首页 > 最新文献

2009 Fifth Advanced International Conference on Telecommunications最新文献

英文 中文
An Approach on Short Message Service Text Transfer for Turkish GSM Operators 土耳其GSM运营商短消息业务文本传输方法研究
Pub Date : 2009-05-24 DOI: 10.1109/AICT.2009.24
Ahmet Oguz Yilmaz, Cem Ergün, Y. Bi̇ti̇ri̇m
Short Message Service (SMS) has been one of the most popular services in mobile communication for years, and its usage is still growing. However, with the usage of Turkish character(s) in SMS message text, the maximum length of a single message reduces from 160 to 70 characters due to the transmission regulations of SMS designated by Cellular Telecommunications and Internet Association. This results in inconvenient communication for cell phone users and causes extra SMS traffic congestion on GSM networks. In this paper, an algorithm – ThinOn, is proposed to solve problems arising with the usage of Turkish character(s). The proposed algorithm is language independent and can also be a prototype model for other languages having characters not included in GSM alphabet.
短信服务(SMS)多年来一直是移动通信中最受欢迎的服务之一,其使用量仍在增长。然而,由于在SMS消息文本中使用土耳其字符,由于蜂窝电信和互联网协会指定的SMS传输规定,单个消息的最大长度从160个字符减少到70个字符。这给手机用户的通信带来不便,并在GSM网络上造成额外的短信流量拥塞。本文提出了一种解决土耳其语字符使用问题的算法ThinOn。该算法与语言无关,也可以作为GSM字母表中不包含字符的其他语言的原型模型。
{"title":"An Approach on Short Message Service Text Transfer for Turkish GSM Operators","authors":"Ahmet Oguz Yilmaz, Cem Ergün, Y. Bi̇ti̇ri̇m","doi":"10.1109/AICT.2009.24","DOIUrl":"https://doi.org/10.1109/AICT.2009.24","url":null,"abstract":"Short Message Service (SMS) has been one of the most popular services in mobile communication for years, and its usage is still growing. However, with the usage of Turkish character(s) in SMS message text, the maximum length of a single message reduces from 160 to 70 characters due to the transmission regulations of SMS designated by Cellular Telecommunications and Internet Association. This results in inconvenient communication for cell phone users and causes extra SMS traffic congestion on GSM networks. In this paper, an algorithm – ThinOn, is proposed to solve problems arising with the usage of Turkish character(s). The proposed algorithm is language independent and can also be a prototype model for other languages having characters not included in GSM alphabet.","PeriodicalId":409336,"journal":{"name":"2009 Fifth Advanced International Conference on Telecommunications","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121730708","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Empirical Study of Self-Similarity in the Per-User-Connection Arrival Process 每个用户连接到达过程中自相似度的实证研究
Pub Date : 2009-05-24 DOI: 10.1109/AICT.2009.23
G. Verticale
In this paper, we investigate time-correlation of the connection request process of web browsing applications and other Internet applications. Evidence of self-similarity in the Internet traffic has been pointed out in several papers, but mainly with reference to the volume of traffic, to the packet arrival process, or to the connection arrival process of aggregated traffic. In our study, instead, we focus on the process of connection requests coming from a single client and study whether asymptotic self-similarity is evident even when  there is low client activity, the observation window is short, or data is partial. The analysis is performed on publicly available traffic traces that include both Wide Area and Campus Network traffic. To identify time correlations, we use the novel, unbiased estimator of the power-law exponent based on the Modified Allan Variance (MAVAR).  Our results show that self-similarity is evident in web traffic and Domain Name requests, provided that the client is active for more than a few connections.  This study is valuable for researchers interested in the modeling of packet traffic sources or in the monitoring of network activity.
