首页 > 最新文献

Fifth International Conference on Computing, Communications and Networking Technologies (ICCCNT)最新文献

英文 中文
Fish school search approach to find optimized thresholds in gray-scale image 用鱼群搜索方法在灰度图像中寻找优化阈值
Debashis Mishra, Utpal Chandra De, I. Bose, Bishwojyoti Pradhan
Image thresholding is one essential feature of modern digital image processing, which is meant for the segmentation of image into several parts. It helps to understand the image and to detect particular objects from the image. There are various soft computing based image thresholding techniques evolved till date using advance tools such as fuzzy operator, genetic algorithm, swarm optimization etc. In this paper, Fish school search (FSS), a new swarm optimization technique is applied to find the optimized threshold value to segment the image. FSS mimics the fishes searching for food in group, considering an aquarium as search space. The proposed technique described in this paper shows optimized result comparing to traditional image thresholding technique.
图像阈值分割是现代数字图像处理的一个重要特征,它将图像分割成若干部分。它有助于理解图像并从图像中检测特定的物体。迄今为止,已有各种基于软计算的图像阈值处理技术,使用了模糊算子、遗传算法、群体优化等先进工具。本文将鱼群搜索(Fish school search, FSS)作为一种新的群体优化技术来寻找最优的阈值进行图像分割。FSS模拟鱼类在群体中寻找食物,将水族箱视为搜索空间。与传统的图像阈值分割技术相比,本文所提出的方法取得了较好的效果。
{"title":"Fish school search approach to find optimized thresholds in gray-scale image","authors":"Debashis Mishra, Utpal Chandra De, I. Bose, Bishwojyoti Pradhan","doi":"10.1109/ICCCNT.2014.6963069","DOIUrl":"https://doi.org/10.1109/ICCCNT.2014.6963069","url":null,"abstract":"Image thresholding is one essential feature of modern digital image processing, which is meant for the segmentation of image into several parts. It helps to understand the image and to detect particular objects from the image. There are various soft computing based image thresholding techniques evolved till date using advance tools such as fuzzy operator, genetic algorithm, swarm optimization etc. In this paper, Fish school search (FSS), a new swarm optimization technique is applied to find the optimized threshold value to segment the image. FSS mimics the fishes searching for food in group, considering an aquarium as search space. The proposed technique described in this paper shows optimized result comparing to traditional image thresholding technique.","PeriodicalId":140744,"journal":{"name":"Fifth International Conference on Computing, Communications and Networking Technologies (ICCCNT)","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123973110","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A test data compression scheme based on position information coding 一种基于位置信息编码的测试数据压缩方案
Tian Chen, Bingdong Yang, Wei Wang, Birong Hao, Fuji Ren, Jun Liu, Yixin Wang
Under the condition of Built-off Self-test (BOST), a novel test data compression scheme based on position information coding is presented, which is targeting test data and test power consumption. The proposed scheme gets the next test stimuli by reversing some bits of the responses corresponding to the previous test vectors. During the process of bit flip, test power problem should be taken into account; both the shift power and capture power during the test should be limited in the scope of security. For shift power, need to modify the scan chain by adding blocking logic; and the capture power reduction through the test cube filling based on the response. Experimental results justify the efficacy of the proposed method in attaining test-data compression; the average compression ratio is 73.63% on the premise of capture power consumption reduced by 20%.
