Sie sind auf Seite 1von 181

Tencon 2005 – 2005 IEEE Region 10

Incorporating

ATNAC 2005

Supported by IEEE Victorian Section

Melbourne, Victoria, Australia 21 - 24 November 2005

ISBN 85590 814 9

Tencon 2005 – 2005 IEEE Region 10

© 2005 IEEE Personal use of this material is permitted. However permission to reprint/republish the material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from IEEE.

IEEE Operations Center 445 Hoes Lane Piscataway, NJ 08854-4150 USA

+1 800 678 IEEE (+1 800 678 4333) +1 732 981 1393 +1 732 981 9667 (FAX) email: customer-service@ieee.org

Published by Swinburne Press

INDEX

Index

3

General Chair's Welcome

5

Tencon 05 TPC Chair Welcome

5

IEEE Chair Welcome

6

Registration and Social Program

6

Tencon 05 Committees

7

About the IEEE

9

Benefits of IEEE Membership:

9

Conference Centre Map

11

Tencon Tutorial Sessions – 21 st November 2005

13

Tencon Technical Sessions – 22 nd November 2005

15

Tencon Technical Sessions – 23 rd November 2005

16

Tencon Technical Sessions – 24 th November 2005

17

Reviewers for Tencon 05

18

Guest Speakers

23

Mythology and Folklore of Network Protocols

23

Towards an Optical Internet

24

Signal Processing In Telecommunications

25

Photonic Transport in Biological Tissue - Application of Optical Communications Techniques to Bio-Sensing

26

Triple Play: Converge on the Screen, not on the Bill

27

Abstracts

29

Authors List

141

Tencon 2005 Page 4

General Chair's Welcome

General Chair's Welcome On behalf of the Tencon '05 Organising Committee, I would like to welcome

On behalf of the Tencon '05 Organising Committee, I would like to welcome you to Tencon '05, held in the Crown Promenade Hotel, Melbourne from Monday 21 November to Thursday 24 November 2005.

As you will see from the enclosed program, we have 3 days full of papers from leading researchers from around the Region and around the world. Over 500 papers will be presented in 102 sessions. These papers were selected by the Technical Program Committee as representing the leading thinking on a variety of important topics.

In addition, for those wanting to catch up with the latest advances in the current topical technologies, eight half day tutorials will be held on Monday 21 November, delivered by leading experts in their fields.

We hope you enjoy your stay in beautiful Melbourne.

Hugh Bradlow Chair, Organising Committee, Tencon '05

TPC Chair Welcome

Organising Committee, Tencon '05 TPC Chair Welcome On behalf of the Technical Program Commi ttee, I

On behalf of the Technical Program Committee, I would like to welcome you to Tencon 05. We have worked very hard to ensure that this conference will be able to provide you with a good way of promoting your research and interacting with your colleagues. The theme of our conference is “A Meeting Place for Converging Technologies and People”, so we do hope that you take advantage of the opportunity to meet and network with people working in your research field and related areas. This year’s Tencon has also incorporated ATNAC 2005 and we are delighted to have been able to include multiple streams and guest speakers to address the many exciting issues emerging from the area of telecommunication networks and applications.

We received over 800 submissions to our conference and accepted approximately 530 papers for oral and poster presentation. Most papers represented collaborations between a number of authors and, for the accepted papers in the conference, there are over 1300 individuals involved - from approximately 40 different countries in the IEEE Region 10 and beyond. In addition to the large number of papers from Australia, substantial contributions were also made by authors coming from China, India, Japan, Thailand, Taiwan, Malaysia and Korea.

I would like to take this opportunity to thank the many people who worked tirelessly in the background to ensure that this conference will be a success. In particular, we had nearly 200 reviewers helping us to review the papers and we had to process over 2000 individual reviews. To my Technical Program Committee, I would like to thank them very much for their contribution to the success of this program; I know that many people worked late into the night after their normal daytime jobs had been completed in order to perform the many tasks required of them. To my Deputy TPC Chairman, Dr Zahir Hussain, I am most grateful for your continued support and assistance throughout the many difficult and busy times.

Finally, I hope that all attendees enjoy their stay in the World’s Most Liveable City – Melbourne – and I trust that you will take away pleasant memories of this conference.

Richard Harris TPC Chair, Tencon 05

IEEE Victorian Section Chair Welcome

Dear Tencon '05 Colleague

Engineering is the best of all professions. It seems each week brings challenges which require a quota of creative solutions. In a dynamic investment environment some of these solutions allow new business plans to be developed justifying either the provision of services where none existed before, or higher capability services or services to more people at an affordable price. So, both from a technological and a business viewpoint, no other profession seems to advance on such a broad front at such a quick pace. This is reflected in the papers being presented at this conference. From power engineering to telecommunications, and biomedical engineering to robotics, this is truly an interesting mix. I would like to welcome you to Tencon '05 and encourage you to enjoy as broad a range of presentations as possible because interesting new ideas can come from working across more than one discipline.

It goes almost without saying that the IEEE Victorian Section is proud of the work carried out by the General Committee, chaired by Dr Hugh Bradlow and the Technical Program Committee headed by Professor Richard Harris. I would like to acknowledge as well the foresight of my predecessor, Peter Wills in bidding to bring this conference to Melbourne.

Enn Vinnal Chair, IEEE Victorian Section Melbourne, Australia

Registration and Social Program

Tencon '05 registration will be open from 8:30 on Monday, 21 November, and will remain open during the welcome reception that evening. The registration desk will then open at 8 am on the subsequent two days of the conference.

A Welcome Reception will be held from 6 - 8 pm on Monday, 21 November, in the pre-function

area of the Crown Promenade hotel. The Reception provides an opportunity to meet fellow delegates and pick up the Conference satchel. All registered delegates are invited to attend. The cost of this function is included in the registration fee. Companions are welcome to attend on payment of an Accompanying Persons Welcome Reception Ticket ($50).

The Conference Dinner will be held on the evening of Wednesday, 23 November at the Crown Palladium. Pre-dinner drinks commence at 6:30 pm, with dinner starting at 7 pm. The cost of this function is also included in the registration fee for all delegate classes except students. Students and companions are welcome to attend on payment of an Accompanying Persons Dinner Ticket ($110). The Crown Palladium is connected to the conference venue by aerobridge - delegates will be directed there at the close of sessions on Wednesday.

In

addition, we have a selection of pre and post conference tours available for delegates who wish

to

see more of our beautiful city. For further information please contact the registration desk. Your

satchel also contains a brochure which lists some of the attractions of Melbourne.

Tencon 05 Committees

Local Committee

Position

Name

Affiliation

General Chair Vice Chair Technical Program Committee Chair Vice Chair TPC & Publications Chair Secretary Treasurer Publicity & Publications Marketing and Promotion Venue & Monash University CMO Liaison International Advisor Board Co-ordinator Web Co-ordinators

Professor Hugh Bradlow Professor Rao Kotagiri Professor Richard Harris Dr Zahir Hussain Mr Roger Venning Mr Anthony Gascoigne Dr Horace King Mr Craig Skinner Ms Catherine Edwards Professor Laurence Cahill Ms Sarah Craze

Telstra University of Melbourne Massey University, New Zealand RMIT University Telstra GNS Associates Swinburne University of Technology Ovum Australia Telstra La Trobe University ATCRC

Exhibition Chair Exhibition Advisor Publications Liaison Members at Large

Dr Charlotte Marra Mr Rhys Arkins Dr Alexsander Kist Richard Roxas Dr Irena Atov Dr Leith Campbell

Operational Concepts Acme Packet RMIT University Telstra Swinburne University of Technology ATCRC

Monash CMO

Mr Peter Wills Dr Malin Premaratne Ms Irene Thavarajah

Telstra Monash University Monash University

IEEE Victorian Section Representative

Ms Helen Mc Lean Ms Olga Lipkin Mr Enn Vinnal

Monash University Monash University IEEE Victorian Section

 

Local Organising Committee TPC Members

Title

Name

Affiliation

Country

Professor

Richard Harris

Massey University Swinburne University of Technology RMIT University Swinburne University of Technology RMIT University Latrobe University Melbourne University Monash University Swinburne University of Technology Queensland University of Technology Queensland University of Technology Etisalat College of Engineering Victoria University Canterbury University Monash University

New Zealand

Dr

Irena Atov

Australia

Dr

Alexander Kist

Australia

Dr

Horace King

Australia

Dr

Zahir Hussain

Australia

Professor

Laurie Cahill

Australia

Dr

Lachlan Andrew

Australia

Dr

Malin Premaratne

Australia

A/Professor

Grenville Armitage

Australia

Professor

Gerard Ledwich

Australia

Dr

Peter O'Shea

Australia

Professor

Saleh Al-Araji

UAE

Professor

Aladin Zayegh

Australia

Professor

Krzysztof Pawlikowski

New Zealand

Professor

Greg Egan

Australia

 

International Advisory Committee Members

Title

Name

Affiliation

Country

Professor

Saleh Al-Araji Yianni Attikiouzel Sanjay Bose Paul Cheung P.K. Chiu Trevor Cole Serge Demidenko Chris Dick Graham Goodwin Ray Jarvis Marzuki Khalid P. Khincha Jae-Hyun Kim Andrew Lee Teck Seng Low Jian Ma S.N. Merchant Dalma Novak Kouichi Sakurai Roberto Saracco S. Srikanth Nguyen Tran Laurence Wong Sam Yu Bartek Wydrowski Dalibor Vrsalovic Vasil Huatsysiu

Etisalat College Murdoch NTU University of Hong Kong HKIVE University of Sydney Monash University Malaysia Xilinx Newcastle Monash Universiti Teknologi Malaysia IIT, Bangalore AJOU,Korea NTU Republic Polytechnic Nokia Research Research Centre (Beijing) Indian Institute of Technology, Powai Pharad Hakozaki Telecom Italia Anna University IRIS Technical University of Singapore Ajou University Caltech Intel Rowan University

UAE

Professor

Australia

Professor

Singapore

A/Professor

Hong Kong

Dr

Hong Kong

Professor

Australia

Professor

Malaysia

Dr

USA

Professor

Australia

Professor

Australia

Professor

Malaysia

Professor

India

A/Professor

Korea

Dr

Singapore

Dr

Singapore

Professor

China

A/Professor

India

Dr

USA

Professor

Japan

Mr

Italy

Dr

India

Professor

Australia

A/Professor

Singapore

Dr

Korea

Dr

USA

Dr

USA

Dr

USA

Tencon 2005 Page 8

About the IEEE

The IEEE (Eye-triple-E) is a non-profit, technical professional association of more than 365,000 individual members in approximately 150 countries. The full name is the Institute of Electrical and Electronics Engineers, Inc., although the organization is most popularly known and referred to by the letters I-E-E-E.

Through its members, the IEEE is a leading authority in technical areas ranging from computer engineering, biomedical technology and telecommunications, to electric power, aerospace engineering and consumer electronics, among others.

Through its technical publishing, conferences and consensus-based standards activities, the IEEE

produces 30 percent of the world's published literature in electrical and electronics engineering, and computer science areas, holds annually more than 300 major conferences and has nearly 900 active standards with almost 500 under development

The benefits of IEEE membership include these offerings:

Membership in one or more of 39 IEEE Societies and three Technical Councils spanning the range of electrotechnologies, information technologies and more More than 300 local organizations worldwide for member networking and information sharing Educational opportunities to ensure engineers' technical vitality More than 1,300 student branches at universities in 80 countries Special cost-saving and value-added benefits for MEMBERS ONLY Prestigious awards and recognition of technical and professional achievements Opportunities for volunteering, leadership and participation in a variety of IEEE activities Electronic commerce with the IEEE through a variety of Web-based Services

IEEE Vision and Mission Vision

To advance global prosperity by fostering technological innovation, enabling members' careers and promoting community world-wide.

Mission

The IEEE promotes the engineering process of creating, developing, integrating, sharing, and applying knowledge about electro and information technologies and sciences for the benefit of humanity and the profession.

About the IEEE and Victorian Section

The Institute of Electrical and Electronics Engineers (IEEE) was founded in 1884 and the Victorian Section was established nearly exactly on hundred years later in toward the end of

1983.

The Section has previous been an active contributor to IEEE Region 10, hosting Tencon in

1992.