本文研究了web浏览应用程序和其他Internet应用程序的连接请求过程的时间相关性。已经有几篇论文指出了互联网流量中自相似性的证据,但主要是指流量、数据包到达过程或聚合流量的连接到达过程。相反,在我们的研究中,我们关注的是来自单个客户端的连接请求的过程,并研究在客户端活动低、观察窗口短或数据不完整的情况下,渐近自相似性是否明显。分析是在公开可用的流量轨迹上执行的,包括广域网和校园网流量。为了识别时间相关性,我们使用了基于修正Allan方差(MAVAR)的幂律指数的新颖无偏估计。我们的研究结果表明,自相似性在网络流量和域名请求中是明显的,前提是客户端在多个连接中是活跃的。这项研究对对分组流量源建模或网络活动监控感兴趣的研究人员很有价值。
{"title":"An Empirical Study of Self-Similarity in the Per-User-Connection Arrival Process","authors":"G. Verticale","doi":"10.1109/AICT.2009.23","DOIUrl":"https://doi.org/10.1109/AICT.2009.23","url":null,"abstract":"In this paper, we investigate time-correlation of the connection request process of web browsing applications and other Internet applications. Evidence of self-similarity in the Internet traffic has been pointed out in several papers, but mainly with reference to the volume of traffic, to the packet arrival process, or to the connection arrival process of aggregated traffic. In our study, instead, we focus on the process of connection requests coming from a single client and study whether asymptotic self-similarity is evident even when  there is low client activity, the observation window is short, or data is partial. The analysis is performed on publicly available traffic traces that include both Wide Area and Campus Network traffic. To identify time correlations, we use the novel, unbiased estimator of the power-law exponent based on the Modified Allan Variance (MAVAR).  Our results show that self-similarity is evident in web traffic and Domain Name requests, provided that the client is active for more than a few connections.  This study is valuable for researchers interested in the modeling of packet traffic sources or in the monitoring of network activity.","PeriodicalId":409336,"journal":{"name":"2009 Fifth Advanced International Conference on Telecommunications","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121045100","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Method of Admission Control Based on Both Resource Requests and Traffic Measurement and Its Dynamics under On/Off Model Traffic 一种基于资源请求和流量测量的放行控制方法及其在开/关模式下的动态特性
Pub Date : 2009-05-24 DOI: 10.1109/AICT.2009.16
Y. Kanada
A method of admission control based on both resource requests by applications and class-based traffic measurement results was developed. In this method, a wide range of admission-control policy can be realized by adjusting three parameters, α, β, and γ. A policy-server prototype using this method and simulated voice traffic was used in traffic measurements. The measurements results show that the proposed method improves bandwidth usage and decreases call-blocking ratio while incurring low measurement load. Interesting but possibly harmful dynamics (i.e., system behavior) were observed by the simulations using traffic generated by an on/off model. That is, this admission-control method may cause oscillation or long-term evolution that lasts for 100 to 150 minutes, and it may also cause band-width “overshooting”. The range of parameters with which such effects can be properly suppressed and the admission control correctly works was experimentally obtained.
提出了一种基于应用程序资源请求和基于类的流量测量结果的准入控制方法。该方法通过调节α、β和γ三个参数,可以实现大范围的接纳控制策略。在流量测量中使用了使用该方法和模拟语音流量的策略服务器原型。测试结果表明,该方法在降低测量负荷的同时,提高了带宽利用率,降低了呼叫阻塞率。通过使用由开/关模型产生的流量进行模拟,观察到有趣但可能有害的动态(即系统行为)。也就是说,这种导流控制方法可能引起振荡或持续100 ~ 150分钟的长期演化,也可能引起带宽“过冲”。通过实验得到了适当抑制这种影响并使其正确工作的参数范围。
{"title":"A Method of Admission Control Based on Both Resource Requests and Traffic Measurement and Its Dynamics under On/Off Model Traffic","authors":"Y. Kanada","doi":"10.1109/AICT.2009.16","DOIUrl":"https://doi.org/10.1109/AICT.2009.16","url":null,"abstract":"A method of admission control based on both resource requests by applications and class-based traffic measurement results was developed. In this method, a wide range of admission-control policy can be realized by adjusting three parameters, α, β, and γ. A policy-server prototype using this method and simulated voice traffic was used in traffic measurements. The measurements results show that the proposed method improves bandwidth usage and decreases call-blocking ratio while incurring low measurement load. Interesting but possibly harmful dynamics (i.e., system behavior) were observed by the simulations using traffic generated by an on/off model. That is, this admission-control method may cause oscillation or long-term evolution that lasts for 100 to 150 minutes, and it may also cause band-width “overshooting”. The range of parameters with which such effects can be properly suppressed and the admission control correctly works was experimentally obtained.","PeriodicalId":409336,"journal":{"name":"2009 Fifth Advanced International Conference on Telecommunications","volume":"88 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132319557","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Electrical Model to Sierpenski Gasket Patch Antenna Sierpenski衬垫贴片天线的电学模型
Pub Date : 2009-05-24 DOI: 10.1109/AICT.2009.55
F. Abdelhak, S. Noureddine, G. Ali
This paper covers the design of electrical model of Sierpenski fractal antenna. The proposed model is based on the electrical model of triangular patch. Each elementary triangle of Sierpenski patch is replaced by its model and then the whole model is built. The return loss of the model is compared to both a physical patch and another electrical model. The proposed model has the same resonant frequency with the antenna and a few differences in band width and it’s very useful for parametric analysis of the Sierpenski gasket antenna. This work can open other opportunities in the electrical modeling of fractal antennas.
