首页 > 最新文献

9th Asia-Pacific Conference on Communications (IEEE Cat. No.03EX732)最新文献

英文 中文
FPGA implementation of CPFSK modulation techniques for HF data communication 用FPGA实现CPFSK调制技术进行高频数据通信
Pub Date : 2003-09-21 DOI: 10.1109/APCC.2003.1274446
F. Jaswar, A. Sha'ameri
Digital modulation based on FSK is widely used in HF data communication. This is due to simplicity in implementation by noncoherent detection and robustness due noise and phase synchronization error. Hardware based design using FPGA can reduced system size. The proposed modulation integrates both the transmitter and receiver modules into a single FPGA. Further reduction in components is achieved by adopting a multiplierless and parallel algorithm at the receiver module. This is proven by comparing with conventional noncoherent detection algorithm.
基于FSK的数字调制技术在高频数据通信中得到了广泛的应用。这是由于通过非相干检测实现的简单性和由于噪声和相位同步误差的鲁棒性。基于硬件的FPGA设计可以减小系统尺寸。所提出的调制将发送模块和接收模块集成到单个FPGA中。通过在接收模块采用无乘法器和并行算法,进一步减少了组件。通过与传统非相干检测算法的比较,证明了这一点。
{"title":"FPGA implementation of CPFSK modulation techniques for HF data communication","authors":"F. Jaswar, A. Sha'ameri","doi":"10.1109/APCC.2003.1274446","DOIUrl":"https://doi.org/10.1109/APCC.2003.1274446","url":null,"abstract":"Digital modulation based on FSK is widely used in HF data communication. This is due to simplicity in implementation by noncoherent detection and robustness due noise and phase synchronization error. Hardware based design using FPGA can reduced system size. The proposed modulation integrates both the transmitter and receiver modules into a single FPGA. Further reduction in components is achieved by adopting a multiplierless and parallel algorithm at the receiver module. This is proven by comparing with conventional noncoherent detection algorithm.","PeriodicalId":277507,"journal":{"name":"9th Asia-Pacific Conference on Communications (IEEE Cat. No.03EX732)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133257146","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Maintaining QoS by utilizing hierarchical wireless systems 利用分层无线系统维持QoS
Pub Date : 2003-09-21 DOI: 10.1109/APCC.2003.1274361
H. Persson, J. Karlsson
Future wireless networks, the systems beyond 3G, will be a combination of different wireless systems. With only one terminal a user should be able to connect to different type of operators, technologies and systems. The issue is also to make the terminal staying online connected, when these changes are made. Both intrasystem handovers and intersystem handovers should be supported by such terminals. The systems will form a hierarchical cell structure, that offer the users several technologies and different type of QoS-levels and bandwidths. To analyze this type of hierarchical cell structure a model has been created, and to verify the model calculations on a Markov-chain have been made. Using the transition probabilities we have calculated the state probabilities, to verify the results from the simulations made of our model. The analytical model and the simulation shows a very good agreement. The results show that the model could be used to show how the WLAN usage will behave as the number of WLANs and WLAN users increase.
未来的无线网络,即超越3G的系统,将是不同无线系统的组合。只有一个终端,用户应该能够连接到不同类型的运营商,技术和系统。当进行这些更改时,问题还在于使终端保持在线连接。这些终端应该支持系统内和系统间的切换。这些系统将形成分层单元结构,为用户提供多种技术和不同类型的qos级别和带宽。为了分析这种分层单元结构,建立了一个模型,并在马尔可夫链上进行了模型计算。利用跃迁概率,我们计算了状态概率,以验证我们模型的模拟结果。分析模型与仿真结果吻合较好。结果表明,该模型可用于显示随着无线局域网数量和无线局域网用户数量的增加,无线局域网的使用情况如何变化。
{"title":"Maintaining QoS by utilizing hierarchical wireless systems","authors":"H. Persson, J. Karlsson","doi":"10.1109/APCC.2003.1274361","DOIUrl":"https://doi.org/10.1109/APCC.2003.1274361","url":null,"abstract":"Future wireless networks, the systems beyond 3G, will be a combination of different wireless systems. With only one terminal a user should be able to connect to different type of operators, technologies and systems. The issue is also to make the terminal staying online connected, when these changes are made. Both intrasystem handovers and intersystem handovers should be supported by such terminals. The systems will form a hierarchical cell structure, that offer the users several technologies and different type of QoS-levels and bandwidths. To analyze this type of hierarchical cell structure a model has been created, and to verify the model calculations on a Markov-chain have been made. Using the transition probabilities we have calculated the state probabilities, to verify the results from the simulations made of our model. The analytical model and the simulation shows a very good agreement. The results show that the model could be used to show how the WLAN usage will behave as the number of WLANs and WLAN users increase.","PeriodicalId":277507,"journal":{"name":"9th Asia-Pacific Conference on Communications (IEEE Cat. No.03EX732)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134380750","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Virus extermination by vaccine with pursuit function 具有追踪功能的病毒灭活疫苗
