首页 > 最新文献

2010 Fifth International Conference on Digital Telecommunications最新文献

英文 中文
An Innovative Solution for Cloud Computing Authentication: Grids of EAP-TLS Smart Cards 云计算认证的创新解决方案:EAP-TLS智能卡网格
Pub Date : 2010-06-13 DOI: 10.1109/ICDT.2010.12
P. Urien, Estel Marie, Christophe Kiennert
The increase of authenticating solutions based on RADIUS servers questions the complexity of their administration whose security and confidentiality are often at fault especially within Cloud Computing architectures. More specifically, it raises the concern of server administration in a secure environment for both the granting access’ company and its clients. This paper aims to solve this issue by proposing an innovative paradigm based on a grid of smart cards built on a context of SSL smart cards. We believe that EAP-TLS server smart cards offer the security and the simplicity required for an administration based on distributed servers. We specify the design of a RADIUS server in which EAP messages are fully processed by SSL smart cards. We present the scalability of this server linked to smart card grids whose distributed computation manages the concurrence of numerous authenticating sessions. Lastly, we relate the details of the first experimental results obtained with the RADIUS server and an array composed of 32 Java cards, and demonstrate the feasibility and prospective scalability of this architecture.
基于RADIUS服务器的身份验证解决方案的增加对其管理的复杂性提出了质疑,特别是在云计算架构中,其安全性和机密性经常存在问题。更具体地说,它引起了对授予访问权限的公司及其客户的安全环境中的服务器管理的关注。本文旨在通过提出一种基于基于SSL智能卡环境的智能卡网格的创新范例来解决这一问题。我们相信EAP-TLS服务器智能卡为基于分布式服务器的管理提供了所需的安全性和简便性。我们指定了RADIUS服务器的设计,其中EAP消息完全由SSL智能卡处理。我们介绍了连接到智能卡网格的服务器的可扩展性,智能卡网格的分布式计算管理大量身份验证会话的并发性。最后,我们详细介绍了RADIUS服务器和由32个Java卡组成的阵列的初步实验结果,并论证了该体系结构的可行性和预期的可扩展性。
{"title":"An Innovative Solution for Cloud Computing Authentication: Grids of EAP-TLS Smart Cards","authors":"P. Urien, Estel Marie, Christophe Kiennert","doi":"10.1109/ICDT.2010.12","DOIUrl":"https://doi.org/10.1109/ICDT.2010.12","url":null,"abstract":"The increase of authenticating solutions based on RADIUS servers questions the complexity of their administration whose security and confidentiality are often at fault especially within Cloud Computing architectures. More specifically, it raises the concern of server administration in a secure environment for both the granting access’ company and its clients. This paper aims to solve this issue by proposing an innovative paradigm based on a grid of smart cards built on a context of SSL smart cards. We believe that EAP-TLS server smart cards offer the security and the simplicity required for an administration based on distributed servers. We specify the design of a RADIUS server in which EAP messages are fully processed by SSL smart cards. We present the scalability of this server linked to smart card grids whose distributed computation manages the concurrence of numerous authenticating sessions. Lastly, we relate the details of the first experimental results obtained with the RADIUS server and an array composed of 32 Java cards, and demonstrate the feasibility and prospective scalability of this architecture.","PeriodicalId":322589,"journal":{"name":"2010 Fifth International Conference on Digital Telecommunications","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130862100","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 31
A Botnet Detection System Based on Neural Networks 基于神经网络的僵尸网络检测系统
Pub Date : 2010-06-13 DOI: 10.1109/ICDT.2010.19
A. Nogueira, P. Salvador, Fábio Blessa
A concerted fight against botnets is needed in order to avoid them from becoming a serious threat to global security in the forthcoming years. Zombie detection is currently performed at the host and/or network levels, but these options have important drawbacks: antivirus, firewalls and anti-spyware are not effective against this threat because they are not able to detect hosts that are compromised via new or target specific malicious software and were not designed to protect the network from external attacks or vulnerabilities that are already present inside the local area network. To overcome these limitations, we propose a new botnet detection approach based on the identification of traffic patterns: since each network application, whether it is licit or illicit, has a characteristic traffic pattern that can uniquely identify it, the detection framework will rely on an Artificial Neural Network to identify the licit and illicit patterns. After the identification phase, the system will generate alarms to the system administrator, that can trigger the most appropriate security actions, like blocking the corresponding IP addresses, putting them under a deeper surveillance or acting over some suspicious network segment. A general detection framework was developed in order to incorporate the detection methodology itself, as well as the data collection and storage modules and all the necessary management functions. Some performance tests were already carried out on the proposed system and the results obtained show that the system is stable and fast and the detection approach is efficient, since it provides high detection rates with low computational overhead.
