首页 > 最新文献

2016 8th IEEE International Conference on Communication Software and Networks (ICCSN)最新文献

英文 中文
A multiple target measurement retrieval algorithm based on K-N eighborhood membership degree P-PHD filtering 基于K-N邻域隶属度P-PHD滤波的多目标测量检索算法
Wang Xue, L. Yan, Tong Qian, Pu Lei
In the extraction of multiple target state by P-PHD filtering, the traditional K-Means clustering method may cause problems like extended clustering time and incorrect clustering for clusters with different sizes. To solve this problem, a new measurement extraction method based on K neighboring membership degree is proposed. In this method, the category of measurement of the target is estimated by likelihood relations between the measurement and the particle. The particle is then distributed to every actual measurement category of each estimation by K neighboring membership degree. On this basis, new particle set is formulated and target state can be extracted directly from the set. The simulation results reveal that the proposed method is with more stable retrieval precision and less time complexity.
在P-PHD滤波提取多目标状态时,传统的K-Means聚类方法对于不同大小的聚类会造成聚类时间延长、聚类错误等问题。为了解决这一问题,提出了一种基于K近邻隶属度的度量提取方法。该方法通过测量值与粒子之间的似然关系来估计目标的测量类别。然后根据K个相邻隶属度将粒子分配到每个估计的每个实际测量类别中。在此基础上,建立新的粒子集,直接从粒子集中提取目标状态。仿真结果表明,该方法具有更稳定的检索精度和更小的时间复杂度。
{"title":"A multiple target measurement retrieval algorithm based on K-N eighborhood membership degree P-PHD filtering","authors":"Wang Xue, L. Yan, Tong Qian, Pu Lei","doi":"10.1109/ICCSN.2016.7586596","DOIUrl":"https://doi.org/10.1109/ICCSN.2016.7586596","url":null,"abstract":"In the extraction of multiple target state by P-PHD filtering, the traditional K-Means clustering method may cause problems like extended clustering time and incorrect clustering for clusters with different sizes. To solve this problem, a new measurement extraction method based on K neighboring membership degree is proposed. In this method, the category of measurement of the target is estimated by likelihood relations between the measurement and the particle. The particle is then distributed to every actual measurement category of each estimation by K neighboring membership degree. On this basis, new particle set is formulated and target state can be extracted directly from the set. The simulation results reveal that the proposed method is with more stable retrieval precision and less time complexity.","PeriodicalId":158877,"journal":{"name":"2016 8th IEEE International Conference on Communication Software and Networks (ICCSN)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125156244","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A soft-output error control method for wireless video transmission 一种用于无线视频传输的软输出误差控制方法
Bo Zheng, Shaoshuai Gao
With the rapid development of wireless network and multimedia technology, the efficient transmission over unreliable channel is becoming more and more important. The error control technique for video coding and transmission has drawn considerable attention, tries to recover the data loss and bit errors due to congestion or physical channel fading. Currently, there are three kinds of error control schemes, namely, error resilient coding at the encoder, error concealment at the decoder and the retransmission in the transport layer. In this paper, an error control scheme is proposed which uses the soft information in channel decoding to recover the corrupted bit stream. When bit error is detected in a slice, soft information of channel decoding is employed to locate it, and the wrong bits are flipped and decoded again at the beginning of the slice. The combination of XOR at source and the syntax checking of H.264 decoder has increased the error detection rate from around 60% to 99% without increasing source redundancy. Simulation results show that, when the same error concealing algorithm is used, the PSNR of the proposed scheme using soft information of channel decoding at the decoder is 1-2dB higher than that using the traditional method.