本文介绍了Sierpenski分形天线的电学模型设计。提出的模型是基于三角块的电模型。将Sierpenski patch的每个初等三角形替换为其模型,然后构建整个模型。将模型的回波损耗与物理贴片和另一个电模型进行比较。该模型具有与天线相同的谐振频率,但带宽有少许差异,对Sierpenski衬垫天线的参数化分析具有重要意义。这项工作可以为分形天线的电建模提供其他机会。
{"title":"An Electrical Model to Sierpenski Gasket Patch Antenna","authors":"F. Abdelhak, S. Noureddine, G. Ali","doi":"10.1109/AICT.2009.55","DOIUrl":"https://doi.org/10.1109/AICT.2009.55","url":null,"abstract":"This paper covers the design of electrical model of Sierpenski fractal antenna. The proposed model is based on the electrical model of triangular patch. Each elementary triangle of Sierpenski patch is replaced by its model and then the whole model is built. The return loss of the model is compared to both a physical patch and another electrical model. The proposed model has the same resonant frequency with the antenna and a few differences in band width and it’s very useful for parametric analysis of the Sierpenski gasket antenna. This work can open other opportunities in the electrical modeling of fractal antennas.","PeriodicalId":409336,"journal":{"name":"2009 Fifth Advanced International Conference on Telecommunications","volume":"33 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114121226","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
System Model Performance Coupled with DPSK Modulation over Flat Rayleigh Fading Channels 在平坦瑞利衰落信道上耦合DPSK调制的系统模型性能
Pub Date : 2009-05-24 DOI: 10.1109/AICT.2009.40
O. Sidek, A. Yahya, M. Salleh
In this paper performance enhancement of the system has been investigated by employing large girth Quasi-Cyclic low-density parity-check (QC-LDPC) codes as forward error correction code, coupled with differential phase shift keying (DPSK) over Rayleigh fading channels. Performance of the system is evaluated by measuring bit error rate (BER) for a given value of . Simulation results at diversity level L=4 have confirmed the robustness of the system with a gain of about 1.5 dB as compared to the results of known differential detection system over Rayleigh Fading Channels at a BER of10^-5 .