针对测试数据和测试功耗问题,提出了一种基于位置信息编码的测试数据压缩方案。该方案通过反转与前一个测试向量对应的响应的一些比特来获得下一个测试刺激。在位翻转过程中,要考虑到测试功率问题;试验时的换挡功率和捕获功率都应限制在安全范围内。对于移位功率,需要通过添加阻塞逻辑来修改扫描链;并通过基于响应的测试立方体填充来降低捕获功率。实验结果证明了该方法在测试数据压缩方面的有效性;在捕获功耗降低20%的前提下,平均压缩比为73.63%。
{"title":"A test data compression scheme based on position information coding","authors":"Tian Chen, Bingdong Yang, Wei Wang, Birong Hao, Fuji Ren, Jun Liu, Yixin Wang","doi":"10.1109/ICCCNT.2014.6963038","DOIUrl":"https://doi.org/10.1109/ICCCNT.2014.6963038","url":null,"abstract":"Under the condition of Built-off Self-test (BOST), a novel test data compression scheme based on position information coding is presented, which is targeting test data and test power consumption. The proposed scheme gets the next test stimuli by reversing some bits of the responses corresponding to the previous test vectors. During the process of bit flip, test power problem should be taken into account; both the shift power and capture power during the test should be limited in the scope of security. For shift power, need to modify the scan chain by adding blocking logic; and the capture power reduction through the test cube filling based on the response. Experimental results justify the efficacy of the proposed method in attaining test-data compression; the average compression ratio is 73.63% on the premise of capture power consumption reduced by 20%.","PeriodicalId":140744,"journal":{"name":"Fifth International Conference on Computing, Communications and Networking Technologies (ICCCNT)","volume":"113 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124707792","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Multi-Armed Bandit Problem-Based Target Coverage Protocol for Wireless Sensor Network 基于多臂强盗问题的无线传感器网络目标覆盖协议
M. Parvin, E. Jafari, Reza Azizi
Wireless sensor networks consist of tiny sensors with some constraints particularly when the energy is concerned. In recent years, owing to their vast applications, sensor networks are devoted a great part of researches aiming at enhancing the network lifetime. Since there are a large number of nodes available in the environment of the network, one important factor reaching this aim will be to activate the minimum number of nodes to provide a secure coverage of the targets under surveillance. By so doing, the energy consumption among the nodes of the network is optimized. In this paper, we have presented a Multi-Armed Bandit Problem-Based Target Coverage Protocol, called MABTC, for Wireless Sensor Networks, which endeavors to recognize nodes which are higher in energy amount yet are more effective in the coverage of the targets of the network and sustain the coverage in a way that the energy consumption of the nodes is balanced and optimized. To assess, the proposed protocol is simulated using NS2 and the results are compared to those of some outstanding methods in the network coverage.
无线传感器网络由具有一定约束条件的微型传感器组成,特别是在能量方面。近年来,由于传感器网络的广泛应用,人们对提高网络寿命进行了大量的研究。由于网络环境中存在大量可用节点,实现这一目标的一个重要因素将是激活最小数量的节点,以提供对监视目标的安全覆盖。通过这样做,优化了网络节点之间的能耗。本文提出了一种基于多臂强盗问题的无线传感器网络目标覆盖协议(MABTC),该协议致力于识别能量较高但对网络目标覆盖更有效的节点,并以平衡和优化节点能量消耗的方式维持覆盖。为了评估所提出的协议,使用NS2进行了仿真,并将结果与网络覆盖方面的一些优秀方法进行了比较。
{"title":"A Multi-Armed Bandit Problem-Based Target Coverage Protocol for Wireless Sensor Network","authors":"M. Parvin, E. Jafari, Reza Azizi","doi":"10.1109/ICCCNT.2014.6963133","DOIUrl":"https://doi.org/10.1109/ICCCNT.2014.6963133","url":null,"abstract":"Wireless sensor networks consist of tiny sensors with some constraints particularly when the energy is concerned. In recent years, owing to their vast applications, sensor networks are devoted a great part of researches aiming at enhancing the network lifetime. Since there are a large number of nodes available in the environment of the network, one important factor reaching this aim will be to activate the minimum number of nodes to provide a secure coverage of the targets under surveillance. By so doing, the energy consumption among the nodes of the network is optimized. In this paper, we have presented a Multi-Armed Bandit Problem-Based Target Coverage Protocol, called MABTC, for Wireless Sensor Networks, which endeavors to recognize nodes which are higher in energy amount yet are more effective in the coverage of the targets of the network and sustain the coverage in a way that the energy consumption of the nodes is balanced and optimized. To assess, the proposed protocol is simulated using NS2 and the results are compared to those of some outstanding methods in the network coverage.","PeriodicalId":140744,"journal":{"name":"Fifth International Conference on Computing, Communications and Networking Technologies (ICCCNT)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128300910","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Malicious combinational Hardware Trojan detection by Gate Level Characterization in 90nm technology 基于90纳米门级特性的恶意组合硬件木马检测
Dinesh Kumar Karunakaran, N. Mohankumar
Globalization of Integrated Circuits (IC's) in semiconductor industries has made them vulnerable to intentional alterations of the design. These intentional alterations to a design are called Hardware Trojans (HT's). Since many of the designs are outsourced for its fabrication, there is a lot of chance for altering its functionality. It is very important to detect these Trojans as it may raise serious concern about hardware trust, especially in the field of military and security applications. This paper considers the detection of combinational trojans using Gate Level Characterization (GLC) and is based on the measurement of side-channel parameters, especially leakage power. The leakage power for an entire circuit is being calculated for each input vector. The obtained measurements are formulated as linear equations in Linear Programming (LP) and are solved using LP solver.
