首页 > 最新文献

2012 National Conference on Communications (NCC)最新文献

英文 中文
A method of developing an agent based ubiquitous node monitoring protocol 一种基于agent的泛在节点监控协议的开发方法
Pub Date : 2012-04-03 DOI: 10.1109/NCC.2012.6176800
Sarada Prasad Gochhayat, P. Venkataram
A ubiquitous network plays a critical role to provide rendered services to ubiquitous application running nodes. To provide appropriate resources the nodes are needed to be monitored continuously. Monitoring a node in ubiquitous network is challenging because of dynamicity and heterogeneity of the ubiquitous network. The network monitor has to monitor resource parameters, like data rate, delay and throughput, as well as events such as node failure, network failure and fault in the system to curb the system failure. In this paper, we propose a method to develop a ubiquitous system monitoring protocol using agents. Earlier works on network monitoring using agents consider that the agents are designed for particular network. While in our work the heterogeneity property of the network has been considered. We have shown that the nodes' behaviour can be easily monitored by using agents (both static and mobile agent). The past behavior of the application and network, and past history of the Unode and the predecessor are taken into consideration to help SA to take appropriate decision during the time of emergency situation like unavailability of resources at the local administration, and to predict the migration of the Unode based on the previous node history. The results obtained in the simulation reflects the effectiveness of the technique.
无处不在的网络在向无处不在的应用程序运行节点提供呈现服务方面起着关键作用。为了提供适当的资源,需要对节点进行持续监控。由于无处不在网络的动态性和异构性,对无处不在网络中的节点进行监控具有一定的挑战性。网络监视器需要监控数据速率、延迟和吞吐量等资源参数,以及系统中的节点故障、网络故障和故障等事件,以抑制系统故障。本文提出了一种利用代理开发泛在系统监控协议的方法。早期使用代理进行网络监控的研究认为代理是为特定的网络而设计的。而在我们的工作中,已经考虑了网络的异质性。我们已经证明,节点的行为可以很容易地通过使用代理(静态和移动代理)进行监控。考虑了应用程序和网络的过去行为,以及unnode和其前身的过去历史,以帮助SA在本地管理资源不可用等紧急情况下做出适当的决策,并根据以前的节点历史预测unnode的迁移。仿真结果表明了该方法的有效性。
{"title":"A method of developing an agent based ubiquitous node monitoring protocol","authors":"Sarada Prasad Gochhayat, P. Venkataram","doi":"10.1109/NCC.2012.6176800","DOIUrl":"https://doi.org/10.1109/NCC.2012.6176800","url":null,"abstract":"A ubiquitous network plays a critical role to provide rendered services to ubiquitous application running nodes. To provide appropriate resources the nodes are needed to be monitored continuously. Monitoring a node in ubiquitous network is challenging because of dynamicity and heterogeneity of the ubiquitous network. The network monitor has to monitor resource parameters, like data rate, delay and throughput, as well as events such as node failure, network failure and fault in the system to curb the system failure. In this paper, we propose a method to develop a ubiquitous system monitoring protocol using agents. Earlier works on network monitoring using agents consider that the agents are designed for particular network. While in our work the heterogeneity property of the network has been considered. We have shown that the nodes' behaviour can be easily monitored by using agents (both static and mobile agent). The past behavior of the application and network, and past history of the Unode and the predecessor are taken into consideration to help SA to take appropriate decision during the time of emergency situation like unavailability of resources at the local administration, and to predict the migration of the Unode based on the previous node history. The results obtained in the simulation reflects the effectiveness of the technique.","PeriodicalId":178278,"journal":{"name":"2012 National Conference on Communications (NCC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131386621","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
LDPC codes for the Slepian-Wolf coding LDPC编码为睡狼编码
Pub Date : 2012-04-03 DOI: 10.1109/NCC.2012.6176801
J. B. Tamakuwala
LDPC codes are among the few FEC schemes that have been used for distributed data compression schemes, like the Slepian-Wolf encoding. An LDPC code having good degree distribution polynomials, along with a large girth and large minimum distance, can compress close to the Slepian-Wolf limit. In this paper, we describe a method to choose good degree distribution polynomials and the corresponding code construction for binary sources. Furthermore, the performance of the proposed compression scheme is also demonstrated. In selected cases, we improve the best schemes reported in literature.
