首页 > 最新文献

2011 11th International Symposium on Communications & Information Technologies (ISCIT)最新文献

英文 中文
Distributed fair resource allocation in wireless multi-user multi-relay networks with heterogeneous rate constraints 异构速率约束下无线多用户多中继网络的分布式公平资源分配
Yanyan Shen, G. Feng, Bo Yang, X. Guan
This paper focuses on the problem of fair resource allocation in wireless multi-user multi-relay networks where both constant-rate users and variable-rate users exist. The problem is formulated as an optimization problem targeting at finding the Nash bargaining solution for the variable-rate users subject to a set of users' rate constraints and a set of relay power constraints. The formulated problem is proven to be a concave maximization problem, and the dual decomposition method is employed to find the optimal solution. Based on this method, a distributed algorithm is then proposed and its convergence is proved as well. Finally, simulations validate the convergence and fairness of the proposed algorithm.
研究了无线多用户多中继网络中存在固定速率用户和可变速率用户的公平资源分配问题。该问题被表述为一个优化问题,其目标是在一组用户的费率约束和一组中继功率约束下寻找可变费率用户的纳什议价解。证明了所提问题是一个凹最大化问题,并采用对偶分解方法求最优解。在此基础上,提出了一种分布式算法,并证明了其收敛性。最后通过仿真验证了算法的收敛性和公平性。
{"title":"Distributed fair resource allocation in wireless multi-user multi-relay networks with heterogeneous rate constraints","authors":"Yanyan Shen, G. Feng, Bo Yang, X. Guan","doi":"10.1109/ISCIT.2011.6089948","DOIUrl":"https://doi.org/10.1109/ISCIT.2011.6089948","url":null,"abstract":"This paper focuses on the problem of fair resource allocation in wireless multi-user multi-relay networks where both constant-rate users and variable-rate users exist. The problem is formulated as an optimization problem targeting at finding the Nash bargaining solution for the variable-rate users subject to a set of users' rate constraints and a set of relay power constraints. The formulated problem is proven to be a concave maximization problem, and the dual decomposition method is employed to find the optimal solution. Based on this method, a distributed algorithm is then proposed and its convergence is proved as well. Finally, simulations validate the convergence and fairness of the proposed algorithm.","PeriodicalId":226552,"journal":{"name":"2011 11th International Symposium on Communications & Information Technologies (ISCIT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126282594","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Proposal on the concealment of the network topology in IPv6 IPv6中网络拓扑隐藏问题的研究
Toru Kuboshiki, Hidekazu Suzuki, A. Watanabe
With a possible exhaustion of global IPv4 addresses, shifting to IPv6 is thought to be inevitable. However, when the shifting to IPv6 actually occurs, network topology could be inferred from addresses in the organization. Thus, as a means to conceal network topology, various methods, including the use of Mobile IPv6 and the setting-up of routers for host routes, are being proposed. However, redundant routings become a problem in the case of Mobile IPv6, and increases in the routing tables become a problem in the case of host routing. In this paper, we define new addresses to conceal network topology and propose a communication method using these addresses. We also describe our idea of implementing our method.