随着无线网络和多媒体技术的飞速发展,在不可靠信道上的高效传输变得越来越重要。视频编码和传输中的差错控制技术是一种旨在恢复由于拥塞或物理信道衰落而造成的数据丢失和误码的技术。目前,有三种错误控制方案,即编码器的错误弹性编码、解码器的错误隐藏和传输层的重传。本文提出了一种利用信道译码中的软信息来恢复损坏比特流的错误控制方案。当在一个切片中检测到误码时,利用信道译码的软信息对其进行定位,并将错误的位翻转,在切片开始处重新译码。源的异或和H.264解码器的语法检查相结合,在不增加源冗余的情况下,将错误检测率从60%左右提高到99%。仿真结果表明,在使用相同的误差隐藏算法时,在解码器处利用信道译码软信息的方案比传统方法的PSNR提高1 ~ 2db。
{"title":"A soft-output error control method for wireless video transmission","authors":"Bo Zheng, Shaoshuai Gao","doi":"10.1109/ICCSN.2016.7586585","DOIUrl":"https://doi.org/10.1109/ICCSN.2016.7586585","url":null,"abstract":"With the rapid development of wireless network and multimedia technology, the efficient transmission over unreliable channel is becoming more and more important. The error control technique for video coding and transmission has drawn considerable attention, tries to recover the data loss and bit errors due to congestion or physical channel fading. Currently, there are three kinds of error control schemes, namely, error resilient coding at the encoder, error concealment at the decoder and the retransmission in the transport layer. In this paper, an error control scheme is proposed which uses the soft information in channel decoding to recover the corrupted bit stream. When bit error is detected in a slice, soft information of channel decoding is employed to locate it, and the wrong bits are flipped and decoded again at the beginning of the slice. The combination of XOR at source and the syntax checking of H.264 decoder has increased the error detection rate from around 60% to 99% without increasing source redundancy. Simulation results show that, when the same error concealing algorithm is used, the PSNR of the proposed scheme using soft information of channel decoding at the decoder is 1-2dB higher than that using the traditional method.","PeriodicalId":158877,"journal":{"name":"2016 8th IEEE International Conference on Communication Software and Networks (ICCSN)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133406241","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
Research on BSS in Artificial Noise aided secure communication 人工噪声辅助保密通信中的BSS研究
Li Xinxin, Cai Xiaoxia, Dong Wei
The broadcast nature of wireless channels leads to the developments and applications of physical layer security techniques. The Artificial Noise (AN) aided technique is proposed to interfere with the eavesdropper for secure communications. A suppression method called Joint Approximate Diagonalization of Eigen-matrices (JADE), which is based on blind source separation algorithm (BSS), is presented under this circumstance. The eavesdropper is able to separate the communication signal and the noise. Simulation results demonstrate that the proposed method is feasible under certain circumstances, which helps the eavesdropper to defeat the AN aided secure communications effectively.
无线信道的广播性质导致了物理层安全技术的发展和应用。提出了利用人工噪声辅助技术干扰窃听者进行保密通信的方法。针对这种情况,提出了一种基于盲源分离算法的特征矩阵联合近似对角化(JADE)抑制方法。窃听者能够分离通信信号和噪声。仿真结果表明,该方法在一定情况下是可行的,有助于窃听者有效地挫败AN辅助保密通信。
{"title":"Research on BSS in Artificial Noise aided secure communication","authors":"Li Xinxin, Cai Xiaoxia, Dong Wei","doi":"10.1109/ICCSN.2016.7586671","DOIUrl":"https://doi.org/10.1109/ICCSN.2016.7586671","url":null,"abstract":"The broadcast nature of wireless channels leads to the developments and applications of physical layer security techniques. The Artificial Noise (AN) aided technique is proposed to interfere with the eavesdropper for secure communications. A suppression method called Joint Approximate Diagonalization of Eigen-matrices (JADE), which is based on blind source separation algorithm (BSS), is presented under this circumstance. The eavesdropper is able to separate the communication signal and the noise. Simulation results demonstrate that the proposed method is feasible under certain circumstances, which helps the eavesdropper to defeat the AN aided secure communications effectively.","PeriodicalId":158877,"journal":{"name":"2016 8th IEEE International Conference on Communication Software and Networks (ICCSN)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124942388","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Effects of random errors on the radiation pattern of cylindrical array antenna 随机误差对圆柱阵列天线辐射方向图的影响
Tan Jing, Cao Aihua, Yao Nan
Random errors of conformal array antenna effectively affect the radiation pattern and reduce the antenna directivity. In this paper, the excitation phase quantization error, random excitation amplitude and phase errors, the failure of element are studied by theoretical calculation and simulation. In order to analyze the effects on random errors of conformal array antenna, pattern synthesis modal of cylindrical array antenna in the far field are proposed firstly. The mean and variance of radiation pattern under these random errors are formulated with different error probability distribution. Moreover, we evaluate direction pattern of different excitation amplitude and phase random errors on cylindrical array antenna. The maximum radiation power under different failure probability is also discussed. Results indicate that various errors will have the side lobe level increasing with the different degrees.
