首页 > 最新文献

2018 20th International Conference on Advanced Communication Technology (ICACT)最新文献

英文 中文
Design of a 2.4 GHz high-performance mixer with current bleeding topology 2.4 GHz高性能流放拓扑混频器的设计
Pub Date : 2018-02-01 DOI: 10.23919/ICACT.2018.8323659
W. Lee, K. Tsang
The important characteristics of a mixer including high conversion gain, low noise, high dynamic range, low third-order intermodulation distortion and low unwanted leakage signals between ports have reconsidered. A double balanced Gilbert-cell with a class-A amplifier bleeding mixer (DBGC CAAB mixer) is designed and implemented. The voltage gain of 14 dB at class-A amplifier is used to magnifier the local oscillator (LO) signal. Current of class-A amplifier is injected into the Gibert mixer as a bleeding current to improve the performance of the trans-conductor stage. The DBGC CAAB mixer achieves a conversion gain of 17.5 dB at −14 dBm LO power, and the noise figure is suppressed from 45 dB to 10.7 dB. It is important to stress that the new configuration has a third-order intermodulation (HP3) at −9 dBm which is considered to be insignificant. The DBGC CAAB mixer is implemented by using 0.18-μm RFCMOS technology and operates at the 2.4 GHz ISM application with 10 MHz intermediate frequency. The power consumption is 12 mA at 1.5 V supply voltage.
重新考虑了混频器的重要特性,包括高转换增益、低噪声、高动态范围、低三阶互调失真和端口间低不必要的泄漏信号。设计并实现了一种带A类放血混频器(DBGC - CAAB混频器)的双平衡吉尔伯特单元。a类放大器的电压增益为14db,用于放大本振(LO)信号。为了提高跨导体级的性能,将a类放大器的电流作为出血性电流注入到Gibert混频器中。DBGC - CAAB混频器在- 14 dBm LO功率下实现17.5 dB的转换增益,噪声指数从45 dB抑制到10.7 dB。重要的是要强调,新配置在−9 dBm处具有三阶互调(HP3),这被认为是微不足道的。DBGC CAAB混频器采用0.18 μm RFCMOS技术实现,工作于2.4 GHz ISM应用,中频为10 MHz。在1.5 V供电电压下,功耗为12ma。
{"title":"Design of a 2.4 GHz high-performance mixer with current bleeding topology","authors":"W. Lee, K. Tsang","doi":"10.23919/ICACT.2018.8323659","DOIUrl":"https://doi.org/10.23919/ICACT.2018.8323659","url":null,"abstract":"The important characteristics of a mixer including high conversion gain, low noise, high dynamic range, low third-order intermodulation distortion and low unwanted leakage signals between ports have reconsidered. A double balanced Gilbert-cell with a class-A amplifier bleeding mixer (DBGC CAAB mixer) is designed and implemented. The voltage gain of 14 dB at class-A amplifier is used to magnifier the local oscillator (LO) signal. Current of class-A amplifier is injected into the Gibert mixer as a bleeding current to improve the performance of the trans-conductor stage. The DBGC CAAB mixer achieves a conversion gain of 17.5 dB at −14 dBm LO power, and the noise figure is suppressed from 45 dB to 10.7 dB. It is important to stress that the new configuration has a third-order intermodulation (HP3) at −9 dBm which is considered to be insignificant. The DBGC CAAB mixer is implemented by using 0.18-μm RFCMOS technology and operates at the 2.4 GHz ISM application with 10 MHz intermediate frequency. The power consumption is 12 mA at 1.5 V supply voltage.","PeriodicalId":228625,"journal":{"name":"2018 20th International Conference on Advanced Communication Technology (ICACT)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131625634","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The real-time session inspection method using heartbeat signal 基于心跳信号的实时会话检测方法
Pub Date : 2018-02-01 DOI: 10.23919/ICACT.2018.8323721
Jong-Beom Kim, Hyeon Yang, Kyeong Ho Park, S. Lee, S. Choi
In this paper, we present how to store the session information from the Heartbeat signal, which is generated at regular intervals during the network session, in real packet analysis tools. Since the existing session information retrieval method checks the session information at the end of the session, information cannot be confirmed in the case of an active session. To verify the information of the active session, this paper utilizes the heartbeat signal generated by the session every certain period. By analyzing active session information, it is possible to analyze information about flows and packets in a session in real time.
