Loading...
Search for: cellular-telephone-systems
0.005 seconds
Total 28 records

    Vertical handoff initiation using road topology and mobility prediction

    , Article 2006 IEEE Wireless Communications and Networking Conference, WCNC 2006, Las Vegas, NV, 3 April 2006 through 6 April 2006 ; Volume 1 , 2006 , Pages 593-598 ; 15253511 (ISSN); 0780383443 (ISBN); 1424402700 (ISBN); 9781424402700 (ISBN) Ahdi, F ; Khalaj, B. H ; Sharif University of Technology
    2006
    Abstract
    Interworking in heterogeneous wireless networks is one of the key objectives in the Next Generation Networks (NGN). Handoff between cellular and Wireless Local Area Networks (WLANs) can help achieve this aim. In this paper, a new method for decision-making on vertical handoff initiation is proposed which is on the basis of road topology information and mobility prediction. The main distinction between the proposed algorithm and previous research is exploitation of road topology map of the destination hotspot within a cellular network. Mobile terminal speed, WLAN dynamic traffic in the destination hotspot, and topology information are used to decide on suitability of vertical handoff... 

    Noise reduction of speech signal using bayesian state-space Kalman filter

    , Article 2013 19th Asia-Pacific Conference on Communications, APCC 2013 ; August , 2013 , Pages 545-549 ; 9781467360500 (ISBN) Sarafnia, A ; Ghorshi, S ; Sharif University of Technology
    IEEE Computer Society  2013
    Abstract
    The noise exists in almost all environments such as cellular mobile telephone systems. Various types of noise can be introduced such as speech additive noise which is the main factor of degradation in perceived speech quality. At some applications for example at the receiver of a telecommunication system, the direct value of interfering noise is not available and there is just access to noisy speech. In these cases the noise cannot be cancelled totally but it may be possible to reduce the noise in a sensible way by utilizing the statistics of the noise and speech signal. In this paper the proposed method for noise reduction is Bayesian recursive state-space Kalman filter, which is a method... 

    A survey on factors influencing the usage of mobile value-added services; An empirical investigation among Iranian users

    , Article IEOM 2015 - 5th International Conference on Industrial Engineering and Operations Management, Proceeding, 3 March 2015 through 5 March 2015 ; March , 2015 ; 9781479960651 (ISBN) Kazemkhanlou, H ; Boozary, P ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2015
    Abstract
    Mobile value-added services have drawn the attention of researchers and practitioners recently, due to the rapid development of the mobile telecommunications market. Various mobile-based services and applications have therefore been introduced in order to satisfy mobile phone subscribers' needs. Facing intensive competition, service providers are eager to persuade mobile phone subscribers into using the mobile value-add services in the hope to expand market share and ultimately raise revenues. This study therefore intends to investigate the factors that influence mobile phone subscribers' intention to use mobile value-added services in Iran by incorporating quality factors and perceived... 

    Collaboration alignment in distributed interference management in uplink cellular systems

    , Article 2016 IEEE International Symposium on Information Theory, 10 July 2016 through 15 July 2016 ; Volume 2016-August , 2016 , Pages 1456-1460 ; 21578095 (ISSN) ; 9781509018062 (ISBN) Kananian, B ; Maddah Ali, M. A ; Shariatpanahi, S. P ; Khalaj, B. H ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc 
    Abstract
    We consider a cellular wireless system including several interfering multi-user multi-antenna uplink channels, where the base station of each cell has to locally recover the messages of its corresponding users. We use a linear Wyner model, where each base station experiences interference only from the users in the two neighboring cells. Each base station is connected to the two nearby base stations through a backhaul link. The objective is to achieve the maximum degrees of freedom per cell, with minimum aggregated load in the backhaul. We propose a successive cooperative alignment scheme, in which each base station forms backhaul messages by combining the previous received backhaul messages... 

    Steganography in SMS by Sudoku puzzle

    , Article 6th IEEE/ACS International Conference on Computer Systems and Applications, AICCSA 2008, Doha, 31 March 2008 through 4 April 2008 ; 2008 , Pages 844-847 ; 9781424419685 (ISBN) Shirali Shahreza, M. H ; Shirali Shahreza, M ; Sharif University of Technology
    2008
    Abstract
    Sudoku puzzle is a logical game which has recently got very popular. Every day various mass media print these puzzles. As a result these puzzles are a suitable alternative for hidden data transfer. SMS (short message service) is one of the popular mobile-phone services. In this service people can write short messages and send it to each other through mobile phones. In this paper a method has been presented for Steganography (hiding data) in Sudoku puzzles and through SMS. In this method after hiding data in a Sudoku puzzle, the puzzle is sent in a way that it does not attract any attention. Steganography algorithm is based on order of place of numbers 1 through 9 in one of the specified row... 

