Skip to main content

2012 | Buch

Communication and Networking

International Conference, FGCN 2011, Held as Part of the Future Generation Information Technology Conference, FGIT 2011, in Conjunction with GDC 2011, Jeju Island, Korea, December 8-10, 2011. Proceedings, Part I

herausgegeben von: Tai-hoon Kim, Hojjat Adeli, Wai-chi Fang, Thanos Vasilakos, Adrian Stoica, Charalampos Z. Patrikakis, Gansen Zhao, Javier García Villalba, Yang Xiao

Verlag: Springer Berlin Heidelberg

Buchreihe : Communications in Computer and Information Science

insite
SUCHEN

Über dieses Buch

The two volume set, CCIS 265 and CCIS 266, constitutes the refereed proceedings of the International Conference, FGCN 2011, held as Part of the Future Generation Information Technology Conference, FGIT 2011, Jeju Island, Korea, in December 2011. The papers presented were carefully reviewed and selected from numerous submissions and focus on the various aspects of future generation communication and networking.

Inhaltsverzeichnis

Frontmatter
Wireless Multimedia Sensor Networks Testbeds and State-of-the-Art Hardware: A Survey

In recent years, Wireless Multimedia Sensor Networks (WMSNs) attracted researchers’ attention. This has led to an advancement made at both levels: hardware design and open source libraries to capture and process sound and image on sensor motes. WMSNs have the potential for real time object detection and recognition. It can be used to locate misplaced items, assisted living, helping people with cognitive impairments, species detection, and provide real time images for many other surveillance-based application. The WMSN research domain is relatively new, therefore many people fail to fully recognize the potential of WMSNs. In this paper, we provide a detail description of various state-of-the-art WMSNs testbeds. We categorize these testbeds in two classes: hardware-based testbeds and software-based testbeds. Furthermore, we list state-of-the-art in wireless multimedia sensor motes hardware. The objective of this paper is threefold: unleash the potential application areas of WMSNs, attract new researchers to the WMSNs domain, and provide a guideline for proper hardware selection keeping in mind the type of research that needs to be carried out.

Muhammad Omer Farooq, Thomas Kunz
An Energy-Efficient Cluster-Based Routing in Wireless Sensor Networks

In Wireless Sensor Networks (WSNs), sensor nodes depend on batteries for energy source. The ability to use limited energy efficiently is the key to determining the lifetime of networks and the amount of information transmitted. Low Energy Adaptive Clustering Hierarchy (LEACH) is a representative cluster-based routing protocol designed to ensure energy use efficiency. In this paper, a protocol scheme was proposed wherein member nodes (lower-level nodes) are designed to compare the currently sensed data with the previously sensed one and to switch to sleep mode when a match is achieved. The design is to help improve the transmission energy efficiency. The proposed scheme was tested via simulations and was compared with two existing cluster-based algorithms, i.e., LEACH and Threshold Sensitive Energy Efficient Sensor Network Protocol (TEEN). Performance evaluation was conducted based on the number of surviving nodes in each of the three networks (i.e., LEACH, TEEN, and proposed scheme) over time. The results indicated that the scheme contributed to greater energy efficiency by helping to increase the lifetime of the LEACH network by a maximum of 27%.

Seongsoo Cho, Bhanu Shrestha, Keuk-Hwan La, Bonghwa Hong, Jongsup Lee
Event-Driven Test Script Methodology for SOA System

Electronic collaboration over the Internet between business partners appear to be converging toward well-established types of message exchange patterns that involve both user-defined standards and infrastructure standards. At the same time, the notion of event is increasingly promoted for asynchronous communication and coordination in SOA systems. In collaboration between partners or between components is achieved by the means of choreographed exchanges of discrete units of data - messages or events - over an Internet-based protocol. This paper presents an event-centric test case scripting method and execution model for such systems.

