首页 > 最新文献

2010 IEEE Youth Conference on Information, Computing and Telecommunications最新文献

英文 中文
Relay protocol improvement and frame structure design base on overhearing mechanism and physical network coding 基于监听机制和物理网络编码的中继协议改进和帧结构设计
Pub Date : 2010-11-01 DOI: 10.1109/YCICT.2010.5713109
Qiong Huang, Ming-jing Ni, Lun Tang, Rong Chai, Qianbin Chen
Under the background of TDD mode and LTE-Advanced scene, in this paper, we combine physical network coding with relay technology in order to make physical network coding-decode and forward(PNC-DF)together with physical network coding-amplify and forward(PNC-AF)transfer mode can be used to improve network throughput by using interference. Because of the ability to listen to the multi-user relay service, we need to optimize and select user group of physical network coding. In this paper, we use over-hearing mechanism in order to optimize user group, even more we also need to improve the department of transport protocol on delay. At last, depending on improved transport protocol, we design two kinds of frame structure which could adapt to improved transfer model. The simulation result shows that PNC-DF and PNC-AF with over-hearing mechanism could reduce the bit error rate.
在TDD模式和LTE-Advanced场景的背景下,本文将物理网络编码与中继技术相结合,使得物理网络编码-解码-转发(PNC-DF)与物理网络编码-放大-转发(PNC-AF)传输模式可以利用干扰来提高网络吞吐量。由于能够监听多用户中继业务,需要对物理网络编码的用户组进行优化选择。在本文中,为了优化用户组,我们使用了监听机制,更需要改进传输部门的延迟协议。最后,根据改进的传输协议,设计了两种能够适应改进传输模型的帧结构。仿真结果表明,带超听机制的PNC-DF和PNC-AF可以降低误码率。
{"title":"Relay protocol improvement and frame structure design base on overhearing mechanism and physical network coding","authors":"Qiong Huang, Ming-jing Ni, Lun Tang, Rong Chai, Qianbin Chen","doi":"10.1109/YCICT.2010.5713109","DOIUrl":"https://doi.org/10.1109/YCICT.2010.5713109","url":null,"abstract":"Under the background of TDD mode and LTE-Advanced scene, in this paper, we combine physical network coding with relay technology in order to make physical network coding-decode and forward(PNC-DF)together with physical network coding-amplify and forward(PNC-AF)transfer mode can be used to improve network throughput by using interference. Because of the ability to listen to the multi-user relay service, we need to optimize and select user group of physical network coding. In this paper, we use over-hearing mechanism in order to optimize user group, even more we also need to improve the department of transport protocol on delay. At last, depending on improved transport protocol, we design two kinds of frame structure which could adapt to improved transfer model. The simulation result shows that PNC-DF and PNC-AF with over-hearing mechanism could reduce the bit error rate.","PeriodicalId":179847,"journal":{"name":"2010 IEEE Youth Conference on Information, Computing and Telecommunications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123816111","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A graph-model-based structure vulnerability Analyzing method on satellite network 基于图模型的卫星网络结构脆弱性分析方法
Pub Date : 2010-11-01 DOI: 10.1109/YCICT.2010.5713084
Xiang Li, Bai Lin, DaQi Li
The satellite network has features like complex, dynamic and fuzzy. Compared to ground information systems, satellite network has more vulnerabilities that are hard to anticipate, and needs a beforehand study to ensure its safely construction. This article uses a vulnerability Analyzing method based on graph model. It uses the relatively still structure as stand point in the dynamic satellite network environment. It synthetically analyses relative vulnerabilities in the network from node level, chain level and access path level. Through simulations with the GIG application layer network structures as the scenarios, this kind of satellite network structure vulnerability analysis method gets its veracity and application value proved.
