Pub Date : 2008-04-22DOI: 10.1109/ICACT.2008.4493944
Jin Bae Park, Y. Sang, Seong-Lyun Kim, K. S. Kim
For a cellular system, the system throughput as well as the throughput at a cell edge are among the most important evaluation measures for the requirements on the system performance. Several inter-cell interference mitigation techniques have been proposed to meet the cell-edge users' needs in downlink. Each interference mitigation scheme has been found that they have pros and cons at the same time. In this paper, an adaptive inter-cell interference management scheme is proposed for an LDPC-coded FH-OFDMA system to combat the inter-cell interference in downlink cellular environment. Based on the knowledge on other cells that we can utilize without dynamic cooperation between cells, different decoding methods can be applied to maximize the performance for the cell-edge users. It is shown that a significant gain can be obtained, especially at the cell boundary using the proposed scheme.
{"title":"Adaptive Inter-Cell Interference Management for Downlink FH-OFDMA Systems","authors":"Jin Bae Park, Y. Sang, Seong-Lyun Kim, K. S. Kim","doi":"10.1109/ICACT.2008.4493944","DOIUrl":"https://doi.org/10.1109/ICACT.2008.4493944","url":null,"abstract":"For a cellular system, the system throughput as well as the throughput at a cell edge are among the most important evaluation measures for the requirements on the system performance. Several inter-cell interference mitigation techniques have been proposed to meet the cell-edge users' needs in downlink. Each interference mitigation scheme has been found that they have pros and cons at the same time. In this paper, an adaptive inter-cell interference management scheme is proposed for an LDPC-coded FH-OFDMA system to combat the inter-cell interference in downlink cellular environment. Based on the knowledge on other cells that we can utilize without dynamic cooperation between cells, different decoding methods can be applied to maximize the performance for the cell-edge users. It is shown that a significant gain can be obtained, especially at the cell boundary using the proposed scheme.","PeriodicalId":448615,"journal":{"name":"2008 10th International Conference on Advanced Communication Technology","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115416527","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2008-04-22DOI: 10.1109/ICACT.2008.4493711
Vu Truong Thanh, Y. Urano
In this paper we describe a framework to automatically customize an ongoing communication service whenever a terminal discovers a new link (either wireless or wire-line), which can be used for communication as a secondary link to the Internet. This framework makes use of the information that the server can obtain, as well as the ability to communicate using two links simultaneously at the terminal in order to provide more flexibility for the future communication service. This framework is general enough so that it can be applied to either next generation network or 3G mobile networks.
{"title":"Link-based service customization for NGN","authors":"Vu Truong Thanh, Y. Urano","doi":"10.1109/ICACT.2008.4493711","DOIUrl":"https://doi.org/10.1109/ICACT.2008.4493711","url":null,"abstract":"In this paper we describe a framework to automatically customize an ongoing communication service whenever a terminal discovers a new link (either wireless or wire-line), which can be used for communication as a secondary link to the Internet. This framework makes use of the information that the server can obtain, as well as the ability to communicate using two links simultaneously at the terminal in order to provide more flexibility for the future communication service. This framework is general enough so that it can be applied to either next generation network or 3G mobile networks.","PeriodicalId":448615,"journal":{"name":"2008 10th International Conference on Advanced Communication Technology","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123368064","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2008-04-22DOI: 10.1109/ICACT.2008.4494090
M. Zhang, De-sheng Zhang, He-qun Xian, Chi Chen, D. Feng
Today's storage paradigm is shifting from the closed and managed mode to be more open and dynamic. Network storage system can be made up of a group of loosely coupled and heterogeneous storage resources. But this openness exposes the data directly to the unknown or unmanaged storage servers. Thus it is more necessary and challenging in these storage systems to ensure data security. In this paper we propose a new secure network storage system architecture which adds a layer of management nodes between users and storage nodes. This architecture is able to provide reliable and secure data storage services while storage servers are suffering from various types of intrusion. The architecture greatly reduces the scope of trust from a large scale of storage nodes to a few management nodes, and provides a flexible access control mechanism, which ensures the data privacy, integrity and availability while preserves the flexibility, efficiency and scalability.