Youngkon Lee
Business-Context Based SLA Parameters for SOA Management

With Web services starting to be deployed within organizations and being offered as paid services across organizational boundaries, quality of service (QoS) has become one of the key issues to be addressed by providers and clients. While methods to describe and advertise QoS properties have been developed, the main outstanding issue remains how to implement a service that lives up to promised QoS properties. This paper provides the service level agreement (SLA) parameters for QoS management applied to Web services and raises a set of research issues that originate in the virtualization aspect of services and are specific to QoS management in a services environment – beyond what is addressed so far by work in the areas of distributed systems and performance management.

Youngkon Lee
Prescription-Level Based Test Assertion Model for SOA

This paper presents a design method for business-centric SOA test framework. The reference architecture of SOA system is usually layered: business process layer, service layer, and computing resource layer. In the architecture, there are so many subsystems affecting the system’s performance, which relates with each other. As a result, in respect of overall performance, it is meaningless to measure each subsystem’s performance separately. In SOA system, the performance of the business process layer with which users keep in contact usually depends on the summation of the performance of the other lower layers. Therefore, for testing SOA system, test cases describing business process activities should be prepared. We devised a business-centric SOA test assertion model which enables to semi-automatic transform test assertions into test cases by the concept of prescription level and normalized prerequisite definition. The model also minimizes the semantic distortion in the transformation process.

Youngkon Lee
Multithreaded Power Consumption Scheduler Based on a Genetic Algorithm

This paper presents a multithreaded power consumption scheduler and measures its performance, aiming at reducing peak load in a scheduling unit. Based on the observation that the same genetic algorithm leads to a different solution for a different initial population, the proposed scheduler makes each thread generate its own initial population and independently run genetic iterations for a better solution. Judging from the performance measurement result obtained from a prototype implementation, multithreaded version can reduce the peak load even with small population size without loss of accuracy. After all, the threaded scheduler improves the computation speed, which is inherently dependent on the population size of a genetic scheduler mainly consist of sorting and selection procedures.

Junghoon Lee, Gyung-Leen Park, Hye-Jin Kim
Design of a Composite Sensor Node in Agricultural Ubiquitous Sensor Networks

This paper first designs and implements a composite sensor node capable of reliably collecting sensor data mainly and delivering control actions to actuators in the agricultural sensor network, and then presents the corresponding ubiquitous sensor network architecture that integrates an intelligent information technology. Consist of a main control unit, a sensor interface base board, an actuator interface & control board, a global network interface module, and a sensor signal acquisition board, the composite node extends the data transmission range, regulates power according to the device operation type, exploits lightweight 6LowPAN and IPv6 protocol, and makes it possible to share pin connections between a group of sensor devices. Our design can contribute to building an efficient sensor data processing framework which can seamlessly combine XML specification, an expert system, a filtering engine, and sensor query lifetime management.

Junghoon Lee, Gyung-Leen Park, Hye-Jin Kim, Ho-Young Kwak, Seongjun Lee, Jong-Heon Lee, Bong-Soo Kang, Yun-Hyuk Kim
Millimetric Waves Technologies: Opportunities and Challenges

Providing an available wideband and better antenna beam forming are two good profits of millimeter wave (mmWave) technology. MmWave technology makes radio systems lighter and smaller and radars more precise. Today, commercial MmWave equipment work below 90GHz frequencies. MmWave radios work to transport Internet traffic in the backhaul of communication networks. There is a challenge in mmWave technology since the prices of equipment increases as the frequency increases. In this paper we study the applications of mmWave technology, its products, standards and compare it with other wireless technologies.

Jahangir Dadkhah Chimeh, Saeed Bashirzadeh Parapari
A Reduced Complexity Subcarrier Switching Scheme for PAPR Reduction in OFDM System

High values of Peak to Average Power Ratio or PAPR is a fundamental problem of Orthogonal Frequency Division Multiplexing (OFDM) systems. Literature survey shows that recent research works on PAPR reduction are proposing schemes focusing on IEEE standard based systems. One such technique is the null and data subcarrier switching method- a scheme that can reduce PAPR without any need of side information, causes no distortion and can complement other existing methods. However, the associated computational complexity of this method can be very high. In this paper, we propose a modified technique based on the subcarrier switching method that can reduce computational complexity to a great extent with very little or no loss in the PAPR reduction. In addition, we also present further PAPR reduction capability of our scheme with low computational overhead by making compromise on the no-side information advantage.

