首页 > 最新文献

2012 4th Computer Science and Electronic Engineering Conference (CEEC)最新文献

英文 中文
Side information generation in Distributed Video Coding using selective DC coefficients 使用选择性直流系数的分布式视频编码中的侧信息生成
Pub Date : 2012-12-06 DOI: 10.1109/CEEC.2012.6375403
H. Nguyen, J. Woods, M. Ghanbari
The quality of Side Information determines the performance of the DVC coder. The technique of generating Side Information using only available decoded key frames at decoder offers acceptable result for video sequences with low and medium level of motion. However, for complex and high motion sequences, sending some additional “hint” information from encoder for selective blocks is necessary. This paper proposes a new framework for Distributed Video Coding using selective DC information at the encoder to assist the side information generation at the decoder. This scheme offers higher rate distortion performance for sequences with complex and high motion without adding significant complexity to the encoder.
边信息的质量决定了DVC编码器的性能。在解码器中仅使用可用的解码关键帧生成侧信息的技术为具有低和中等运动水平的视频序列提供了可接受的结果。然而,对于复杂和高运动序列,从编码器发送一些额外的“提示”信息来选择块是必要的。本文提出了一种新的分布式视频编码框架,利用编码器的选择性直流信息来辅助解码器的侧信息生成。该方案在不增加编码器复杂性的前提下,为具有复杂和高运动的序列提供了更高的率失真性能。
{"title":"Side information generation in Distributed Video Coding using selective DC coefficients","authors":"H. Nguyen, J. Woods, M. Ghanbari","doi":"10.1109/CEEC.2012.6375403","DOIUrl":"https://doi.org/10.1109/CEEC.2012.6375403","url":null,"abstract":"The quality of Side Information determines the performance of the DVC coder. The technique of generating Side Information using only available decoded key frames at decoder offers acceptable result for video sequences with low and medium level of motion. However, for complex and high motion sequences, sending some additional “hint” information from encoder for selective blocks is necessary. This paper proposes a new framework for Distributed Video Coding using selective DC information at the encoder to assist the side information generation at the decoder. This scheme offers higher rate distortion performance for sequences with complex and high motion without adding significant complexity to the encoder.","PeriodicalId":142286,"journal":{"name":"2012 4th Computer Science and Electronic Engineering Conference (CEEC)","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125693670","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Spatial function estimation using Gaussian process with sparse history data in mobile sensor networks 基于高斯过程的移动传感器网络稀疏历史数据空间函数估计
Pub Date : 2012-12-06 DOI: 10.1109/CEEC.2012.6375391
Bowen Lu, Dongbing Gu, Huosheng Hu
This paper presents a sparse history data based method for modelling a latent function with mobile wireless sensor networks. It contains two main tasks, which are estimating the latent function and optimising the sensor deployment. Gaussian process (GP) is selected as the framework according to its excellent regression performance. History data can improve the modelling performance with small amount of sensors in static or slowly changed environment. However, the GP kernel size is expended. On the one hand, in other kernel based (or non-parametric) methods, computation cost increases fast with kernel size. To control the size of GP kernel, informative vector machine (IVM) is introduced for history data selection. On the other hand, centroidal Voronoi tessellation (CVT), a gradient based method, is adopted for optimising sensor deployment. Simulation results with different data selection methods and analyses are given. It's proved that the data selection is effective in reducing computation cost and keeping the precision of the estimated model.