{"title":"Towards A Secure Distribute Storage System","authors":"M. Zhang, De-sheng Zhang, He-qun Xian, Chi Chen, D. Feng","doi":"10.1109/ICACT.2008.4494090","DOIUrl":"https://doi.org/10.1109/ICACT.2008.4494090","url":null,"abstract":"Today's storage paradigm is shifting from the closed and managed mode to be more open and dynamic. Network storage system can be made up of a group of loosely coupled and heterogeneous storage resources. But this openness exposes the data directly to the unknown or unmanaged storage servers. Thus it is more necessary and challenging in these storage systems to ensure data security. In this paper we propose a new secure network storage system architecture which adds a layer of management nodes between users and storage nodes. This architecture is able to provide reliable and secure data storage services while storage servers are suffering from various types of intrusion. The architecture greatly reduces the scope of trust from a large scale of storage nodes to a few management nodes, and provides a flexible access control mechanism, which ensures the data privacy, integrity and availability while preserves the flexibility, efficiency and scalability.","PeriodicalId":448615,"journal":{"name":"2008 10th International Conference on Advanced Communication Technology","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121661479","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2008-04-22DOI: 10.1109/ICACT.2008.4494089
Hyun-Kyung Oh, Seunghun Jin
As the Internet becomes a way of social life, there are lots of accounts which a user has to manage. To receive the Web service, people have to register each Web site. It is the OpenID to resolve these burdensome. The OpenID provides the single sign-on service which a user can be authenticated in several Web sites by submitting the password of OpenID to authentication server only once. In this paper, we analyze the single sign-on in OpenID and show an experiment of vulnerability of OpenID.
{"title":"The Security Limitations of SSO in OpenID","authors":"Hyun-Kyung Oh, Seunghun Jin","doi":"10.1109/ICACT.2008.4494089","DOIUrl":"https://doi.org/10.1109/ICACT.2008.4494089","url":null,"abstract":"As the Internet becomes a way of social life, there are lots of accounts which a user has to manage. To receive the Web service, people have to register each Web site. It is the OpenID to resolve these burdensome. The OpenID provides the single sign-on service which a user can be authenticated in several Web sites by submitting the password of OpenID to authentication server only once. In this paper, we analyze the single sign-on in OpenID and show an experiment of vulnerability of OpenID.","PeriodicalId":448615,"journal":{"name":"2008 10th International Conference on Advanced Communication Technology","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121403610","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2008-04-22DOI: 10.1109/ICACT.2008.4493706
D. Saha, S. Majumder
In this paper we use the same analytical method to study a generic STBC-CDMA system. A comprehensive analysis has been carried out to derive the bit error rate performance expression of such a system under MAI and flat fading considering maximal ratio combining scheme at the receiving side and examined the performance of the system with the correlation values for different code (OC code, m-sequence, gold code) and variable user. The channel dependent interference value is also considered with ABBA, Extended Alamouti code (EAC) and other possible combination of STBC code and compare the BER performance.
{"title":"Performance Analysis of a DS-CDMA wireless mobile communication system with STBC","authors":"D. Saha, S. Majumder","doi":"10.1109/ICACT.2008.4493706","DOIUrl":"https://doi.org/10.1109/ICACT.2008.4493706","url":null,"abstract":"In this paper we use the same analytical method to study a generic STBC-CDMA system. A comprehensive analysis has been carried out to derive the bit error rate performance expression of such a system under MAI and flat fading considering maximal ratio combining scheme at the receiving side and examined the performance of the system with the correlation values for different code (OC code, m-sequence, gold code) and variable user. The channel dependent interference value is also considered with ABBA, Extended Alamouti code (EAC) and other possible combination of STBC code and compare the BER performance.","PeriodicalId":448615,"journal":{"name":"2008 10th International Conference on Advanced Communication Technology","volume":"156 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122675302","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2008-04-22DOI: 10.1109/ICACT.2008.4494187
S.N. Azar, A. Jalali, S. Falsafi
By integrating applications and resources, portals allow users access information in simple way. Portals are a single, integrated point of access to information and application. Portals are provided a comprehensive context and an aggregated view across all information. For this reason there are lots of vendors who provide the portal product and selecting of appropriate portal become very important for companies. In previous methods portals were compared according to the number of features that they have provided. In those methods was not considered functionality of enterprise. In this paper we evaluate portals with some criteria.