本文研究了采用大周长准循环低密度奇偶校验码(QC-LDPC)作为前向纠错码,并在瑞利衰落信道上采用差分相移键控(DPSK)来增强系统的性能。通过测量给定值的误码率(BER)来评估系统的性能。在分集水平L=4下的仿真结果证实了系统的鲁棒性,与已知的瑞利衰落信道上的差分检测系统相比,增益约为1.5 dB,误码率为10^-5。
{"title":"System Model Performance Coupled with DPSK Modulation over Flat Rayleigh Fading Channels","authors":"O. Sidek, A. Yahya, M. Salleh","doi":"10.1109/AICT.2009.40","DOIUrl":"https://doi.org/10.1109/AICT.2009.40","url":null,"abstract":"In this paper performance enhancement of the system has been investigated by employing large girth Quasi-Cyclic low-density parity-check (QC-LDPC) codes as forward error correction code, coupled with differential phase shift keying (DPSK) over Rayleigh fading channels. Performance of the system is evaluated by measuring bit error rate (BER) for a given value of . Simulation results at diversity level L=4 have confirmed the robustness of the system with a gain of about 1.5 dB as compared to the results of known differential detection system over Rayleigh Fading Channels at a BER of10^-5 .","PeriodicalId":409336,"journal":{"name":"2009 Fifth Advanced International Conference on Telecommunications","volume":"276 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127293842","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Smart Card Benefits for Trusted Processing of Keys-Tree in WLANs 智能卡对无线局域网中密钥树可信处理的好处
Pub Date : 2009-05-24 DOI: 10.1109/AICT.2009.70
P. Urien
In this paper we introduce ASN.1 scripts, securely computing cryptographic keys-trees, in smart cards. Keys-trees are used by various protocols such as AKA or EAP that are going to be deployed in next generations of wireless networks (WLAN, WiMAX, EUTRAN…). They provide services such as fast re-authentication, handover management, or Mobile IP support. We propose a trusted computing architecture for these structures, based on smart cards. We suggest two kinds of approaches, static trees working with embedded pre-defined keys generators, and dynamic trees, built from scripts. Finally we detail ASN.1 scripts, designed for dynamic keys-trees computing.
本文介绍了智能卡中安全计算密钥树的ASN.1脚本。密钥树用于各种协议,如AKA或EAP,这些协议将部署在下一代无线网络(WLAN、WiMAX、EUTRAN…)中。它们提供快速重新身份验证、移交管理或移动IP支持等服务。我们提出了一种基于智能卡的可信计算体系结构。我们建议使用两种方法,一种是使用嵌入式预定义键生成器的静态树,另一种是使用脚本构建的动态树。最后详细介绍了用于动态键树计算的ASN.1脚本。
{"title":"Smart Card Benefits for Trusted Processing of Keys-Tree in WLANs","authors":"P. Urien","doi":"10.1109/AICT.2009.70","DOIUrl":"https://doi.org/10.1109/AICT.2009.70","url":null,"abstract":"In this paper we introduce ASN.1 scripts, securely computing cryptographic keys-trees, in smart cards. Keys-trees are used by various protocols such as AKA or EAP that are going to be deployed in next generations of wireless networks (WLAN, WiMAX, EUTRAN…). They provide services such as fast re-authentication, handover management, or Mobile IP support. We propose a trusted computing architecture for these structures, based on smart cards. We suggest two kinds of approaches, static trees working with embedded pre-defined keys generators, and dynamic trees, built from scripts. Finally we detail ASN.1 scripts, designed for dynamic keys-trees computing.","PeriodicalId":409336,"journal":{"name":"2009 Fifth Advanced International Conference on Telecommunications","volume":"177 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124781834","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performance Evaluation of Multicast Routing over Multilayer Multistage Interconnection Networks 多层多级互连网络中组播路由的性能评价
Pub Date : 2009-05-24 DOI: 10.1109/AICT.2009.72
D. C. Vasiliadis, G. Rizos, C. Vassilakis, E. Glavas
Multilayer MINs have emerged mainly due to the increased need for routing capacity in the presence of multicast and broadcast traffic, their performance prediction and evaluation however has not been studied sufficiently insofar. In this paper, we use simulation to evaluate the performance of multilayer MINs with switching elements of different buffer sizes and under different offered loads. The findings of this paper can be used by MIN designers to optimally configure their networks.