The Section represents the Australian states of Victoria and Tasmania so that all IEEE

members who reside in Victoria or Tasmania are automatically members of our Section. The Victorian Section has over 1,600 members. The Section is run by a committee of locally elected IEEE members and includes the special interest groups called Chapters and Affinity Groups.Each chapter or group has a Chair and is responsible for organising a number of interesting seminars, site visits, workshops or conferences, throughout the year. The fifteen Chapters and Groups cater

for a wide range of technical interests and also areas like Women-in-Engineering, Education, Graduates-of-the-Last-Decade. The Sectionhas three student branches.

Tencon 2005 Page 10
Tencon 2005 Page 11

Tencon Tutorial Sessions – 21 st November 2005

 

Session 1

Session 2

Session 3

Session 4

9:00

Network

Internet Routing:

Image Processing

 

Security

Measurement & Modelling

with FPGA

M2

M1

M3

Dr Radia

Dr Matthew

Dr Donald

Perlman

Roughan

Bailey

10:20

Morning Break

 

10:35

Network

Internet Routing:

Image Processing

 

Security

Measurement & Modelling

with FPGA

M2

M1

M3

Dr Radia

Dr Matthew

Dr Donald

Perlman

Roughan

Bailey

12:30

Lunch Break

 

13:15

MPLS and

OmNet++

DSP for

OFDM/ Digital

GMPLS

Simulation

Telecomms

Communications

M2

M1

M3

M4

Alton Lo and Mallik Tatipamula

Dr Ahmet

Prof fred

Dr Jean

Sekercioglu

harris

Armstrong

15:40

Afternoon Break

 

15:55

MPLS and

OmNet++

DSP for

OFDM/ Digital

GMPLS

Simulation

Telecomms

Communications

M2

M1

M3

M4

Alton Lo and Mallik Tatipamula

Dr Ahmet

Prof fred

Dr Jean

Sekercioglu

harris

Armstrong

18:00

Sessions conclude

 
   

Please note that lunch is not provided by the

 

conference and is not included in the tutorial fee

that lunch is not provided by the   conference and is not included in the tutorial
Tencon 2005 Page 14

Tencon Technical Sessions – 22 nd November 2005

Promenade Room

8:40

Welcome by IEEE Victorian Section Chair – Mr Enn Vinnal

8:50

Welcome from Conference General Chair Dr Hugh Bradlow

9:00

Welcome by IEEE Region 10 Director - Professor Seiichi Takeuchi

9:05

Opening Speech: Mr Randall Straw, Executive Director, Multimedia Victoria

9:10

Plenary Session Chair: Dr Dalibor (Dado) F Vrsalovic

9:15

Speaker #1: Dr Radia Perlman

10:05

Speaker #2: Mr Mike Schwartz

ROOM

8:40 - 10:55

 

11:20 - 13:00

 

14:00 - 15:40

 

16:10 - 17:50

     

1B-01

 

1C-01

   

P2

Traffic & Resource Management 1

Traffic & Resource Management 2

1D-01

Security Issues 1

 

1B-02

1C-02

1D-02

M1

Adhoc Networks

Internet Applications 1

Internet Applications 2

 

1B-03

1C-03

1D-03

P1

Image Processing 1

Image Processing 2

Robotics

 

1B-04

1C-04

1D-04

P3

IT Applications 1

IT Applications 2

Microwave Circuits

M2

PLENARY SESSION REFER ABOVE

1B-05

1C-05

1D-05

Speech Signal Processing & Coding

Modulation & Coding 1

Modulation & Coding 2

 

MORNING BREAK

1B-06

1C-06

AFTERNOON BREAK

 

M3

Time-Frequency Analysis and Wavelets 1

LUNCH BREAK

Time-Frequency Analysis and Wavelets 2

1D-06

Power Transformers

 

1B-07

1C-07

1D-07

M4

Electronic Devices 1

Electronic Devices 2

Electronic Devices 3

M6

 

1B-08

 

1C-08

 

1D-08

Image Compression & Quality Assessment

Biomedical Engineering 1

Biomedical Engineering 2

   

1B-09

1C-09

1D-09

M8

Code Division Multiple Access 1

Code Division Multiple Access 2

Estimation and

Modelling 1

 

1B-10

1C-10

 

M10

Power Systems Planning and Control 1

Power Systems Planning and Control 2

1D-10

Informatics and AI

M7

1B-11

1C-11

1D-11

1 Future Challenges

Miscellaneous Modelling

Conversion Issues

 

1B-12

1C-12

 

M9

Array and Space-Time Signal Processing 1

Array and Space-Time Signal Processing 2

1D-12

Power Generation

Tencon Technical Sessions – 23 rd November 2005

Promenade Room

9:00

Speaker #3: Professor Rod Tucker

9:40

Speaker #4: Professor fred harris

ROOM

9:00 - 10:20

 

10:50 - 12:30

 

14:00 - 15:40

 

16:10 - 17:50

     

2B-01

 

2C-01

 

2D-01

M9

Network Performance and Design 1

Network Performance and Design 2

Internet Traffic

Management

 

2B-02

2C-02

2D-02

M7

Optical Networks

Multimedia 1

Multimedia 2

 

2B-03

2C-03

2D-03

P2

Routing and Mobile IP

Wireless LANS 1

Wireless LANS 2

 

2B-04

2C-04

2D-04

P1

Image Processing 3

Image Processing 4

Modulation & Coding 3

P3

PLENARY SESSION REFER ABOVE

2B-05

2C-05

2D-05

Time-Frequency Analysis and Wavelets 3

IT Applications 3

IT Applications 4

 

MORNING BREAK

2B-06

2C-06

AFTERNOON BREAK

2D-06

M3

Power Quality

LUNCH BREAK

Power Quality

Signal Processing for Media Applications

Monitoring 1

Monitoring 2

 

2B-07

2C-07

2D-07

M6

Adaptive Systems & Signal Processing 1

Adaptive Systems & Signal Processing 2

Adaptive Systems & Signal Processing 3

   

2B-08

 

2C-08

 

2D-08

M4

Signal Processing

Signal Processing

Medical Engineering and Agents

 

Hardware 1

Hardware 2

 

2B-09

2C-09

2D-09

M8

Othogonal Frequency Division Multiplex 1

Othogonal Frequency Division Multiplex 2

Estimation and

Modelling 2

 

2B-10

2C-10

2D-10

M10

Fuzzy Technique

Fuzzy Technique

IT Theory and Applications

Applications 1

Applications 2

M1

2B-11

2C-11

2D-11

ATNAC Poster Session 1

ATNAC Poster Session 2

Tencon Poster Session 1

M2

2B-12

2C-12

2D-12

Tencon Poster Session 2

Tencon Poster Session 3

Tencon Poster Session 4

Tencon Technical Sessions – 24 th November 2005

Promenade Room

8:00

Speaker #5: Professor Ray Jarvis

8:40

Speaker #6: Dr Malin Premaratne

ROOM

8:00 - 9:20

 

9:20 - 10:50

 

11:20 - 13:00

 

14:00 - 15:40

M7

   

3B-01

Mobile and Wireless Networks

 

3C-01

 

3D-01

Convergence Issues

Mobile Cellular

 

3B-02

3C-02

3D-02

P2

Computer Networks

Security Issues 2

Security Issues 3

 

3B-03

3C-03

3D-03

P1

Filter Design and Implementation 1

Filter Design and Implementation 2

Filter Design and Implementation 3

 

3B-04

3C-04

3D-04

P3

PLENARY SESSION REFER ABOVE

Robust and Adaptive Control 1

Robust and Adaptive Control 2

Robust and Adaptive Control 3

 

MORNING BREAK

3B-05

LUNCH BREAK

3C-05

AFTERNOON BREAK

3D-05

M1

Pattern Recognition 1

Pattern Recognition 2

Pattern Recognition 3

 

3B-06

3C-06

3D-06

M2

Wireless and

Wireless and

Wireless and

Telecommunications 1

Telecommunications 2

Telecommunications 3

   

3B-07

       

M3

Bioinformatics and

Biomedical

3C-07

Video Processing 1

3D-07

Video Processing 2

   

3B-08

3C-08

3D-08

M4

Sensors and their Applications

Power Devices and Circuits 1

Power Devices and Circuits 2

 

3B-09

3C-09

3D-09

M8

Speech Recognition and Extraction

Circuit Analysis and Design 1

Circuit Analysis and Design 2

   

3C-10

3D-10

M10

3B-10

Watermarking

Power Systems

Harmonics

Machine Modelling and Simulation

Reviewers for Tencon 05

Name

Affiliation

Adam Thompson Adel Ben Mnaouer Ajit Chaturvedi Alexander Kist Ali Agoub Ali Al-Qayedi Ali Dawood Ali Memon Amin Sadik Ananda Kusuma Anant Malewar Andres Rojas Andrzej Szymanski Andy Cockburn Angiras Varma Anna Lim Arafat Al-Dweik Arek Dadej Aruna Jayasuriya Asri Shaheem Aun Haider Bartek Wydrowski Behrooz Rohani Beong Goo Ahn Bill Lloyd-Smith Bin Chen Binh Ngo Biplab Sikdar Boon Hee Soong Boon Loong Ng Brent Martin Brooke Shrader Bulent Sankur Byungjin Chun Catherine Edwards Chae-Woo Lee Chandra Athaudage Chandratilak Liyanage Charles Begg Chee-Wah Tan Chen Khong Tham Choi Look Law ChorPing Low Christopher Leckie D. Manjunath Daeyoung Kim Dalma Novak David Grayden David Hayes Deepak Nayak Donald Bailey

MTData NTU Singapore Indian Institute of Technology Kanpur, India RMIT University University of Gezira Etisalat University College Etisalat College of Engineering Etisalat University College QUT University of Melbourne MoTECH Software Swinburne University of Technology AGH University of Science and Technology University of Canterbury University of Melbourne University of Western Australia Etisalat University College University of South Australia University of South Australia WATRI University of Canterbury California Institute of Technology Western Australian Telecommunications Research Institute Hongik University School of Computer Science and Information Technology, RMIT University Nanyang Technological University University of South Australia Rensselaer Polytechnic Institute Nanyang Technological University University of Melbourne University of Canterbury University of Maryland Bogazici University University College Cork Telstra Ajou University University of Melbourne Massey University University of Canterbury Nanyang Technological University National University of Singapore Nanyang Technological University Nanyang Technological University University of Melbourne Indian Institute of Technology,Bombay Information and Communications University Pharad Bionic Ear Institute Queensland University of Technology IIT-Bombay Massey University

Name

Affiliation

Doo-seop Eom Emre Aktas Enn Vinnal Eric Lehmann Eric Wong Fabrizio Talucci Fawaz AL-Qahtani Felix Hartanto Feng Shu Firas Al-Ali Franco Davoli Gavin Baker Graham Goodwin Greg Cresp Gregory Day Grenville Armitage Ha Duong Hai Le Vu Hamza Ozer Heung-No Lee Hong Ren Wu Hong Seong Park Hongtao Tian Horace King Huseyin Uzunalioglu Ian Holland Irena Atov Izhak Rubin Jae-Hyun Kim Jason But Jayalakshmi Nambiar Jeong-dong Ryoo Jeonghoon Mo Jerzy Konorski Ji Li Jill Slay Jinwoo Jung Jitae Shin Jong-Mu Choi Jun Guo Jusak Jusak Kahtan Mezher Kannan Govindan Kannan Perumal Katrina Neville Kevin Lin Kihyung Kim Kiki Ren Kim Gribbon Kim Jai-Hoon Kin Choong Yow King-Tim Ko Krzysztof Pawlikowski

Korea University Hacettepe University Telstra University of Western Australia City University of Hong Kong

i2telecom

RMIT University The Chinese University of Hong Kong University of Melbourne Massey University CNIT University of Melbourne The University of Newcastle WATRI Curtin University of Technology Swinburne University of Technology University of South Australia University of Melbourne Turkish National Research Institute of Electronics and Cryptography University of Pittsburgh RMIT University Kangwon National University Nanyang Technological University Swinburne University of Technology Bell Labs, Lucent Technologies WATRI Swinburne University of Technology University of California at Los Angeles Ajou University, South Korea Swinburne University of Technology IIT-Bombay ETRI Information and Communications University Gdansk University of Technology University of Melbourne University of South Australia Sangmyung University Sunkyunkwan University Ajou University University of Melbourne RMIT University Etisalat University College IIT-Bombay Honeywell Technology Solutions Lab RMIT University RMIT University Ajou University Telstra Research Laboratories Massey University Ajou University Nanyang Technological University, Singapore City University of Hong Kong University of Canterbury

