde","doi":"10.1109/APCC.2003.1274281","DOIUrl":"https://doi.org/10.1109/APCC.2003.1274281","url":null,"abstract":"Today's complex network traffic is the aggregation of traffic generated by individual sources on network. Therefore access pattern of users is of immense importance in order to model and simulate the network traffic using user characteristics. In this study we identify the parameter matrix to characterise the individual user and compute their correlation analysis in order to find their independence, useful criterion for modeling.","PeriodicalId":277507,"journal":{"name":"9th Asia-Pacific Conference on Communications (IEEE Cat. No.03EX732)","volume":"44 6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123276118","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2003-09-21DOI: 10.1109/APCC.2003.1274330
Chun-Hung Chen, Ho-Ting Wu, Kai-Wei Ke
A mobile ad hoc network is a wireless multihop network without any existing infrastructure. Thus when one node wants to transmit data to another node, it should depend on other nodes to forward it. In such a networking environment, the movement of highly mobile nodes may frequently result in the link breakdown, thus causing network inefficiency and data loss. In this paper, we develop a simple heuristic mechanism to characterize the instant mobility of network nodes. We assume that all network nodes can move arbitrarily, and none of them is equipped with any positioning device (such as the GPS system). Each mobile node is (at any time) classified as either a low mobility node or a high mobility node. A mobile node estimates its own mobility type by comparing the signal strength of consecutive received messages sent by its low mobility neighboring nodes. It then broadcasts this mobility type information to its neighbors. The mobility estimation algorithm is thus fully distributed and self organized. We then apply the estimated mobility characteristics to the construction of the end-to-end routing path. Two methods of selecting low mobility nodes as the primary intermediate routing nodes are presented. Performance evaluations via simulations have demonstrated the robustness of such a mobile awareness algorithm.
{"title":"The design and application of mobile awareness mechanism in wireless ad hoc networks without GPS","authors":"Chun-Hung Chen, Ho-Ting Wu, Kai-Wei Ke","doi":"10.1109/APCC.2003.1274330","DOIUrl":"https://doi.org/10.1109/APCC.2003.1274330","url":null,"abstract":"A mobile ad hoc network is a wireless multihop network without any existing infrastructure. Thus when one node wants to transmit data to another node, it should depend on other nodes to forward it. In such a networking environment, the movement of highly mobile nodes may frequently result in the link breakdown, thus causing network inefficiency and data loss. In this paper, we develop a simple heuristic mechanism to characterize the instant mobility of network nodes. We assume that all network nodes can move arbitrarily, and none of them is equipped with any positioning device (such as the GPS system). Each mobile node is (at any time) classified as either a low mobility node or a high mobility node. A mobile node estimates its own mobility type by comparing the signal strength of consecutive received messages sent by its low mobility neighboring nodes. It then broadcasts this mobility type information to its neighbors. The mobility estimation algorithm is thus fully distributed and self organized. We then apply the estimated mobility characteristics to the construction of the end-to-end routing path. Two methods of selecting low mobility nodes as the primary intermediate routing nodes are presented. Performance evaluations via simulations have demonstrated the robustness of such a mobile awareness algorithm.","PeriodicalId":277507,"journal":{"name":"9th Asia-Pacific Conference on Communications (IEEE Cat. No.03EX732)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123460745","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2003-09-21DOI: 10.1109/APCC.2003.1274241
C. Phongcharoenpanich, D. Boonrod, M. Krairiksh
This paper presents theoretical investigations of the characteristics such as radiation pattern, half-power beamwidth, directivity, front-to-back ratio and polarization of an inclined slot on spherical surface. The total fields inside the cavity are formulated by means of the combination of TE and TM modes. The unknown coefficients of the fields are determined by imposing the boundary conditions. The voltage distribution along the slot is reasonably assumed to be the sinusoidal functions. The numerical results of radiation characteristics for various radii of the spherical surface are illustrated. The comparisons between horizontal slot and inclined slot are reported. The result of the analysis shows that this technique is very useful for the design of spherical slot array antenna of any orientation.
{"title":"Radiation characteristics of inclined slot antenna on conducting spherical cavity","authors":"C. Phongcharoenpanich, D. Boonrod, M. Krairiksh","doi":"10.1109/APCC.2003.1274241","DOIUrl":"https://doi.org/10.1109/APCC.2003.1274241","url":null,"abstract":"This paper presents theoretical investigations of the characteristics such as radiation pattern, half-power beamwidth, directivity, front-to-back ratio and polarization of an inclined slot on spherical surface. The total fields inside the cavity are formulated by means of the combination of TE and TM modes. The unknown coefficients of the fields are determined by imposing the boundary conditions. The voltage distribution along the slot is reasonably assumed to be the sinusoidal functions. The numerical results of radiation characteristics for various radii of the spherical surface are illustrated. The comparisons between horizontal slot and inclined slot are reported. The result of the analysis shows that this technique is very useful for the design of spherical slot array antenna of any orientation.","PeriodicalId":277507,"journal":{"name":"9th Asia-Pacific Conference on Communications (IEEE Cat. No.03EX732)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123910092","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}