半导体行业集成电路(IC)的全球化使得它们很容易受到故意改变设计的影响。这些对设计的故意改变被称为硬件木马(Hardware trojan, HT)。由于许多设计都是外包制造的,因此有很多机会改变其功能。检测这些木马非常重要,因为它可能会引起对硬件信任的严重关注,特别是在军事和安全应用领域。本文考虑利用栅极电平特性(GLC)检测组合木马,并基于侧通道参数的测量,特别是泄漏功率。对每个输入矢量计算整个电路的漏功率。得到的测量值用线性规划(LP)中的线性方程表示,并用LP求解器求解。
{"title":"Malicious combinational Hardware Trojan detection by Gate Level Characterization in 90nm technology","authors":"Dinesh Kumar Karunakaran, N. Mohankumar","doi":"10.1109/ICCCNT.2014.6963036","DOIUrl":"https://doi.org/10.1109/ICCCNT.2014.6963036","url":null,"abstract":"Globalization of Integrated Circuits (IC's) in semiconductor industries has made them vulnerable to intentional alterations of the design. These intentional alterations to a design are called Hardware Trojans (HT's). Since many of the designs are outsourced for its fabrication, there is a lot of chance for altering its functionality. It is very important to detect these Trojans as it may raise serious concern about hardware trust, especially in the field of military and security applications. This paper considers the detection of combinational trojans using Gate Level Characterization (GLC) and is based on the measurement of side-channel parameters, especially leakage power. The leakage power for an entire circuit is being calculated for each input vector. The obtained measurements are formulated as linear equations in Linear Programming (LP) and are solved using LP solver.","PeriodicalId":140744,"journal":{"name":"Fifth International Conference on Computing, Communications and Networking Technologies (ICCCNT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128403302","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 32
New blind signcryption schemes with application to E-cash systems 应用于电子现金系统的新型盲签名方案
Y. Abouelseoud
Signcryption is a well-known cryptographic primitive that achieves various security goals including confidentiality of communications, source authentication, and integrity of message contents and ensuring non-repudiation. In e-cash systems, customers prefer to spend their e-coins anonymously. Blind signatures have been developed to meet this requirement. In the present paper, two new blind signcryption schemes are proposed in order to combine the functionalities of both primitives in a single logical step. The first one is tailored for traditional public key infrastructures; while the second one is an identity-based scheme. The proposed schemes have been designed with an eye on applications to e-cash systems and thus overcoming shortcomings in earlier attempts in blind signcryption. The two schemes are computationally efficient promoting their use in practical scenarios. The schemes involve three parties. In e-cash scenarios, these are the bank, the e-coin acquirer (customer) and the merchant which deposits the e-coin in his bank account.
签名加密是一种众所周知的加密原语,它可以实现各种安全目标,包括通信的机密性、源身份验证、消息内容的完整性和确保不可否认性。在电子现金系统中,客户更愿意匿名使用他们的电子货币。盲签名就是为了满足这一要求而开发的。本文提出了两种新的盲签名加密方案,以便在一个逻辑步骤中结合这两种原语的功能。第一个是为传统的公钥基础设施量身定制的;而第二个是基于身份的方案。所提出的方案的设计着眼于电子现金系统的应用,从而克服了早期盲签名加密尝试的缺点。这两种方案都是计算效率高的,促进了它们在实际场景中的使用。这些计划涉及三方。在电子现金场景中,它们是银行、电子货币的获取者(客户)和将电子货币存入其银行账户的商家。
{"title":"New blind signcryption schemes with application to E-cash systems","authors":"Y. Abouelseoud","doi":"10.1109/ICCCNT.2014.6963070","DOIUrl":"https://doi.org/10.1109/ICCCNT.2014.6963070","url":null,"abstract":"Signcryption is a well-known cryptographic primitive that achieves various security goals including confidentiality of communications, source authentication, and integrity of message contents and ensuring non-repudiation. In e-cash systems, customers prefer to spend their e-coins anonymously. Blind signatures have been developed to meet this requirement. In the present paper, two new blind signcryption schemes are proposed in order to combine the functionalities of both primitives in a single logical step. The first one is tailored for traditional public key infrastructures; while the second one is an identity-based scheme. The proposed schemes have been designed with an eye on applications to e-cash systems and thus overcoming shortcomings in earlier attempts in blind signcryption. The two schemes are computationally efficient promoting their use in practical scenarios. The schemes involve three parties. In e-cash scenarios, these are the bank, the e-coin acquirer (customer) and the merchant which deposits the e-coin in his bank account.","PeriodicalId":140744,"journal":{"name":"Fifth International Conference on Computing, Communications and Networking Technologies (ICCCNT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128466478","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
The development of a visualization framework for fishing vessels at sea 开发海上渔船可视化框架
K. Rakesh, S. Sunanda
Security and disaster alert dissemination showcase the key challenges faced by the fishing industry, mainly due to the lack of reliable communication means, and can pose serious threats to the lives of the fishermen. The fishing vessels, equipped with appropriate transceivers, can be considered as MANETs (Mobile Ad-hoc Networks) at sea, and communication can happen in a hop by hop manner. The availability of a visualization framework for such a system enables authorities on the shore to get information on vessel locations, their transmission ranges, and other information, in near real-time, and display them. The visualization framework will aid in selecting the most favorable routing algorithm and will help to track and locate the vessels. The system is designed to enable the users to access it through a web browser, and is developed using the latest web technologies such as HTML5, websockets and Google Maps API V3. The system architecture, implementation details and the results obtained are discussed in this paper.