Name

Affiliation

Kyeong-Deok Moon Kyungran Kang Lachlan Andrew Lau Yuu Seng Lei Shang Lihai Liu Linda Davis Mahmoud Al-Qutayri Majid Al-Dabbagh Malin Premaratne Mark Halpern Markus Markgraf Matthew Peacock Mayank Keshariya Milosh Ivanovich Minh Tran Mitch Thornton Mohammed Al-Mualla Myung Hoon Sunwoo Nazar Ali Neville Churcher Neville Watson Oliver Yang Parampalli Udaya Patrick Hu Paul Fitzpatrick Peter O'Shea Pramudi Suraweera Preeti Rao Qassim Nasir Qiang Fu Rafal Stankiewicz Ramakrishnan Mukundan Ramesh Rayudu Ray Hunt Rebecca Wang Richard Harris Robert Suryasaputra Roger Browne Ruili Wang S. N. Merchant Saleh Al-Araji Sam Yu Sammy Chan Sanghoon Lee Sanjay Bose Sebastian Zander Seedahmed Mahmoud Seong-Lyun Kim Sergio Palazzo Seung-Woo Seo Shihab Jimaa Shyam Parekh Siow Yong Low

Electronics and Telecommunications Research Institute Ajou University University of Melbourne RMIT University RMIT University City University of Hong Kong Macquarie University Etisalat University College RMIT University Monash University National ICT Australia (NICTA) DLR The University of Sydney University of Canterbury Telstra Research Laboratories Swinburne University of Technology Southern Methodist University Etisalat University College Ajou University, Korea Etisalat University College University of Canterbury University of Canterbury University of Ottawa University of Melbourne University of Auckland Telstra Research Laboratories Queensland Universtiy of Technology University of Canterbury IIT-Bombay University Of Sharjah Swinburne University of Technology AGH University of Science and Technology University of Canterbury Massey University University of Canterbury RMIT University Massey University RMIT University Massey University Massey University IIT Bombay AC Ajou University City University of Hong Kong Yonsei University Nanyang Technological University Swinburne University of Technology RMIT University Yonsei University University of Catania Seoul National University, Korea. Etisalat College of Engineering Lucent Technology Curtin University of Technology

Name

Affiliation

Son Young Sung Steven Gordon Subhas Mukhopadhyay Sudhanshy Shekhar Jamuar Sunghyun Cho Sungwoo Tak Suresh Venkatachalaiah Suyong Eum Taka Sakurai Tasso Athanasiadis Tee Hiang Cheng Thaya Thanabalasingham Thuy Nguyen Tony Cui Tracy Camp Vasil Hnatyshin Walid Mahmoud Warren Harrop Warwick Irwin Wayne Griffiths Weihua Wang Wende Zhong Wendong Xiao William Zhiyong Liu Xia Li Xiang Gui Yatindra Nath Singh Yinghua Guo Yong Liaw Yongguang Zhang Yoohwan Kim Young-Bae Ko Younglok Kim Youngsu Chae Youngyong Kim Yun Li Zahir Hussain

ETRI University of South Australia Massey University Universiti Putra Malaysia Samsung Advanced Institute of Technology Pusan National University RMIT University RMIT University University of Melbourne RMIT University Nanyang Technological University The University of Melbourne Swinburne University of Technology University of Melbourne Colorado School of Mines Rowan University University of Baghdad Swinburne University of Technology University of Canterbury WATRI University of Melbourne Nanyang Technological University Institute for Infocomm Research University of Canterbury University of South Australia Massey University Indian Institute of Technology Kanpur University of South Australia University of South Australia HRL Laboratories, LLC University of Nevada, Las Vegas Ajou University Sogang University Yeungnam University, Korea Yonsei University ChongQing University of Posts and Telecommunications of China RMIT University

Guest Speakers

Tencon'05 is proud to announce the following keynote and invited speakers at our Conference:

Keynote Speaker: Dr Radia Perlman (Sun Microsystems)

Radia Perlman's work has had a profound effect on the world of networking. She designed the spanning tree algorithm used by bridges, and many of the key algorithms that make link state protocols (IS-IS, OSPF) robust, manageable, and scalable. Her work has also been seminal in routing security and tangible computing. Recent contributions include secure digital shredding of data, strong password protocols, transparent routing, scalable PKI-based cross-organizational authentication and authorization, and analysis and redesign of IKE (the authentication handshake for IPsec). One of her missions is to get people to think critically about networking, rather than just memorizing the details of what happens to be currently deployed, or believing everything they hear or see in print. Titles of recent talks she has given include "How to build an insecure system out of perfectly good cryptography", "Things we all know about network protocols that aren't true", and "Miss Manners Meets the IETF".

She is currently Distinguished Engineer at Sun Microsystems Laboratories. She is also a series advisor for Prentice Hall, and serves on both the routing and security directorates of IETF.

She is the author of "Interconnections: Bridges, Routers, Switches, and Internetworking Protocols", and coauthor of "Network Security: Private Communication in a Public World". Both books are popular both with engineers and as university textbooks. She has taught graduate and undergraduate level courses at Harvard, MIT, and University of Washington. Holding approximately 70 patents, she was named Silicon Valley Intellectual Property Law Association's 2004 Inventor of the year.

Radia Perlman has a PhD in computer science from MIT and an honorary doctorate from KTH, the Royal Institute of Technology, Sweden.

from KTH, the Royal Institute of Technology, Sweden. Mythology and Folklore of Network Protocols It's natural

Mythology and Folklore of Network Protocols

It's natural to assume that network protocol design is a well-known science, where the designers of today's standards take care to understand the tricks and pitfalls learned from previous protocols. This talk dispels this and other myths. It is intended to be provocative, making people question the things people assume are true; instructive, giving hints as to how to avoid some of the problems in future protocols; and inspirational, convincing students that there are ample opportunities to make contributions.

This talk discusses wrong turns that have been made, such as what necessitated the invention of bridges, and what caused IP multicast to be unimplementable. It also talks about how a protocol, even one “proven correct”, can go horribly wrong, such as the unstable ARPANET protocol for distributing routing information. It talks about "obvious" tricks such as version numbers that even today protocol designers insist on misusing. And it covers some of the areas in which research is most needed.

Keynote Speaker: Professor Rod Tucker (University of Melbourne)

Speaker: Professor Rod Tucker (University of Melbourne) Professor of Electrical Engineering, Head (1990-1992, 1996),

Professor of Electrical Engineering, Head (1990-1992, 1996), Department of Electrical and Electronic Engineering, and Director, Photonics Research Laboratory, University of Melbourne; Director, ARC Centre for Ultra- Broadband Information networks; Director - Melbourne, Australian Photonics Cooperative Research Centre (1992-1998).

Fellow, Australian Academy of Science. Fellow, Australian Academy of Technological Sciences and Engineering. Fellow, Institute of Electrical and Electronics Engineers (IEEE). Fellow, Institution of Engineers, Australia (IEAust).

Awards and Prizes Harkness Fellowship, Commonwealth Fund of New York, 1975. IEEE Lasers and Electrooptics Society, Distinguished Lecturer award, 1995. Fisk Prize, Institution of Radio and Electronics Engineers, Australia, 1970. M.A. Sargent Medal, awarded in 1995 by IEAust., for outstanding contributions to Electrical Engineering. Australia Prize, awarded by the Australian Government in 1997, for outstanding contributions to Telecommunications.

Towards an Optical Internet

The Optical Internet is a vision that achieved prominence during the boom times of the late 1990’s. This vision of a near-infinite-bandwidth network using advanced photonics was underpinned by a surge in optimism about the capabilities of photonic technologies. With the passing of the boom, a new realism has emerged about the role of photonics in optical networking. The vision of an Optical Internet is not dead, but there now a clear understanding in the telecommunications industry that the Optical Internet will become a reality only when it can provide a cost-effective alternative to present-day technologies.

In this talk, I will give a personal perspective on some of the photonic technologies, circuits, sub- systems, and architectures that will be needed to implement a cost-effective Optical Internet. I will describe a number of evolutionary scenarios that may lead to increased use of photonic switching and signal processing in the network, and compare the cost-effectiveness of a number of optical network architectures. I will show how the relative costs of different architectures depend on the cost of key photonic technologies and the total network capacity.

Invited Speaker: Professor fred harris (San Diego State University)

fredric j. harris holds the CUBIC Signal Processing Chair of the Communication Systems and Signal Processing Institute at San Diego State University where since 1967 he has taught courses in areas related to Digital Signal Processing and Communication Systems. He has extensive practical experience in communication systems, high performance modems, sonar and advanced radar systems and high performance laboratory instrumentation. He holds a number of patents on digital receiver and DSP technology and lectures throughout the world on DSP applications. He consults for organizations requiring high performance, cost effective DSP solutions.

He is well published and has contributed to a number of books on DSP. In 1990 and 1991 he was the Technical and then the General Chair of the Asilomar Conference on Signals, Systems, and Computers that meets annually in Pacific Grove, California. He is the 2003 Technical Chair of the Software Defined Radio Conference. In 2003 he became a Fellow of the IEEE and was cited for contributions of DSP to communications systems. His education includes a Bachelor's Degree in EE from the Polytechnic Institute of Brooklyn (1961), a Master's Degree in EE from San Diego State University (1967) and Ph.D. work at the University of California, San Diego (1968-1973).

He is the traditional absent-minded professor and drives secretaries and editors to distraction by requesting lower case letters when spelling his name. He roams the world collecting old toys and slide-rules and riding old railways.

old toys and slide-rules and riding old railways. Signal Processing In Telecommunications Many years ago a

Signal Processing In Telecommunications

Many years ago a mentor questioned why I was pursuing Digital Signal Processing. He commented, “All you can do with DSP is process audio, and why would you want to do that? I’m glad I ignored his poor advice. I also remember sitting in a graduate course listening to an instructor describe some aspect of optimum detection and thinking to myself, “It will never happen:

this is too complicated a process to ever see the light of day.” Ok, so I’m not right all the time! We certainly have come a long way haven’t we? I am, as many of us are, immersed in DSP as an educator, a practitioner, a researcher, a benefactor, or at least as a consumer. It is fun to pose to the following questions: Where did it all start? Where is it now? Where is it going?

One thread in the sequence “where did it start, where is it now” is seen in the following. It was in 1965 that James Cooley and John Tukey published their paper “An algorithm for the machine calculation of complex Fourier series" Who would ever have predicted that their Fast Fourier Transform (FFT), an algorithm designed to compute spectra, would become the core of a ubiquitous modulation and demodulation scheme known as Orthogonal Frequency Division Multiplexing (OFDM). It is everywhere! It is used in Local Area Networking (LAN, IEEE 802.11a, 802.11g), in Digital Audio Broadcasting (DAB), in Digital Video Broadcasting (DVB), in Wide Area Networking (WAN, IEEE 802.11n, 802.16a), in Asynchronous Digital Subscriber Lines (ADSL), and in Multiple Input Multiple Output (MIMO).

This talk will be a nostalgia trip through the early days of DSP mixed with a report of the current state of DSP in modern communications topped by a bit of crystal ball prediction of where DSP is going.

Invited Speaker: Dr Malin Premaratne (Monash University)

Malin Premaratne received the BSc(Maths.) and BE(Elec.) with first class honours from the University of Melbourne, Australia, in 1995 and Ph.D from the University of Melbourne, Australia, in 1998. From 1998 to 2000, he was with the Photonics Research Laboratory, a division of the Australian Photonics Cooperative Research Centre (APCRC), the University of Melbourne, Melbourne, Australia, where he was the co-project leader of APCRC Optical Amplifier Project. During this period he worked with Telstra, Australia and Hewlett Packard, USA through the University of Melbourne. From 2000 - 2003 he was involved with several leading startups in photonic area either as an employee or a consultant.

During this period, he has also served in the editorial boards of SPIE/Kluwer publishers and Wiley publishers in optical communications area. From 2001-2003, he worked as the Product Manger (Research and Development) of VPIsystems Optical Systems group.

Since 2000, he has been appointed as a Senior Associate/Senior Fellow of the University of Melbourne, Australia. Since 2001 he also serve as the Chairman of IEEE Lasers and Electro- Optics Society in Victoria, Australia.

