Pub Date : 2005-07-11DOI: 10.1109/ICACT.2005.245823
A. Viinikainen, J. Joutsensalo, M. Wikstrom, T. Hamalainen
In this paper we propose a packet scheduling scheme for ensuring bandwidth as a quality of service (QoS) requirement and optimizing revenue of the network service provider. A closed form formula for updating the weights of a packet scheduler is derived from a revenue-based optimization problem. The weight updating procedure is fast and independent on the assumption of the connections' statistical behavior. Also, a call admission control (CAC) is implemented in context of our scenario
{"title":"Pricing and bandwidth allocation for the next generation networks","authors":"A. Viinikainen, J. Joutsensalo, M. Wikstrom, T. Hamalainen","doi":"10.1109/ICACT.2005.245823","DOIUrl":"https://doi.org/10.1109/ICACT.2005.245823","url":null,"abstract":"In this paper we propose a packet scheduling scheme for ensuring bandwidth as a quality of service (QoS) requirement and optimizing revenue of the network service provider. A closed form formula for updating the weights of a packet scheduler is derived from a revenue-based optimization problem. The weight updating procedure is fast and independent on the assumption of the connections' statistical behavior. Also, a call admission control (CAC) is implemented in context of our scenario","PeriodicalId":293442,"journal":{"name":"The 7th International Conference on Advanced Communication Technology, 2005, ICACT 2005.","volume":"416 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117307543","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2005-07-11DOI: 10.1109/ICACT.2005.246082
S. Alampalayam, A. Kumar, S. Srinivasan
Mobile ad hoc networks are infrastructure-free, pervasive, ubiquitous and without any centralized authority. These unique characteristics, combined with security threats, demand solutions for securing ad hoc networks prior to their deployment in commercial and military applications. So far, the research in mobile ad hoc network has been primarily focused on routing and mobility aspects rather than securing the ad hoc network itself. Due to the ever-increasing security threats, there is a need to develop algorithms and protocols for a secured ad hoc network infrastructure. This paper surveys the prevailing mobile ad hoc network security threats and the existing solution schemes
{"title":"Mobile ad hoc network security - a taxonomy","authors":"S. Alampalayam, A. Kumar, S. Srinivasan","doi":"10.1109/ICACT.2005.246082","DOIUrl":"https://doi.org/10.1109/ICACT.2005.246082","url":null,"abstract":"Mobile ad hoc networks are infrastructure-free, pervasive, ubiquitous and without any centralized authority. These unique characteristics, combined with security threats, demand solutions for securing ad hoc networks prior to their deployment in commercial and military applications. So far, the research in mobile ad hoc network has been primarily focused on routing and mobility aspects rather than securing the ad hoc network itself. Due to the ever-increasing security threats, there is a need to develop algorithms and protocols for a secured ad hoc network infrastructure. This paper surveys the prevailing mobile ad hoc network security threats and the existing solution schemes","PeriodicalId":293442,"journal":{"name":"The 7th International Conference on Advanced Communication Technology, 2005, ICACT 2005.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114431276","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2005-07-11DOI: 10.1109/ICACT.2005.245869
S. Koubar, J. Ugon, A. Kruger, A. Rubinov, P. Branch
In wireless local area network (WLAN), signal coverage is obtained by proper placement of access points (APs). The impact of incorrect placement of APs is significant. If they are placed too far apart, they generate a coverage gap but if they are too close to each other, this leads to excessive co-channel interferences. In this paper, we describe a mathematical model we have developed to find the optimal number and location of APs. To solve the problem, we use an optimization algorithm developed at the University of Ballarat called discrete gradient algorithm. Results indicate that our model is able to solve optimal coverage problems for different numbers of users
