Abstract: This paper studies a vital issue in wireless
communications, which is the transmission of images over Wireless
Personal Area Networks (WPANs) through the Bluetooth network. It
presents a simple method to improve the efficiency of error control
code of old Bluetooth versions over mobile WPANs through
Interleaved Error Control Code (IECC) technique. The encoded
packets are interleaved by simple block interleaver. Also, the paper
presents a chaotic interleaving scheme as a tool against bursts of
errors which depends on the chaotic Baker map. Also, the paper
proposes using the chaotic interleaver instead of traditional block
interleaver with Forward Error Control (FEC) scheme. A comparison
study between the proposed and standard techniques for image
transmission over a correlated fading channel is presented.
Simulation results reveal the superiority of the proposed chaotic
interleaving scheme to other schemes. Also, the superiority of FEC
with proposed chaotic interleaver to the conventional interleavers
with enhancing the security level with chaotic interleaving packetby-
packet basis.
Abstract: In this paper methodology to exploit creeping wave
for body area network BAN communication reliability are described.
Creeping wave propagation effects are visualized & analyzed.
During this work Dipole, IA antennas various antennas were
redesigned using existing designs and their propagation
characteristics were verified for optimum performance when used on
BANs. These antennas were then applied on body shapes-including
rectangular, spherical and cylindrical so that all the effects of actual
human body can be taken nearly into account. Parametric simulation
scheme was devised so that on Body channel characterization can be
visualized at front, curved and back region. In the next phase
multiple inputs multiple output MIMO scheme was introduced where
virtual antennas were used in order to diminish the effects of
antennas on the propagation of waves. Results were, extracted and
analyzed at different heights. Finally based on comparative
measurement and analysis it was concluded that on body propagation
can be exploited to gain spatial diversity.
Abstract: Recent research result has shown that two multidelay
feedback systems can synchronize each other under different
schemes, i.e. lag, projective-lag, anticipating, or projectiveanticipating
synchronization. There, the driving signal is significantly
complex due that it is constituted by multiple nonlinear transformations
of delayed state variable. In this paper, a secure communication
model is proposed based on synchronization of coupled multidelay
feedback systems, in which the plain signal is mixed with a complex
signal at the transmitter side and it is precisely retrieved at the receiver
side. The effectiveness of the proposed model is demonstrated and
verified in the specific example, where the message signal is masked
directly by the complex signal and security is examined under the
breaking method of power spectrum analysis.
Abstract: Nowadays, offshore's complicated facilities need their
own communications requirements. Nevertheless, developing and
real-world applications of new communications technology are faced
with tremendous problems for new technology users, developers and
implementers. Traditional systems engineering cannot be capable to
develop a new technology effectively because it does not consider
the dynamics of the process. This paper focuses on the design of a
holistic model that represents the dynamics of new communication
technology development within offshore industry. The model shows
the behavior of technology development efforts. Furthermore,
implementing this model, results in new and useful insights about the
policy option analysis for developing a new communications
technology in offshore industry.
Abstract: Power line communications may be used as a data
communication channel in public and indoor distribution networks so
that it does not require the installing of new cables. Industrial low
voltage distribution network may be utilized for data transfer
required by the on-line condition monitoring of electric motors. This
paper presents a pilot distribution network for modeling low voltage
power line as data transfer channel. The signal attenuation in
communication channels in the pilot environment is presented and
the analysis is done by varying the corresponding parameters for the
signal attenuation.
Abstract: The rapid pace of technological advancement and its
consequential widening digital divide has resulted in the
marginalization of the disabled especially the communication
challenged. The dearth of suitable technologies for the development
of assistive technologies has served to further marginalize the
communications challenged user population and widen this chasm
even further. Given the varying levels of disability there and its
associated requirement for customized solution based. This paper
explains the use of a Software Development Kits (SDK) for the
bridging of this communications divide through the use of industry
poplar communications SDKs towards identification of requirements
for communications challenged users as well as identification of
appropriate frameworks for future development initiatives.
Abstract: Wireless mobile communications have experienced
the phenomenal growth through last decades. The advances in
wireless mobile technologies have brought about a demand for high
quality multimedia applications and services. For such applications
and services to work, signaling protocol is required for establishing,
maintaining and tearing down multimedia sessions. The Session
Initiation Protocol (SIP) is an application layer signaling protocols,
based on request/response transaction model. This paper considers
SIP INVITE transaction over an unreliable medium, since it has been
recently modified in Request for Comments (RFC) 6026. In order to
help in assuring that the functional correctness of this modification is
achieved, the SIP INVITE transaction is modeled and analyzed using
Colored Petri Nets (CPNs). Based on the model analysis, it is
concluded that the SIP INVITE transaction is free of livelocks and
dead codes, and in the same time it has both desirable and
undesirable deadlocks. Therefore, SIP INVITE transaction should be
subjected for additional updates in order to eliminate undesirable
deadlocks. In order to reduce the cost of implementation and
maintenance of SIP, additional remodeling of the SIP INVITE
transaction is recommended.
