INTERNATIONAL JOURNAL of COMMUNICATIONS
 
















 

ISSN: 1998-4480

 
 


Year 2007

All papers of the journal were peer reviewed by two independent reviewers. Acceptance was granted when both reviewers' recommendations were positive.

Main Page

 

    Paper Title, Authors, Abstract (Issue 1, Volume 1, 2007)

Pages

QCIF Images Performance Analysis Over Adaptive Modem
Mohamed Fourati, Lamia Chaari, Nouri Masmoudi, Lotfi Kamoun

Abstract: This article proposes, modulation study with multi-levels QoS analysis, which can be used to perform physical layer functions for new generation systems. The 3G wireless systems, the wireless LANs, and the wireless MAN have included different modulation schemes as a means to provide a higher data rate. Based on the perceived Signal-to-Noise Ratio (SNR) of the immediately previous frame in the frame exchange process, provisioning of service delivery are dynamically varied by selecting links that can use higher bandwidth modulation schemes. In this paper, we considered different images classes and different modems schemes to provide a study of the physical-layer link speed effect on high-layer network performance based on different QoS parameters that depend in class and type of multimedia traffic. In our work, we have considered basics modulation techniques used in mobile and wireless systems. Based on this analysis an adaptive modulation scheme for SDR is proposed to pick the constellation size that offers the best reconstructed image quality for each average SNR. Simulation results of image transmissions confirm the effectiveness of our proposed adaptive modulation scheme.
 

1-9

Intra/inter algorithm for B frame processing in H.264/AVC encoder
Zoran M. Milicevic and Zoran S. Bojkovic

Abstract: The H.264/AVC video coding standard aims to enable significantly improved compression performance compared to all existing video coding standards. In order to achieve this, a robust rate-distortion optimization (RDO) technique is employed to select best coding mode. This paper presents combined (intra and inter prediction) fast mode decision algorithm for H.264/AVC. The objective is to reduce the computational complexity of the encoder without significant rate-distortion performance degradation. The choose method reduces the computational time savings for B picture up to 42 %, when using modification H.264/AVC encoder with negligible loss of rate-distortion performance.

10-16

    Paper Title, Authors, Abstract (Issue 2, Volume 1, 2007)

Pages

Graham?s anomalies in case of parallel computation electromagnetic phenomena
J. Ko?ota, J. Smykowski, and S. St?pie?

Abstract: Parallel computing becomes common tool to accelerate long-lasting electromagnetic computations. In some cases their realization does not bring an expecting gain. In this paper the authors present the results of the simulations from application created in order to show selected anomalies in parallel computing. The way of parallel system implementation is presented on the basic of direct graph model with the set of precedence constraints. The Graham?s anomalies are discussed during optimization tasks scheduling issue, towards makespan criterion. The research was focused on three most frequently applied cases during acceleration the computations i.e. shortened tasks times execution, add additional computational power and reduction of selected precedence constraints. All phenomena are discussed and presented with the usage of Gantt?s charts.
 

17-21

Estimating resource requirements for distributed Network Management applications in mobile
Filippo Neri

Abstract: he current centralized Network Management approach in mobile networks may lead to problems with being able to scale up when new customer services and network nodes will be deployed in the network. This consideration has prompted a research activity to find alternative application architectures that could overcome the limits of the current centralized approaches. In this paper, we describe the PIRR methodology we have developed to measure resource requirements for distributed applications in mobile networks and the experimental findings of its application to new Network Management applications.he current centralized Network Management approach in mobile networks may lead to problems with being able to scale up when new customer services and network nodes will be deployed in the network. This consideration has prompted a research activity to find alternative application architectures that could overcome the limits of the current centralized approaches. In this paper, we describe the PIRR methodology we have developed to measure resource requirements for distributed applications in mobile networks and the experimental findings of its application to new Network Management applications.
 