为了避免僵尸网络在未来几年成为对全球安全的严重威胁,需要对僵尸网络进行协调一致的斗争。僵尸检测目前是在主机和/或网络级别执行的,但这些选项有重要的缺点:防病毒,防火墙和反间谍软件对这种威胁无效,因为它们无法检测到通过新的或目标特定恶意软件受到损害的主机,并且不是为了保护网络免受外部攻击或漏洞而设计的局域网内已经存在。为了克服这些限制,我们提出了一种新的基于流量模式识别的僵尸网络检测方法:由于每个网络应用,无论是合法的还是非法的,都有一个可以唯一识别它的特征流量模式,检测框架将依赖于人工神经网络来识别合法和非法的模式。在识别阶段之后,系统将向系统管理员发出警报,从而触发最适当的安全操作,例如阻止相应的IP地址,将其置于更深的监视之下或对某些可疑的网段进行操作。为了将检测方法本身、数据收集和存储模块以及所有必要的管理功能结合起来,开发了一个通用的检测框架。对所提出的系统进行了一些性能测试,结果表明系统稳定、快速,检测方法高效,因为它提供了高的检测率和低的计算开销。
{"title":"A Botnet Detection System Based on Neural Networks","authors":"A. Nogueira, P. Salvador, Fábio Blessa","doi":"10.1109/ICDT.2010.19","DOIUrl":"https://doi.org/10.1109/ICDT.2010.19","url":null,"abstract":"A concerted fight against botnets is needed in order to avoid them from becoming a serious threat to global security in the forthcoming years. Zombie detection is currently performed at the host and/or network levels, but these options have important drawbacks: antivirus, firewalls and anti-spyware are not effective against this threat because they are not able to detect hosts that are compromised via new or target specific malicious software and were not designed to protect the network from external attacks or vulnerabilities that are already present inside the local area network. To overcome these limitations, we propose a new botnet detection approach based on the identification of traffic patterns: since each network application, whether it is licit or illicit, has a characteristic traffic pattern that can uniquely identify it, the detection framework will rely on an Artificial Neural Network to identify the licit and illicit patterns. After the identification phase, the system will generate alarms to the system administrator, that can trigger the most appropriate security actions, like blocking the corresponding IP addresses, putting them under a deeper surveillance or acting over some suspicious network segment. A general detection framework was developed in order to incorporate the detection methodology itself, as well as the data collection and storage modules and all the necessary management functions. Some performance tests were already carried out on the proposed system and the results obtained show that the system is stable and fast and the detection approach is efficient, since it provides high detection rates with low computational overhead.","PeriodicalId":322589,"journal":{"name":"2010 Fifth International Conference on Digital Telecommunications","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131404763","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 37
HW/SW Co-design Integrating High-Speed Authentication Module for IPSec/IPv6 硬件/软件协同设计集成IPSec/IPv6高速认证模块
Pub Date : 2010-06-13 DOI: 10.1109/ICDT.2010.33
H. Michail, A. Gregoriades, Vassilis Kelefouras, Apostolis Kotsiolis, Dimitra Papagianopoulou, C. Goutis
E.U. has set a special goal for 2010 which is the adoption, by at least 25%, of IPv6. IPv6 incorporates the usage of IPSec which provides cryptographic services to every data packet which is transmitted via Internet. This means that there is a major need for High Speed designs of IPSec protocol. It has been shown that the limiting factor of IPSec performance is the incorporated hash function. Hash functions, form a special family of cryptographic algorithms that satisfy current requirements for security, confidentiality and validity for several applications in technology. In this paper we propose a hardware design and implementation that increases throughput and frequency significantly and at the same time keeps the area small enough for the hash function RIPEMD-160. This technique involves the application of partial unrolling and spatial pre-computation. The proposed technique leads to an implementation with 35% higher throughput than the conventional one.
