Pub Date : 2008-04-22DOI: 10.1109/ICACT.2008.4494063
N. Maleki, R. Khosravi, M.K. Shokouhi
In this paper, radio relay systems for Synchronous Digital Hierarchy (SDH)-based networks with path type Synchronous transfer Module of order 0 (STM-0) without protection switching and with 1+1 switching configuration as said in Recommendation ITU-R F.750 are considered. Byte Interleaved Parity (BIP) codes are used for error monitoring. Rain causes fading and the blocks are received in errors because of this fading and the SES may occur because of these errored blocks and the system may arrive in unavailable state. In this paper, the unavailability ratios of these two systems are calculated and the results are compared with the objectives in Recommendation ITU-R P.1703 and it is assumed that the link comprises the access portion of a network and forms a part of a national portion of a constant bit rat digital path element.
{"title":"Rain Effects on SDH-based Networks Using Protection Switching","authors":"N. Maleki, R. Khosravi, M.K. Shokouhi","doi":"10.1109/ICACT.2008.4494063","DOIUrl":"https://doi.org/10.1109/ICACT.2008.4494063","url":null,"abstract":"In this paper, radio relay systems for Synchronous Digital Hierarchy (SDH)-based networks with path type Synchronous transfer Module of order 0 (STM-0) without protection switching and with 1+1 switching configuration as said in Recommendation ITU-R F.750 are considered. Byte Interleaved Parity (BIP) codes are used for error monitoring. Rain causes fading and the blocks are received in errors because of this fading and the SES may occur because of these errored blocks and the system may arrive in unavailable state. In this paper, the unavailability ratios of these two systems are calculated and the results are compared with the objectives in Recommendation ITU-R P.1703 and it is assumed that the link comprises the access portion of a network and forms a part of a national portion of a constant bit rat digital path element.","PeriodicalId":448615,"journal":{"name":"2008 10th International Conference on Advanced Communication Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130056528","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2008-04-22DOI: 10.1109/ICACT.2008.4494096
Jie Liu, Jianhua Li
Optimal asymmetric encryption padding (OAEP) is widely accepted because of its provable security and practicability. In this paper, a novel key exchange protocol based on RSA-OAEP cryptosystem was presented. The protocol is efficient in computation and communication. It is secure against known key attack and eavesdrop attack. It also can provide mutual authentication, forward secrecy and key freshness, which are standard security attributes that key exchange protocols should have.
{"title":"A Novel Key Exchange Protocol Based on RSA-OAEP","authors":"Jie Liu, Jianhua Li","doi":"10.1109/ICACT.2008.4494096","DOIUrl":"https://doi.org/10.1109/ICACT.2008.4494096","url":null,"abstract":"Optimal asymmetric encryption padding (OAEP) is widely accepted because of its provable security and practicability. In this paper, a novel key exchange protocol based on RSA-OAEP cryptosystem was presented. The protocol is efficient in computation and communication. It is secure against known key attack and eavesdrop attack. It also can provide mutual authentication, forward secrecy and key freshness, which are standard security attributes that key exchange protocols should have.","PeriodicalId":448615,"journal":{"name":"2008 10th International Conference on Advanced Communication Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130150054","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2008-04-22DOI: 10.1109/ICACT.2008.4493951
S. Chae, Young-il Kim
We propose an enhanced MCS for demodulation-and-forward scheme in transparent RS. The demodulation-and-forward scheme only demodulates and modulates the received signal to relay in symbol-by-symbol manner. In this scheme, RS can relay the received signal within one frame period. However, RS could suffer from frame delay when it adopts decode and forward scheme. In addition, we think that MR-BS is required to have enhanced MCS for demodulation-and-forward scheme instead of the MCS in existing specifications of 802.16e. With making use of coding rate 2/3 and 5/6 for both QPSK and 16-QAM, which is absent between BS and MS link, the link quality between BS and RS can be enhanced by using lower modulation orders. And also, we want to suggest another encoding slot concatenation and its concatenation rule and parameters and its simulations results will show merits of enhanced MCS than existing MCS performances.
