Pub Date : 2009-09-01DOI: 10.1109/YCICT.2009.5382349
Zi Yun, Laixian Peng, Wendong Zhao, Chang Tian
CICQ (Combined Input-Crosspoint Queued) switch fabric is an ideal solution for high-speed routers, which brings its nice distributed parallel scheduling property with no internal speedup required. Studying through resent scheduling algorithms for CICQ, it is shown that the basic reason leading to instability and performance decrease of throughput under nonuniform traffic is the imbalance of input queues. Thus this paper proposes a novel scheduling algorithm based on queues' length balance named MUIQF (Most Urgent Input Queue First). The simulation results show that under any traffic, either uniform or nonuniform, MUIQF can keep the input queues balance, hence achieves 100% throughput and fine stability and time delay performance.
{"title":"Simulation study of queues' length balance in CICQ switching fabrics","authors":"Zi Yun, Laixian Peng, Wendong Zhao, Chang Tian","doi":"10.1109/YCICT.2009.5382349","DOIUrl":"https://doi.org/10.1109/YCICT.2009.5382349","url":null,"abstract":"CICQ (Combined Input-Crosspoint Queued) switch fabric is an ideal solution for high-speed routers, which brings its nice distributed parallel scheduling property with no internal speedup required. Studying through resent scheduling algorithms for CICQ, it is shown that the basic reason leading to instability and performance decrease of throughput under nonuniform traffic is the imbalance of input queues. Thus this paper proposes a novel scheduling algorithm based on queues' length balance named MUIQF (Most Urgent Input Queue First). The simulation results show that under any traffic, either uniform or nonuniform, MUIQF can keep the input queues balance, hence achieves 100% throughput and fine stability and time delay performance.","PeriodicalId":138803,"journal":{"name":"2009 IEEE Youth Conference on Information, Computing and Telecommunication","volume":"13 18","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113941755","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-09-01DOI: 10.1109/YCICT.2009.5382425
K. Halawa
A method of regularization of orthogonal neural networks using fractional derivatives is proposed in the paper. The cost function with a penalty for non-smoothness with fractional derivatives enabling to use a priori knowledge. The formula for network weight values which minimize the proposed cost function was derived. It was demonstrated the obtained matrix in normal equations is nonnegative-definite. The results of simulation experiments where the outlined method was used for modeling static nonlinear systems were shown.
{"title":"Regularization of orthogonal neural networks using fractional derivatives","authors":"K. Halawa","doi":"10.1109/YCICT.2009.5382425","DOIUrl":"https://doi.org/10.1109/YCICT.2009.5382425","url":null,"abstract":"A method of regularization of orthogonal neural networks using fractional derivatives is proposed in the paper. The cost function with a penalty for non-smoothness with fractional derivatives enabling to use a priori knowledge. The formula for network weight values which minimize the proposed cost function was derived. It was demonstrated the obtained matrix in normal equations is nonnegative-definite. The results of simulation experiments where the outlined method was used for modeling static nonlinear systems were shown.","PeriodicalId":138803,"journal":{"name":"2009 IEEE Youth Conference on Information, Computing and Telecommunication","volume":"64 5","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114024261","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-09-01DOI: 10.1109/YCICT.2009.5382427
Funian Li, Haiming Du, Chao Zhang, Xinda Ke
Cooperative communication is an efficient solution to combat wireless channel fading and to increase system throughput in future board communication. In this paper, we consider the uplink scenario of multi-user cooperative network, in which the resource is allocated to the users with the consideration of both fairness guarantee and throughput enhancement. The system uplink throughput is optimized by using decode-and-forward (DF) opportunistic relaying. We show that the optimization problem is formulated as a mixed binary integer programming problem, which is hard to find the global optimum in terms of computational complexity. Thus we decomposed the optimization problem into two sub-problems of opportunistic relaying strategy and power allocation. First, the opportunistic relaying strategy is given by making use of the equivalent channel power gain. Second, a low-complexity power allocation scheme is proposed. The simulation result shows that the proposed scheme can both improve the system throughput and ensure the fairness.