{"title":"A new algorithm for the placement of WLAN access points based on nonsmooth optimization technique","authors":"S. Koubar, J. Ugon, A. Kruger, A. Rubinov, P. Branch","doi":"10.1109/ICACT.2005.245869","DOIUrl":"https://doi.org/10.1109/ICACT.2005.245869","url":null,"abstract":"In wireless local area network (WLAN), signal coverage is obtained by proper placement of access points (APs). The impact of incorrect placement of APs is significant. If they are placed too far apart, they generate a coverage gap but if they are too close to each other, this leads to excessive co-channel interferences. In this paper, we describe a mathematical model we have developed to find the optimal number and location of APs. To solve the problem, we use an optimization algorithm developed at the University of Ballarat called discrete gradient algorithm. Results indicate that our model is able to solve optimal coverage problems for different numbers of users","PeriodicalId":293442,"journal":{"name":"The 7th International Conference on Advanced Communication Technology, 2005, ICACT 2005.","volume":"2015 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127615302","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2005-07-11DOI: 10.1109/ICACT.2005.246127
Shi Shuo, Kee-Hyun Choi, D. Shin
In this paper, we propose SDRP: a new service discovery protocol combined with routing policies in MANETs. It performs the protocol acting upon a backbone and access network as well as any kind of distributed networks. We describe a service by a unique ID number and use a group-cast routing policy in advertising and requesting. In addition, the nodes in the reply path also cache the advertisement information. We compare SDRP with Flood and AODV in terms of overload, demand throughput and average delay. Simulation results show SDRP can save response time and accommodate even high mobility network environments
{"title":"An integration of distributed service discovery with routing protocols for MANETs","authors":"Shi Shuo, Kee-Hyun Choi, D. Shin","doi":"10.1109/ICACT.2005.246127","DOIUrl":"https://doi.org/10.1109/ICACT.2005.246127","url":null,"abstract":"In this paper, we propose SDRP: a new service discovery protocol combined with routing policies in MANETs. It performs the protocol acting upon a backbone and access network as well as any kind of distributed networks. We describe a service by a unique ID number and use a group-cast routing policy in advertising and requesting. In addition, the nodes in the reply path also cache the advertisement information. We compare SDRP with Flood and AODV in terms of overload, demand throughput and average delay. Simulation results show SDRP can save response time and accommodate even high mobility network environments","PeriodicalId":293442,"journal":{"name":"The 7th International Conference on Advanced Communication Technology, 2005, ICACT 2005.","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128124807","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2005-07-11DOI: 10.1109/ICACT.2005.246017
Chun-geun Kim, S. Ahn, Ig-Jae Kim, Hyoung-Gon Kim
This paper proposes a 3-dimensional (3D) voice over IP (VoIP) system for two user groups with the smallest device requirements. It also presents design issues of the system and some experience in implementation of the system. The proposed system requires only a desktop computer with a multi-channel soundcard installed, USB microphones as many as the number of users, and 3D sound rendering system such as 5.1ch or 7.1ch loudspeaker system. It not only enables multiple users to communicate with a remote group using a single desktop computer, but also enriches the voice of each user with 3D spatial effect. Using the system, the participants can hear the voice of remote users through a 3D sound rendering system, as if each remote user speaks at his or her corresponding position. This system can be used for immersive teleconference system
{"title":"3-dimensional voice communication system for two user groups","authors":"Chun-geun Kim, S. Ahn, Ig-Jae Kim, Hyoung-Gon Kim","doi":"10.1109/ICACT.2005.246017","DOIUrl":"https://doi.org/10.1109/ICACT.2005.246017","url":null,"abstract":"This paper proposes a 3-dimensional (3D) voice over IP (VoIP) system for two user groups with the smallest device requirements. It also presents design issues of the system and some experience in implementation of the system. The proposed system requires only a desktop computer with a multi-channel soundcard installed, USB microphones as many as the number of users, and 3D sound rendering system such as 5.1ch or 7.1ch loudspeaker system. It not only enables multiple users to communicate with a remote group using a single desktop computer, but also enriches the voice of each user with 3D spatial effect. Using the system, the participants can hear the voice of remote users through a 3D sound rendering system, as if each remote user speaks at his or her corresponding position. This system can be used for immersive teleconference system","PeriodicalId":293442,"journal":{"name":"The 7th International Conference on Advanced Communication Technology, 2005, ICACT 2005.","volume":"89 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127136489","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2005-07-11DOI: 10.1109/ICACT.2005.245958