提出了一种基于稀疏历史数据的移动无线传感器网络潜函数建模方法。它包含两个主要任务,即估计潜在函数和优化传感器部署。基于高斯过程(GP)良好的回归性能,选择其作为框架。在静态或缓慢变化的环境中,历史数据可以提高少量传感器的建模性能。但是,GP内核的大小会被占用。另一方面,在其他基于核(或非参数)的方法中,计算成本随着核的大小而快速增加。为了控制GP核的大小,引入信息向量机(IVM)对历史数据进行选择。另一方面,采用基于梯度的质心Voronoi镶嵌(CVT)方法优化传感器部署。给出了不同数据选择方法的仿真结果和分析。实验证明,该方法在降低计算量的同时,保持了估计模型的精度。
{"title":"Spatial function estimation using Gaussian process with sparse history data in mobile sensor networks","authors":"Bowen Lu, Dongbing Gu, Huosheng Hu","doi":"10.1109/CEEC.2012.6375391","DOIUrl":"https://doi.org/10.1109/CEEC.2012.6375391","url":null,"abstract":"This paper presents a sparse history data based method for modelling a latent function with mobile wireless sensor networks. It contains two main tasks, which are estimating the latent function and optimising the sensor deployment. Gaussian process (GP) is selected as the framework according to its excellent regression performance. History data can improve the modelling performance with small amount of sensors in static or slowly changed environment. However, the GP kernel size is expended. On the one hand, in other kernel based (or non-parametric) methods, computation cost increases fast with kernel size. To control the size of GP kernel, informative vector machine (IVM) is introduced for history data selection. On the other hand, centroidal Voronoi tessellation (CVT), a gradient based method, is adopted for optimising sensor deployment. Simulation results with different data selection methods and analyses are given. It's proved that the data selection is effective in reducing computation cost and keeping the precision of the estimated model.","PeriodicalId":142286,"journal":{"name":"2012 4th Computer Science and Electronic Engineering Conference (CEEC)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122201051","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A study of multi agent based resource search algorithms 基于多智能体的资源搜索算法研究
Pub Date : 2012-12-06 DOI: 10.1109/CEEC.2012.6375380
M. Al-Asfoor, M. Fasli
Resource sharing in a networked environment has been an evolved field of research in both industry and academia. In a dynamic, resource constrained environment, resource discovery plays a vital role in the resource sharing process. A distributed multi agent model for a dynamic, heterogeneous network has been proposed in this paper. Furthermore, three resource search algorithms have been investigated, namely: Random Walk, Directed Search and Directed Search with Self-Organisation. An approximate matching mechanism between resources and tasks descriptions has been proposed as a solution for the trade-off problem between the accuracy and speed. As performing random search might lead to traverse the whole network and increase the failing ratio, we have introduced a heuristic directed search to overcome this problem. Based on the agents' closeness, the Agents re-organise themselves by creating an overlay network of agents which are holding semantically close resources and then direct the search message accordingly. The proposed solution has been implemented in a simulated environment and simulation results have shown a significant improvement in the search time (calculated as a number of hops).
网络环境下的资源共享已经成为工业界和学术界不断发展的研究领域。在资源约束的动态环境中,资源发现在资源共享过程中起着至关重要的作用。本文提出了一种用于动态异构网络的分布式多智能体模型。此外,本文还研究了三种资源搜索算法:随机漫步、有向搜索和自组织有向搜索。提出了一种资源和任务描述之间的近似匹配机制,以解决准确率和速度之间的权衡问题。由于执行随机搜索可能导致遍历整个网络并增加失败率,我们引入了启发式定向搜索来克服这个问题。基于代理的亲密度,代理通过创建一个覆盖网络来重新组织自己,这些代理拥有语义上接近的资源,然后相应地指导搜索消息。所提出的解决方案已在仿真环境中实现,仿真结果表明在搜索时间(以跳数计算)方面有显著改善。
{"title":"A study of multi agent based resource search algorithms","authors":"M. Al-Asfoor, M. Fasli","doi":"10.1109/CEEC.2012.6375380","DOIUrl":"https://doi.org/10.1109/CEEC.2012.6375380","url":null,"abstract":"Resource sharing in a networked environment has been an evolved field of research in both industry and academia. In a dynamic, resource constrained environment, resource discovery plays a vital role in the resource sharing process. A distributed multi agent model for a dynamic, heterogeneous network has been proposed in this paper. Furthermore, three resource search algorithms have been investigated, namely: Random Walk, Directed Search and Directed Search with Self-Organisation. An approximate matching mechanism between resources and tasks descriptions has been proposed as a solution for the trade-off problem between the accuracy and speed. As performing random search might lead to traverse the whole network and increase the failing ratio, we have introduced a heuristic directed search to overcome this problem. Based on the agents' closeness, the Agents re-organise themselves by creating an overlay network of agents which are holding semantically close resources and then direct the search message accordingly. The proposed solution has been implemented in a simulated environment and simulation results have shown a significant improvement in the search time (calculated as a number of hops).","PeriodicalId":142286,"journal":{"name":"2012 4th Computer Science and Electronic Engineering Conference (CEEC)","volume":"95 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124599960","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Extracting common spatial patterns based on wavelet lifting for brain computer interface design 基于小波提升的公共空间模式提取在脑机接口设计中的应用
Pub Date : 2012-12-06 DOI: 10.1109/CEEC.2012.6375397
J. Asensio-Cubero, John Q. Gan, Ramaswamy Palaniappan
Brain computer interfacing (BCI) offers the possibility to interact with machines uniquely relying on the user's thoughts. Although wavelet analysis has been used in the BCI field there is evidence that standard wavelet families, such as Daubechies, may not be the optimal approach. In this study, we developed a novel wavelet lifting scheme, specifically for BCI design. The lifting transform in this new approach is based on common spatial patterns (CSP), which allows to exploit the signal characteristics in temporal, spectral and spatial domains simultaneously. Experimental results show that in BCI applications the new wavelet outperforms several first generation wavelet families in terms of classification accuracy and resource consumption.