共形阵天线的随机误差会影响天线的辐射方向图,降低天线的指向性。本文通过理论计算和仿真研究了激励相位量化误差、随机激励幅值和相位误差、元件失效等问题。为了分析共形阵天线随机误差的影响,首先提出了圆柱阵天线远场方向图综合模态。在这些随机误差下,给出了不同误差概率分布下的辐射方向图均值和方差。此外,我们还评估了不同激励幅度和相位随机误差在圆柱阵列天线上的方向图。讨论了不同失效概率下的最大辐射功率。结果表明,各种误差都会使旁瓣电平随误差的增大而增大。
{"title":"Effects of random errors on the radiation pattern of cylindrical array antenna","authors":"Tan Jing, Cao Aihua, Yao Nan","doi":"10.1109/ICCSN.2016.7586662","DOIUrl":"https://doi.org/10.1109/ICCSN.2016.7586662","url":null,"abstract":"Random errors of conformal array antenna effectively affect the radiation pattern and reduce the antenna directivity. In this paper, the excitation phase quantization error, random excitation amplitude and phase errors, the failure of element are studied by theoretical calculation and simulation. In order to analyze the effects on random errors of conformal array antenna, pattern synthesis modal of cylindrical array antenna in the far field are proposed firstly. The mean and variance of radiation pattern under these random errors are formulated with different error probability distribution. Moreover, we evaluate direction pattern of different excitation amplitude and phase random errors on cylindrical array antenna. The maximum radiation power under different failure probability is also discussed. Results indicate that various errors will have the side lobe level increasing with the different degrees.","PeriodicalId":158877,"journal":{"name":"2016 8th IEEE International Conference on Communication Software and Networks (ICCSN)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123469672","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performance analysis of a multi-user relay selection scheme with predicted SINR in the presence of co-channel interference 多用户中继选择方案在同信道干扰下的性能分析
Cailing Qin, Kun Xiao
A novel relay selection scheme, which is easily implemented in practice, is proposed for wireless multi-user decode-and-forward (DF) relay networks in the presence of the co-channel interference. Differing from the schemes in the literatures, the proposed scheme produces a random number following a specific statistical distribution firstly, and then calculates the predicted signal to interference plus noise ratio (SINR) by adding this random number to the measured SINR. The relay node with the largest predicted SINR is selected for forwarding the data to the destination. The proposed scheme is effective in combating the outdated SINR due to the feedback of the SINR from the destination to the relay. Moreover, the performance of the proposed scheme is theoretically analyzed in terms of average bit error rate (BER) and outage probability. The Monte Carlo simulation results match the numerical results well and validate the advantages of the proposed scheme on the overall performance of multi-user DF relay system.