{"title":"Opportunistic relaying in multiuser cooperative networks with proportional rate constraints","authors":"Funian Li, Haiming Du, Chao Zhang, Xinda Ke","doi":"10.1109/YCICT.2009.5382427","DOIUrl":"https://doi.org/10.1109/YCICT.2009.5382427","url":null,"abstract":"Cooperative communication is an efficient solution to combat wireless channel fading and to increase system throughput in future board communication. In this paper, we consider the uplink scenario of multi-user cooperative network, in which the resource is allocated to the users with the consideration of both fairness guarantee and throughput enhancement. The system uplink throughput is optimized by using decode-and-forward (DF) opportunistic relaying. We show that the optimization problem is formulated as a mixed binary integer programming problem, which is hard to find the global optimum in terms of computational complexity. Thus we decomposed the optimization problem into two sub-problems of opportunistic relaying strategy and power allocation. First, the opportunistic relaying strategy is given by making use of the equivalent channel power gain. Second, a low-complexity power allocation scheme is proposed. The simulation result shows that the proposed scheme can both improve the system throughput and ensure the fairness.","PeriodicalId":138803,"journal":{"name":"2009 IEEE Youth Conference on Information, Computing and Telecommunication","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124947684","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-09-01DOI: 10.1109/YCICT.2009.5382396
Shuai Liu, Yutao Liu, Xuezhi Tan
Cognitive radio is recognized as an efficient way to improve the spectrum efficiency. In the distributed cognitive radio networks of multiple primary users and a secondary user, we proposed a utility function based on idle probability of primary users by using game model. The primary users can achieve the Nash equilibrium by adjusting the learning rate through repeated games. Simulations show that the primary user whose idle probability is larger, the system utility is higher and the system utility becomes the largest when the spectrum offered by primary users is totally idle. Besides, the Nash equilibrium is not efficient as the total profit of the primary users is not maximized. The cooperative optimality solution can obtain the highest system profit finally.
{"title":"Competitive spectrum allocation in cognitive radio based on idle probability of primary users","authors":"Shuai Liu, Yutao Liu, Xuezhi Tan","doi":"10.1109/YCICT.2009.5382396","DOIUrl":"https://doi.org/10.1109/YCICT.2009.5382396","url":null,"abstract":"Cognitive radio is recognized as an efficient way to improve the spectrum efficiency. In the distributed cognitive radio networks of multiple primary users and a secondary user, we proposed a utility function based on idle probability of primary users by using game model. The primary users can achieve the Nash equilibrium by adjusting the learning rate through repeated games. Simulations show that the primary user whose idle probability is larger, the system utility is higher and the system utility becomes the largest when the spectrum offered by primary users is totally idle. Besides, the Nash equilibrium is not efficient as the total profit of the primary users is not maximized. The cooperative optimality solution can obtain the highest system profit finally.","PeriodicalId":138803,"journal":{"name":"2009 IEEE Youth Conference on Information, Computing and Telecommunication","volume":"365 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115901790","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-09-01DOI: 10.1109/YCICT.2009.5382350
Lei Zhang, Dingling Zhang, Guangming Huang
In a cognitive radio network, cooperative spectrum sensing is conducted among the secondary users so as to improve the sensing performance. However, it's not necessary to cooperate all users to perform spectrum sensing while achieve a given error bound. In this paper, we investigate the problem of optimal number of secondary users in cooperative spectrum sensing. Moreover, an efficient and robust cooperative spectrum sensing algorithm is presented. A few secondary users are selected to cooperative based on reputation, while guarantee an error bound. Simulation results show the improvement of the sensing performance and network security as opposed to the random choosing.
{"title":"Optimal number of secondary users for cooperative sensing in cognitive radio networks","authors":"Lei Zhang, Dingling Zhang, Guangming Huang","doi":"10.1109/YCICT.2009.5382350","DOIUrl":"https://doi.org/10.1109/YCICT.2009.5382350","url":null,"abstract":"In a cognitive radio network, cooperative spectrum sensing is conducted among the secondary users so as to improve the sensing performance. However, it's not necessary to cooperate all users to perform spectrum sensing while achieve a given error bound. In this paper, we investigate the problem of optimal number of secondary users in cooperative spectrum sensing. Moreover, an efficient and robust cooperative spectrum sensing algorithm is presented. A few secondary users are selected to cooperative based on reputation, while guarantee an error bound. Simulation results show the improvement of the sensing performance and network security as opposed to the random choosing.","PeriodicalId":138803,"journal":{"name":"2009 IEEE Youth Conference on Information, Computing and Telecommunication","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114488794","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-09-01DOI: 10.1109/YCICT.2009.5382422
Yutao Liu, Jiang Mengxiong, Xuezhi Tan, Fanlei Lu
An expanding model based on graph coloring is built for channel allocation, which is more suitable to the actual requirement of cognitive radios. Several representative channel allocation algorithms are analyzed contrastively, including List-Coloring Greedy Algorithm and Fair Algorithm. A novel channel allocation algorithm using Maximal Independent Set (MIS) is proposed aiming at the characteristic and request of the cognitive radio systems. When taking no account of the spectrum diversity, this algorithm can give consideration to both utilization and fairness of channel allocation. Meanwhile, it can reduce the convergence time and the communication overhead. At last, simulation analysis and comparation are given about the average spectrum utilization, fairness and communication overhead, and the results demonstrate the efficiency for the conclusions.
