Pub Date : 2016-06-04DOI: 10.1109/ICCSN.2016.7586675
Wen Changjun, Zhang Xiaomeng
Due to the fully connected network with the best invulnerability, and the shortest path number between a node for network invulnerability is important. Based on the fully connected network, the shortest path number for evaluation index, the robust communication network invulnerability of the model is established. A new method of calculation of the shortest path is put forward by using MATLAB in this paper. Calculating the examples, the network of the invulnerability can be concluded. The more symmetrical the robust communication network topology is, the higher the invulnerability is.
{"title":"The invulnerability of robust communication network","authors":"Wen Changjun, Zhang Xiaomeng","doi":"10.1109/ICCSN.2016.7586675","DOIUrl":"https://doi.org/10.1109/ICCSN.2016.7586675","url":null,"abstract":"Due to the fully connected network with the best invulnerability, and the shortest path number between a node for network invulnerability is important. Based on the fully connected network, the shortest path number for evaluation index, the robust communication network invulnerability of the model is established. A new method of calculation of the shortest path is put forward by using MATLAB in this paper. Calculating the examples, the network of the invulnerability can be concluded. The more symmetrical the robust communication network topology is, the higher the invulnerability is.","PeriodicalId":158877,"journal":{"name":"2016 8th IEEE International Conference on Communication Software and Networks (ICCSN)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123999169","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-06-04DOI: 10.1109/ICCSN.2016.7586582
Jiang Minzheng, Zhu Yun-zhong, Fu Fangfa
Along with the development of semiconductor's channel length that narrows toward the deep submicron and even nanometer, the design of SoC has become increasingly complex. Therefore, how to achieve fault tolerance, aiming to avoid the impact process issues and improve reliability of system, has become the focus of the NoC design. This paper presents a fault tolerance routing method on NoC system that can perfectly solve the problems above. Targeted low latency, this method based on the existing deterministic algorithms as well as adaptive algorithms and introduces a router clustering technology which supports task based mapping and feedback. The NIRGAM simulator is utilized to achieve performance evaluation. Experiments show that the proposed method has already achieved the goal that applications keep running on the system without the effect of unexpected faults in the NoC. Besides, the performance of system does not decrease dramatically with the number of faults increasing on the chip.
{"title":"Fault-tolerant routing method of NoC system based on clustering","authors":"Jiang Minzheng, Zhu Yun-zhong, Fu Fangfa","doi":"10.1109/ICCSN.2016.7586582","DOIUrl":"https://doi.org/10.1109/ICCSN.2016.7586582","url":null,"abstract":"Along with the development of semiconductor's channel length that narrows toward the deep submicron and even nanometer, the design of SoC has become increasingly complex. Therefore, how to achieve fault tolerance, aiming to avoid the impact process issues and improve reliability of system, has become the focus of the NoC design. This paper presents a fault tolerance routing method on NoC system that can perfectly solve the problems above. Targeted low latency, this method based on the existing deterministic algorithms as well as adaptive algorithms and introduces a router clustering technology which supports task based mapping and feedback. The NIRGAM simulator is utilized to achieve performance evaluation. Experiments show that the proposed method has already achieved the goal that applications keep running on the system without the effect of unexpected faults in the NoC. Besides, the performance of system does not decrease dramatically with the number of faults increasing on the chip.","PeriodicalId":158877,"journal":{"name":"2016 8th IEEE International Conference on Communication Software and Networks (ICCSN)","volume":"105 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115764079","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-06-04DOI: 10.1109/ICCSN.2016.7586627
Xiaoyi Duan, Qi Cui, Sixiang Wang, Huawei Fang, Gaojian She
PRESENT is an ultra-lightweight symmetric cryptographic algorithm designed to adapt to the resource constrained computing scenarios, and it was put forward in 2007. With the continuous development of Internet of things (IoT), the application of this kind algorithm becomes increasingly popular, so the implementation security of the algorithm has correspondingly become an imperative research area. Based on the theory of side channel attack, this paper has investigated the Differential Power Analysis (DPA) technique, and taking the PRESENT algorithm as the target, it verified the feasibility of breaking the PRESENT algorithm. The test results indication that the PRESENT algorithm is vulnerable to power consumption attack under the current hardware environment. Also, to resist these attacks, this paper proposes a fixed-value mask algorithm for PRESENT.
