首页 > 最新文献

2012 National Conference on Communications (NCC)最新文献

英文 中文
On t-designs and bounds relating query complexity to error resilience in locally correctable codes 局部可纠错码中查询复杂度与错误弹性的t-设计和边界
Pub Date : 2012-04-03 DOI: 10.1109/NCC.2012.6176752
V. Lalitha, N. Prakash, G. Kamath, P. V. Kumar
An n-length block code C is said to be r-query locally correctable, if for any codeword x ∈ C, one can probabilistically recover any one of the n coordinates of the codeword x by querying at most r coordinates of a possibly corrupted version of x. It is known that linear codes whose duals contain 2-designs are locally correctable. In this article, we consider linear codes whose duals contain t-designs for larger t. It is shown here that for such codes, for a given number of queries r, under linear decoding, one can, in general, handle a larger number of corrupted bits. We exhibit to our knowledge, for the first time, a finite length code, whose dual contains 4-designs, which can tolerate a fraction of up to 0.567/r corrupted symbols as against a maximum of 0.5/r in prior constructions. We also present an upper bound that shows that 0.567 is the best possible for this code length and query complexity over this symbol alphabet thereby establishing optimality of this code in this respect. A second result in the article is a finite-length bound which relates the number of queries r and the fraction of errors that can be tolerated, for a locally correctable code that employs a randomized algorithm in which each instance of the algorithm involves t-error correction.
如果对于任何码字x∈C,通过查询至多r个可能损坏版本x的坐标,可以概率地恢复码字x的n个坐标中的任何一个,则称n个长度的块码C是r-query局部可纠错的。已知对偶包含2-设计的线性码是局部可纠错的。在本文中,我们考虑其对偶包含较大t的t设计的线性代码。这里显示,对于这样的代码,对于给定数量的查询r,在线性解码下,通常可以处理较大数量的损坏位。我们首次展示了一种有限长度编码,其对偶包含4种设计,它可以容忍高达0.567/r的损坏符号,而之前的结构最大只能容忍0.5/r的损坏符号。我们还提出了一个上限,表明0.567是这个代码长度和查询复杂度在这个符号字母表上的最佳可能,从而建立了这个代码在这方面的最优性。本文中的第二个结果是一个有限长度的边界,它与查询的数量r和可以容忍的错误比例有关,对于使用随机算法的局部可纠正代码,其中每个算法实例都涉及t-错误纠正。
{"title":"On t-designs and bounds relating query complexity to error resilience in locally correctable codes","authors":"V. Lalitha, N. Prakash, G. Kamath, P. V. Kumar","doi":"10.1109/NCC.2012.6176752","DOIUrl":"https://doi.org/10.1109/NCC.2012.6176752","url":null,"abstract":"An n-length block code C is said to be r-query locally correctable, if for any codeword x ∈ C, one can probabilistically recover any one of the n coordinates of the codeword x by querying at most r coordinates of a possibly corrupted version of x. It is known that linear codes whose duals contain 2-designs are locally correctable. In this article, we consider linear codes whose duals contain t-designs for larger t. It is shown here that for such codes, for a given number of queries r, under linear decoding, one can, in general, handle a larger number of corrupted bits. We exhibit to our knowledge, for the first time, a finite length code, whose dual contains 4-designs, which can tolerate a fraction of up to 0.567/r corrupted symbols as against a maximum of 0.5/r in prior constructions. We also present an upper bound that shows that 0.567 is the best possible for this code length and query complexity over this symbol alphabet thereby establishing optimality of this code in this respect. A second result in the article is a finite-length bound which relates the number of queries r and the fraction of errors that can be tolerated, for a locally correctable code that employs a randomized algorithm in which each instance of the algorithm involves t-error correction.","PeriodicalId":178278,"journal":{"name":"2012 National Conference on Communications (NCC)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131981084","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Delay optimal scheduling of a discrete-time batch service queue for point-to-point channel code rate selection 点对点信道码率选择的离散时间批处理服务队列延迟最优调度
Pub Date : 2012-04-03 DOI: 10.1109/NCC.2012.6176741
V. Sukumaran, U. Mukherji