Pub Date : 2003-09-21 DOI: 10.1109/APCC.2003.1274230
N. Nakaya, Y. Koui, H. Yoshida, S. Seno, N. Okazaki
Due to the recent increase of computer viruses, anti-virus measures for the safety control of networks occupies the important decision. Since general anti-virus measures depend on the countermeasures by individual users, it is difficult for the network managers to manage these viruses. We propose a novel virus extermination method which enables control of anti-virus measures at the manager level, and evaluate the effectiveness of the proposed method by computer simulations. By using this method, the vaccine which has the infection capability that is equal to the viruses spreads the following viruses and exterminate them. Therefore, it is possible to exterminate all viruses if the network manager prepares some computers that detect and exterminate the viruses.
由于近年来计算机病毒的增多,防病毒措施对于网络的安全控制占有重要的决策地位。由于一般的反病毒措施依赖于个人用户的应对措施,因此网络管理员很难对这些病毒进行管理。我们提出了一种新的病毒消灭方法,能够在管理者层面控制反病毒措施,并通过计算机模拟评估了所提出方法的有效性。通过这种方法,具有与病毒同等感染能力的疫苗可以传播并消灭以下病毒。因此,如果网络管理员准备了一些检测和消灭病毒的计算机,就有可能消灭所有病毒。
{"title":"Virus extermination by vaccine with pursuit function","authors":"N. Nakaya, Y. Koui, H. Yoshida, S. Seno, N. Okazaki","doi":"10.1109/APCC.2003.1274230","DOIUrl":"https://doi.org/10.1109/APCC.2003.1274230","url":null,"abstract":"Due to the recent increase of computer viruses, anti-virus measures for the safety control of networks occupies the important decision. Since general anti-virus measures depend on the countermeasures by individual users, it is difficult for the network managers to manage these viruses. We propose a novel virus extermination method which enables control of anti-virus measures at the manager level, and evaluate the effectiveness of the proposed method by computer simulations. By using this method, the vaccine which has the infection capability that is equal to the viruses spreads the following viruses and exterminate them. Therefore, it is possible to exterminate all viruses if the network manager prepares some computers that detect and exterminate the viruses.","PeriodicalId":277507,"journal":{"name":"9th Asia-Pacific Conference on Communications (IEEE Cat. No.03EX732)","volume":"116 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133383455","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Effectiveness of information systems security in IT organizations in Malaysia 马来西亚IT组织的信息系统安全有效性
Pub Date : 2003-09-21 DOI: 10.1109/APCC.2003.1274451
W. Al-Salihy, J. Ann, R. Sures
As computers become more and more pervasive, information technology (IT) organizations have become so dependent on information systems (IS) for their daily operations and strategic purposes thus intensify the need for IS security. The lack of concern for IS security is evident that organizations are often victimized by computer abuse incidents. Studies on information systems security in Malaysia's IT industry context is very insufficient. This paper will focus on how deterrent actions, preventive actions and organizational actions lead to IS security effectiveness in an IT organization. A survey of Association of Computer and Multimedia Industry of Malaysia (PIKOM) members were conducted. Based on the results of the statistical analysis, a conceptual model of IS security was developed using statistical package for social sciences (SPSS) 8.0. To test the effectiveness of the conceptual model, a case study was done on a typical IT organization to review its IS security status. Finally, findings from this case study were compared with the results from the statistical analysis. The results from the statistical analysis shows that systems environment security control, codes of ethics, security software control and top management support have a positive significant effect on the level of security effectiveness whereas disincentives certainty and organizational maturity was found to have negative significant effect on the level of security effectiveness. Findings from the case study shows that disincentives certainty, systems environment security control, security software control and organizational maturity are key factors contributing to IS security effectiveness while codes of ethics and top management support are insignificant to IS security effectiveness.
