首页 > 最新文献

2011 11th International Symposium on Communications & Information Technologies (ISCIT)最新文献

英文 中文
An improved dynamic time warping algorithm employing nonlinear median filtering 一种改进的非线性中值滤波动态时间规整算法
Yu-xin Zhang, Y. Miyanaga
This paper proposes an improved dynamic time warping (DTW) algorithm with a nonlinear median filtering (NMF). Recognition accuracy of conventional DTW algorithms are less than the hidden Markov model (HMM) by same voice activity detection (VAD) and noise-reduction with running spectrum filtering (RSF) and dynamic range adjustment (DRA). For analyzing some incorrect results, unlike in conventional DTW, we do not use the minimum distance to recognize. we employ NMF and seek the median distance of the every reference word with the unknown speech waveform. All recognition accuracy of conventional DTW algorithms are improved much more by NMF. The recognition accuracy of Itakura's DTW algorithm is the best. Its recognition accuracy similar to that of the HMM approach in 10 dB and 20 dB white noise.
提出了一种改进的非线性中值滤波动态时间规整(DTW)算法。在相同的语音活动检测(VAD)和运行谱滤波(RSF)和动态范围调整(DRA)降噪的情况下,传统DTW算法的识别精度低于隐马尔可夫模型(HMM)。对于一些错误结果的分析,与传统的DTW不同,我们没有使用最小距离来识别。我们采用NMF方法,对每个参考词与未知语音波形之间的距离求中值。NMF大大提高了传统DTW算法的识别精度。Itakura的DTW算法的识别精度最好。在10 dB和20 dB白噪声下,其识别精度与HMM方法相近。
{"title":"An improved dynamic time warping algorithm employing nonlinear median filtering","authors":"Yu-xin Zhang, Y. Miyanaga","doi":"10.1109/ISCIT.2011.6089967","DOIUrl":"https://doi.org/10.1109/ISCIT.2011.6089967","url":null,"abstract":"This paper proposes an improved dynamic time warping (DTW) algorithm with a nonlinear median filtering (NMF). Recognition accuracy of conventional DTW algorithms are less than the hidden Markov model (HMM) by same voice activity detection (VAD) and noise-reduction with running spectrum filtering (RSF) and dynamic range adjustment (DRA). For analyzing some incorrect results, unlike in conventional DTW, we do not use the minimum distance to recognize. we employ NMF and seek the median distance of the every reference word with the unknown speech waveform. All recognition accuracy of conventional DTW algorithms are improved much more by NMF. The recognition accuracy of Itakura's DTW algorithm is the best. Its recognition accuracy similar to that of the HMM approach in 10 dB and 20 dB white noise.","PeriodicalId":226552,"journal":{"name":"2011 11th International Symposium on Communications & Information Technologies (ISCIT)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130124131","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Proposal on the concealment of the network topology in IPv6 IPv6中网络拓扑隐藏问题的研究
Toru Kuboshiki, Hidekazu Suzuki, A. Watanabe
With a possible exhaustion of global IPv4 addresses, shifting to IPv6 is thought to be inevitable. However, when the shifting to IPv6 actually occurs, network topology could be inferred from addresses in the organization. Thus, as a means to conceal network topology, various methods, including the use of Mobile IPv6 and the setting-up of routers for host routes, are being proposed. However, redundant routings become a problem in the case of Mobile IPv6, and increases in the routing tables become a problem in the case of host routing. In this paper, we define new addresses to conceal network topology and propose a communication method using these addresses. We also describe our idea of implementing our method.