{"title":"Commercial Portals Evaluation","authors":"S.N. Azar, A. Jalali, S. Falsafi","doi":"10.1109/ICACT.2008.4494187","DOIUrl":"https://doi.org/10.1109/ICACT.2008.4494187","url":null,"abstract":"By integrating applications and resources, portals allow users access information in simple way. Portals are a single, integrated point of access to information and application. Portals are provided a comprehensive context and an aggregated view across all information. For this reason there are lots of vendors who provide the portal product and selecting of appropriate portal become very important for companies. In previous methods portals were compared according to the number of features that they have provided. In those methods was not considered functionality of enterprise. In this paper we evaluate portals with some criteria.","PeriodicalId":448615,"journal":{"name":"2008 10th International Conference on Advanced Communication Technology","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125161040","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2008-04-22DOI: 10.1109/ICACT.2008.4493910
Y. Sang, Jin Bae Park, Seong-Lyun Kim, K. S. Kim
HDD is a duplexing scheme that combines TDD and FDD, taking the advantages of both systems. In this paper a novel overlaid HDD system concept is proposed. The proposed overlaid HDD system uses both TDD and FDD in both regions via two paired frequency bands. Our design objective is to propose an adequate frame structure for the overlaid HDD system with fixed relay stations to enhance the system throughput, especially for the outer region. The frequency reuse factors for the inner and the outer region are set differently to overcome the interference from other cells. It is shown that in the proposed overlaid HDD system, the throughput of the outer region is increased by 58% in the UL and 20% in the DL at 5% throughput loss of the inner region both in the UL and DL compared to that of the overlaid HDD system without relay stations. Also, the proposed overlaid system has 9% gain in the DL compared to the single- band system with relay stations.
{"title":"Overlaid HDD System Using Relays","authors":"Y. Sang, Jin Bae Park, Seong-Lyun Kim, K. S. Kim","doi":"10.1109/ICACT.2008.4493910","DOIUrl":"https://doi.org/10.1109/ICACT.2008.4493910","url":null,"abstract":"HDD is a duplexing scheme that combines TDD and FDD, taking the advantages of both systems. In this paper a novel overlaid HDD system concept is proposed. The proposed overlaid HDD system uses both TDD and FDD in both regions via two paired frequency bands. Our design objective is to propose an adequate frame structure for the overlaid HDD system with fixed relay stations to enhance the system throughput, especially for the outer region. The frequency reuse factors for the inner and the outer region are set differently to overcome the interference from other cells. It is shown that in the proposed overlaid HDD system, the throughput of the outer region is increased by 58% in the UL and 20% in the DL at 5% throughput loss of the inner region both in the UL and DL compared to that of the overlaid HDD system without relay stations. Also, the proposed overlaid system has 9% gain in the DL compared to the single- band system with relay stations.","PeriodicalId":448615,"journal":{"name":"2008 10th International Conference on Advanced Communication Technology","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130254774","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2008-04-22DOI: 10.1109/ICACT.2008.4494142
R. Yamamoto, F. Iseki, M. Kim
This paper propose an example of FMC based on IMS. Then the outline of the VoIP system which has been experimentally developed for the university network based on the proposed FMC is described.