卫星网络具有复杂性、动态性和模糊性等特点。与地面信息系统相比,卫星网络存在更多难以预测的漏洞,需要事先进行研究,以确保其安全建设。本文采用了一种基于图模型的漏洞分析方法。在动态卫星网络环境中,采用相对静止的结构作为立足点。从节点级、链级和访问路径级综合分析了网络中的相关漏洞。通过以GIG应用层网络结构为场景的仿真,验证了这种卫星网络结构脆弱性分析方法的准确性和应用价值。
{"title":"A graph-model-based structure vulnerability Analyzing method on satellite network","authors":"Xiang Li, Bai Lin, DaQi Li","doi":"10.1109/YCICT.2010.5713084","DOIUrl":"https://doi.org/10.1109/YCICT.2010.5713084","url":null,"abstract":"The satellite network has features like complex, dynamic and fuzzy. Compared to ground information systems, satellite network has more vulnerabilities that are hard to anticipate, and needs a beforehand study to ensure its safely construction. This article uses a vulnerability Analyzing method based on graph model. It uses the relatively still structure as stand point in the dynamic satellite network environment. It synthetically analyses relative vulnerabilities in the network from node level, chain level and access path level. Through simulations with the GIG application layer network structures as the scenarios, this kind of satellite network structure vulnerability analysis method gets its veracity and application value proved.","PeriodicalId":179847,"journal":{"name":"2010 IEEE Youth Conference on Information, Computing and Telecommunications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116306559","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Focused passive synthetic aperture 聚焦被动合成孔径
Pub Date : 2010-11-01 DOI: 10.1109/YCICT.2010.5713069
Xiongfei Zeng, Zheng Li, Haining Huang, Guiqing Sun
High accurate ranging for near-field sources requires that the array aperture should be long enough, especially for the weak underwater acoustic signal with very low frequency. The passive synthetic aperture technique can increase the array aperture artificially by the motion of physical array and signal processing. This paper applies it to the near-field ranging with focused beamforming, which provides a feasible ranging method for near-field weak signal. Theoretical analysis and simulation results both indicate: 1) the proposed method can achieve high ranging precision for near-field sources; 2) because of the error accumulation, the times of extending array would affect the ranging precision directly, and if the sizes of synthetic apertures are same, the fewer times array is extended, the better performance it owns, on the contrary, the ranging precision is independent on the speed of the towed array.
近场源的高精度测距要求阵列孔径足够长,特别是对于频率极低的微弱水声信号。被动合成孔径技术通过物理阵列的运动和信号处理,人为地增大阵列孔径。本文将其应用于聚焦波束形成的近场测距中,为近场微弱信号的测距提供了一种可行的方法。理论分析和仿真结果均表明:1)该方法能达到较高的近场源测距精度;2)由于误差积累,阵列扩展次数将直接影响测距精度,在合成孔径大小相同的情况下,阵列扩展次数越少,测距精度越好,相反,阵列的扩展精度与拖曳阵列的速度无关。
{"title":"Focused passive synthetic aperture","authors":"Xiongfei Zeng, Zheng Li, Haining Huang, Guiqing Sun","doi":"10.1109/YCICT.2010.5713069","DOIUrl":"https://doi.org/10.1109/YCICT.2010.5713069","url":null,"abstract":"High accurate ranging for near-field sources requires that the array aperture should be long enough, especially for the weak underwater acoustic signal with very low frequency. The passive synthetic aperture technique can increase the array aperture artificially by the motion of physical array and signal processing. This paper applies it to the near-field ranging with focused beamforming, which provides a feasible ranging method for near-field weak signal. Theoretical analysis and simulation results both indicate: 1) the proposed method can achieve high ranging precision for near-field sources; 2) because of the error accumulation, the times of extending array would affect the ranging precision directly, and if the sizes of synthetic apertures are same, the fewer times array is extended, the better performance it owns, on the contrary, the ranging precision is independent on the speed of the towed array.","PeriodicalId":179847,"journal":{"name":"2010 IEEE Youth Conference on Information, Computing and Telecommunications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122986179","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Study on the parameters of the semi-fragile watermarking based on JPEG properties 基于JPEG属性的半脆弱水印参数研究
Pub Date : 2010-11-01 DOI: 10.1109/YCICT.2010.5713082
Jun Xiao, Jiaorao Su, Zhiqiang Ma
As a new authentication technique for digital information, semi-fragile watermarking has gained great development, and since JPEG compression is one of the usually used image processing methods, more and more semi-fragile watermarking algorithms based on JPEG compression standard are proposed, but how to make full use of the properties of JPEG compression is still a problem. In this paper, the theory of semi-fragile watermarking based on properties of JPEG and DCT coefficients are introduced, and the parameters that affect the performances are analyzed theoretically and experimentally. The result of study shows that the positions of DCT coefficients used to generate watermark, the number of watermarks generated from a couple of blocks and the positions used to hide watermarks have great effect on the performances of the algorithm. Unless some special requirements exist, both the positions of coefficients used to generate and embed watermark should be chosen according to the order of zig-zag, and usually the best performance can be obtained when only one bit watermark is generated from a couple of blocks.