随着全球IPv4地址可能耗尽,转向IPv6被认为是不可避免的。然而,当迁移到IPv6时,可以从组织中的地址推断出网络拓扑结构。因此,作为一种隐藏网络拓扑的手段,各种方法,包括使用移动IPv6和为主机路由设置路由器,被提出。但是,在移动IPv6中存在冗余路由的问题,在主机路由中存在路由表增加的问题。在本文中,我们定义了新的地址来隐藏网络拓扑,并提出了一种利用这些地址的通信方法。我们还描述了实现方法的想法。
{"title":"Proposal on the concealment of the network topology in IPv6","authors":"Toru Kuboshiki, Hidekazu Suzuki, A. Watanabe","doi":"10.1109/ISCIT.2011.6092167","DOIUrl":"https://doi.org/10.1109/ISCIT.2011.6092167","url":null,"abstract":"With a possible exhaustion of global IPv4 addresses, shifting to IPv6 is thought to be inevitable. However, when the shifting to IPv6 actually occurs, network topology could be inferred from addresses in the organization. Thus, as a means to conceal network topology, various methods, including the use of Mobile IPv6 and the setting-up of routers for host routes, are being proposed. However, redundant routings become a problem in the case of Mobile IPv6, and increases in the routing tables become a problem in the case of host routing. In this paper, we define new addresses to conceal network topology and propose a communication method using these addresses. We also describe our idea of implementing our method.","PeriodicalId":226552,"journal":{"name":"2011 11th International Symposium on Communications & Information Technologies (ISCIT)","volume":"134 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134106377","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A secure arithmetic coding algorithm based on integer implementation 一种基于整数实现的安全算术编码算法
Yuh-Ming Huang, Y. Liang
This paper presents a novel modification of integer arithmetic code, which performs compression and encryption at the same time. It is quite different from the randomized arithmetic code (RAC), the interval splitting arithmetic code (ISAC), and the secure arithmetic code (SAC). In security, we apply the Pseudo-Random Bit Generator (PRBG) and the Secure Hash Algorithm (SHA-256) to construct the key vector. Each bit of the key vector known to both the encoder and decoder is used to determine whether the source intervals respectively allocated to each of the different symbols are needed to be adjusted prior to encoding each new symbol. Experimental results indicate that our proposed code does not compromise the coding efficiency.
本文提出了一种改进的整数算术码,实现了压缩和加密的同时进行。它与随机算术码(RAC)、区间分割算术码(ISAC)和安全算术码(SAC)有很大的区别。在安全性方面,我们采用伪随机比特发生器(PRBG)和安全哈希算法(SHA-256)来构造密钥向量。编码器和解码器都知道的密钥向量的每个位用于确定在编码每个新符号之前是否需要调整分别分配给每个不同符号的源间隔。实验结果表明,本文提出的编码在不影响编码效率的前提下。
{"title":"A secure arithmetic coding algorithm based on integer implementation","authors":"Yuh-Ming Huang, Y. Liang","doi":"10.1109/ISCIT.2011.6092162","DOIUrl":"https://doi.org/10.1109/ISCIT.2011.6092162","url":null,"abstract":"This paper presents a novel modification of integer arithmetic code, which performs compression and encryption at the same time. It is quite different from the randomized arithmetic code (RAC), the interval splitting arithmetic code (ISAC), and the secure arithmetic code (SAC). In security, we apply the Pseudo-Random Bit Generator (PRBG) and the Secure Hash Algorithm (SHA-256) to construct the key vector. Each bit of the key vector known to both the encoder and decoder is used to determine whether the source intervals respectively allocated to each of the different symbols are needed to be adjusted prior to encoding each new symbol. Experimental results indicate that our proposed code does not compromise the coding efficiency.","PeriodicalId":226552,"journal":{"name":"2011 11th International Symposium on Communications & Information Technologies (ISCIT)","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126190557","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Implementation of FPGA-based DVB-T2 modulator with multiple PLPs 基于fpga的DVB-T2多plp调制器的实现
Sangchae Lim, Youngin Park, Eonpyo Hong, D. Har
Digital Video Broadcasting — Terrestrial for Second generation (DVB-T2) was released, for the purpose of supporting High Definition Television (HDTV) services. Although DVB-T2 leads to performance improvement by introducing state-of-the-art communication techniques, the introduction of such communication techniques has become problems in implementing the system. Multiple Physical Layer Pipe (PLP), initially introduced by DVB-T2, enable application of separate code rates and modulation orders to each PLP. However, due to non-sequentially generated Base Band (BB) frames, regardless of PLP indices, construction of T2 frames is complicated. In the present paper, we present an algorithm arranging randomly produced BB frames to build T2 frames, complying with the DVB-T2 standard. The proposed method is centered on allocating memory space to each PLP, based on configurable PLP information and storing BB frames in an external memory. In addition to such an algorithm, DVB-T2 modulator is implemented in a Field Programmable Gate Array (FPGA) device.
