首页 > 最新文献

2016 8th IEEE International Conference on Communication Software and Networks (ICCSN)最新文献

英文 中文
The invulnerability of robust communication network 健壮通信网络的不受攻击性
Wen Changjun, Zhang Xiaomeng
Due to the fully connected network with the best invulnerability, and the shortest path number between a node for network invulnerability is important. Based on the fully connected network, the shortest path number for evaluation index, the robust communication network invulnerability of the model is established. A new method of calculation of the shortest path is put forward by using MATLAB in this paper. Calculating the examples, the network of the invulnerability can be concluded. The more symmetrical the robust communication network topology is, the higher the invulnerability is.
由于完全连接的网络具有最佳的不受攻击性,而节点之间的最短路径数对于网络的不受攻击性很重要。以全连通网络为评价指标,以最短路径数为评价指标,建立了鲁棒通信网络抗毁性模型。本文利用MATLAB提出了一种新的最短路径计算方法。通过算例的计算,可以得出不受伤害的网络。鲁棒性通信网络拓扑结构越对称,其抗毁性越高。
{"title":"The invulnerability of robust communication network","authors":"Wen Changjun, Zhang Xiaomeng","doi":"10.1109/ICCSN.2016.7586675","DOIUrl":"https://doi.org/10.1109/ICCSN.2016.7586675","url":null,"abstract":"Due to the fully connected network with the best invulnerability, and the shortest path number between a node for network invulnerability is important. Based on the fully connected network, the shortest path number for evaluation index, the robust communication network invulnerability of the model is established. A new method of calculation of the shortest path is put forward by using MATLAB in this paper. Calculating the examples, the network of the invulnerability can be concluded. The more symmetrical the robust communication network topology is, the higher the invulnerability is.","PeriodicalId":158877,"journal":{"name":"2016 8th IEEE International Conference on Communication Software and Networks (ICCSN)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123999169","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Fault-tolerant routing method of NoC system based on clustering 基于聚类的NoC系统容错路由方法
Jiang Minzheng, Zhu Yun-zhong, Fu Fangfa
Along with the development of semiconductor's channel length that narrows toward the deep submicron and even nanometer, the design of SoC has become increasingly complex. Therefore, how to achieve fault tolerance, aiming to avoid the impact process issues and improve reliability of system, has become the focus of the NoC design. This paper presents a fault tolerance routing method on NoC system that can perfectly solve the problems above. Targeted low latency, this method based on the existing deterministic algorithms as well as adaptive algorithms and introduces a router clustering technology which supports task based mapping and feedback. The NIRGAM simulator is utilized to achieve performance evaluation. Experiments show that the proposed method has already achieved the goal that applications keep running on the system without the effect of unexpected faults in the NoC. Besides, the performance of system does not decrease dramatically with the number of faults increasing on the chip.