半脆弱水印作为一种新的数字信息认证技术,得到了很大的发展,而JPEG压缩是常用的图像处理方法之一,基于JPEG压缩标准的半脆弱水印算法越来越多,但如何充分利用JPEG压缩的特性仍然是一个问题。本文介绍了基于JPEG和DCT系数特性的半脆弱水印原理,并对影响半脆弱水印性能的参数进行了理论和实验分析。研究结果表明,用于生成水印的DCT系数的位置、由几个块生成的水印的数量以及用于隐藏水印的位置对算法的性能有很大影响。除非有特殊要求,否则用于生成和嵌入水印的系数的位置都应按照锯齿形的顺序来选择,通常在几个块中只生成一个比特的水印时可以获得最佳的性能。
{"title":"Study on the parameters of the semi-fragile watermarking based on JPEG properties","authors":"Jun Xiao, Jiaorao Su, Zhiqiang Ma","doi":"10.1109/YCICT.2010.5713082","DOIUrl":"https://doi.org/10.1109/YCICT.2010.5713082","url":null,"abstract":"As a new authentication technique for digital information, semi-fragile watermarking has gained great development, and since JPEG compression is one of the usually used image processing methods, more and more semi-fragile watermarking algorithms based on JPEG compression standard are proposed, but how to make full use of the properties of JPEG compression is still a problem. In this paper, the theory of semi-fragile watermarking based on properties of JPEG and DCT coefficients are introduced, and the parameters that affect the performances are analyzed theoretically and experimentally. The result of study shows that the positions of DCT coefficients used to generate watermark, the number of watermarks generated from a couple of blocks and the positions used to hide watermarks have great effect on the performances of the algorithm. Unless some special requirements exist, both the positions of coefficients used to generate and embed watermark should be chosen according to the order of zig-zag, and usually the best performance can be obtained when only one bit watermark is generated from a couple of blocks.","PeriodicalId":179847,"journal":{"name":"2010 IEEE Youth Conference on Information, Computing and Telecommunications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115888412","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SVM inverse model-based heading control of unmanned surface vehicle 基于SVM逆模型的无人水面航行器航向控制
Pub Date : 2010-11-01 DOI: 10.1109/YCICT.2010.5713064
Sun Qiaomei, Ren Guang, Yue Jin, Qi Xiaowei
This paper describes a control methodology of SVM inverse model for unmanned surface vehicle (USV) system heading control. The method is composed of SVM inverse model and PID feedback compensation that are illustrated in detail. In the MATLAB platform, unmanned surface vehicle module and SVM control module were established. The whole system simulation was conducted. The experiments results show that the proposed SVM inverse model approach can achieve effective control of USV.
提出了一种基于支持向量机逆模型的无人水面飞行器航向控制方法。该方法由支持向量机逆模型和PID反馈补偿组成,并对其进行了详细说明。在MATLAB平台上,建立了无人水面飞行器模块和支持向量机控制模块。对整个系统进行了仿真。实验结果表明,所提出的支持向量机逆模型方法可以实现对USV的有效控制。
{"title":"SVM inverse model-based heading control of unmanned surface vehicle","authors":"Sun Qiaomei, Ren Guang, Yue Jin, Qi Xiaowei","doi":"10.1109/YCICT.2010.5713064","DOIUrl":"https://doi.org/10.1109/YCICT.2010.5713064","url":null,"abstract":"This paper describes a control methodology of SVM inverse model for unmanned surface vehicle (USV) system heading control. The method is composed of SVM inverse model and PID feedback compensation that are illustrated in detail. In the MATLAB platform, unmanned surface vehicle module and SVM control module were established. The whole system simulation was conducted. The experiments results show that the proposed SVM inverse model approach can achieve effective control of USV.","PeriodicalId":179847,"journal":{"name":"2010 IEEE Youth Conference on Information, Computing and Telecommunications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122545896","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
AdaGP-Rank: Applying boosting technique to genetic programming for learning to rank AdaGP-Rank:将提升技术应用于遗传规划学习排序
Pub Date : 2010-11-01 DOI: 10.1109/YCICT.2010.5713094
Feng Wang, Xin Xu
One crucial task of learning to rank in the field of information retrieval (IR) is to determine an ordering of documents according to their degree of relevance to the user given query. In this paper, a learning method is proposed named AdaGP-Rank by applying boosting techniques to genetic programming. This approach uses genetic programming to evolve ranking functions while a process inspired from AdaBoost technique helps the evolved ranking functions concentrate on the ranking of those documents associating those ‘hard’ queries. Based on the confidence coefficients, the ranking functions obtained at each boosting round are then combined into a final strong ranker. Experiments conform that AdaGP-Rank has general better performance than several state-of-the-art ranking algorithms on the benchmark data sets.