针对存在同信道干扰的无线多用户中继网络,提出了一种易于实现的中继选择方案。与文献方案不同的是,该方案首先产生一个符合特定统计分布的随机数,然后将该随机数与实测的信噪比相加,计算出预测的信噪比。选择预测SINR最大的中继节点将数据转发到目的地。该方案能够有效地对抗过时的信噪比,因为信噪比可以从目的地反馈到中继。此外,从平均误码率和中断概率两方面对所提方案的性能进行了理论分析。蒙特卡罗仿真结果与数值结果吻合较好,验证了该方案在多用户DF中继系统综合性能方面的优势。
{"title":"Performance analysis of a multi-user relay selection scheme with predicted SINR in the presence of co-channel interference","authors":"Cailing Qin, Kun Xiao","doi":"10.1109/ICCSN.2016.7586642","DOIUrl":"https://doi.org/10.1109/ICCSN.2016.7586642","url":null,"abstract":"A novel relay selection scheme, which is easily implemented in practice, is proposed for wireless multi-user decode-and-forward (DF) relay networks in the presence of the co-channel interference. Differing from the schemes in the literatures, the proposed scheme produces a random number following a specific statistical distribution firstly, and then calculates the predicted signal to interference plus noise ratio (SINR) by adding this random number to the measured SINR. The relay node with the largest predicted SINR is selected for forwarding the data to the destination. The proposed scheme is effective in combating the outdated SINR due to the feedback of the SINR from the destination to the relay. Moreover, the performance of the proposed scheme is theoretically analyzed in terms of average bit error rate (BER) and outage probability. The Monte Carlo simulation results match the numerical results well and validate the advantages of the proposed scheme on the overall performance of multi-user DF relay system.","PeriodicalId":158877,"journal":{"name":"2016 8th IEEE International Conference on Communication Software and Networks (ICCSN)","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126375743","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
An approach to identifying cryptographic algorithm from ciphertext 一种从密文中识别密码算法的方法
Cheng Tan, Qingbing Ji
Cryptographic algorithm plays a significant role in a cryptosystem, which protects those sensitive and private data from been obtained by some malicious attackers. Actually, the details about the cryptographic algorithm applied in a cryptosystem are often unknown to one cryptanalyst. When a cryptanalyst works on cryptanalysis, he will have much trouble if he doesn't know anything about the used cryptographic algorithm. In this paper, we introduce an approach to identifying the cryptographic algorithm with no other information but ciphertext. Firstly, we present the whole implementation architecture of our identification system. Then we apply our identification system in identifying 5 common block ciphers, namely AES, Blowfish, 3DES, RC5 and DES. Through analyzing the experiment results, we conclude that the identification rate can obtain around 90% if keys are the same for training and testing ciphertexts. When we use different keys for training and testing ciphertexts, we can still identify AES from anyone of the other 4 cryptographic algorithms with a high identification rate in one to one identification.
密码算法在密码系统中起着重要的作用,它保护敏感和私有数据不被恶意攻击者获取。实际上,在密码系统中应用的密码算法的细节通常是一个密码分析人员所不知道的。当密码分析人员从事密码分析时,如果他对使用的密码算法一无所知,他将会遇到很多麻烦。在本文中,我们介绍了一种除了密文之外没有其他信息的加密算法的识别方法。首先,我们给出了我们的识别系统的整体实现架构。然后将我们的识别系统应用于AES、Blowfish、3DES、RC5和DES这5种常见的分组密码的识别,通过对实验结果的分析,我们得出在训练和测试密文的密钥相同的情况下,识别率可以达到90%左右。当我们使用不同的密钥来训练和测试密文时,我们仍然可以从其他4种加密算法中识别出AES,并且在一对一识别中具有很高的识别率。
{"title":"An approach to identifying cryptographic algorithm from ciphertext","authors":"Cheng Tan, Qingbing Ji","doi":"10.1109/ICCSN.2016.7586649","DOIUrl":"https://doi.org/10.1109/ICCSN.2016.7586649","url":null,"abstract":"Cryptographic algorithm plays a significant role in a cryptosystem, which protects those sensitive and private data from been obtained by some malicious attackers. Actually, the details about the cryptographic algorithm applied in a cryptosystem are often unknown to one cryptanalyst. When a cryptanalyst works on cryptanalysis, he will have much trouble if he doesn't know anything about the used cryptographic algorithm. In this paper, we introduce an approach to identifying the cryptographic algorithm with no other information