|
ISSN: 1998-4480
Year 2008
All papers of the journal were peer reviewed by two
independent reviewers. Acceptance was granted when both
reviewers' recommendations were positive.
Main
Page
Paper
Title, Authors, Abstract (Issue 1, Volume 2, 2008) |
Pages |
Redundancy versus Video and Audio
Human Perception
Michael Bank
Abstract: A proposal is put forward
for an possible explanation of human perception
algorithm. The main conclusion of different kinds of
art perception examination is necessity of big part
of signal redundancy. The article illustrates the
meaning of redundancy versus human perception. It
turned out, that there are common methods of
redundancy creation in different kinds of art like
painting, architecture, music and speech.
|
1-16 |
Noise Reduction and Simulation in Avalanche
Photodiodes
F. Emami and M. Frdosiyan Tehrani
Abstract: One of the most important devices used in optical
communication systems are Avalanche Photo Diodes (APDs). APDs
are the proper devices in signal detection because of their wide
bandwidth, low noise operation and sensitive detection respect to
other detectors. In this paper, an overview of the noise specification
is presented for them. Some structures such as thin multiplication
layer APDs, impact ionization engineering, ultra-low noise APD with
a centered-well multiplication region and some theories such as dead
space multiplication theory (DSMT) and modified DSMT (MDSMT)
are studied. The numerical simulation of nonlocal ionization and
dead space effects in homojunction APDs are reviewed based on the
history dependent multiplication theory (HDMT). Finally, we
discussed the low noise CMOS APDs.
|
17-26 |
Radio Frequency Combination for TCP/IP
Suite Protocol Improvement in 4G Mobile
Internet Networks
Abdullah Gant, Xichun Li, Lina Yang, Omar Zakaria
Abstract: In this paper, we present our new proposed
protocol to enhance the TCP/IP versatility as the main protocol
for wireless data transmission. TCP/IP has shown its
superiority in the selection of protocol for establishing wired
networks. Unfortunately, its superiority cannot be extended to
wireless networks. However, we believe that the integration of
several types of networks would take place. The 4th
Generation (4G) wireless mobile internet networks will merge
the current existing cellular networks (i.e., CDMA2000,
WCDMA and TD_SCDMA) and Wi-Fi networks (i.e.,
Wireless LAN) with the fixed internet to support wireless
mobile internet. This integration would provide the same
quality of service as fixed internet. Each of the networks has
their own specified protocols, disparity frequency, and
maximum data speed and cost characteristics. TCP/IP suite
protocols were successful in web application of fixed internet,
but exhibit limitation to work on the combined networks. Two
research directions are available, which are replacement and
improvement. Microsoft has issued a new protocol suite for
replacement. In this paper, we propose a new protocol to
improve TCP/IP suite protocols. This new protocol addresses
the limitation of TCP/IP suite so that it can work on both
cellular network and Wi-Fi network simultaneously; sending
data requests through cellular network and getting reply from
Wi-Fi network. Ns2 Java version (Java Network Simulator)
was chosen to simulate the new protocol because of its
feasibility. In this paper, we present the results and discussion
of our simulation.
|
27-36 |
The Performances of the SSC Combiner Output
Signal in the Presence of Nakagami-m Fading
Mihajlo Č. Stefanović, Dragana S. Krstić, Petar Nikolić, Srdjan Jovković, and Dušan M. Stefanović
Abstract: It is notable that level crossing rate, outage probability
and average time of fade duration of the combiner output signal are
very important system performances. In this paper the level crossing
rate, outage probability and fade duration of the SSC combiner
output signal in the presence of the Nakagami-m fading are
determined. The results are shown graphically for different variance
values, decision threshold values and fading parameters values.