随着全球IPv4地址可能耗尽,转向IPv6被认为是不可避免的。然而,当迁移到IPv6时,可以从组织中的地址推断出网络拓扑结构。因此,作为一种隐藏网络拓扑的手段,各种方法,包括使用移动IPv6和为主机路由设置路由器,被提出。但是,在移动IPv6中存在冗余路由的问题,在主机路由中存在路由表增加的问题。在本文中,我们定义了新的地址来隐藏网络拓扑,并提出了一种利用这些地址的通信方法。我们还描述了实现方法的想法。
{"title":"Proposal on the concealment of the network topology in IPv6","authors":"Toru Kuboshiki, Hidekazu Suzuki, A. Watanabe","doi":"10.1109/ISCIT.2011.6092167","DOIUrl":"https://doi.org/10.1109/ISCIT.2011.6092167","url":null,"abstract":"With a possible exhaustion of global IPv4 addresses, shifting to IPv6 is thought to be inevitable. However, when the shifting to IPv6 actually occurs, network topology could be inferred from addresses in the organization. Thus, as a means to conceal network topology, various methods, including the use of Mobile IPv6 and the setting-up of routers for host routes, are being proposed. However, redundant routings become a problem in the case of Mobile IPv6, and increases in the routing tables become a problem in the case of host routing. In this paper, we define new addresses to conceal network topology and propose a communication method using these addresses. We also describe our idea of implementing our method.","PeriodicalId":226552,"journal":{"name":"2011 11th International Symposium on Communications & Information Technologies (ISCIT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134106377","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Dynamic traffic prioritization scheme for multihop tactical networks 多跳战术网络的动态流量优先级方案
Dongho Lee, Kwangsung Ju, K. Chung
Multihop tactical network applications require that mission-critical data should be guaranteed to be delivered to their corresponding targets in time. However, end-to-end QoS (Quality of Service) assurance in multihop networks is a very challenging topic. Several schemes have been proposed to provide end-to-end delay assurance for multihop wireless network environment. However, these schemes do not consider the situation that the network is overloaded and burst collision is occurred. In this paper, we propose the dynamic traffic prioritization scheme for multihop tactical networks. The proposed scheme dynamically assigns priorities to traffic according to network status and the newly defined traffic categories in order to achieve guaranteed end-to-end QoS in multihop tactical networks. In addition, when the burst collision is occurred, the proposed scheme satisfies the requirement of mission-critical data by sacrificing the QoS requirement of non-mission-critical data.
多跳战术网络应用要求关键任务数据能够及时传递到相应的目标。然而,多跳网络中的端到端服务质量保证是一个非常具有挑战性的课题。针对多跳无线网络环境,提出了几种提供端到端时延保证的方案。但是,这些方案没有考虑到网络过载和突发冲突的情况。本文提出了一种多跳战术网络的动态流量优先级方案。该方案根据网络状态和新定义的流量分类动态分配流量优先级,以保证多跳战术网络的端到端QoS。此外,当发生突发冲突时,该方案通过牺牲非关键数据的QoS要求来满足关键数据的需求。
{"title":"Dynamic traffic prioritization scheme for multihop tactical networks","authors":"Dongho Lee, Kwangsung Ju, K. Chung","doi":"10.1109/ISCIT.2011.6089960","DOIUrl":"https://doi.org/10.1109/ISCIT.2011.6089960","url":null,"abstract":"Multihop tactical network applications require that mission-critical data should be guaranteed to be delivered to their corresponding targets in time. However, end-to-end QoS (Quality of Service) assurance in multihop networks is a very challenging topic. Several schemes have been proposed to provide end-to-end delay assurance for multihop wireless network environment. However, these schemes do not consider the situation that the network is overloaded and burst collision is occurred. In this paper, we propose the dynamic traffic prioritization scheme for multihop tactical networks. The proposed scheme dynamically assigns priorities to traffic according to network status and the newly defined traffic categories in order to achieve guaranteed end-to-end QoS in multihop tactical networks. In addition, when the burst collision is occurred, the proposed scheme satisfies the requirement of mission-critical data by sacrificing the QoS requirement of non-mission-critical data.","PeriodicalId":226552,"journal":{"name":"2011 11th International Symposium on Communications & Information Technologies (ISCIT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132746133","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Robust blind beamforming algorithm via the oblique projection method 斜投影法鲁棒盲波束形成算法
Xin Song, Jinkuan Wang, Qiuming Li, Jingguo Ren, Han Wang
A novel robust least squares constant modulus algorithm (LSCMA) is proposed for blind adaptive beamforming, which is based on explicit modeling of uncertainty in the desired signal array. To improve robustness, the weight vector is optimized to involve minimization of cost function, while imposing the oblique projection constraint on the weight vector and maintaining a distortionless response for the worst-case signal steering vector. The proposed algorithm appears to be an appealing technique for blind adaptive beamforming that combines excellent robustness with low computational complexity. The numerical experiments have been carried out to demonstrate the superiority of the proposed algorithm on beampattern control and output SINR enhancement.