but ciphertext. Firstly, we present the whole implementation architecture of our identification system. Then we apply our identification system in identifying 5 common block ciphers, namely AES, Blowfish, 3DES, RC5 and DES. Through analyzing the experiment results, we conclude that the identification rate can obtain around 90% if keys are the same for training and testing ciphertexts. When we use different keys for training and testing ciphertexts, we can still identify AES from anyone of the other 4 cryptographic algorithms with a high identification rate in one to one identification.","PeriodicalId":158877,"journal":{"name":"2016 8th IEEE International Conference on Communication Software and Networks (ICCSN)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127654573","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Cross-layer power allocation scheme for two-way amplify-and-forward relaying system 双向放大转发继电系统的跨层功率分配方案
Q. Yuan, Yanjun Hu, Hui Zhi, Mengmeng He
Two-way relaying can considerably improve spectral efficiency in relay-assisted bidirectional communication. However, most existing works focus on physical layer to exploit its resource optimizes. The benefits and flexible structures of two-way relaying on datalink layer are much less investigated. So in this paper, the cross-layer optimization for amplify-and-forward (AF) two-way relaying system is studied and an optimal power allocation scheme is proposed. Our goal is to find the optimal power allocation factors to maximize the weighted sum effective capacity of two sources in the physical layer while guaranteeing the statistical delay quality-of-service (QoS) requirement for each source in the datalink layer. This statistical delay QoS requirement is characterized by the QoS exponent θ, which is the only requested information exchanged between the physical layer and the datalink layer in our cross-layer design based scheme. By integrating the concept of effective capacity, the cross-layer optimization problem is equivalent to a weighted sum effective capacity maximization problem. This problem is formulated into a convex optimization problem, and an algorithm is presented to solve this problem. Simulation results show that proposed optimal power allocation scheme can achieve better weighted sum effective capacity than equal power allocation scheme and direct transmission scheme, and the relay transmission combined with direct links can get the max weighted sum effective capacity.
在中继辅助双向通信中,双向中继可以显著提高频谱利用率。然而,现有的工作大多集中在物理层,以开发其资源的优化。对数据链路层双向中继的优点和灵活结构的研究很少。为此,本文对放大转发(AF)双向继电系统的跨层优化问题进行了研究,提出了一种最优功率分配方案。我们的目标是找到最优的功率分配因子,以最大化物理层两个源的加权和有效容量,同时保证数据链路层每个源的统计延迟服务质量(QoS)要求。这种统计延迟QoS需求的特征是QoS指数θ,这是我们基于跨层设计的方案中物理层和数据链路层之间交换的唯一请求信息。通过整合有效容量的概念,将跨层优化问题等效为一个加权和有效容量最大化问题。将该问题转化为一个凸优化问题,并给出了求解该问题的算法。仿真结果表明,所提出的最优功率分配方案能获得比等功率分配方案和直传方案更好的加权和有效容量,且直连中继传输能获得最大的加权和有效容量。
{"title":"Cross-layer power allocation scheme for two-way amplify-and-forward relaying system","authors":"Q. Yuan, Yanjun Hu, Hui Zhi, Mengmeng He","doi":"10.1109/ICCSN.2016.7586687","DOIUrl":"https://doi.org/10.1109/ICCSN.2016.7586687","url":null,"abstract":"Two-way relaying can considerably improve spectral efficiency in relay-assisted bidirectional communication. However, most existing works focus on physical layer to exploit its resource optimizes. The benefits and flexible structures of two-way relaying on datalink layer are much less investigated. So in this paper, the cross-layer optimization for amplify-and-forward (AF) two-way relaying system is studied and an optimal power allocation scheme is proposed. Our goal is to find the optimal power allocation factors to maximize the weighted sum effective capacity of two sources in the physical layer while guaranteeing the statistical delay quality-of-service (QoS) requirement for each source in the datalink layer. This statistical delay QoS requirement is characterized by the QoS exponent θ, which is the only requested information exchanged between the physical layer and the datalink layer in our cross-layer design based scheme. By integrating the concept of