在信息检索(IR)领域中,学习排序的一个关键任务是根据文档与用户给定查询的相关程度确定文档的排序。本文提出了一种将增强技术应用于遗传规划的学习方法AdaGP-Rank。这种方法使用遗传编程来进化排名函数,而受AdaBoost技术启发的过程有助于进化的排名函数专注于那些与“硬”查询相关的文档的排名。基于置信度系数,将每一轮提升得到的排名函数组合成最终的强排名。实验表明,在基准数据集上,AdaGP-Rank总体上优于几种最先进的排名算法。
{"title":"AdaGP-Rank: Applying boosting technique to genetic programming for learning to rank","authors":"Feng Wang, Xin Xu","doi":"10.1109/YCICT.2010.5713094","DOIUrl":"https://doi.org/10.1109/YCICT.2010.5713094","url":null,"abstract":"One crucial task of learning to rank in the field of information retrieval (IR) is to determine an ordering of documents according to their degree of relevance to the user given query. In this paper, a learning method is proposed named AdaGP-Rank by applying boosting techniques to genetic programming. This approach uses genetic programming to evolve ranking functions while a process inspired from AdaBoost technique helps the evolved ranking functions concentrate on the ranking of those documents associating those ‘hard’ queries. Based on the confidence coefficients, the ranking functions obtained at each boosting round are then combined into a final strong ranker. Experiments conform that AdaGP-Rank has general better performance than several state-of-the-art ranking algorithms on the benchmark data sets.","PeriodicalId":179847,"journal":{"name":"2010 IEEE Youth Conference on Information, Computing and Telecommunications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132535298","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
An approach to efficient compression transmission schema of GML 一种高效的GML压缩传输模式
Pub Date : 2010-11-01 DOI: 10.1109/YCICT.2010.5713147
Ye Shen, Jing Feng, Hao Zhu
GML, a geographic information coding standard, has been widely used in WebGIS, heterogeneous GIS data sharing, integration, and interoperation. However, its features of large amount of redundancy inherited from XML file structure and geographic information system make a serious obstacle in WebGIS applications. According to the characteristics of GML, a data stream-based compression algorithm GDSC ( GML data stream compression ) was given, which separated the GML into structure data and value data using “Draw Pattern”, replaced the structure data with dictionary table during the separation process, and compressed the structure data and value data respectively to increase compression rate. In order to reduce compression time, GDSC uses two sub-threads for compression, decompression and network transmission.
GML是一种地理信息编码标准,已广泛应用于WebGIS、异构GIS数据的共享、集成和互操作。但是,它继承了XML文件结构和地理信息系统的大量冗余的特点,严重阻碍了WebGIS的应用。根据GML的特点,提出了一种基于数据流的GML数据流压缩算法GDSC (data stream compression),该算法利用“Draw Pattern”将GML数据流分离为结构数据和值数据,在分离过程中用字典表代替结构数据,并分别对结构数据和值数据进行压缩,以提高压缩率。为了减少压缩时间,GDSC使用两个子线程进行压缩、解压缩和网络传输。
{"title":"An approach to efficient compression transmission schema of GML","authors":"Ye Shen, Jing Feng, Hao Zhu","doi":"10.1109/YCICT.2010.5713147","DOIUrl":"https://doi.org/10.1109/YCICT.2010.5713147","url":null,"abstract":"GML, a geographic information coding standard, has been widely used in WebGIS, heterogeneous GIS data sharing, integration, and interoperation. However, its features of large amount of redundancy inherited from XML file structure and geographic information system make a serious obstacle in WebGIS applications. According to the characteristics of GML, a data stream-based compression algorithm GDSC ( GML data stream compression ) was given, which separated the GML into structure data and value data using “Draw Pattern”, replaced the structure data with dictionary table during the separation process, and compressed the structure data and value data respectively to increase compression rate. In order to reduce compression time, GDSC uses two sub-threads for compression, decompression and network transmission.","PeriodicalId":179847,"journal":{"name":"2010 IEEE Youth Conference on Information, Computing and Telecommunications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128623558","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Mining maximal frequent itemsets over a stream sliding window 挖掘流滑动窗口上的最大频繁项集
Pub Date : 2010-11-01 DOI: 10.1109/YCICT.2010.5713057
Haifeng Li, Ning Zhang
Maximal frequent itemsets are one of several condensed representations of frequent itemsets, which store most of the information contained in frequent itemsets using less space, thus being more suitable for stream mining. This paper considers a problem that how to mine maximal frequent itemsets over a stream sliding window. We employ a simple but effective data structure to dynamically maintain the maximal frequent itemsets and other helpful information; thus, an algorithm named MFIoSSW is proposed to efficiently mine the results in an incremental manner with our theoretical analysis. Our experimental results show our algorithm achieves a better running time cost.