22-25

Adaptive Radio Resource Management in Heterogeneous Wireless Networks
Yao-TienWang and Chung-MingOu

Abstract: In this paper, adaptive channel management approach fuzzy neural networks in heterogeneous wireless networks (ACM-FNN) is presented to efficient resource allocation, and admission control schemes are needed to guarantee quality-of-service (QoS) for differentiated services. The channel management in a two-tier such as micro cell or macro cell wireless networks. Effective reliability and efficiently schemes are also needed to make network services more reliable and efficient. In a wireless networks for uneven traffic load may occur creating a hot spots. So the two-tier wireless cellular system should be able to cope with such traffic load in certain cells. To keep the handoff calls in a two-tier wireless networks at an acceptable level with low mobility users should undergo handoff calls at micro cell boundaries, and hight mobility users should undergo hand off calls at macro cell. In wireless network, the calls arrival rate, the call duration , the mobility speed and the communication overhead between the base station and the mobile switch center are vague and uncertain. Therefore, we propose a new efficient channel allocation scheme in heterogeneous wureless networks based on ACM-FNN. The proposed scheme exhibits better learning abilities, optimization abilities, robustness, and fault-tolerant capability thus yielding better performance compared with other algorithms. The results show that our algorithm has lower new calls blocking rate, lower call handoff calls dropping rate, less update messages overhead, and shorter channel acquisition delays.
 

26-34

Computationally Efficient Analytical Crosstalk Noise Model in RC Interconnects
P.Chandrasekhar and Rameshwar Rao

Abstract: This paper presents an accurate, fast and simple closed form solution to estimate crosstalk noise between two adjacent wires, using RC interconnect model in two situations: simple resistance as driver and short channel CMOS inverter as a driver. The salient features of our proposed models include minimization of computational overhead, elimination of adjustment step to predict the peak amplitude and pulse width of the noise waveform. Numerical calculations are compared with SPICE simulation and other metrics by plotting the noise voltage verses time. Based on our proposed models, we derive analytical delay models due to RC interconnect in each case. Finally we formulate energy dissipation of the RC coupled interconnects in both the cases using our proposed metrics. Experimental results indicate that our models are closely comparable with SPICE simulation, with an average estimation error of 3.366%.
 

35-45

Cooperative System for 4G Wireless Communication Networks
Ying-Hong Wang, Hui-Min Huang and Chin-Yung Yu

Abstract: Various services supports are the principal requirements of the Fourth Generation (4G) system; therefore, the need to improve integration of heterogeneous networks is significant. This paper amends EVOLUTE (a project of Information Society Technologies (IST)) to strengthen mobility management. This paper uses Multicast-based Mobility (M&M) to aid Cellular IP (CIP) in micro-mobility management. The aim of this paper is to produce complete integration of heterogeneous networks to support fine-fit mobility management for seamless handoff. The cooperative M&M/CIP is suitable for macro-mobility management, proposed by EVOLUTE, to support real-time and non-real-time data flow in micro-mobility management. Simulation results prove that the proposed system achieves good performance than other existed methods.
 

46-56

Human exposure assessment in the vicinity of 900 MHz GSM base station antenna
Mimoza Ibrani ? Pllana, Luan Ahma, Enver Hamiti

Abstract: Daily exposure to GSM electromagnetic fields has raised public concern of possible adverse health effects to people living in the vicinity of base station antennas. International guidelines and standards established for limiting human exposure to electromagnetic fields are given in two categories: Basic restrictions (SAR, induced current density and induced power density) and Reference levels (free space electric field intensity, magnetic field intensity and power density). In order to check compliance for both categories, in this paper are presented measurements of incident electric field and obtained results are used for numerical prediction of SAR. Measurements of field strength and power flux density are performed on locations few meters away from base station antenna, in different levels, with and without usage of mobile phones, during day and in peak hours of GSM system usage. Results are compared with ICNIPR Guidelines, IEEE and CENELEC standards
 

57-61

Embedding wireless sensors in UPnP services networks
Radu Dobrescu, Matei Dobrescu, Maximilian Nicolae and Dan Popescu

Abstract: The goal of the equipment which is proposed for research and developed in an experimental version is to associate a typical WSN (wireless sensor networks) node architecture with the UPnP services architecture, in order use TCP/IP and WEB technologies to manage sensor networks without a specific configuration. The sensor management software architecture uses UPnP and WSN technologies and allows interactions between UPnP Control Points and wireless sensors networked in the ambient environment. Even if the sensor devices are embedded systems with limited resources, the proposed software package allows direct interactions with UPnP services.
 

