Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleAugust 2009
Successive interference cancellation for cooperative communication systems
ICHIT '09: Proceedings of the 2009 International Conference on Hybrid Information TechnologyPages 652–656https://doi.org/10.1145/1644993.1645114In this paper, we analyze and simulate a successive interference cancellation (SIC) scheme for cooperative communication systems in wireless communication network. In the interference cancellation strategy, co-channel interference (CCI) is mitigated by ...
- research-articleAugust 2009
Optical wireless recharging model for wireless sensor nodes by using Corner Cube Retroreflectors (CCRs)
ICHIT '09: Proceedings of the 2009 International Conference on Hybrid Information TechnologyPages 626–631https://doi.org/10.1145/1644993.1645109Wireless Sensor Networks are included in today's important and evolving communication technologies. The size of sensors operating wirelessly decreases with the advent of advancement in device processing technologies like micro- and nano-...
- research-articleAugust 2009
Novel OFDM frame synchronization in multi-user environments
ICHIT '09: Proceedings of the 2009 International Conference on Hybrid Information TechnologyPages 621–625https://doi.org/10.1145/1644993.1645108In this paper, we propose a novel frame synchronization algorithm for an orthogonal frequency division multiplexing (OFDM) system in multi-user environments. In order to enhance the synchronization performance, we add a repeated orthgonal Gold sequence (...
- research-articleAugust 2009
Implementation of IEEE802.11a software defined receiver on chip multi-processor architecture using OpenMP
ICHIT '09: Proceedings of the 2009 International Conference on Hybrid Information TechnologyPages 598–601https://doi.org/10.1145/1644993.1645104Software radio (SR) is a promising technology for the next generation communication since it enables to implement various communication protocols in one platform. In general, software radio systems implemented in DSPs or FPGAs deliver satisfactory ...
- research-articleAugust 2009
Evaluation of group communication quality over WiBro for ship building environment
ICHIT '09: Proceedings of the 2009 International Conference on Hybrid Information TechnologyPages 594–597https://doi.org/10.1145/1644993.1645103In the process of construction in the shipbuilding industry, the loading process requires intimate communication among workers and is very dangerous work. Wireless sets with poor voice quality or TRS with call connection delays are currently being used ...
- research-articleAugust 2009
Enhanced next hop selection scheme for QoS support in multi-hop wireless networks
ICHIT '09: Proceedings of the 2009 International Conference on Hybrid Information TechnologyPages 587–593https://doi.org/10.1145/1644993.1645102When introduce real-time applications in wireless network environment, t is important to design how to guarantee several QoS requirements of the applications. This paper proposes a novel selective forwarding scheme in order to satisfy QoS requirements ...
- research-articleAugust 2009
Vehicular client roaming and location-based handoff through multiple WLAN APs in a container terminal
ICHIT '09: Proceedings of the 2009 International Conference on Hybrid Information TechnologyPages 465–472https://doi.org/10.1145/1644993.1645079This paper reports on measurement results for the simultaneous use of multiple WLAN APs in a large area. We describe some problems of applying legacy IEEE 802.11 WLAN technologies to a freight container terminal as a special application example. We ...
- research-articleAugust 2009
The study on the user authentication protocol in GSM
ICHIT '09: Proceedings of the 2009 International Conference on Hybrid Information TechnologyPages 456–459https://doi.org/10.1145/1644993.1645077Today's GSM platform is a successful wireless technology and an unprecedented story of global achievement. GSM platform evolved into 3rd generation mobile communication possibly not only voice call services but also the international roaming and a ...
- research-articleAugust 2009
Service discovery mechanism based on trustable DHT in MANET
ICHIT '09: Proceedings of the 2009 International Conference on Hybrid Information TechnologyPages 417–424https://doi.org/10.1145/1644993.1645070Service discovery mechanism is a core technique for getting a desired service in MANET (Mobile Ad-Hoc NETwork) environment. However, As feature of MANET, existing mechanisms have some problem that service requester search for trustable service. Also it ...