随着半导体的通道长度向深亚微米甚至纳米方向发展,SoC的设计变得越来越复杂。因此,如何实现容错,以避免影响过程的问题,提高系统的可靠性,成为NoC设计的重点。本文提出了一种基于NoC系统的容错路由方法,可以很好地解决上述问题。该方法以低时延为目标,在现有确定性算法和自适应算法的基础上,引入了一种支持基于任务的映射和反馈的路由器聚类技术。利用NIRGAM模拟器实现性能评估。实验表明,该方法已经达到了应用程序在系统上持续运行的目的,并且不受NoC中意外故障的影响。此外,系统的性能不会随着芯片上故障数量的增加而急剧下降。
{"title":"Fault-tolerant routing method of NoC system based on clustering","authors":"Jiang Minzheng, Zhu Yun-zhong, Fu Fangfa","doi":"10.1109/ICCSN.2016.7586582","DOIUrl":"https://doi.org/10.1109/ICCSN.2016.7586582","url":null,"abstract":"Along with the development of semiconductor's channel length that narrows toward the deep submicron and even nanometer, the design of SoC has become increasingly complex. Therefore, how to achieve fault tolerance, aiming to avoid the impact process issues and improve reliability of system, has become the focus of the NoC design. This paper presents a fault tolerance routing method on NoC system that can perfectly solve the problems above. Targeted low latency, this method based on the existing deterministic algorithms as well as adaptive algorithms and introduces a router clustering technology which supports task based mapping and feedback. The NIRGAM simulator is utilized to achieve performance evaluation. Experiments show that the proposed method has already achieved the goal that applications keep running on the system without the effect of unexpected faults in the NoC. Besides, the performance of system does not decrease dramatically with the number of faults increasing on the chip.","PeriodicalId":158877,"journal":{"name":"2016 8th IEEE International Conference on Communication Software and Networks (ICCSN)","volume":"105 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115764079","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Differential power analysis attack and efficient countermeasures on PRESENT 差分功率分析攻击与PRESENT有效对抗
Xiaoyi Duan, Qi Cui, Sixiang Wang, Huawei Fang, Gaojian She
PRESENT is an ultra-lightweight symmetric cryptographic algorithm designed to adapt to the resource constrained computing scenarios, and it was put forward in 2007. With the continuous development of Internet of things (IoT), the application of this kind algorithm becomes increasingly popular, so the implementation security of the algorithm has correspondingly become an imperative research area. Based on the theory of side channel attack, this paper has investigated the Differential Power Analysis (DPA) technique, and taking the PRESENT algorithm as the target, it verified the feasibility of breaking the PRESENT algorithm. The test results indication that the PRESENT algorithm is vulnerable to power consumption attack under the current hardware environment. Also, to resist these attacks, this paper proposes a fixed-value mask algorithm for PRESENT.
PRESENT是一种超轻量级对称密码算法,设计用于适应资源受限的计算场景,于2007年提出。随着物联网(IoT)的不断发展,这类算法的应用日益普及,因此算法的实现安全性也相应地成为一个迫切的研究领域。基于侧信道攻击理论,对差分功率分析(DPA)技术进行了研究,并以PRESENT算法为目标,验证了破解PRESENT算法的可行性。测试结果表明,在当前硬件环境下,PRESENT算法容易受到功耗攻击。为了抵抗这些攻击,本文提出了一种固定值掩码算法。
{"title":"Differential power analysis attack and efficient countermeasures on PRESENT","authors":"Xiaoyi Duan, Qi Cui, Sixiang Wang, Huawei Fang, Gaojian She","doi":"10.1109/ICCSN.2016.7586627","DOIUrl":"https://doi.org/10.1109/ICCSN.2016.7586627","url":null,"abstract":"PRESENT is an ultra-lightweight symmetric cryptographic algorithm designed to adapt to the resource constrained computing scenarios, and it was put forward in 2007. With the continuous development of Internet of things (IoT), the application of this kind algorithm becomes increasingly popular, so the implementation security of the algorithm has correspondingly become an imperative research area. Based on the theory of side channel attack, this paper has investigated the Differential Power Analysis (DPA) technique, and taking the PRESENT algorithm as the target, it verified the feasibility of breaking the PRESENT algorithm. The test results indication that the PRESENT algorithm is vulnerable to power consumption attack under the current hardware environment. Also, to resist these attacks, this paper proposes a fixed-value mask algorithm for PRESENT.","PeriodicalId":158877,"journal":{"name":"2016 8th IEEE International Conference on Communication Software and Networks (ICCSN)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116974790","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
A framework of automatic brain tumor segmentation method based on information fusion of structural and functional MRI signals 一种基于结构与功能MRI信号信息融合的脑肿瘤自动分割方法框架
Xiaojie Zhang, W. Dou, Mingyu Zhang, Hongyan Chen
The brain tumor segmentation method of MRI images is of key importance for clinical analysis of glioma. The majority of existing methods are focused on structural MRI such as T1-weighted and T2-weighted. Additionally, functional MRI including Magnetic Resonance Spectroscopy (MRS), Diffusion Weighted Imaging (DWI), and Blood-Oxygen-Level Dependent (BOLD) can also contribute to increasing the validity and accuracy of the results. This paper proposes a framework of automatic brain tumor segmentation method based on information fusion of structural and functional signals. The method consists of four steps: intensity mapping for feature, region growing for tumor, region growing for edema and necrosis detection. The performance evaluation has been done by using some clinical MRI data with glioma. Comparing the segmentation results with the manual segmentation as “ground truth”, it has achieved average Dice score 83.7% in the tumor, and 88.5% in the whole lesion area, which indicated the validity and robustness of the proposed method.