{"title":"Differential power analysis attack and efficient countermeasures on PRESENT","authors":"Xiaoyi Duan, Qi Cui, Sixiang Wang, Huawei Fang, Gaojian She","doi":"10.1109/ICCSN.2016.7586627","DOIUrl":"https://doi.org/10.1109/ICCSN.2016.7586627","url":null,"abstract":"PRESENT is an ultra-lightweight symmetric cryptographic algorithm designed to adapt to the resource constrained computing scenarios, and it was put forward in 2007. With the continuous development of Internet of things (IoT), the application of this kind algorithm becomes increasingly popular, so the implementation security of the algorithm has correspondingly become an imperative research area. Based on the theory of side channel attack, this paper has investigated the Differential Power Analysis (DPA) technique, and taking the PRESENT algorithm as the target, it verified the feasibility of breaking the PRESENT algorithm. The test results indication that the PRESENT algorithm is vulnerable to power consumption attack under the current hardware environment. Also, to resist these attacks, this paper proposes a fixed-value mask algorithm for PRESENT.","PeriodicalId":158877,"journal":{"name":"2016 8th IEEE International Conference on Communication Software and Networks (ICCSN)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116974790","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-06-04DOI: 10.1109/ICCSN.2016.7586598
Xiaojie Zhang, W. Dou, Mingyu Zhang, Hongyan Chen
The brain tumor segmentation method of MRI images is of key importance for clinical analysis of glioma. The majority of existing methods are focused on structural MRI such as T1-weighted and T2-weighted. Additionally, functional MRI including Magnetic Resonance Spectroscopy (MRS), Diffusion Weighted Imaging (DWI), and Blood-Oxygen-Level Dependent (BOLD) can also contribute to increasing the validity and accuracy of the results. This paper proposes a framework of automatic brain tumor segmentation method based on information fusion of structural and functional signals. The method consists of four steps: intensity mapping for feature, region growing for tumor, region growing for edema and necrosis detection. The performance evaluation has been done by using some clinical MRI data with glioma. Comparing the segmentation results with the manual segmentation as “ground truth”, it has achieved average Dice score 83.7% in the tumor, and 88.5% in the whole lesion area, which indicated the validity and robustness of the proposed method.
{"title":"A framework of automatic brain tumor segmentation method based on information fusion of structural and functional MRI signals","authors":"Xiaojie Zhang, W. Dou, Mingyu Zhang, Hongyan Chen","doi":"10.1109/ICCSN.2016.7586598","DOIUrl":"https://doi.org/10.1109/ICCSN.2016.7586598","url":null,"abstract":"The brain tumor segmentation method of MRI images is of key importance for clinical analysis of glioma. The majority of existing methods are focused on structural MRI such as T1-weighted and T2-weighted. Additionally, functional MRI including Magnetic Resonance Spectroscopy (MRS), Diffusion Weighted Imaging (DWI), and Blood-Oxygen-Level Dependent (BOLD) can also contribute to increasing the validity and accuracy of the results. This paper proposes a framework of automatic brain tumor segmentation method based on information fusion of structural and functional signals. The method consists of four steps: intensity mapping for feature, region growing for tumor, region growing for edema and necrosis detection. The performance evaluation has been done by using some clinical MRI data with glioma. Comparing the segmentation results with the manual segmentation as “ground truth”, it has achieved average Dice score 83.7% in the tumor, and 88.5% in the whole lesion area, which indicated the validity and robustness of the proposed method.","PeriodicalId":158877,"journal":{"name":"2016 8th IEEE International Conference on Communication Software and Networks (ICCSN)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125251630","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Communication is an essential part of Distribution Automation System (DAS), without it, the data collection and transmission will not achieve. This paper first analyzes the advantages and disadvantages of various communication technologies, Ethernet Passive Optical Network (EPON) and Time Division Long Term Evolution (TD-LTE) technologies are selected to meet the requirements of DAS. Then, the principles of EPON and the spectrum selection of TD-LTE are discussed; and based on EPON and TD-LTE, a hybrid network for DAS is designed. At last, a trail network was built in Xinjiang province; the test results show that the hybrid network can meet the requirements of DAS in different scenarios.
