首页 > 最新文献

2004 International Networking and Communication Conference最新文献

英文 中文
Characterization of turbid medium through diffusely backscattering polarized light with matrix calculus-II 基于矩阵演算的混浊介质扩散后向散射偏振光表征
Pub Date : 2004-06-11 DOI: 10.1109/INCC.2004.1366589
S. Firdous, M. Ikram
A diffusely backscattered polarized beam of laser radiation from a turbid medium has been characterized by optics calculus. The Stokes and Mueller parameters of polarized light are represented as a column matrix and the optical turbid medium as a 4/spl times/4 matrix. The tissue like turbid phantom system is considered homogeneous and the scattering medium contains one kind of randomly distributed asymmetric particles. We use polarized light from a He-Ne laser (/spl lambda/=632.5 nm) focused on the scattering medium. Different polarization components of backscattered light are obtained by varying the polarization state of the incident laser light and the analyzer configuration. The calculation of the 16 elements of the output Mueller matrix shows that theoretically only seven elements of backscattered light are independent and the remaining nine can be calculated through a symmetry relation. It is also confirmed through experiments. The matrix calculus concept for diffusely backscattered light fully characterizes the turbid medium. The experimental and theoretical results are in good agreement.
用光学演算方法对混浊介质中激光辐射的后向散射偏振光束进行了表征。偏振光的Stokes和Mueller参数表示为柱矩阵,光学混浊介质表示为4/spl × /4矩阵。认为类组织浊影系统是均匀的,散射介质中含有一种随机分布的不对称粒子。我们使用He-Ne激光器(/spl λ /=632.5 nm)的偏振光聚焦在散射介质上。通过改变入射激光的偏振态和分析仪的配置,可以得到不同的后向散射光偏振分量。对输出Mueller矩阵16个元素的计算表明,理论上背散射光只有7个元素是独立的,其余9个元素可以通过对称关系计算出来。实验也证实了这一点。漫射后向散射光的矩阵演算概念充分表征了浑浊介质。实验结果与理论结果吻合较好。
{"title":"Characterization of turbid medium through diffusely backscattering polarized light with matrix calculus-II","authors":"S. Firdous, M. Ikram","doi":"10.1109/INCC.2004.1366589","DOIUrl":"https://doi.org/10.1109/INCC.2004.1366589","url":null,"abstract":"A diffusely backscattered polarized beam of laser radiation from a turbid medium has been characterized by optics calculus. The Stokes and Mueller parameters of polarized light are represented as a column matrix and the optical turbid medium as a 4/spl times/4 matrix. The tissue like turbid phantom system is considered homogeneous and the scattering medium contains one kind of randomly distributed asymmetric particles. We use polarized light from a He-Ne laser (/spl lambda/=632.5 nm) focused on the scattering medium. Different polarization components of backscattered light are obtained by varying the polarization state of the incident laser light and the analyzer configuration. The calculation of the 16 elements of the output Mueller matrix shows that theoretically only seven elements of backscattered light are independent and the remaining nine can be calculated through a symmetry relation. It is also confirmed through experiments. The matrix calculus concept for diffusely backscattered light fully characterizes the turbid medium. The experimental and theoretical results are in good agreement.","PeriodicalId":337263,"journal":{"name":"2004 International Networking and Communication Conference","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-06-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123660917","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Training of line echo canceller with PRBS signals 用PRBS信号训练线路回波消除器
Pub Date : 2004-06-11 DOI: 10.1109/INCC.2004.1366581
A. I. Bhatti, S. I. Shah
The paper addresses the problem of convergence time reduction for the line echo cancellation problem in the context of VoIP applications. Training signals can be used for this purpose. Intuitively speaking, any decorrelated signal, such as white noise, can be used as a training signal. C. Antweiler and H.-G. Symanzik (see Proc. ICASSP-1995, p.3031-4, 1995) have shown that a certain signal, called perfect sequence, can be such a training signal. The method for generating such signals is not easy to use, neither can it be extended to arbitrary lengths. The authors propose another candidate signal, called maximum length pseudo random binary sequence (mlPRBS), to be a perfect sequence. The conditions on such a signal are further analyzed and highlighted. It is shown that the proposed training signal fulfils such requirements. The claims are backed by simulation results. The simulation elements used are available in the public domain.
