Volume 2, Issue 5, August 2011

Evaluation of Kalman Filtering Based Channel Estimation for LTE-Advanced
Pages: 1-6 (6) | [Full Text] PDF (345 K)
Saqib Saleem and Qamar-ul-Islam
Department of Communication System Engineering at Institute of Space Technology, Islamabad, Pakistan

Abstract —
For high data rate multimedia services and growing demand of wireless internet, in 2007 ITU invited proposals for 4th Next Generation Communication systems, for which 3GPP proposed LTE-A, based on Rel-10, fulfilling the requirements of IMT-A. In this paper extension of two linear frequency-domain channel estimation techniques, LSE and LMMSE are analyzed by using Kalman Filtering Algorithm. The performance of LMMSE-Kalman is better than LSE-Kalman as first one uses the second order noise and channel statistics. Two channel parameters are used for analysis, channel filter length, in terms of Channel Impulse Response (CIR) samples and multi-path channel taps. MATLAB Monte Carlo Simulations are performed to make performance and complexity comparison of these two methods. The performance is evaluated in terms of Mean Square Error (MSE) and complexity shows the computational time taken by the channel estimator for different MIMO systems.
 Index Terms LSE, LMMSE, DFT, DCT, Windowed-DFT, LTE and MIMO-OFDM
Managing the QoS and Security of VPNs using VDSL
Pages: 7-12 (6) | [Full Text] PDF (249 K)
Khalid Bashir and M. A. Naeem
School of Agriculture and Resource Economics, University of Western Australia
Department of Computer Science, The University of Auckland, New Zealand

Abstract —
The goal of this research work is to find how to improve quality of service (QOS) and security of virtual private network (VPN) on the present copper telephone wire network by using the very high speed digital subscriber line (VDSL) technology in the best possible way. Copper pairs connected to practically every household from one of the most common access networks in the field of telecommunications. The evolution of this copper based network into a broadband fiber network is a long process. Hybrid fiber-copper based solutions seem to offer a good way to upgrade the copper networks gradually towards all fiber networks. Digital subscriber line (DSL) technologies offer a possibility to reuse part of the huge existing copper base for broadband connectivity. VDSL offers the most transmission capacity, planned to operate over very short copper loops of a few hundred meters.
 Index Terms Quality of Service, VDSL, Security, VPN and Issues
Mitigating App-DDoS Attacks on Web Servers
Pages: 13-18 (6) | [Full Text] PDF (512 K)
Ms. Manisha M. Patil and Prof. U. L. Kulkarni
Dr. D.Y. Patil College of Engineering and Technology, Kolhapur, (Maharashtra), India
Konkan Gyanpeeth’s College of Engineering, Karjat, Dist. Raigad, (Maharashtra), India

Abstract —
In this paper, a lightweight mechanism is proposed to mitigate session flooding and request flooding app-DDoS attacks on web servers. App-DDoS attack is Application layer Distributed Denial of Service attack. This attack prevents legitimate users from accessing services. Numbers of mechanisms are available and can be installed on routers and firewalls to mitigate network layer DDoS attacks like SYN-flood attack, ping of death attack. But Network layer solution is not applicable because App-DDoS attacks are indistinguishable based on packets and protocols. A lightweight mechanism is proposed which uses trust to differentiate legitimate users and attackers. Trust to client is evaluated based on his visiting history and requests are scheduled in decreasing order of trust. In this mechanism trust information is stored at client side in the form of cookies. This mitigation mechanism can be implemented as a java package which can run separately and forward valid requests to server. This mechanism also mitigates request flooding attacks by using Client Puzzle Protocol. When server is under request flooding attack source throttling is done by imposing cost on client. Cost is collected in terms of CPU cycles.
 Index Terms DDoS attacks, App-DDoS and Trust
Analysis of Multiple Users Watermarking in Spatial Domain
Pages: 19-22 (4) | [Full Text] PDF (1640 K)
Rohit M Thanki, Rahul K Kher, Divyang D Vyas
EC Department of Institute of Computer and Communication Technology for Women, New Vallabh Vidyanagar, Gujarat, India
EC Department of G H Patel College of Engineering & Technology, Vallabh Vidyanagar, Gujarat, India
EC Department at Darshan Institute of Technology & Engineering, Rajkot, Gujarat, India