Abstract: Cryptographic protocols are widely used in various
applications to provide secure communications. They are usually
represented as communicating agents that send and receive messages.
These agents use their knowledge to exchange information and
communicate with other agents involved in the protocol. An agent
knowledge can be partitioned into explicit knowledge and procedural
knowledge. The explicit knowledge refers to the set of information
which is either proper to the agent or directly obtained from other
agents through communication. The procedural knowledge relates to
the set of mechanisms used to get new information from what is
already available to the agent.
In this paper, we propose a mathematical framework which specifies
the explicit knowledge of an agent involved in a cryptographic
protocol. Modelling this knowledge is crucial for the specification,
analysis, and implementation of cryptographic protocols. We also,
report on a prototype tool that allows the representation and the
manipulation of the explicit knowledge.
Abstract: In this paper, a new technique of signal detection has been proposed for detecting the orthogonal frequency-division multiplexing (OFDM) signal in the presence of nonlinear distortion.There are several advantages of OFDM communications system.However, one of the existing problems is remain considered as the nonlinear distortion generated by high-power-amplifier at the transmitter end due to the large dynamic range of an OFDM signal. The proposed method is the maximum likelihood detection with the symbol estimation. When the training data are available, the neural network has been used to learn the characteristic of received signal and to estimate the new positions of the transmitted symbol which are provided to the maximum likelihood detector. Resulting in the system performance, the nonlinear distortions of a traveling wave tube amplifier with OFDM signal are considered in this paper.Simulation results of the bit-error-rate performance are obtained with 16-QAM OFDM systems.
Abstract: Short Message Service (SMS) has grown in
popularity over the years and it has become a common way of
communication, it is a service provided through General System
for Mobile Communications (GSM) that allows users to send text
messages to others.
SMS is usually used to transport unclassified information, but
with the rise of mobile commerce it has become a popular tool for
transmitting sensitive information between the business and its
clients. By default SMS does not guarantee confidentiality and
integrity to the message content.
In the mobile communication systems, security (encryption)
offered by the network operator only applies on the wireless link.
Data delivered through the mobile core network may not be
protected. Existing end-to-end security mechanisms are provided
at application level and typically based on public key
cryptosystem.
The main concern in a public-key setting is the authenticity of
the public key; this issue can be resolved by identity-based (IDbased)
cryptography where the public key of a user can be derived
from public information that uniquely identifies the user.
This paper presents an encryption mechanism based on the IDbased
scheme using Elliptic curves to provide end-to-end security
for SMS. This mechanism has been implemented over the standard
SMS network architecture and the encryption overhead has been
estimated and compared with RSA scheme. This study indicates
that the ID-based mechanism has advantages over the RSA
mechanism in key distribution and scalability of increasing
security level for mobile service.
Abstract: Using mobile Internet access technologies and eservices,
various economic agents can efficiently offer their products
or services to a large number of clients. With the support of mobile
communications networks, the clients can have access to e-services,
anywhere and anytime. This is a base to establish a convergence of
technological and financial interests of mobile operators, software
developers, mobile terminals producers and e-content providers. In
this paper, a client server system is presented, using 3G, EDGE,
mobile terminals, for Stock Exchange e-services access.
Abstract: The Internet is the global data communications
infrastructure based on the interconnection of both public and private
networks using protocols that implement Internetworking on a global
scale. Hence the control of protocol and infrastructure development,
resource allocation and network operation are crucial and interlinked
aspects. Internet Governance is the hotly debated and contentious
subject that refers to the global control and operation of key Internet
infrastructure such as domain name servers and resources such as
domain names. It is impossible to separate technical and political
positions as they are interlinked. Furthermore the existence of a
global market, transparency and competition impact upon Internet
Governance and related topics such as network neutrality and
security. Current trends and developments regarding Internet
governance with a focus on the policy-making process, security and
control have been observed to evaluate current and future
implications on the Internet. The multi stakeholder approach to
Internet Governance discussed in this paper presents a number of
opportunities, issues and developments that will affect the future
direction of the Internet. Internet operation, maintenance and
advisory organisations such as the Internet Corporation for Assigned
Names and Numbers (ICANN) or the Internet Governance Forum
(IGF) are currently in the process of formulating policies for future
Internet Governance. Given the controversial nature of the issues at
stake and the current lack of agreement it is predicted that
institutional as well as market governance will remain present for the
network access and content.