脑机接口(BCI)提供了一种与机器交互的可能性,这种交互独特地依赖于用户的思想。尽管小波分析已被用于脑机接口领域,但有证据表明,标准小波族,如Daubechies,可能不是最佳方法。在这项研究中,我们开发了一种新的小波提升方案,专门用于BCI设计。该方法的提升变换基于公共空间模式(CSP),可以同时利用信号在时间、频谱和空间域的特征。实验结果表明,在脑机接口应用中,新小波在分类精度和资源消耗方面优于第一代小波族。
{"title":"Extracting common spatial patterns based on wavelet lifting for brain computer interface design","authors":"J. Asensio-Cubero, John Q. Gan, Ramaswamy Palaniappan","doi":"10.1109/CEEC.2012.6375397","DOIUrl":"https://doi.org/10.1109/CEEC.2012.6375397","url":null,"abstract":"Brain computer interfacing (BCI) offers the possibility to interact with machines uniquely relying on the user's thoughts. Although wavelet analysis has been used in the BCI field there is evidence that standard wavelet families, such as Daubechies, may not be the optimal approach. In this study, we developed a novel wavelet lifting scheme, specifically for BCI design. The lifting transform in this new approach is based on common spatial patterns (CSP), which allows to exploit the signal characteristics in temporal, spectral and spatial domains simultaneously. Experimental results show that in BCI applications the new wavelet outperforms several first generation wavelet families in terms of classification accuracy and resource consumption.","PeriodicalId":142286,"journal":{"name":"2012 4th Computer Science and Electronic Engineering Conference (CEEC)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132411540","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Extracting planar features from Kinect sensor 从Kinect传感器提取平面特征
Pub Date : 2012-12-06 DOI: 10.1109/CEEC.2012.6375388
E. Bostanci, N. Kanwal, A. Clark
An algorithm for finding planar features from a 3D point cloud by Kinect's depth sensor is described in this paper. The algorithm uses the explicit definition of a plane which allows storing only four parameters per plane rather than storing thousands of points. Extraction of multiple planes from the same set of points is prevented using a rejection mechanism. Parallelism is used for an average speed-up of 2.3:1. Details of the algorithm and results are given along with a discussion of how the calibration of the sensor affects the projections.
本文描述了一种利用Kinect深度传感器从三维点云中寻找平面特征的算法。该算法使用平面的显式定义,每个平面只允许存储四个参数,而不是存储数千个点。使用拒绝机制可以防止从同一组点提取多个平面。并行性用于实现2.3:1的平均加速。详细介绍了算法和结果,并讨论了传感器的校准如何影响投影。
{"title":"Extracting planar features from Kinect sensor","authors":"E. Bostanci, N. Kanwal, A. Clark","doi":"10.1109/CEEC.2012.6375388","DOIUrl":"https://doi.org/10.1109/CEEC.2012.6375388","url":null,"abstract":"An algorithm for finding planar features from a 3D point cloud by Kinect's depth sensor is described in this paper. The algorithm uses the explicit definition of a plane which allows storing only four parameters per plane rather than storing thousands of points. Extraction of multiple planes from the same set of points is prevented using a rejection mechanism. Parallelism is used for an average speed-up of 2.3:1. Details of the algorithm and results are given along with a discussion of how the calibration of the sensor affects the projections.","PeriodicalId":142286,"journal":{"name":"2012 4th Computer Science and Electronic Engineering Conference (CEEC)","volume":"119 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132201277","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Performance comparison of communication models for Service Oriented Architectures 面向服务体系结构通信模型的性能比较
Pub Date : 2012-12-06 DOI: 10.1109/CEEC.2012.6375382
S. Abdullah, D. Hunter
When designing distributed applications for a Service Oriented Architecture (SOA), the method chosen for service implementation is crucial. This paper determines a rule for choosing the best implementation method through performance comparison of two important communication implementation paradigms - blocking (“synchronous”) and non-blocking (“asynchronous brokered communication”). The service, service requester, service provider, and broker (in the non-blocking case) are evaluated by simulation. Conditions for equal performance are determined, which are expressed in terms of average normalised work, generalising previous work by yielding a rule for choosing the optimal SOA implementation for any given system parameters. We also investigate the stability of this rule with respect to changes in the way the system components are probabilistically modelled.