effective capacity, the cross-layer optimization problem is equivalent to a weighted sum effective capacity maximization problem. This problem is formulated into a convex optimization problem, and an algorithm is presented to solve this problem. Simulation results show that proposed optimal power allocation scheme can achieve better weighted sum effective capacity than equal power allocation scheme and direct transmission scheme, and the relay transmission combined with direct links can get the max weighted sum effective capacity.","PeriodicalId":158877,"journal":{"name":"2016 8th IEEE International Conference on Communication Software and Networks (ICCSN)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129026323","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A novel tree-based routing protocol in ZigBee wireless networks ZigBee无线网络中一种新的基于树的路由协议
Yang Liu, Keyuan Qian
In ZigBee networks, ZigBee Tree Routing (ZTR) is the simplest routing protocol with low overhead in which only parent-child links shall be used for packet transfer. However, there exist hop redundancy and traffic concentration in ZTR due to the limitation of tree topology. In this paper, we propose a novel tree-based routing algorithm, which is called Improved Shortcut Tree Routing (ISTR), to decrease hop count and ease congestion in ZigBee networks by using the enhanced beacon frames and extended neighbor tables. ISTR suggests forwarding the packet to the appropriate neighbor node if it can ease network congestion and reduce the routing cost to the destination. The simulation results show that ISTR significantly improves the packet delivery ratio and reduces 20%~30% of the end-to-end delay compared to ZTR.
在ZigBee网络中,ZigBee树路由(ZTR)是最简单的路由协议,开销低,数据包传输只使用父子链路。然而,由于树型拓扑结构的限制,ZTR中存在跳数冗余和流量集中的问题。在本文中,我们提出了一种新的基于树的路由算法,称为改进的快捷树路由(ISTR),通过使用增强的信标帧和扩展的邻居表来减少跳数和缓解ZigBee网络中的拥塞。如果能够缓解网络拥塞,减少到达目的地的路由开销,ISTR建议将报文转发到合适的邻居节点。仿真结果表明,与ZTR相比,ISTR显著提高了分组传输率,降低了20%~30%的端到端延迟。
{"title":"A novel tree-based routing protocol in ZigBee wireless networks","authors":"Yang Liu, Keyuan Qian","doi":"10.1109/ICCSN.2016.7587203","DOIUrl":"https://doi.org/10.1109/ICCSN.2016.7587203","url":null,"abstract":"In ZigBee networks, ZigBee Tree Routing (ZTR) is the simplest routing protocol with low overhead in which only parent-child links shall be used for packet transfer. However, there exist hop redundancy and traffic concentration in ZTR due to the limitation of tree topology. In this paper, we propose a novel tree-based routing algorithm, which is called Improved Shortcut Tree Routing (ISTR), to decrease hop count and ease congestion in ZigBee networks by using the enhanced beacon frames and extended neighbor tables. ISTR suggests forwarding the packet to the appropriate neighbor node if it can ease network congestion and reduce the routing cost to the destination. The simulation results show that ISTR significantly improves the packet delivery ratio and reduces 20%~30% of the end-to-end delay compared to ZTR.","PeriodicalId":158877,"journal":{"name":"2016 8th IEEE International Conference on Communication Software and Networks (ICCSN)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130703294","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Dual Hop Differential Amplify-and-Forward relaying with selection combining cooperative diversity over Nakagami-m fading channels 在Nakagami-m衰落信道上选择结合合作分集的双跳差分放大转发中继
M. M. Harb, M. Al-Mistarihi
In this paper, the performance of the Dual Hop relaying systems is studied and analyzed. Differential Amplify-and-Forward is the used relaying scheme. Post-Detection Selection combining reception technique was proposed to achieve the cooperative diversity where No explicit channel estimation is needed. Instead, the receiver uses the previous received sample in each branch as the estimate of the current fading gain in that branch. The exact outage probability of the system over additive white Gaussian noise and Nakagami-m fading channels is derived assume independent fading in the channels. Simulation results are plotted for different fading parameters.