本文研究了VoIP应用中线路回波消除问题的收敛时间缩短问题。训练信号可用于此目的。直观地说,任何去相关的信号,如白噪声,都可以作为训练信号。C.安特韦勒和h - g。赛门铁克(参见Proc. icasp -1995, p.3031-4, 1995)已经表明,一个特定的信号,称为完美序列,可以是这样一个训练信号。产生这种信号的方法不容易使用,也不能扩展到任意长度。作者提出了另一个候选信号,称为最大长度伪随机二进制序列(mlPRBS),作为一个完美序列。进一步分析并强调了产生这种信号的条件。实验表明,所提出的训练信号满足上述要求。这些说法得到了仿真结果的支持。所使用的模拟元素在公共领域是可用的。
{"title":"Training of line echo canceller with PRBS signals","authors":"A. I. Bhatti, S. I. Shah","doi":"10.1109/INCC.2004.1366581","DOIUrl":"https://doi.org/10.1109/INCC.2004.1366581","url":null,"abstract":"The paper addresses the problem of convergence time reduction for the line echo cancellation problem in the context of VoIP applications. Training signals can be used for this purpose. Intuitively speaking, any decorrelated signal, such as white noise, can be used as a training signal. C. Antweiler and H.-G. Symanzik (see Proc. ICASSP-1995, p.3031-4, 1995) have shown that a certain signal, called perfect sequence, can be such a training signal. The method for generating such signals is not easy to use, neither can it be extended to arbitrary lengths. The authors propose another candidate signal, called maximum length pseudo random binary sequence (mlPRBS), to be a perfect sequence. The conditions on such a signal are further analyzed and highlighted. It is shown that the proposed training signal fulfils such requirements. The claims are backed by simulation results. The simulation elements used are available in the public domain.","PeriodicalId":337263,"journal":{"name":"2004 International Networking and Communication Conference","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-06-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126617546","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A high-capacity scheduling algorithm for systems employing embedded modulation 嵌入式调制系统的大容量调度算法
Pub Date : 2004-06-11 DOI: 10.1109/INCC.2004.1366580
S. Nizami, I. Marsland, B. Hashem
The paper proposes a simple scheduling algorithm based on adaptive embedded modulation (EM) for the downlink in urban wireless networks. Embedded modulation allows multiple users to share a single downlink channel simultaneously. The proposed EM scheduling algorithm embeds the user which has the largest carrier-to-interference ratio (C/I) with each of the lower C/I users in turn. Simulation results show that the EM scheduler, employing adaptive coded modulation, can improve the average throughput of a given downlink by up to 33% over a round robin scheduler, while still maintaining acceptable fairness amongst the system users.
提出了一种简单的基于自适应嵌入式调制(EM)的城市无线网络下行链路调度算法。嵌入式调制允许多个用户同时共享单个下行信道。提出的电磁调度算法将载波干扰比(C/I)最大的用户依次嵌入到C/I较低的用户中。仿真结果表明,采用自适应编码调制的EM调度程序可以将给定下行链路的平均吞吐量比轮循调度程序提高33%,同时仍然保持系统用户之间可接受的公平性。
{"title":"A high-capacity scheduling algorithm for systems employing embedded modulation","authors":"S. Nizami, I. Marsland, B. Hashem","doi":"10.1109/INCC.2004.1366580","DOIUrl":"https://doi.org/10.1109/INCC.2004.1366580","url":null,"abstract":"The paper proposes a simple scheduling algorithm based on adaptive embedded modulation (EM) for the downlink in urban wireless networks. Embedded modulation allows multiple users to share a single downlink channel simultaneously. The proposed EM scheduling algorithm embeds the user which has the largest carrier-to-interference ratio (C/I) with each of the lower C/I users in turn. Simulation results show that the EM scheduler, employing adaptive coded modulation, can improve the average throughput of a given downlink by up to 33% over a round robin scheduler, while still maintaining acceptable fairness amongst the system users.","PeriodicalId":337263,"journal":{"name":"2004 International Networking and Communication Conference","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-06-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114575804","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Trustworthy routing with the AODV protocol 使用AODV协议的可靠路由
Pub Date : 2004-06-11 DOI: 10.1109/INCC.2004.1366570
A. Pirzada, A. Datta, C. McDonald
Ad-hoc networks come into existence when two or more wireless mobile nodes agree to pass packets for each other. The wireless range of these nodes is usually limited to hundred of meters; however, with mutual cooperation these nodes are able to provide extended communication coverage. Ad-hoc on-demand distance vector (AODV) is a routing protocol frequently used to establish such networks. The correct execution of the protocol requires sustained benevolent behaviour by all participating nodes. This is difficult to achieve and malicious nodes frequently tamper with the AODV routing process. We propose a novel and pragmatic method for establishing trustworthy routes in an AODV based ad-hoc network without necessitating the use of cryptography. We accentuate that our model is most appropriate for ad-hoc networks that can be established on the fly without requiring a dedicated trust infrastructure or pre-configuration of nodes.