Sabbir Ahmed, Makoto Kawai
An Indoor Location-Aware System Based on Rotation Sampling in Positioning

With the rapid development in hardware and software of wireless communications, applications of real-time positioning systems have been widely used; among them the Global Positioning System is the most popular [1]. However, the satellite signal is obstructed by the sheltering effect of the building and becomes too weak to be applicable for indoor positioning. Instead, the wireless sensor networks techniques are suitable for indoor positioning, for which many related researches and applications have been proposed. Based on the ZigBee wireless technology operating on the IEEE 802.15.4 physical radio specification, we use the Received Signal Strength Indicator together with the Signal Patent Matching method for positioning. Furthermore, to enhance accuracy of positioning, we adopt a sampling method to compare on-line samples as well as the rotation sampling positioning method.

Chu-Hsing Lin, Jung-Chun Liu, Chien-Hsing Lee, Tang-Wei Wu
Research on the ZigBee-Based Indoor Location Estimation Technology

In recent years, as rapid advances in wireless and mobile communications and continuing decreases in hardware costs, applications of the wireless sensor network are widespread; whereas location estimations in the wireless sensor technology are crucial for their use. Among them, Location-based services have been developed rapidly and find their applications in areas such as medical care, warehouse management, and mobile guide systems in public spaces. In this paper, a fingerprint based location estimation technology in the ZigBee networks is investigated, in which the collection method to build the signal strength database and the configuration of sensor nodes are examined. Furthermore, the k-nearest neighbor algorithm is used to increase accuracy of location estimations for compliance with relevant applications.

Chu-Hsing Lin, Jung-Chun Liu, Sheng-Hsing Tsai, Hung-Yan Lin
Visible Watermarking Based on Multi-parameters Adjustable Gamma Correction

With the progress of information technology, digital data is a major trend of business communication today. Therefore, copyright protection of digital data has been an important research issue of information security. In the paper, we proposed an improved visible watermark scheme using multi-parameters adjustable Gamma Correction to reduce the distortion, which can increase color saturation. Our experiments showed that the PSNRs of the stego images with watermark embedded were up to 54.50 dB and 58.66 dB.

Chu-Hsing Lin, Chen-Yu Lee, Tzu-Chien Yang, Shin-Pin Lai
A Tree Overlapping-Based Mesh Routing Protocol for Wireless Sensor Networks

In this paper, a mesh routing protocol is proposed to deliver sensing information effectively in a disaster environment. Many disaster application scenarios in the emergency network of wireless sensors require connectivity between nodes in order to transmit the collected data to a sink node. In case one critical connection is cut by accident, a tree routing structure has possibility of failure which results in delay or disconnection. In tree routing protocols, the packets follow the tree topology for forwarding the emergency data to the sink node, even if the node is located near to the source node. In the disaster site with the existing tree topology, the sensor network is not a very efficient network. In this paper, we present an enhancement of the tree routing protocol by implementing a mesh routing protocol based on tree overlapping. The concept of tree overlapping is to derive a mesh topology by overlapping all the tree structures in the sensor network where each tree structure is rooted at each sensor node. The simulation results show that the proposed algorithm provides shorter average end-to-end delay, reduces the number of hop counts, and also decreases the energy consumption compared to the conventional tree routing protocols.

Inwhee Joe, Yeonyi Choi, Dongik Kim
Performance Comparison among MIMO Techniques at Different Interference Levels for LTE

MIMO technique (multi antenna transmission and reception) is a key feature of long term evolution (LTE) which ensures higher spectral efficiency and better multiuser flexibility making a cellular system spectrally efficient but inherently densely populated and interference-limited. Performance of spatial multiplexing MIMO techniques degrades with the introduction of interference in the system. To choose optimum MIMO mode it is worthwhile to analyze the UE (user equipment) throughput under different interference scenarios before physical implementation of a system. This paper contains a comparative study of MIMO technique performances in terms of UE throughput under two different UE speeds and interference scenarios.