{"title":"Maximal independent set based channel allocation algorithm in cognitive radios","authors":"Yutao Liu, Jiang Mengxiong, Xuezhi Tan, Fanlei Lu","doi":"10.1109/YCICT.2009.5382422","DOIUrl":"https://doi.org/10.1109/YCICT.2009.5382422","url":null,"abstract":"An expanding model based on graph coloring is built for channel allocation, which is more suitable to the actual requirement of cognitive radios. Several representative channel allocation algorithms are analyzed contrastively, including List-Coloring Greedy Algorithm and Fair Algorithm. A novel channel allocation algorithm using Maximal Independent Set (MIS) is proposed aiming at the characteristic and request of the cognitive radio systems. When taking no account of the spectrum diversity, this algorithm can give consideration to both utilization and fairness of channel allocation. Meanwhile, it can reduce the convergence time and the communication overhead. At last, simulation analysis and comparation are given about the average spectrum utilization, fairness and communication overhead, and the results demonstrate the efficiency for the conclusions.","PeriodicalId":138803,"journal":{"name":"2009 IEEE Youth Conference on Information, Computing and Telecommunication","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114638426","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-09-01DOI: 10.1109/YCICT.2009.5382437
Yu Cheng-bo, L. Yanfei, Liu Li
The effective coverage range is one of the QoS criterions in wireless sensor network. In practical engineering, the key problem to be solved is how to achieve the effective coverage to enhance performance and lifetime of the whole network. In view of the poor performance of effective coverage in Existing ZigBee networks, the paper analysed the factors of impacting on the coverage capability, including the topology type of the wireless sensor network, the short address allocation of the sensor nodes, the parameters setting about the network scale and so on. Finally the paper put forward the means of implementing the effective coverage, and realized the corresponding network deployment scheme for the large cropland irrigation control system based on ZigBee technology.
{"title":"Research and application on the coverage range of the Zigbee protocol","authors":"Yu Cheng-bo, L. Yanfei, Liu Li","doi":"10.1109/YCICT.2009.5382437","DOIUrl":"https://doi.org/10.1109/YCICT.2009.5382437","url":null,"abstract":"The effective coverage range is one of the QoS criterions in wireless sensor network. In practical engineering, the key problem to be solved is how to achieve the effective coverage to enhance performance and lifetime of the whole network. In view of the poor performance of effective coverage in Existing ZigBee networks, the paper analysed the factors of impacting on the coverage capability, including the topology type of the wireless sensor network, the short address allocation of the sensor nodes, the parameters setting about the network scale and so on. Finally the paper put forward the means of implementing the effective coverage, and realized the corresponding network deployment scheme for the large cropland irrigation control system based on ZigBee technology.","PeriodicalId":138803,"journal":{"name":"2009 IEEE Youth Conference on Information, Computing and Telecommunication","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130662367","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-09-01DOI: 10.1109/YCICT.2009.5382399
Q. Miao, Min Huang, Qing Wei
This paper introduced a parallel implementation of Numerical Manifold Method based on multiprocessor platforms. First, the computing performance for a class of rock engineering problems was analyzed. For solving simultaneous equations is the most time consuming, we choose parallelized Jacobi's iterative method to speed up the computing process. The implementation of parallel Jacobi's iterative method with OpenMP was introduced. A series of experiments shows that our parallel algorithm is an effective way to improve computing performance for such class of engineering problems.