最大频繁项集是频繁项集的几种浓缩表示形式之一,它使用较少的空间存储了频繁项集中包含的大部分信息,因此更适合于流挖掘。研究了流滑动窗口上最大频繁项集的挖掘问题。我们采用简单而有效的数据结构来动态维护最大频繁项集和其他有用信息;在此基础上,通过理论分析,提出了一种MFIoSSW算法,以增量的方式有效地挖掘结果。实验结果表明,该算法具有较好的运行时间成本。
{"title":"Mining maximal frequent itemsets over a stream sliding window","authors":"Haifeng Li, Ning Zhang","doi":"10.1109/YCICT.2010.5713057","DOIUrl":"https://doi.org/10.1109/YCICT.2010.5713057","url":null,"abstract":"Maximal frequent itemsets are one of several condensed representations of frequent itemsets, which store most of the information contained in frequent itemsets using less space, thus being more suitable for stream mining. This paper considers a problem that how to mine maximal frequent itemsets over a stream sliding window. We employ a simple but effective data structure to dynamically maintain the maximal frequent itemsets and other helpful information; thus, an algorithm named MFIoSSW is proposed to efficiently mine the results in an incremental manner with our theoretical analysis. Our experimental results show our algorithm achieves a better running time cost.","PeriodicalId":179847,"journal":{"name":"2010 IEEE Youth Conference on Information, Computing and Telecommunications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129772303","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A novel grouping algorithm for future cellular networks 一种面向未来蜂窝网络的新型分组算法
Pub Date : 2010-11-01 DOI: 10.1109/YCICT.2010.5713114
Jing An, Zhichen Wang, Hongyu Wang
Two fundamental problems in any cellular systems are limited capacity and the presence of unbalanced traffic. In this paper, we propose a novel grouping infrastructure for next generation cellular networks, whose objective is to increase the system throughput and further improve the system balance. In the cellular system, we consider all the available users are divided into two groups. One is the super group which locates in the cell central region, and another is the regular group which locates in the cell boundary. The super group is served by Base Station, and the Mobile Stations locate in the cell boundary are served by the clusterhead which is elect from the regular group. By using the grouping scheme, it's possible to improve the system performance in terms of SINR cumulative distribution function, system throughput and cell boundary throughput. Results show that good SINR is achieved, as well as significant gains in the whole cell throughput compared to the conventional cellular system.