Mohammad T. Kawser, Md. K. Syfullah, Nawshad U. A. Chowdhury, Md. T. Hoq
Handover Method Considering Power Consumption and Video Quality Satisfaction at the Mobile Node

In this paper, we propose a QoE-based handover method to consider mobile terminal power consumption and maintain experienced quality for a video streaming service like mobile IPTV. As a mobile terminal has dual mode interfaces with different power consumption and quality, a user can select an access network providing the satisfied quality and power efficiency. So, a mobile terminal needs the dynamic handover scheme between WLAN and alternative access network(3G) for better conditions. Through our simple experiment, existing RSSI-based handover schemes are not suitable to maintain the experienced quality of streaming multimedia service. Therefore we propose the QoE-based handover method through analysis of the relation between video experienced quality (MSSIM; Mean Structural Similarity Index).

Hyun Jong Kim, Seong Gon Choi
Shape Retrieval Combining Interior and Contour Descriptors

To represent and retrieve a shape, the interior as well as the contour features are very efficient. Fourier descriptor is one of the important global contour- based features to describe contour-based shapes. However, some images depend on complex interior details. In that case, only using contour information fails to give correct retrieval of a shape. On the other hand, interior-based descriptors are not applicable for all kinds of images. Therefore, in this paper, we represent our images in terms of two descriptors. Firstly, we describe centroid distance-based Fourier descriptor to represent the contour of a shape, and then, we describe the medial axis as a shape interior. Shape features are extracted locally by the medial axis while the Fourier descriptor extracts features globally. Using MPEG-7 database we have shown that proposed Shock graph-Fourier descriptor (SGFD) method is effective in increasing retrieval accuracy without increasing computational cost.

Solima Khanam, Seok-Woo Jang, Woojin Paik
Hardware Architecture of Bilateral Filter to Remove Haze

In this paper, we propose the hardware architecture of bilateral filter that can smooth image while preserving edges for the real-time image processing. Bilateral filter is nonlinear combination of nearby image values. As the time complexity of bilateral filter is O (total pixel size ∗ filter kernel size

2

), the real-time processing is difficult. We reduce the time complexity of bilateral filter using parallel architecture to achieve real-time performance.

Eun-Kyoung Kim, Jae-Dong Lee, Byungin Moon, Yong-Hwan Lee
An Efficient Interworking Architecture of a Network Processor for Layer 7 Packet Processing

This paper presents a new interworking architecture for a network processor (NP) that is able to process packets from OSI layer 2 (L2) to layer 7 (L7) by combining a conventional NP with a general-purpose processor (GP). In general, most commercially available NPs could not afford to support a variety of network services. This is mainly because the conventional NPs are not able to process L7 packets. Thus, one of the most important requirements for the state-of-the-art NP is the ability to process packets of L2 to L7. To process L7 packets efficiently through both the conventional NP and GP, the proposed interworking architecture uses a deep packet inspector (DPI) and it controls the packet processing flow depending on the OSI layers of packets. Experimental results show that the proposed interworking architecture is not only able to process packets of L2 to L7 but also increase the throughput and load balance of the packet processing in the NP without large hardware overhead when compared with the conventional interworking architecture.

Kyeong-ryeol Bae, Seung-Ho Ok, Hyeon-Sik Son, Sang Yoon Oh, Yong-Hwan Lee, Byungin Moon
A Rectification Hardware Architecture for an Adaptive Multiple-Baseline Stereo Vision System

In this paper, we propose a new rectification hardware architecture that is suitable for an adaptive multiple-baseline stereo vision system. The adaptive multiple-baseline stereo vision system can obtain precise distance information compared with the fixed-baseline stereo vision system. To reduce the computation overhead of the stereo matching, the rectification is an essential step in the stereo vision system. However, the conventional rectification hardware architectures are designed for the fixed-baseline stereo vision system. Also, previously proposed the lookup table (LUT) based rectification hardware architectures are not suitable for the adaptive multiple-baseline stereo vision system. This is because these require large memory resources as the number of baseline increases. The experimental results show that the proposed hardware architecture does not need memory resources and also only few additional hardware resources are required as the number of the baseline increases as compared with the LUT-based rectification hardware.