随着计算机变得越来越普及,信息技术(IT)组织已经变得如此依赖于信息系统(IS)的日常操作和战略目的,因此加强了对信息系统安全的需求。缺乏对IS安全的关注是显而易见的,组织经常成为计算机滥用事件的受害者。在马来西亚IT产业背景下对信息系统安全的研究非常不足。本文将侧重于威慑行动、预防行动和组织行动如何导致IT组织中的IS安全有效性。对马来西亚计算机和多媒体产业协会(PIKOM)成员进行了一项调查。基于统计分析结果,利用SPSS 8.0软件建立了信息系统安全的概念模型。为了测试概念模型的有效性,对一个典型的IT组织进行了一个案例研究,以审查其IS安全状态。最后,将本案例研究结果与统计分析结果进行比较。统计分析结果表明,系统环境安全控制、道德规范、安全软件控制和高层管理人员支持对安全有效性水平有显著的正向影响,而抑制因素确定性和组织成熟度对安全有效性水平有显著的负向影响。案例研究的结果表明,抑制因素确定性、系统环境安全控制、安全软件控制和组织成熟度是影响信息系统安全有效性的关键因素,而道德规范和高层管理人员的支持对信息系统安全有效性影响不大。
{"title":"Effectiveness of information systems security in IT organizations in Malaysia","authors":"W. Al-Salihy, J. Ann, R. Sures","doi":"10.1109/APCC.2003.1274451","DOIUrl":"https://doi.org/10.1109/APCC.2003.1274451","url":null,"abstract":"As computers become more and more pervasive, information technology (IT) organizations have become so dependent on information systems (IS) for their daily operations and strategic purposes thus intensify the need for IS security. The lack of concern for IS security is evident that organizations are often victimized by computer abuse incidents. Studies on information systems security in Malaysia's IT industry context is very insufficient. This paper will focus on how deterrent actions, preventive actions and organizational actions lead to IS security effectiveness in an IT organization. A survey of Association of Computer and Multimedia Industry of Malaysia (PIKOM) members were conducted. Based on the results of the statistical analysis, a conceptual model of IS security was developed using statistical package for social sciences (SPSS) 8.0. To test the effectiveness of the conceptual model, a case study was done on a typical IT organization to review its IS security status. Finally, findings from this case study were compared with the results from the statistical analysis. The results from the statistical analysis shows that systems environment security control, codes of ethics, security software control and top management support have a positive significant effect on the level of security effectiveness whereas disincentives certainty and organizational maturity was found to have negative significant effect on the level of security effectiveness. Findings from the case study shows that disincentives certainty, systems environment security control, security software control and organizational maturity are key factors contributing to IS security effectiveness while codes of ethics and top management support are insignificant to IS security effectiveness.","PeriodicalId":277507,"journal":{"name":"9th Asia-Pacific Conference on Communications (IEEE Cat. No.03EX732)","volume":"85 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114040220","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
How to succeed in NGcN of Korea 如何在韩国NGcN取得成功
Pub Date : 2003-09-21 DOI: 10.1109/APCC.2003.1274355
J. Won, Gilsoo Chang, Hakseong Jeon, Dong-Seung Kwon
This paper is written for finding out what strategies are in order to succeed in MGcN (next generation convergence network) in Korea. Three kinds of view point - technical, economical, political- are used.
这篇文章是为了找出在韩国MGcN(下一代融合网络)中取得成功的策略而写的。采用了技术、经济、政治三种观点。
{"title":"How to succeed in NGcN of Korea","authors":"J. Won, Gilsoo Chang, Hakseong Jeon, Dong-Seung Kwon","doi":"10.1109/APCC.2003.1274355","DOIUrl":"https://doi.org/10.1109/APCC.2003.1274355","url":null,"abstract":"This paper is written for finding out what strategies are in order to succeed in MGcN (next generation convergence network) in Korea. Three kinds of view point - technical, economical, political- are used.","PeriodicalId":277507,"journal":{"name":"9th Asia-Pacific Conference on Communications (IEEE Cat. No.03EX732)","volume":"135 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114670705","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The performance analysis and simulation of header compression in VoIP services over cellular links 蜂窝链路上VoIP业务报头压缩的性能分析与仿真
Pub Date : 2003-09-21 DOI: 10.1109/APCC.2003.1274437
Yichuan Wu, Jianping Zheng, Kui Huang
In future all IP cellular system, the requirement in terms of voice quality and spectrum efficiency for voice over IP services will reasonably be similar to current requirement on the circuit switched voice services. Hence, comparing with payload, the relatively large IP/UDP/RTP headers of wireless VoIP must be reduced in size by header compression. This paper detailedly analyzes two main header compression algorithms used in current wireless VoIP services. By simulation, the performance of these algorithms in cellular links is evaluated and compared.