Dr Premaratne is a senior member of IEEE and since 2003 leads the research program in high performance computing applications to complex system simulation at Advanced Computing and Simulation Laboratory (AXL) at Monash University, Australia. He has published over 75 research papers in the areas of semiconductor lasers, EDFA and Raman amplifiers, optical network design algorithms and numerical simulation techniques. His current research interests include the areas of optical network design, analysis and configuration methods, simulation of optical and electromagnetic interaction with biological and other turbid substances, grid and cluster computing and realistic scene rendering in computer graphics using optical physics based methods.

in computer graphics using optical physics based methods. Photonic Transport in Biological Tissue - Application of

Photonic Transport in Biological Tissue - Application of Optical Communications Techniques to Bio-Sensing

In this talk I shall discuss applications of photon transport in biological tissue for non-invasive sensing and imaging work. Much emphasis will be given to using already available tools in the telecommunications area for such work. I shall also highlight some of the key fundamental problems and challenges that need to be overcome to design and build next generation biophotonic devices.

Invited Speaker: Mike Schwartz (Executive Director, New Generation Systems, Telcordia Technologies)

Mr Schwartz is sponsored by ATNAC 2005

Technologies) Mr Schwartz is sponsored by ATNAC 2005 Mike Schwartz is Executive Director in Telcordia

Mike Schwartz is Executive Director in Telcordia Technologies New Generation Systems organization. He is responsible for identifying the impact of technology, regulation, and competition on Telcordia's new software products and solution offerings. His work influences product and solutions investments, marketing plan development, competitive response, distribution and alliance strategies, and international strategies.

Mr. Schwartz's career spans over 37 years in the telecommunications industry. Mr. Schwartz has led organizations responsible for the development of industry technical requirements and standards, and organizations responsible for the development and execution of conformance and interoperability test capabilities. He was responsible for the implementation of a new business within Telcordia to bring Telcordia's technical services to the telecommunications equipment supplier market place.

Mr. Schwartz received his BS (EE) from Rensselaer Polytechnic Institute in New York State, and his MSEE from the University of California-Berkeley.

Mr. Schwartz is a member of the Tau Beta Pi Engineering Honor Society, and a Senior Member of IEEE. He holds a seat on the Council of the World Telecommunications Congress and International Symposium on Services and Local accesS (ISSLS) and is a former Chairman of the ISSLS Council and its financial board.

Triple Play: Converge on the Screen, not on the Bill

Triple Play offerings today are all about discounting packages of voice, video, and data services, but that's not where the future lies. The spread of broadband access and IP service platforms allows operators to converge services where the customer uses them, at the communications device.

Moreover, communications devices increasingly come with visual displays, or screens. With the addition of video services to make the Triple Play, even the Home TV can become a central communications device, where voice, data and video services are accessed and used. This kind of convergence can transform the entire customer experience. This presentation will provide examples of how services can be converged, and how such convergence can be used to differentiate operator offerings on more than discounted price.

Invited Speaker: Professor Ray Jarvis (Monash University)

Ray Jarvis completed his BE (Elec.) and Ph.D. (Elec.) at the University of Western Australia in 1962 and 1968, respectively. After two years at Purdue University he was appointed to the Australian National University (ANU) to teach Computer Science. He was instrumental in establishing the Department of Computer Science at ANU and was its first Head of Department. He joined Monash University in 1985 and established the Intelligent Robotic Research Centre in 1987. He has been the Centre's Director since then. His research interests are in Computer Vision and Robotics. Both robotic manipulators and mobile robots of various sizes have been part of his interests. Most recently he has been working on autonomous and tele- operated vehicles and vessels including a tracked vehicle, several boats, an amphibious craft, an excavator and a half scale Russian built Martian Rover. He has also recently developed a research interest in Humanoid Robotics. From an AI perceptive his main interests are in Computer Vision and Path Planning. He is Director of the recently established Australian Research Council Centre for Perceptive and Intelligent Machines in Complex Environments.

Perceptive and Intelligent Machines in Complex Environments. Intelligent Robots: The Small, the Big and the Many

Intelligent Robots: The Small, the Big and the Many

Intelligent Robots come in a variety of shapes and sizes and can operate individually and in swarms. This paper will cover the underlying navigation principals for such machines and provide a number of case studies to illustrate how these principals can be integrated.

machines and provide a number of case studies to illustrate how these principals can be integrated.

1B-01

Session Title: Traffic and Resource Management 1 Chairperson: Greg Egan

Day:

Tuesday

Date:

22 nd November 2005

Time:

11:20AM – 1:00PM

Room: M1

1B-01.1

An Effective Hotspot Cell Management Scheme Using Adaptive Handover Time in 4G Mobile Networks

Dong Wook Kim

"We propose a hotspot cell management scheme using adaptive handover time in 4G mobile networks. 4G networks are expected to support various multimedia services over IP network and satisfy high spectral efficiency requirement with overcoming time and frequency selective fading due to the high speed of users. In cellular systems including 4G networks, hotspot cells can be occurred when available wireless resources at some location are not enough to sustain the needs of users. The hotspot cell can potentially lead to blocked and dropped calls and cause degradation of the service quality. In the meanwhile, a band of users enjoying multimedia services can move around in a 4G mobile network, which may generate heavy flows of traffic load in the network. This situation can generate the hotspot cell which has a short length of life at most a few minutes. In this paper, we propose a handover-based scheme which can effectively manage hotspot cells in 4G mobile networks. The proposed scheme adopts hard handoff mechanism and dynamically controls the time point of handover based on the amount of load of the current serving cell and the target cell. Adaptation of handover time according to the amount of load effectively and flexibly can manage the hotspot cell. And, through our hotspot cell management scheme, acceptable service quality can be supported as users maintain graceful connections with the network. In the simulation results, we find that our scheme makes smaller number of hotspot cells and supports higher service quality than compared schemes."

1568961181

1B-01.2

A Game Theoretic Framework for Call Admission Control in CDMA Mobile Multimedia Systems with Traffic Asymmetry between Uplink and Downlink

Jenjoab Virapanicharoen, Watit Benjapolakul

"The call admission control (CAC) for code-division multiple-access (CDMA) mobile multimedia systems is a very important engineering issues since it belongs to the category of resource management and the radio spectrum is a very scarce resource. Since efficiency is an important performance issue in the mobile networks with multimedia services, the concept of fairness among services should also be considered. Game theory can provide an appropriate framework for formulating such fair and efficient CAC problem. In this paper, a selection method for fair- efficient threshold parameters of the CAC scheme in CDMA mobile multimedia systems with traffic asymmetry based on the framework of game theory is proposed. The proposed scheme provides fairness and efficiency in terms of uplink and downlink signal-to-interference ratio (SIR) for the 2 classes of traffic, and also guarantees the priority of class 0 calls over class 1 calls. Class 0 calls and class 1 calls are viewed as two players of a game. The numerical results show that there is an equilibrium point of the noncooperative game for any given offered load. For the cooperative game, the arbitration schemes for the

1568963458

interpersonal comparisons of utility and the bargaining problem are investigated. In the aspect of the social welfare (total utility), the results also indicate that the Nash solution of the bargaining problem outperforms the equilibrium point and the solution of the interpersonal comparisons of utility due to its much higher total utility."

1B-01.3

Evaluating the Restorability in WDM Networks Based on Directional Cycle Decomposition Algorithm (DCDA)

Chuan-Ching Sue, JunYing Yeh, Shih-Chang Hsu, Chao-Yang Lee

"The Directional Cycle decomposition Algorithm (DCDA) is one method to achieve full restoration and tolerate as many faults as possible in wavelength division multiplexing (WDM) networks without the capability of wavelength conversion. This paper formulates the restorability computing in WDM network based on DCDA. Two methods are proposed to compute the restorability. One computes the restorability exactly using the information from the original network and its corresponding G+. Another computes approximately using the information only from the corresponding G+. The results indicate the restorability is decreasing very fast with more and more simultaneous faults. Moreover, the average error in the approximate method is limited from 8.37% on ArpaNet to 2.94% on Icosahedron."

1568964014

1B-01.4

Analysis of Real-Time Multiple Source Video Streaming via Wireless 5.8 GHz for Intelligent Traffic Management System

1568964791

Vishnu Monn Baskaran

"This paper evaluates the performance of live compressed motion image transmission in coherence with the development of the Multiple Video Streaming and Compression (Multiple-VSCS) software, as applied for the Intelligent Traffic Management system. Motion Images are captured, compressed and streamed real time via utilization of the 5.8 GHz OFDM Outdoor Wireless LAN network. Experiments were performed and analyzed to ascertain the reliability and potency of this application with improved bitstream rates as low as 50kbps and compression ratio rates as high as 1800:1, under various compression parameters settings as well as different video formats. This paper also includes performance analysis of video stream rates with comparison into varying compression formats and Quantization Factors retrospective to Quality of Service (QoS). Projections were also performed as behavioral study on the effects of the available bandwidth with increased video capture sources and streaming processes. Keywords:

H.263 compression codec, Outdoor OFDM 5.8 GHz WLAN, Traffic Management System"

1B-01.5

1568964827

PIPPON: A Physical Infrastructure-aware P2P Overlay Network

Doan Hoang, Hanh Le, Andy Simmonds

"The scalability and efficiency of P2P systems are determined largely by two factors: the degree of matching between the P2P overlay and its underlying physical network, and the efficiency of the P2P application routing scheme. Most current P2P systems address one or the other but not both in an integrated manner. This paper proposes PIPPON, a two-layer architecture to address these performance issues. At the overlay network layer, the paper proposes a simple but effective Geo-LPM/Geo- Partitioning scheme for constructing overlay that mirrors the physical Internet. At the application routing layer, the paper introduces a dynamic Key Tree that is built on the optimized overlay to rout P2P messages efficiently. Simulation results indicate that PIPPON is scalable and efficient, and holds promise as a platform for large scale P2P applications."

1B-02

Session Title: Ad Hoc Networks Chairperson: Alexander Kist

Day:

Tuesday

Date:

22 nd November 2005

Time:

11:20AM – 1:00PM

Room: M1

1B-02.1

CLA-QOS: A Cross-Layer QoS Provisioning Approach for Mobile Ad-hoc Networks

Hongtao Tian, Sanjay Bose, Choi Look Law, Wendong Xiao

"The increasing popularity of the multimedia applications in mobile ad hoc networks (MANETs) has led to research on QoS support for these applications. However, this is difficult in such networks because of factors such as shared and variable wireless bandwidth, limited power supply and possible mobility of the nodes. Although many QoS provisioning schemes have been presented, few have provided the end-to-end QoS assurance from the point of view of cross layer optimization. In this paper, a cross-layer approach to QoS provisioning (CLA-QOS) is proposed to provide such QoS support. Simulation results show that the CLA-QOS approach provides QoS guarantees in terms of the in-time packet delivery ratio of packets. Simulation studies supporting this are provided."

1568963601

1B-02.2

Modifying AODV for Efficient Power-Aware Routing in MANETs

Chee-Wah, Tan

1568964415

Sanjay Bose

"Unlike infrastructure based wireless networks, nodes in mobile ad hoc networks (MANETs) will also have to act as intermediate nodes for data routing. These additional transmissions will further drain the power resources of mobile nodes which are anyway likely to be running on limited battery power. This paper proposes a Power-Aware Ad hoc On-demand Distance Vector routing protocol (PAW- AODV) for such power limited applications. This uses the overall power resources of the system more efficiently than the standard AODV protocol by choosing routes based on a power-based cost function. We implement our proposed PAW-AODV protocol by suitably modifying AODV and study it through simulations using QUALNET. Simulation results show that PAW-AODV is able to provide more throughput than AODV over the life of the system and can make better use of the limited battery power available."

1B-02.3

A Heuristic for low power QoS routing in ad hoc networks

Somnath Ghosh, Stacey Osbrough, Samar Singh

"For an important class of ad hoc wireless networks, conserving power is a major concern. All nodes in an ad hoc network participate in routing and forwarding of packets. Many ad hoc networks support applications which require network connections with guaranteed quality of service (QoS). In this paper a simple routing scheme is presented for controlling the network topology so that QoS routes are provide while keeping transmitter power at the nodes close to minimum."