Hyeon-Sik Son, Kyeong-ryeol Bae, Seung-Ho Ok, Yong-Hwan Lee, Byungin Moon
Building Self-organizing Autonomic Agent Based on a Mobile Cell

This paper proposes and evaluates a biologically inspired autonomous system that makes networked agents or applications to be autonomous, scalable, adaptive. With the proposed system, a network application consisting of an associate of agents is designed by decentralized agents, which are analogous to mobile cells that have ability to migrate in biological systems. Each agent has a unique functionality for network systems, and implements biological behaviors such as migration, replication, reproduction, and death. The proposed system allows agents to autonomously sense its surrounding environments to evaluate whether they adapts well to the sensed environment conditions. Empirical measurement results show that the agent adapts well to the dynamic environments.

Kiwon Yeom
Modeling u-Healthcare Frameworks Using Mobile Devices

It is widely anticipated that there will be a paradigm shift in the coming year from desktop-centric computing to mobile computing. This will have a number of significant ramifications. One issue of critical importance is the design, development and deployment of software solutions for mobile users. In this paper, we suggested a mobile collaboration framework based on distributed object group framework (DOGF). This paper focuses on the use of this framework to support mobile collaboration. Therefore, we improved the existing work and apply it to the construction of u-healthcare agent services. For supporting mobile collaboration, we divided into two agent types such as the stationary and the moving-typed agents according to the function of mobile devices. The data collected by sensors attached on arbitrary spaces can be shared by 2-typed agents or a home server, and exchanged with each other using the Push and Pull methods. For managing this information, the DOGF provides functions of object group management, storing information and security services to our mobile collaboration framework via defined application interfaces. We also showed via GUI the executablility of healthcare application supporting for medical work in hospitals on our mobile collaboration framework. Information Management using mobile phone in Wireless Sensor Network is a very common factor. This system will be as simple as possible providing all the facilities those are available in remote PC based applications. A wireless mesh network furnishes the WSN. Mobile phones are going to be the nodes or access points of this network. Some predefined activities like error messages or warning messages after sensing the system environment along with all types of responses to user queries can be achieved in this system. A simple user friendly GUI is implemented for user and there is a server to authenticate the logged in user, listen to the requests and replies them accordingly. The user can(i) get the reports regarding all/individual tags and or routes, emergency messages, sensors and also the location information and /or (ii) send actuation command to the server using which immediate decision about the system can be taken from server side. Thus any remote user can be assisted by this system and can communicate with WSN anywhere, anytime.

Haeng-Kon Kim
Design and Implementation of Smart Meter Concentration Protocol for AMI

The information of existing smart meter is transmitted by the fixed concentration and scheduling protocol on the request of the server. The connection configuration and the data transfer process are performed by DLMS/COSEM standard protocol. This protocol is applied to only point to point connections between the meter and the metering server. Therefore some constraints of transmission efficiency occur in large-scale networks. In this paper, we suggests an open protocol - Smart Meter Concentration Protocol(SMCP) which provide efficient transmission between concentrator and metering server. The AMI system was implemented with the proposed SMCP and has field tested in Jeju Island.

Byung-Seok Park, Cheoul-Shin Kang, Young-Hun Lee
Biologically-Inspired Optimal Video Streaming over Wireless LAN

There is dramatic need to achieve optimal performance in wireless multimedia network due to its heterogeneous nature, media content and different quality of service (QoS) requirements from different applications. It is very obvious that supporting multimedia applications and services over wireless is very challenging task, and it requires low complexity and highly efficient scheme to cope with the unpredictable channel condition. In this paper, we develop a biologically-inspired strategy for optimal video streaming application. The optimal parameters configuration selected provide the best QoS settings to enhance the video streaming quality over wireless LAN. The scenario has been simulated in NS-2 environment, it clearly shows that the video quality has been improve by selecting minimum configuration to ultimately support video application. The PSO-based approach outperforms other techniques used to compare the performance of the develop scheme in terms of perceived video quality by more than 0.5dB. The experimental simulation has been used to verify the efficiency and potential application of the PSO in wireless multimedia communication.