欧盟为2010年设定了一个特别的目标,即IPv6的采用率至少达到25%。IPv6结合了IPSec的使用,为通过互联网传输的每个数据包提供加密服务。这意味着对IPSec协议的高速设计有很大的需求。结果表明,IPSec性能的限制因素是引入的哈希函数。哈希函数是一种特殊的加密算法,能够满足当前技术应用中对安全性、保密性和有效性的要求。在本文中,我们提出了一种硬件设计和实现,可以显着提高吞吐量和频率,同时保持哈希函数RIPEMD-160的面积足够小。该技术涉及到部分展开和空间预计算的应用。所提出的技术使实现的吞吐量比传统的高35%。
{"title":"HW/SW Co-design Integrating High-Speed Authentication Module for IPSec/IPv6","authors":"H. Michail, A. Gregoriades, Vassilis Kelefouras, Apostolis Kotsiolis, Dimitra Papagianopoulou, C. Goutis","doi":"10.1109/ICDT.2010.33","DOIUrl":"https://doi.org/10.1109/ICDT.2010.33","url":null,"abstract":"E.U. has set a special goal for 2010 which is the adoption, by at least 25%, of IPv6. IPv6 incorporates the usage of IPSec which provides cryptographic services to every data packet which is transmitted via Internet. This means that there is a major need for High Speed designs of IPSec protocol. It has been shown that the limiting factor of IPSec performance is the incorporated hash function. Hash functions, form a special family of cryptographic algorithms that satisfy current requirements for security, confidentiality and validity for several applications in technology. In this paper we propose a hardware design and implementation that increases throughput and frequency significantly and at the same time keeps the area small enough for the hash function RIPEMD-160. This technique involves the application of partial unrolling and spatial pre-computation. The proposed technique leads to an implementation with 35% higher throughput than the conventional one.","PeriodicalId":322589,"journal":{"name":"2010 Fifth International Conference on Digital Telecommunications","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132837553","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Prefilter Bandwidth Effects in Sequential Symbol Synchronizers Based on Clock Sampling 基于时钟采样的顺序符号同步器预滤波带宽效应
Pub Date : 2010-06-13 DOI: 10.1109/ICDT.2010.39
A. Reis, J. F. Rocha, A. Gameiro, J. P. Carvalho
Abstract- This work studies the prefilter bandwidth effects on the symbol synchronizer based on clock sampling.The prefilter bandwidth B is changed between three values, namely B1=• (infinite), B2=2.tx and B3=1.tx, where tx is the transmission rate.We use also the sequential symbol synchronizer based on clock sampling, with the variant discrete and continuous. Each variant has two versions which are the manual and the automatic.The objective is to study the prefilter bandwidth with the four symbol synchronizers and to evaluate their output jitter UIRMS (Unit Interval Root Mean Square) versus input SNR (Signal to Noise Ratio).
摘要:本文研究了基于时钟采样的预滤波器带宽对符号同步器的影响。预滤波器带宽B在三个值之间变化,即B1=•(无限),B2=2。tx和B3=1。Tx,其中Tx是传输速率。我们还采用了基于时钟采样的顺序符号同步器,具有离散和连续两种形式。每个型号都有手动和自动两个版本。目的是研究四个符号同步器的预滤波器带宽,并评估它们的输出抖动UIRMS(单位间隔均方根)与输入信噪比(信噪比)。
{"title":"Prefilter Bandwidth Effects in Sequential Symbol Synchronizers Based on Clock Sampling","authors":"A. Reis, J. F. Rocha, A. Gameiro, J. P. Carvalho","doi":"10.1109/ICDT.2010.39","DOIUrl":"https://doi.org/10.1109/ICDT.2010.39","url":null,"abstract":"Abstract- This work studies the prefilter bandwidth effects on the symbol synchronizer based on clock sampling.The prefilter bandwidth B is changed between three values, namely B1=• (infinite), B2=2.tx and B3=1.tx, where tx is the transmission rate.We use also the sequential symbol synchronizer based on clock sampling, with the variant discrete and continuous. Each variant has two versions which are the manual and the automatic.The objective is to study the prefilter bandwidth with the four symbol synchronizers and to evaluate their output jitter UIRMS (Unit Interval Root Mean Square) versus input SNR (Signal to Noise Ratio).","PeriodicalId":322589,"journal":{"name":"2010 Fifth International Conference on Digital Telecommunications","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114760556","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Environment Recognition Using Selected MPEG-7 Audio Features and Mel-Frequency Cepstral Coefficients 使用选定的MPEG-7音频特征和mel -频率倒谱系数的环境识别
Pub Date : 2010-06-13 DOI: 10.1109/ICDT.2010.10
G. Muhammad, Y. Alotaibi, M. Alsulaiman, M. N. Huda
In this paper, we propose a system for environment recognition using selected MPEG-7 audio low level descriptors together with conventional mel-frequency cepstral coefficients (MFCC). The MPEG-7 descriptors are first ranked based on Fisher’s discriminant ratio. Then principal component analysis is applied on top ranked 30 MPEG-7 descriptors to obtain 13 features. These 13 features are appended with MFCC features to complete the feature set of the proposed system. Gaussian mixture models (GMMs) are used as classifier. The system is evaluated using ten different environment sounds. The experimental results show a significant improvement in recognition performance of the proposed system over MFCC or full MPEG-7 descriptor based systems. For example, the best performance is achieved in Restaurant environment where MFCC, full MPEG-7, and the proposed method give 90%, 94%, and 96% accuracy, respectively.