1568965127

1B-02.4

An Intrusion Detection System for Suburban Ad- hoc Networks

Muhammad Islam, Ronald Pose, Carlo Kopp

"Due to the nature of the wireless media, ad-hoc wireless networks are vulnerable to various attacks. There are security protocols that prevent unauthorized nodes from accessing the network through authentication. Secrecy of information is provided through encryption. However these protocols cannot detect if any member of the network degrades the network performance due to misbehavior. Therefore an intrusion detection system (IDS) is required that monitors what is going on in the network, detects misbehavior or anomalies based on the monitored information and notifies other nodes in the network to take necessary steps such as to avoid or punish the misbehaving nodes. In this paper we propose an IDS, referred to as the SAHN-IDS, suitable for multi-hop ad-hoc wireless networks like a SAHN (Suburban Ad-hoc Network). SAHN-IDS detects misbehavior based on nodes getting an unfair share of the transmission channel. It also detects anomalies in packet forwarding, such as intermediate nodes dropping or delaying packets. Unlike most IDSs for detecting anomalies in packet forwarding, SAHN-IDS does rely on overhearing packet transmissions of neighboring nodes, since that is ineffective in networks where nodes use different transmission power, different frequency channels and directional antennas for different neighbors. Moreover, unlike most IDSs, most of the thresholds in SAHN-IDS are set dynamically. We show the effectiveness of SAHN-IDS through simulations."

1568965270

1B-02.5

"Ranger, a Novel Intrusion Detection System Architecture for Mobile Ad Hoc Networks"

1568964898

Yinghua Guo, Steven Gordon

"The proliferation of wireless communication and mobile computing is driving the emergence of Mobile Ad hoc Networks (MANETs) with wide application ranges from civilian environment to military communication. However, securing MANETs is a highly challenging issue due to their inherent characteristics. Intrusion detection is an important security mechanism, but little effort has been directed towards efficient and effective architectures for Intrusion Detection System (IDS) in the context of MANETs. We investigate existing IDS architecture design issues, and propose a novel mobile agent based IDS architecture that has each node implementing basic IDS functions, while ranger agents roam the network executing more advanced IDS functions. This is suited to MANETs because it avoids the single point of failure problem, minimises communication overheads at the same time as providing up to date information for intrusion decisions."

1B-03

Session Title: Image Processing 1 Chairperson: Donald Bailey

Day:

Tuesday

Date:

22 nd November 2005

Time:

11:20AM – 1:00PM

Room: P1

1B-03.1

A Rotational Motion Estimation Method for Digital Image Stabilization

Joon Lyou, Ho Dong Seok, Hwy Kuen Kwak

"A simple and robust digital image stabilization system subjected to a rotational and translational motion is devised. It is shown that single rotation model can accommodate a combined rotational and translational motion. Thanks to this simplification, the present digital image stabilization(DIS) system works well via estimation of rotation center and angle between image frames, instead of estimation of both the rotational and translational motion parameters as found in the previous DIS schemes. Hence, the computational burden of our algorithm is considerably less, because it does not require the time consuming parameter searching, while showing a comparable performance to the previous ones."

1568963922

1B-03.2

Medical Image Processing: From Lossless to Lossy Compression

Oh Tick Hui, Heng Siong Lim, Shen Yee Pang

"Compressed image will always reduce the image fidelity. This is especially so if the image is compressed at lower bit rates, which most of the time cannot be tolerated. Compression is necessary in medical field due to the limited transmission bandwidth and storage capacity. In this paper, performance of the controversial lossy compression on medical modalities using the new JPEG2000 and the more conventional JPEG is being studied. The common objective measure, peak signal-to-noise ratio (PSNR) is definitely not adequate as a perceptual quality measurement. Therefore, subjective measures such as picture quality scale (PQS) and mean opinion score (MOS) are used as the benchmark instead, along with the statistical and frequency measures for the image characteristics evaluation. Three types of medical modalities are used X-ray, Ultrasound and Computed Tomography (CT). From these various measurements, the general acceptable compression bit rate for each of the medical modality is determined."

1568964731

1B-03.3

CFA Demosaicking with Improved Colour Edge Preservation

Sharmil Randhawa, J.S. Jimmy Li

"Colour edges are sharp boundaries between two distinct colours. Most exisiting demosaicking methods depend on assumptions which will be invalid at edges. In this paper, we apply a method that avoids interpolation across an edge by extrapolating estimates in four different directions. In order to improve colour edge preservation, we propose a novel classifier to select the best estimate in conjunction with its surrounding pixels. It has been shown that our method outperforms visually and quantitatively with image quality measures, when compared with other existing methods."

1568964744

1B-03.4

Feature-Oriented Coupled Bidirectional Flow for Image Denoising and Edge Sharpening

Shujun Fu, Qiuqi Ruan, Yuliang Geng, Wenqia Wang

"In this paper, a new type of diffusion process that simultaneously denoises and sharpens images is considered. We presents a feature-oriented coupled bidirectional flow process, where, according to image features such as edges, textures, and fine parts, it can switch from a forward diffusion to a backward (inverse) one along the normal directions to the isophote lines (edges), while a forward diffusion is performed along the tangent directions. To eliminate the conflict between the backward and the forward force, we split them into a coupled scheme. In order to enhance image features the nonlinear diffusion coefficients are locally adjusted according to the directional derivatives of the image. Experimental results demonstrate that our algorithm can substantially enhance features on denoising smoother areas of the image."

1568964757

1B-03.5

Semi-supervised Segmentation of Textured Images by Using Coupled MRF Model

1568964775

Yong Xia, Dagan Feng, Rongchun Zhao

"Markov Random Field (MRF) is extensively used in model- based segmentation of textured images. In this paper, we propose a coupled MRF model and adopt the MAP-MRF framework to solve the semi-supervised segmentation problem. The observed image and the desired labeling are characterized by the Conditional Markov (CM) model and the Multi-Level Logistic (MLL) model, respectively. The parameters of CM models are estimated as texture features, and contextual dependent constraints are posed to the object function by the MLL model. Different from the existing methods, the two MRF models are mutually dependent in our approach and therefore texture features and the labeling must be optimized simultaneously. To this end, a step-wised optimization scheme is presented to achieve a suboptimal solution. The proposed algorithm is compared with a simple MRF model based method in segmentation of Brodatz texture mosaics. The experimental results demonstrate that the novel approach can differentiate textured images more accurately."

1B-04

Session Title: IT Applications 1 Chairperson: Horace King

Day:

Tuesday

Date:

22 nd November 2005

Time:

11:20AM – 1:00PM

Room: P3

1B-04.1

Automated Translation of Behavioral Models using OCL and XML

Sabnam Sengupta, Ananya Kanjilal, Swapan Bhattacharya

"The UML diagrams present different but partly overlapping views of the same system and hence design risks due to inconsistencies among diagrams is inevitable. Automated translation of behavioral diagrams is one way of ensuring consistency among the different models that can take us one step forward towards formalizing behavioral specifications of the system. In this paper based on the dependencies between some of the commonly used diagrams, we have proposed a methodology for translating automatically a set of behavioral diagrams (Sequence to State Transition Diagrams). As this translation is automated, the consistency among the diagrams is automatically checked. Our approach combines both OCL and XML technologies. Based on the OCL constraints, we here propose a methodology for automated derivation of statechart diagram from a set of sequence diagrams with the help of XML."

1568964598

1B-04.2

A Dual-Spiral Reengineering Model for Legacy System

Xiaohu Yang, Lu Chen, Xinyu Wang, Jerry Cristoforo

"Computer Technology has been developing for a long time; more and more systems become outdated. As a result, Legacy System Reengineering becomes a critical effort in many business fields. There are some existing reengineering models, such as Byrne Model and Evolutional Model. They have resolved some problems in the reengineering process, but are not applicable to some scenario. This paper presents a dual-spiral reengineering model, which performs as a cyclic approach, and it could avoid the issues that those models have, making the reengineering process more applicable. This model has been successfully applied to a legacy financial software system reengineering. We will discuss the issues in the Byrne and Evolutional models first, and then present the detail description of Dual-Spiral Reengineering Model which is based on spiral model of software development and enhancement. At last, we will introduce a reference case for our new model."

1568964740

1B-04.3

An Algorithm to Allocate the Testing-Effort Expenditures Based on Sensitive Analysis Method for Software Module Systems

Jung-Hua Lo

"To develop a good reliable software system, a project manager must determine in advance how to effectively allocate these resources. Due to the dynamic properties of the system and the insufficiency of the failure data, the accurate parameter values are hard to determine. Therefore, the sensitivity analysis is often used in this stage to deal with this problem. In this paper, we study two

1568964857

optimal resource allocation problems in a module software during testing phase: 1) minimization of the remaining faults when a fixed amount of testing-effort is given, and 2) minimization of the required amount of testing-effort when a specific reliability requirement is given. Several useful optimization algorithms based on Lagrange multiplier method are proposed. Furthermore, we present the sensitivity analysis on these allocation problems in order to determine which of the parameters affects the system most. Finally, a numerical example is evaluated to validate and show the effectiveness of the proposed approach."

1B-04.4

A BDL-Based E-Commerce Transaction Architecture

Lakshmi Narasimhan, Renyi Zhou

"This paper describes extensions to a Behavioral Description Language (BDL), which was originally proposed to characterize concurrent behavior of simple objects and a group of objects. One of the novelties of this paper is its application to the field of E-Commerce transaction systems. Based on the BDL, we propose new concepts, namely, transaction patterns and transaction architectures, which have event-based semantics to describe large-scale transaction systems. Furthermore, the transaction architecture is introduced as a unified medium for specifying and verifying distributed, heterogeneous and complex E- Commerce transaction processes. It is also illustrated as a powerful modeling technique which is easy-to-use, flexible and promotes re-usability."

1568964866

1B-04.5

Masking approach to secure systems from Operating system Fingerprinting

Surbhie Kalia, Maninder Singh

The system vulnerabilities are most precious thing for attackers. One such vulnerability is OS of the system which can be easily fingerprinted. This paper basically deals with discussion about the primary phases that every OS fingerprinting tool uses to detect the OS of Remote System. The techniques used by popular tools Nmap and Xprobe2 are presented here, in context to understand the security framework that is to be setup to play defensive against them. Further some implementation examples are illustrated for different OS to countermeasure against Fingerprinting."

1568964970

1B-05

Session Title: Modulation & Coding 1 Chairperson: Graham Woods

Day:

Tuesday

Date:

22 nd November 2005

Time:

11:20AM – 1:00PM

Room: M2

1B-05.1

Versatile Multiplexing Based on Hunting-Free Framing

1568963925

Yoshitaka Takasaki

"Application of multipled block codes (MBCs) for realizing new, flexible and versatile multiplexing is investigated. First, the principles of MBC are overviewed to show its capacities of filterless clock recovery. Then it is shown that modification of simple frame structure of MBC line code can be used for attaining hunting-free reframing for multiplexing systems. Finally, the applicatility of hunting-free reframing to versatile multiplexing is investigated. An example of broadband ubiquitous subscriber distribution in terms of versatile multiplexing is discussed."

1B-05.2

Exact Closed-Form Performance Analysis of MFSK Demodulator Based on FFT

Sungdon Moon

"In this paper, we investigate the BER performance of M- ary FSK modulation system using FFT-based demodulator scheme. An explicit BER expression of the FFT demodulator scheme is analytically derived in terms of a closed form and compared with a typical demodulation scheme, the non-coherent detection method. In addition, in order to verify the derived results, the simulation results are together compared. It is noteworthy that the performance of M-ary FSK system with the FFT method is equal to that with non-coherent detection."

1568964586

1B-05.3

Improving Group Delay Measurement Accuracy using the FM Envelope Delay Technique

Graham Woods, Douglas Maskell

"The FM envelope delay technique of measuring group delay is an attractive alternative to standard techniques using equipment like the network analyzer. The theoretical basis for this technique is more complicated though leading to some confusion about how to optimize the measurement accuracy. This paper discusses methods of improving accuracy when making group delay measurements using the FM envelope delay technique. The paper concentrates on two effects which are know to limit accuracy in this approach; the finite bandwidth of the test signal and device mismatch. The potential severity of each source of uncertainty is modeled from theoretically derived expressions and computer simulations. Practical measurements made using a FM envelope delay, group delay measurement system are also provided to verify the predicted trends. Adjusting the FM signal modulation index is shown to be an effective method of minimizing error depending on the characteristics of the device being measured."