Yakubu S. Baguda, Norsheila Fisal, Rozeha A. Rashid, Sharifah K. Yusof, Sharifah H. Syed, Dahiru S. Shuaibu
Emerging of Mobile Ad-Hoc Networks and New Generation Technology for Best QOS and 5G Technology

Enhancing in performance, strong bandwidth utilization and merging of MANET (3G) and 4G make a plate- form to get best Quality of services. Purpose of this research is to understand the functioning of ad hoc networks and implement proposed routing protocols for mobile ad hoc networks. After analyzing the existing QOS framework with respect to the dynamic and rapidly changing behavior of ad hoc networks. This research attempts to present some of the fundamental routing issues such as decentralization, bandwidth, MANETS delay in DSR and AODV, data delivery ratio in intermediate nodes in static and dynamic position and resource constrained in ad hoc network. Routing of data packets between source to destination is difficult task, So to overcome on these problems we have to extend and evaluate proposed routing protocols (AODV and DSR) suitable for mobile ad hoc networks for best QoS, In order to prove its correctness and efficiency evaluation of the proposed protocols should be done theoretically and implemented through simulation using OPNET simulator. The research will compares the statistics of ad hoc routing protocols by different researches with different simulating tools. 5G can be achieved by making a revolutionary attempt on the basis of this research ideology (merging of ad hoc and cellular technology under 4G umbrella with user centric concept wirelessly with multi terminals at a time), which will assure optimization in the next generation technology.

Jahangir Khan, Zoran S. Bojkovic, Muhammad Imran Khan Marwat
Intelligent Hybrid Anomaly Network Intrusion Detection System

Intrusion detection systems (IDSs) is an essential key for network defense. The hybrid intrusion detection system combines the individual base classifiers and feature selection algorithm to maximize detection accuracy and minimize computational complexity. We investigated the performance of Genetic algorithm-based feature selection system to reduce the data features space and then the hidden naïve bays (HNB) system were adapted to classify the network intrusion into five outcomes: normal, and four anomaly types including denial of service, user-to-root, remote-to-local, and probing. In order to evaluate the performance of introduced hybrid intrusion system, several groups of experiments are conducted and demonstrated on NSL-KDD dataset. Moreover, the performances of intelligent hybrid intrusion system have been compared with the results of well-known feature selection algorithms. It is found that, hybrid intrusion system produces consistently better performances on selecting the subsets of features which resulting better classification accuracies (98.63%).

Heba F. Eid, Ashraf Darwish, Aboul Ella Hassanien, Tai-hoon Kim
Remote Data Acquisition and Touch-Based Control of a Mobile Robot Using a Smart Phone

This paper proposes a methodology for remote data acquisition of sensor information and touch-based control of a mobile robot using a smart phone. The acquired sensor information is remotely processed by a smart phone and employed to conduct autonomous navigation. By touching the screen of the smart phone, a series of points obtained from designated curve traces are analyzed and provide control of a robot. This study develops a mobile application that acquires and handles data from a mobile robot and sends appropriate action commands through remote control using Bluetooth communication with a smart phone. The utility and performance of the proposed control scheme have been successfully verified through experimental tasks using an actual smart phone and a mobile robot.

Yong-Ho Seo, Hyo-Young Jung, Chung-Sub Lee, Tae-Kyu Yang
The Performance Analysis of LT Codes

LT codes are designed for the purpose of scalable and fault-tolerant distribution of data over wireless networks. This paper introduces the four design methods of LT codes degree distribution. Analyzing and comparison results of the short and long of LT code performance under the different channel probability are given, which show that in the case of large delete the probability, the original data packets can be recovered with high probability as long as the decoder receives a sufficient number of packets. The results of this paper will reference for system choose a different LT code parameters.