62-67

A method of improving SCR for millimeter wave FM-CW radar without knowledge of target and clutter statistics
Fumio Nishiyama, and Hideo Murakami

Abstract: Frequency-modulated-continuous-wave (FM-CW) radars transmit a waveform whose frequency changes linearly in time. Received echoes of these radars can be categorized into two types due to either targets or clutter. Generally, the received target signals have a stronger correlation with respect to different carrier frequencies than that of the received clutter signals. This paper discusses a method of improving signal-to-clutter ratio (SCR) for millimeter wave FM-CW radar based on this statistical difference between the target and the clutter. The method first approximates an autocorrelation function from received signals using a numerical averaging. A power spectrum of received signals is obtained by taking discrete Fourier-transform of this autocorrelation. A target power spectrum is estimated from the power spectrum of received signals exploiting the statistical difference, and a matched filter is then designed from this target power spectrum. The matched filter is used to improve SCR. Performance of the method is analyzed and evaluated experimentally for 60GHz band FM-CW radar. The simulation shows that the proposed method improves SCR better than competing with other methods.
 

68-74

    Paper Title, Authors, Abstract (Issue 3, Volume 1, 2007)

Pages

A Harmonical Model for Approximating the Identity in Min-Plus Convolution
Ming Li and Wei Zhao

Abstract: Min-plus convolution is an algebra system that has applications to computer networks. Mathematically, the identity of min-plus convolution plays a key role in theory. On the other hand, the mathematical representation of the identity, which is computable with digital computers, is essential for further developing min-plus convolution (e.g., de-convolution) in practice. However, the identical element in min-plus convolution is defined as infinity over infinite interval, making digital computation of the identity difficult because digital computers only provide finite range of numbers for numerical computations. Consequently, the issue of numerical approximation of the identical element is worth discussing. This paper proposes a harmonic model for finite approximation of the identical element in the min-plus convolution.
 

75-77

A Note on Statistically Detecting Tampered Type Attacks
Ming Li and Wei Zhao

Abstract: Information integrity of communication data is crucial to e-business systems. An adversary may delete or insert packets into a normal communication data series in e-business systems to destroy information integrity to produce deserters (likely informal, this paper uses the term tamped type attacks to specifically describe those that attackers detect or insert packets into a normal data series). Consequently, a security issue in an e-business system is how to detect tamped type attacks. From a view of intrusion detection systems, statistic methods of intrusion detection are increasingly paid attention to [1-3]. This short paper gives a method for statistically real-time detection of tampered type attacks. The method is based on power spectra of monitored traffic time series with finite length. The detection probability is derived. A case study is demonstrated with a real-traffic series to suggest that the present method can be used to give an alarm at the early stage of intrusions.
 

78-80

VHDL Modeling of the CSMA/CA
W.L. Pang, K. W. Chew, Florence Choong, E.S. Teoh

Abstract: The wireless communication is highly deployed due to it convenience of mobility. The wireless local area network, WLAN is dominated by IEEE802.11 standard. All the new notebooks are equipped with the IEEE802.11 b WLAN. It becomes one of the main focuses of the WLAN research. Most of the researches are simulation based due to high cost required for the hardware implementation. The IEEE802.11b standard contains two major operations, the Distribution Coordination Function (DCF) and Point Coordination Function (PCF). The main core of the IEEE802.11b, the CSMA/CA and the IEEE802.11b Physical and MAC are modeled in this paper using VHDL. The VHDL is defined in IEEE as a tool of creation of electronics system because it supports the development, verification, synthesis and testing of hardware design, the communication of hardware design data and the maintenance, modification and procurement of hardware[2]. The CSMA/CA is modeled to 3 major blocks in VHDL, the CSMACA, Random Generator and counter. The CSMA/CA is successfully modeled with a total of 58 pins and it used 15% of the total logic elements of the APEXTM 20KE FPGA. The CSMA/CA can support the operation frequency up to 50MHz.
 