{"title":"Analysis and design of hybrid network for distribution automation system in China","authors":"Qingrui Guo, Xu Wang, Yaping Li, Zhijun Zhang, Peng Xie","doi":"10.1109/ICCSN.2016.7586679","DOIUrl":"https://doi.org/10.1109/ICCSN.2016.7586679","url":null,"abstract":"Communication is an essential part of Distribution Automation System (DAS), without it, the data collection and transmission will not achieve. This paper first analyzes the advantages and disadvantages of various communication technologies, Ethernet Passive Optical Network (EPON) and Time Division Long Term Evolution (TD-LTE) technologies are selected to meet the requirements of DAS. Then, the principles of EPON and the spectrum selection of TD-LTE are discussed; and based on EPON and TD-LTE, a hybrid network for DAS is designed. At last, a trail network was built in Xinjiang province; the test results show that the hybrid network can meet the requirements of DAS in different scenarios.","PeriodicalId":158877,"journal":{"name":"2016 8th IEEE International Conference on Communication Software and Networks (ICCSN)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121823637","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-06-04DOI: 10.1109/ICCSN.2016.7586590
Bo Dong, Xue Wang
Recently, deep learning has gained prominence due to the potential it portends for machine learning. For this reason, deep learning techniques have been applied in many fields, such as recognizing some kinds of patterns or classification. Intrusion detection analyses got data from monitoring security events to get situation assessment of network. Lots of traditional machine learning method has been put forward to intrusion detection, but it is necessary to improvement the detection performance and accuracy. This paper discusses different methods which were used to classify network traffic. We decided to use different methods on open data set and did experiment with these methods to find out a best way to intrusion detection.
{"title":"Comparison deep learning method to traditional methods using for network intrusion detection","authors":"Bo Dong, Xue Wang","doi":"10.1109/ICCSN.2016.7586590","DOIUrl":"https://doi.org/10.1109/ICCSN.2016.7586590","url":null,"abstract":"Recently, deep learning has gained prominence due to the potential it portends for machine learning. For this reason, deep learning techniques have been applied in many fields, such as recognizing some kinds of patterns or classification. Intrusion detection analyses got data from monitoring security events to get situation assessment of network. Lots of traditional machine learning method has been put forward to intrusion detection, but it is necessary to improvement the detection performance and accuracy. This paper discusses different methods which were used to classify network traffic. We decided to use different methods on open data set and did experiment with these methods to find out a best way to intrusion detection.","PeriodicalId":158877,"journal":{"name":"2016 8th IEEE International Conference on Communication Software and Networks (ICCSN)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115433159","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-06-04DOI: 10.1109/ICCSN.2016.7586689
Ce Zheng, Jiancun Fan, Xinmin Luo
Recently, Ultra Dense Network (UDN) emerges as one of the state-of-the-art technologies to cope with the pressure of the ever-growing traffic demands in wireless communication. By deploying dense Base Stations (BSs) to provide ubiquitous coverage and high-speed transmission, it is considered as one of the most promising paradigms. However, large numbers of BSs bring the rise of the energy consumption of circuit and other costs for maintenance. Therefore, along with spectrum efficiency, the energy efficiency also becomes a major concern in UDN. In this paper, we analyze the UDN performance on both network Spectrum Efficiency (SE) and network Energy Efficiency (EE) with sleep mode. We first offer an alternative analytical expression of the average achievable rate. Then we modified the existing stochastic model where BSs and users are modeled as the Poisson Point process (PPP). Unlike the previous work, we introduce the active BSs density and show its relationship with densities of BSs and users. After that, we analytically derive the expression of the network SE and EE, and analyze the network performance through numerical simulations. We further do practical simulations to prove the validity of our analysis. In the end, we draw the conclusions that tradeoff needs to be made since different network performance metrics cannot be optimal at the same time.