We consider the problem of characterizing the minimum average delay, or equivalently the minimum average queue length, of message symbols randomly arriving to the transmitter queue of a point-to-point link which dynamically selects a (n, k) block code from a given collection. The system is modeled by a discrete time queue with an IID batch arrival process and batch service. We obtain a lower bound on the minimum average queue length, which is the optimal value for a linear program, using only the mean (λ) and variance (σ2) of the batch arrivals. For a finite collection of (n, k) codes the minimum achievable average queue length is shown to be Θ(1/ε) as ε ↓ 0 where ε is the difference between the maximum code rate and λ. We obtain a sufficient condition for code rate selection policies to achieve this optimal growth rate. A simple family of policies that use only one block code each as well as two other heuristic policies are shown to be weakly optimal in the sense of achieving the 1/ε growth rate. An appropriate selection from the family of policies that use only one block code each is also shown to achieve the optimal coefficient σ2/2 of the 1/ε growth rate. We compare the performance of the heuristic policies with the minimum achievable average queue length and the lower bound numerically. For a countable collection of (n, k) codes, the optimal average queue length is shown to be Ω(1/ε). We illustrate the selectivity among policies of the growth rate optimality criterion for both finite and countable collections of (n, k) block codes.
我们考虑了从给定集合中动态选择(n, k)个分组码的点对点链路中随机到达发送队列的消息符号的最小平均延迟,或等效的最小平均队列长度的刻画问题。该系统采用离散时间队列模型,具有IID批量到达过程和批量服务。我们得到了最小平均队列长度的下界,这是线性规划的最优值,仅使用批到达的平均值(λ)和方差(σ2)。对于(n, k)个码的有限集合,最小可达到的平均队列长度为Θ(1/ε) ε↓0,其中ε为最大码率与λ之间的差。我们得到了实现这一最优增长率的码率选择策略的充分条件。在实现1/ε增长率的意义上,仅使用一个块代码的简单策略族以及其他两个启发式策略被证明是弱最优的。从每一个只使用一个分组代码的策略族中进行适当的选择,也显示了实现1/ε增长率的最佳系数σ2/2。我们将启发式策略的性能与最小可实现的平均队列长度和下界进行了数值比较。对于(n, k)个代码的可数集合,最佳平均队列长度为Ω(1/ε)。我们说明了(n, k)个分组码的有限集合和可数集合的增长率最优性准则的策略之间的选择性。
{"title":"Delay optimal scheduling of a discrete-time batch service queue for point-to-point channel code rate selection","authors":"V. Sukumaran, U. Mukherji","doi":"10.1109/NCC.2012.6176741","DOIUrl":"https://doi.org/10.1109/NCC.2012.6176741","url":null,"abstract":"We consider the problem of characterizing the minimum average delay, or equivalently the minimum average queue length, of message symbols randomly arriving to the transmitter queue of a point-to-point link which dynamically selects a (n, k) block code from a given collection. The system is modeled by a discrete time queue with an IID batch arrival process and batch service. We obtain a lower bound on the minimum average queue length, which is the optimal value for a linear program, using only the mean (λ) and variance (σ2) of the batch arrivals. For a finite collection of (n, k) codes the minimum achievable average queue length is shown to be Θ(1/ε) as ε ↓ 0 where ε is the difference between the maximum code rate and λ. We obtain a sufficient condition for code rate selection policies to achieve this optimal growth rate. A simple family of policies that use only one block code each as well as two other heuristic policies are shown to be weakly optimal in the sense of achieving the 1/ε growth rate. An appropriate selection from the family of policies that use only one block code each is also shown to achieve the optimal coefficient σ2/2 of the 1/ε growth rate. We compare the performance of the heuristic policies with the minimum achievable average queue length and the lower bound numerically. For a countable collection of (n, k) codes, the optimal average queue length is shown to be Ω(1/ε). We illustrate the selectivity among policies of the growth rate optimality criterion for both finite and countable collections of (n, k) block codes.","PeriodicalId":178278,"journal":{"name":"2012 National Conference on Communications (NCC)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128545630","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Underwater acoustic communications: Design considerations at the physical layer based on field trials 水声通信:基于现场试验的物理层设计考虑
Pub Date : 2012-04-03 DOI: 10.1109/NCC.2012.6176782
B. Sameer, R. D. Koilpillai, P. MuraliKrishna
An overview of the unique challenges in underwater acoustic (UWA) communication in ocean environment is presented. The UWA channel is compared with conventional RF channels. Several design considerations applicable to the physical layer design of a UWA communication system is described based on field measurements. The unique problems in synchronization under high Doppler are described highlighting the key differences in the way Doppler affects the RF and UWA channels. A novel timing synchronization mechanism has been introduced in this study which caters for both the sampling skew offset and the Doppler shift between the transmitter and the receiver.