本文提出了一种基于MPEG-7音频低电平描述符和传统的mel-frequency倒谱系数(MFCC)的环境识别系统。MPEG-7描述符首先根据Fisher判别比进行排序。然后对排名靠前的30个MPEG-7描述符进行主成分分析,得到13个特征。这13个功能与MFCC功能一起附加,以完成拟议系统的功能集。采用高斯混合模型作为分类器。该系统使用十种不同的环境声音进行评估。实验结果表明,与基于MFCC或全MPEG-7描述符的系统相比,该系统的识别性能有显著提高。例如,在餐厅环境中,MFCC、全MPEG-7和所提出的方法分别给出了90%、94%和96%的准确率,达到了最佳性能。
{"title":"Environment Recognition Using Selected MPEG-7 Audio Features and Mel-Frequency Cepstral Coefficients","authors":"G. Muhammad, Y. Alotaibi, M. Alsulaiman, M. N. Huda","doi":"10.1109/ICDT.2010.10","DOIUrl":"https://doi.org/10.1109/ICDT.2010.10","url":null,"abstract":"In this paper, we propose a system for environment recognition using selected MPEG-7 audio low level descriptors together with conventional mel-frequency cepstral coefficients (MFCC). The MPEG-7 descriptors are first ranked based on Fisher’s discriminant ratio. Then principal component analysis is applied on top ranked 30 MPEG-7 descriptors to obtain 13 features. These 13 features are appended with MFCC features to complete the feature set of the proposed system. Gaussian mixture models (GMMs) are used as classifier. The system is evaluated using ten different environment sounds. The experimental results show a significant improvement in recognition performance of the proposed system over MFCC or full MPEG-7 descriptor based systems. For example, the best performance is achieved in Restaurant environment where MFCC, full MPEG-7, and the proposed method give 90%, 94%, and 96% accuracy, respectively.","PeriodicalId":322589,"journal":{"name":"2010 Fifth International Conference on Digital Telecommunications","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116877909","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 36
Indoor Localization with Closely Spaced Vivaldi Antennas in Ultra-Wideband 超宽带紧密间隔维瓦尔第天线室内定位
Pub Date : 2010-06-13 DOI: 10.1109/ICDT.2010.14
W. Gerok, T. Kaiser
In this paper a positioning algorithm, based on the utilization of the receiving antenna properties is presented. The algorithm can be applied in Time of Flight (TOF) based localization systems with closely spaced receiving antennas additionally to the time estimation. In this work we present the practical measurements. But better result may be achieved using optimal receiving antennas and antenna spacing. The aim of the paper is to verify the concept in Ultra-Wideband by practical measurements.
本文提出了一种利用接收天线特性的定位算法。除了时间估计外,该算法还可以应用于基于飞行时间(TOF)的近间隔接收天线定位系统。在这项工作中,我们提出了实际的测量方法。但采用最佳的接收天线和天线间距可以获得更好的效果。本文的目的是通过实际测量在超宽带中验证这一概念。
{"title":"Indoor Localization with Closely Spaced Vivaldi Antennas in Ultra-Wideband","authors":"W. Gerok, T. Kaiser","doi":"10.1109/ICDT.2010.14","DOIUrl":"https://doi.org/10.1109/ICDT.2010.14","url":null,"abstract":"In this paper a positioning algorithm, based on the utilization of the receiving antenna properties is presented. The algorithm can be applied in Time of Flight (TOF) based localization systems with closely spaced receiving antennas additionally to the time estimation. In this work we present the practical measurements. But better result may be achieved using optimal receiving antennas and antenna spacing. The aim of the paper is to verify the concept in Ultra-Wideband by practical measurements.","PeriodicalId":322589,"journal":{"name":"2010 Fifth International Conference on Digital Telecommunications","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116953957","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Management of Device Group for Home Automation Network 家庭自动化网络设备组的管理
Pub Date : 2010-06-13 DOI: 10.1109/ICDT.2010.16
J. Ding, Yu-Shiang Sheng, Chia-Shou Tu, Chi-Wei Huang, Jr-Sheng Su
In the past years, the service of digital home almost focuses on the automatic surveillance, automatic controlling and health-care. Currently, how to provide an automatic interconnection and control for different devices on the heterogeneous home network is a very pressing problem. In this paper, we implement a systemic design to connect the heterogeneous networks and devices in the home automation network (HAN). The all devices of remote family can be easy controlled, found, and communicated without manual setting by local family. Simulation results show that the proposed system is a better mechanism for digital home and smart appliances.