{"title":"Spectrum and energy efficiency analysis of ultra dense network with sleep","authors":"Ce Zheng, Jiancun Fan, Xinmin Luo","doi":"10.1109/ICCSN.2016.7586689","DOIUrl":"https://doi.org/10.1109/ICCSN.2016.7586689","url":null,"abstract":"Recently, Ultra Dense Network (UDN) emerges as one of the state-of-the-art technologies to cope with the pressure of the ever-growing traffic demands in wireless communication. By deploying dense Base Stations (BSs) to provide ubiquitous coverage and high-speed transmission, it is considered as one of the most promising paradigms. However, large numbers of BSs bring the rise of the energy consumption of circuit and other costs for maintenance. Therefore, along with spectrum efficiency, the energy efficiency also becomes a major concern in UDN. In this paper, we analyze the UDN performance on both network Spectrum Efficiency (SE) and network Energy Efficiency (EE) with sleep mode. We first offer an alternative analytical expression of the average achievable rate. Then we modified the existing stochastic model where BSs and users are modeled as the Poisson Point process (PPP). Unlike the previous work, we introduce the active BSs density and show its relationship with densities of BSs and users. After that, we analytically derive the expression of the network SE and EE, and analyze the network performance through numerical simulations. We further do practical simulations to prove the validity of our analysis. In the end, we draw the conclusions that tradeoff needs to be made since different network performance metrics cannot be optimal at the same time.","PeriodicalId":158877,"journal":{"name":"2016 8th IEEE International Conference on Communication Software and Networks (ICCSN)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130307451","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-06-04DOI: 10.1109/ICCSN.2016.7586651
S. Aghaeinezhadfirouzja, Hui Liu, Bin Xia, M. Tao
This paper, design and utilize the implementation of 8 × 2 outdoor single-user multiple-input, multiple-output (SU-MIMO) systems for time division duplex LTE-A channels at 2.680 GHz to 2.690 GHz. With this purpose, there is a need for accurate and actual radio propagation model at these bands where around the Shanghai Jiao Tong University (SJTU) campus network. In that SU-MIMO testbed, both the transmitter and the receiver communications are made by employing eight (four pairs of cross polarization) antennas in the transmitter side and 2 at the receiver for real time network. Measurements show the experimental characteristics of the future Physical Downlink Control Channel (PDCCH) and Physical Downlink Shared Channel (PDSCH), sensitive to absolute power levels that may not be enough to support a large number of UEs in a cell. We also show the weakness of the current cellular network that is to reach an accurate synchronization such as Coarse Timing Synchronization (CTS) between the receive symbols. This CTS defect can lead to the severe performance degradation and issue for MIMO wireless systems.
{"title":"Implementation and measurement of single user MIMO testbed for TD-LTE-A downlink channels","authors":"S. Aghaeinezhadfirouzja, Hui Liu, Bin Xia, M. Tao","doi":"10.1109/ICCSN.2016.7586651","DOIUrl":"https://doi.org/10.1109/ICCSN.2016.7586651","url":null,"abstract":"This paper, design and utilize the implementation of 8 × 2 outdoor single-user multiple-input, multiple-output (SU-MIMO) systems for time division duplex LTE-A channels at 2.680 GHz to 2.690 GHz. With this purpose, there is a need for accurate and actual radio propagation model at these bands where around the Shanghai Jiao Tong University (SJTU) campus network. In that SU-MIMO testbed, both the transmitter and the receiver communications are made by employing eight (four pairs of cross polarization) antennas in the transmitter side and 2 at the receiver for real time network. Measurements show the experimental characteristics of the future Physical Downlink Control Channel (PDCCH) and Physical Downlink Shared Channel (PDSCH), sensitive to absolute power levels that may not be enough to support a large number of UEs in a cell. We also show the weakness of the current cellular network that is to reach an accurate synchronization such as Coarse Timing Synchronization (CTS) between the receive symbols. This CTS defect can lead to the severe performance degradation and issue for MIMO wireless systems.","PeriodicalId":158877,"journal":{"name":"2016 8th IEEE International Conference on Communication Software and Networks (ICCSN)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116496423","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-06-04DOI: 10.1109/ICCSN.2016.7586695
Rixing Huang, Jie Chang, Yi Ren, Feng He, Chun Guan
By analyzing physical connection of cognitive radio network, underlay color-sensitive graph coloring (UCSGC) model which is used in underlay spectrum allocation is proposed here. After analyzing, color-sensitive graph coloring (CSGC) is a special UCSGC. Under the model, this paper gives an Optimized Genetic Algorithm (OGA) to maximize the benefits of the network. The algorithm not only is convergent, but can avoid the remaining local optima by randomly adding the individuals. Finally, the proposed method was demonstrated by the experimental results.