多层路由路由的出现主要是由于多播和广播通信对路由容量的需求增加,但其性能预测和评估迄今尚未得到充分的研究。在本文中,我们用仿真的方法来评估具有不同缓冲大小开关元件的多层MINs在不同提供负载下的性能。本文的研究结果可以被最小网络设计者用来优化配置他们的网络。
{"title":"Performance Evaluation of Multicast Routing over Multilayer Multistage Interconnection Networks","authors":"D. C. Vasiliadis, G. Rizos, C. Vassilakis, E. Glavas","doi":"10.1109/AICT.2009.72","DOIUrl":"https://doi.org/10.1109/AICT.2009.72","url":null,"abstract":"Multilayer MINs have emerged mainly due to the increased need for routing capacity in the presence of multicast and broadcast traffic, their performance prediction and evaluation however has not been studied sufficiently insofar. In this paper, we use simulation to evaluate the performance of multilayer MINs with switching elements of different buffer sizes and under different offered loads. The findings of this paper can be used by MIN designers to optimally configure their networks.","PeriodicalId":409336,"journal":{"name":"2009 Fifth Advanced International Conference on Telecommunications","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122323113","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A Framework for Access Control and Management in Dynamic Cooperative and Federated Environments 动态合作与联邦环境下的访问控制与管理框架
Pub Date : 2009-05-24 DOI: 10.1109/AICT.2009.81
Malohat Ibrohimovna, S. Groot
Personal devices can form a person-centric network, which is known as a Personal Network (PN). Besides person-oriented communications, there is a growing tendency for group-oriented communications, since it enables the users to enjoy cooperation and promises exciting opportunities for different applications in various fields, such as, entertainment, business healthcare, emergency and education. A Federation of PNs (Fednet) is a group-oriented network that enables the users to federate their personal networks and to share personal resources and services to achieve a common objective. One of the challenges in Fednets is managing a secure dynamic cooperation of PNs. In this paper, we present a secure access control and management framework for Fednets. The framework is based on the two-level approach to the access control: the access to the Fednet and the access to Fednet resources and services. The access control contains authentication, authorization and token granting processes. Furthermore, in this paper, we describe our initial prototyping experience of this framework. Preliminary results showed that the approach is suitable for Fednets of small sizes and therefore, further work is required to investigate the scalability issues. Finally, we briefly discuss the related work.
个人设备可以形成以人为中心的网络,称为个人网络(Personal network, PN)。除了面向个人的通信之外,面向群体的通信也有增长的趋势,因为它使用户能够享受合作,并为各种领域的不同应用提供了令人兴奋的机会,例如娱乐,商业,医疗保健,应急和教育。联邦网络(Federation of pn, federnet)是一种面向群体的网络,用户可以通过联合个人网络,共享个人资源和服务,实现共同的目标。联邦网络面临的挑战之一是如何管理pn之间的安全动态合作。在本文中,我们提出了一个联邦储备网的安全访问控制和管理框架。该框架基于访问控制的两级方法:对Fednet的访问和对Fednet资源和服务的访问。访问控制包含身份验证、授权和令牌授予过程。此外,在本文中,我们描述了我们对该框架的初始原型设计经验。初步结果表明,该方法适用于小型Fednets,因此,需要进一步研究可扩展性问题。最后,对相关工作进行了简要讨论。
{"title":"A Framework for Access Control and Management in Dynamic Cooperative and Federated Environments","authors":"Malohat Ibrohimovna, S. Groot","doi":"10.1109/AICT.2009.81","DOIUrl":"https://doi.org/10.1109/AICT.2009.81","url":null,"abstract":"Personal devices can form a person-centric network, which is known as a Personal Network (PN). Besides person-oriented communications, there is a growing tendency for group-oriented communications, since it enables the users to enjoy cooperation and promises exciting opportunities for different applications in various fields, such as, entertainment, business healthcare, emergency and education. A Federation of PNs (Fednet) is a group-oriented network that enables the users to federate their personal networks and to share personal resources and services to achieve a common objective. One of the challenges in Fednets is managing a secure dynamic cooperation of PNs. In this paper, we present a secure access control and management framework for Fednets. The framework is based on the two-level approach to the access control: the access to the Fednet and the access to Fednet resources and services. The access control contains authentication, authorization and token granting processes. Furthermore, in this paper, we describe our initial prototyping experience of this framework. Preliminary results showed that the approach is suitable for Fednets of small sizes and therefore, further work is required to investigate the scalability issues. Finally, we briefly discuss the related work.","PeriodicalId":409336,"journal":{"name":"2009 Fifth Advanced International Conference on Telecommunications","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115094454","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
The Outage Probability and Fade Duration of the SSC Combiner Output Signal in the Presence of Rice Fading 水稻衰落下SSC合成器输出信号的中断概率和衰落持续时间
Pub Date : 2009-05-24 DOI: 10.1109/AICT.2009.57
D. Krstić, M. Stefanovic, P. Nikolic, S. Jovkovic, C. Stefanovic
The level crossing rate, the outage probability and the average time of fade duration of the Switch and Stay Combiner output signal, in the presence of Rice fading at the input, are determined in this paper. The results are shown graphically for different variance values, decision threshold values and signal and fading parameters values.