LDPC码是为数不多的用于分布式数据压缩方案的FEC方案之一,如睡狼编码。具有良好度分布多项式的LDPC码,具有较大的周长和较大的最小距离,可以压缩到接近睡眠-狼极限。本文描述了一种选择二元源的好度分布多项式的方法和相应的代码构造。此外,还验证了所提出的压缩方案的性能。在选定的情况下,我们改进了文献中报道的最佳方案。
{"title":"LDPC codes for the Slepian-Wolf coding","authors":"J. B. Tamakuwala","doi":"10.1109/NCC.2012.6176801","DOIUrl":"https://doi.org/10.1109/NCC.2012.6176801","url":null,"abstract":"LDPC codes are among the few FEC schemes that have been used for distributed data compression schemes, like the Slepian-Wolf encoding. An LDPC code having good degree distribution polynomials, along with a large girth and large minimum distance, can compress close to the Slepian-Wolf limit. In this paper, we describe a method to choose good degree distribution polynomials and the corresponding code construction for binary sources. Furthermore, the performance of the proposed compression scheme is also demonstrated. In selected cases, we improve the best schemes reported in literature.","PeriodicalId":178278,"journal":{"name":"2012 National Conference on Communications (NCC)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134207282","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A cooperative secondary user localization based primary user localization method for cognitive radio networks 一种基于认知无线网络主用户定位的协同辅助用户定位方法
Pub Date : 2012-04-03 DOI: 10.1109/NCC.2012.6176751
P. Mankar, S. S. Pathak, R. V. Rajakumar
Cognitive radio is a way of opportunistically sharing the scarce spectrum among licensed and unlicensed users of the spectrum. One of the key challenges in deploying cognitive radio networks (CRNs) is to find out the spectrum holes in the primary (licensed) wireless systems for allowing the secondary (unlicensed) users to share. In order to detect spectrum holes, CRN needs to sense the spectrum to find whether the primary user (PU) is available. In this paper, a cooperative algorithm to estimate the PU location and its coverage, based on received signal strength (RSS) at several local secondary users (SUs) locations, is presented. Maximum likelihood (ML) algorithm is used to estimate the PU locations and its transmission power. Locations of SUs are estimated using Time Difference of Arrival (TDOA) method and the cooperation among the Cognitive Radio Base Stations (CBSs) of CRN. For the convenience of analysis we take error as Euclidian distance between actual location and estimated location. The performance evaluation uses the mean error as a metric.
认知无线电是一种机会性地在频谱的许可和未许可用户之间共享稀缺频谱的方式。部署认知无线网络(crn)的关键挑战之一是找出主(授权)无线系统中的频谱漏洞,以允许辅助(未授权)用户共享。为了检测频谱漏洞,CRN需要对频谱进行感知,以确定主用户(primary user, PU)是否可用。本文提出了一种基于多个本地辅助用户(su)位置的接收信号强度(RSS)协同估计PU位置及其覆盖范围的算法。采用最大似然(ML)算法估计PU的位置和传输功率。利用到达时间差(TDOA)方法和CRN认知无线基站间的协作来估计SUs的位置。为便于分析,我们将误差记为实际位置与估计位置之间的欧氏距离。性能评估使用平均误差作为度量。
{"title":"A cooperative secondary user localization based primary user localization method for cognitive radio networks","authors":"P. Mankar, S. S. Pathak, R. V. Rajakumar","doi":"10.1109/NCC.2012.6176751","DOIUrl":"https://doi.org/10.1109/NCC.2012.6176751","url":null,"abstract":"Cognitive radio is a way of opportunistically sharing the scarce spectrum among licensed and unlicensed users of the spectrum. One of the key challenges in deploying cognitive radio networks (CRNs) is to find out the spectrum holes in the primary (licensed) wireless systems for allowing the secondary (unlicensed) users to share. In order to detect spectrum holes, CRN needs to sense the spectrum to find whether the primary user (PU) is available. In this paper, a cooperative algorithm to estimate the PU location and its coverage, based on received signal strength (RSS) at several local secondary users (SUs) locations, is presented. Maximum likelihood (ML) algorithm is used to estimate the PU locations and its transmission power. Locations of SUs are estimated using Time Difference of Arrival (TDOA) method and the cooperation among the Cognitive Radio Base Stations (CBSs) of CRN. For the convenience of analysis we take error as Euclidian distance between actual location and estimated location. The performance evaluation uses the mean error as a metric.","PeriodicalId":178278,"journal":{"name":"2012 National Conference on Communications (NCC)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134267012","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