当两个或多个无线移动节点同意相互传递数据包时,Ad-hoc网络就出现了。这些节点的无线范围通常限制在几百米以内;然而,通过相互合作,这些节点能够提供扩展的通信覆盖。Ad-hoc按需距离矢量(AODV)是一种经常用于建立这种网络的路由协议。协议的正确执行需要所有参与节点的持续善意行为。这是很难实现的,恶意节点经常篡改AODV路由过程。我们提出了一种新颖实用的方法,在不需要使用加密技术的情况下,在基于AODV的ad-hoc网络中建立可信路由。我们强调,我们的模型最适合即时建立的ad-hoc网络,而不需要专用的信任基础设施或节点的预配置。
{"title":"Trustworthy routing with the AODV protocol","authors":"A. Pirzada, A. Datta, C. McDonald","doi":"10.1109/INCC.2004.1366570","DOIUrl":"https://doi.org/10.1109/INCC.2004.1366570","url":null,"abstract":"Ad-hoc networks come into existence when two or more wireless mobile nodes agree to pass packets for each other. The wireless range of these nodes is usually limited to hundred of meters; however, with mutual cooperation these nodes are able to provide extended communication coverage. Ad-hoc on-demand distance vector (AODV) is a routing protocol frequently used to establish such networks. The correct execution of the protocol requires sustained benevolent behaviour by all participating nodes. This is difficult to achieve and malicious nodes frequently tamper with the AODV routing process. We propose a novel and pragmatic method for establishing trustworthy routes in an AODV based ad-hoc network without necessitating the use of cryptography. We accentuate that our model is most appropriate for ad-hoc networks that can be established on the fly without requiring a dedicated trust infrastructure or pre-configuration of nodes.","PeriodicalId":337263,"journal":{"name":"2004 International Networking and Communication Conference","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-06-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129089962","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Authenticated routing of table driven protocol in an ad-hoc environment 临时环境中表驱动协议的身份验证路由
Pub Date : 2004-06-11 DOI: 10.1109/INCC.2004.1366568
F. Janjua, S. Sultan, M. Muzaffar, Z. Ahmed, S.A. Khan
Mobile ad-hoc networks (MANETs) are a new paradigm of wireless communication for mobile hosts. Recently, there has been an increased interest in infrastructureless secure mobile ad-hoc networks (SMANETs). One of the fundamental challenges facing the designers of the SMANETs, especially for military networks, is to provide central command and control over the network. The paper presents an optimal solution for such a network by securing an ad-hoc network running a table driven protocol. The system minimizes computation, power dissipation, and bandwidth by customizing the security algorithm for a specific application. We use a semi-centralized technique, instead of a decentralized one, which requires more computational costs along with high consumption of power and bandwidth. The optimized link state routing protocol (OLSR) is used as the protocol, but the solution can be easily tailored for other proactive protocols for ad-hoc networks. Our main focus is on authenticating each mobile node using computationally inexpensive hashing techniques and public key exchange mechanisms in an asymmetric key set-up. In order to protect the protocol from replay attacks, distributed timestamps have been utilized. The goal is a survivable system that works well even in the presence of malicious nodes.