推出第二代地面数码视像广播(DVB-T2),以支援高清晰度电视(HDTV)服务。虽然DVB-T2引进了最先进的通信技术,从而提高了性能,但这种通信技术的引进成为了实施系统的问题。多物理层管道(PLP)最初由DVB-T2引入,可以对每个PLP应用单独的码率和调制顺序。然而,由于非顺序生成的基带(BB)帧,无论PLP指数如何,T2帧的构建都很复杂。在本文中,我们提出了一种算法,将随机产生的BB帧排列成符合DVB-T2标准的T2帧。该方法基于可配置的PLP信息为每个PLP分配内存空间,并将BB帧存储在外部存储器中。除了这种算法之外,DVB-T2调制器还在现场可编程门阵列(FPGA)器件中实现。
{"title":"Implementation of FPGA-based DVB-T2 modulator with multiple PLPs","authors":"Sangchae Lim, Youngin Park, Eonpyo Hong, D. Har","doi":"10.1109/ISCIT.2011.6092187","DOIUrl":"https://doi.org/10.1109/ISCIT.2011.6092187","url":null,"abstract":"Digital Video Broadcasting — Terrestrial for Second generation (DVB-T2) was released, for the purpose of supporting High Definition Television (HDTV) services. Although DVB-T2 leads to performance improvement by introducing state-of-the-art communication techniques, the introduction of such communication techniques has become problems in implementing the system. Multiple Physical Layer Pipe (PLP), initially introduced by DVB-T2, enable application of separate code rates and modulation orders to each PLP. However, due to non-sequentially generated Base Band (BB) frames, regardless of PLP indices, construction of T2 frames is complicated. In the present paper, we present an algorithm arranging randomly produced BB frames to build T2 frames, complying with the DVB-T2 standard. The proposed method is centered on allocating memory space to each PLP, based on configurable PLP information and storing BB frames in an external memory. In addition to such an algorithm, DVB-T2 modulator is implemented in a Field Programmable Gate Array (FPGA) device.","PeriodicalId":226552,"journal":{"name":"2011 11th International Symposium on Communications & Information Technologies (ISCIT)","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115011988","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Human action recognition using direction histograms of optical flow 基于光流方向直方图的人体动作识别
Kanokphan Lertniphonphan, S. Aramvith, T. Chalidabhongse
Recognizing human actions is a challenging research area due to the complexity and variation of human's appearances and postures, the variation of camera settings, and angles. In this paper, we introduce a motion descriptor based on direction of optical flow for human action recognition. The directional value of a silhouette is divided into small regions. In each region, the normalized direction histogram of optical flow is computed. The motion vector is the values of a histogram in every region respective concatenation. The vectors are smoothed in time domain by moving average to reduce the motion variation and noise. For the training process, the motion vectors of the training set are clustered by K-mean to represent action. The clustered data group the similar posture together and is represented by the cluster centers. The centers are used to compare input frames by computing distance and using K-nearest neighbor to classify action. The experimental results show that K-mean clustering can group the similar pose together. The motion feature can be used to classify action in a low resolution image with a small number of reference vectors.