81-87

FPGA Realization of Open/Short Test on IC
W.L. Pang, K. W. Chew, Florence Choong, C.L. Tan

Abstract: IC (Integrated Circuitry) testing requires the very advanced and sophisticated Advance Test Equipment (ATE) that costs multi million USD. The cost of IC testing is increasing yearly and it will exceed the cost of manufacturing in future. The manufacturers are interested to lower down the manufacturing cost. Low cost tester is one of the options to reduce the manufacturing cost. The low cost FPGA realization of Open/Short Test on IC is introduced to reduce the IC test cost. The open short test is selected, because it is the first IC test. The Very High Speed Integrated Circuit Hardware Description Language (VHDL) is used to model the Open/Short Test on IC and the design is capable to perform the open/short test.
 

88-95

Scrutinizing Behavior of a Dynamic Framed Slotted Anti-collision Algorithm for RFID Systems
Xu Huang

Abstract: Radio frequency identification systems with passive tags dramatically increase the ability of an organization to acquire a vast array of data about the location and properties of any entity that can be physically tagged and wirelessly scanned within certain technical limitations. However, if multiple tags are to be identified simultaneously, messages from the tags can collide and cancel each other out. One of the popular anticollision algorithms is the ALOHA-type algorithm, which is simple and has good performance when the number of tags to be read is reasonable small. In this paper we extended our previous research [8, 17] to build a more efficient dynamic framed slotted ALOHA for passive tags in RFID systems under the condition titled ?maximum efficiency? [8]. Also the behavior of the ALOHA for RFID passive tags is investigated, which facilitates the future relevant research projects.
 

96-99

A Method of Improving SCR for Millimeter Wave FM-CW Radar Without Knowledge of Target and Clutter Statistics
Fumio Nishiyama and Hideo Murakami

Abstract: Frequency-modulated-continuous-wave (FM-CW) radars transmit a waveform whose frequency changes linearly in time. Received echoes of these radars can be categorized into two types due to either targets or clutter. Generally, the received target signals have a stronger correlation with respect to different carrier frequencies than that of the received clutter signals. This paper discusses a method of improving signal-to-clutter ratio (SCR) for millimeter wave FM-CW radar based on this statistical difference between the target and the clutter. The method first approximates an autocorrelation function from received signals using a numerical averaging. A power spectrum of received signals is obtained by taking discrete Fourier-transform of this autocorrelation. A target power spectrum is estimated from the power spectrum of received signals exploiting the statistical difference, and a matched filter is then designed from this target power spectrum. The matched filter is used to improve SCR. Performance of the method is analyzed and evaluated experimentally for 60GHz band FM-CW radar. The simulation shows that the proposed method improves SCR better than competing with other methods.
 

100-106

FPGA Implementation of RSA Encryption Engine with Flexible Key Size
Muhammad I. Ibrahimy, Mamun B.I. Reaz, Khandaker Asaduzzaman and Sazzad Hussain

Abstract: An approach to develop the FPGA of a flexible key RSA encryption engine that can be used as a standard device in the secured communication system is presented. The VHDL modeling of this RSA encryption engine has the unique characteristics of supporting multiple key sizes, thus can easily be fit into the systems that require different levels of security. A simple nested loop addition and subtraction have been used in order to implement the RSA operation. This has made the processing time faster and used comparatively smaller amount of space in the FPGA. The hardware design is targeted on Altera STRATIX II device and determined that the flexible key RSA encryption engine can be best suited in the device named EP2S30F484C3. The RSA encryption implementation has made use of 13,779 units of logic elements and achieved a clock frequency of 17.77MHz. It has been verified that this RSA encryption engine can perform 32-bit, 256-bit and 1024-bit encryption operation in less than 41.585us, 531.515us and 790.61us respectively.
 