A normal factor graph approach for co-operative spectrum sensing in cognitive radio 认知无线电协同频谱感知的标准因子图方法
Pub Date : 2012-04-03 DOI: 10.1109/NCC.2012.6176754
Debasish Bera, S. S. Pathak, I. Chakrabarti
In this paper, normal factor graph (NFG) based probabilistic inference approach for the cooperative spectrum sensing in cognitive radio (CR) is presented. Spectrum sensing problem is modeled as binary hypothesis testing problem. We have formulated the joint probability function with all latent and manifest variables which describe the system. Then decompose the joint distribution function into simpler conditional probability functions and represent them through normal factor graph. The exact marginalization is computed by passing the messages (probability values) among the nodes and edges using Sum-product-algorithm (SPA) / Belief-propagation (BP) algorithm. We compute messages for null and alternate hypothesis and apply Neyman-Pearson (NP) theorem based Likelihood ratio test (LRT) for optimal decision at fusion center. We consider non-central chi-square distribution for alternate hypothesis (H1). It is assumed that secondary users (SUs) are independently sensing the primary user (PU), therefore the graph has no cycle. It is employing energy detector based local sensing with hard decision. We consider non-ideal channel conditions for both PU-SU and SU-FC channels. Initially flat-fading, time-invariant channels with AWGN between PU-SUs and binary symmetric channels (BSC) and AWGN channels between SUs and fusion center (FC) are considered. Simulation results show that proposed methods improves the performance of the cooperative spectrum sensing.
提出了一种基于正态因子图(NFG)的概率推理方法,用于认知无线电(CR)中的协同频谱感知。将频谱感知问题建模为二元假设检验问题。我们给出了描述系统的所有隐变量和显变量的联合概率函数。然后将联合分布函数分解为更简单的条件概率函数,用正态因子图表示。通过使用和积算法(SPA) /信念传播(BP)算法在节点和边缘之间传递消息(概率值)来计算精确的边缘。我们计算了零假设和备用假设的信息,并应用基于内曼-皮尔逊(NP)定理的似然比检验(LRT)在融合中心进行最优决策。我们考虑备用假设(H1)的非中心卡方分布。假设辅助用户(su)独立感知主用户(PU),因此图没有周期。该系统采用基于能量探测器的局部传感,具有较强的决策能力。我们考虑了PU-SU和SU-FC信道的非理想信道条件。考虑了pu - su与二进制对称信道(BSC)之间具有AWGN的初始平衰落时不变信道,以及su与融合中心(FC)之间具有AWGN的信道。仿真结果表明,该方法提高了协同频谱感知的性能。
{"title":"A normal factor graph approach for co-operative spectrum sensing in cognitive radio","authors":"Debasish Bera, S. S. Pathak, I. Chakrabarti","doi":"10.1109/NCC.2012.6176754","DOIUrl":"https://doi.org/10.1109/NCC.2012.6176754","url":null,"abstract":"In this paper, normal factor graph (NFG) based probabilistic inference approach for the cooperative spectrum sensing in cognitive radio (CR) is presented. Spectrum sensing problem is modeled as binary hypothesis testing problem. We have formulated the joint probability function with all latent and manifest variables which describe the system. Then decompose the joint distribution function into simpler conditional probability functions and represent them through normal factor graph. The exact marginalization is computed by passing the messages (probability values) among the nodes and edges using Sum-product-algorithm (SPA) / Belief-propagation (BP) algorithm. We compute messages for null and alternate hypothesis and apply Neyman-Pearson (NP) theorem based Likelihood ratio test (LRT) for optimal decision at fusion center. We consider non-central chi-square distribution for alternate hypothesis (H1). It is assumed that secondary users (SUs) are independently sensing the primary user (PU), therefore the graph has no cycle. It is employing energy detector based local sensing with hard decision. We consider non-ideal channel conditions for both PU-SU and SU-FC channels. Initially flat-fading, time-invariant channels with AWGN between PU-SUs and binary symmetric channels (BSC) and AWGN channels between SUs and fusion center (FC) are considered. Simulation results show that proposed methods improves the performance of the cooperative spectrum sensing.","PeriodicalId":178278,"journal":{"name":"2012 National Conference on Communications (NCC)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117048511","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Real-time stereo video decoding and rendering on multi-core architecture 基于多核架构的实时立体视频解码与渲染
Pub Date : 2012-04-03 DOI: 10.1109/NCC.2012.6176907
C. Pujara, V. Veera, A. Kumar, N. Reddy, V. Tholath