本文对双跳中继系统的性能进行了研究和分析。差分放大和转发是使用的继电器方案。为了实现不需要显式信道估计的合作分集,提出了检测后选择结合接收技术。相反,接收器使用每个支路中先前接收的样本作为该支路中当前衰落增益的估计。在假定信道独立衰落的情况下,导出了系统在加性高斯白噪声和Nakagami-m衰落信道上的准确中断概率。绘制了不同衰落参数下的仿真结果。
{"title":"Dual Hop Differential Amplify-and-Forward relaying with selection combining cooperative diversity over Nakagami-m fading channels","authors":"M. M. Harb, M. Al-Mistarihi","doi":"10.1109/ICCSN.2016.7586654","DOIUrl":"https://doi.org/10.1109/ICCSN.2016.7586654","url":null,"abstract":"In this paper, the performance of the Dual Hop relaying systems is studied and analyzed. Differential Amplify-and-Forward is the used relaying scheme. Post-Detection Selection combining reception technique was proposed to achieve the cooperative diversity where No explicit channel estimation is needed. Instead, the receiver uses the previous received sample in each branch as the estimate of the current fading gain in that branch. The exact outage probability of the system over additive white Gaussian noise and Nakagami-m fading channels is derived assume independent fading in the channels. Simulation results are plotted for different fading parameters.","PeriodicalId":158877,"journal":{"name":"2016 8th IEEE International Conference on Communication Software and Networks (ICCSN)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128101146","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
The encode and decode theory of polar code and its performance simulating 极性码的编解码原理及其性能仿真
Xiaoting Du, Xianfan Xu
Based on the channel combination and split, the binary discrete channel will come up a channel polarization phenomenon, when the number of combined channels tends to infinity, part of the channels will become ideal channel without any noise and another part of the channels will became pure noisy channel. The polarization code is a kind of channel coding method based on channel polarization, which can reach Shannon limit in theory. The paper introduced the process of channel polarization, the generations of the generator matrix and the encode method of polar code; besides, it explain a decoding method called succession cancellation, according to any given a GN-cosset code, the estimated received-code can be solved out by calculating each level's LR. Finally, it simulated the channel capacity of polar code under binary erasure channel with MATLAB, as well, it simulated and analyzed d the influence of coding rate for the performance of polar code.
基于信道组合和分裂,二元离散信道会出现信道极化现象,当组合信道数量趋于无穷大时,一部分信道将成为无噪声的理想信道,另一部分信道将成为纯噪声信道。极化码是一种基于信道极化的信道编码方法,理论上可以达到香农极限。介绍了信道极化的过程、发生器矩阵的生成以及极化码的编码方法;此外,还解释了一种译码方法,称为连续抵消,根据任意给定的gn - coset码,通过计算每一级的LR来求解估计的接收码。最后,利用MATLAB仿真了二进制擦除信道下极性码的信道容量,并仿真分析了编码速率对极性码性能的影响。
{"title":"The encode and decode theory of polar code and its performance simulating","authors":"Xiaoting Du, Xianfan Xu","doi":"10.1109/ICCSN.2016.7586660","DOIUrl":"https://doi.org/10.1109/ICCSN.2016.7586660","url":null,"abstract":"Based on the channel combination and split, the binary discrete channel will come up a channel polarization phenomenon, when the number of combined channels tends to infinity, part of the channels will become ideal channel without any noise and another part of the channels will became pure noisy channel. The polarization code is a kind of channel coding method based on channel polarization, which can reach Shannon limit in theory. The paper introduced the process of channel polarization, the generations of the generator matrix and the encode method of polar code; besides, it explain a decoding method called succession cancellation, according to any given a GN-cosset code, the estimated received-code can be solved out by calculating each level's LR. Finally, it simulated the channel capacity of polar code under binary erasure channel with MATLAB, as well, it simulated and analyzed d the influence of coding rate for the performance of polar code.","PeriodicalId":158877,"journal":{"name":"2016 8th IEEE International Conference on Communication Software and Networks (ICCSN)","volume":"1 1-2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131957762","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
期刊
2016 8th IEEE International Conference on Communication Software and Networks (ICCSN)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1