MRI图像的脑肿瘤分割方法对胶质瘤的临床分析具有重要意义。现有的方法大多集中在结构MRI上,如t1加权和t2加权。此外,功能性MRI包括磁共振波谱(MRS)、弥散加权成像(DWI)和血氧水平依赖(BOLD)也有助于提高结果的有效性和准确性。提出了一种基于结构信号和功能信号信息融合的脑肿瘤自动分割方法框架。该方法包括四个步骤:特征的强度映射、肿瘤的区域生长、水肿坏死检测的区域生长。利用胶质瘤的一些临床MRI数据对其性能进行了评价。将分割结果与人工分割作为“ground truth”进行比较,该方法在肿瘤区域的平均Dice得分为83.7%,在整个病变区域的平均Dice得分为88.5%,表明了该方法的有效性和鲁棒性。
{"title":"A framework of automatic brain tumor segmentation method based on information fusion of structural and functional MRI signals","authors":"Xiaojie Zhang, W. Dou, Mingyu Zhang, Hongyan Chen","doi":"10.1109/ICCSN.2016.7586598","DOIUrl":"https://doi.org/10.1109/ICCSN.2016.7586598","url":null,"abstract":"The brain tumor segmentation method of MRI images is of key importance for clinical analysis of glioma. The majority of existing methods are focused on structural MRI such as T1-weighted and T2-weighted. Additionally, functional MRI including Magnetic Resonance Spectroscopy (MRS), Diffusion Weighted Imaging (DWI), and Blood-Oxygen-Level Dependent (BOLD) can also contribute to increasing the validity and accuracy of the results. This paper proposes a framework of automatic brain tumor segmentation method based on information fusion of structural and functional signals. The method consists of four steps: intensity mapping for feature, region growing for tumor, region growing for edema and necrosis detection. The performance evaluation has been done by using some clinical MRI data with glioma. Comparing the segmentation results with the manual segmentation as “ground truth”, it has achieved average Dice score 83.7% in the tumor, and 88.5% in the whole lesion area, which indicated the validity and robustness of the proposed method.","PeriodicalId":158877,"journal":{"name":"2016 8th IEEE International Conference on Communication Software and Networks (ICCSN)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125251630","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Analysis and design of hybrid network for distribution automation system in China 中国配电自动化系统混合网络的分析与设计
Qingrui Guo, Xu Wang, Yaping Li, Zhijun Zhang, Peng Xie
Communication is an essential part of Distribution Automation System (DAS), without it, the data collection and transmission will not achieve. This paper first analyzes the advantages and disadvantages of various communication technologies, Ethernet Passive Optical Network (EPON) and Time Division Long Term Evolution (TD-LTE) technologies are selected to meet the requirements of DAS. Then, the principles of EPON and the spectrum selection of TD-LTE are discussed; and based on EPON and TD-LTE, a hybrid network for DAS is designed. At last, a trail network was built in Xinjiang province; the test results show that the hybrid network can meet the requirements of DAS in different scenarios.
