scispace - formally typeset
Search or ask a question
Conference

International Symposium on Communications and Information Technologies 

About: International Symposium on Communications and Information Technologies is an academic conference. The conference publishes majorly in the area(s): Orthogonal frequency-division multiplexing & MIMO. Over the lifetime, 2750 publications have been published by the conference receiving 14213 citations.


Papers
More filters
Proceedings ArticleDOI
01 Oct 2006
TL;DR: A comparative simulation study of random waypoint and Gauss-Markov mobility models on the performance study of MANET that uses ad-hoc on-demand distance vector (AODV) as the routing protocol shows that both mobility models are not different in case each MN is moving at human running speed.
Abstract: A mobile ad hoc network (MANET) is a network consisting of a set of wireless mobile nodes that communicate with each other without centralized control or established infrastructure. The mobility model represents the moving behavior of each mobile node (MN) in the MANET that should be realistic. It is a crucial part in the performance evaluation of MANET. Random Waypoint mobility model is the only mobility model that has been widely used in the simulation study of MANET despite some unrealistic movement behaviors such as sudden stop and sharp turn. Whilst Gauss-Markov mobility model has been proved that it can solve both of these problems. This paper presents a comparative simulation study of Random Waypoint and Gauss-Markov mobility models on the performance study of MANET that uses Ad-hoc On-Demand Distance Vector (AODV) as the routing protocol. The results show that both mobility models are not different in case each MN is moving at human running speed. Therefore, it is suggested to use Random Waypoint mobility model because of its less computational overhead comparing to Gauss-Markov mobility model. When the speed of MNs is as high as fast automobiles, the performance result using Random Waypoint mobility model is significant different from Gauss-Markov mobility model. Therefore, Gauss-Markov mobility model should be used instead. Moreover, different levels of randomness setting have no effect on the accuracy of throughput and end-to-end delay.

123 citations

Proceedings ArticleDOI
04 Dec 2007
TL;DR: This article presents a basic current-mode building block for analog signal processing, namely current controlled current conveyor transconductance amplifier (CCCCTA), which can be controlled by an input bias current.
Abstract: This article presents a basic current-mode building block for analog signal processing, namely current controlled current conveyor transconductance amplifier (CCCCTA). Its parasitic resistance at current input port can be controlled by an input bias current. It is very suitable to use in a current-mode signal processing, which is continually more popular than a voltage one. The proposed element is realized in a bipolar technology and is examined the performances through PSPICE simulations. They display usabilities of the new active element. The CCCCTA performs tuning over a wide current range. In addition, some examples as a current-mode universal biquad filter and a grounded inductance simulator are included. They occupy only single CCCCTA.

119 citations

Proceedings ArticleDOI
01 Oct 2006
TL;DR: Experimental results with a commercial PV array show that the proposed algorithm outperforms the conventional controller in terms of tracking speed and mitigation of fluctuation output power in steady state operation.
Abstract: This paper describes FPGA implementation of a Maximum Power Point Tracking (MPPT) for Photovoltaic (PV) applications. By slightly modifying the original algorithm, an improved variable step-size P&O algorithm is realized and efficiently implemented using a hard-ware description language (VHDL). Subsequently, the new MPPT algorithm integrated with a solar-powered battery charging system is implemented on the XC2C384 FPGA without external sensor unit requirement. Experimental results with a commercial PV array show that the proposed algorithm outperforms the conventional controller in terms of tracking speed and mitigation of fluctuation output power in steady state operation. The overall system efficiency is well above 96%.

116 citations

Proceedings ArticleDOI
13 Dec 2012
TL;DR: A new network paradigm, participatory sensing, is discussed as a special case to highlight the way people may be involved in the information acquisition-transmission-interpretation-action loop
Abstract: The emerging Internet of Things (IoT) that effectively integrates cyber-physical space to create smart environments will undoubtedly have a plethora of applications in the near future. Meanwhile, it is also the key technological enabler to create smart cities, which will provide great benefits to our society. In this paper, four different IoT network architectures spanning various smart city applications are presented and their corresponding network Quality of Service (QoS) requirements are defined. Furthermore, as the beneficiary of smart city, we have the responsibility to actively participate in its development as well. A new network paradigm, participatory sensing, is thus discussed as a special case to highlight the way people may be involved in the information acquisition-transmission-interpretation-action loop.

102 citations

Proceedings ArticleDOI
13 Dec 2012
TL;DR: This paper proposed feature selection based on information gain, which can contribute to detect several attack types with high accurate result and low false rate, and outperform other state-of-art methods.
Abstract: A good intrusion system gives an accurate and efficient classification results. This ability is an essential functionality to build an intrusion detection system. In this paper, we focused on using various training functions with feature selection to achieve high accurate results. The data we used in our experiments are NSL-KDD. However, the training and testing time to build the model is very high. To address this, we proposed feature selection based on information gain, which can contribute to detect several attack types with high accurate result and low false rate. Moreover, we performed experiments to classify each of the five classes (normal, probe, denial of service (DoS), user to super-user (U2R), and remote to local (R2L). Our proposed outperform other state-of-art methods.

80 citations

Performance
Metrics
No. of papers from the Conference in previous years
YearPapers
202258
202137
2019116
2018101
201777
2016141