Abstract —
An image authentication technique by embedding digital “watermarks” into cover image is proposed. Digital watermarking is the process of inserting a digital signal of a defined pattern into digital data. This is used identify the owner of the work, to authenticate the content, to trace illegal copies of the work and other similar purposes. This paper provides a study of multiple users watermarking schemes in spatial domain where different user are embed different watermark or message into one cover image which provides using one watermarked image, we transmit more information in secure manner to reception side. The implement provides good knowledge about basic digital right management system. The analyses of different stage watermarked image have been done by parameters like PSNR (Peak Signal to Noise Ratio), NAE (Normalized Absolute Error) and MSE (Mean Square Error).
 Index Terms Digital Watermark, Multiple User, Noisy Image and Spread Spectrum Watermarking
High Speed Performance of Electrooptic Polymer Modulator Devices in Advanced Optical Communication Systems
Pages: 23-29 (7) | [Full Text] PDF (310 K)
Mohamed A. Metawe'e
Higher Institute of Engineering and Technology in El-Arish, Egypt

Abstract —
Electrooptic polymer modulator devices have been extensively studied and explored during the last few years. They have intrinsic advantages over conventional materials such as high-speed operation, compatibility with other materials and substrates, and the ability to make complex configurations and arrays. On the other hand, there have been problems with thermal stability, power handling, and drift. These problems are currently the subject of intense research and must be solved before commercial devices become available. This paper has been deeply investigated the high speed performance of polymer electrooptic modulator devices in advanced optical communication systems over wide range of the affecting parameters. We have taken in to account the study of modulator signal quality, sensitivity bandwidth product, switching voltage, transmitted signal bandwidth, device sensitivity, transmission bit rates under the effect of operating optical signal wavelength, modulator dimensions (i. e, modulator length, width and thickness), ambient temperature, and effective relative refractive index difference as a measurement of high speed performance operation.
 Index Terms Optical Polymers, Integrated Optics Devices, High Speed Performance, Communication Systems and Modulator Sensitivity
The Role of Computer Program in New Innovation
Pages: 30-33 (4) | [Full Text] PDF (2650 K)
Khaled A. Hamid Elnems
Egyptian Inventor & Cad Tec., U.A.E

Abstract —
The Computer Program can playing a big roles in our lives, we only used the computer for Non-core like (Chat, game, music, etc). But it can be used for a lot of benefits work to controlling, Admin our Life and save money, by provision of the electronic chips by using the Computer Program.
 Index Terms Computer Programming, New Innovation and Control
Discovering Services during Design Phase Using UML
Pages: 34-39 (6) | [Full Text] PDF (474 K)
Arram Sriram and Shaik Shah Nawaz
Department of CSE, Aurora Engineering College, Bhongir, AP, India
Department of CSE, Aurora Engineering College, AP, India

Abstract —
Service discovery has been recognized as an important aspect in the development of service centric systems, i.e., software systems which deploy web services. To develop such systems, it is necessary to identify services that can be combined in order to fulfill the functionality and achieve quality criteria of the system being developed. In this paper, we present a framework supporting design impelled and ranked services detection (DIRSD) - that is the exploit of services in QOS bead ranking order, which can provide functionalities and satisfy properties and constraints of systems as specified during the software design phase. Detailed system design is a compulsion and an assumption about iterative design process that allows the formulation of design models of service-centric systems based on the exploited services. The framework is composed of a query extractor, which derives queries from behavioral and structural UML design models of service centric systems, and a query execution engine that executes these queries against service registries. The paper describes a prototype tool that we have developed to demonstrate and evaluate our framework and the results of a set of preliminary experiments that we have conducted to evaluate it.
 Index Terms Design, UML, Services and Framework
Buffer Efficient Fast Broadcasting Scheme
Pages: 47-51 (5) | [Full Text] PDF (289 K)
Mohammad Saidur Rahman, Mohammad Saiedur Rahaman, Ahmed Ridwanul Islam and Abhijit Bhowmik
American International University-Bangladesh, Banani, Dhaka, Bangladesh

Abstract —
A popular video can be broadcasted by partitioning the video into segments, which are broadcast on several channels simultaneously and periodically. This approach permits multiple users to share channels that lead to higher bandwidth employment. Previous schemes generally focus on reducing clients’ waiting time. This work studies another important issue, namely client buffer1 savings. A reverse fast broadcasting (RFB) scheme is introduced to improve the buffer problem. RFB has the identical waiting time like FB. We introduced a new Buffer Efficient Fast Broadcasting scheme that has smaller buffer requirement and less waiting time than RFB and FB.
 Index Terms VOD, Buffer Efficient, Fast Broadcasting and Near VoD Scheme