通信是配电自动化系统的重要组成部分,没有通信,数据的采集和传输就无法实现。本文首先分析了各种通信技术的优缺点,选择了以太网无源光网络(EPON)和时分长期演进(TD-LTE)技术来满足DAS的要求。然后,讨论了EPON的原理和TD-LTE的频谱选择;设计了基于EPON和TD-LTE的DAS混合网络。最后,在新疆省建立了旅游线路网络;测试结果表明,该混合网络可以满足不同场景下的DAS需求。
{"title":"Analysis and design of hybrid network for distribution automation system in China","authors":"Qingrui Guo, Xu Wang, Yaping Li, Zhijun Zhang, Peng Xie","doi":"10.1109/ICCSN.2016.7586679","DOIUrl":"https://doi.org/10.1109/ICCSN.2016.7586679","url":null,"abstract":"Communication is an essential part of Distribution Automation System (DAS), without it, the data collection and transmission will not achieve. This paper first analyzes the advantages and disadvantages of various communication technologies, Ethernet Passive Optical Network (EPON) and Time Division Long Term Evolution (TD-LTE) technologies are selected to meet the requirements of DAS. Then, the principles of EPON and the spectrum selection of TD-LTE are discussed; and based on EPON and TD-LTE, a hybrid network for DAS is designed. At last, a trail network was built in Xinjiang province; the test results show that the hybrid network can meet the requirements of DAS in different scenarios.","PeriodicalId":158877,"journal":{"name":"2016 8th IEEE International Conference on Communication Software and Networks (ICCSN)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121823637","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Comparison deep learning method to traditional methods using for network intrusion detection 将深度学习方法与传统的网络入侵检测方法进行比较
Bo Dong, Xue Wang
Recently, deep learning has gained prominence due to the potential it portends for machine learning. For this reason, deep learning techniques have been applied in many fields, such as recognizing some kinds of patterns or classification. Intrusion detection analyses got data from monitoring security events to get situation assessment of network. Lots of traditional machine learning method has been put forward to intrusion detection, but it is necessary to improvement the detection performance and accuracy. This paper discusses different methods which were used to classify network traffic. We decided to use different methods on open data set and did experiment with these methods to find out a best way to intrusion detection.
最近,深度学习因其预示着机器学习的潜力而备受关注。因此,深度学习技术已经应用于许多领域,例如识别某些类型的模式或分类。入侵检测分析从监控安全事件中获取数据,从而对网络进行态势评估。传统的机器学习方法已经被用于入侵检测,但对于提高检测的性能和准确性是必要的。本文讨论了用于网络流量分类的不同方法。我们决定在开放数据集上使用不同的方法,并对这些方法进行了实验,以找出一种最佳的入侵检测方法。
{"title":"Comparison deep learning method to traditional methods using for network intrusion detection","authors":"Bo Dong, Xue Wang","doi":"10.1109/ICCSN.2016.7586590","DOIUrl":"https://doi.org/10.1109/ICCSN.2016.7586590","url":null,"abstract":"Recently, deep learning has gained prominence due to the potential it portends for machine learning. For this reason, deep learning techniques have been applied in many fields, such as recognizing some kinds of patterns or classification. Intrusion detection analyses got data from monitoring security events to get situation assessment of network. Lots of traditional machine learning method has been put forward to intrusion detection, but it is necessary to improvement the detection performance and accuracy. This paper discusses different methods which were used to classify network traffic. We decided to use different methods on open data set and did experiment with these methods to find out a best way to intrusion detection.","PeriodicalId":158877,"journal":{"name":"2016 8th IEEE International Conference on Communication Software and Networks (ICCSN)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115433159","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 182
Spectrum and energy efficiency analysis of ultra dense network with sleep 带睡眠的超密集网络频谱及能量效率分析
Ce Zheng, Jiancun Fan, Xinmin Luo
Recently, Ultra Dense Network (UDN) emerges as one of the state-of-the-art technologies to cope with the pressure of the ever-growing traffic demands in wireless communication. By deploying dense Base Stations (BSs) to provide ubiquitous coverage and high-speed transmission, it is considered as one of the most promising paradigms. However, large numbers of BSs bring the rise of the energy consumption of circuit and other costs for maintenance. Therefore, along with spectrum efficiency, the energy efficiency also becomes a major concern in UDN. In this paper, we analyze the UDN performance on both network Spectrum Efficiency (SE) and network Energy Efficiency (EE) with sleep mode. We first offer an alternative analytical expression of the average achievable rate. Then we modified the existing stochastic model where BSs and users are modeled as the Poisson Point process (PPP). Unlike the previous work, we introduce the active BSs density and show its relationship with densities of BSs and users. After that, we analytically derive the expression of the network SE and EE, and analyze the network performance through numerical simulations. We further do practical simulations to prove the validity of our analysis. In the end, we draw the conclusions that tradeoff needs to be made since different network performance metrics cannot be optimal at the same time.