移动自组网(manet)是移动主机无线通信的一种新模式。最近,人们对无基础设施的安全移动自组织网络(smanet)越来越感兴趣。smanet设计者面临的基本挑战之一,特别是军事网络,是对网络提供中央指挥和控制。本文提出了一种通过运行表驱动协议来保护ad-hoc网络的最佳解决方案。系统可根据具体应用定制安全算法,将计算量、功耗和带宽降至最低。我们使用半集中式技术,而不是去中心化技术,这需要更多的计算成本以及高功耗和带宽消耗。使用优化的链路状态路由协议(OLSR)作为协议,但该解决方案可以很容易地针对ad-hoc网络的其他主动协议进行定制。我们的主要重点是在非对称密钥设置中使用计算成本低廉的散列技术和公钥交换机制对每个移动节点进行身份验证。为了保护协议免受重放攻击,使用了分布式时间戳。目标是一个即使在存在恶意节点的情况下也能正常工作的可生存系统。
{"title":"Authenticated routing of table driven protocol in an ad-hoc environment","authors":"F. Janjua, S. Sultan, M. Muzaffar, Z. Ahmed, S.A. Khan","doi":"10.1109/INCC.2004.1366568","DOIUrl":"https://doi.org/10.1109/INCC.2004.1366568","url":null,"abstract":"Mobile ad-hoc networks (MANETs) are a new paradigm of wireless communication for mobile hosts. Recently, there has been an increased interest in infrastructureless secure mobile ad-hoc networks (SMANETs). One of the fundamental challenges facing the designers of the SMANETs, especially for military networks, is to provide central command and control over the network. The paper presents an optimal solution for such a network by securing an ad-hoc network running a table driven protocol. The system minimizes computation, power dissipation, and bandwidth by customizing the security algorithm for a specific application. We use a semi-centralized technique, instead of a decentralized one, which requires more computational costs along with high consumption of power and bandwidth. The optimized link state routing protocol (OLSR) is used as the protocol, but the solution can be easily tailored for other proactive protocols for ad-hoc networks. Our main focus is on authenticating each mobile node using computationally inexpensive hashing techniques and public key exchange mechanisms in an asymmetric key set-up. In order to protect the protocol from replay attacks, distributed timestamps have been utilized. The goal is a survivable system that works well even in the presence of malicious nodes.","PeriodicalId":337263,"journal":{"name":"2004 International Networking and Communication Conference","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-06-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129670448","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A zone-based location service for mobile ad hoc networks 用于移动自组织网络的基于区域的位置服务
Pub Date : 2004-06-11 DOI: 10.1109/INCC.2004.1366567
Z. H. Mir, S.A. Khan
Location-based routing has received significant attention for ad hoc networking. The motivation to use location-based routing is that it eliminates the need to maintain routes and therefore is very well suited for highly mobile networks. However, as an essential prerequisite for location-based routing, a location service is needed from which a node can learn the current position of other nodes present in the network. We present a zone-based location service (ZLS), which provides a mechanism to track the location information of other nodes in mobile ad hoc networks. Preliminary results indicate that the zone-based location service (ZLS) can be combined with a packet forwarding strategy to provide an efficient location-based routing protocol in a mobile ad hoc environment. The simulation results reported are our first steps towards meeting this goal.