由于人的外表和姿势的复杂性和多样性,以及相机设置和角度的变化,识别人类的行为是一个具有挑战性的研究领域。本文提出了一种基于光流方向的运动描述子,用于人体动作识别。轮廓的方向值被划分成小区域。在每个区域计算归一化的光流方向直方图。运动矢量是每个区域各自拼接的直方图的值。通过移动平均在时域对矢量进行平滑处理,减少了运动变化和噪声。在训练过程中,训练集的运动向量通过K-mean聚类来表示动作。聚类数据将相似的姿态组合在一起,用聚类中心表示。这些中心通过计算距离来比较输入帧,并使用k近邻对动作进行分类。实验结果表明,k -均值聚类可以将相似姿态聚在一起。运动特征可以用于在具有少量参考向量的低分辨率图像中对动作进行分类。
{"title":"Human action recognition using direction histograms of optical flow","authors":"Kanokphan Lertniphonphan, S. Aramvith, T. Chalidabhongse","doi":"10.1109/ISCIT.2011.6089701","DOIUrl":"https://doi.org/10.1109/ISCIT.2011.6089701","url":null,"abstract":"Recognizing human actions is a challenging research area due to the complexity and variation of human's appearances and postures, the variation of camera settings, and angles. In this paper, we introduce a motion descriptor based on direction of optical flow for human action recognition. The directional value of a silhouette is divided into small regions. In each region, the normalized direction histogram of optical flow is computed. The motion vector is the values of a histogram in every region respective concatenation. The vectors are smoothed in time domain by moving average to reduce the motion variation and noise. For the training process, the motion vectors of the training set are clustered by K-mean to represent action. The clustered data group the similar posture together and is represented by the cluster centers. The centers are used to compare input frames by computing distance and using K-nearest neighbor to classify action. The experimental results show that K-mean clustering can group the similar pose together. The motion feature can be used to classify action in a low resolution image with a small number of reference vectors.","PeriodicalId":226552,"journal":{"name":"2011 11th International Symposium on Communications & Information Technologies (ISCIT)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114691732","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 29
Coordinated multi-point transmission with limited feedback for LTE-advanced LTE-advanced有限反馈协调多点传输
Yan Li, J. Ge, Cheng Shen, Jing Li, Wang Miao
Coordinated Multi-Point transmission (CoMP) has been recognized as one of the most promising technologies in the 4th generation (4G) cellular systems. It can significantly increase the spectral efficiency by combining the data from different eNBs. However, the benefits come at the cost of the increased feedback overhead. In the downlink frequency division duplex (FDD) systems, UEs need to feedback their channel state information (CSI) to the eNBs. As the feedback channel is limited, the quantization of the channel coefficients is necessary. In the conventional noncooperative networks, the feedback overhead can be reduced by allowing UEs with good channel qualities to feedback their CSIs, which is known as the selective feedback. In this paper, we extend this scheme to CoMP systems by the introduction of concatenated codebook. Since the quantization of the channel will result in quantization error, we define a new method to calculate the received SNRs from a specific channel taking quantization error into account. Based on this new method, UEs with weak link would not feedback the CSIs to the cooperative eNBs, which reduces the feedback overhead. We also derive the closed-form expression for the feedback overhead in terms of the SNR threshold. Finally, numerical simulations are provided to prove the effectiveness of our new method.
协调多点传输(CoMP)已被认为是第四代(4G)蜂窝系统中最有前途的技术之一。结合不同enb的数据,可以显著提高光谱效率。然而,这些好处是以增加反馈开销为代价的。在下行频分双工(FDD)系统中,终端需要将它们的信道状态信息(CSI)反馈给终端。由于反馈信道是有限的,信道系数的量化是必要的。在传统的非合作网络中,可以通过允许具有良好信道质量的ue对其csi进行反馈来减少反馈开销,这种反馈被称为选择性反馈。本文通过引入串联码本,将该方案推广到CoMP系统。由于信道的量化会导致量化误差,我们定义了一种考虑量化误差的新方法来计算来自特定信道的接收信噪比。基于该方法,具有弱链路的终端不会将csi反馈给合作的终端,从而减少了反馈开销。我们还推导了基于信噪比阈值的反馈开销的封闭表达式。最后,通过数值仿真验证了该方法的有效性。
{"title":"Coordinated multi-point transmission with limited feedback for LTE-advanced","authors":"Yan Li, J. Ge, Cheng Shen, Jing Li, Wang Miao","doi":"10.1109/ISCIT.2011.6092185","DOIUrl":"https://doi.org/10.1109/ISCIT.2011.6092185","url":null,"abstract":"Coordinated Multi-Point transmission (CoMP) has been recognized as one of the most promising technologies in the 4th generation (4G) cellular systems. It can significantly increase the spectral efficiency by combining the data from different eNBs. However, the benefits come at the cost of the increased feedback overhead. In the downlink frequency division duplex (FDD) systems, UEs need to feedback their channel state information (CSI) to the eNBs. As the feedback channel is limited, the quantization of the channel coefficients is necessary. In the conventional noncooperative networks, the feedback overhead can be reduced by allowing UEs with good channel qualities to feedback their CSIs, which is known as the selective feedback. In this paper, we extend this scheme to CoMP systems by the introduction of concatenated codebook. Since the quantization of the channel will result in quantization error, we define a new method to calculate the received SNRs from a specific channel taking quantization error into account. Based on this new method, UEs with weak link would not feedback the CSIs to the cooperative eNBs, which reduces the feedback overhead. We also derive the closed-form expression for the feedback overhead in terms of the SNR threshold. Finally, numerical simulations are provided to prove the effectiveness of our new method.","PeriodicalId":226552,"journal":{"name":"2011 11th International Symposium on Communications & Information Technologies (ISCIT)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125380542","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