1568964676

1B-05.4

A Robust Design of Reconfigurable Coder/Decoder Against Un-authorized Users

Chuan-Ching Sue, Jen-Fa Huang, Yao-Tang Chang, Deng-Sheng Wang, Chao-Yang Lee

"In this paper, an enhanced security mechanism is presented against eavesdropping on spectral amplitude coding (SAC) optical code-division multiple-access (OCDMA) access networks. The reconfigurable coder/decoder (codec) which was constructed with Arrayed- Waveguide-Grating (AWG), optical switch and additional controller unit is used as the basic system to realize the implementation of dynamic code matrix assignment. Instead of employing a huge code space, we adopt the spectral amplitude coding (SAC) with unipolar M-sequence code matrix for a specific signature address (coding) and its match address codeword (decoding). By using the inherent cyclic properties of both AWG routers and M-sequence codes, the reconfigurable coding/decoding scheme is developed to avoid the attack of un-authorized users even with fewer code spaces. Furthermore, a weighted load balance problem based on the power distribution on each wavelength is investigated, and then a dynamic reconfiguration policy is proposed to choose the best code matrix assignment with the minimum weighted degree of load balance. The evaluation results show that the dynamic reconfiguration policy can outperform a class of static policies in terms of two performance metrics, weighted degree of load balancing and the number of register shifting."

1568964745

1B-05.5

Geometrical and Phasor Representation of Multi- level Amplitude-Phase Modulation Formats and Photonic Transmitter Structures

Dung Tran, Le Binh, Thanh Huynh, Ho Siang Tiong

"We describe a geometrical and phasor representation of multi-level amplitude and phase modulation. Based on this representation, the modulation of the lightwave carrier is described using single dual-drive Mach Zehnder interferometric modulator. The generation of optical multilevel amplitude and phase constellations (oMASK or oMPSK) is designed for effective photonic transmission. A number of photonic transmitter structures for the modulation schemes are briefly compared. The driving voltage levels are calculated and the phasor diagrams are developed to demonstrate the effectiveness of modulation schemes. Simulink models are developed to generate the advanced modulation formats for optical fibre communications. Experimental demonstrations will be illustrated."

1568964891

1B-06

Session Title: Time-Frequency Analysis and Wavelets 1 Chairperson: Le Binh

Day:

Tuesday

Date:

22 nd November 2005

Time:

11:20AM – 1:00PM

Room: M3

1B-06.1

Application of Wavelet Array Denoising to ESPRIT Algorithm

1568963787

Yanbo Xue

"ESPRIT algorithm has been widely used in direction-of- arrival (DOA) estimation problem. It degrades greatly in the presence of spatially correlated noises and closely spaced DOA's, and/or at low SNR. Filters are often used to harness the performance degradation because they can recover the signal from its noisy observation. Though Wiener filter is the optimal filter, it requires the knowledge of second-order statistics of the signals and noises, which is difficult to obtain in non-wide-sense stationary signals and noises. Wavelet array denoising has been introduced to ESPRIT method in this paper to provide a possible filtering method in spatially correlated noises. The proposed approach denoises the snapshots of each sensor in parallel and applies conventional ESPRIT algorithm to the denoised data matrix. Simulation results show that by using the proposed approach, we can gain advantages of estimation root mean square error (RMSE) reduction and resolution enhancement."

1B-06.3

Design and Implementation of Wavelet Filter Using Switched-current Circuits

Qinchun Hu, Yigang He, Dixin Guo, Hongmin Li, Meirong Liu

"The design and implementation of wavelet filters using switched-current circuits are presented in this paper. Wavelet filters play a key role in analog hardware implementation of wavelet transform, which have been an attractive option to achieve real-time performance because that every signal is not suitable for digital processing. The switched-current (SI) technique is a relatively new analog sampled-data signal processing technique that aims to replace switched-capacitors. Design techniques for switched-current filters have been described. The key feature of SI circuits from the viewpoint of wavelet transform is that changing the dilation constant can be very precisely controlled by clock frequency. Thus, a seed wavelet filter can be implemented directly as SI filter circuits, with other filers at different scales being simple dilations of it. The desired transfer functions of wavelet filters are approximated by Pade approximation which is able to decompose the transfer function into rational form so as to be conveniently implemented by SI circuits. Therefore, arbitrary wavelet filters can be implemented by the method proposed in this paper. Simulated results have demonstrated the effectiveness of the proposed new method for the implementation of wavelet filter."

1568964702

1B-06.4

Comparison of few wavelets to filter ocular artifacts in EEG using Lifting Wavelet Transform

Salwani Mohd. Daud

"We proposed a technique to remove ocular artifact (OA) from electroencephalogram (EEG) using Lifting Wavelet Transform (LWT). The objectives of OA correction are threefold 1) to reduce the OA magnitude, 2) to retain the neural EEG potentials and 3) to make corrections at the right time localization. Three basic steps involved are to transform the EEG, hard thresholding the wavelet coefficients and the corrected EEG is obtained by inverse transform these threshold coefficients. It is of paramount important to select a suitable wavelet and threshold to accomplish this task. In this investigation, few wavelets were used and their effectiveness performances were compared visually. A level-dependent threshold used was suitable for both blinking and eyeball movements correction. From this study, we concluded that Haar and rbio3.3 outperformed db4 and cdf4.4 wavelets, and had achieved the objectives of OA removal."

1568964729

1B-07

Session Title: Electronic Devices 1 Chairperson: Amin Sadik

Day:

Tuesday

Date:

22 nd November 2005

Time:

11:20AM – 1:00PM

Room: M4

1B-07.1

Spiral Inductor Coupling on 0.25 um Epitaxial CMOS Process

John Richard Hizon, Marc Rosales, Louis Alarcon, Delfin Jay IX Sabido

"In this study, the degree of coupling between two adjacent

inductors is examined. The inductors were implemented on

a 0.25 m epitaxial CMOS process. Coupling

mechanisms considered in this study were magnetic coupling and substrate coupling. The amount of coupling is determined by measuring the s21 parameter between the inductors implemented. The effectiveness of several isolation structures reported in literature in reducing coupling between inductors was evaluated. These isolation structures include patterned ground shields and halo substrate contacts. From measured results, it is found that reducing magnetic coupling by implementing a diagonal configuration improves isolation by 5 dB. Furthermore, patterned ground shields are effective in improving the isolation between adjacent inductors."

1568963793

1568963903

Development of a conductive photoresist with a mixture of SU-8 and HCl doped polyaniline

Uma Annaiyan, Kourosh Kalantar-Zadeh, John Quang Fang, Irena Cosic

"A novel electrically conductive photoresist has been formulated to fabricate microcomponents. The developed conductive photoresist is based upon SU-8 photopolymer,

an insulating negative-tone epoxy, in which protonically doped polyaniline (PANI) nanoparticles have been dispersed to enhance the electrical properties. The characteristics of this new conductive photoresist have been studied via electrical measurements. The process for preparing the conductive films from the combination of EB (Emeraldine base) PANI, SU-8 and NMP (N-methyl-2- pyrrolidinone) will be presented. Different weight percentages (wt %) of SU-8 in the above combination have been prepared and spin coated to form thin-films which have been protonated with HCl. The conductivities of the thin-films were measured using a four point probe. The highest conductivity achieved was approximately 1.6 S/cm

for the mixture of 10wt% of SU-8 25 with EB-PANI mixed

with NMP. The morphology of the thin-films was studied

using a Scanning Electron Microscopy (SEM)."

1B-07.2

1B-07.3

A Solar-powered Battery Charger with Neural Network Maximum Power Point Tracking Implemented on a Low-Cost PIC-microcontroller

Panom Petchjatuporn, Ms.Wannaya Ngamkhak, Noppadol Khaehintung, Phaophak Sirisuk, Wiwat Kiranon, Anatawat Kunakorn

"This paper presents the development of a maximum power point tracking algorithm using an artificial neural network for a solar power system. By applying a three layers neural network and some simple activation functions, the maximum power point of a solar array can be efficiently

1568964665

tracked. The tracking algorithm integrated with a solar- powered battery charging system has been successfully implemented on a low-cost PIC16F876 RISC- microcontroller without external sensor unit requirement. The experimental results with a commercial solar array show that the proposed algorithm outperforms the conventional controller in terms of tracking speed and mitigation of fluctuation output power in steady state operation. The overall system efficiency is well above 90%."

1B-07.4

A Complete Isothermal Model for the Lateral Insulated Gate Bipolar Transistor on SOI technology

1568964855

Vasantha Pathirana

"While there are several analytical models dedicated to the vertical IGBT there is virtually no reliable model for the Lateral IGBT (LIGBT). LIGBTs are increasingly popular in smart power and power integrated circuits, especially in those applications where high voltage and high current capabilities are required. Silicon on insulator (SOI) could be the future technology for power devices and integrated circuits due to its much improved device isolation. In this work we report for the first time a complete analytical model for the SOI LIGBT based on semiconductor physics with very few fitting parameters. The model is implemented in the widely available circuit simulator PSpice. The model is assessed against finite element device simulations and experimental results."

1568964880

Threshold Features of L-Band Linear Cavity Multiwavelength Brillouin-Erbium Fiber Laser

Mohammed Hayder Al-Mansoori

Iqbal, Mohamad Khazani Abdullah, Mohd Adzir Mahdi

Investigation of L-band linear cavity multiwavelength Brillouin-Erbium fiber laser source has been experimentally studied. The effects of Brillouin pump power and wavelength on the threshold pump power are discussed in the paper. We found that there is a limited range for Brillouin pump wavelength to achieve a lasing condition in the laser cavity. Low threshold power of 23.4 mW is obtained from the linear cavity due to highly efficient from both double-pass amplification in the Erbium gain medium and also bidirectional generation of Brillouin Stokes in the single mode fiber.

1B-07.5

Syed, Javaid

1B-08

Session Title: Biomedical Engineering 1 Chairperson: James Cheong

Day:

Tuesday

Date:

22 nd November 2005

Time:

11:20AM – 1:00PM

Room: M6

1B-08.1

Mapping of Genetic Algorithms for Protein Foilding onto Computational Grids

Weiguo Liu, Bertil Schmidt

"Computational biology research is now faced with the burgeoning number of genome data. The rigorous postprocessing of this data requires an increased role for high performance computing. In this paper, we present a framework to map hierarchical genetic algorithms for protein folding problems onto computational grids. It has been designed to take advantage of the communication characteristics of a computational grid. By using this framework, the two level communication parts of hierarchical genetic algorithms are separated. Thus both parts of the algorithm can evolve independently. This permits users to experiment with alternative communication models on different levels conveniently. Our experiments show that it can lead to significant runtime savings on PC clusters and computational grids."

1568964867

1B-08.2

Gene Selection and Classification of Human Lymphoma from Microarray Data

Joarder Kamruzzaman

"Experiments in DNA microarray provide information of thousands of genes, and bioinformatics researchers have analyzed them with various machine learning techniques to diagnose diseases. Recently Support Vector Machines (SVM) have been demonstrated as an effective tool in analyzing microarray data. Previous work involving SVM used every gene in the microarray to classify normal and malignant lymphoid tissue. This paper shows that, using gene selection techniques that selected only 10\% of the genes in `Lymphochip'' (a DNA microarray developed at Stanford University School of Medicine), a classification accuracy of about 98\% is achieved which is a comparable performance to using every gene. This paper thus demonstrates the usefulness of feature selection techniques in conjunction with SVM to improve its performance in analyzing Lymphochip microarray data. The improved performance was evident in terms of better accuracy, ROC (receiver operating characteristics) analysis and faster training. Using the subsets of Lymphochip, this paper then compared the performance of SVM against two other well-known classifiers: multi-layer perceptron (MLP) and linear discriminant analysis (LDA). Experimental results show that SVM outperforms the other two classifiers."

1568964879

1B-08.3

Experimental Comparison of Initial Pool Generation for Direct-Proportional Length-Based DNA Computing

Zuwairie Ibrahim, Mohd Saufee Muhammad, Yusei Tsuboi, Osamu Ono, Marzuki Khalid

"Previously, direct-proportional length-based DNA computing (DPLB-DNAC) for solving weighted graph problems such as the shortest path problem, has been proposed. After the initial pool generation, the initial pool is subjected to amplification, by polymerase chain reaction (PCR), and finally, the output of the computation can be visualized by gel electrophoresis. In this paper, we give more attention to the initial pool generation of DPLB-DNAC. For this purpose, two kinds of initial pool generation methods, which are hybridization/ligation and parallel overlap assembly (POA) are evaluated. We found that both of the methods can be successfully employed to generate the initial pool generation of DPLB-DNAC, as supported by results of actual experiments. However, POA is more preferable than that of hybridization-ligation in term of population size and generation time."