针对盲自适应波束形成问题,提出了一种基于信号阵列不确定性显式建模的鲁棒最小二乘常模算法(LSCMA)。为了提高鲁棒性,对权重向量进行了优化,使代价函数最小化,同时对权重向量施加斜投影约束,并对最坏情况下的信号转向向量保持无失真响应。该算法具有良好的鲁棒性和较低的计算复杂度,是一种有吸引力的盲自适应波束形成技术。数值实验证明了该算法在波束方向控制和输出信噪比增强方面的优越性。
{"title":"Robust blind beamforming algorithm via the oblique projection method","authors":"Xin Song, Jinkuan Wang, Qiuming Li, Jingguo Ren, Han Wang","doi":"10.1109/ISCIT.2011.6092166","DOIUrl":"https://doi.org/10.1109/ISCIT.2011.6092166","url":null,"abstract":"A novel robust least squares constant modulus algorithm (LSCMA) is proposed for blind adaptive beamforming, which is based on explicit modeling of uncertainty in the desired signal array. To improve robustness, the weight vector is optimized to involve minimization of cost function, while imposing the oblique projection constraint on the weight vector and maintaining a distortionless response for the worst-case signal steering vector. The proposed algorithm appears to be an appealing technique for blind adaptive beamforming that combines excellent robustness with low computational complexity. The numerical experiments have been carried out to demonstrate the superiority of the proposed algorithm on beampattern control and output SINR enhancement.","PeriodicalId":226552,"journal":{"name":"2011 11th International Symposium on Communications & Information Technologies (ISCIT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128035496","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A collision detection method based on power sensing and time-domain signal processing for wireless LAN 基于功率感知和时域信号处理的无线局域网碰撞检测方法
Peng Shao, A. Matsumoto, S. Aust, Tetsuya Ito, P. Davis
Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) access control protocol is used in the wireless LAN (WLAN) to suppress interferences. According to the CSMA/CA, if the transmitter does not receive an acknowledgment (ACK) control frame from the receiver after transmission, it will assume the previous transmission has failed and repeat the transmission. In order to evaluate the transmission channel and optimize the transmission parameters for improving the efficiency of data transmission it is necessary to distinguish the reason for transmission failure — collisions or attenuation in the transmission channel. Some enhanced collision detection methods for IEEE 802.11 WLAN have been proposed. In these schemes, the exchange of detection information is necessary, which could lead to additional collisions. So the detection information itself might not be received correctly due to collisions. In this paper, we propose a novel collision detection method, based on signal power sensing and time-domain signal processing, for transmitting stations in WLAN, which does not require the feedback of information from the receiver. With the calculation of collision frequency, the transmission parameters can be adjusted to improve the efficiency of data transmission. The effectiveness of the proposed collision detection method is verified in an experiment.