在输入端存在莱斯衰落的情况下,确定了开关与停留合成器输出信号的电平交叉率、中断概率和平均衰落持续时间。对不同的方差值、决策阈值以及信号和衰落参数值进行了图形化分析。
{"title":"The Outage Probability and Fade Duration of the SSC Combiner Output Signal in the Presence of Rice Fading","authors":"D. Krstić, M. Stefanovic, P. Nikolic, S. Jovkovic, C. Stefanovic","doi":"10.1109/AICT.2009.57","DOIUrl":"https://doi.org/10.1109/AICT.2009.57","url":null,"abstract":"The level crossing rate, the outage probability and the average time of fade duration of the Switch and Stay Combiner output signal, in the presence of Rice fading at the input, are determined in this paper. The results are shown graphically for different variance values, decision threshold values and signal and fading parameters values.","PeriodicalId":409336,"journal":{"name":"2009 Fifth Advanced International Conference on Telecommunications","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133663741","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Modelling Limited-Availability Groups with BPP Traffic and Bandwidth Reservation 基于BPP流量和带宽预留的有限可用组建模
Pub Date : 2009-05-24 DOI: 10.1109/AICT.2009.21
M. Głąbowski, M. Sobieraj, M. Stasiak
The article proposes a new method for calculating occupancy distribution and blocking/loss probability in the limited availability group with bandwidth reservation. The proposed method makes it possible to model groups servicing multi-service BPP traffic streams (Binomial--Poisson--Pascal). The proposed method is based on the analysis of the service process occurring in the considered system on the basis of the one-dimensional Markov chain. Significant increase in the accuracy and precision of the proposed method, in relation to other methods known from the literature, was obtained as the result of a modification of service streams within the reservation space. The accuracy of the proposed method has been verified by simulation studies.
提出了一种具有带宽预留的有限可用群中占用分布和阻塞/丢失概率的计算方法。所提出的方法使得对服务于多业务BPP流量流(Binomial- Poisson- Pascal)的组进行建模成为可能。该方法基于一维马尔可夫链对所考虑系统中发生的服务过程进行分析。与文献中已知的其他方法相比,所提出方法的准确性和精密度显著提高,这是对预订空间内的服务流进行修改的结果。仿真研究验证了该方法的准确性。
{"title":"Modelling Limited-Availability Groups with BPP Traffic and Bandwidth Reservation","authors":"M. Głąbowski, M. Sobieraj, M. Stasiak","doi":"10.1109/AICT.2009.21","DOIUrl":"https://doi.org/10.1109/AICT.2009.21","url":null,"abstract":"The article proposes a new method for calculating occupancy distribution and blocking/loss probability in the limited availability group with bandwidth reservation. The proposed method makes it possible to model groups servicing multi-service BPP traffic streams (Binomial--Poisson--Pascal). The proposed method is based on the analysis of the service process occurring in the considered system on the basis of the one-dimensional Markov chain. Significant increase in the accuracy and precision of the proposed method, in relation to other methods known from the literature, was obtained as the result of a modification of service streams within the reservation space. The accuracy of the proposed method has been verified by simulation studies.","PeriodicalId":409336,"journal":{"name":"2009 Fifth Advanced International Conference on Telecommunications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133506307","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
期刊
2009 Fifth Advanced International Conference on Telecommunications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1