Proceedings Volume 5283

Mobile Service and Application

Shumin Cao, Chih-Lin I, Jiann-An Tsai
cover
Proceedings Volume 5283

Mobile Service and Application

Shumin Cao, Chih-Lin I, Jiann-An Tsai
View the digital version of this volume at SPIE Digital Libarary.

Volume Details

Date Published: 29 March 2004
Contents: 4 Sessions, 20 Papers, 0 Presentations
Conference: Asia-Pacific Optical and Wireless Communications 2003
Volume Number: 5283

Table of Contents

icon_mobile_dropdown

Table of Contents

All links to SPIE Proceedings will open in the SPIE Digital Library. external link icon
View Session icon_mobile_dropdown
  • Wireless Network I
  • Application Service I
  • Wireless Network II
  • Application Service I
  • Application Service II
  • Application Service I
Wireless Network I
icon_mobile_dropdown
Mobility management scheme for highly dynamic multi-hop wireless networks
Yongchun Tian, Wei Guo
In this paper, we consider the mobility management in highly dynamic multi-hop wireless networks (HDNet) used for military communication. We propose a mobility management solution that is the combination of macro mobility management using several HAs and micro mobility management integrating location management with routing. The main advantage of our scheme is that it considerably reduces the location update overhead and especially cares for reliability and survivability. Simulation results show our scheme is suitable for highly dynamic networks.
A universal trust framework for pervasive computing
Computing today is becoming pervasive. To provide pervasive computing environments flexible, dynamic and less distractive security mechanisms, trust managements are introduced. However, current trust frameworks are designed for specific scenarios and can’t fulfill requirements in different environments, which leads to that these trust frameworks can’t be deployed in different environments and pervasive devices can’t enjoy pervasive computing anywhere really. To remedy this problem, this paper proposes a universal trust framework. In our framework, the flexible attribute vector model is used to represent trust evidence that are needed to evaluate trust relationships, thus the framework can work in identity-based trust environments as well as context-based trust environments. Besides, the universal trust framework defines four kinds of trust relationships that are suitable o model trust relationships in various scenarios. In a word, the proposed universal trust framework is an especially designed trust framework that can unify trust management in different pervasive computing cases.
A secure network access system for mobile IPv6
With the fast development of Internet and wireless and mobile communication technology, the Mobile Internet Age is upcoming. For those providing Mobile Internet services, especially from the view of ISP (Internet Service Provider), current mobile IP protocol is insufficient. Since the Mobile IPv6 protocol will be popular in near future, how to provide a secure mobile IPv6 service is important. A secure mobile IPv6 network access system is highly needed for mobile IPv6 deployment. Current methods and systems are still inadequate, including EAP, PANA, 802.1X, RADIUS, Diameter, etc. In this paper, we describe main security goals for a secure mobile IPv6 access system, and propose a secure network access system to achieve them. This access system consists of access router, attendant and authentication servers. The access procedure is divided into three phases, which are initial phase, authentication and registration phase and termination phase. This system has many advantages, including layer two independent, flexible and extensible, no need to modify current IPv6 address autoconfiguration protocols, binding update optimization, etc. Finally, the security of the protocol in this system is analyzed and proved with Extended BAN logic method, and a brief introduction of system implementation is given.
Analysis and design of a new network architecture based on SOTDMA in mobile service and its application
Wei Chen, Xiaoming Ren, Ruheng Liu
Self-organized time division multiple access ( SOTDMA) is an advanced wireless communication technology used in quick automatic networking. Also self-organized network is an equity network, which is provided with selforganized characteristics. First, the paper analyses the technology and characteristics of self-organized network and puts forward network architecture with self-organized model for different environments. Then it discusses the message transport protocol of SOTDMA, further gives a clear description of the functions for each layer in the network architecture. Second, the paper studies the access algorithms of SOTDMA, providing a full flow for the realization of this algorithm. Finally, the paper induces the practical application of this technology, and raises an integrated principle diagram of wireless user terminal networking based on SOTDMA.
Mobile geo-information services: concept, reality, and problems
Qingquan Li, Jinting Zhang, Jingnan Huang, et al.
We are witnessing the exploding development of Mobile Geoinformation Services(MGS). However, MGS is a complex system engineering involving many different technological fields or disciplines. There are many problems still existing and deserving to be further clarified and studied. Based on the analysis of the derivation of MGS and different related terms, a relatively universal concept of MGS is first defined in this paper. After that, this paper illuminates the present application level in China by summarizing the five modes that exist in all application related to MGS. In addition, five aspects of problems that hinder MGS from developing on a large scale are put forward. Finally the paper concludes that the implementation of MGS can be only performed on a limited basis in current China and there are still many barriers that prevent MGS from reaching its full potentials.
Research and implementation of WLAN-based softswitch access system
Xianhua Yan, Jing Han, Tao Zhang
WLAN-Based softswitch access system can provide users voice service and all kinds of value-added services using softswitch technology. Softswitch can also help solve the security problem of WLAN.
Application Service I