107-113

Adaptive Quantization of Wavelet Packet Coefficients for Embedding and Extraction of Digital Watermarks
Chi-Man Pun and I-Kuan Kong

Abstract: In this paper, a robust digital image watermarking approach of embedding and extraction of digital watermarks using adaptive quantization of wavelet packet coefficients was proposed. The original image is decomposed by discrete wavelet packet transform and the dominant wavelet coefficients are selected for watermark embedding from each sub-band except the lowest frequency one. Then, each watermark bit is adaptively embedded with different strength into the selected wavelet packet coefficients based on the odd or even value after quantization. Experimental results show that the proposed method is effective for copyright verification and robust to various common attacks such as Gaussian noise, JPEG compression, and without original image as references.
 

114-119

UCAIPM: Ubiquitous Computing Agile Information Protection Mechanism
Daoqing Sun and Qiying Cao

Abstract: In order to improve the security of ubiquitous computing system, UCAIPM, a new novel ubiquitous computing agile information protection mechanism is presented. The protected information includes the identity, location, activity of the entities and their neighbors, the service resource like the currently available devices, the schedule like the developing history of the entities and their neighbors. The SPKI-based authorization technology is used in the mechanism to solve the identification validation, security communication and the security level division. The D-S Evidence Theory is used to compute the trust value for deciding the trust level from the service provider to the ingoing user.
 

120-125

Cipher Text to Be Transmitted and Cryptanalysis in Network Security
Tsang-Yean Lee, Huey-Ming Lee, and Nai-Wen Kuo

Abstract: In this paper, we propose an encryption algorithm to encrypt plaintext to cipher text. We divide plaintext into numeric and non-numeric fields, also, we pack the numeric fields to produce packed numeric table and combine it with symbol fields to produce the new plaintext. We apply the basic computing operations, e.g., inserting dummy symbols, rotating, transposition, shifting and complement, in the proposed algorithm to encrypt plaintext to cipher text. The produced the cipher text which contains the plaintext, relative data and tables of encryption is transmitted to the receiver through the network. We also propose the cryptanalysis about these algorithms. It can be shown that the proposed algorithm is more secure in network security.
 

126-131

Cavity Dynamics of a Figure of Eight Fiber laser
Zheng Zheng, Muddassir Iqbal, Tian Yu

Abstract: Pulse propagation in a birefringent medium carries due weightage and importance in passive modelocking of fiber lasers. We carried out study of nonlinear effects in birefringent medium by simulating pulse propagation using adaptive step size method, which is globally an efficient algorithm for solving Schrodinger type equations using split step Fourier method. Nonlinear optical loop mirror was realized; the results hereby are used in forming a figure of eight fiber laser using NOLM.
 

132-136

Cavity Dynamics of an Actively Modelocked Fiber Ring Laser
Muddassir Iqbal, Zheng Zheng

Abstract: With growing demand of bandwidth, modelocked fiber lasers are mandatory for having smooth and efficient communication systems. We have simulated and analyzed the cavity dynamics of an actively modelocked fiber ring laser for Gaussian pulse as well as under soliton conditions. In order to do full justification with nonlinear as well as dispersive effects, we have optimized the algorithm using a previously explored approach. We had explored nonlinear phenomena in various type of fibers using the said approach. Results are compared with conventional method and found in coherence. Novelty lies in optimization of algorithm in order to get precise and accurate results.
 