A collision detection method based on power sensing and time-domain signal processing for wireless LAN 基于功率感知和时域信号处理的无线局域网碰撞检测方法
Peng Shao, A. Matsumoto, S. Aust, Tetsuya Ito, P. Davis
Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) access control protocol is used in the wireless LAN (WLAN) to suppress interferences. According to the CSMA/CA, if the transmitter does not receive an acknowledgment (ACK) control frame from the receiver after transmission, it will assume the previous transmission has failed and repeat the transmission. In order to evaluate the transmission channel and optimize the transmission parameters for improving the efficiency of data transmission it is necessary to distinguish the reason for transmission failure — collisions or attenuation in the transmission channel. Some enhanced collision detection methods for IEEE 802.11 WLAN have been proposed. In these schemes, the exchange of detection information is necessary, which could lead to additional collisions. So the detection information itself might not be received correctly due to collisions. In this paper, we propose a novel collision detection method, based on signal power sensing and time-domain signal processing, for transmitting stations in WLAN, which does not require the feedback of information from the receiver. With the calculation of collision frequency, the transmission parameters can be adjusted to improve the efficiency of data transmission. The effectiveness of the proposed collision detection method is verified in an experiment.
CSMA/CA (Carrier Sense Multiple Access with Collision Avoidance)访问控制协议用于无线局域网(WLAN)中抑制干扰。根据CSMA/CA,如果发送方在发送后没有收到接收方的确认(ACK)控制帧,它将假定之前的传输失败并重复传输。为了对传输信道进行评价和优化传输参数以提高数据传输效率,必须区分传输失败的原因——传输信道中的碰撞或衰减。针对IEEE 802.11无线局域网提出了一些增强的碰撞检测方法。在这些方案中,检测信息的交换是必要的,这可能导致额外的碰撞。因此,由于碰撞,检测信息本身可能无法正确接收。本文提出了一种基于信号功率感知和时域信号处理的无线局域网发射站碰撞检测方法,该方法不需要接收端反馈信息。通过对碰撞频率的计算,可以调整传输参数,提高数据传输效率。实验验证了所提出的碰撞检测方法的有效性。
{"title":"A collision detection method based on power sensing and time-domain signal processing for wireless LAN","authors":"Peng Shao, A. Matsumoto, S. Aust, Tetsuya Ito, P. Davis","doi":"10.1109/ISCIT.2011.6089730","DOIUrl":"https://doi.org/10.1109/ISCIT.2011.6089730","url":null,"abstract":"Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) access control protocol is used in the wireless LAN (WLAN) to suppress interferences. According to the CSMA/CA, if the transmitter does not receive an acknowledgment (ACK) control frame from the receiver after transmission, it will assume the previous transmission has failed and repeat the transmission. In order to evaluate the transmission channel and optimize the transmission parameters for improving the efficiency of data transmission it is necessary to distinguish the reason for transmission failure — collisions or attenuation in the transmission channel. Some enhanced collision detection methods for IEEE 802.11 WLAN have been proposed. In these schemes, the exchange of detection information is necessary, which could lead to additional collisions. So the detection information itself might not be received correctly due to collisions. In this paper, we propose a novel collision detection method, based on signal power sensing and time-domain signal processing, for transmitting stations in WLAN, which does not require the feedback of information from the receiver. With the calculation of collision frequency, the transmission parameters can be adjusted to improve the efficiency of data transmission. The effectiveness of the proposed collision detection method is verified in an experiment.","PeriodicalId":226552,"journal":{"name":"2011 11th International Symposium on Communications & Information Technologies (ISCIT)","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116439105","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Constructing (k, r)-connected dominating sets for robust backbone in wireless sensor networks 构造无线传感器网络鲁棒骨干(k, r)连通支配集
Chan Zheng, Yiqing Zhang, Ling Yin
Connected dominated subsets (CDS) of nodes in wireless sensor network are always selected to form a virtual backbone. Construction of r-hop connected k-dominating sets ((k, r)-CDS) can reduce the size of CDS and the total amount of information to be transmitted. Their multiple dominating properties can provide higher fault tolerance and robustness as well. In this paper a (k, r)-CDS construction approximation algorithm for wireless sensor and ad-hoc networks is presented. The main strategy is partition to clusters, from which the r-hop k-dominating set nodes ((k, r)-DS) are selected separately. Then (k, r)-DS are connected together to form (k, r)-CDS. Extensive simulations according to the algorithm steps have been conducted. Performance with detailed analysis has been shown at last.