1568964985

1B-08.4

A Semi-automatic System for Measuring Tibial Cartilage Volume

James Cheong, David Suter, Flavia Cicuttini

"Osteoarthritis is a chronic and crippling disease affecting an increasing number of people each year. With no known cure, it is expected to reach epidemic proportions in the coming years. Currently, there is strong interest in developing a fully automated cartilage area/volume measurement method in the medical field to assist both pharmaceutical companies and medical professions in researching the disease. This paper describes the development of a semi-automatic system for segmenting and measuring human knee cartilage volume from magnetic resonance imaging (MRI) scans. The cartilage volume obtained from the semi-automated method has been benchmarked against the current gold standard (cartilage volume from manual segmentation)."

1568964991

1B-09

Session Title: Code Division Multiple Access 1 Chairperson: Yuu-Seng Lau

Day:

Tuesday

Date:

22 nd November 2005

Time:

11:20AM – 1:00PM

Room: M8

1B-09.1

Optimization of UTRA SHO Algorithm

Mahamod Ismail, Omar M. Eshanta, Norhayati Ahmad, Muhammad Yusof Ibrahim

"Since the emergence of W-CDMA technology as an air interface of 3G mobile communication systems, extensive researches have been carried out to improve the performance of these systems. Most of these works show that the soft handover technique plays an important role in improving W-CDMA system performance. Several algorithms were developed to meet certain requirements of system such as capacity improvement, interference reduction and traffic balancing [1][2]. Because of this the necessity to optimize these algorithms further increased. In this paper we present a dynamic simulator using MATLAB software to optimize the soft handover (SHO) parameters of UTRA networks by taking the number of SHOs as an optimization criterion. The simulations show that the minimum number of SHOs can be obtained when the active set (AS) size, Add thereshold (Add_th) and Drop threshold (Drop_th) were kept to 2, 2.5 and 3, respectively."

1568964434

1B-09.2

On the Performance of Walsh-LS Codes in CDMA

Systems

Upul Gunawardana, Ranjith Liyana-Pathirana

"Walsh-LS-CDMA (WLS-CDMA) systems is a novel concept employing Loosely Synchronous (LS) codes and Walsh codes. The Walsh-LS spreading codes exhibit an Interference Free Window (IFW) in the auto-correlation and cross-correlation functions, which has the potential to suppress Inter Symbol Interference (ISI) and Multiple Access Interference (MAI), resulting in increased capacity compared to traditional CDMA systems. In this paper the perspective of WLS-CDMA is explored. It is found that the forward-link has better performance than traditional CDMA systems, however in the reverse-link the Walsh-LS codes lose orthogonality."

1568964777

Peter Conti

1B-09.3

Blind Adaptive Multiuser Detection for DS-CDMA Utilizing Sinusoidally-Distributed DSE-CMA

Jusak Jusak, Hanno Luehdorff, Zahir Hussain

The use of adaptive filtering to mitigate the multiple access interference (MAI) in the direct-sequence code division multiple access (DS-CDMA) systems is studied in this paper. Blind adaptive algorithm based on our recently proposed sinusoidally-distributed dithered signed-error constant modulus algorithm (S-DSE-CMA) is introduced to adapt the filter coefficients. This algorithm retains the averaged transient behavior of the constant modulus algorithm (CMA). We evaluate the performance of an adaptive multi-user detector utilizing the S-DSE-CMA scheme against the existed uniformly-distributed DSE-CMA (U-DSE-CMA). It is shown that the new scheme converges faster than the conventional scheme. Simulation results of averaged mean-squared error (MSE) trajectories for synchronous and asynchronous DS-CDMA are presented.

1568964953

1B-09.4

Downlink Soft Handover Mechanism Performance in WCDMA System

Mahamod Ismail, Norazizah Mohd Aripin, Norhayati Ahmad, Muhammad Yusof Ibrahim

"An in depth study of the soft handover effects on the downlink direction of WCDMA network is carried out. The link level study begins with the downlink interference analysis and power allocations for each downlink dedicated channels. Downlink soft handover gain is used in the system level simulation as a main parameter to evaluate the effects of cell selection and power control mechanisms on the downlink soft handover performance. Simulation shown that by using 2-way soft handover mechanism, the required dedicated transmission power up can be reduced up to 3 dB. Besides that, the cell selection scheme based on distance and Ec/I0 value gives better SHO gain (1.3 dB) to the system with SHO overhead equals to 30%. Simulation also has shown that the system can benefit from the soft handover process at 20% to 30% of the SHO overhead. However, power control mechanism does not give significant impact to the SHO gain."

1568965304

1B-09.5

Downlink Performance of a Finite Word Length Implemented Rake Receiver for 3G WCDMA

Kumar V.

"In this paper, the performance degradation due to the finite word length implementation of the Rake receiver for 3G WCDMA is investigated. The performance in terms of bit error rate (BER) as a function of Eb/N0 in Rayleigh fading channels using Monte-Carlo computer simulations are carried out for varied word lengths. The performance results are also compared with that of the floating-point simulations. The 8/6/4/2-bit word length implementations are considered in the simulation runs in order to compare their effect on the performance."

1568963744

1B-10

Session Title: Power Systems Planning and Control 1 Chairperson: Ramesh Rayudu

Day:

Tuesday

Date:

22 nd November 2005

Time:

11:20AM – 1:00PM

Room: M10

1B-10.1

A Design of the Ubiquitous-based Electric Power Control Framework

Mi Ra Kim

"Ubiquitous computing is the next generation computing environments with information & communication technology everywhere, for everyone, at all times. Information and communication technology will be an integrated part of our environments with integrated processors, sensors, and actuators connected via high-speed networks. Ubiquitous- based electric power control framework is a total method that measure electric power usage of each instruments. It uses the RFID, sensor detecting and wireless network. The purpose of this framework is that it would manage the requirement of electric power usage effectively, and inform customer the electric power usage of accuracy."

1568964636

1B-10.2

A Price-Based Unit Commitment Model Considering Uncertainties

Rong-Ceng Leou

"In the regulated environment, unit commitment refers to optimizing generation resources to satisfy load demand at least cost. But in a deregulated power market, generation companies have no obligation to satisfy customers demands. Instead, they seek their maximum profits. This paper proposed a priced-based unit commitment algorithm for generation companies to maximize their profits. This algorithm considering uncertainties of energy prices was solved by cooperation of the greedy algorithm and quadratic program. A five-unit system was used to verify this algorithm."

1568964843

1B-10.3

Industrial Energy Audit using Data Mining Model Web Application

Noor Maricar, MdNoah Jamal

"The excessive use of energy in industrial sectors necessitates the decision maker to always question on how the energy is being used efficiently. Energy used for air- conditioning and lighting in a medium industry counts for almost 60% of the total energy used. The small percentage of energy use reduction relates to the lower product cost and higher profit margins. Therefore, it is important to the decision makers of an industry to have a proper method to audit the building plant and to come up with the practical actions needed in optimizing the use of energy, while at the same time to improve the comfort and product quality. This paper shows the data mining web application for energy audit that can be used in a typical industrial site."

1568964907

1B-10.4

Damping Estimation In Highly Interconnected Power Systems

Mark Glickman, Peter O'Shea, Gerard Ledwich

"In a large interconnected power system, oscillating modes typically arise after disturbances. Estimation of the rate of rise or decay of these disturbances (i.e. of the damping factor) is important so that poorly damped modes which put the system at risk can be identified. In the past both Fourier based and parametric techniques have been used to estimate the damping factors of the oscillating modes. Parametric methods tend to perform poorly in noise and existing sliding window methods do not optimally account for the kind of noise present in real operating environments. This paper presents an improvement to existing Fourier based methods for damping factor estimation. Simulations and real data results are provided to support the claims made in the paper. A comparison with parametric methods is also made."

1568964908

1B-10.5

A Novel Method on Substation Reactive Power Control with the Fuzzy Logic Method

1568965064

Yan XU, Qing LIU, Zengping WANG

"Based on analyzing the status and existing questions of voltage and reactive power integrated control for substations, this paper presents a new voltage and reactive power control system based on fuzzy logic and dynamic borderline applying fuzzy control theory. Simulation tests and practical running have proved that this approach can reduce the adjust times of transformer tap and capacitor effectively and improve the control function."

1B-11

Session Title: Future Challenges Chairperson: Enn Vinnal

Day:

Tuesday

Date:

22 nd November 2005

Time:

11:20AM – 1:00PM

Room: M7

1568963142

Intellectual Property - Challenges for the Future

David Webber

"Intellectual Property law is based on a balance between the interests and needs of the public and those of creators. When the legal systems that underpin intellectual property no longer maintain the correct balance or even worse, neglect it, then respect for those systems and intellectual property erodes. This paper discusses the current level of respect for intellectual property, and measures that could be employed to addresses problems with the current system, particulary for patents and copyright."

1B-11.1

1568965296

The Detection of Curve-type Defects in the TFT- LCD panels with Machine Vision

WooSeob Kim, Yun Su Chung, Jong-Hwan Oh, Il Choi, Kil-Houm Park

"The needs of automated inspection system are grown for the Flat Panel Displays (FPD). However, it is so difficult to detect the defects on the surface of FPD due to non-uniform intensity distribution through the whole panel. Especially, curve-type defects such as micro sized thread and scratch are too difficult to detect with the conventional methods. In this paper, we propose a robust detection algorithm for curve-type defects. The proposed algorithm is composed of flattening, segmentation, and classification. The flattening makes intensity distribution likely to be uniform. The segmentation extracts candidates of curve-type defect and the classification selects real defects from candidates. The experimental result verifies the performance of the proposed method."

1B-11.2

1568965302

The Exograsp delivers tactile and kinaesthetic information about virtual objects

Barry Richardson, Mark Symmons, Dianne Wuillemin

We describe progress towards the provision of realistic cutaneous information to accompany kinaesthetic input currently available in devices used to haptically explore virtual objects. A temperature change at the fingertips is made coincident with touching a virtual soft drink can. Pressure orthogonal to the skin surface contacting the virtual surface can be incorporated in a similar way.

1B-11.3

1B-11.4

Neural Network Ensembles Based Approach for Mineral Prospectivity Prediction

Vanaja Iyer, Chun Che Fung, Warick Brown, Kok- Wai Wong

1568965157

"In mining industry, accurate identification of new geographic locations that are favourable for mineral exploration is very important. However, definitive prediction of such locations is not an easy task. In recent years, the use of neural networks ensemble approach to the classification problem has gained much attention. This paper discusses the results obtained from using different neural network (NN) ensemble techniques for the mineral prospectivtity prediction problem. The proposed model uses the Geographic Information Systems (GIS) data of the location. The method is tested on the GIS data for the Kalgoorlie region of Western Australia. The results obtained are compared to some of the commonly known techniques:

the majority combination rule, averaging technique, weighted averaging method tuned by Genetic Algorithm (GA) and a newly proposed rule based method. The results obtained using the different techniques are discussed."

1568965499

Establishment of Community Information Network in a Developing Nation

Balaji Rajendran, Neelanarayanan, Ponraj Murugesan, Kailash Tandel

"In an era of information propagation through Internet, there are many parts of the world, which have not benefited. This kind of gap, known as 'digital divide' exists even in developed nations. The solution to the problem of bridging this digital divide needs a platform for consuming, sharing, and producing information in an easy-to-use and understandable format, apart from the infrastructural requirements. This paper discusses our solution in the form of a framework, ECKO. Our framework includes the processes, methodologies, guidelines, and deployment models apart from the software. The framework enables fruitful knowledge sharing among and across the communities and helps in creation of multi-dimensional knowledge repositories. We also illustrate our phase-by- phase approach to the solution and it is generic enough to be replicated across countries. The feedback obtained from the stakeholders throughout the various phases is also discussed and is very much encouraging."