基于位置的路由在自组织网络中受到了极大的关注。使用基于位置的路由的动机是,它消除了维护路由的需要,因此非常适合高度移动的网络。然而,作为基于位置路由的必要前提,需要位置服务,节点可以从中了解网络中存在的其他节点的当前位置。我们提出了一种基于区域的位置服务(ZLS),它提供了一种机制来跟踪移动自组织网络中其他节点的位置信息。初步结果表明,基于区域的位置服务(ZLS)可以与分组转发策略相结合,在移动自组织环境中提供一种高效的基于位置的路由协议。报告的模拟结果是我们实现这一目标的第一步。
{"title":"A zone-based location service for mobile ad hoc networks","authors":"Z. H. Mir, S.A. Khan","doi":"10.1109/INCC.2004.1366567","DOIUrl":"https://doi.org/10.1109/INCC.2004.1366567","url":null,"abstract":"Location-based routing has received significant attention for ad hoc networking. The motivation to use location-based routing is that it eliminates the need to maintain routes and therefore is very well suited for highly mobile networks. However, as an essential prerequisite for location-based routing, a location service is needed from which a node can learn the current position of other nodes present in the network. We present a zone-based location service (ZLS), which provides a mechanism to track the location information of other nodes in mobile ad hoc networks. Preliminary results indicate that the zone-based location service (ZLS) can be combined with a packet forwarding strategy to provide an efficient location-based routing protocol in a mobile ad hoc environment. The simulation results reported are our first steps towards meeting this goal.","PeriodicalId":337263,"journal":{"name":"2004 International Networking and Communication Conference","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-06-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121920861","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Liberalizing telecom sector in Pakistan: issues and prospects 巴基斯坦电信部门的自由化:问题和前景
Pub Date : 2004-06-11 DOI: 10.1109/INCC.2004.1366583
M. Akhtar, H. Waqar
The telecommunications sector at the global level is passing through rapid technological developments and an increasingly liberal policy environment. The same holds true for Pakistan where the sector has been exposed to reforms witnessing a significant expansion of both fixed and mobile networks and striking improvements in quality. Pakistan may be categorized among those Asian economies which have partially privatized the state owned telecom sector while deferring the introduction of full scale competition to a future time. There exists a service competition rather than network competition. To inculcate and strengthen the concept of a market driven economy, the government of Pakistan established an independent regulator with the name of Pakistan Telecommunications Authority (PTA) in 1996. The paper reveals the fact that there has been a marked improvement in various fields, like the degree of competition, infrastructure, cost reduction and quality.
全球电信部门正在经历快速的技术发展和日益自由的政策环境。巴基斯坦的情况也是如此,该国电信行业经历了改革,固定和移动网络都得到了显著扩展,质量也有了显著提高。巴基斯坦可能被归类为部分私有化国有电信部门的亚洲经济体之一,同时将全面竞争的引入推迟到未来的时间。存在的是服务竞争,而不是网络竞争。为了灌输和加强市场驱动经济的概念,巴基斯坦政府于1996年建立了一个独立的监管机构,名为巴基斯坦电信管理局(PTA)。本文揭示了这样一个事实,即在竞争程度、基础设施、成本降低和质量等各个领域都有了明显的改善。
{"title":"Liberalizing telecom sector in Pakistan: issues and prospects","authors":"M. Akhtar, H. Waqar","doi":"10.1109/INCC.2004.1366583","DOIUrl":"https://doi.org/10.1109/INCC.2004.1366583","url":null,"abstract":"The telecommunications sector at the global level is passing through rapid technological developments and an increasingly liberal policy environment. The same holds true for Pakistan where the sector has been exposed to reforms witnessing a significant expansion of both fixed and mobile networks and striking improvements in quality. Pakistan may be categorized among those Asian economies which have partially privatized the state owned telecom sector while deferring the introduction of full scale competition to a future time. There exists a service competition rather than network competition. To inculcate and strengthen the concept of a market driven economy, the government of Pakistan established an independent regulator with the name of Pakistan Telecommunications Authority (PTA) in 1996. The paper reveals the fact that there has been a marked improvement in various fields, like the degree of competition, infrastructure, cost reduction and quality.","PeriodicalId":337263,"journal":{"name":"2004 International Networking and Communication Conference","volume":"102 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-06-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124631698","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Compact constellation algorithm for blind equalization of QAM signals QAM信号盲均衡的紧凑星座算法
Pub Date : 2004-06-11 DOI: 10.1109/INCC.2004.1366599
S. Abrar
A new algorithm is presented for the blind equalization of complex signals. This algorithm combines the benefits of the well-known reduced-constellation algorithm (RCA) and decision-directed algorithm (DDA). The contribution lies in the technique of incorporating the sliced symbols (outcome of the decision device) in the weight adaptation process. Unlike the RCA, where the reduced constellation contains only four symbol points, the proposed algorithms uses all symbols of the signal constellation by compacting them in some statistical manner. The steady-state characteristics of the proposed algorithm are demonstrated by way of simulations and are compared to those of RCA. It is observed that the new algorithm has a better steady-state performance than RCA.