{"title":"Parallel computing of Numerical Manifold Method with OpenMP","authors":"Q. Miao, Min Huang, Qing Wei","doi":"10.1109/YCICT.2009.5382399","DOIUrl":"https://doi.org/10.1109/YCICT.2009.5382399","url":null,"abstract":"This paper introduced a parallel implementation of Numerical Manifold Method based on multiprocessor platforms. First, the computing performance for a class of rock engineering problems was analyzed. For solving simultaneous equations is the most time consuming, we choose parallelized Jacobi's iterative method to speed up the computing process. The implementation of parallel Jacobi's iterative method with OpenMP was introduced. A series of experiments shows that our parallel algorithm is an effective way to improve computing performance for such class of engineering problems.","PeriodicalId":138803,"journal":{"name":"2009 IEEE Youth Conference on Information, Computing and Telecommunication","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128203642","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-09-01DOI: 10.1109/YCICT.2009.5382381
Wang Yunlu, Wu Zhendong
An effective blind detection for four kinds of echo hiding based on three cepstrums is proposed. Due to statistic characteristic changing with echo in stego speech, real cepstrum, complex cepstrum and power cepstrum are analyzed. Firstly we calculate high order statistics of each cepstrum, including coefficients of skewness and kurtosis in combination. Then we train the combinatorial skewness and kurtosis in each cepstrum of orignal speech and echoed speech with SVM. By obtaining combinatorial skewness-kurtosis thresholds, we can used them for blind steganalysis of echo hiding. Experimental results show that our proposed blind detection with three cepstrums performs well in testing Ker.1 and Ker.3 echo hiding, and power cepstrum achieves high accuracy in four kinds of echo hiding.
{"title":"Blind detection on echo hiding based on cepstrums","authors":"Wang Yunlu, Wu Zhendong","doi":"10.1109/YCICT.2009.5382381","DOIUrl":"https://doi.org/10.1109/YCICT.2009.5382381","url":null,"abstract":"An effective blind detection for four kinds of echo hiding based on three cepstrums is proposed. Due to statistic characteristic changing with echo in stego speech, real cepstrum, complex cepstrum and power cepstrum are analyzed. Firstly we calculate high order statistics of each cepstrum, including coefficients of skewness and kurtosis in combination. Then we train the combinatorial skewness and kurtosis in each cepstrum of orignal speech and echoed speech with SVM. By obtaining combinatorial skewness-kurtosis thresholds, we can used them for blind steganalysis of echo hiding. Experimental results show that our proposed blind detection with three cepstrums performs well in testing Ker.1 and Ker.3 echo hiding, and power cepstrum achieves high accuracy in four kinds of echo hiding.","PeriodicalId":138803,"journal":{"name":"2009 IEEE Youth Conference on Information, Computing and Telecommunication","volume":"99 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122673724","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-09-01DOI: 10.1109/YCICT.2009.5382336
Peng Gang
This paper presents a methodology for modeling and simulation of analog/mixed-signal systems using Verilog-AMS. Through this approach, it becomes more efficient and convenient to model analog, digital and mixed-signal design. Moreover, it is also a good solution for analog/mixed-signal verification because simulation time will be greatly decreased in this way. The applied methodology brings together the modeling and simulation of a PLL (Phase Locked Loop) in the Cadence AMS design environment. The results show that this methodology provides a standardized framework in order to efficiently and accurately model and simulate complex analog/mixed signal applications.
{"title":"Behavioral modeling and simulation of analog/mixed-signal systems using Verilog-AMS","authors":"Peng Gang","doi":"10.1109/YCICT.2009.5382336","DOIUrl":"https://doi.org/10.1109/YCICT.2009.5382336","url":null,"abstract":"This paper presents a methodology for modeling and simulation of analog/mixed-signal systems using Verilog-AMS. Through this approach, it becomes more efficient and convenient to model analog, digital and mixed-signal design. Moreover, it is also a good solution for analog/mixed-signal verification because simulation time will be greatly decreased in this way. The applied methodology brings together the modeling and simulation of a PLL (Phase Locked Loop) in the Cadence AMS design environment. The results show that this methodology provides a standardized framework in order to efficiently and accurately model and simulate complex analog/mixed signal applications.","PeriodicalId":138803,"journal":{"name":"2009 IEEE Youth Conference on Information, Computing and Telecommunication","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123075749","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}