    Frequency planning of GSM cellular communication network in urban areas including traffic distribution, a practical implementation

    , Article 2008 Asia-Pacific Symposium on Electromagnetic Compatibility and 19th International Zurich Symposium on Electromagnetic Compatibility, APEMC 2008, Suntec, 19 May 2008 through 23 May 2008 ; 2008 , Pages 891-894 ; 9810806280 (ISBN); 9789810806286 (ISBN) Atamanesh, M ; Farzaneh, F ; Sharif University of Technology
    2008
    Abstract
    Using an in-house developed software the signal level, the best server cells, and the amount of interference using standard propagation models are determined in a cellular environment. The program is also able to assign the frequency channels automatically to the TRXs taking into account the carrier to interference and the traffic distribution using a genetic algorithm. In this paper, the cost function is based on the total Carrier to Interference ratio (C/I) and the traffic density of the serving area. The software by means of a genetic algorithm approaches a frequency assignment which increases the overall quality of service throughout the cellular network. The package has been used in a... 

    Survivability modeling of wireless sensor networks

    , Article 2008 IEEE International Symposium on Wireless Communication Systems, ISWCS'08, ReykjavIk, 21 October 2008 through 24 October 2008 ; 2008 , Pages 593-597 ; 9781424424894 (ISBN) Masoum, A. R ; Jahangir, A. H ; Taghikhaki, Z ; Masoum, A ; Sharif University of Technology
    2008
    Abstract
    Network survivability is one of the main design challenges in wireless sensor networks (WSN). Survivability is the ability of the network to provide essential services in the presence of attacks and/or failures, and recover full service in a timely manner. To the best knowledge of us, survivability for WSN has never been studied considering failure effects on network. We consider the network survivability as a composite measure consisting of both network failure duration and failure impact on the network. In this paper we model network survivability in steady state. In this state, network is affected by predicted failures. This modeling is based on network connectivity and coverage, when an... 

    A localized and secure method for transferring bank information by SMS for Persian banks

    , Article Journal of Multimedia ; Volume 3, Issue 1 , 2008 , Pages 23-27 ; 17962048 (ISSN) Shirali Shahreza, M. H ; Shirali Shahreza, M ; Sharif University of Technology
    Academy Publisher  2008
    Abstract
    Nowadays m-banking (mobile banking) is widely used in many banks. It has embarked upon supply of various services based on different systems and with the aid of various services such as the Short Message Service (SMS). However in developing countries such as Iran, m-banking is facing some challenges. One of these challenges is the issue of language of this system, because the main language of this system, in both side of bank system and customer mobile phone, is English. Also one of the main issues in m-banking services is the security of the systems. For solvin g the above problems, we proposed a method in this paper. By this method we send secure banking messages as well as Persian SMS for... 

    Lower and upper bounds for throughput capacity of a cognitive ad hoc network overlaid on a cellular network

    , Article 2008 IEEE Wireless Communications and Networking Conference, WCNC 2008, Las Vegas, NV, 31 March 2008 through 3 April 2008 ; 2008 , Pages 2759-2764 ; 15253511 (ISSN) ; 9781424419968 (ISBN) Feizi Khankandi, S ; Ashtiani, F ; Sharif University of Technology
    2008
    Abstract
    In this paper, we compute lower and upper bounds for the throughput capacity of an ad hoc network overlaid on a cellular network. The ad hoc network is comprised of a specific number of wireless cognitive nodes that opportunistically exploit the inactive frequency channels in the cellular network. In this respect, we employ a model recently proposed for single-channel mobile ad-hoc network after some minor modifications. The proposed framework consists of two queueing networks, a closed BCMP queueing network comprised of M/G/∞nodes capable of mobility modeling, and an open BCMP queueing network comprised of symmetric M/G/1 nodes capable of modeling the packet transmission process. By... 

    Multilingual highlighting CAPTCHA

    , Article Proceedings - 2011 8th International Conference on Information Technology: New Generations, ITNG 2011, 11 April 2011 through 13 April 2011, Las Vegas, NV ; 2010 , Pages 447-452 ; 9780769543673 (ISBN) Shirali Shahreza, S ; Shirali Shahreza, M ; Sharif University of Technology
    2010
    Abstract
    There are many websites specially designed for mobile phones. Some hackers write automated programs to abuse these website services and waste the website resources. Therefore, it is necessary to distinguish between human users and computer programs. Methods known for achieving this are known as CAPTCHA (Completely Automated Public Turing test to tell Computers and Human Apart). CAPTCHA methods are mainly based on the weaknesses of OCR (Optical Character Recognition) systems and ask the user to type a word. So using them is difficult in tools such as PDAs (Personal Digital Assistant) or mobile phones that lack a complete keyboard. In this paper, a new CAPTCHA system is proposed for... 