提出了一种新的复信号盲均衡算法。该算法结合了著名的约简星座算法(RCA)和决策导向算法(DDA)的优点。其贡献在于将切片符号(决策装置的结果)纳入权重自适应过程的技术。与RCA算法不同的是,在RCA算法中,简化后的星座只包含四个符号点,而该算法通过某种统计方式压缩信号星座的所有符号。通过仿真验证了该算法的稳态特性,并与RCA算法进行了比较。实验结果表明,该算法比RCA算法具有更好的稳态性能。
{"title":"Compact constellation algorithm for blind equalization of QAM signals","authors":"S. Abrar","doi":"10.1109/INCC.2004.1366599","DOIUrl":"https://doi.org/10.1109/INCC.2004.1366599","url":null,"abstract":"A new algorithm is presented for the blind equalization of complex signals. This algorithm combines the benefits of the well-known reduced-constellation algorithm (RCA) and decision-directed algorithm (DDA). The contribution lies in the technique of incorporating the sliced symbols (outcome of the decision device) in the weight adaptation process. Unlike the RCA, where the reduced constellation contains only four symbol points, the proposed algorithms uses all symbols of the signal constellation by compacting them in some statistical manner. The steady-state characteristics of the proposed algorithm are demonstrated by way of simulations and are compared to those of RCA. It is observed that the new algorithm has a better steady-state performance than RCA.","PeriodicalId":337263,"journal":{"name":"2004 International Networking and Communication Conference","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-06-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129401474","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Distributed and scalable message transport service for high performance multi-agent systems 用于高性能多代理系统的分布式和可伸缩消息传输服务
Pub Date : 2004-06-11 DOI: 10.1109/INCC.2004.1366596
S. Bashir, M. Rehman, H. F. Ahmad, A. Ali, H. Suguri
Multi-agent systems are one of the significant areas in the field of distributed systems. Scalability is one of the issues which effect successful deployment of a particular multi-agent system. Performance and scalability of a system cannot be decoupled because, within a limited number of resources, performance of a multi-agent system varies as the load is increased. Message transport service (MTS) provides the means for agents to communicate across the platform. For high performance, MTS must be dynamically scalable. Existing architectures, which are claimed to be scalable, have some shortcomings. They are centralized, and use component replication or distribution, which has some drawbacks. Priority based queues are one way to achieve dynamic scalability at component level. Peer communication channels provide a mechanism to distribute the load while communication is taking place among different machines. Moreover, peer-to-peer architecture is a hybrid approach to achieving scalability, as it is a blend of the merits of component distribution and replication.