概述了海洋环境下水声通信面临的独特挑战。将UWA信道与传统射频信道进行了比较。基于现场测量,介绍了适用于UWA通信系统物理层设计的几个设计注意事项。描述了高多普勒下同步的独特问题,突出了多普勒影响射频和UWA信道的方式的关键差异。本文提出了一种新的定时同步机制,该机制既能满足发射端和接收端之间的采样偏置和多普勒频移。
{"title":"Underwater acoustic communications: Design considerations at the physical layer based on field trials","authors":"B. Sameer, R. D. Koilpillai, P. MuraliKrishna","doi":"10.1109/NCC.2012.6176782","DOIUrl":"https://doi.org/10.1109/NCC.2012.6176782","url":null,"abstract":"An overview of the unique challenges in underwater acoustic (UWA) communication in ocean environment is presented. The UWA channel is compared with conventional RF channels. Several design considerations applicable to the physical layer design of a UWA communication system is described based on field measurements. The unique problems in synchronization under high Doppler are described highlighting the key differences in the way Doppler affects the RF and UWA channels. A novel timing synchronization mechanism has been introduced in this study which caters for both the sampling skew offset and the Doppler shift between the transmitter and the receiver.","PeriodicalId":178278,"journal":{"name":"2012 National Conference on Communications (NCC)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133803781","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Pronunciation variation across different dialects for English: A syllable-centric approach 英语不同方言的发音差异:以音节为中心的方法
Pub Date : 2012-04-03 DOI: 10.1109/NCC.2012.6176740
R. G. Brunet, H. Murthy
Automatic Speech Recognition (ASR) systems account for wide variability in the acoustic signal through large amounts of training data. From a linguistic point of view, the acoustic variability is a consequence of pronunciation variation. It is apparent that neither (i) any two speakers utter the same words exactly the same way nor (ii) an individual can repeat the same words with acoustic identity. Hence ASR systems usually rely on multiple-pronunciation lexicons to match an acoustic sequence with a lexical unit. In this study, we have adopted a data-driven approach to generate pronunciation variants at syllable level. Group-Delay (GD) segmentation algorithm is used to acquire acoustic cue about syllable boundaries, which are validated by a vowel-onset point (VOP) detection algorithm. Manual transcriptions of GD syllable segments are done to produce new pronunciation variants. Results on the TIMIT database show that some pronunciations are exclusive for a particular dialect.