V.C. Joseph, Seol Dong-Myoung, Lee Eun-Ryoung, Kwak Jiyoung, Yu Jang-Hee
Usage of automated teller machines (ATMs) is confined to financial transactions in the present world scenario. Multimedia usage for finance is inhibited by several factors including security and lack of flexible user interface models to proliferate the public environment usage criterion. Financial services become more attractive when the user obtains a plurality of services over existing access methodology using personalized web pages, animated and other customized mobile agents to mimic the usage patterns. We present an intelligent and novel approach to facilitate and propel financial and non-financial services for public environments that seamlessly integrate wireless multimedia applications and digital content over the financial services network. Our design is based on the embedded ATM access point that uses secure software architecture with V2oIP stack to facilitate the usage and creation of a multitude of new services. Dynamic and adaptive context-sensitive GUI with animated icons forms the trend for the next generation of compact ubiquitous devices that proliferate the home network and public environment
{"title":"Modeling UI agents for public environments to enhance the V2oIP embedded ATM access point services","authors":"V.C. Joseph, Seol Dong-Myoung, Lee Eun-Ryoung, Kwak Jiyoung, Yu Jang-Hee","doi":"10.1109/ICACT.2005.245958","DOIUrl":"https://doi.org/10.1109/ICACT.2005.245958","url":null,"abstract":"Usage of automated teller machines (ATMs) is confined to financial transactions in the present world scenario. Multimedia usage for finance is inhibited by several factors including security and lack of flexible user interface models to proliferate the public environment usage criterion. Financial services become more attractive when the user obtains a plurality of services over existing access methodology using personalized web pages, animated and other customized mobile agents to mimic the usage patterns. We present an intelligent and novel approach to facilitate and propel financial and non-financial services for public environments that seamlessly integrate wireless multimedia applications and digital content over the financial services network. Our design is based on the embedded ATM access point that uses secure software architecture with V2oIP stack to facilitate the usage and creation of a multitude of new services. Dynamic and adaptive context-sensitive GUI with animated icons forms the trend for the next generation of compact ubiquitous devices that proliferate the home network and public environment","PeriodicalId":293442,"journal":{"name":"The 7th International Conference on Advanced Communication Technology, 2005, ICACT 2005.","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124955940","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2005-07-11DOI: 10.1109/ICACT.2005.246200
Y. Oh, Quan Le, N.D.B. Yen, Sang-Gug Lee, Ho-Yong Kang, T. Yoo
A fully integrated fiber-optic transmitter chip for gigabit Ethernet applications has been implemented in a CMOS technology. For controlling the transmitted optical power so to obtain reliable and constant averaged optical power, the transmitter proposed in this paper uses separated bias and modulation currents control circuits based on the feedback from the monitoring photo-diode (MPD). The chip was fabricated in a mixed-signal analog CMOS technology with 0.18mum gate length and measurements were implemented in a chip-on-board configuration (COB) using pig-tailed FP laser. Under the burst-mode operation of 1.25Gb/s PRBS, measurements show about 0.5dBm transmitted optical power with above 11dB extinction ratio over a wide temperature range. Based on the measurements, this work complies with the EPON IEEE P802.ah standard