With the production of 3D movies like `Avatar', demand for 3D content has seen enormous growth. With the development of advanced display and capturing technologies, 3D has become popular now a day. In this paper, techniques to implement stereo video (H.264/MVC coded) decoding and rendering on dual-core processors have been described. Depending on the type of display techniques used to display 3D video, different 3D formats are used to appropriately render it. E.g. Anaglyph for 2D screen, side by side, top bottom, checker board (DLP), frame sequential for 3D TVs. Format conversion is implemented as a post processing module and final 3D format data is fed to the device. Format conversion and rendering is also a cycle consuming task which is independent of video decoding. We here propose to decode the stereo video on one core and rendering and format conversion on the other core of a dual-core processor. Proposed idea has been implemented on Intel dual core architecture and on OMAP4 platform having ARM Cortex-A9 dual core processor. Results show that total decoding and rendering time can be brought closer to decoding time using dual core architecture under assumption that decoding time is greater than the rendering time which is the case generally.
随着《阿凡达》等3D电影的制作,对3D内容的需求出现了巨大的增长。随着先进的显示和捕捉技术的发展,3D技术日益普及。本文描述了在双核处理器上实现立体声视频(H.264/MVC编码)解码和渲染的技术。根据用于显示3D视频的显示技术的类型,使用不同的3D格式来适当地呈现它。例如,2D屏幕的浮雕,并排,顶部底部,棋盘(DLP), 3D电视的帧顺序。格式转换作为后处理模块实现,并将最终的3D格式数据馈送到设备。格式转换和呈现也是一个独立于视频解码的周期消耗任务。我们建议在双核处理器的一个核上对立体视频进行解码,在另一个核上进行渲染和格式转换。该方法已在Intel双核架构和ARM Cortex-A9双核处理器的OMAP4平台上实现。结果表明,在假设解码时间大于渲染时间的情况下,采用双核架构可以使总解码和渲染时间更接近解码时间。
{"title":"Real-time stereo video decoding and rendering on multi-core architecture","authors":"C. Pujara, V. Veera, A. Kumar, N. Reddy, V. Tholath","doi":"10.1109/NCC.2012.6176907","DOIUrl":"https://doi.org/10.1109/NCC.2012.6176907","url":null,"abstract":"With the production of 3D movies like `Avatar', demand for 3D content has seen enormous growth. With the development of advanced display and capturing technologies, 3D has become popular now a day. In this paper, techniques to implement stereo video (H.264/MVC coded) decoding and rendering on dual-core processors have been described. Depending on the type of display techniques used to display 3D video, different 3D formats are used to appropriately render it. E.g. Anaglyph for 2D screen, side by side, top bottom, checker board (DLP), frame sequential for 3D TVs. Format conversion is implemented as a post processing module and final 3D format data is fed to the device. Format conversion and rendering is also a cycle consuming task which is independent of video decoding. We here propose to decode the stereo video on one core and rendering and format conversion on the other core of a dual-core processor. Proposed idea has been implemented on Intel dual core architecture and on OMAP4 platform having ARM Cortex-A9 dual core processor. Results show that total decoding and rendering time can be brought closer to decoding time using dual core architecture under assumption that decoding time is greater than the rendering time which is the case generally.","PeriodicalId":178278,"journal":{"name":"2012 National Conference on Communications (NCC)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124051979","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Detection and selective destruction of bacteria colony at THz frequencies 太赫兹频率下细菌菌落的检测与选择性破坏
Pub Date : 2012-04-03 DOI: 10.1109/NCC.2012.6176808
M. Faruk Ali, S. Ray
In this paper, theoretical investigation has been carried out to determine the usefulness of electromagnetic wave for detection and selective destruction of bacteria colony at THz frequencies. To carry out the investigation, a realistic three dimensional electrical model of bacteria colony has been developed and placed between a pair of dipole antennas designed at THz frequencies. The model is simulated using Finite Difference in Time Domain (FDTD) based in-house numerical code developed with MATLAB. Results obtained from the simulations show that significant electromagnetic energy absorption occurs in the bacteria cell at THz frequencies near their electrical resonance frequencies. THz frequencies are also found suitable for detection of dimensions and density of bacteria cells in a colony, and selectively destroy them.