CSMA/CA (Carrier Sense Multiple Access with Collision Avoidance)访问控制协议用于无线局域网(WLAN)中抑制干扰。根据CSMA/CA,如果发送方在发送后没有收到接收方的确认(ACK)控制帧,它将假定之前的传输失败并重复传输。为了对传输信道进行评价和优化传输参数以提高数据传输效率,必须区分传输失败的原因——传输信道中的碰撞或衰减。针对IEEE 802.11无线局域网提出了一些增强的碰撞检测方法。在这些方案中,检测信息的交换是必要的,这可能导致额外的碰撞。因此,由于碰撞,检测信息本身可能无法正确接收。本文提出了一种基于信号功率感知和时域信号处理的无线局域网发射站碰撞检测方法,该方法不需要接收端反馈信息。通过对碰撞频率的计算,可以调整传输参数,提高数据传输效率。实验验证了所提出的碰撞检测方法的有效性。
{"title":"A collision detection method based on power sensing and time-domain signal processing for wireless LAN","authors":"Peng Shao, A. Matsumoto, S. Aust, Tetsuya Ito, P. Davis","doi":"10.1109/ISCIT.2011.6089730","DOIUrl":"https://doi.org/10.1109/ISCIT.2011.6089730","url":null,"abstract":"Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) access control protocol is used in the wireless LAN (WLAN) to suppress interferences. According to the CSMA/CA, if the transmitter does not receive an acknowledgment (ACK) control frame from the receiver after transmission, it will assume the previous transmission has failed and repeat the transmission. In order to evaluate the transmission channel and optimize the transmission parameters for improving the efficiency of data transmission it is necessary to distinguish the reason for transmission failure — collisions or attenuation in the transmission channel. Some enhanced collision detection methods for IEEE 802.11 WLAN have been proposed. In these schemes, the exchange of detection information is necessary, which could lead to additional collisions. So the detection information itself might not be received correctly due to collisions. In this paper, we propose a novel collision detection method, based on signal power sensing and time-domain signal processing, for transmitting stations in WLAN, which does not require the feedback of information from the receiver. With the calculation of collision frequency, the transmission parameters can be adjusted to improve the efficiency of data transmission. The effectiveness of the proposed collision detection method is verified in an experiment.","PeriodicalId":226552,"journal":{"name":"2011 11th International Symposium on Communications & Information Technologies (ISCIT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116439105","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Constructing (k, r)-connected dominating sets for robust backbone in wireless sensor networks 构造无线传感器网络鲁棒骨干(k, r)连通支配集
Chan Zheng, Yiqing Zhang, Ling Yin
Connected dominated subsets (CDS) of nodes in wireless sensor network are always selected to form a virtual backbone. Construction of r-hop connected k-dominating sets ((k, r)-CDS) can reduce the size of CDS and the total amount of information to be transmitted. Their multiple dominating properties can provide higher fault tolerance and robustness as well. In this paper a (k, r)-CDS construction approximation algorithm for wireless sensor and ad-hoc networks is presented. The main strategy is partition to clusters, from which the r-hop k-dominating set nodes ((k, r)-DS) are selected separately. Then (k, r)-DS are connected together to form (k, r)-CDS. Extensive simulations according to the algorithm steps have been conducted. Performance with detailed analysis has been shown at last.
在无线传感器网络中,总是选择节点的连接主导子集(CDS)来组成虚拟主干。构造r-hop连接的k-支配集((k, r)-CDS)可以减小CDS的大小和需要传输的信息总量。它们的多重支配特性可以提供更高的容错性和鲁棒性。本文提出了无线传感器网络和自组织网络的a (k, r)-CDS构造近似算法。主要策略是划分为簇,从中分别选择r-hop k-支配集节点((k, r)-DS)。然后将(k, r)-DS连接在一起形成(k, r)-CDS。根据算法步骤进行了大量的仿真。最后给出了具体的性能分析。
{"title":"Constructing (k, r)-connected dominating sets for robust backbone in wireless sensor networks","authors":"Chan Zheng, Yiqing Zhang, Ling Yin","doi":"10.1109/ISCIT.2011.6089724","DOIUrl":"https://doi.org/10.1109/ISCIT.2011.6089724","url":null,"abstract":"Connected dominated subsets (CDS) of nodes in wireless sensor network are always selected to form a virtual backbone. Construction of r-hop connected k-dominating sets ((k, r)-CDS) can reduce the size of CDS and the total amount of information to be transmitted. Their multiple dominating properties can provide higher fault tolerance and robustness as well. In this paper a (k, r)-CDS construction approximation algorithm for wireless sensor and ad-hoc networks is presented. The main strategy is partition to clusters, from which the r-hop k-dominating set nodes ((k, r)-DS) are selected separately. Then (k, r)-DS are connected together to form (k, r)-CDS. Extensive simulations according to the algorithm steps have been conducted. Performance with detailed analysis has been shown at last.","PeriodicalId":226552,"journal":{"name":"2011 11th International Symposium on Communications & Information Technologies (ISCIT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114523936","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Coordinated multi-point transmission with limited feedback for LTE-advanced LTE-advanced有限反馈协调多点传输
Yan Li, J. Ge, Cheng Shen, Jing Li, Wang Miao
Coordinated Multi-Point transmission (CoMP) has been recognized as one of the most promising technologies in the 4th generation (4G) cellular systems. It can significantly increase the spectral efficiency by combining the data from different eNBs. However, the benefits come at the cost of the increased feedback overhead. In the downlink frequency division duplex (FDD) systems, UEs need to feedback their channel state information (CSI) to the eNBs. As the feedback channel is limited, the quantization of the channel coefficients is necessary. In the conventional noncooperative networks, the feedback overhead can be reduced by allowing UEs with good channel qualities to feedback their CSIs, which is known as the selective feedback. In this paper, we extend this scheme to CoMP systems by the introduction of concatenated codebook. Since the quantization of the channel will result in quantization error, we define a new method to calculate the received SNRs from a specific channel taking quantization error into account. Based on this new method, UEs with weak link would not feedback the CSIs to the cooperative eNBs, which reduces the feedback overhead. We also derive the closed-form expression for the feedback overhead in terms of the SNR threshold. Finally, numerical simulations are provided to prove the effectiveness of our new method.