在无线传感器网络中,总是选择节点的连接主导子集(CDS)来组成虚拟主干。构造r-hop连接的k-支配集((k, r)-CDS)可以减小CDS的大小和需要传输的信息总量。它们的多重支配特性可以提供更高的容错性和鲁棒性。本文提出了无线传感器网络和自组织网络的a (k, r)-CDS构造近似算法。主要策略是划分为簇,从中分别选择r-hop k-支配集节点((k, r)-DS)。然后将(k, r)-DS连接在一起形成(k, r)-CDS。根据算法步骤进行了大量的仿真。最后给出了具体的性能分析。
{"title":"Constructing (k, r)-connected dominating sets for robust backbone in wireless sensor networks","authors":"Chan Zheng, Yiqing Zhang, Ling Yin","doi":"10.1109/ISCIT.2011.6089724","DOIUrl":"https://doi.org/10.1109/ISCIT.2011.6089724","url":null,"abstract":"Connected dominated subsets (CDS) of nodes in wireless sensor network are always selected to form a virtual backbone. Construction of r-hop connected k-dominating sets ((k, r)-CDS) can reduce the size of CDS and the total amount of information to be transmitted. Their multiple dominating properties can provide higher fault tolerance and robustness as well. In this paper a (k, r)-CDS construction approximation algorithm for wireless sensor and ad-hoc networks is presented. The main strategy is partition to clusters, from which the r-hop k-dominating set nodes ((k, r)-DS) are selected separately. Then (k, r)-DS are connected together to form (k, r)-CDS. Extensive simulations according to the algorithm steps have been conducted. Performance with detailed analysis has been shown at last.","PeriodicalId":226552,"journal":{"name":"2011 11th International Symposium on Communications & Information Technologies (ISCIT)","volume":"303 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114523936","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Design and analysis of a MAC protocol for wireless body area network using wakeup radio 基于唤醒无线电的无线体域网络MAC协议设计与分析
M. A. Ameen, N. Ullah, K. Kwak
Wireless sensor networks are widely used for healthcare applications. A new field known as wireless body area networks (WBAN) has emerged to support this area. An energy efficient medium access control (MAC) protocol can increase the performance of such a network. The major requirements for a WBAN MAC protocol are energy efficiency and low delay. In this paper, we propose a MAC protocol for WBAN using wakeup radio mechanism. We present a detailed analytical model for both energy consumption and delay. We have simulated the proposed MAC and compared the results. It is found that the proposed MAC has improved the performance in terms of energy consumption and delay.