近年来,超密集网络(UDN)成为应对无线通信日益增长的流量需求的最新技术之一。通过部署密集的基站(BSs)来提供无处不在的覆盖和高速传输,它被认为是最有前途的范例之一。然而,大量的BSs带来了电路能耗和其他维护成本的上升。因此,随着频谱效率的提高,能源效率也成为UDN的主要关注点。本文从网络频谱效率(SE)和网络能量效率(EE)两个方面分析了UDN在睡眠模式下的性能。我们首先提供了平均可达到速率的另一种解析表达式。然后,我们对现有的随机模型进行了改进,其中将BSs和用户建模为泊松点过程(PPP)。与之前的工作不同,我们引入了活跃的bbs密度,并展示了它与bbs密度和用户密度的关系。在此基础上,解析推导了网络SE和EE的表达式,并通过数值模拟分析了网络的性能。我们进一步做了实际的仿真来证明我们分析的有效性。最后,我们得出结论,需要进行权衡,因为不同的网络性能指标不可能同时达到最优。
{"title":"Spectrum and energy efficiency analysis of ultra dense network with sleep","authors":"Ce Zheng, Jiancun Fan, Xinmin Luo","doi":"10.1109/ICCSN.2016.7586689","DOIUrl":"https://doi.org/10.1109/ICCSN.2016.7586689","url":null,"abstract":"Recently, Ultra Dense Network (UDN) emerges as one of the state-of-the-art technologies to cope with the pressure of the ever-growing traffic demands in wireless communication. By deploying dense Base Stations (BSs) to provide ubiquitous coverage and high-speed transmission, it is considered as one of the most promising paradigms. However, large numbers of BSs bring the rise of the energy consumption of circuit and other costs for maintenance. Therefore, along with spectrum efficiency, the energy efficiency also becomes a major concern in UDN. In this paper, we analyze the UDN performance on both network Spectrum Efficiency (SE) and network Energy Efficiency (EE) with sleep mode. We first offer an alternative analytical expression of the average achievable rate. Then we modified the existing stochastic model where BSs and users are modeled as the Poisson Point process (PPP). Unlike the previous work, we introduce the active BSs density and show its relationship with densities of BSs and users. After that, we analytically derive the expression of the network SE and EE, and analyze the network performance through numerical simulations. We further do practical simulations to prove the validity of our analysis. In the end, we draw the conclusions that tradeoff needs to be made since different network performance metrics cannot be optimal at the same time.","PeriodicalId":158877,"journal":{"name":"2016 8th IEEE International Conference on Communication Software and Networks (ICCSN)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130307451","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Implementation and measurement of single user MIMO testbed for TD-LTE-A downlink channels TD-LTE-A下行信道单用户MIMO试验台的实现与测量
S. Aghaeinezhadfirouzja, Hui Liu, Bin Xia, M. Tao
This paper, design and utilize the implementation of 8 × 2 outdoor single-user multiple-input, multiple-output (SU-MIMO) systems for time division duplex LTE-A channels at 2.680 GHz to 2.690 GHz. With this purpose, there is a need for accurate and actual radio propagation model at these bands where around the Shanghai Jiao Tong University (SJTU) campus network. In that SU-MIMO testbed, both the transmitter and the receiver communications are made by employing eight (four pairs of cross polarization) antennas in the transmitter side and 2 at the receiver for real time network. Measurements show the experimental characteristics of the future Physical Downlink Control Channel (PDCCH) and Physical Downlink Shared Channel (PDSCH), sensitive to absolute power levels that may not be enough to support a large number of UEs in a cell. We also show the weakness of the current cellular network that is to reach an accurate synchronization such as Coarse Timing Synchronization (CTS) between the receive symbols. This CTS defect can lead to the severe performance degradation and issue for MIMO wireless systems.