本文从理论上探讨了电磁波在太赫兹频率下对细菌菌落的探测和选择性杀灭的有效性。为了进行研究,开发了一个真实的细菌菌落三维电模型,并将其放置在一对设计为太赫兹频率的偶极子天线之间。利用MATLAB开发的基于时域有限差分(FDTD)的内部数值程序对模型进行了仿真。模拟结果表明,细菌细胞在其电共振频率附近的太赫兹频率处发生显著的电磁能量吸收。太赫兹频率也被发现适合于检测菌落中细菌细胞的尺寸和密度,并选择性地破坏它们。
{"title":"Detection and selective destruction of bacteria colony at THz frequencies","authors":"M. Faruk Ali, S. Ray","doi":"10.1109/NCC.2012.6176808","DOIUrl":"https://doi.org/10.1109/NCC.2012.6176808","url":null,"abstract":"In this paper, theoretical investigation has been carried out to determine the usefulness of electromagnetic wave for detection and selective destruction of bacteria colony at THz frequencies. To carry out the investigation, a realistic three dimensional electrical model of bacteria colony has been developed and placed between a pair of dipole antennas designed at THz frequencies. The model is simulated using Finite Difference in Time Domain (FDTD) based in-house numerical code developed with MATLAB. Results obtained from the simulations show that significant electromagnetic energy absorption occurs in the bacteria cell at THz frequencies near their electrical resonance frequencies. THz frequencies are also found suitable for detection of dimensions and density of bacteria cells in a colony, and selectively destroy them.","PeriodicalId":178278,"journal":{"name":"2012 National Conference on Communications (NCC)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124516790","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Cooperative spectrum sensing with censoring of cognitive radios in Rayleigh fading channel 瑞利衰落信道中认知无线电的协同频谱感知与滤波
Pub Date : 2012-04-03 DOI: 10.1109/NCC.2012.6176780
S. Nallagonda, S. D. Roy, S. Kundu
Performance of cooperative spectrum sensing has been assessed in presence of Rayleigh fading. Cognitive radio (CR) users which employ energy detectors are censored depending on the quality of radio channels between them and a fusion center (FC). A training based channel estimator is used at the FC to estimate the complex Gaussian fading coefficients characterizing the channels between the CR users and the FC. This channel state information (CSI) on fading coefficients is used for censoring the CR users. Each CR makes a hard decision about the primary user (PU) using energy detection and transmits the information to the FC using BPSK signaling if the CR user is selected to transmit. Several fusion rules such as OR logic, majority logic, likelihood ratio test (LRT) fusion are applied at the FC for estimating the performance in terms of missed detection probability (Pm). Comparative performance of fusion rules in terms of probability of missed detection has been evaluated under both perfect and imperfect channel estimation for various probabilities of false alarm (Pf), average reporting and sensing channel SNR values.