Ling Yang, ShiLi Song, Wei Wei Su, Yi Fan Wang, Hong Wen
Unseen Visible Watermarking for Gray Level Images Based on Gamma Correction

In this paper, we proposed a novel watermarking technology with the properties that from visible watermarking and invisible watermarking. In the common situation our approach can be used to transmit the multimedia files, according to the gamma correction, the watermark can be revealed. Our proposed method has a unique feature that we can obtain a watermarked-image similar to the original image after embedding watermarks. The naked eye hardly realized the watermarks, but after adjusting the viewing angle, it then demonstrated the embedded watermarks. We embed the unseen visible watermarks by adjusting degree of saturation and value of HSV model in the color space. The experiment result shows that the PSNR values of the watermarked images are more than 45 dB, sometimes even as high as 55 dB.

Chu-Hsing Lin, Chen-Yu Lee, Shu-Yuan Lu, Shih-Pei Chien
People Counting Using Object Detection and Grid Size Estimation

The proposed system estimates the number of people in indoor or outdoor location. A background model of the scene is constructed to detect moving objects (people) in a video stream. Detected foreground objects are preprocessed to eliminate pixel noise and small artifacts by performing opening morphology operation in the foreground image. Counting persons in the occluded foreground object is estimated by counting the human blobs by estimating the grid size. The accurately normalized and calibrated reference grid model is necessary for the grid estimation.

Oliver C. Agustin, Byung-Joo Oh
The Research of Serially Concatenated FQPSK Demodulation Based on LDPC Codes

As a kind of modulation with high degree of both power and bandwidth efficiency, Filtered QPSK (FQPSK) has been widely applied in the satellite and deep space communication. This paper first investigates the Maximum-A-Posteriori-Probability (MAP) demodulation of FQPSK-B. Then a serially concatenated system of FQPSK and LDPC codes is built, which gives both the advantages of LDPC codes and FQPSK and can easily be considered to save the power and spectral utilization ratio of the system. We demonstrate that the new concatenated system can achieve high power and spectral efficiency through extensive analysis and simulation.

Gao Yuan Zhang, Hong Wen, Liang Zhou, Ling Yang, Yi Fan Wang
Design and Implementation of Efficient Reed-Solomon Decoder for Intelligent Home Networking

Intelligent home concept is the integration of different services within a home by using a common communication system. Error correction coding is being used on an almost routine basis in most communication systems including intelligent home networking. In addition, critical protocol management information requires high fidelity forward error correction (FEC) coding to ensure that the protocol functions correctly in the worst case situations. A powerful technique in the worst case situations is a Reed-Solomon (RS) code. With this technique, one achieves a high level of performance by trading an increase in overall block length for a reduction in hardware complexity. This paper concerns the design and implementation of RS codec for intelligent home networking. The 3 symbol error correcting RS codec is developed on field programmable gate array (FPGA) chips using very high speed integrated circuit hardware description language (VHDL). The logic functions are confirmed by VHDL simulator tool. The circuits are generated by the synthesis tool. Two FPGA chips are required and the FPGA utilization is 70% and 40%, respectively.

Ik Soo Jin
A Cost-Effective Multicasting Using an FP-LD Modulator in a WDM-PON

An external optical modulation method based on TE/TM-mode absorption nulls in a Multiple Quantum Well (MQW) Fabry-Perot laser diode (FP-LD), has been proposed and experimentally demonstrated for multicasting in a WDM-PON. The 32 channels multicasting system with the proposed modulator has been implemented, which shows power penalties of 1.53~4.15 dB at a bit error rate of 10

− 9

with more than extinction ratios of 14.5 dB at 622 Mbps.

Hyuek Jae Lee
A Wireless CCTV Converter Based on Binary CDMA Technology

This paper describes the design and implementation of a wireless CCTV converter system using binary CDMA technology. The proposed system consists of a CPU module based on ARM11 (S3C6410) processor, a binary CDMA communication module based on Koinonia chip (KWPAN1200A), and interface module. All processing procedures of image coding/compression and decoding/decompression are carried out by H.264 algorithm. The experimental results show that the proposed system can transmit a high resolution image of VGA (720x480) up to 300 meters with a frame rate of 22 fps. And the system can control remotely functions such a pan, tilt and zoom.