安全和灾害警报传播显示了渔业面临的主要挑战,主要是由于缺乏可靠的通信手段,并可能对渔民的生命构成严重威胁。配备适当收发器的渔船可以被视为海上的manet(移动自组网),通信可以以逐跳的方式进行。这种系统的可视化框架的可用性使岸上当局能够获得有关船舶位置、其传输范围和其他信息的信息,并以接近实时的方式显示它们。可视化框架将有助于选择最有利的路由算法,并有助于跟踪和定位船只。该系统旨在使用户能够通过web浏览器访问它,并使用最新的网络技术,如HTML5, websockets和Google Maps API V3开发。本文讨论了系统的体系结构、实现细节和所获得的结果。
{"title":"The development of a visualization framework for fishing vessels at sea","authors":"K. Rakesh, S. Sunanda","doi":"10.1109/ICCCNT.2014.6963077","DOIUrl":"https://doi.org/10.1109/ICCCNT.2014.6963077","url":null,"abstract":"Security and disaster alert dissemination showcase the key challenges faced by the fishing industry, mainly due to the lack of reliable communication means, and can pose serious threats to the lives of the fishermen. The fishing vessels, equipped with appropriate transceivers, can be considered as MANETs (Mobile Ad-hoc Networks) at sea, and communication can happen in a hop by hop manner. The availability of a visualization framework for such a system enables authorities on the shore to get information on vessel locations, their transmission ranges, and other information, in near real-time, and display them. The visualization framework will aid in selecting the most favorable routing algorithm and will help to track and locate the vessels. The system is designed to enable the users to access it through a web browser, and is developed using the latest web technologies such as HTML5, websockets and Google Maps API V3. The system architecture, implementation details and the results obtained are discussed in this paper.","PeriodicalId":140744,"journal":{"name":"Fifth International Conference on Computing, Communications and Networking Technologies (ICCCNT)","volume":"137 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127430449","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Virtual merging of fractured fragments based on constraint cluster 基于约束聚类的破碎碎片虚拟合并
Li Jijunnan, Gen Guohua, Liu Lunchun
This paper proposes a fracture surface matching algorithm based on integral invariants. We compute points' volume descriptor on multi-scale, search similar feature points to build matching constraint clusters. Extracting constrained cluster feature and giving a representation, according to convex and concave correspondence of cluster surface, it obtains initial matching cluster pairs. We use spatial geometric consistency constraint's vote method and search the maximum independent set to prune non-matching pairs, so this coarse registration becomes an optimization problem. At last two fragments can be precisely aligned by ICPIF method based on the result of coarse matching. Experimental results show that the algorithm can achieve better matching and reassemble.