在未来的全IP蜂窝系统中,IP语音业务在语音质量和频谱效率方面的要求将合理地与目前对电路交换语音业务的要求相似。因此,与有效载荷相比,无线VoIP中相对较大的IP/UDP/RTP报头必须通过报头压缩来减小其大小。详细分析了目前无线VoIP业务中使用的两种主要报头压缩算法。通过仿真,对这些算法在蜂窝链路中的性能进行了评价和比较。
{"title":"The performance analysis and simulation of header compression in VoIP services over cellular links","authors":"Yichuan Wu, Jianping Zheng, Kui Huang","doi":"10.1109/APCC.2003.1274437","DOIUrl":"https://doi.org/10.1109/APCC.2003.1274437","url":null,"abstract":"In future all IP cellular system, the requirement in terms of voice quality and spectrum efficiency for voice over IP services will reasonably be similar to current requirement on the circuit switched voice services. Hence, comparing with payload, the relatively large IP/UDP/RTP headers of wireless VoIP must be reduced in size by header compression. This paper detailedly analyzes two main header compression algorithms used in current wireless VoIP services. By simulation, the performance of these algorithms in cellular links is evaluated and compared.","PeriodicalId":277507,"journal":{"name":"9th Asia-Pacific Conference on Communications (IEEE Cat. No.03EX732)","volume":"89 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117084530","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Simulation and design of EDFAs for long-haul soliton based communication systems 远距离孤子通信系统中edfa的仿真与设计
Pub Date : 2003-09-21 DOI: 10.1109/APCC.2003.1274302
M. Zafruullah, M. Waris, M.K. Islam
The simulation of EDFA using a long span of Er-doped fiber for the amplification of optical solitons is presented. Various parameters can be varied as a control to optimize soliton amplification. Instead of using lumped amplifiers, a distributed amplification is employed. It is possible to design EDFA for different input pulse widths depending upon the dispersion and loss of the fiber. The effective values of the pump range, fiber dispersion, doping concentration have been varied with in the recommended criterion of the on going progress in carrying out data successfully to the horizon limits. To study amplification, the FWHM of solitons is considered in pica second range only as ultra short soliton pulses suffer from various other effects of higher order dispersion, Raman effect and SSFS. The simulations worked out in this perspective are providing leverage to the existing research on conventional techniques of the signal amplification, development of the EDFAs based on the previous research, as the soliton exploitation approach for the development of EDFAs lead to cope with the long standing desire of long haul communication to pierce through the horizon. The results obtained provide a future guideline to implement them practically. The new systematic trends is available for the researchers to go ahead to explore the hidden nooks of the future optical development.
提出了利用长长度掺铒光纤对光孤子进行放大的EDFA仿真。可以改变各种参数作为控制来优化孤子放大。采用分布式放大器代替集总放大器。根据光纤的色散和损耗,可以为不同的输入脉冲宽度设计EDFA。在将数据成功地进行到水平极限的过程中,在推荐的准则中,对泵浦范围、光纤色散、掺杂浓度的有效值进行了变化。为了研究放大,我们只考虑超短孤子脉冲受到高阶色散、拉曼效应和SSFS等多种影响时,在异频秒范围内的孤子频宽。从这个角度进行的模拟为现有的传统信号放大技术的研究提供了借鉴,在前人研究的基础上开发了edfa,因为开发edfa的孤子开发方法可以解决长期以来对长距离通信穿透地平线的渴望。所得结果为今后的实际应用提供了指导。新的系统趋势为研究人员探索未来光学发展的隐藏角落提供了可能。
{"title":"Simulation and design of EDFAs for long-haul soliton based communication systems","authors":"M. Zafruullah, M. Waris, M.K. Islam","doi":"10.1109/APCC.2003.1274302","DOIUrl":"https://doi.org/10.1109/APCC.2003.1274302","url":null,"abstract":"The simulation of EDFA using a long span of Er-doped fiber for the amplification of optical solitons is presented. Various parameters can be varied as a control to optimize soliton amplification. Instead of using lumped amplifiers, a distributed amplification is employed. It is possible to design EDFA for different input pulse widths depending upon the dispersion and loss of the fiber. The effective values of the pump range, fiber dispersion, doping concentration have been varied with in the recommended criterion of the on going progress in carrying out data successfully to the horizon limits. To study amplification, the FWHM of solitons is considered