Yeong-Jin Baek, Sang-Hoon Lee
A Soft QoS Supporting Multi-path Routing Scheme for Mobile Nodes in MANETs

In this paper, a soft QoS supporting multi-path routing scheme for mobile nodes in MANETs is proposed. The proposed multi-path routing scheme can obtain network metrics of nodes during route discovery. A source node can then select the most suitable routing paths to transmit packets to the destination node according to the QoS requirement of its network applications. The experiments show that the proposed scheme can prolong the network lifetime by providing soft QoS support to mobile nodes.

Tz-Heng Hsu, Yi-Da Li, Meng-Shu Chiang
An Adaptive Query Optimization in a Hierarchical Mediator System

To hide the heterogeneous environment from a global user as much as possible while preserving the autonomy of each individual system to the highest degree, the study of a mediator has been actively carried out as an integration method for distributed heterogeneous information sources. To evaluate a global query on a view that integrates several distributed information sources, the query can be rewritten into a set of transformed queries based on the definition of the view. Each transformed query is targeted to one of the information sources. To speed up the execution of a global query, the previous results of frequently requested sub-queries are materialized in a mediator. This paper proposes a method of choosing the optimized set of materialized queries in each mediator such that available storage in each mediator can be highly utilized at any time. The integrating schema in a mediator can be incrementally modified and the evaluation frequency of a global query can also be continuously varied. In order to select the optimized set of materialized sub-queries with respect to their current evaluation frequencies, the proposed method for modeling the recent access behavior of each sub-query. As a result, it is possible to adjust the optimized set of materialized sub-queries adaptively according to the recent changes in the evaluation frequencies of sub-queries.

Nam Hun Park, Kil Hong Joo
On Implementation of a KVM IaaS with Monitoring System on Cloud Environments

Cloud computing has been a popular topic in recent years. How the system used in large-scale cloud computing to build large-scale distributed storage cluster and the provision of services become very popular and provoke animated discussion. It is an inevitable trend to either the enterprise or the individual. The cloud of network services can be divided into three categories: Software as a Service (SaaS), Platform as a Service (PaaS), and infrastructure as a service (IaaS). Among these, the Software as a Service (SaaS) allows users to run applications remotely from the cloud. Platform as a Service (PaaS) includes the operating system and custom application-specific software. And Infrastructure as a Service (IaaS) is the computing resources as a service, including some virtual machines, hardware resource units. This research paper is about how to build the KVM environment in the cloud system and operation, and using the KVM to provide a virtual environment for users. In the user interface part, the work is able to reduce the complexity of cloud resources access. We use the web interface which is easy to understand and accessible for users in the operations as well. About the experimental results, the performance of physical machine and KVM virtual machine are compared and analyzed.

Chao-Tung Yang, Bo-Han Chen, Wei-Sheng Chen
RFID and Supply Chain Management: Generic and Military Applications

This paper explains two main aspects of RFID supply chain management – the generic supply chain management and the specific military application for the purpose of asset viability. The generic supply chain management is studied by examining how to improve supply chain management through accurately determining inventory levels in real time without human interaction. For the military application, the current legacy systems used by the military for Supply Chain Management and Asset Visibility are analyzed and suggestions are made for improvements in the form of Total Asset Visibility through Radio Frequency Identification tags, and Geographic Information Systems.

Tae Hwan Oh, Young B. Choi, Rajath Chouta
Backmatter
Metadaten
Titel
Communication and Networking
herausgegeben von
Tai-hoon Kim
Hojjat Adeli
Wai-chi Fang
Thanos Vasilakos
Adrian Stoica
Charalampos Z. Patrikakis
Gansen Zhao
Javier García Villalba
Yang Xiao
Copyright-Jahr
2012
Verlag
Springer Berlin Heidelberg
Electronic ISBN
978-3-642-27192-2
Print ISBN
978-3-642-27191-5
DOI
https://doi.org/10.1007/978-3-642-27192-2

Premium Partner