{"title":"Enhanced MCS for Direct Relaying in Transparent RS of IEEE 802.16j","authors":"S. Chae, Young-il Kim","doi":"10.1109/ICACT.2008.4493951","DOIUrl":"https://doi.org/10.1109/ICACT.2008.4493951","url":null,"abstract":"We propose an enhanced MCS for demodulation-and-forward scheme in transparent RS. The demodulation-and-forward scheme only demodulates and modulates the received signal to relay in symbol-by-symbol manner. In this scheme, RS can relay the received signal within one frame period. However, RS could suffer from frame delay when it adopts decode and forward scheme. In addition, we think that MR-BS is required to have enhanced MCS for demodulation-and-forward scheme instead of the MCS in existing specifications of 802.16e. With making use of coding rate 2/3 and 5/6 for both QPSK and 16-QAM, which is absent between BS and MS link, the link quality between BS and RS can be enhanced by using lower modulation orders. And also, we want to suggest another encoding slot concatenation and its concatenation rule and parameters and its simulations results will show merits of enhanced MCS than existing MCS performances.","PeriodicalId":448615,"journal":{"name":"2008 10th International Conference on Advanced Communication Technology","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127668922","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2008-04-22DOI: 10.1109/ICACT.2008.4493776
Kyeseon Lee, Nae-Su Kim, D. Kim
In the building outside, the requirement about the sensor network applications increases, but it is difficult to build the sensor network in the building outside the frequency problem. The frequency band issued for the IEEE802.15.4 processed with the physical layer of the sensor network and standard of the MAC layer is 2.4 GHz and 868 / 915 MHz. As to the frequency, which we can use within Korea, 2.4 GHz is unique. 2.4 GHz node is difficult to operate in the building outside. In Korea, the frequency band that we can use as the narrow band is 424 and 447 MHz band. Therefore, the sensor node of 424 or 447 MHz band can operate in Korea was needed.
{"title":"Experience of USN MAC based on 424MHz band IEEE 802.15.4","authors":"Kyeseon Lee, Nae-Su Kim, D. Kim","doi":"10.1109/ICACT.2008.4493776","DOIUrl":"https://doi.org/10.1109/ICACT.2008.4493776","url":null,"abstract":"In the building outside, the requirement about the sensor network applications increases, but it is difficult to build the sensor network in the building outside the frequency problem. The frequency band issued for the IEEE802.15.4 processed with the physical layer of the sensor network and standard of the MAC layer is 2.4 GHz and 868 / 915 MHz. As to the frequency, which we can use within Korea, 2.4 GHz is unique. 2.4 GHz node is difficult to operate in the building outside. In Korea, the frequency band that we can use as the narrow band is 424 and 447 MHz band. Therefore, the sensor node of 424 or 447 MHz band can operate in Korea was needed.","PeriodicalId":448615,"journal":{"name":"2008 10th International Conference on Advanced Communication Technology","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116293916","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2008-04-22DOI: 10.1109/ICACT.2008.4493919
Hung Quoc Vo, C. Hong
Traffic engineering, as its name, is the art of manipulating traffic around so that traffic from congested links is moved onto the unused capacity on the other links. So, providing traffic engineering support in multi-hop wireless network has become increasingly important due to the low bandwidth nature of wireless channels. In this work, we propose a novel approach to control the traffic to avoid congestion by decoupling forwarding process from the routing process. The proposal is interested in provisioning quality of service guarantees for planned Wireless Mesh Networks which are being used widely as a broadband wireless access network.
{"title":"Link Quality-Aware Packet Forwarding Architecture for Wireless Mesh Network","authors":"Hung Quoc Vo, C. Hong","doi":"10.1109/ICACT.2008.4493919","DOIUrl":"https://doi.org/10.1109/ICACT.2008.4493919","url":null,"abstract":"Traffic engineering, as its name, is the art of manipulating traffic around so that traffic from congested links is moved onto the unused capacity on the other links. So, providing traffic engineering support in multi-hop wireless network has become increasingly important due to the low bandwidth nature of wireless channels. In this work, we propose a novel approach to control the traffic to avoid congestion by decoupling forwarding process from the routing process. The proposal is interested in provisioning quality of service guarantees for planned Wireless Mesh Networks which are being used widely as a broadband wireless access network.","PeriodicalId":448615,"journal":{"name":"2008 10th International Conference on Advanced Communication Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125832426","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2008-04-22DOI: 10.1109/ICACT.2008.4493830
Seokjin Hong, Jaewon Lee, Jaehoon Choi
Two elements diversity planar antenna for a multiple-input multiple-output application is proposed. By adopting two Y-shaped radiators, the antenna provides wideband impedance matching characteristic over the desired frequency band. To reduce the mutual coupling between two radiating elements, three stubs are inserted in the ground plane. Good impedance matching and improved isolation characteristics are observed. The measured impedance bandwidth of the proposed antenna ranges from 2.27 GHz to 10.2 GHz for return loss less than 10 dB. Parametric analysis has been conducted to investigate the effect of radiator length and insertion of stubs on the impedance bandwidth and isolation characteristics.