在为面向服务的体系结构(Service Oriented Architecture, SOA)设计分布式应用程序时,为服务实现选择的方法至关重要。本文通过对两种重要的通信实现范式阻塞(“同步”)和非阻塞(“异步代理通信”)的性能比较,确定了选择最佳实现方法的规则。通过模拟对服务、服务请求者、服务提供者和代理(在非阻塞情况下)进行评估。确定了相等性能的条件,这些条件用平均规范化工作来表示,通过生成针对任何给定系统参数选择最佳SOA实现的规则来概括以前的工作。我们还研究了该规则在系统组件概率建模方式变化方面的稳定性。
{"title":"Performance comparison of communication models for Service Oriented Architectures","authors":"S. Abdullah, D. Hunter","doi":"10.1109/CEEC.2012.6375382","DOIUrl":"https://doi.org/10.1109/CEEC.2012.6375382","url":null,"abstract":"When designing distributed applications for a Service Oriented Architecture (SOA), the method chosen for service implementation is crucial. This paper determines a rule for choosing the best implementation method through performance comparison of two important communication implementation paradigms - blocking (“synchronous”) and non-blocking (“asynchronous brokered communication”). The service, service requester, service provider, and broker (in the non-blocking case) are evaluated by simulation. Conditions for equal performance are determined, which are expressed in terms of average normalised work, generalising previous work by yielding a rule for choosing the optimal SOA implementation for any given system parameters. We also investigate the stability of this rule with respect to changes in the way the system components are probabilistically modelled.","PeriodicalId":142286,"journal":{"name":"2012 4th Computer Science and Electronic Engineering Conference (CEEC)","volume":"148 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124729598","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enabling z-Filter updates for self-routing denial-of-service resistant capabilities 启用z-Filter更新的自路由拒绝服务抵抗能力
Pub Date : 2012-12-06 DOI: 10.1109/CEEC.2012.6375386
B. Alzahrani, M. Reed, V. Vassilakis
Secure in-packet Bloom filters is an approach used to securely forward source routing packets with small forwarding tables making the forwarding fabric resistant to unauthorized traffic. This resistance can be achieved by dynamically computing the link identifiers on the base of the packet content such as path in-out interfaces and keys of forwarding nodes using a cryptographic function. In this paper we extend a recent work to secure the data plane (i.e. forwarding layer) in Information-Centric Networks (ICN) for long lived flows and analyze the scalability of the Topology Manager function in terms of z-Filters creation and the number of required z-Filter updates.
安全包内布隆过滤器是一种使用小转发表安全地转发源路由数据包的方法,使转发结构能够抵抗未经授权的流量。这种阻力可以通过使用加密功能动态计算基于数据包内容的链路标识符来实现,例如路径进出接口和转发节点的密钥。在本文中,我们扩展了最近的一项工作,以保护信息中心网络(ICN)中数据平面(即转发层)的长寿命流,并分析了拓扑管理器功能在z-Filter创建和所需z-Filter更新数量方面的可扩展性。
{"title":"Enabling z-Filter updates for self-routing denial-of-service resistant capabilities","authors":"B. Alzahrani, M. Reed, V. Vassilakis","doi":"10.1109/CEEC.2012.6375386","DOIUrl":"https://doi.org/10.1109/CEEC.2012.6375386","url":null,"abstract":"Secure in-packet Bloom filters is an approach used to securely forward source routing packets with small forwarding tables making the forwarding fabric resistant to unauthorized traffic. This resistance can be achieved by dynamically computing the link identifiers on the base of the packet content such as path in-out interfaces and keys of forwarding nodes using a cryptographic function. In this paper we extend a recent work to secure the data plane (i.e. forwarding layer) in Information-Centric Networks (ICN) for long lived flows and analyze the scalability of the Topology Manager function in terms of z-Filters creation and the number of required z-Filter updates.","PeriodicalId":142286,"journal":{"name":"2012 4th Computer Science and Electronic Engineering Conference (CEEC)","volume":"148 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133585478","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Attack graphs representations 攻击图表示
Pub Date : 2012-12-06 DOI: 10.1109/CEEC.2012.6375383
M. Alhomidi, M. Reed
Attack graphs have been widely used to represent and analyze security attacks. More specifically, they show all ways of how an attacker violets a security policy. Most attack graphs are constructed from nodes (vertices) and edges (arcs). Since there are so many research papers, each has a different representation of attack graphs. This paper discuses attack graph representations in terms of its nodes and edges interpretations. Other factors are addressed such the attack graph constructions and scalability.