in pica second range only as ultra short soliton pulses suffer from various other effects of higher order dispersion, Raman effect and SSFS. The simulations worked out in this perspective are providing leverage to the existing research on conventional techniques of the signal amplification, development of the EDFAs based on the previous research, as the soliton exploitation approach for the development of EDFAs lead to cope with the long standing desire of long haul communication to pierce through the horizon. The results obtained provide a future guideline to implement them practically. The new systematic trends is available for the researchers to go ahead to explore the hidden nooks of the future optical development.","PeriodicalId":277507,"journal":{"name":"9th Asia-Pacific Conference on Communications (IEEE Cat. No.03EX732)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116184207","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
User based network (WAN) traffic analysis 基于用户的网络(WAN)流量分析
Pub Date : 2003-09-21 DOI: 10.1109/APCC.2003.1274281
C. Dethe, D. Wakde
Today's complex network traffic is the aggregation of traffic generated by individual sources on network. Therefore access pattern of users is of immense importance in order to model and simulate the network traffic using user characteristics. In this study we identify the parameter matrix to characterise the individual user and compute their correlation analysis in order to find their independence, useful criterion for modeling.
当今复杂的网络流量是网络上各个源产生的流量的集合。因此,为了利用用户特征对网络流量进行建模和仿真,用户的访问方式具有十分重要的意义。在本研究中,我们确定参数矩阵来表征单个用户,并计算它们的相关性分析,以找到它们的独立性,这是建模的有用标准。
{"title":"User based network (WAN) traffic analysis","authors":"C. Dethe, D. Wakde","doi":"10.1109/APCC.2003.1274281","DOIUrl":"https://doi.org/10.1109/APCC.2003.1274281","url":null,"abstract":"Today's complex network traffic is the aggregation of traffic generated by individual sources on network. Therefore access pattern of users is of immense importance in order to model and simulate the network traffic using user characteristics. In this study we identify the parameter matrix to characterise the individual user and compute their correlation analysis in order to find their independence, useful criterion for modeling.","PeriodicalId":277507,"journal":{"name":"9th Asia-Pacific Conference on Communications (IEEE Cat. No.03EX732)","volume":"44 6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123276118","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
The design and application of mobile awareness mechanism in wireless ad hoc networks without GPS 无GPS无线自组网中移动感知机制的设计与应用
Pub Date : 2003-09-21 DOI: 10.1109/APCC.2003.1274330
Chun-Hung Chen, Ho-Ting Wu, Kai-Wei Ke
A mobile ad hoc network is a wireless multihop network without any existing infrastructure. Thus when one node wants to transmit data to another node, it should depend on other nodes to forward it. In such a networking environment, the movement of highly mobile nodes may frequently result in the link breakdown, thus causing network inefficiency and data loss. In this paper, we develop a simple heuristic mechanism to characterize the instant mobility of network nodes. We assume that all network nodes can move arbitrarily, and none of them is equipped with any positioning device (such as the GPS system). Each mobile node is (at any time) classified as either a low mobility node or a high mobility node. A mobile node estimates its own mobility type by comparing the signal strength of consecutive received messages sent by its low mobility neighboring nodes. It then broadcasts this mobility type information to its neighbors. The mobility estimation algorithm is thus fully distributed and self organized. We then apply the estimated mobility characteristics to the construction of the end-to-end routing path. Two methods of selecting low mobility nodes as the primary intermediate routing nodes are presented. Performance evaluations via simulations have demonstrated the robustness of such a mobile awareness algorithm.