在过去的几年里,数字家庭的服务几乎集中在自动监控、自动控制和医疗保健上。目前,如何为异构家庭网络中的不同设备提供自动互联和控制是一个非常紧迫的问题。在本文中,我们实现了一个系统的设计,以连接家庭自动化网络(HAN)中的异构网络和设备。远程家庭的所有设备都可以轻松控制、查找和通信,无需本地家庭手动设置。仿真结果表明,该系统是一种较好的数字家居和智能家电机制。
{"title":"The Management of Device Group for Home Automation Network","authors":"J. Ding, Yu-Shiang Sheng, Chia-Shou Tu, Chi-Wei Huang, Jr-Sheng Su","doi":"10.1109/ICDT.2010.16","DOIUrl":"https://doi.org/10.1109/ICDT.2010.16","url":null,"abstract":"In the past years, the service of digital home almost focuses on the automatic surveillance, automatic controlling and health-care. Currently, how to provide an automatic interconnection and control for different devices on the heterogeneous home network is a very pressing problem. In this paper, we implement a systemic design to connect the heterogeneous networks and devices in the home automation network (HAN). The all devices of remote family can be easy controlled, found, and communicated without manual setting by local family. Simulation results show that the proposed system is a better mechanism for digital home and smart appliances.","PeriodicalId":322589,"journal":{"name":"2010 Fifth International Conference on Digital Telecommunications","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133991998","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Handover Performance Analysis in Mobile Systems with Adaptive Modulation and Coding 自适应调制编码移动系统切换性能分析
Pub Date : 2010-06-13 DOI: 10.1109/ICDT.2010.27
Adriana Kalaydzhieva, B. Tsankov
In this paper, we evaluate the voice traffic performance of an OFDM (Orthogonal Frequency Division Multiplexing) wireless access system. We propose an algorithm for serving handover calls with higher priority than new calls, considering different AMC (adaptive modulation and coding) modes. The purpose is to efficiently utilize the scarce radio resources in order to improve the system performance.
本文对正交频分复用(OFDM)无线接入系统的话音业务性能进行了评价。在考虑不同的AMC(自适应调制和编码)模式的情况下,提出了一种服务优先级高于新呼叫的切换呼叫算法。其目的是为了有效地利用稀缺的无线电资源,以提高系统性能。
{"title":"Handover Performance Analysis in Mobile Systems with Adaptive Modulation and Coding","authors":"Adriana Kalaydzhieva, B. Tsankov","doi":"10.1109/ICDT.2010.27","DOIUrl":"https://doi.org/10.1109/ICDT.2010.27","url":null,"abstract":"In this paper, we evaluate the voice traffic performance of an OFDM (Orthogonal Frequency Division Multiplexing) wireless access system. We propose an algorithm for serving handover calls with higher priority than new calls, considering different AMC (adaptive modulation and coding) modes. The purpose is to efficiently utilize the scarce radio resources in order to improve the system performance.","PeriodicalId":322589,"journal":{"name":"2010 Fifth International Conference on Digital Telecommunications","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122202421","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Peer-to-Peer IPTV Service Impact on Network Traffic p2p IPTV业务对网络流量的影响
Pub Date : 2010-06-13 DOI: 10.1109/ICDT.2010.32
Javier Garcia Rodrigo, R. P. Leal, Encarna Pastor Martín
Peer-to-Peer applications for real-time video and continuous media streaming, known as Peer-to-Peer IP Television, have become a common way to distribute contents via IP networks. This leads to a significant traffic increase produced by the fast expansion of these kinds of applications. The paper proposes a model and several scenarios to simulate a representative Peer-to-Peer IP Television mesh-pull like architecture in terms of functionality and users behaviour in open networks. Overlay and underlay networks simulations have been performed using Oversim and OMNet++ tools respectively. The results show an excess of bandwidth consumed by the dispersion of end users that is a critical problem because of unnecessary traffic burden in the network core.