|
37-44 |
Comparative Performance Study of ADMR and
ODMRP in the context of Mobile Ad Hoc
Networks and Wireless Sensor Networks
Radosveta Sokullu , Ozlem Karaca
Abstract: Mobile Ad Hoc networks (MANET) and Wireless
Sensor Networks (WSNs) are two large groups of wireless networks
that have well established application ranges. Despite the fact that
they address very distinctive groups of devices and have clearly
differentiated wireless interfaces, there are certain similarities which
push scientists to look for adopting solutions already designed for
existing wireless networks to WSNs. An example of this is the case
with routing layer protocols. AODV, a unicast routing protocol,
developed for MANETs, has proved to be applicable and was
accepted by IEEE as the standard for the routing layer in Low Rate –
Wireless Personal Area Networks (LR-WPAN). MANET-originated
solutions, like multicast protocols, have also been initially designed in
the context of IEEE 802.11 MAC layer protocol but have their
applicability for WSNs not been studied so far. This paper
investigates the feasibility of two popular MANET multicast
protocols, ADMR and ODMRP over the IEEE 802.15.4 standard and
provides a comprehensive study of the performance of these two
protocols with different underlying physical and media access
protocols. The protocols have been analyzed with ns-2 network
simulator. It appears that even though both protocols are applicable in
the selected scenarios, there are specifics in their performance in the
context of WSNs which should not be neglected.
|
45-53 |
Study of Parameters Effect on the
Performance of Precoding and Equalizer Sharing
Systems
Mutamed Khatib, Mohd Fadzil. Ain, Farid Ghani,
Syed Idris Syed Hassan
Abstract: This paper studies the
effect of the block length and the channel impulse
response on the performance of three block
transmission systems. The main idea of the block
transmission system is to transmit the data in
blocks of certain length, and to use signal
processing networks either in the transmitter or the
receiver to eliminate the effect of the multipath
channel. So, both the block length and the channel
impulse response will play an important roll in the
system performance. The first studied system moves
all the signal processing operations from the
receiver to the transmitter and leaves the receiver
quite simple (pre-coding). The other two systems
make some sharing of the signal processing between
the transmitter and the receiver in different ratios
to obtain some enhancement on the performance of the
pre-coding system.
|
54-64 |
The Decision Reliability of MAP,
Log-MAP, Max-Log-MAP and SOVA Algorithms for Turbo
Codes
Lucian Andrei Perisoara, Rodica Stoian
Abstract: In this paper, we study the
reliability of decisions of the MAP, Log-MAP,
Max-Log-MAP and SOVA decoding algorithms for turbo
codes, in terms of the a priori information, a
posteriori information, extrinsic information and
channel reliability. We also analyze how important
an accurate estimate of channel reliability factor
is to the good performances of the iterative turbo
decoder. The simulations are made for parallel
concatenation of two recursive systematic
convolutional codes with a block interleaver at the
transmitter, AWGN channel and iterative decoding
with mentioned algorithms at the receiver.
|
65-74 |
Improving Life Time of Wireless
Sensor Networks using Neural Network based
Classification Techniques with Cooperative Routing
Sudhir G. Akojwar, Rajendra M. Patrikar
Abstract: Wireless Sensor Networks are
design with energy constraint. Every attempt is
being made to reduce the energy consumption of the
wireless sensor node. Communication amongst nodes
consumes the largest part of the energy. The paper
focuses on use of classification techniques using
neural network to reduce the data traffic from the
node and there by reduce energy consumption. The
sensor data is classified using ART1 Neural Network
Model. Wireless sensor network populates distributed
nodes. The cooperative routing protocol is designed
for communication in a distributed environment. In a
distributed environment, the data routing takes
place in multiple hops and all the nodes take part
in communication. This protocol has been designed
for wireless sensor networks. This ensures uniform
dissipation of energy for all the nodes in the whole
network. Directed diffusion routing protocol is
implemented to carry out performance comparison. The
paper discusses classification technique using ART1
neural network models. The classified sensor data is
communicated over the network using two different
cases of routing: cooperative routing and diffusion
routing. Ptolemy-II-Visual Sense is used for
modeling and simulation of the sensor network.
Lifetime improvement of the WSN is compared with and
without classification using cooperative routing and
diffusion routing.
|
75-86 |
An Energy Efficient Dynamic
Clustering Scheme of MSN for Dynamic Skyline Queries
Young-Bok Cho, Yoon-Su Jeong, Sang-Ho Lee
Abstract: The wireless sensor network
environment which is composed of a number of sensor
nodes are extended to Ubiquitous application, and
sink node are giving mobility and seamless data
transmission, This paper is accounting for dynamic
clustering focusing on the sink node, After choosing
cluster headers, which share base station and data
transmission dynamic clustering can transmit the
data of the sink node. This paper defines the
optimal hop counter and when a cluster is made
prolong life time of the network by reducing the
whole network energy efficiency. One of the
Experiments show that clustering can be achieved
within a single cluster by extending 6 hop at the
maximum, and life time makes possible dynamic
clustering when node remains more than 20% on
average.
|
87-95 |
A Study of the Multi-Scale WOFDM
Transmission in Time Variant Channels
Marius Oltean
Abstract: WOFDM (Wavelet-based
Orthogonal Frequency Division Multiplexing) reshapes
the multi-carrier transmission concept, by using
wavelet carriers instead of OFDM’s complex
exponentials. The modulator and the demodulator rely
on the Discrete Wavelet Transform (DWT) computation.