icon_mobile_dropdown
Research on an estimation method of DOA for wireless location based on TD-SCDMA
Yi Zhang, Yuan Luo, Shi-xin Cheng
To meet the urgent need of personal communication and hign-speed data services,the standardization and products development for International Mobile Telecommunication-2000 (IMT-2000) have become a hot point in wordwide. The wireless location for mobile terminals has been an important research project. Unlike GPS which is located by 24 artificial satellities, it is based on the base-station of wireless cell network, and the research and development of it are correlative with IMT-2000. While the standard for the third generation mobile telecommunication (3G)-TD-SCDMA, which is proposed by China and the intellective property right of which is possessed by Chinese, is adopted by ITU-T at the first time, the research for wireless location based on TD-SCDMA has theoretic meaning, applied value and marketable foreground. First,the basic principle and method for wireless location, i.e. Direction of Angle(DOA), Time of Arrival(TOA) or Time Difference of Arrival(TDOA), hybridized location(TOA/DOA,TDOA/DOA,TDOA/DOA),etc. is introduced in the paper. So the research of DOA is very important in wireless location. Next, Main estimation methods of DOA for wireless location, i.e. ESPRIT, MUSIC, WSF, Min-norm, etc. are researched in the paper. In the end, the performances of DOA estimation for wireless location based on mobile telecommunication network are analyzed by the research of theory and simulation experiment and the contrast algorithms between and Cramer-Rao Bound. Its research results aren't only propitious to the choice of algorithms for wireless location, but also to the realization of new service of wireless location .
Research on an algorithm for adaptive signal processing for wireless telecommunication and its performance
Yi Zhang, Yuan Luo, Ji-feng Wang, et al.
Adaptive signal processing as a new subject, is widely used to telecommunication, radar, industrial control, earthquake detection , biomedicine and electronics field,etc.. In recent years, the great progress has been made in the theory, method and application of adaptive signal processing. The application of adaptive signal processing to mobile telecommunication is researched in the paper, The basic algorithms for adaptive wireless signal processing, i.e. Least Mean Square(LMS),Sequence Regression(SER),Recursion Least Square(RLS) and Random Search(RS),etc. are mainly analyzed and the performance of these algorithms are compared in the paper. It is propitious to choice and amelioration of the adaptive algorithms for different surroundings and condition in reason.
Novel robust FDTC channel estimation for MIMO-OFDM in a mobile system
Desheng Wang, Guanxi Zhu
Channel estimation is the key technology in MIMO-OFDM system design. In this paper, we propose a novel robust frequency domain diversity time domain combining(FDTC) channel estimation algorithm. Compared with the existing LS and trans-domain estimation methods, the proposed algorithm shows lower MSE and BER. And the FDTC algorithm has better robust and lower calculating complexity.
New combined TOA location positioning method in CDMA networks
Jie Zhen, Shufang Zhang
Non-line-of-sight (NLOS) propagation is one of the main errors in accurate wireless location positioning system. This paper first briefly discusses some new NLOS error mitigation algorithms, then presents a novel combined location positioning algorithm, the simulation results show that it provides quite improvement than linear line of position algorithm and Taylor series algorithm.
Real-time blocking system for MMS
Donghui Wang, Miaoliang Zhu, Zheng Wu, et al.
With the fast development of Multimedia Message Service (MMS), MMS has penetrated people’s life as an important way for real-time communication of message. Clients use the service everyday to make, send and transmit huge amount of real-time multimedia messages. Usually the filtering application can block messages by lists of addresses (Black/White list) or use traditional Text/Keyword filtering methods. We propose a new filtering scheme by using content-based image analysis technology, which can help filter trash messages in MMS, while the route scheme is adapted for the goal of content-based real-time blocking system.
Wireless Network II
icon_mobile_dropdown
Collision avoidance of two moving objects using the anticipated path
Seung Hak Rhee, Muhammad Bilal Ahmad, Seung-Jin Park, et al.
Collision avoidance is one of the most important problems in autonomous vehicles, ship navigation, and robot manipulators, etc. Image processing technique could be applied for solving the collision avoidance of moving objects. The collision could be avoided if the direction of the moving object could be accurately anticipated. The problem is how to anticipate the expected path of the moving object, so that the other moving objects in the expected path should be detected and avoided for collision avoidance. Collisions could be avoided by searching the obstacles and moving objects in the expected path, but the moving objects, which would come inside the expected path, should also be detected for fully collision avoidance. In this paper, the expected path of the moving object is determined from the previous history of the moving object using the statistical measurements.
A mobile e-care system
Qiong Zhang, Congfu Xu, Donghui Wang
As we know, medical informatics can improve diagnosis, treatment, disease prevention and failure prevention in hospitals and clinics. Due to the ability to real time access information at anytime and anywhere, wireless medical informatics can minimize mobile errors, optimize healthcare delivery and simplify workflow. This paper describes the overall architecture and primary functionality of a mobile e-care system that tries to complement existing hospital information systems.
Speech coding technology in CDMA mobile system and its implementation
Lan Liu, Wei Wu
The fundamental of QCELP speech coding technology is introduced. According to the features of TMS320C54X family DSP of TI Inc., the implementation approach of QCELP speech coding with fixed-point DSP (digital signal processor) is presented.