实时视频和连续媒体流的点对点应用,即点对点IP电视,已经成为通过IP网络分发内容的一种常用方式。这导致这些类型的应用程序的快速扩展所产生的流量显著增加。本文提出了一个模型和几个场景来模拟开放网络中具有代表性的点对点IP电视网拉式架构的功能和用户行为。分别使用Oversim和omnet++工具对覆盖和底层网络进行了仿真。结果表明,由于网络核心中不必要的流量负担,最终用户分散所消耗的带宽过剩是一个关键问题。
{"title":"Peer-to-Peer IPTV Service Impact on Network Traffic","authors":"Javier Garcia Rodrigo, R. P. Leal, Encarna Pastor Martín","doi":"10.1109/ICDT.2010.32","DOIUrl":"https://doi.org/10.1109/ICDT.2010.32","url":null,"abstract":"Peer-to-Peer applications for real-time video and continuous media streaming, known as Peer-to-Peer IP Television, have become a common way to distribute contents via IP networks. This leads to a significant traffic increase produced by the fast expansion of these kinds of applications. The paper proposes a model and several scenarios to simulate a representative Peer-to-Peer IP Television mesh-pull like architecture in terms of functionality and users behaviour in open networks. Overlay and underlay networks simulations have been performed using Oversim and OMNet++ tools respectively. The results show an excess of bandwidth consumed by the dispersion of end users that is a critical problem because of unnecessary traffic burden in the network core.","PeriodicalId":322589,"journal":{"name":"2010 Fifth International Conference on Digital Telecommunications","volume":"255 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115779190","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Recommendation System Based on Location and Presence Information of Users in a Mobile Network 基于移动网络中用户位置和存在信息的推荐系统
Pub Date : 2010-06-13 DOI: 10.1109/ICDT.2010.25
Demóstenes Zegarra, J. Sousa, Bruno H. C. Faria, Eduardo Costa Alfaia
Cellular network operators have as main objectives the personalization of the offered services to their subscribers in an individual way or for groups with the same preferences. In this paper a new Personalized Recommendation System Architecture based on the geographic localization of the cellular users is described over which different services or solutions can be offered. For the mechanism of the users data collection, the Cell Broadcast technology is used, forming groups of users with similar preferences according association algorithms. This system also considers different presence levels (available, busy and absent) of the cellular users as an additional decision factor for sending or not the recommendation message and using for this purpose a application server connected to IMS (IP Multimedia Subsystem). A feedback mechanism based on the user satisfaction degree is also considered, to improve the efficiency of the system.
蜂窝网络运营商的主要目标是以个人方式或具有相同偏好的群体为其用户提供个性化服务。本文描述了一种新的基于蜂窝用户地理定位的个性化推荐系统架构,在此基础上可以提供不同的服务或解决方案。在用户数据收集机制上,采用小区广播技术,根据关联算法形成具有相似偏好的用户组。该系统还将蜂窝用户的不同状态级别(可用、繁忙和缺席)作为发送或不发送推荐消息的附加决策因素,并为此目的使用连接到IMS (IP多媒体子系统)的应用服务器。为了提高系统的效率,还考虑了基于用户满意度的反馈机制。
{"title":"Recommendation System Based on Location and Presence Information of Users in a Mobile Network","authors":"Demóstenes Zegarra, J. Sousa, Bruno H. C. Faria, Eduardo Costa Alfaia","doi":"10.1109/ICDT.2010.25","DOIUrl":"https://doi.org/10.1109/ICDT.2010.25","url":null,"abstract":"Cellular network operators have as main objectives the personalization of the offered services to their subscribers in an individual way or for groups with the same preferences. In this paper a new Personalized Recommendation System Architecture based on the geographic localization of the cellular users is described over which different services or solutions can be offered. For the mechanism of the users data collection, the Cell Broadcast technology is used, forming groups of users with similar preferences according association algorithms. This system also considers different presence levels (available, busy and absent) of the cellular users as an additional decision factor for sending or not the recommendation message and using for this purpose a application server connected to IMS (IP Multimedia Subsystem). A feedback mechanism based on the user satisfaction degree is also considered, to improve the efficiency of the system.","PeriodicalId":322589,"journal":{"name":"2010 Fifth International Conference on Digital Telecommunications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130310546","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
期刊
2010 Fifth International Conference on Digital Telecommunications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1