{"title":"Spectrum allocation of cognitive radio network based on optimized genetic algorithm in underlay network","authors":"Rixing Huang, Jie Chang, Yi Ren, Feng He, Chun Guan","doi":"10.1109/ICCSN.2016.7586695","DOIUrl":"https://doi.org/10.1109/ICCSN.2016.7586695","url":null,"abstract":"By analyzing physical connection of cognitive radio network, underlay color-sensitive graph coloring (UCSGC) model which is used in underlay spectrum allocation is proposed here. After analyzing, color-sensitive graph coloring (CSGC) is a special UCSGC. Under the model, this paper gives an Optimized Genetic Algorithm (OGA) to maximize the benefits of the network. The algorithm not only is convergent, but can avoid the remaining local optima by randomly adding the individuals. Finally, the proposed method was demonstrated by the experimental results.","PeriodicalId":158877,"journal":{"name":"2016 8th IEEE International Conference on Communication Software and Networks (ICCSN)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115981283","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-06-04DOI: 10.1109/ICCSN.2016.7586646
Saifullah Adnan, Zhang Linbo, Muhammad Ayoob Dars, Muhammad Irshad Zahoor
The Ordered Successive Interference Cancellation (OSIC) algorithm has the advantage of high capabilities. Moreover, as compared to Maximum Likelihood Detection it has poor performance but its error rate is expected. The OSIC algorithm complexity is based on matrix inversion. In this paper, an improved OSIC algorithm is proposed, that uses a parallel detection and an accurate detection value of combining programs while maintaining performance with the slight reduced computational complexity. Considering the error propagation of the traditional OSIC algorithm, modified OSIC and ML detection algorithm are merged, the use of exhaustive search ML method is to improve the overall performance. In order to avoid the computational complexity of ML algorithm, “k” symbols are selected to be detected by the modified OSIC. The remaining symbols are detected by ML detection. The simulations are performed in MATLAB and it shows that the performance of the proposed algorithm is better than the conventional OSIC algorithm.
{"title":"Low complexity MIMO detection algorithm by combining modified OSIC and ML detection","authors":"Saifullah Adnan, Zhang Linbo, Muhammad Ayoob Dars, Muhammad Irshad Zahoor","doi":"10.1109/ICCSN.2016.7586646","DOIUrl":"https://doi.org/10.1109/ICCSN.2016.7586646","url":null,"abstract":"The Ordered Successive Interference Cancellation (OSIC) algorithm has the advantage of high capabilities. Moreover, as compared to Maximum Likelihood Detection it has poor performance but its error rate is expected. The OSIC algorithm complexity is based on matrix inversion. In this paper, an improved OSIC algorithm is proposed, that uses a parallel detection and an accurate detection value of combining programs while maintaining performance with the slight reduced computational complexity. Considering the error propagation of the traditional OSIC algorithm, modified OSIC and ML detection algorithm are merged, the use of exhaustive search ML method is to improve the overall performance. In order to avoid the computational complexity of ML algorithm, “k” symbols are selected to be detected by the modified OSIC. The remaining symbols are detected by ML detection. The simulations are performed in MATLAB and it shows that the performance of the proposed algorithm is better than the conventional OSIC algorithm.","PeriodicalId":158877,"journal":{"name":"2016 8th IEEE International Conference on Communication Software and Networks (ICCSN)","volume":"130 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133033547","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}