1B-11.5

1B-12

Session Title: Array and Space-Time Signal Processing 1 Chairperson: Zahir Hussain

Day:

Tuesday

Date:

22 nd November 2005

Time:

11:20AM – 1:00PM

Room: M9

1B-12.1

Partial Discharges Multi-Targets Localization in Power Transformers Based On Array Signal Processing

R.C LUO

“A new partial discharges multi-targets localization method is presented in this paper, which is based on array signal processing. Two ultrasonic sensor arrays are located on the inner wall of the transformer tank and detect the ultrasonic signal emitted by the partial discharge sources. Spatial spectrum estimation technique is used in analyzing the signal characteristic information (number of signals, direction-of-arrivals et. al) and the number of partial discharge signal estimation, direction-of-arrival estimation and distance estimation are accomplished. The performance of localizations is given by computer simulations. It shows that the method processes with high resolution and good estimated accuracy and can effectively estimate the location parameter of multiple partial discharge sources in transformer."

1568964831

1B-12.2

Space-Time Encoded Secure Chaos Communications with Transmit Beamforming

Lau Yuu Seng, Kevin Lin, Zahir Hussain

"It is shown that the use of chaos shift keying (CSK) with a transmit diversity technique such as beamforming and space-time coding can provide a secure communication link with improvement in the system error performance. Spreading sequences that are used to scramble data in spread spectrum (SS) systems can be generated using a single mathematical relationship of a chaotic generator. These chaotic sequences are very difficult to predict over long-term chaotic pattern unless the exact initial condition of the chaotic generator is known, providing security. On the other hand, beamforming and orthogonal space-time block coding (OSTBC) transmit diversity techniques are known to provide optimal transmitting structures for communication systems, especially if combined. Based on the signal angle- of-arrival (AoA) estimates, the channel correlation matrix can be constructed, and it is shown that signal transmission of OSTBC codes in the eigen-modes of this matrix gives an effective array weighting gain which improves system error performance without sacrificing any diversity and coding gain. A performance study of CSK with beamforming and space-time encoded is carried out in this paper."

1568964834

1B-12.3

Detection Schemes for Distributed Space-Time Block Coding in Time-Varying Wireless Cooperative Systems

Ho Ting Cheng, Tat Lok

“In this paper, we investigate the influence of time varying channels on the bit-error-rate (BER) performance for distributed space-time block coded system. We make use of the pilot symbol assisted modulation (PSAM) to estimate the time varying channel coefficients for assessing the performance of different reception methods, one of which is

1568964837

our newly considered receiver called cooperative maximum likelihood detector while the others are maximum likelihood detection in [12], Alamoutis receiver, zero-forcing detection and decision-feedback detection. Our results show that all detection methods, except cooperative maximum likelihood detection, achieve nearly the same BER performance over time-varying channels, unlike the results obtained in [12] by assuming perfect channel estimation. In many cases, cooperative maximum likelihood detection performs the best by about 5dB due to the diversity gain. Also, the influence of timevarying channels results in the error flooring effect."

1B-12.4

Performance Analysis of Multiple-Relay Decode- and-Forward Cooperation System

Jun Zhang, Tat Lok

"In this paper, we analyze the impact of the detection error at the relay node to the performance of the decodeand- forward cooperation system. We apply a simple detector, for which no channel state information between source node and relay node is available at the destination, and maximum ratio combining is performed without considering whether the forwarded symbol from the relay is incorrect. With such an assumption, we analyze the error performance of the system with multiple relay nodes, and demonstrate the resulting error floor in this system. To compensate for the detection error at the relay node, we propose a relay selection protocol, which can lower the error floor and nearly achieve full diversity order."

1568964838

1B-12.5

Error Performance Analysis of Clipped Alamouti Space-Time Coded OFDM Systems

Himal Suraweera, Jean Armstrong

“In this paper we investigate the performance of clipped Alamouti space-time coded (STC) orthogonal frequency division multiplexing (OFDM) systems. The high peaks in STC-OFDM signals are clipped to limit the peak-to-average power ratio (PAPR). In STC-OFDM and OFDM, clipping can achieve significant PAPR reduction while maintaining a low symbol error rate (SER). Previous studies on OFDM have concluded that the effect of channel fading on clipping noise must be considered for an accurate error performance analysis. We extend this further to incorporate STC-OFDM systems and jointly study the impact of channel fading and receiver combining on clipping noise. At the STC-OFDM receiver, effective clipping noise governing the signal-to- noise ratio has different characteristics compared to the same for OFDM. Simulations indicate that STC-OFDM is more sensitive to clipping effects than OFDM. The theoretical and simulated SER are also compared for clipped STC-OFDM."

1568965130

1C-01

Session Title: Traffic and Resource Management 2 Chairperson: Irena Atov

Day:

Tuesday

Date:

22 nd November 2005

Time:

2:00PM – 3:40PM

Room: P2

1568964909

Using Rate Balancing to Improve Throughput in a Wireless Multi-hop Chain Topology

Binh Ngo, Steven Gordon, Ha Duong

"A well-known problem in wireless multi-hop communication is the significant degradation of throughput when the number of hops increases. Previous research shows that in

a chain topology, nodes using IEEE 802.11 RTS/CTS can

at best achieve 1/4, but in practice only 1/7, much smaller than the ideal 1/3 of the throughput of one-hop

transmission. In order to improve throughput performance in multi-hop cases, we introduce a rate balance scheme and tune the control parameters of sensing range at physical layer and contention window at MAC layer. Our simulation results show that the throughput ratio close to 1/4 is achievable when the number of hops is as high as 12; better ratios of 1/3.4 and 1/3.6 are achieved when number

of hops is 5 and 8, respectively."

1C-01.1

1568965144

Using Reinforcement Learning for Call Admission Control in Cellular Environments featuring Self-Similar Traffic

Nimrod Lilith, Kutluyil Dogancay

This paper details reinforcement learning architectures that efficiently provide the functions of dynamic channel allocation (DCA) and call admission control (CAC) for cellular telecommunications environments featuring both voice traffic and self-similar data traffic. These solutions are able to be implemented in a distributed manner using only localised environment information and without the need for any off-line training period. The performance of these reinforcement learning solutions are thoroughly examined via computer simulations and are shown to produce superior results in terms of both revenue raised and handoff blocking probability.

1C-01.2

1568965185

Hybrid Delay/Blocking Wireless Systems with Greedy Resource Allocation

Paul Fitzpatrick, Milosh Ivanovich, Philip Bickerdike

"This paper presents an analysis of a hybrid delay /blocking system model with wide applicability in wireless networks. Real time voice traffic operates under a blocked calls cleared regime while non-real-time data is delayable. These traffic types compete for a fixed number of servers under two schemes: (i) first come first served (FCFS) and (ii) pre- emption (PE) of ongoing data calls by new voice calls. Each voice call uses one server, while data calls are served in a First-In First-Out (FIFO) queue with capacity equal to all servers not occupied by voice. Voice and data calls are modelled as Poisson arrivals with exponential holding times, and the resulting continuous-time Markov process is analysed using a stochastic simulation of the state space. The results presented demonstrate trade-offs between the performance of real-time voice and delayable data traffic, as well as the differences between this hybrid system and conventional systems based solely on blocking or delay. We show that the use of the FCFS scheme causes data

1C-01.3

calls to monopolise the system resources at the expense of voice call blocking. The PE scheme remedies this by providing priority to voice calls. However, in demand scenarios where data is the dominant traffic, voice calls can receive unrealistically good performance at the expense of increased delay for data calls. Overall, PE results in a more efficient use of the system resources, especially with high demand."

1568964822

Traffic Measurement for Large Internet Flows Using Multi-stage Landmark LRU Cache

Lichang Che, Bin Qiu

"The scalability issue of the Internet management has motivated recent research on partial flow state based traffic measurement and management. Based on our previous Landmark LRU proposal for long-term fast flow detection\cite{che-05-llru}, this paper proposes a novel traffic measurement scheme with partial flow state, Multi- stage Landmark LRU (ML-LRU) cache. Inherited the merit of the Landmark LRU cache in reducing the possibility of large flows being flushed out of the cache, the ML-LRU locks large flows reliably in the cache for traffic measurement. Simulations driven by real Internet traces prove that the ML-LRU scheme uses only one third of the memory space required by the sample-and-hold \cite{estan- 02-measure} scheme and meanwhile improves measurement performance notably."

1C-01.4

1568965354

Effective Verification of Wavelength Routing Function by Wavelength Transfer matrix Method

Kimio Oguchi, Kohei Okada

"The wavelength transfer matrix is a powerful approach to design and verify the wavelength routing needed for complicated wavelength routing networks. This paper first describes the wavelength transfer matrix, the basic form and some extensions. The WDM PON networks proposed to date are analyzed in terms of wavelength by using the wavelength transfer matrix. The results show the method is effective and practical for designing complicated networks."

1C-01.5

1C-02

Session Title: Internet Applications 1 Chairperson: Greg Egan

Day:

Tuesday

Date:

22 nd November 2005

Time:

2:00PM – 3:40PM

Room: M1

1C-02.1

Towards Robust Internet Applications: Self- Organizing Overlays

John Risson, Tim Moors

"Self-organizing overlays are set to make internet applications more robust. They can improve system dependability, evolve smoothly from small configurations, and scale to massive configurations. Application case studies are presented to illustrate weaknesses of current architectures and to show how overlays can improve robustness-cost tradeoffs. The case studies include email, next generation voice and mobile networks based on the Session Initiation Protocol (SIP), network access protocols like Radius and Diameter, and publish/subscribe middleware. A program of work is outlined to transition overlay technology from the laboratory to industry."

1568964547

1C-02.2

Evaluating the impact of DNS and HTTP session characteristics on consumer ISP web traffic

Jason But, Urs Keller, Grenville Armitage

"Web caches are generally considered useful because they reduce replication of network traffic flowing from original content sources. In this paper we experimentally characterise the network and transport layer consequences of web caching in the consumer ISP context. We instrumented a small number of Australian, broadband- attached homes to collect round-trip time (RTT) and hop count statistics for their HTTP/TCP sessions, and collect DNS lookup statistics associated with each HTTP exchange. We estimated the impact of DNS lookup delays on overall HTTP session times, and use our RTT and hop count statistics to show that consumer ISPs would benefit greatly from local caching, particularly in Australia where speed of light delays have a large impact on session times when retrieving international content."

1568964864

1C-02.3

Intelligent Customer Relationship Management On The Web

Kok-Wai Wong, Chun Che Fung, Xiong Xiao, Kit Po Wong

"In recent years, Customer Relationship Management using web personalisation initiatives have gained much attention. The most important strategy of web personalisation is to provide the customers with correct information or services based on the knowledge about the customers preferences. With the help of data mining technologies, the above strategy can be implemented. Computational intelligence technologies are investigated in this paper to provide interaction through web personalisation. This paper proposed two algorithms for the personalisation of the online shopping websites. It uses the Radial Basis Function (RBF) neural network. The algorithms first model the customers preferences as a complex nonlinear function. It personalises the information presented to customers based on their preferences. The second is the preference learning algorithm. It learns the customers preferences implicitly from the customers behaviours by using a RBF neural network."

1568964883

1C-02.4

Context Based Riskiness Assessment

Omar Hussain, Elizabeth Chang, Farookh Khadeer Hussain, Tharam Dillon, Ben Soh

"In almost every interaction the trusting peer might fear about the likelihood of the loss in the resources involved during the transaction. This likelihood of the loss in the resources is termed as Risk in the transaction. Hence analyzing the Risk involved in a transaction is important to decide whether to proceed with the transaction or not. If a trusting peer is unfamiliar with a trusted peer and has not interacted with it before in a specific context, then it will ask for recommendations from other peer in order to determine the trusted peers Riskiness value or reputation. In this paper we discuss the process of asking recommendations from other peers in a specific context and assimilating those recommendations according to its criteria of the interaction in order to determine the correct Riskiness value of the trusted peer."

1568964922

1C-02.5

The Design of China Tourism E-Business Platform Based on J2EE Technology

Wensheng Gwsice, Wensheng Guo, Yixin Yin, Xuyan Tu

This paper presented the problems met during the development of an e-business platform using J2EE technique and gave the solutions to solve these problems. We discussed the detailed design and implementation issues in developing a China Tourism e-business platform.

1568965043

1C-03

Session Title: Image Processing 2 Chairperson: Henry Wu

Day:

Tuesday

Date:

22 nd November 2005

Time:

2:00PM – 3:40PM

Room: P1

1568964826

A motion-based approach for temporal texture synthesis

Ashfaqur Rahman, Manzur Murshed

In this paper we propose a motion based approach for temporal texture synthesis. Temporal textures are natural phenomenon characterized by their distinctive motion patterns. Synthesis of these te