The application design of a mobile terminal: key technologies of mobile location-based service system
Xiaohui Tong, Jingao Liu, Zhenghao Wang, et al.
This paper presents several key technologies in the Mobile Location Based Service (MLBS) system of Shanghai. In the paper, the author presents a solution of handset mobile terminal, PDA+GPS+GSM/GPRS. The paper particularly introduces the hardware of the terminal and the acquirement of GPS information at the terminal. The paper also introduces how the terminal communicates with the special service center.
Application Service I
icon_mobile_dropdown
A general service description data model for mobile Internet service management
Man Yuan, Xinglong Wang, Rui He, et al.
Project background: we are engaged in research on service management for mobile Internet. It is well known that Internet will primarily become a service-driven-network, and services will be differentiated. The motivation for service management is to make service management automation, and the users will discovery all kinds of services provided by service providers conveniently. In order to reach theses goals, the one of the key issues for service description, or service definition must be resolved. So, we research below three aspects’ issues: the firstly, the application services are classified, all the properties for every type of service are researched. Secondly, in order to model the service data model, we build the meta-model to describe the service data model, based on these meta-models, a general service data model is built in a kind of oriented-object modeling language, EXPRESS. Finally, based on the service data model described by EXPRESS and the definition for service template, a concrete service template can be generated by a tool for generating service template automatically.
Application Service II
icon_mobile_dropdown
Shape matching using the modified histogram-based chain code
Hye Jin Park, Min-Seok Ji, Jae-Taeg Ha, et al.
Shape descriptions based on the traditional chain codes are very susceptible to small perturbations in the contours of the objects. Therefore, direct matching of traditional chain codes could not be used for image retrieval based on the shape boundaries from the large databases. In this paper, a histogram based chain codes are proposed which could be used for image retrieval. The modified chain codes matching are invariant to translation, rotation and scaling transformations, and have high immunity to noise and small perturbations.
Contrast research of CDMA and GSM network optimization
Yanwen Wu, Zehong Liu, Guangyue Zhou
With the development of mobile telecommunication network, users of CDMA advanced their request of network service quality. While the operators also change their network management object from signal coverage to performance improvement. In that case, reasonably layout & optimization of mobile telecommunication network, reasonably configuration of network resource, improvement of the service quality, and increase the enterprise's core competition ability, all those have been concerned by the operator companies. This paper firstly looked into the flow of CDMA network optimization. Then it dissertated to some keystones in the CDMA network optimization, like PN code assignment, calculation of soft handover, etc. As GSM is also the similar cellular mobile telecommunication system like CDMA, so this paper also made a contrast research of CDMA and GSM network optimization in details, including the similarity and the different. In conclusion, network optimization is a long time job; it will run through the whole process of network construct. By the adjustment of network hardware (like BTS equipments, RF systems, etc.) and network software (like parameter optimized, configuration optimized, capacity optimized, etc.), network optimization work can improve the performance and service quality of the network.
Diversity of CC/PP and its parsing
Qingguo Shen, Jiang Zhu
CC/PP (Composite Capability/Preference Profile) is a mechanism for content negotiation and adaptation between users and servers. The heterogeneity in communication devices and difference between application situations make it difficult to guarantee the compatibility of CC/PP documents. This increases CC/PP parsing time, and decreases service quality. The compatibility and efficiency are two contrary requirements. In this paper, we compare different approaches of CC/PP resolution. We introduce our CC/PP Parser design that is based on the UAProf CC/PP Schema and employs Java Factory Mode and XML SAX parser. We try to solve both the compatibility and efficiency problems. The parsing speed is 3-5 times that with RDF Parser. The coordination between server-adaptation and proxy-adaptation via CC/PP is simple and effective. The proxy and server can focus on adaptations optimized for free and paid services respectively, and system performance can be improved. Our system is configurable with an XML setup file. The existing approaches for CC/PP security and privacy protection decrease service quality. We suggest performing P3P comparison in the proxy. Our P3P approach increases service performance and can be integrated into the coordination model of server-adaptation and proxy-adaptation.
Application Service I
icon_mobile_dropdown
MIPv6 seamless handover with light home agent
Yaling Nie, Masahiro Ojima, Zhisheng Niu, et al.
Mobile IPv6 enables network nodes to roam in the IPv6 Internet. It is the main protocol for mobile Internet. Supported by Mobile IPv6, the Internet node can roam regardless of its changing of IP address. However during Mobile IPv6 handover procedure, the Internet node has a period of communication interruption. Thus the mobile Internet system has handover latency and packet loss. Also because Home Agent (HA) is in charge of registration of Mobile Node (MN) and tunneling packets for MN, it potentially has overflow problem. These three problems are especially obvious in multimedia networks with many users. So in this article, we propose a new Mobile IPv6 handover method to reduce handover latency and packet loss, and to overcome overflow of HA. We have evaluated the proposed handover method over IEEE 802.11b wireless LAN system by using NS2 simulation platform, and confirmed the effectiveness of the new method.