本文提出了一个基于IMS的FMC实例。然后介绍了基于FMC的大学网络VoIP系统的实验开发概况。
{"title":"Validation of VoIP System for University Network","authors":"R. Yamamoto, F. Iseki, M. Kim","doi":"10.1109/ICACT.2008.4494142","DOIUrl":"https://doi.org/10.1109/ICACT.2008.4494142","url":null,"abstract":"This paper propose an example of FMC based on IMS. Then the outline of the VoIP system which has been experimentally developed for the university network based on the proposed FMC is described.","PeriodicalId":448615,"journal":{"name":"2008 10th International Conference on Advanced Communication Technology","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128490603","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2008-04-22DOI: 10.1109/ICACT.2008.4493703
Min-Sung Hur, Jin-Yong Choi, Jong-seob Baek, Jongsoo Seo
A normalized-least-mean-square (NLMS) algorithm is used to adapt to an unknown system by minimizing the error between the desired signal and the signal resulting from the adaptive filter. A small positive constant value is used to ameliorate the problem of its diverging when the input power is small. Moreover, it can be a variable, where generalized normalized gradient descent (GNGD) algorithm can be used to update the value based on the a priori error. The steady-state mean square error (SSMSE) performance of the algorithm is expected to improve by using a posteriori error instead of the a priori error. In this paper, a GNGD algorithm based on estimated a posteriori error is derived for use in coefficient update using NLMS algorithm. With simulation results, it is shown that using a posteriori error for updating the small constant value within channel equalizer coefficient update process decreases the algorithm's SSMSE performance sensitivity to varying initial step size.
{"title":"Generalized Normalized Gradient Descent Algorithm Based on Estimated a Posteriori Error","authors":"Min-Sung Hur, Jin-Yong Choi, Jong-seob Baek, Jongsoo Seo","doi":"10.1109/ICACT.2008.4493703","DOIUrl":"https://doi.org/10.1109/ICACT.2008.4493703","url":null,"abstract":"A normalized-least-mean-square (NLMS) algorithm is used to adapt to an unknown system by minimizing the error between the desired signal and the signal resulting from the adaptive filter. A small positive constant value is used to ameliorate the problem of its diverging when the input power is small. Moreover, it can be a variable, where generalized normalized gradient descent (GNGD) algorithm can be used to update the value based on the a priori error. The steady-state mean square error (SSMSE) performance of the algorithm is expected to improve by using a posteriori error instead of the a priori error. In this paper, a GNGD algorithm based on estimated a posteriori error is derived for use in coefficient update using NLMS algorithm. With simulation results, it is shown that using a posteriori error for updating the small constant value within channel equalizer coefficient update process decreases the algorithm's SSMSE performance sensitivity to varying initial step size.","PeriodicalId":448615,"journal":{"name":"2008 10th International Conference on Advanced Communication Technology","volume":"67 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124787670","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2008-04-22DOI: 10.1109/ICACT.2008.4494082
Rong Luo, Bin Chen
A hierarchical flexible macroblock ordering (FMO) scheme is proposed in this paper, which can be combined well with region of interest (ROI) based error resilient coding schemes while much fewer header bits are added than the existing FMO schemes in H.264/AVC standard. By defining a new FMO type with small modification of the syntax of H.264/AVC standard, the proposed FMO scheme can not only encode the ROI region and the non-ROI region in different slice groups, but also further divide the ROI region into several sub slice groups. It achieves a better tradeoff between video compression efficiency and error resilient performance by the hierarchical FMO scheme when the video data is transmitted over error-prone networks based on our experiments.
{"title":"A Hierarchical Scheme of Flexible Macroblock Ordering for ROI based H.264/AVC Video Coding","authors":"Rong Luo, Bin Chen","doi":"10.1109/ICACT.2008.4494082","DOIUrl":"https://doi.org/10.1109/ICACT.2008.4494082","url":null,"abstract":"A hierarchical flexible macroblock ordering (FMO) scheme is proposed in this paper, which can be combined well with region of interest (ROI) based error resilient coding schemes while much fewer header bits are added than the existing FMO schemes in H.264/AVC standard. By defining a new FMO type with small modification of the syntax of H.264/AVC standard, the proposed FMO scheme can not only encode the ROI region and the non-ROI region in different slice groups, but also further divide the ROI region into several sub slice groups. It achieves a better tradeoff between video compression efficiency and error resilient performance by the hierarchical FMO scheme when the video data is transmitted over error-prone networks based on our experiments.","PeriodicalId":448615,"journal":{"name":"2008 10th International Conference on Advanced Communication Technology","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131141063","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}