自动语音识别(ASR)系统通过大量的训练数据来解释声信号的广泛可变性。从语言学的角度来看,语音变异是语音变异的结果。很明显,无论是(i)任何两个说话者都不能以完全相同的方式说出相同的单词,还是(ii)一个人也不能以声学上相同的方式重复相同的单词。因此,ASR系统通常依赖于多发音词汇来匹配一个声学序列和一个词汇单位。在这项研究中,我们采用了数据驱动的方法来生成音节级的发音变体。使用群延迟(GD)分割算法获取音节边界的声学线索,并通过元音起始点(VOP)检测算法进行验证。手工转录GD音节段,以产生新的发音变体。TIMIT数据库的结果显示,某些发音是特定方言所独有的。
{"title":"Pronunciation variation across different dialects for English: A syllable-centric approach","authors":"R. G. Brunet, H. Murthy","doi":"10.1109/NCC.2012.6176740","DOIUrl":"https://doi.org/10.1109/NCC.2012.6176740","url":null,"abstract":"Automatic Speech Recognition (ASR) systems account for wide variability in the acoustic signal through large amounts of training data. From a linguistic point of view, the acoustic variability is a consequence of pronunciation variation. It is apparent that neither (i) any two speakers utter the same words exactly the same way nor (ii) an individual can repeat the same words with acoustic identity. Hence ASR systems usually rely on multiple-pronunciation lexicons to match an acoustic sequence with a lexical unit. In this study, we have adopted a data-driven approach to generate pronunciation variants at syllable level. Group-Delay (GD) segmentation algorithm is used to acquire acoustic cue about syllable boundaries, which are validated by a vowel-onset point (VOP) detection algorithm. Manual transcriptions of GD syllable segments are done to produce new pronunciation variants. Results on the TIMIT database show that some pronunciations are exclusive for a particular dialect.","PeriodicalId":178278,"journal":{"name":"2012 National Conference on Communications (NCC)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126996810","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
An investigation into traffic analysis for diverse data applications on smartphones 智能手机上各种数据应用的流量分析调查
Pub Date : 2012-04-03 DOI: 10.1109/NCC.2012.6176903
S. Baghel, K. Keshav, V. R. Manepalli
Present day smartphones like iPhone and Andriod based phones have lead to explosive growth in traffic over cellular networks. The growth has occurred both in volume and diversity in terms of traffic characteristics. Among the different types of traffic, there is prominent increase in background type of data due to popularity of applications like Facebook, Skype, Email clients etc which keeps exchanging data with corresponding server, even when the user is not actively using the application. In order to save power consumption of smart phones and for optimal allocation of resources to deserving phones in network by minimum possible signaling traffic, 3GPP LTE specifications have defined mechanisms like connected mode DRX (Discontinuous Reception) which offers two stage of sleep in form of long & short DRX. Since such diverse type of applications are running in smartphone, this work attempts to investigate traffic characteristics of popular applications in Andriod based smartphones. Due to various reasons, such applications, keep consuming precious bandwidth and battery even when not in active use. Main emphasis is thus provided to study the characteristic of these applications when they are running without user intervention. Since, the diverse range of data characteristics is assumed to be causing drain in User Equipment (UE) battery and overhead in NW signaling, we expect that this investigation would help in developing appropriate new power saving mechanisms in future releases of cellular networks.
如今的智能手机,如iPhone和基于android的手机,导致了蜂窝网络流量的爆炸式增长。就交通特征而言,无论是在数量上还是在多样性上都出现了增长。在不同类型的流量中,由于Facebook、Skype、Email客户端等应用程序的流行,后台类型的数据显著增加,这些应用程序即使在用户不积极使用应用程序时也会不断与相应的服务器交换数据。为了节省智能手机的功耗,并通过尽可能少的信令流量将资源优化分配给网络中应得的手机,3GPP LTE规范定义了连接模式DRX(间断接收)等机制,该机制以长DRX和短DRX的形式提供两阶段的睡眠。由于智能手机上运行着如此多样化的应用程序,本研究试图调查基于android的智能手机上流行应用程序的流量特征。由于各种原因,这些应用程序即使在不活跃使用的情况下,也会继续消耗宝贵的带宽和电池。因此,主要重点是研究这些应用程序在没有用户干预的情况下运行时的特性。由于数据特性的多样性被认为会导致用户设备(UE)电池的损耗和NW信号的开销,我们期望这项研究将有助于在未来的蜂窝网络版本中开发适当的新的节能机制。