{"title":"Design of UWB Diversity Antenna for PDA Applications","authors":"Seokjin Hong, Jaewon Lee, Jaehoon Choi","doi":"10.1109/ICACT.2008.4493830","DOIUrl":"https://doi.org/10.1109/ICACT.2008.4493830","url":null,"abstract":"Two elements diversity planar antenna for a multiple-input multiple-output application is proposed. By adopting two Y-shaped radiators, the antenna provides wideband impedance matching characteristic over the desired frequency band. To reduce the mutual coupling between two radiating elements, three stubs are inserted in the ground plane. Good impedance matching and improved isolation characteristics are observed. The measured impedance bandwidth of the proposed antenna ranges from 2.27 GHz to 10.2 GHz for return loss less than 10 dB. Parametric analysis has been conducted to investigate the effect of radiator length and insertion of stubs on the impedance bandwidth and isolation characteristics.","PeriodicalId":448615,"journal":{"name":"2008 10th International Conference on Advanced Communication Technology","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125445177","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2008-04-22DOI: 10.1109/ICACT.2008.4494190
Yukyong Kim, Kyung-Goo Doh
As multiple service providers make themselves available on-line, the trustworthiness of services becomes significant. In Web services environments, services from different providers might have to be combined to establish a complete service. Although the individual service can be trusted, the composed service is not guaranteed against trust. Thus there must be a way to determine the composed service is trusted. This paper presents a trust type model to deduce the trust level of composed services. Then, we present a conceptual framework which enables trust based service discovery and selection. Using the inferred trust type of the composed service as the weight, we can evaluate service candidates and select the best match of them. Finally we describe the experiment results to validate our QoS based service selection.
{"title":"Trust Type Based Semantic Web Services Assessment and Selection","authors":"Yukyong Kim, Kyung-Goo Doh","doi":"10.1109/ICACT.2008.4494190","DOIUrl":"https://doi.org/10.1109/ICACT.2008.4494190","url":null,"abstract":"As multiple service providers make themselves available on-line, the trustworthiness of services becomes significant. In Web services environments, services from different providers might have to be combined to establish a complete service. Although the individual service can be trusted, the composed service is not guaranteed against trust. Thus there must be a way to determine the composed service is trusted. This paper presents a trust type model to deduce the trust level of composed services. Then, we present a conceptual framework which enables trust based service discovery and selection. Using the inferred trust type of the composed service as the weight, we can evaluate service candidates and select the best match of them. Finally we describe the experiment results to validate our QoS based service selection.","PeriodicalId":448615,"journal":{"name":"2008 10th International Conference on Advanced Communication Technology","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127503343","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2008-04-22DOI: 10.1109/ICACT.2008.4493748
Jong Min Lee, Juyoung Park, S. Kang, J. Choi
ITU-T SG13 is standardizing multicast framework architecture of next generation network. This specifies the architecture and functions of next generation network multicast services that make use of next generation network architecture and its features. In this paper, we describe the functional architecture of next generation network for multicast services in NGN release 2.