对存在瑞利衰落时的协同频谱感知性能进行了评价。使用能量探测器的认知无线电(CR)用户根据其与融合中心(FC)之间的无线电信道质量进行审查。在FC上使用基于训练的信道估计器来估计CR用户和FC之间信道的复高斯衰落系数。利用衰落系数上的信道状态信息(CSI)对CR用户进行检测。每个CR通过能量检测对主用户PU (primary user)做出艰难的决定,如果选择CR用户发送,则通过BPSK信令将信息发送到FC。在FC中应用OR逻辑、多数逻辑、似然比检验(LRT)融合等融合规则,以漏检概率(Pm)来估计性能。针对不同的虚警概率(Pf)、平均报告信噪比和感知信道信噪比值,在完美信道估计和不完美信道估计两种情况下,比较了融合规则在漏检概率方面的性能。
{"title":"Cooperative spectrum sensing with censoring of cognitive radios in Rayleigh fading channel","authors":"S. Nallagonda, S. D. Roy, S. Kundu","doi":"10.1109/NCC.2012.6176780","DOIUrl":"https://doi.org/10.1109/NCC.2012.6176780","url":null,"abstract":"Performance of cooperative spectrum sensing has been assessed in presence of Rayleigh fading. Cognitive radio (CR) users which employ energy detectors are censored depending on the quality of radio channels between them and a fusion center (FC). A training based channel estimator is used at the FC to estimate the complex Gaussian fading coefficients characterizing the channels between the CR users and the FC. This channel state information (CSI) on fading coefficients is used for censoring the CR users. Each CR makes a hard decision about the primary user (PU) using energy detection and transmits the information to the FC using BPSK signaling if the CR user is selected to transmit. Several fusion rules such as OR logic, majority logic, likelihood ratio test (LRT) fusion are applied at the FC for estimating the performance in terms of missed detection probability (Pm). Comparative performance of fusion rules in terms of probability of missed detection has been evaluated under both perfect and imperfect channel estimation for various probabilities of false alarm (Pf), average reporting and sensing channel SNR values.","PeriodicalId":178278,"journal":{"name":"2012 National Conference on Communications (NCC)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128160742","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Reliable data transmission in sensor networks using compressive sensing and real expander codes 传感器网络中使用压缩感知和实扩展码的可靠数据传输
Pub Date : 2012-04-03 DOI: 10.1109/NCC.2012.6176847
S. Kadhe, Sandhyasree Thaskani, M. Chandra, B. S. Adiga
The resource-constraints in the sensor networks make reliable data communication a challenging task. Particularly, the limited availability of battery and computing power necessitates designing computationally efficient means for providing data compression and protection against data loss. In this paper, we propose to integrate the emerging framework of compressive sensing (CS) with real expander codes (RECs), coined as CS-REC, for robust data transmission. CS works as a computationally inexpensive data compression scheme, while RECs act as an elegant application layer erasure coding scheme. The benefits provided by RECs are twofold: one, RECs require only few addition-subtraction operations over real numbers for encoding and decoding; two, they provide graceful degradation in recovery performance with increase in the number of erasures. Through elaborate simulations, we show that CS-REC can achieve the recovery performance close to the case where there is no data loss. Further, again via simulations, we demonstrate the usefulness of CS-REC for reliably transmitting image data in multimedia sensor networks.
传感器网络中的资源约束使得可靠的数据通信成为一项具有挑战性的任务。特别是,有限的电池和计算能力需要设计计算效率高的方法来提供数据压缩和防止数据丢失。在本文中,我们建议将新兴的压缩感知(CS)框架与实际扩展码(RECs)集成,称为CS- rec,以实现稳健的数据传输。CS作为一种计算成本低廉的数据压缩方案,而RECs作为一种优雅的应用层擦除编码方案。RECs提供的好处是双重的:第一,RECs只需要对实数进行少量的加减法操作来进行编码和解码;第二,随着擦除次数的增加,它们会导致恢复性能的明显下降。通过详细的仿真,我们表明CS-REC可以达到接近无数据丢失情况下的恢复性能。此外,再次通过模拟,我们证明了CS-REC在多媒体传感器网络中可靠传输图像数据的有用性。
{"title":"Reliable data transmission in sensor networks using compressive sensing and real expander codes","authors":"S. Kadhe, Sandhyasree Thaskani, M. Chandra, B. S. Adiga","doi":"10.1109/NCC.2012.6176847","DOIUrl":"https://doi.org/10.1109/NCC.2012.6176847","url":null,"abstract":"The resource-constraints in the sensor networks make reliable data communication a challenging task. Particularly, the limited availability of battery and computing power necessitates designing computationally efficient means for providing data compression and protection against data loss. In this paper, we propose to integrate the emerging framework of compressive sensing (CS) with real expander codes (RECs), coined as CS-REC, for robust data transmission. CS works as a computationally inexpensive data compression