提出了一种基于积分不变量的裂缝面匹配算法。我们在多尺度上计算点的体积描述符,搜索相似的特征点建立匹配约束聚类。提取约束的聚类特征并给出表示,根据聚类表面的凹凸对应关系,得到初始匹配的聚类对。我们使用空间几何一致性约束的投票方法,搜索最大独立集来修剪不匹配的对,使粗配准成为一个优化问题。最后在粗匹配结果的基础上,利用ICPIF方法对两个片段进行精确对齐。实验结果表明,该算法能达到较好的匹配和重组效果。
{"title":"Virtual merging of fractured fragments based on constraint cluster","authors":"Li Jijunnan, Gen Guohua, Liu Lunchun","doi":"10.1109/ICCCNT.2014.6963004","DOIUrl":"https://doi.org/10.1109/ICCCNT.2014.6963004","url":null,"abstract":"This paper proposes a fracture surface matching algorithm based on integral invariants. We compute points' volume descriptor on multi-scale, search similar feature points to build matching constraint clusters. Extracting constrained cluster feature and giving a representation, according to convex and concave correspondence of cluster surface, it obtains initial matching cluster pairs. We use spatial geometric consistency constraint's vote method and search the maximum independent set to prune non-matching pairs, so this coarse registration becomes an optimization problem. At last two fragments can be precisely aligned by ICPIF method based on the result of coarse matching. Experimental results show that the algorithm can achieve better matching and reassemble.","PeriodicalId":140744,"journal":{"name":"Fifth International Conference on Computing, Communications and Networking Technologies (ICCCNT)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116266426","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Simple GSM base station based on universal software radio peripheral 基于通用软件无线电外设的简易GSM基站
Zhilin Li, Jian Tang, Xuejie Zhu, Caihong Kai
GNU Radio is a free and open-source software development toolkit that provides signal processing blocks to implement software radios. Through its operation and signal processing module, an ordinary PC can implement modern communication process, codec, time and frequency synchronization process in a flexible manner. Because of the high cost of traditional base station, people in low-populated and low-income rural areas cannot have access to the service of mobile communication system. Fortunately, SDR enables the quick and low-cost deployment of a simple GSM basestaion (BS) that provides short messages and voice communications. In this paper, we choose USRP1 as the hardware platform and realize the Um interface between mobile station and base-station of a GSM system by using OpenBTS, GNU Radio and Asterisk. More specifically, we build up a simple GSM base station that can provide automatic user-registration, short message and voice communication service for mobile users. We will introduce the system architecture of our USRP-based GSM base station, present the details of the implementation procedure for the construction. Furthermore, we perform extensive tests on the performance of the built GSM BS in the practical network environment, including the mean time between failure under empty-load and loaded scenario, the mean last time of a voice call, and so on. Test results show that the mean time between failure of our GSM station is 62.5 minutes and 42.5 minutes under empty-load and loaded scenario, respectively.
GNU Radio是一个免费的开源软件开发工具包,它提供了实现软件无线电的信号处理模块。通过其操作和信号处理模块,一台普通PC机可以灵活地实现现代通信过程、编解码、时频同步等过程。由于传统基站成本高,人口少、收入低的农村地区无法享受到移动通信系统的服务。幸运的是,SDR能够快速和低成本地部署提供短消息和语音通信的简单GSM基站(BS)。本文选择USRP1作为硬件平台,利用OpenBTS、GNU Radio和Asterisk实现GSM系统移动站与基站之间的Um接口。具体来说,我们建立了一个简单的GSM基站,可以为移动用户提供自动注册用户、短信和语音通信服务。本文将介绍我国基于usrp的GSM基站的系统架构,给出具体的建设实现步骤。此外,我们还在实际网络环境中对内置GSM BS的性能进行了广泛的测试,包括空负载和负载情况下的平均故障间隔时间、语音呼叫的平均最后一次时间等。测试结果表明,在空载和负载情况下,GSM站的平均故障间隔时间分别为62.5分钟和42.5分钟。
{"title":"Simple GSM base station based on universal software radio peripheral","authors":"Zhilin Li, Jian Tang, Xuejie Zhu, Caihong Kai","doi":"10.1109/ICCCNT.2014.6963047","DOIUrl":"https://doi.org/10.1109/ICCCNT.2014.6963047","url":null,"abstract":"GNU Radio is a free and open-source software development toolkit that provides signal processing blocks to implement software radios. Through its operation and signal processing module, an ordinary PC can implement modern communication process, codec, time and frequency synchronization process in a flexible manner. Because of the high cost of traditional base station, people in low-populated and low-income rural areas cannot have access to the service of mobile communication system. Fortunately, SDR enables the quick and low-cost deployment of a simple GSM basestaion (BS) that provides short messages and voice communications. In this paper, we choose USRP1 as the hardware platform and realize the Um interface between mobile station and base-station of a GSM system by using OpenBTS, GNU Radio and Asterisk. More specifically, we build up a simple GSM base station that can provide automatic user-registration, short message and voice communication service for mobile users. We will introduce the system