Abstract: This paper presents a new heuristic algorithm useful
for long-term planning of survivable WDM networks. A multi-period
model is formulated that combines network topology design and
capacity expansion. The ability to determine network expansion
schedules of this type becomes increasingly important to the
telecommunications industry and to its customers. The solution
technique consists of a Genetic Algorithm that allows generating
several network alternatives for each time period simultaneously and
shortest-path techniques to deduce from these alternatives a least-cost
network expansion plan over all time periods. The multi-period
planning approach is illustrated on a realistic network example.
Extensive simulations on a wide range of problem instances are
carried out to assess the cost savings that can be expected by
choosing a multi-period planning approach instead of an iterative
network expansion design method.
Abstract: We report on the development of a model to
understand why the range of experience with respect to HIV
infection is so diverse, especially with respect to the latency period.
To investigate this, an agent-based approach is used to extract highlevel
behaviour which cannot be described analytically from the set
of interaction rules at the cellular level. A network of independent
matrices mimics the chain of lymph nodes. Dealing with massively
multi-agent systems requires major computational effort. However,
parallelisation methods are a natural consequence and advantage of
the multi-agent approach and, using the MPI library, are here
implemented, tested and optimized. Our current focus is on the
various implementations of the data transfer across the network.
Three communications strategies are proposed and tested, showing
that the most efficient approach is communication based on the
natural lymph-network connectivity.
Abstract: In modern distributed software systems, the issue of communication among composing parts represents a critical point, but the idea of extending conventional programming languages with general purpose communication constructs seems difficult to realize. As a consequence, there is a (growing) gap between the abstraction level required by distributed applications and the concepts provided by platforms that enable communication. This work intends to discuss how the Model Driven Software Development approach can be considered as a mature technology to generate in automatic way the schematic part of applications related to communication, by providing at the same time high level specialized languages useful in all the phases of software production. To achieve the goal, a stack of languages (meta-meta¬models) has been introduced in order to describe – at different levels of abstraction – the collaborative behavior of generic entities in terms of communication actions related to a taxonomy of messages. Finally, the generation of platforms for communication is viewed as a form of specification of language semantics, that provides executable models of applications together with model-checking supports and effective runtime environments.
Abstract: In this paper, we study a class of serially concatenated block codes (SCBC) based on matrix interleavers, to be employed in fixed wireless communication systems. The performances of SCBC¬coded systems are investigated under various interleaver dimensions. Numerical results reveal that the matrix interleaver could be a competitive candidate over conventional block interleaver for frame lengths of 200 bits; hence, the SCBC coding based on matrix interleaver is a promising technique to be employed for speech transmission applications in many international standards such as pan-European Global System for Mobile communications (GSM), Digital Cellular Systems (DCS) 1800, and Joint Detection Code Division Multiple Access (JD-CDMA) mobile radio systems, where the speech frame contains around 200 bits.
Abstract: The resident registration number was adopted for the purposes of enhanced services for resident convenience and effective performance of governmental administrative affairs. However, it has been used for identification purposes customarily and irrationally in line with the development and spread of the Internet. In response to the growing concern about the leakage of collected RRNs and possible abuses of stolen RRNs, e.g. identity theft, for crimes, the Korean Communications Commission began to take legal/regulatory actions in 2011 to minimize the online collection and use of resident registration numbers. As the use of the RRN was limited after the revision of the Act on Promotion of Information and Communications Network Utilization and Information Protection, etc., online business providers were required to have alternatives to the RRN for the purpose of identifying the user's identity and age, in compliance with the law, and settling disputes with customers. This paper presents means of verifying the personal identity by taking advantage of the commonly used infrastructure and simply replacing personal information entered and stored, without requiring users to enter their RRNs.
Abstract: In this paper, we propose a chaotic cipher system consisting of Improved Volterra Filters and the mapping that is created from the actual voice by using Radial Basis Function Network. In order to achieve a practical system, the system supposes to use the digital communication line, such as the Internet, to maintain the parameter matching between the transmitter and receiver sides. Therefore, in order to withstand the attack from outside, it is necessary that complicate the internal state and improve the sensitivity coefficient. In this paper, we validate the robustness of proposed method from three perspectives of "Chaotic properties", "Randomness", "Coefficient sensitivity".