任何蜂窝系统的两个基本问题是有限的容量和不平衡的业务。本文提出了一种新的用于下一代蜂窝网络的分组基础结构,其目标是提高系统吞吐量并进一步改善系统平衡。在蜂窝系统中,我们把所有可用的用户分成两组。一种是位于细胞中心区域的超群,另一种是位于细胞边界的规则群。超级群由基站提供服务,位于小区边界的移动站由常规群中选出的簇头提供服务。采用分组方案,可以在SINR累积分布函数、系统吞吐量和小区边界吞吐量方面提高系统性能。结果表明,与传统的蜂窝系统相比,实现了良好的信噪比,并显著提高了整个蜂窝系统的吞吐量。
{"title":"A novel grouping algorithm for future cellular networks","authors":"Jing An, Zhichen Wang, Hongyu Wang","doi":"10.1109/YCICT.2010.5713114","DOIUrl":"https://doi.org/10.1109/YCICT.2010.5713114","url":null,"abstract":"Two fundamental problems in any cellular systems are limited capacity and the presence of unbalanced traffic. In this paper, we propose a novel grouping infrastructure for next generation cellular networks, whose objective is to increase the system throughput and further improve the system balance. In the cellular system, we consider all the available users are divided into two groups. One is the super group which locates in the cell central region, and another is the regular group which locates in the cell boundary. The super group is served by Base Station, and the Mobile Stations locate in the cell boundary are served by the clusterhead which is elect from the regular group. By using the grouping scheme, it's possible to improve the system performance in terms of SINR cumulative distribution function, system throughput and cell boundary throughput. Results show that good SINR is achieved, as well as significant gains in the whole cell throughput compared to the conventional cellular system.","PeriodicalId":179847,"journal":{"name":"2010 IEEE Youth Conference on Information, Computing and Telecommunications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123674826","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Cooperation based spectrum sharing in cognitive radio networks 认知无线电网络中基于合作的频谱共享
Pub Date : 2010-11-01 DOI: 10.1109/YCICT.2010.5713141
Zhong Chen, Xianda Zhang, Tianxiang Luan
In this paper, we propose a cooperative spectrum sharing scheme based on decode and forward relaying and a three phase protocol in cognitive radio networks for a secondary system to access the spectrum concurrent with the primary system. The whole system consists of a pair of primary transmitter (PT) and receiver (PR) and a pair of secondary transmitter (ST) and receiver (SR). PT broadcasts the signal to ST and PR during the first fraction 1 − α of time. ST decodes and regenerates the relaying signal to PR in the second fraction αβ of time and transmits the secondary signal to SR in the third fraction α(1 − β) of time. We consider the case that the channel state information (CSI) is fully known where the secondary system won't impact the primary transmission by ensuring the achievable rate, and the case that the distance information between each nodes is known where outage performance of the primary system is ensured. The performance of the secondary system is optimized to get optimal α and β. Simulation results illustrate that the proposed scheme can significantly realize spectrum sharing.
在认知无线网络中,我们提出了一种基于解码和转发中继的协同频谱共享方案和一种三阶段协议,用于辅助系统与主系统同时访问频谱。整个系统由一对主发射机(PT)和接收机(PR)以及一对副发射机(ST)和接收机(SR)组成。PT在1−α时间内向ST和PR广播信号。ST将继电信号在时间的第二级αβ段解码再生为PR,在时间的第三级α(1−β)段将继电信号传输给SR。我们考虑了信道状态信息(CSI)完全已知的情况,其中辅助系统不会通过确保可实现的速率影响主传输,以及每个节点之间的距离信息已知的情况,其中确保主系统的中断性能。对二次系统的性能进行优化,得到最优的α和β。仿真结果表明,该方案能较好地实现频谱共享。
{"title":"Cooperation based spectrum sharing in cognitive radio networks","authors":"Zhong Chen, Xianda Zhang, Tianxiang Luan","doi":"10.1109/YCICT.2010.5713141","DOIUrl":"https://doi.org/10.1109/YCICT.2010.5713141","url":null,"abstract":"In this paper, we propose a cooperative spectrum sharing scheme based on decode and forward relaying and a three phase protocol in cognitive radio networks for a secondary system to access the spectrum concurrent with the primary system. The whole system consists of a pair of primary transmitter (PT) and receiver (PR) and a pair of secondary transmitter (ST) and receiver (SR). PT broadcasts the signal to ST and PR during the first fraction 1 − α of time. ST decodes and regenerates the relaying signal to PR in the second fraction αβ of time and transmits the secondary signal to SR in the third fraction α(1 − β) of time. We consider the case that the channel state information (CSI) is fully known where the secondary system won't impact the primary transmission by ensuring the achievable rate, and the case that the distance information between each nodes is known where outage performance of the primary system is ensured. The performance of the secondary system is optimized to get optimal α and β. Simulation results illustrate that the proposed scheme can significantly realize spectrum sharing.","PeriodicalId":179847,"journal":{"name":"2010 IEEE Youth Conference on Information, Computing and Telecommunications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126423768","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2010 IEEE Youth Conference on Information, Computing and Telecommunications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1