{"title":"A CMOS burst-mode up-stream transmitter for fiber-optic gigabit ethernet applications","authors":"Y. Oh, Quan Le, N.D.B. Yen, Sang-Gug Lee, Ho-Yong Kang, T. Yoo","doi":"10.1109/ICACT.2005.246200","DOIUrl":"https://doi.org/10.1109/ICACT.2005.246200","url":null,"abstract":"A fully integrated fiber-optic transmitter chip for gigabit Ethernet applications has been implemented in a CMOS technology. For controlling the transmitted optical power so to obtain reliable and constant averaged optical power, the transmitter proposed in this paper uses separated bias and modulation currents control circuits based on the feedback from the monitoring photo-diode (MPD). The chip was fabricated in a mixed-signal analog CMOS technology with 0.18mum gate length and measurements were implemented in a chip-on-board configuration (COB) using pig-tailed FP laser. Under the burst-mode operation of 1.25Gb/s PRBS, measurements show about 0.5dBm transmitted optical power with above 11dB extinction ratio over a wide temperature range. Based on the measurements, this work complies with the EPON IEEE P802.ah standard","PeriodicalId":293442,"journal":{"name":"The 7th International Conference on Advanced Communication Technology, 2005, ICACT 2005.","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122486354","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2005-07-11DOI: 10.1109/ICACT.2005.245945
R. Salmeh, B. Maundy, R. Johnston
This paper describes changes of the minimum noise figure of a low noise amplifier designed based on a noise optimization technique. We show that the minimum noise figure of the LNA does not change with changes in Lg. To verify the effects a 1.575 GHz, 0.55 dB noise figure LNA was designed in CMOS 0.13 mum technology. Powered by a 1.1 V supply the LNA features 12.9 dB of gain and is stable over a wide frequency range. The. LNA draws only 1 mA and has an input return loss of -17 dB
本文介绍了基于噪声优化技术设计的低噪声放大器的最小噪声系数的变化。结果表明,LNA的最小噪声系数不随Lg的变化而变化。为了验证效果,采用CMOS 0.13 mum技术设计了一个1.575 GHz、0.55 dB噪声系数的LNA。LNA由1.1 V电源供电,增益12.9 dB,在很宽的频率范围内保持稳定。的。LNA仅吸收1 mA,输入回波损耗为-17 dB
{"title":"Minimum noise figure of a low noise amplifier based on noise optimization technique","authors":"R. Salmeh, B. Maundy, R. Johnston","doi":"10.1109/ICACT.2005.245945","DOIUrl":"https://doi.org/10.1109/ICACT.2005.245945","url":null,"abstract":"This paper describes changes of the minimum noise figure of a low noise amplifier designed based on a noise optimization technique. We show that the minimum noise figure of the LNA does not change with changes in Lg. To verify the effects a 1.575 GHz, 0.55 dB noise figure LNA was designed in CMOS 0.13 mum technology. Powered by a 1.1 V supply the LNA features 12.9 dB of gain and is stable over a wide frequency range. The. LNA draws only 1 mA and has an input return loss of -17 dB","PeriodicalId":293442,"journal":{"name":"The 7th International Conference on Advanced Communication Technology, 2005, ICACT 2005.","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122593423","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2005-07-11DOI: 10.1109/ICACT.2005.245871
Hyung Jung Kim, D. Jee, Man-ho Park, B. Yoon, Song-in Choi
We present the software and hardware implementations of AMR codec for IMT-2000 system. The real-time implementations of AMR codec algorithm are achieved using TMS320C62xx DSP chip and Teak-Lite DSP core. We describe respectively efficient software schemes for coding AMR codec algorithm and hardware designs. The AMR codec is evaluated and confirmed in 3GPP test sequences, stand-alone test system and ETRI IMT-2000 prototype system
{"title":"The real-time implementations of AMR codec for IMT-2000 system","authors":"Hyung Jung Kim, D. Jee, Man-ho Park, B. Yoon, Song-in Choi","doi":"10.1109/ICACT.2005.245871","DOIUrl":"https://doi.org/10.1109/ICACT.2005.245871","url":null,"abstract":"We present the software and hardware implementations of AMR codec for IMT-2000 system. The real-time implementations of AMR codec algorithm are achieved using TMS320C62xx DSP chip and Teak-Lite DSP core. We describe respectively efficient software schemes for coding AMR codec algorithm and hardware designs. The AMR codec is evaluated and confirmed in 3GPP test sequences, stand-alone test system and ETRI IMT-2000 prototype system","PeriodicalId":293442,"journal":{"name":"The 7th International Conference on Advanced Communication Technology, 2005, ICACT 2005.","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124792365","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}