{"title":"Multicast Architecture over Next Generation Network","authors":"Jong Min Lee, Juyoung Park, S. Kang, J. Choi","doi":"10.1109/ICACT.2008.4493748","DOIUrl":"https://doi.org/10.1109/ICACT.2008.4493748","url":null,"abstract":"ITU-T SG13 is standardizing multicast framework architecture of next generation network. This specifies the architecture and functions of next generation network multicast services that make use of next generation network architecture and its features. In this paper, we describe the functional architecture of next generation network for multicast services in NGN release 2.","PeriodicalId":448615,"journal":{"name":"2008 10th International Conference on Advanced Communication Technology","volume":"134 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127592811","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2008-04-22DOI: 10.1109/ICACT.2008.4493999
Kwihoon Kim, Hyun-Woo Lee, Seoung-kyun Jo, Won Ryu
Presently, while the various accesses come out, it is necessary to have the separate authentication process if it wants to connect to each access. The various accesses are accommodated in the future NGN leading in ITU-T and TISPAN. Service providers become to provide a service based on them. The important access network is the XDSL, WLAN, WiMax and WCDMA. The ongoing wireless LAN standardization and R&D activities worldwide, which target bit rates higher than 100 Mb/s, combined with the recent successful deployment of WLANs in numerous hotspots justify the fact that WLAN technology will play a key role in wireless data transmission. Cellular network operators have recognized this fact, and strive to exploit WLAN technology and integrate this technology into their cellular data networks. In order that the service continuity is guaranteed while crossing the access network, the mobility management technology and integrated authentication and authorization technology are needed. In order that the seamless handover is provided, the various modes which are the same as those of the fast handover are considered. However, it has an effect that it is moreover many with authentication process. In this paper, we suppose that the various accesses are passed through. We propose for a single-sign-on for crossing from various accesses to the service level about the efficient integrated authentication technology. We focus on these interworking mechanisms, which effectively combine the various data access networks into integrated fixed, wireless and mobile data environments capable of ubiquitous data services and very high data rates in hotspot locations..
{"title":"Design of Unified Authentication for Multi-mode Terminal between Service and Access network in NGN","authors":"Kwihoon Kim, Hyun-Woo Lee, Seoung-kyun Jo, Won Ryu","doi":"10.1109/ICACT.2008.4493999","DOIUrl":"https://doi.org/10.1109/ICACT.2008.4493999","url":null,"abstract":"Presently, while the various accesses come out, it is necessary to have the separate authentication process if it wants to connect to each access. The various accesses are accommodated in the future NGN leading in ITU-T and TISPAN. Service providers become to provide a service based on them. The important access network is the XDSL, WLAN, WiMax and WCDMA. The ongoing wireless LAN standardization and R&D activities worldwide, which target bit rates higher than 100 Mb/s, combined with the recent successful deployment of WLANs in numerous hotspots justify the fact that WLAN technology will play a key role in wireless data transmission. Cellular network operators have recognized this fact, and strive to exploit WLAN technology and integrate this technology into their cellular data networks. In order that the service continuity is guaranteed while crossing the access network, the mobility management technology and integrated authentication and authorization technology are needed. In order that the seamless handover is provided, the various modes which are the same as those of the fast handover are considered. However, it has an effect that it is moreover many with authentication process. In this paper, we suppose that the various accesses are passed through. We propose for a single-sign-on for crossing from various accesses to the service level about the efficient integrated authentication technology. We focus on these interworking mechanisms, which effectively combine the various data access networks into integrated fixed, wireless and mobile data environments capable of ubiquitous data services and very high data rates in hotspot locations..","PeriodicalId":448615,"journal":{"name":"2008 10th International Conference on Advanced Communication Technology","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127646201","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2008-04-22DOI: 10.1109/ICACT.2008.4493928
A. Lakdashti, M. Moin, K. Badie
In this paper, we design a fuzzy system for image retrieval to reduce the semantic gap in the content-based image retrieval systems. Our main contribution is three-fold: (1) designing a fuzzy modeling approach to model the expert human behavior in the image retrieval task, (2) a fuzzy system for semantic-based image retrieval, and (3) a training algorithm for creating the fuzzy rules. The proposed solution not only is a novel idea in the semantic-based image retrieval field, but has enough potential in learning semantics from the user and making a powerful approach to improve the performance of CBIR systems, as our experiments on a set of 2000 images supports our claim.
{"title":"A Novel Semantic-Based Image Retrieval Method","authors":"A. Lakdashti, M. Moin, K. Badie","doi":"10.1109/ICACT.2008.4493928","DOIUrl":"https://doi.org/10.1109/ICACT.2008.4493928","url":null,"abstract":"In this paper, we design a fuzzy system for image retrieval to reduce the semantic gap in the content-based image retrieval systems. Our main contribution is three-fold: (1) designing a fuzzy modeling approach to model the expert human behavior in the image retrieval task, (2) a fuzzy system for semantic-based image retrieval, and (3) a training algorithm for creating the fuzzy rules. The proposed solution not only is a novel idea in the semantic-based image retrieval field, but has enough potential in learning semantics from the user and making a powerful approach to improve the performance of CBIR systems, as our experiments on a set of 2000 images supports our claim.","PeriodicalId":448615,"journal":{"name":"2008 10th International Conference on Advanced Communication Technology","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127646775","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}