在本文中,我们介绍了如何在真实的数据包分析工具中存储网络会话期间定期产生的心跳信号中的会话信息。由于现有的会话信息检索方法在会话结束时检查会话信息,因此在会话活动的情况下无法确认信息。为了验证活动会话的信息,本文利用会话每隔一段时间产生的心跳信号。通过分析活动会话信息,可以实时分析会话中的流和包信息。
{"title":"The real-time session inspection method using heartbeat signal","authors":"Jong-Beom Kim, Hyeon Yang, Kyeong Ho Park, S. Lee, S. Choi","doi":"10.23919/ICACT.2018.8323721","DOIUrl":"https://doi.org/10.23919/ICACT.2018.8323721","url":null,"abstract":"In this paper, we present how to store the session information from the Heartbeat signal, which is generated at regular intervals during the network session, in real packet analysis tools. Since the existing session information retrieval method checks the session information at the end of the session, information cannot be confirmed in the case of an active session. To verify the information of the active session, this paper utilizes the heartbeat signal generated by the session every certain period. By analyzing active session information, it is possible to analyze information about flows and packets in a session in real time.","PeriodicalId":228625,"journal":{"name":"2018 20th International Conference on Advanced Communication Technology (ICACT)","volume":"76 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133932112","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Demonstration of digital optical D flip flop based on photonic micro-ring resonator 基于光子微环谐振器的数字光学D触发器的演示
Pub Date : 2018-02-01 DOI: 10.23919/ICACT.2018.8323855
Law Foo Kui, M. R. Uddin
In this paper, we demonstrated an optical D-type flip-flop based on the electro optic switching effect of silicon microring resonator. The operation of the flip flop has been verified by simulation using a clock signal of 10 Gbps and data signal of 1 Gbps. The results of the proposed flip-flop have been presented by the timing diagrams.
在本文中,我们展示了一个基于硅微环谐振器电光开关效应的光学d型触发器。通过时钟信号为10gbps,数据信号为1gbps的仿真验证了触发器的工作原理。所提出的触发器的结果已由时序图给出。
{"title":"Demonstration of digital optical D flip flop based on photonic micro-ring resonator","authors":"Law Foo Kui, M. R. Uddin","doi":"10.23919/ICACT.2018.8323855","DOIUrl":"https://doi.org/10.23919/ICACT.2018.8323855","url":null,"abstract":"In this paper, we demonstrated an optical D-type flip-flop based on the electro optic switching effect of silicon microring resonator. The operation of the flip flop has been verified by simulation using a clock signal of 10 Gbps and data signal of 1 Gbps. The results of the proposed flip-flop have been presented by the timing diagrams.","PeriodicalId":228625,"journal":{"name":"2018 20th International Conference on Advanced Communication Technology (ICACT)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114411274","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Efficient partitioner for distributed OLTP DBMS 分布式OLTP DBMS的高效分区器
Pub Date : 2018-02-01 DOI: 10.23919/ICACT.2018.8323697
Wenkang Chen
Distributed online transaction processing (OLTP) database management systems (DBMS) are characterized with ACID properties, that is atomicity, consistency, isolation, durability. However, these OLTP DBMSs that handle massive data schema, need to be scalable that cannot give up strong transactional and consistency requirements. The large-scale schemas are deployed on distributed server and each server's memory is limited, in that case, how this system partition is the key factor to affect its performance. In this paper, we present a partition approach, that applies to general schema and taking care of load balancing and distributed transaction rates. Our method achieve this by periodically update the partition plan and migration hot data among the servers. OLTP workload are modeled as a graph and using a graph partition algorithm to partition set of data into same server that are often co-accessed by one transaction. To evaluate our method, our framework Assort is integrated into a distributed, main-memory DBMS and shows that it can partition schema in OLTP DBMS and enable the system to outperformance traditional method 3–4x throughput.