One crucial parameter of this transform is the
number of iterations, tightly related to the
time-scale nature of the wavelet transform.
Practically, the number of DWT iterations coincides
with the number of transmission scales used. The
influence of this parameter on the WOFDM
transmission performance is studied in this paper.
The considered scenario refers to a flat, time
variant Rayleigh fading channel. Our simulations
show that, by increasing the number of transmission
scales, the BER performance degrades. This result is
explained by the fact that a small number of
iterations keeps the duration of the transmitted
symbols significantly shorter than the coherence
time of the channel.
|
96-105 |
Security Issues in Wireless
Sensor Networks
Zoran S. Bojkovic, Bojan M. Bakmaz, Miodrag R.
Bakmaz
Abstract: This work deals with some
security issues over wireless sensor networks (WSNs).
A survey of recent trends in general security
requirements, typical security treats, intrusion
detection system, key distribution schemes and
target localization is presented. In order to
facilitate applications that require packet delivery
from one or more senders to multiple receivers,
provisioning security in group communications is
pointed out as a critical and challenging goal.
Presented issues are crucial for future
implementation of WSN.
|
106-115 |
QoS Path Selection Mechanism in a
Hybrid Access Wireless Scenario: A Distributed
Approach using Mobile Agents
Emanuel Puschita, Tudor Palade
Abstract: The differentiated
requirements of applications over this multitude of
access networks need a mechanism for resource
negotiation and management. The aim of the paper is
to present an inter-domain end-to-end mechanism used
for best path selection in a hybrid access WLAN-UMTS
scenario, based on one-way delay estimation as the
network parameter requested by the application and
managed by mobile agents. Further, based on the
obtained results, the paper proposed an extended
mechanism using profiles, a set of aggregate
parameters like bandwidth, delay, jitter, etc. The
mechanism is called I-NAME (In-Network Autonomic
Management Mechanism)and it is used for network
resource reservation and management functions.
|
116-125 |
Frame Synchronization Symbols for
an OFDM System
Ali A. Eyadeh
Abstract: In this paper, the problem
of frame synchronization in orthogonal frequency
division multiplexing (OFDM) system is considered.
For an OFDM system, frame synchronization is
achieved by forcing the receiver to start its FFT at
the right time. One way in which this may be
achieved is to precede the OFDM data with a special
synchronization symbol. Two synchronization symbols
are proposed to achieve frame synchronization for an
OFDM, the wobbulation symbol and the Barker code.
These symbols are evaluated in AWGN and two-ray
multipath channels, and performances are compared in
terms of the probability of correct synchronization.
|
126-134 |
Passive UHF RFID Tags in Arctic
Environment
Jussi Nummela, Leena Ukkonen and Lauri Sydanheimo
Abstract: Radio frequency
identification (RFID) systems are becoming more and
more common in several industries. This enhances the
requirements of tag antennas. Especially in
logistics and supply chain management, which are
major applications for RFID, the operating
environment is expanding all the time. The
identifiable items often travel in very cold, even
arctic, environments. This can happen for example in
geographically cold areas or in freezers with frozen
food. In addition ice or snow can also be accrued on
the tag surface. It is important that RFID tags work
well in these extreme circumstances and the
technology can be trusted. This paper studies the
behaviour of passive UHF RFID tags in a cold (-20°C)
environment. The effect of snow and ice on the
surface of the tag was studied too. Both Gen1 and
Gen2 antennas were tested and the results proved
that passive UHF RFID tag antennas are usable in
extreme conditions.
|
135-142 |
Paper
Title, Authors, Abstract (Issue 2, Volume 2, 2008) |
Pages |
Chaotic Sequences Implementations
on Residue Number Spread Spectrum System
M. I. Youssef, M. Zahara, A. E. Emam, M. Abd
ElGhany
Abstract: In this paper, the
performance of chaotic code generators implemented
in spread spectrum communication system is analyzed
and compared to those using conventional pseudo
random code generators as maximum length, gold code
generators. Image is used as a data source and the
histogram of the spreaded image is analyzed.