scheme, while RECs act as an elegant application layer erasure coding scheme. The benefits provided by RECs are twofold: one, RECs require only few addition-subtraction operations over real numbers for encoding and decoding; two, they provide graceful degradation in recovery performance with increase in the number of erasures. Through elaborate simulations, we show that CS-REC can achieve the recovery performance close to the case where there is no data loss. Further, again via simulations, we demonstrate the usefulness of CS-REC for reliably transmitting image data in multimedia sensor networks.","PeriodicalId":178278,"journal":{"name":"2012 National Conference on Communications (NCC)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128606448","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Closed form BER expressions for BPSK OFDM systems with fractional timing offset and carrier frequency offset 具有分数阶时间偏移和载波频率偏移的BPSK OFDM系统的封闭BER表达式
Pub Date : 2012-04-03 DOI: 10.1109/NCC.2012.6176812
R. U. Mahesh, A. Chaturvedi
In this paper, we consider the effect of fractional timing and carrier frequency offsets on the performance of BPSK-OFDM systems in additive white Gaussian noise (AWGN) and flat Rayleigh fading channels. Closed form bit error rate (BER) expressions for BPSK-OFDM systems impaired by timing and carrier frequency offsets are derived. Simulation results are provided to verify the accuracy of the theoretical analysis.
本文研究了分数阶时序和载波频偏对加性高斯白噪声(AWGN)和平坦瑞利衰落信道下BPSK-OFDM系统性能的影响。推导了受定时和载波频率偏移影响的BPSK-OFDM系统的封闭形式误码率表达式。仿真结果验证了理论分析的准确性。
{"title":"Closed form BER expressions for BPSK OFDM systems with fractional timing offset and carrier frequency offset","authors":"R. U. Mahesh, A. Chaturvedi","doi":"10.1109/NCC.2012.6176812","DOIUrl":"https://doi.org/10.1109/NCC.2012.6176812","url":null,"abstract":"In this paper, we consider the effect of fractional timing and carrier frequency offsets on the performance of BPSK-OFDM systems in additive white Gaussian noise (AWGN) and flat Rayleigh fading channels. Closed form bit error rate (BER) expressions for BPSK-OFDM systems impaired by timing and carrier frequency offsets are derived. Simulation results are provided to verify the accuracy of the theoretical analysis.","PeriodicalId":178278,"journal":{"name":"2012 National Conference on Communications (NCC)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127373503","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Segmentation of camera-trap tiger images based on texture and color features 基于纹理和颜色特征的相机陷阱老虎图像分割
Pub Date : 2012-04-03 DOI: 10.1109/NCC.2012.6176908
K. P. Reddy, R. Aravind
In this paper we propose a method to obtain the region of interest in a camera-trap tiger image so that it can be used for identification of the tiger in later stage. We use a combination of texture and color features to discriminate the tiger from the background. Based on these features, a level set based active contour segmentation is performed. A series of morphological operation are then performed on the segmented result to obtain the desired region of interest. The experimental results show the effectiveness of the proposed algorithm.
本文提出了一种从相机捕获的老虎图像中获取感兴趣区域的方法,以便在后期对老虎进行识别。我们使用纹理和颜色特征的组合来区分老虎和背景。基于这些特征,进行了基于水平集的主动轮廓分割。然后对分割的结果进行一系列形态学操作,以获得所需的感兴趣区域。实验结果表明了该算法的有效性。
{"title":"Segmentation of camera-trap tiger images based on texture and color features","authors":"K. P. Reddy, R. Aravind","doi":"10.1109/NCC.2012.6176908","DOIUrl":"https://doi.org/10.1109/NCC.2012.6176908","url":null,"abstract":"In this paper we propose a method to obtain the region of interest in a camera-trap tiger image so that it can be used for identification of the tiger in later stage. We use a combination of texture and color features to discriminate the tiger from the background. Based on these features, a level set based active contour segmentation is performed. A series of morphological operation are then performed on the segmented result to obtain the desired region of interest. The experimental results show the effectiveness of the proposed algorithm.","PeriodicalId":178278,"journal":{"name":"2012 National Conference on Communications (NCC)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127037129","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
2012 National Conference on Communications (NCC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1