多智能体系统是分布式系统研究的重要领域之一。可伸缩性是影响一个特定的多智能体系统成功部署的问题之一。系统的性能和可伸缩性不能解耦,因为在有限数量的资源内,多代理系统的性能会随着负载的增加而变化。消息传输服务(MTS)为代理提供了跨平台通信的手段。为了获得高性能,MTS必须是动态可伸缩的。现有的体系结构,声称是可扩展的,有一些缺点。它们是集中式的,并且使用组件复制或分发,这有一些缺点。基于优先级的队列是在组件级别实现动态可伸缩性的一种方法。对等通信通道提供了一种在不同机器之间进行通信时分配负载的机制。此外,点对点体系结构是实现可伸缩性的一种混合方法,因为它混合了组件分布和复制的优点。
{"title":"Distributed and scalable message transport service for high performance multi-agent systems","authors":"S. Bashir, M. Rehman, H. F. Ahmad, A. Ali, H. Suguri","doi":"10.1109/INCC.2004.1366596","DOIUrl":"https://doi.org/10.1109/INCC.2004.1366596","url":null,"abstract":"Multi-agent systems are one of the significant areas in the field of distributed systems. Scalability is one of the issues which effect successful deployment of a particular multi-agent system. Performance and scalability of a system cannot be decoupled because, within a limited number of resources, performance of a multi-agent system varies as the load is increased. Message transport service (MTS) provides the means for agents to communicate across the platform. For high performance, MTS must be dynamically scalable. Existing architectures, which are claimed to be scalable, have some shortcomings. They are centralized, and use component replication or distribution, which has some drawbacks. Priority based queues are one way to achieve dynamic scalability at component level. Peer communication channels provide a mechanism to distribute the load while communication is taking place among different machines. Moreover, peer-to-peer architecture is a hybrid approach to achieving scalability, as it is a blend of the merits of component distribution and replication.","PeriodicalId":337263,"journal":{"name":"2004 International Networking and Communication Conference","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-06-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128974389","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Design and implementation of a secure Mobile IP protocol 一个安全的移动IP协议的设计与实现
Pub Date : 2004-06-11 DOI: 10.1109/INCC.2004.1366576
M. Mufti, Aasia
As the availability of mobile communication facilities becomes more and more important for the modern information era, there is a growing appreciation of the need to establish mobility standards on strong security foundations. One particular aspect of security that has a great impact in a mobile scenario is authentication. Authentication, by definition, is the guarantee that a received message has indeed originated from the claimed sender. The importance of authentication is highlighted by the growing number of denial of service (DoS) attacks in recent years. The major source of DoS attacks in Mobile IP networks is the absence or weakness of authentication procedures between the various communicating entities. The paper analyzes the security aspects of the basic Mobile IP for IPv4 with reference to DoS attacks. It then presents a new authentication scheme that the authors have developed as a part of a Mobile IP. The scheme is based on public key cryptography and is scalable enough to be adopted on a network of arbitrary size. Protocol implementation is demonstrated by the development of a patch for the Linux kernel.
随着移动通信设施的可用性在现代信息时代变得越来越重要,人们越来越认识到需要在强大的安全基础上建立移动标准。在移动场景中有很大影响的安全性的一个特定方面是身份验证。根据定义,身份验证是对接收到的消息确实来自已声明的发送方的保证。近年来,越来越多的拒绝服务(DoS)攻击凸显了身份验证的重要性。移动IP网络中DoS攻击的主要来源是各种通信实体之间缺乏或薄弱的身份验证程序。本文结合DoS攻击对IPv4基本移动IP的安全性进行了分析。然后,它提出了一个新的身份验证方案,作者已经开发了作为移动IP的一部分。该方案基于公钥加密,并且具有足够的可扩展性,可以在任意大小的网络上采用。协议的实现通过Linux内核补丁的开发来演示。
{"title":"Design and implementation of a secure Mobile IP protocol","authors":"M. Mufti, Aasia","doi":"10.1109/INCC.2004.1366576","DOIUrl":"https://doi.org/10.1109/INCC.2004.1366576","url":null,"abstract":"As the availability of mobile communication facilities becomes more and more important for the modern information era, there is a growing appreciation of the need to establish mobility standards on strong security foundations. One particular aspect of security that has a great impact in a mobile scenario is authentication. Authentication, by definition, is the guarantee that a received message has indeed originated from the claimed sender. The importance of authentication is highlighted by the growing number of denial of service (DoS) attacks in recent years. The major source of DoS attacks in Mobile IP networks is the absence or weakness of authentication procedures between the various communicating entities. The paper analyzes the security aspects of the basic Mobile IP for IPv4 with reference to DoS attacks. It then presents a new authentication scheme that the authors have developed as a part of a Mobile IP. The scheme is based on public key cryptography and is scalable enough to be adopted on a network of arbitrary size. Protocol implementation is demonstrated by the development of a patch for the Linux kernel.","PeriodicalId":337263,"journal":{"name":"2004 International Networking and Communication Conference","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-06-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126438647","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
期刊
2004 International Networking and Communication Conference
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1