{"title":"An investigation into traffic analysis for diverse data applications on smartphones","authors":"S. Baghel, K. Keshav, V. R. Manepalli","doi":"10.1109/NCC.2012.6176903","DOIUrl":"https://doi.org/10.1109/NCC.2012.6176903","url":null,"abstract":"Present day smartphones like iPhone and Andriod based phones have lead to explosive growth in traffic over cellular networks. The growth has occurred both in volume and diversity in terms of traffic characteristics. Among the different types of traffic, there is prominent increase in background type of data due to popularity of applications like Facebook, Skype, Email clients etc which keeps exchanging data with corresponding server, even when the user is not actively using the application. In order to save power consumption of smart phones and for optimal allocation of resources to deserving phones in network by minimum possible signaling traffic, 3GPP LTE specifications have defined mechanisms like connected mode DRX (Discontinuous Reception) which offers two stage of sleep in form of long & short DRX. Since such diverse type of applications are running in smartphone, this work attempts to investigate traffic characteristics of popular applications in Andriod based smartphones. Due to various reasons, such applications, keep consuming precious bandwidth and battery even when not in active use. Main emphasis is thus provided to study the characteristic of these applications when they are running without user intervention. Since, the diverse range of data characteristics is assumed to be causing drain in User Equipment (UE) battery and overhead in NW signaling, we expect that this investigation would help in developing appropriate new power saving mechanisms in future releases of cellular networks.","PeriodicalId":178278,"journal":{"name":"2012 National Conference on Communications (NCC)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122097730","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 34
Analysis of modified microstrip line and its application 改进微带线的分析及其应用
Pub Date : 2012-04-03 DOI: 10.1109/NCC.2012.6176769
D. Packiaraj, M. Ramesh, A. T. Kalghatgi, K. Vinoy
Analysis of a microstrip line with a symmetrically located aperture in its ground plane is reported in this paper. The solution is based on conformal mapping technique. Conformal mapping has been used to determine the characteristic impedance and effective permittivity of the line. The accuracy of results is within 5% error. An low pass filter has been designed based on the electrical parameters obtained using the proposed method.
本文报道了一种地平面上具有对称孔径的微带线的分析。该方法基于保角映射技术。用保角映射法确定了线路的特性阻抗和有效介电常数。结果的准确度误差在5%以内。基于该方法得到的电参数,设计了一个低通滤波器。
{"title":"Analysis of modified microstrip line and its application","authors":"D. Packiaraj, M. Ramesh, A. T. Kalghatgi, K. Vinoy","doi":"10.1109/NCC.2012.6176769","DOIUrl":"https://doi.org/10.1109/NCC.2012.6176769","url":null,"abstract":"Analysis of a microstrip line with a symmetrically located aperture in its ground plane is reported in this paper. The solution is based on conformal mapping technique. Conformal mapping has been used to determine the characteristic impedance and effective permittivity of the line. The accuracy of results is within 5% error. An low pass filter has been designed based on the electrical parameters obtained using the proposed method.","PeriodicalId":178278,"journal":{"name":"2012 National Conference on Communications (NCC)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130331224","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Malicious user suppression for cooperative spectrum sensing in cognitive radio networks using Dixon's outlier detection method 基于Dixon离群值检测的认知无线电网络协同频谱感知恶意用户抑制
Pub Date : 2012-04-03 DOI: 10.1109/NCC.2012.6176787
S. Kalamkar, A. Banerjee, A. Roychowdhury
Cooperation among multiple secondary users improves the cognitive radio sensing system performance, but the presence of malicious secondary users may severely degrade the same. In this paper, we study the detection and elimination of such malicious users in a cooperative sensing system using Dixon's outlier test and compare its performance with Grubb's test and boxplot test. We have shown using receiver operating characteristics curves that Dixon's test outperforms Grubb's test and boxplot test for the case of a single malicious user. We also illustrate the limitations of Dixon's test for several malicious users using an example of two malicious users in a cooperative spectrum sensing setting for cognitive radio.