协调多点传输(CoMP)已被认为是第四代(4G)蜂窝系统中最有前途的技术之一。结合不同enb的数据,可以显著提高光谱效率。然而,这些好处是以增加反馈开销为代价的。在下行频分双工(FDD)系统中,终端需要将它们的信道状态信息(CSI)反馈给终端。由于反馈信道是有限的,信道系数的量化是必要的。在传统的非合作网络中,可以通过允许具有良好信道质量的ue对其csi进行反馈来减少反馈开销,这种反馈被称为选择性反馈。本文通过引入串联码本,将该方案推广到CoMP系统。由于信道的量化会导致量化误差,我们定义了一种考虑量化误差的新方法来计算来自特定信道的接收信噪比。基于该方法,具有弱链路的终端不会将csi反馈给合作的终端,从而减少了反馈开销。我们还推导了基于信噪比阈值的反馈开销的封闭表达式。最后,通过数值仿真验证了该方法的有效性。
{"title":"Coordinated multi-point transmission with limited feedback for LTE-advanced","authors":"Yan Li, J. Ge, Cheng Shen, Jing Li, Wang Miao","doi":"10.1109/ISCIT.2011.6092185","DOIUrl":"https://doi.org/10.1109/ISCIT.2011.6092185","url":null,"abstract":"Coordinated Multi-Point transmission (CoMP) has been recognized as one of the most promising technologies in the 4th generation (4G) cellular systems. It can significantly increase the spectral efficiency by combining the data from different eNBs. However, the benefits come at the cost of the increased feedback overhead. In the downlink frequency division duplex (FDD) systems, UEs need to feedback their channel state information (CSI) to the eNBs. As the feedback channel is limited, the quantization of the channel coefficients is necessary. In the conventional noncooperative networks, the feedback overhead can be reduced by allowing UEs with good channel qualities to feedback their CSIs, which is known as the selective feedback. In this paper, we extend this scheme to CoMP systems by the introduction of concatenated codebook. Since the quantization of the channel will result in quantization error, we define a new method to calculate the received SNRs from a specific channel taking quantization error into account. Based on this new method, UEs with weak link would not feedback the CSIs to the cooperative eNBs, which reduces the feedback overhead. We also derive the closed-form expression for the feedback overhead in terms of the SNR threshold. Finally, numerical simulations are provided to prove the effectiveness of our new method.","PeriodicalId":226552,"journal":{"name":"2011 11th International Symposium on Communications & Information Technologies (ISCIT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125380542","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
A novel MIMO relay FM-DCSK UWB system for low-rate and low-power WPAN applications 一种新型的MIMO中继FM-DCSK UWB系统,用于低速率和低功耗WPAN应用
Yi Fang, Shaohua Hong, L. Wang
In this paper, we propose a novel multi-access multiple-input multiple-output (MIMO) relay frequency-modulated differential chaos shift keying (FM-DCSK) ultra-wideband (UWB) system with decode-and-forward (DF) relaying protocol, where the relay intelligently employs multiple antennas to greatly strengthen the robustness against signal fading in wireless networks. Simulation results show that the bit error rate (BER) performance of the proposed system is remarkably better than the conventional multi-access FM-DCSK UWB systems under indoor residential environments of the IEEE 802.15.4a standard by means of obtaining the spatial diversity gain. Furthermore, the influence of antenna number of relay to the proposed system is also investigated to provide a good compromise between the system performance and implementation complexity. For these advantages above, the proposed system can be seen as a viable alternative to other FM-DCSK UWB schemes for the low-rate and low-power applications in wireless personal area networks (WPAN).