本文设计并实现了2.680 GHz ~ 2.690 GHz时分双工LTE-A信道的8 × 2室外单用户多输入多输出(SU-MIMO)系统。为此,需要在上海交通大学校园网周围的这些频段建立准确、真实的无线电传播模型。在该SU-MIMO试验台中,发送端和接收端通信采用8根(4对交叉极化)天线在发送端,接收端采用2根天线进行实时网络通信。测量显示了未来物理下行链路控制通道(PDCCH)和物理下行链路共享通道(PDSCH)的实验特性,对绝对功率水平敏感,可能不足以支持小区中的大量ue。我们还展示了当前蜂窝网络的弱点,即在接收符号之间达到精确同步,例如粗定时同步(CTS)。这种CTS缺陷会导致MIMO无线系统的严重性能下降和问题。
{"title":"Implementation and measurement of single user MIMO testbed for TD-LTE-A downlink channels","authors":"S. Aghaeinezhadfirouzja, Hui Liu, Bin Xia, M. Tao","doi":"10.1109/ICCSN.2016.7586651","DOIUrl":"https://doi.org/10.1109/ICCSN.2016.7586651","url":null,"abstract":"This paper, design and utilize the implementation of 8 × 2 outdoor single-user multiple-input, multiple-output (SU-MIMO) systems for time division duplex LTE-A channels at 2.680 GHz to 2.690 GHz. With this purpose, there is a need for accurate and actual radio propagation model at these bands where around the Shanghai Jiao Tong University (SJTU) campus network. In that SU-MIMO testbed, both the transmitter and the receiver communications are made by employing eight (four pairs of cross polarization) antennas in the transmitter side and 2 at the receiver for real time network. Measurements show the experimental characteristics of the future Physical Downlink Control Channel (PDCCH) and Physical Downlink Shared Channel (PDSCH), sensitive to absolute power levels that may not be enough to support a large number of UEs in a cell. We also show the weakness of the current cellular network that is to reach an accurate synchronization such as Coarse Timing Synchronization (CTS) between the receive symbols. This CTS defect can lead to the severe performance degradation and issue for MIMO wireless systems.","PeriodicalId":158877,"journal":{"name":"2016 8th IEEE International Conference on Communication Software and Networks (ICCSN)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116496423","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Spectrum allocation of cognitive radio network based on optimized genetic algorithm in underlay network 基于优化遗传算法的认知无线网络底层频谱分配
Rixing Huang, Jie Chang, Yi Ren, Feng He, Chun Guan
By analyzing physical connection of cognitive radio network, underlay color-sensitive graph coloring (UCSGC) model which is used in underlay spectrum allocation is proposed here. After analyzing, color-sensitive graph coloring (CSGC) is a special UCSGC. Under the model, this paper gives an Optimized Genetic Algorithm (OGA) to maximize the benefits of the network. The algorithm not only is convergent, but can avoid the remaining local optima by randomly adding the individuals. Finally, the proposed method was demonstrated by the experimental results.