多个辅助用户之间的协作可以提高认知无线电感知系统的性能,但恶意辅助用户的存在会严重降低认知无线电感知系统的性能。本文利用Dixon离群值检验研究了协同传感系统中此类恶意用户的检测和消除,并将其性能与Grubb检验和箱线图检验进行了比较。我们已经使用接收者操作特征曲线表明,对于单个恶意用户,Dixon的测试优于Grubb的测试和箱线图测试。我们还使用认知无线电合作频谱感知设置中的两个恶意用户的示例来说明Dixon测试对几个恶意用户的局限性。
{"title":"Malicious user suppression for cooperative spectrum sensing in cognitive radio networks using Dixon's outlier detection method","authors":"S. Kalamkar, A. Banerjee, A. Roychowdhury","doi":"10.1109/NCC.2012.6176787","DOIUrl":"https://doi.org/10.1109/NCC.2012.6176787","url":null,"abstract":"Cooperation among multiple secondary users improves the cognitive radio sensing system performance, but the presence of malicious secondary users may severely degrade the same. In this paper, we study the detection and elimination of such malicious users in a cooperative sensing system using Dixon's outlier test and compare its performance with Grubb's test and boxplot test. We have shown using receiver operating characteristics curves that Dixon's test outperforms Grubb's test and boxplot test for the case of a single malicious user. We also illustrate the limitations of Dixon's test for several malicious users using an example of two malicious users in a cooperative spectrum sensing setting for cognitive radio.","PeriodicalId":178278,"journal":{"name":"2012 National Conference on Communications (NCC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130364625","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 33
Automatic detection of visual defects in image intensifiers 图像增强器中视觉缺陷的自动检测
Pub Date : 2012-04-03 DOI: 10.1109/NCC.2012.6176796
M. Kamalapriya, V. Thilagavathi
Visible defects in Night Vision (NVD) Device images can act as visual distractions and may be large enough to mask critical information of normal night vision operations. In this paper we present a new method for detection of visual defects which will in turn help in the evaluation of Micro Channel Plate used in image intensifiers. The proposed method adopts a hybrid scheme using Circular Hough Transform and Shape classifier with Connected Component Analysis. The statistical and geometrical properties over a connected region of boundaries are explored for the purpose of defect detection. The performance is evaluated based on the noise withstanding capability of the algorithm.
夜视(NVD)设备图像的可见缺陷可能会造成视觉干扰,并且可能大到足以掩盖正常夜视操作的关键信息。本文提出了一种检测视觉缺陷的新方法,这将有助于评价用于图像增强器的微通道板。该方法采用圆形霍夫变换和形状分类器结合连通成分分析的混合方案。为了检测缺陷,研究了边界连通区域的统计和几何特性。根据算法的抗噪能力对性能进行评价。
{"title":"Automatic detection of visual defects in image intensifiers","authors":"M. Kamalapriya, V. Thilagavathi","doi":"10.1109/NCC.2012.6176796","DOIUrl":"https://doi.org/10.1109/NCC.2012.6176796","url":null,"abstract":"Visible defects in Night Vision (NVD) Device images can act as visual distractions and may be large enough to mask critical information of normal night vision operations. In this paper we present a new method for detection of visual defects which will in turn help in the evaluation of Micro Channel Plate used in image intensifiers. The proposed method adopts a hybrid scheme using Circular Hough Transform and Shape classifier with Connected Component Analysis. The statistical and geometrical properties over a connected region of boundaries are explored for the purpose of defect detection. The performance is evaluated based on the noise withstanding capability of the algorithm.","PeriodicalId":178278,"journal":{"name":"2012 National Conference on Communications (NCC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129703791","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Queue stability measurements for Energy Harvesting Sensor nodes 能量采集传感器节点的队列稳定性测量
Pub Date : 2012-04-03 DOI: 10.1109/NCC.2012.6176745
V. Prashanth, T. V. Prabhakar, K. Prakruthi, H. Jamadagni
We investigate the queue stability in Energy Harvesting Sensor (EHS) nodes under indoor conditions wherein solar energy equipped EHS nodes are deployed for intrusion detection. We implement two policies, namely Throughput Optimal and Greedy and test the conditions under which they ensure queue stability. Energy and Data are injected following a distribution. An important observation is the use of “mean harvested energy” in proposed policies. Presently it does not seem practical to use this term, but works well when nodes have a priori knowledge of its value. Our results indicate that exponential arrival of data and energy offers maximum stability under these stressful conditions.