移动自组织网络是一种没有任何现有基础设施的无线多跳网络。因此,当一个节点想要向另一个节点传输数据时,它应该依赖于其他节点来转发数据。在这种组网环境下,高移动性节点的移动可能会频繁导致链路中断,从而造成网络效率低下和数据丢失。在本文中,我们开发了一个简单的启发式机制来表征网络节点的即时移动性。我们假设所有的网络节点都可以任意移动,并且没有安装任何定位设备(如GPS系统)。每个可移动节点(在任何时候)都被分类为低可移动节点或高可移动节点。移动节点通过比较低迁移率相邻节点发送的连续接收消息的信号强度来估计自己的迁移类型。然后,它将这种移动类型信息广播给它的邻居。因此,机动性估计算法是完全分布式和自组织的。然后,我们将估计的移动性特征应用于端到端路由路径的构建。提出了两种选择低迁移率节点作为主中间路由节点的方法。通过仿真的性能评估证明了这种移动感知算法的鲁棒性。
{"title":"The design and application of mobile awareness mechanism in wireless ad hoc networks without GPS","authors":"Chun-Hung Chen, Ho-Ting Wu, Kai-Wei Ke","doi":"10.1109/APCC.2003.1274330","DOIUrl":"https://doi.org/10.1109/APCC.2003.1274330","url":null,"abstract":"A mobile ad hoc network is a wireless multihop network without any existing infrastructure. Thus when one node wants to transmit data to another node, it should depend on other nodes to forward it. In such a networking environment, the movement of highly mobile nodes may frequently result in the link breakdown, thus causing network inefficiency and data loss. In this paper, we develop a simple heuristic mechanism to characterize the instant mobility of network nodes. We assume that all network nodes can move arbitrarily, and none of them is equipped with any positioning device (such as the GPS system). Each mobile node is (at any time) classified as either a low mobility node or a high mobility node. A mobile node estimates its own mobility type by comparing the signal strength of consecutive received messages sent by its low mobility neighboring nodes. It then broadcasts this mobility type information to its neighbors. The mobility estimation algorithm is thus fully distributed and self organized. We then apply the estimated mobility characteristics to the construction of the end-to-end routing path. Two methods of selecting low mobility nodes as the primary intermediate routing nodes are presented. Performance evaluations via simulations have demonstrated the robustness of such a mobile awareness algorithm.","PeriodicalId":277507,"journal":{"name":"9th Asia-Pacific Conference on Communications (IEEE Cat. No.03EX732)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123460745","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Radiation characteristics of inclined slot antenna on conducting spherical cavity 斜槽天线在导电球腔上的辐射特性
Pub Date : 2003-09-21 DOI: 10.1109/APCC.2003.1274241
C. Phongcharoenpanich, D. Boonrod, M. Krairiksh
This paper presents theoretical investigations of the characteristics such as radiation pattern, half-power beamwidth, directivity, front-to-back ratio and polarization of an inclined slot on spherical surface. The total fields inside the cavity are formulated by means of the combination of TE and TM modes. The unknown coefficients of the fields are determined by imposing the boundary conditions. The voltage distribution along the slot is reasonably assumed to be the sinusoidal functions. The numerical results of radiation characteristics for various radii of the spherical surface are illustrated. The comparisons between horizontal slot and inclined slot are reported. The result of the analysis shows that this technique is very useful for the design of spherical slot array antenna of any orientation.
本文对球面上斜槽的辐射方向图、半功率波束宽度、指向性、前后比和极化等特性进行了理论研究。通过TE和TM模式的结合,得到了腔内的总场。通过施加边界条件来确定场的未知系数。沿槽的电压分布被合理地假设为正弦函数。给出了不同半径球面辐射特性的数值计算结果。报道了水平槽与倾斜槽的比较。分析结果表明,该方法对任意方向的球面缝隙阵列天线的设计都是非常有用的。
{"title":"Radiation characteristics of inclined slot antenna on conducting spherical cavity","authors":"C. Phongcharoenpanich, D. Boonrod, M. Krairiksh","doi":"10.1109/APCC.2003.1274241","DOIUrl":"https://doi.org/10.1109/APCC.2003.1274241","url":null,"abstract":"This paper presents theoretical investigations of the characteristics such as radiation pattern, half-power beamwidth, directivity, front-to-back ratio and polarization of an inclined slot on spherical surface. The total fields inside the cavity are formulated by means of the combination of TE and TM modes. The unknown coefficients of the fields are determined by imposing the boundary conditions. The voltage distribution along the slot is reasonably assumed to be the sinusoidal functions. The numerical results of radiation characteristics for various radii of the spherical surface are illustrated. The comparisons between horizontal slot and inclined slot are reported. The result of the analysis shows that this technique is very useful for the design of spherical slot array antenna of any orientation.","PeriodicalId":277507,"journal":{"name":"9th Asia-Pacific Conference on Communications (IEEE Cat. No.03EX732)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123910092","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
9th Asia-Pacific Conference on Communications (IEEE Cat. No.03EX732)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1