攻击图被广泛用于表示和分析安全攻击。更具体地说,它们显示了攻击者违反安全策略的所有方式。大多数攻击图都是由节点(顶点)和边缘(弧线)构成的。由于有如此多的研究论文,每一篇都有不同的攻击图表示。本文从攻击图的节点和边的解释两方面讨论了攻击图的表示。其他因素,如攻击图的结构和可扩展性的解决。
{"title":"Attack graphs representations","authors":"M. Alhomidi, M. Reed","doi":"10.1109/CEEC.2012.6375383","DOIUrl":"https://doi.org/10.1109/CEEC.2012.6375383","url":null,"abstract":"Attack graphs have been widely used to represent and analyze security attacks. More specifically, they show all ways of how an attacker violets a security policy. Most attack graphs are constructed from nodes (vertices) and edges (arcs). Since there are so many research papers, each has a different representation of attack graphs. This paper discuses attack graph representations in terms of its nodes and edges interpretations. Other factors are addressed such the attack graph constructions and scalability.","PeriodicalId":142286,"journal":{"name":"2012 4th Computer Science and Electronic Engineering Conference (CEEC)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129090866","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Energy efficient transmission power estimation for WLAN VoIP 无线局域网VoIP的节能传输功率估计
Pub Date : 2012-12-06 DOI: 10.1109/CEEC.2012.6375398
I. Mobin, R. Mondragón, M. M. Khan
In this paper transmission signal power is optimized to increase the energy efficiency of Wireless Local Area Network (WLAN) Voice over IP (VoIP) application. We investigate how to optimize the transmission power without degrading the VoIP Quality of Service (QoS). A Transmission Power Optimization (TPO) algorithm is presented to adopt lowest possible transmission power that does not interrupt the VoIP service quality and increases energy efficiency as well. Extensive analysis is done in Network Simulator-2 (NS-2) [1] to estimate the optimal transmission power for various channel condition. According to our simulation results and analysis it is observed that the optimal transmission power increases the energy efficiency and improves the VoIP performance significantly.
为了提高无线局域网(WLAN) IP语音(VoIP)应用的能效,本文对传输信号功率进行了优化。我们研究如何在不降低VoIP服务质量(QoS)的情况下优化传输功率。提出了一种传输功率优化(TPO)算法,在不影响VoIP业务质量的前提下,采用尽可能低的传输功率,提高VoIP的能源效率。在Network Simulator-2 (NS-2)[1]中进行了广泛的分析,以估计各种信道条件下的最佳传输功率。仿真结果和分析表明,最优传输功率能显著提高网络电话的能效和性能。
{"title":"Energy efficient transmission power estimation for WLAN VoIP","authors":"I. Mobin, R. Mondragón, M. M. Khan","doi":"10.1109/CEEC.2012.6375398","DOIUrl":"https://doi.org/10.1109/CEEC.2012.6375398","url":null,"abstract":"In this paper transmission signal power is optimized to increase the energy efficiency of Wireless Local Area Network (WLAN) Voice over IP (VoIP) application. We investigate how to optimize the transmission power without degrading the VoIP Quality of Service (QoS). A Transmission Power Optimization (TPO) algorithm is presented to adopt lowest possible transmission power that does not interrupt the VoIP service quality and increases energy efficiency as well. Extensive analysis is done in Network Simulator-2 (NS-2) [1] to estimate the optimal transmission power for various channel condition. According to our simulation results and analysis it is observed that the optimal transmission power increases the energy efficiency and improves the VoIP performance significantly.","PeriodicalId":142286,"journal":{"name":"2012 4th Computer Science and Electronic Engineering Conference (CEEC)","volume":"359 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115887588","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
On the control of generic abelian group codes 关于一般阿贝尔群码的控制
Pub Date : 2012-12-06 DOI: 10.1109/CEEC.2012.6375372
J. Arpasi, S. Bortolin