本文研究了在室内条件下安装太阳能的能量采集传感器(EHS)节点的队列稳定性。我们实现了吞吐量最优和贪婪两种策略,并测试了它们保证队列稳定性的条件。能量和数据按照一个分布注入。一个重要的观察是在拟议政策中使用“平均收获能量”。目前,使用这个术语似乎并不实际,但当节点对其值有先验知识时,它会很好地工作。我们的结果表明,在这些压力条件下,数据和能量的指数到达提供了最大的稳定性。
{"title":"Queue stability measurements for Energy Harvesting Sensor nodes","authors":"V. Prashanth, T. V. Prabhakar, K. Prakruthi, H. Jamadagni","doi":"10.1109/NCC.2012.6176745","DOIUrl":"https://doi.org/10.1109/NCC.2012.6176745","url":null,"abstract":"We investigate the queue stability in Energy Harvesting Sensor (EHS) nodes under indoor conditions wherein solar energy equipped EHS nodes are deployed for intrusion detection. We implement two policies, namely Throughput Optimal and Greedy and test the conditions under which they ensure queue stability. Energy and Data are injected following a distribution. An important observation is the use of “mean harvested energy” in proposed policies. Presently it does not seem practical to use this term, but works well when nodes have a priori knowledge of its value. Our results indicate that exponential arrival of data and energy offers maximum stability under these stressful conditions.","PeriodicalId":178278,"journal":{"name":"2012 National Conference on Communications (NCC)","volume":"126 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129465398","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Testbed based throughput analysis in a Wireless Sensor Network 基于试验台的无线传感器网络吞吐量分析
Pub Date : 2012-04-03 DOI: 10.1109/NCC.2012.6176804
A. Kumar, P. G. Namboothiri, S. Deshpande, S. Vidhyadharan, K. Sivalingam, S. S. Murty
This paper presents the throughput results obtained from a Wireless Sensor Network testbed, with single and multiple sources in different network deployments and routing architectures. The experimental testbed deployed at IIT Madras consisted of commercially available Crossbow TelosB and MicaZ nodes and a custom-built sensor node based on the DigiNet Xbee chip, with all nodes implementing the Zigbee standard. The networks were deployed in uniform grid topologies in three different deployments with up to 228 nodes. The main aim of the experiments is to analyze the throughput and packet delivery ratio observed with single and multiple sources. The experimental results show that delivery ratio reduces with increase in data rate due to collisions and help characterise the network capacity limits.
本文给出了在不同的网络部署和路由架构下,单源和多源无线传感器网络测试平台上获得的吞吐量结果。部署在印度理工学院马德拉斯的实验测试平台由市售的Crossbow TelosB和MicaZ节点以及基于DigiNet Xbee芯片的定制传感器节点组成,所有节点都实现了Zigbee标准。这些网络以统一的网格拓扑部署在三种不同的部署中,最多有228个节点。实验的主要目的是分析在单源和多源情况下观察到的吞吐量和包投递率。实验结果表明,由于碰撞,传输率随数据速率的增加而降低,这有助于表征网络容量限制。
{"title":"Testbed based throughput analysis in a Wireless Sensor Network","authors":"A. Kumar, P. G. Namboothiri, S. Deshpande, S. Vidhyadharan, K. Sivalingam, S. S. Murty","doi":"10.1109/NCC.2012.6176804","DOIUrl":"https://doi.org/10.1109/NCC.2012.6176804","url":null,"abstract":"This paper presents the throughput results obtained from a Wireless Sensor Network testbed, with single and multiple sources in different network deployments and routing architectures. The experimental testbed deployed at IIT Madras consisted of commercially available Crossbow TelosB and MicaZ nodes and a custom-built sensor node based on the DigiNet Xbee chip, with all nodes implementing the Zigbee standard. The networks were deployed in uniform grid topologies in three different deployments with up to 228 nodes. The main aim of the experiments is to analyze the throughput and packet delivery ratio observed with single and multiple sources. The experimental results show that delivery ratio reduces with increase in data rate due to collisions and help characterise the network capacity limits.","PeriodicalId":178278,"journal":{"name":"2012 National Conference on Communications (NCC)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124622323","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
期刊
2012 National Conference on Communications (NCC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1