architecture of our USRP-based GSM base station, present the details of the implementation procedure for the construction. Furthermore, we perform extensive tests on the performance of the built GSM BS in the practical network environment, including the mean time between failure under empty-load and loaded scenario, the mean last time of a voice call, and so on. Test results show that the mean time between failure of our GSM station is 62.5 minutes and 42.5 minutes under empty-load and loaded scenario, respectively.","PeriodicalId":140744,"journal":{"name":"Fifth International Conference on Computing, Communications and Networking Technologies (ICCCNT)","volume":"40 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122502272","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Rateless codes based file delivery protocols in deep space communications 深空通信中基于速率码的文件传输协议
Zhihong Ren, Zhenyong Wang, Qing Guo
The rateless codes is a forward error correction technology. Because it has arbitrary probability approaching Shannon limit and rateless characters, so it can be able to adapt to the variety of deep space communication features. This paper studied the rateless codes based file transfer protocols of the file transmission delays and investigate its capacity based ACK scheme in deep space communication. The objective of this paper is to demonstrate through experimental results that the existing TCP and CFDP protocols are far from satisfying deep space communication requirements, and the performance of rateless codes based file transfer protocols has obviously advantages in the aspects of reducing the transfer time and proposed a improvement to increasing the link capacity in the stationary erasure channel.
无速率码是一种前向纠错技术。由于它具有接近香农极限的任意概率和无速率特性,因此能够适应各种深空通信特性。研究了基于无速率码的文件传输协议对文件传输时延的影响,研究了深空通信中基于容量的ACK方案。本文的目的是通过实验结果证明现有的TCP和CFDP协议远远不能满足深空通信的要求,基于无速率码的文件传输协议在减少传输时间方面具有明显的优势,并提出了一种提高静态擦除信道链路容量的改进方案。
{"title":"Rateless codes based file delivery protocols in deep space communications","authors":"Zhihong Ren, Zhenyong Wang, Qing Guo","doi":"10.1109/ICCCNT.2014.6963018","DOIUrl":"https://doi.org/10.1109/ICCCNT.2014.6963018","url":null,"abstract":"The rateless codes is a forward error correction technology. Because it has arbitrary probability approaching Shannon limit and rateless characters, so it can be able to adapt to the variety of deep space communication features. This paper studied the rateless codes based file transfer protocols of the file transmission delays and investigate its capacity based ACK scheme in deep space communication. The objective of this paper is to demonstrate through experimental results that the existing TCP and CFDP protocols are far from satisfying deep space communication requirements, and the performance of rateless codes based file transfer protocols has obviously advantages in the aspects of reducing the transfer time and proposed a improvement to increasing the link capacity in the stationary erasure channel.","PeriodicalId":140744,"journal":{"name":"Fifth International Conference on Computing, Communications and Networking Technologies (ICCCNT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131139823","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Edge detection of noisy images based on time-multiplexing CNN simulator 基于时复用CNN模拟器的噪声图像边缘检测
V. Murugesh, V. Arthy, V. Agalya
This paper presents a cellular neural network based edge detection of noisy images using Time-Multiplexing CNN Simulator. The experimental results of Time-Multiplexing CNN Simulator are compared with traditional edge detection operators Canny and Sobel. Simulation results show that the proposed simulator is accurately detecting the edge of noisy images.
本文提出了一种基于细胞神经网络的含噪图像边缘检测方法。将时间复用CNN模拟器的实验结果与传统的边缘检测算子Canny和Sobel进行了比较。仿真结果表明,该模拟器能够准确地检测出噪声图像的边缘。
{"title":"Edge detection of noisy images based on time-multiplexing CNN simulator","authors":"V. Murugesh, V. Arthy, V. Agalya","doi":"10.1109/ICCCNT.2014.6963142","DOIUrl":"https://doi.org/10.1109/ICCCNT.2014.6963142","url":null,"abstract":"This paper presents a cellular neural network based edge detection of noisy images using Time-Multiplexing CNN Simulator. The experimental results of Time-Multiplexing CNN Simulator are compared with traditional edge detection operators Canny and Sobel. Simulation results show that the proposed simulator is accurately detecting the edge of noisy images.","PeriodicalId":140744,"journal":{"name":"Fifth International Conference on Computing, Communications and Networking Technologies (ICCCNT)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131514988","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
期刊
Fifth International Conference on Computing, Communications and Networking Technologies (ICCCNT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1