Group Codes are a generalization of the well known Binary Convolutional Codes. For this reason Group Codes are also called Generalized Convolutional Codes. A classical binary convolutional encoder with rate k/n <; 1 and m memory registers can be described as a Finite State Machine (FSM) in terms of the binary groups Zk2, Zn2 and Zm2, and adequate next-state and encoder homomorphisms defined over the direct product Zk2⊕Zm2. Then the binary convolutional code is the family of bi-infinite sequences produced by the binary convolutional encoder. Since the direct product of groups U ⊕ S can be generalized as an extension U ⊗ S, then the encoder of a group code is a FSM M = (U, S, Y, ν, ω) where U is the inputs group, S is the states group, Y is the outputs group. The next-state homomorphism ν and the encoder homomorphism ω are defined over U ⊗ S. The elements of the group code produced by the FSM are bi-infinite sequences y = {yk}kϵZ with yk ϵ Y. Then, each y can be interpreted as a trajectory of a Dynamical System, hence a group code is a Dynamical System. Therefore a group code will be controllable when it is controllable as a Dynamical System. In this work we present some necessary conditions for the control of group codes produced by FSMs defined on generic abelian extensions U ⊗ S with Zp = {0, 1, ..., p - 1}, the cyclic group of order p.
群码是众所周知的二进制卷积码的一种推广。因此,群码也被称为广义卷积码。具有速率k/n k2, Zn2和Zm2的经典二进制卷积编码器,并且在Zk2⊕Zm2上定义了足够的下一态和编码器同态。那么二进制卷积码就是由二进制卷积编码器产生的双无穷数列族。由于群的直接积U⊕S可以推广为扩展U⊗S,则群码的编码器是一个FSM M = (U, S, Y, ν, ω),其中U为输入群,S为状态群,Y为输出群。在U⊗s上定义了下一态同态ν和编码器同态ω, FSM产生的群码的元素是双无穷序列y = {yk}kϵZ,其中有yk λ y,则每个y都可以解释为一个动力系统的轨迹,因此群码就是一个动力系统。因此,当一组代码作为一个动力系统是可控的时候,它就是可控的。本文给出了控制一般阿贝尔扩展U⊗S上定义的fsm产生的群码的必要条件,其中Zp ={0,1,…, p - 1}, p阶的环群。
{"title":"On the control of generic abelian group codes","authors":"J. Arpasi, S. Bortolin","doi":"10.1109/CEEC.2012.6375372","DOIUrl":"https://doi.org/10.1109/CEEC.2012.6375372","url":null,"abstract":"Group Codes are a generalization of the well known Binary Convolutional Codes. For this reason Group Codes are also called Generalized Convolutional Codes. A classical binary convolutional encoder with rate k/n <; 1 and m memory registers can be described as a Finite State Machine (FSM) in terms of the binary groups Z<sup>k</sup><sub>2</sub>, Z<sup>n</sup><sub>2</sub> and Z<sup>m</sup><sub>2</sub>, and adequate next-state and encoder homomorphisms defined over the direct product Z<sup>k</sup><sub>2</sub>⊕Z<sup>m</sup><sub>2</sub>. Then the binary convolutional code is the family of bi-infinite sequences produced by the binary convolutional encoder. Since the direct product of groups U ⊕ S can be generalized as an extension U ⊗ S, then the encoder of a group code is a FSM M = (U, S, Y, ν, ω) where U is the inputs group, S is the states group, Y is the outputs group. The next-state homomorphism ν and the encoder homomorphism ω are defined over U ⊗ S. The elements of the group code produced by the FSM are bi-infinite sequences y = {yk}kϵZ with yk ϵ Y. Then, each y can be interpreted as a trajectory of a Dynamical System, hence a group code is a Dynamical System. Therefore a group code will be controllable when it is controllable as a Dynamical System. In this work we present some necessary conditions for the control of group codes produced by FSMs defined on generic abelian extensions U ⊗ S with Z<sub>p</sub> = {0, 1, ..., p - 1}, the cyclic group of order p.","PeriodicalId":142286,"journal":{"name":"2012 4th Computer Science and Electronic Engineering Conference (CEEC)","volume":"73 5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114251466","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2012 4th Computer Science and Electronic Engineering Conference (CEEC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1