    An improvement of collision probability in biased birthday attack against A5/1 stream cipher

    , Article 2010 European Wireless Conference, EW 2010, 12 April 2010 through 15 April 2010, Lucca ; April , 2010 , Pages 444-448 ; 9781424459995 (ISBN) Kourkchi, H ; Tavakoli, H ; Naderi, M ; Sharif University of Technology
    2010
    Abstract
    A5/1 is the strong version of the encryption algorithm on GSM (Global System for Mobile communications) used in many countries. It is constructed of a combination of three LFSRs (Linear Feedback Shift Registers) with irregular clocking manner. One of the most practical attacks against this algorithm is time-memory trade-off attack, which is based on birthday paradox. The goal of this attack is to find any intersection between precomputed LFSRs states set and set of states generating the output bits in the actual execution of the algorithm. In order to increase feasibility of this attack, the biased birthday attack was introduced. In this attack special states producing a specific pattern in... 

    An energy efficient target tracking scheme for distributed wireless sensor networks

    , Article Proceedings of the 2009 6th International Symposium on Wireless Communication Systems, ISWCS'09, 7 September through 10 September ; 2009 , Pages 136-140 ; 9781424435845 (ISBN) Jamali Rad, H ; Abolhassani, B ; Abdizadeh, M ; Sharif University of Technology
    Abstract
    We study the problem of power optimization for object tracking using distributed Wireless Sensor Networks (WSNs). The accuracy of the object tracking is dependent on the tracking time interval. Smaller tracking time interval increases the accuracy of tracking a moving object. However, this increases the power consumption significantly. This paper proposes a modified adaptive sleep time management scheme called Modified Predict and Mesh (MPaM) to adapt tracking time interval such that it minimizes power consumption while keeping an acceptable tracking accuracy. Also a quantitative analysis to compare the performances of the conventional PaM and proposed Modified PaM (MPaM) schemes is... 

    A new fractional call admission control scheme in integrated cellular network

    , Article Proceedings of 2009 IEEE International Conference on Electro/Information Technology, EIT 2009, 7 June 2009 through 9 June 2009, Windsor, ON ; 2009 , Pages 332-337 ; 9781424433551 (ISBN) Mortazavi Far, L ; Beigy, H ; Sharif University of Technology
    2009
    Abstract
    This paper presents a new model of call admission control which consists of a few key elements for protecting the network in different conditions of workload in a manner that, calls blocking /dropping are kept under desired level. This model consists of two traffic classes of voice and data. In order to give a priority to handoff call over new call, some parameters in this model are adjusted in a manner that handoff dropping is reduced to the least probability in the target cell and the adjacent cells. Some channels are reserved for voice and data calls in each cell to guarantee the quality of service requirements in the network. Limited fractional guard channel is used to have an optimized... 

    Cellular learning automata based dynamic channel assignment algorithms

    , Article International Journal of Computational Intelligence and Applications ; Volume 8, Issue 3 , 2009 , Pages 287-314 ; 14690268 (ISSN) Beigy, H ; Meybodi, M. R ; Sharif University of Technology
    2009
    Abstract
    A solution to channel assignment problem in cellular networks is self-organizing channel assignment algorithm with distributed control. In this paper, we propose three cellular learning automata based dynamic channel assignment algorithms. In the first two algorithms, no information about the status of channels in the whole network will be used by cells for channel assignment whereas in the third algorithm, the additional information regarding status of channels may be gathered and then used by cells in order to allocate channels. The simulation results show that by using the proposed channel assignment algorithms the micro-cellular network can self-organize itself. The simulation results... 

    A robust spread spectrum watermarking method using two levels DCT

    , Article International Journal of Electronic Security and Digital Forensics ; Volume 2, Issue 3 , 2009 , Pages 280-305 ; 1751911X (ISSN) Taherinia, A. H ; Jamzad, M ; Sharif University of Technology
    2009
    Abstract
    In this paper, a DCT-based blind watermarking scheme based on spread spectrum communications is proposed. We perform block-based DCT on the host image; then using the DC coefficients of each block, we construct a low-resolution approximation image. We apply block-based DCT on this approximation image, then watermark is embedded by adding a pseudo random noise sequence into its high frequencies. In detection stage, we extract the approximation image from the watermarked image, then the same pseudo random noise sequence is generated, and its correlation is computed with high frequencies of the watermarked approximation image. In our method, higher robustness is obtained because of embedding... 