137-142

Research of the ARP Spoofing Principle and a Defensive Algorithm
Yang Liu, Kaikun Dong, Lan Dong, Bin Li

Abstract: During the network communication process, attacker carry on ARP spoofing by using the disadvantage of the ARP(Address Resolution Protocol) protocol, this phenomenon is seriously threaten the LAN security. This paper will introduce the commonly used ARP spoofing methods such as internal/external network sniffing, interception, malicious attack and so on. It presents the Matching IP method, Data monitor method, Echo time method, ARP response analysis method, software tools detecting method as well as the new method of ARP cache updating, using switching equipment to control and other strategy and presents the algorithm to keep ARP spoofing away and maintain network security.
 

143-147

Glasses for ion-exchange technology
F. Rehouma and K. E. Aiadi

Abstract: Integrated ion exchanged devices on glass seems to be as one of the most promising technologies for the development of optoelectronic field. That is due to the potentiality of glass material, facility and flexibility of the fabrication process, the cost of the elaborated devices and the high performances of these components. In this paper, a review on glasses used for ion exchanged structures is given. The structure and the influence of the composition on the glass properties are presented. The ion exchange technology is described. The relation between the glass compositions and the exchanged ions is treated. Some compositions of glasses suited to this technology and the characteristics of elaborated structures are given. Finally selection criteria of glasses adapted to this technology are proposed.
 

148-155

    Paper Title, Authors, Abstract (Issue 4, Volume 1, 2007)

Pages

An Effective Routing Algorithm for Real-Time Applications
Hazem M. El-Bakry, Nikos Mastorakis

Abstract: It is highly desirable to protect data traffic from unexpected changes as well as provide effective network utilization in the internetworking era. In this paper the QoS management issue that utilizing the active network technology is discussed. Such algorithm is based on the proposed work presented in [15]. Active networks seem to be particularly useful in the context of QoS support. The Active QoS Routing (AQR) algorithm which is based on On-demand routing is implemented incorporating the product of available bit rate and delay for finding the best path for dynamic networks using the active network test bed ANTS. It is inferred that with background traffic, the AQR finds alternative paths very quickly and the delay and subsequently the jitter involved are reduced significantly. In this paper the variant of AQR implemented is demonstrated to be more useful in reducing the jitter when the overall traffic in the network is heavy and has useful application in finding effective QoS routing in ad-hoc networks as well as defending DDoS attacks by identifying the attack traffic path using QoS regulations. The main achievement of this paper is the fast attack detection algorithm. Such algorithm based on performing cross correlation in the frequency domain between data traffic and the input weights of fast time delay neural networks (FTDNNs). It is proved mathematically and practically that the number of computation steps required for the presented FTDNNs is less than that needed by conventional time delay neural networks (CTDNNs). Simulation results using MATLAB confirm the theoretical computations.
 

157-169

Markovian Chain Analysis in ALOHA for Satellite Applications
Mario Reyes-Ayala, Edgar Alejandro Andrade-Gonzalez, Jose Alfredo Tirado-Mendez and Hildeberto Jardon Aguilar

Abstract: In this paper, the average delay in ALOHA is calculated for digital satellite system. The main parameters to analyze the system are the throughput, the average number of retransmission and the average packet delay. A complete mathematical analysis is presented where a Markov Chain is used.
 

170-173

OFDMA in High-speed Mobile Systems, Pilots and Simulation Problems
Miriam Bank, Michael Bank, Motti Haridim, Boris Hill

Abstract: A proposal is put forward for an innovative method of multiple access, termed Frequency Bank Signal (FBS). The major advantage of FBS is that the error probability is almost non-sensitive to, either, the Doppler Effect, separate signal delay or to the negative effect of reflected signals. In addition, FBS signals do not require special pilots or equalization signals. Two methods, based on Frequency stuffing and time stuffing, for simulation of OFDMA systems are proposed. Both methods are characterized by enhance resolution and allow for monitoring of the influence of impairments such as orthogonality disturbance, non-ideal synchronization and jitter in the receiver.
 

174-180


Copyrighted Material, www.naun.org  NAUN