Applicability of different types of generators are
studied by examining their autocorrelation,
cross-correlation performance and the bit error rate
for the communication system is evaluated for
various codes. Finally, a residue number arithmetic
is added to the system; this system is evaluated and
compared to that of non residue number system,
measuring the histogram of the spreaded image and
the probability of error for the system is measured.
|
143-154 |
A New Approach for Reduction of
Redundancy Using Optimal Time Domain Sampling and
Interpolation
S. Izadpanah, M. M. Ghanbarian, A. Kazerooni
Abstract: In this paper the authors
consider a general method, based on time domain
samples for spectral manipulation of the
time-limited signals. In this direction, all of the
needed formulas for practical periodic time-limited
interpolation in two cases of low pass and band pass
has been derived. The work begins with dividing an
arbitrary signal in time domain into the time
limited non-overlapping frames, then each frame is
processed to find the effective maximum frequency or
equivalently the minimum number of samples that
satisfy some error criteria. To find the optimum
sampling frequency we used periodic interpolation
for resampling and reconstruction, and suitable zero
finding of the discrete variable nonlinear equation
by combination of the time and frequency computation
to increase the speed of convergence.
|
155-164 |
A Modular Encoder Design Scheme
for Turbo-encoded BPPM-OCDMA System
Muralidhar Kulkarni
Abstract: A Turbo-encoded Optical Code
division Multiple Access(OCDMA) system has been
simulated and an application specific design process
has been proposed to implement a Turbo- encoded
OCDMA modulated using Binary Pulse Position
Modulation (BPPM) for transmission over optical
fiber channels. The design process follows a modular
approach and consists of four distinct modules RSC
(Recursive Systematic Code) encoder, Pseudorandom
Interleaver, Parallel to Serial Converter, BPPM
circuit. A reference system has been designed for a
frame size of 16 bits. Bit error rates were
calculated for this reference design, assuming 10
simultaneous users using 5 iterations of the MAP
decoding algorithm at various values of SNR for the
two obtainable code rates (1/2; 1/3).
|
165-173 |
Paper Title, Authors, Abstract (Issue 3, Volume 2,
2008) |
Pages |
Analyzing Distribution of Traffic
Capacity
Dan Mancas, Ecaterina-Irina Manole, Nicolae-Iulian
Enescu, Stefan Udristoiu
Abstract: In this paper, an evaluation
of the network routing algorithms is made. In a real
network, it is expected to find a mix of traffic
capacities corresponding to different qualities of
the video signal. This mix seems to be composed of a
majority of smaller traffic capacities (poorer video
signal) than higher traffic capacities. After that,
the topology effect is presented. In matter of
performance, topology and blocking problems are
strongly related. As conclusions, solutions for the
presented scenarios and also for other important
scenarios are given.
|
175-184 |
Introducing Mobile Home Agents
into the Distributed Authentication Protocol to
Achieve Location Privacy in Mobile IPv6
Andrew Georgiades, Yuan Luo, Aboubaker Lasebae,
Richard Comley
Abstract: Mobile IPv6 will be the
basis for the fourth generation 4G networks which
will completely revolutionize the way
telecommunication devices operate. This paradigm
shift will occur due to the sole use of packed
switching networks. Mobile IPv6 utilizes binding
updates as a route optimization to reduced triangle
routing between the mobile node, the home agent and
the correspondent node, allowing direct
communication between the mobile node and the
correspondent. However, direct communication between
the nodes produces a range of security
vulnerabilities, which the home agent avoided. This
paper attempts to provide the advantages of using
the home agent as an intermediary whilst reducing
the latency of triangle routing. This can be
achieved with the proposed use of a mobile home
agent which essentially follows the mobile node as
it moves between points of attachment providing
location privacy and pseudo-direct communication,
which can be incorporated into the distributed
authentication protocol or be used as a stand alone
solution.
|
185-194 |
Consumers' Behaviour Towards
Internet Technology and Internet Marketing Tools
Noor R. Ab. Hamid
Abstract: The accessibility of the
Internet and lower costs of doing transactions have
given rise in customers bargaining power and intense
global competition. Although the Internet has great
potential for consumer value reports indicate that
consumers vary in their levels of Internet adoption.