    Downlink resource allocation for autonomous infrastructure-based multihop cellular networks

    , Article Eurasip Journal on Advances in Signal Processing ; Volume 2009 , 2009 ; 16876172 (ISSN) Shabany, M ; Sousa, E. S ; Sharif University of Technology
    2009
    Abstract
    Considering a multihop cellular system with one relay per sector, an effective modeling for the joint base-station/relay assignment, rate allocation, and routing scheme is proposed and formulated under a single problem for the downlink. This problem is then formulated as a multidimensional multichoice knapsack problem (MMKP) to maximize the total achieved throughput in the network. The well-known MMKP algorithm based on Lagrange multipliers is modified, which results in a near-optimal solution with a linear complexity. The notion of the infeasibility factor is also introduced to adjust the transmit power of base stations and relays adaptively. To reduce the complexity, and in order to... 

    Mobile banking services in the bank area

    , Article SICE Annual Conference, SICE 2007, Takamatsu, 17 September 2007 through 20 September 2007 ; 2007 , Pages 2682-2685 ; 4907764286 (ISBN); 9784907764289 (ISBN) Shirali Shahreza, M ; Shirali Shahreza, M. H ; Sharif University of Technology
    2007
    Abstract
    Mobile banking (M-Banking) has been welcomed in most of the countries as a new branch in electronic banking (E-Banking). In developing countries such as Iran mobile banking is limited to fields such as SMS due to lack of infrastructure and because of high costs. In this paper we present a method for developing banking services through mobile phone in the bank area. In our method a server which is capable to be connected through bluetooth is installed in the bank and offered banking services. Customers inside the bank and also around the bank are connected to the bank system through bluetooth technology and handle their banking operations through their mobile phones. This way they won't pay... 

    On social-aware content caching for d2d-enabled cellular networks with matching theory

    , Article IEEE Internet of Things Journal ; Volume 6, Issue 1 , 2019 , Pages 297-310 ; 23274662 (ISSN) Li, J ; Liu, M ; Lu, J ; Shu, F ; Zhang, Y ; Bayat, S ; Jayakody, D. N. K ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2019
    Abstract
    In this paper, the problem of content caching in 5G cellular networks relying on social-aware device-to-device communications (DTD) is investigated. Our focus is on how to efficiently select important users (IUs) and how to allocate content files to the storage of these selected IUs to form a distributed caching system. We aim at proposing a novel approach for minimizing the downloading latency and maximizing the social welfare simultaneously. In particular, we first model the problem of maximizing the social welfare as a many-to-one matching game based on the social property of mobile users. We study this game by exploiting users' social properties to generate the utility functions of the... 

    Effect of data traffic shaping on throughput and delay for VSG-CDMA cellular networks

    , Article 2007 IEEE International Conference on Telecommunications and Malaysia International Conference on Communications, ICT-MICC 2007, Penang, 14 May 2007 through 17 May 2007 ; February , 2007 , Pages 6-11 ; 1424410940 (ISBN); 9781424410941 (ISBN) Seyfi, A ; Ashtiani, F ; Sharif University of Technology
    2007
    Abstract
    In this paper, we analyze the effect of applying leaky bucket as a well known traffic shaper on data users in a variable spreading gain CDMA (VSG-CDMA) uplink wireless cellular network. To this end, we model the effect of leaky bucket mechanism on a typical data user, with a closed product form queueing network. Each node in this queueing network corresponds to a specific processing gain or equivalently transmission rate and power. By solving such a queueing network we obtain the steady state probability with which a typical data user will exist at each node. By aggregating the effects of all data users we compute the mean and variance of interference and obtain the throughput and average... 

    Taking multiple-choise quiz by SMS on mobile phones including analyzing property

    , Article Journal of Computers (Finland) ; Volume 2, Issue 2 , 2007 , Pages 53-60 ; 1796203X (ISSN) Shirali Shahreza, M ; Sharif University of Technology
    Academy Publisher  2007
    Abstract
    Recently Mobile Learning (M-Learning) has attracted much attention. Due to advantages of SMS (Short Messaging Service) on mobile phones we present a safe and protected method for taking multiple-choice quizzes by using the SMS on mobile phones in this paper. In this method questions of quiz are sent to students along with their answers through some SMS messages. The students will receive their grades immediately after answering the questions and this grade is also sent to the instructor or professor along with the student's answers through an SMS Picture Message. Answers of questions and the student's grade are hidden in SMS picture message through stenography and then they are sent. The...