分布式联机事务处理(OLTP)数据库管理系统(DBMS)具有ACID特性,即原子性、一致性、隔离性和持久性。但是,这些处理大量数据模式的OLTP dbms需要具有可伸缩性,不能放弃强大的事务性和一致性需求。大规模模式部署在分布式服务器上,每个服务器的内存有限,在这种情况下,系统分区的方式是影响其性能的关键因素。在本文中,我们提出了一种分区方法,它适用于一般模式,并考虑负载平衡和分布式事务率。我们的方法通过定期更新分区计划和在服务器之间迁移热数据来实现这一点。OLTP工作负载建模为图,并使用图分区算法将数据集划分到同一服务器中,这些服务器通常由一个事务共同访问。为了评估我们的方法,我们将我们的框架sort集成到一个分布式主存DBMS中,并表明它可以在OLTP DBMS中划分模式,并使系统的性能优于传统方法3 - 4倍的吞吐量。
{"title":"Efficient partitioner for distributed OLTP DBMS","authors":"Wenkang Chen","doi":"10.23919/ICACT.2018.8323697","DOIUrl":"https://doi.org/10.23919/ICACT.2018.8323697","url":null,"abstract":"Distributed online transaction processing (OLTP) database management systems (DBMS) are characterized with ACID properties, that is atomicity, consistency, isolation, durability. However, these OLTP DBMSs that handle massive data schema, need to be scalable that cannot give up strong transactional and consistency requirements. The large-scale schemas are deployed on distributed server and each server's memory is limited, in that case, how this system partition is the key factor to affect its performance. In this paper, we present a partition approach, that applies to general schema and taking care of load balancing and distributed transaction rates. Our method achieve this by periodically update the partition plan and migration hot data among the servers. OLTP workload are modeled as a graph and using a graph partition algorithm to partition set of data into same server that are often co-accessed by one transaction. To evaluate our method, our framework Assort is integrated into a distributed, main-memory DBMS and shows that it can partition schema in OLTP DBMS and enable the system to outperformance traditional method 3–4x throughput.","PeriodicalId":228625,"journal":{"name":"2018 20th International Conference on Advanced Communication Technology (ICACT)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116957923","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Channel measurements and characterizations for automobile factory environments 汽车工厂环境的通道测量和表征
Pub Date : 2018-02-01 DOI: 10.23919/ICACT.2018.8323707
Liu Liu, Ke Zhang, C. Tao, Kun Zhang, Ze Yuan, Jianhua Zhang
There is tremendous hype around the Internet of Things, and particularly in the industrial realm (the industrial Internet of Things, IIoT), where many expect to find the biggest opportunity in the near term. The IIoT is also an important application in the fifth generation of wireless communications. In this paper, the channel propagations are investigated based on the realistic measurement data in an automobile factory. The path loss model is extracted using Least Square (LS) method, and the K factor is also parameterized. Meanwhile, the time delay (root mean squared delay) and the amount of multipath component (MPC)s are investigated and compared with typical propagation results. These results are beneficial and informative when designing wireless networks for IIoT.
围绕物联网有大量的炒作,特别是在工业领域(工业物联网,IIoT),许多人期望在短期内找到最大的机会。工业物联网也是第五代无线通信的重要应用。本文基于某汽车制造厂的实测数据,对信道传播进行了研究。采用最小二乘法提取路径损失模型,并对K因子进行参数化。同时,研究了时延(均方根延迟)和多径分量(MPC)的数量,并与典型的传播结果进行了比较。这些结果在设计工业物联网无线网络时是有益的和有价值的。
{"title":"Channel measurements and characterizations for automobile factory environments","authors":"Liu Liu, Ke Zhang, C. Tao, Kun Zhang, Ze Yuan, Jianhua Zhang","doi":"10.23919/ICACT.2018.8323707","DOIUrl":"https://doi.org/10.23919/ICACT.2018.8323707","url":null,"abstract":"There is tremendous hype around the Internet of Things, and particularly in the industrial realm (the industrial Internet of Things, IIoT), where many expect to find the biggest opportunity in the near term. The IIoT is also an important application in the fifth generation of wireless communications. In this paper, the channel propagations are investigated based on the realistic measurement data in an automobile factory. The path loss model is extracted using Least Square (LS) method, and the K factor is also parameterized. Meanwhile, the time delay (root mean squared delay) and the amount of multipath component (MPC)s are investigated and compared with typical propagation results. These results are beneficial and informative when designing wireless networks for IIoT.","PeriodicalId":228625,"journal":{"name":"2018 20th International Conference on Advanced Communication Technology (ICACT)","volume":"124 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115762643","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Cross-correlation index and multiple-access performance of Gold codes in a spread-spectrum system 扩频系统中Gold码的互相关指标和多址性能
Pub Date : 2018-02-01 DOI: 10.23919/ICACT.2018.8323913
O. Wojuola
Spread-spectrum system is a well-researched topic in literature. However, the system loading capacity with respect to its spreading codes is not well known. In this paper, a technique for determining the loading capacity is developed by the author. The concept of cross-correlation index is first introduced for the codes. Using this concept, a technique for predicting the system loading capacity is then developed for a set of Gold codes. This work involves the proposal of a mathematical model for the cross-correlation index, and the use of the same for the prediction of the loading capacity and system bit-error-rate performance. The model was tested for various set of Gold codes. Results for a set of 255-chip Gold codes are presented here. The results show that the codes have the capacity to support a maximum of about 15 users, above which bit-error-rate increases rapidly, ultimately resulting in emergence of error floor. The point at which the cross-correlation index equals to auto-correlation index marks the turning point around which the system performance revolves.