本文提出了一种新型的多址多输入多输出(MIMO)中继调频差分混沌移控(FM-DCSK)超宽带(UWB)系统,该系统采用解码转发(DF)中继协议,该中继智能地采用多天线,大大增强了无线网络中对信号衰落的鲁棒性。仿真结果表明,通过获取空间分集增益,在IEEE 802.15.a标准的室内住宅环境下,该系统的误码率(BER)性能明显优于传统的FM-DCSK多址UWB系统。此外,还研究了中继天线数对所提出系统的影响,以便在系统性能和实现复杂性之间提供一个良好的折衷。由于上述优点,所提出的系统可以被视为无线个人区域网络(WPAN)中低速率和低功耗应用的其他FM-DCSK UWB方案的可行替代方案。
{"title":"A novel MIMO relay FM-DCSK UWB system for low-rate and low-power WPAN applications","authors":"Yi Fang, Shaohua Hong, L. Wang","doi":"10.1109/ISCIT.2011.6089721","DOIUrl":"https://doi.org/10.1109/ISCIT.2011.6089721","url":null,"abstract":"In this paper, we propose a novel multi-access multiple-input multiple-output (MIMO) relay frequency-modulated differential chaos shift keying (FM-DCSK) ultra-wideband (UWB) system with decode-and-forward (DF) relaying protocol, where the relay intelligently employs multiple antennas to greatly strengthen the robustness against signal fading in wireless networks. Simulation results show that the bit error rate (BER) performance of the proposed system is remarkably better than the conventional multi-access FM-DCSK UWB systems under indoor residential environments of the IEEE 802.15.4a standard by means of obtaining the spatial diversity gain. Furthermore, the influence of antenna number of relay to the proposed system is also investigated to provide a good compromise between the system performance and implementation complexity. For these advantages above, the proposed system can be seen as a viable alternative to other FM-DCSK UWB schemes for the low-rate and low-power applications in wireless personal area networks (WPAN).","PeriodicalId":226552,"journal":{"name":"2011 11th International Symposium on Communications & Information Technologies (ISCIT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121165585","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Design and analysis of a MAC protocol for wireless body area network using wakeup radio 基于唤醒无线电的无线体域网络MAC协议设计与分析
M. A. Ameen, N. Ullah, K. Kwak
Wireless sensor networks are widely used for healthcare applications. A new field known as wireless body area networks (WBAN) has emerged to support this area. An energy efficient medium access control (MAC) protocol can increase the performance of such a network. The major requirements for a WBAN MAC protocol are energy efficiency and low delay. In this paper, we propose a MAC protocol for WBAN using wakeup radio mechanism. We present a detailed analytical model for both energy consumption and delay. We have simulated the proposed MAC and compared the results. It is found that the proposed MAC has improved the performance in terms of energy consumption and delay.