- research-articleAugust 2009
Patient information display system in hospital using RFID
ICHIT '09: Proceedings of the 2009 International Conference on Hybrid Information TechnologyPages 397–400https://doi.org/10.1145/1644993.1645066RFID technology is applied in many fields. This technology has the following advantage. If an object has a Tag, Reader can recognize the ID of the object without contact. If this technology is used for identification of patient in hospital, it will be ...
- research-articleAugust 2009
Movement-aware alternative path routing protocol for vehicular multi-hop communications
ICHIT '09: Proceedings of the 2009 International Conference on Hybrid Information TechnologyPages 361–367https://doi.org/10.1145/1644993.1645061Vehicular Ad-hoc Networks (VANETs) are now considered to be suitable for enhancing road safety and efficiency in vehicular environment. Especially, due to the affluent spectrum resource, supports for non-safety relevant services, like inter-vehicle ...
- research-articleAugust 2009
Huffman coding algorithm for compression of sensor data in wireless sensor networks
ICHIT '09: Proceedings of the 2009 International Conference on Hybrid Information TechnologyPages 296–301https://doi.org/10.1145/1644993.1645050Sensor data exhibit strong correlation in both space and time. Many algorithms have been proposed to utilize these characteristics. However, each sensor just utilizes neighboring information, because its communication range is restrained. Information ...
- research-articleAugust 2009
CLARM routing: cross layer adhoc-routing based on reputation management in wireless multi-hop networks
ICHIT '09: Proceedings of the 2009 International Conference on Hybrid Information TechnologyPages 209–212https://doi.org/10.1145/1644993.1645032This paper presents a framework of wireless multi-hop networks exploiting an ad hoc routing protocol working on the layer 2.5, called CLARM (Cross Layer Adhoc-routing based on Reputation Management) routing protocol. The framework of CLARM routing ...
- research-articleAugust 2009
Architecture of electronic surveillance of P2P based VoIP service
ICHIT '09: Proceedings of the 2009 International Conference on Hybrid Information TechnologyPages 185–188https://doi.org/10.1145/1644993.1645027Architectures of electronic surveillance of various types of P2P-based VoIP services are described in this paper. There are kinds of architectures of P2P based VoIP service according to the telecommunication networks used including PSTN, mobile network, ...
- research-articleAugust 2009
Adaptive intra cluster routing for wireless sensor networks
ICHIT '09: Proceedings of the 2009 International Conference on Hybrid Information TechnologyPages 118–123https://doi.org/10.1145/1644993.1645015Scientists have listed down ten emerging technologies that will change the world's future and Wireless Sensor Network (WSN) is one of them. A lot of work is in progress to make this technology more effective by having research in this field. This ...
- research-articleAugust 2009
A weighted-dissimilarity-based anomaly detection method for mobile networks
ICHIT '09: Proceedings of the 2009 International Conference on Hybrid Information TechnologyPages 108–113https://doi.org/10.1145/1644993.1645013Mobile wireless networks continue to be plagued by theft of identity and intrusion. Both problems can be addressed in two different ways, either by misuse detection or anomaly-based detection. In this paper, we propose a weighted-dissimilarity-based ...
- research-articleAugust 2009
A partition-based centralized LEACH algorithm for wireless sensor networks using solar energy
ICHIT '09: Proceedings of the 2009 International Conference on Hybrid Information TechnologyPages 60–66https://doi.org/10.1145/1644993.1645004Wireless Sensor Network (WSN) has been considered as a promising method for reliably monitoring both civil and military environments under hazardous conditions. Due to such condition, the power supply for sensor in the network cannot be usually ...
- research-articleAugust 2009
A MAC protocol considering traffic load information for a cluster based wireless sensor network
ICHIT '09: Proceedings of the 2009 International Conference on Hybrid Information TechnologyPages 20–24https://doi.org/10.1145/1644993.1644997Power conservation is crucial in designing wireless sensor networks (WSNs) with long network lifetime. An energy and delay efficient TDMA scheduling algorithm for a cluster based Wireless Sensor Network is proposed. The proposed energy efficient dynamic ...