无线传感器网络广泛用于医疗保健应用。无线体域网络(WBAN)的出现支持了这一领域的发展。一种节能的介质访问控制(MAC)协议可以提高这种网络的性能。WBAN MAC协议的主要要求是能源效率和低延迟。本文提出了一种基于唤醒无线电机制的无线局域网MAC协议。我们提出了一个详细的能量消耗和延迟的分析模型。我们对所提出的MAC进行了仿真,并对结果进行了比较。实验结果表明,所提出的MAC在能耗和时延方面都有较好的改善。
{"title":"Design and analysis of a MAC protocol for wireless body area network using wakeup radio","authors":"M. A. Ameen, N. Ullah, K. Kwak","doi":"10.1109/ISCIT.2011.6089719","DOIUrl":"https://doi.org/10.1109/ISCIT.2011.6089719","url":null,"abstract":"Wireless sensor networks are widely used for healthcare applications. A new field known as wireless body area networks (WBAN) has emerged to support this area. An energy efficient medium access control (MAC) protocol can increase the performance of such a network. The major requirements for a WBAN MAC protocol are energy efficiency and low delay. In this paper, we propose a MAC protocol for WBAN using wakeup radio mechanism. We present a detailed analytical model for both energy consumption and delay. We have simulated the proposed MAC and compared the results. It is found that the proposed MAC has improved the performance in terms of energy consumption and delay.","PeriodicalId":226552,"journal":{"name":"2011 11th International Symposium on Communications & Information Technologies (ISCIT)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115061374","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 25
A novel MIMO relay FM-DCSK UWB system for low-rate and low-power WPAN applications 一种新型的MIMO中继FM-DCSK UWB系统,用于低速率和低功耗WPAN应用
Yi Fang, Shaohua Hong, L. Wang
In this paper, we propose a novel multi-access multiple-input multiple-output (MIMO) relay frequency-modulated differential chaos shift keying (FM-DCSK) ultra-wideband (UWB) system with decode-and-forward (DF) relaying protocol, where the relay intelligently employs multiple antennas to greatly strengthen the robustness against signal fading in wireless networks. Simulation results show that the bit error rate (BER) performance of the proposed system is remarkably better than the conventional multi-access FM-DCSK UWB systems under indoor residential environments of the IEEE 802.15.4a standard by means of obtaining the spatial diversity gain. Furthermore, the influence of antenna number of relay to the proposed system is also investigated to provide a good compromise between the system performance and implementation complexity. For these advantages above, the proposed system can be seen as a viable alternative to other FM-DCSK UWB schemes for the low-rate and low-power applications in wireless personal area networks (WPAN).
本文提出了一种新型的多址多输入多输出(MIMO)中继调频差分混沌移控(FM-DCSK)超宽带(UWB)系统,该系统采用解码转发(DF)中继协议,该中继智能地采用多天线,大大增强了无线网络中对信号衰落的鲁棒性。仿真结果表明,通过获取空间分集增益,在IEEE 802.15.a标准的室内住宅环境下,该系统的误码率(BER)性能明显优于传统的FM-DCSK多址UWB系统。此外,还研究了中继天线数对所提出系统的影响,以便在系统性能和实现复杂性之间提供一个良好的折衷。由于上述优点,所提出的系统可以被视为无线个人区域网络(WPAN)中低速率和低功耗应用的其他FM-DCSK UWB方案的可行替代方案。
{"title":"A novel MIMO relay FM-DCSK UWB system for low-rate and low-power WPAN applications","authors":"Yi Fang, Shaohua Hong, L. Wang","doi":"10.1109/ISCIT.2011.6089721","DOIUrl":"https://doi.org/10.1109/ISCIT.2011.6089721","url":null,"abstract":"In this paper, we propose a novel multi-access multiple-input multiple-output (MIMO) relay frequency-modulated differential chaos shift keying (FM-DCSK) ultra-wideband (UWB) system with decode-and-forward (DF) relaying protocol, where the relay intelligently employs multiple antennas to greatly strengthen the robustness against signal fading in wireless networks. Simulation results show that the bit error rate (BER) performance of the proposed system is remarkably better than the conventional multi-access FM-DCSK UWB systems under indoor residential environments of the IEEE 802.15.4a standard by means of obtaining the spatial diversity gain. Furthermore, the influence of antenna number of relay to the proposed system is also investigated to provide a good compromise between the system performance and implementation complexity. For these advantages above, the proposed system can be seen as a viable alternative to other FM-DCSK UWB schemes for the low-rate and low-power applications in wireless personal area networks (WPAN).","PeriodicalId":226552,"journal":{"name":"2011 11th International Symposium on Communications & Information Technologies (ISCIT)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121165585","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
2011 11th International Symposium on Communications & Information Technologies (ISCIT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1