无线传感器网络广泛用于医疗保健应用。无线体域网络(WBAN)的出现支持了这一领域的发展。一种节能的介质访问控制(MAC)协议可以提高这种网络的性能。WBAN MAC协议的主要要求是能源效率和低延迟。本文提出了一种基于唤醒无线电机制的无线局域网MAC协议。我们提出了一个详细的能量消耗和延迟的分析模型。我们对所提出的MAC进行了仿真,并对结果进行了比较。实验结果表明,所提出的MAC在能耗和时延方面都有较好的改善。
{"title":"Design and analysis of a MAC protocol for wireless body area network using wakeup radio","authors":"M. A. Ameen, N. Ullah, K. Kwak","doi":"10.1109/ISCIT.2011.6089719","DOIUrl":"https://doi.org/10.1109/ISCIT.2011.6089719","url":null,"abstract":"Wireless sensor networks are widely used for healthcare applications. A new field known as wireless body area networks (WBAN) has emerged to support this area. An energy efficient medium access control (MAC) protocol can increase the performance of such a network. The major requirements for a WBAN MAC protocol are energy efficiency and low delay. In this paper, we propose a MAC protocol for WBAN using wakeup radio mechanism. We present a detailed analytical model for both energy consumption and delay. We have simulated the proposed MAC and compared the results. It is found that the proposed MAC has improved the performance in terms of energy consumption and delay.","PeriodicalId":226552,"journal":{"name":"2011 11th International Symposium on Communications & Information Technologies (ISCIT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115061374","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 25
Human action recognition using direction histograms of optical flow 基于光流方向直方图的人体动作识别
Kanokphan Lertniphonphan, S. Aramvith, T. Chalidabhongse
Recognizing human actions is a challenging research area due to the complexity and variation of human's appearances and postures, the variation of camera settings, and angles. In this paper, we introduce a motion descriptor based on direction of optical flow for human action recognition. The directional value of a silhouette is divided into small regions. In each region, the normalized direction histogram of optical flow is computed. The motion vector is the values of a histogram in every region respective concatenation. The vectors are smoothed in time domain by moving average to reduce the motion variation and noise. For the training process, the motion vectors of the training set are clustered by K-mean to represent action. The clustered data group the similar posture together and is represented by the cluster centers. The centers are used to compare input frames by computing distance and using K-nearest neighbor to classify action. The experimental results show that K-mean clustering can group the similar pose together. The motion feature can be used to classify action in a low resolution image with a small number of reference vectors.
由于人的外表和姿势的复杂性和多样性,以及相机设置和角度的变化,识别人类的行为是一个具有挑战性的研究领域。本文提出了一种基于光流方向的运动描述子,用于人体动作识别。轮廓的方向值被划分成小区域。在每个区域计算归一化的光流方向直方图。运动矢量是每个区域各自拼接的直方图的值。通过移动平均在时域对矢量进行平滑处理,减少了运动变化和噪声。在训练过程中,训练集的运动向量通过K-mean聚类来表示动作。聚类数据将相似的姿态组合在一起,用聚类中心表示。这些中心通过计算距离来比较输入帧,并使用k近邻对动作进行分类。实验结果表明,k -均值聚类可以将相似姿态聚在一起。运动特征可以用于在具有少量参考向量的低分辨率图像中对动作进行分类。
{"title":"Human action recognition using direction histograms of optical flow","authors":"Kanokphan Lertniphonphan, S. Aramvith, T. Chalidabhongse","doi":"10.1109/ISCIT.2011.6089701","DOIUrl":"https://doi.org/10.1109/ISCIT.2011.6089701","url":null,"abstract":"Recognizing human actions is a challenging research area due to the complexity and variation of human's appearances and postures, the variation of camera settings, and angles. In this paper, we introduce a motion descriptor based on direction of optical flow for human action recognition. The directional value of a silhouette is divided into small regions. In each region, the normalized direction histogram of optical flow is computed. The motion vector is the values of a histogram in every region respective concatenation. The vectors are smoothed in time domain by moving average to reduce the motion variation and noise. For the training process, the motion vectors of the training set are clustered by K-mean to represent action. The clustered data group the similar posture together and is represented by the cluster centers. The centers are used to compare input frames by computing distance and using K-nearest neighbor to classify action. The experimental results show that K-mean clustering can group the similar pose together. The motion feature can be used to classify action in a low resolution image with a small number of reference vectors.","PeriodicalId":226552,"journal":{"name":"2011 11th International Symposium on Communications & Information Technologies (ISCIT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114691732","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 29
期刊
2011 11th International Symposium on Communications & Information Technologies (ISCIT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1