Among the factors causing consumers lack of adoption
is perceived risk associated with online
transactions. This study explores the roles of
perceived risk and user’s experience level in
determining consumers’ adoption level. In addition,
the effect of consumers’ level of experience on
perceived risk is examined. Meanwhile, customers’
behaviours vary depending on several factors such as
demographics, technology literacy and experience
level and so forth which will then influence their
assessment of service quality entailing brand
loyalty. Based on the belief that marketing to
well-defined segments of customers would improve the
quality of services offered affording higher
retention rates and at the same time increase firms’
profitability in the long run many companies have
opted to implement customer relationship management
(CRM) programs. Hence, this study also aims to
understand the relationships between consumer’
behaviour and internet marketing programs. Findings
from this study indicate that perceived risk does
not influence the types of activities conducted on
the Internet. In contrary, users’ experience level
plays an important role in users’ level of Internet
adoption. In addition, our findings also revealed
that customers differ in their relationship
decisions based on age, education and experience
level. We discuss the implications to managers and
future directions of research.
|
195-204 |
Paper Title, Authors, Abstract (Issue 4, Volume 2,
2008) |
Pages |
Simulation of Distributed
Multi-Pump Raman Amplifiers in Different
Transmission Media
Mohsen Katebi Jahromi, Farzin Emami
Abstract: Three types of distributed
Raman amplifiers; forward, backward and
bidirectional pumping configurations are simulated
and compared in this paper. Since the nonlinear
effect of the fiber type is an important parameter
in determining the simulation process, two types of
fibers are used in our simulation; Z-fiber and
dispersion shifted fiber (DSF). In each case the
optimum parameters such as pump and signal powers,
amplified spontaneous emission and noise figure are
derived. We found that there is minimum total input
power for backward case and there is minimum
fluctuation in signal power along the fiber which
leads to having the lowest ripple in signal to noise
ratio. Indeed, DSFs have proper noise figure level
and more uniform signal gain relative to the
Z-fibers. Generally speaking, the fiber parameters
have strong effects on the operation of multi-pump
distributed Raman amplifiers, because of their
nonlinearities.
|
205-212 |
On Optimizing the Planning of
Multi-hop Wireless Networks using a Multi Objective
Evolutionary Approach
D. Benyamina, N. Hallam, A. Hafid
Abstract: The optimization problem of
planning Wireless Mesh Networks (WMNs) is a
challenging problem that has been regarded as a
cost-minimization problem, while other pertinent
Quality of Service (QoS) criteria are modeled as
constraints to be satisfied. We propose a novel
approach that models, to some realistic extent, the
problem of planning WMNs as a simultaneous
optimization of deployment cost and network
throughput under obvious network constraints. We
propose two multi-objective models differing mainly
in how the throughput objective is optimized. We
tailor a nature-inspired meta-heuristic algorithm to
solve the two models. The cost and the effectiveness
of the planning solutions are two conflicting
objectives which undermine each other. In such
situations, the network planner would prefer a set
of trade-off planning solutions at his disposal to
choose from A comparative experimental study with
different key-parameter settings on the two instance
models is conducted to help network planner decide
which planning optimization model to choose given
their specific requirements and/or scenarios.
|
213-221 |
Secure and Energy Efficient
Geocast Protocol for Sensor Networks with
Misbehaving Nodes
Young-Chul Shim
Abstract: Geocast sends packets to all
sensor nodes within a specified geographical region
in order to gather data from sensor nodes in that
region and is an important mechanism in sensor
networks. In this paper we first introduce an
energy-efficient geocast protocol. The proposed
protocol builds a multicast tree connecting geocast
nodes using an energy efficient broadcasting
technique without making any restrictions on the
shape of the geocast region. The proposed protocol
reduces the energy consumption during the phase of
sending commands to the sensor nodes in a geocast
region. It also facilitates in-network data
aggregation and, therefore, helps save energy during
the data reporting phase. Then we modify the
proposed protocol to include security mechanisms to
protect the multicast tree and data being
transferred over this tree not only from outside
attackers but also compromised insider attackers.
|
222-229 |
Copyrighted Material, www.naun.org
NAUN
| |
|