通过对认知无线网络物理连接的分析,提出了用于底层频谱分配的底层颜色敏感图着色(UCSGC)模型。经分析,色敏图着色(CSGC)是一种特殊的UCSGC。在此模型下,提出了一种优化遗传算法(OGA),使网络的效益最大化。该算法不仅具有收敛性,而且可以通过随机添加个体来避免剩余的局部最优。最后,通过实验验证了该方法的有效性。
{"title":"Spectrum allocation of cognitive radio network based on optimized genetic algorithm in underlay network","authors":"Rixing Huang, Jie Chang, Yi Ren, Feng He, Chun Guan","doi":"10.1109/ICCSN.2016.7586695","DOIUrl":"https://doi.org/10.1109/ICCSN.2016.7586695","url":null,"abstract":"By analyzing physical connection of cognitive radio network, underlay color-sensitive graph coloring (UCSGC) model which is used in underlay spectrum allocation is proposed here. After analyzing, color-sensitive graph coloring (CSGC) is a special UCSGC. Under the model, this paper gives an Optimized Genetic Algorithm (OGA) to maximize the benefits of the network. The algorithm not only is convergent, but can avoid the remaining local optima by randomly adding the individuals. Finally, the proposed method was demonstrated by the experimental results.","PeriodicalId":158877,"journal":{"name":"2016 8th IEEE International Conference on Communication Software and Networks (ICCSN)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115981283","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Low complexity MIMO detection algorithm by combining modified OSIC and ML detection 结合改进OSIC和ML检测的低复杂度MIMO检测算法
Saifullah Adnan, Zhang Linbo, Muhammad Ayoob Dars, Muhammad Irshad Zahoor
The Ordered Successive Interference Cancellation (OSIC) algorithm has the advantage of high capabilities. Moreover, as compared to Maximum Likelihood Detection it has poor performance but its error rate is expected. The OSIC algorithm complexity is based on matrix inversion. In this paper, an improved OSIC algorithm is proposed, that uses a parallel detection and an accurate detection value of combining programs while maintaining performance with the slight reduced computational complexity. Considering the error propagation of the traditional OSIC algorithm, modified OSIC and ML detection algorithm are merged, the use of exhaustive search ML method is to improve the overall performance. In order to avoid the computational complexity of ML algorithm, “k” symbols are selected to be detected by the modified OSIC. The remaining symbols are detected by ML detection. The simulations are performed in MATLAB and it shows that the performance of the proposed algorithm is better than the conventional OSIC algorithm.
有序连续干扰消除(OSIC)算法具有性能高的优点。此外,与最大似然检测相比,它的性能较差,但其错误率在预期范围内。OSIC算法的复杂度基于矩阵反演。本文提出了一种改进的OSIC算法,该算法在保持性能的同时,使用并行检测和精确的组合程序检测值,同时略微降低了计算复杂度。考虑到传统OSIC算法的误差传播,将改进的OSIC和ML检测算法合并,采用穷举搜索ML方法是为了提高整体性能。为了避免ML算法的计算复杂度,选择“k”个符号进行改进后的OSIC检测。剩余的符号通过ML检测进行检测。在MATLAB中进行了仿真,结果表明该算法的性能优于传统的OSIC算法。
{"title":"Low complexity MIMO detection algorithm by combining modified OSIC and ML detection","authors":"Saifullah Adnan, Zhang Linbo, Muhammad Ayoob Dars, Muhammad Irshad Zahoor","doi":"10.1109/ICCSN.2016.7586646","DOIUrl":"https://doi.org/10.1109/ICCSN.2016.7586646","url":null,"abstract":"The Ordered Successive Interference Cancellation (OSIC) algorithm has the advantage of high capabilities. Moreover, as compared to Maximum Likelihood Detection it has poor performance but its error rate is expected. The OSIC algorithm complexity is based on matrix inversion. In this paper, an improved OSIC algorithm is proposed, that uses a parallel detection and an accurate detection value of combining programs while maintaining performance with the slight reduced computational complexity. Considering the error propagation of the traditional OSIC algorithm, modified OSIC and ML detection algorithm are merged, the use of exhaustive search ML method is to improve the overall performance. In order to avoid the computational complexity of ML algorithm, “k” symbols are selected to be detected by the modified OSIC. The remaining symbols are detected by ML detection. The simulations are performed in MATLAB and it shows that the performance of the proposed algorithm is better than the conventional OSIC algorithm.","PeriodicalId":158877,"journal":{"name":"2016 8th IEEE International Conference on Communication Software and Networks (ICCSN)","volume":"130 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133033547","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
期刊
2016 8th IEEE International Conference on Communication Software and Networks (ICCSN)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1