扩频系统是文献中研究较多的一个课题。然而,系统对其扩频码的承载能力尚不清楚。本文提出了一种确定承载能力的方法。首先在规范中引入了互相关指标的概念。利用这一概念,为一组Gold代码开发了一种预测系统负载能力的技术。这项工作包括提出一个相互关联指数的数学模型,并使用该模型来预测负载能力和系统误码率性能。该模型经过了各种黄金代码的测试。这里给出了一组255个芯片的Gold代码的结果。结果表明,该码最多支持15个用户,超过15个用户,误码率迅速增加,最终导致错误层的出现。互相关指数等于自相关指数的点标志着系统性能的转折点。
{"title":"Cross-correlation index and multiple-access performance of Gold codes in a spread-spectrum system","authors":"O. Wojuola","doi":"10.23919/ICACT.2018.8323913","DOIUrl":"https://doi.org/10.23919/ICACT.2018.8323913","url":null,"abstract":"Spread-spectrum system is a well-researched topic in literature. However, the system loading capacity with respect to its spreading codes is not well known. In this paper, a technique for determining the loading capacity is developed by the author. The concept of cross-correlation index is first introduced for the codes. Using this concept, a technique for predicting the system loading capacity is then developed for a set of Gold codes. This work involves the proposal of a mathematical model for the cross-correlation index, and the use of the same for the prediction of the loading capacity and system bit-error-rate performance. The model was tested for various set of Gold codes. Results for a set of 255-chip Gold codes are presented here. The results show that the codes have the capacity to support a maximum of about 15 users, above which bit-error-rate increases rapidly, ultimately resulting in emergence of error floor. The point at which the cross-correlation index equals to auto-correlation index marks the turning point around which the system performance revolves.","PeriodicalId":228625,"journal":{"name":"2018 20th International Conference on Advanced Communication Technology (ICACT)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124937948","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Factors affecting the successful implementation of hospital information system: A preliminary pilot study of Iranian nurses 影响医院信息系统成功实施的因素:对伊朗护士的初步试点研究
Pub Date : 2018-02-01 DOI: 10.23919/ICACT.2018.8323867
Shahab Rezaian, Harhodin Bin Salamat, R. Malekzadeh, Rasimah Chemohd Yusoff, N. Zare
There is little data on the Iranian nurses' level of satisfaction with Hospital Information System implementation in university hospitals. The aims of this study were:1) To determine the reliability and validity of factors which can affect the successful implementation of Hospital Information System for nursing staff 2) and use them to propose a new implementation success model.
关于伊朗护士对大学医院实施医院信息系统的满意度的数据很少。本研究的目的是:1)确定影响护理人员成功实施医院信息系统的因素的信度和效度,并利用这些因素提出一种新的实施成功模型。
{"title":"Factors affecting the successful implementation of hospital information system: A preliminary pilot study of Iranian nurses","authors":"Shahab Rezaian, Harhodin Bin Salamat, R. Malekzadeh, Rasimah Chemohd Yusoff, N. Zare","doi":"10.23919/ICACT.2018.8323867","DOIUrl":"https://doi.org/10.23919/ICACT.2018.8323867","url":null,"abstract":"There is little data on the Iranian nurses' level of satisfaction with Hospital Information System implementation in university hospitals. The aims of this study were:1) To determine the reliability and validity of factors which can affect the successful implementation of Hospital Information System for nursing staff 2) and use them to propose a new implementation success model.","PeriodicalId":228625,"journal":{"name":"2018 20th International Conference on Advanced Communication Technology (ICACT)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123504506","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Forensic analysis of network packets from penetration test toolkits 通过渗透测试工具包对网络数据包进行取证分析
Pub Date : 2018-02-01 DOI: 10.23919/ICACT.2018.8323757
Da-Yu Kao, Yu-Siang Wang, Fuching Tsai, Chien-Hung Chen
Cyber-attacks are likely to continue to increase in size and frequency. As attackers get smarter than before, so do efforts made to protect against unwanted data theft. The purpose of this paper is to look for unusual patterns by repeatable experiments among the constant buzz of network packets that make up PT activities. The utilization of different PT toolkits, like Winfingerprint, Superscan, Nmap, SoftPerfect Network Scanner, NeoTrace, Nessus Vulnerability Scanner, and Path Analyzer Pro, facilitates cyber-attackers to bring down online system. It is capable of discerning network traffic on the vast streams of network information available through the connected machines from the following three phases: data collection, data reduction, and data analysis. Network forensics can aid in detecting attack behavior. This paper accommodates real-time evidence collection as a network feature against attackers. The identification of unusual patterns in network packets has been put to use in the ongoing battle to stay one step ahead of malicious hackers, who could be anyone from disgruntled customers to nation states. This approach can be easily deployed and should be applicable to any type of network-based assessment.
网络攻击的规模和频率可能会继续增加。随着攻击者变得比以前更聪明,为防止不必要的数据盗窃所做的努力也越来越多。本文的目的是通过可重复的实验,在构成PT活动的网络数据包的持续嗡嗡声中寻找不寻常的模式。利用不同的PT工具包,如Winfingerprint, Superscan, Nmap, SoftPerfect Network Scanner, NeoTrace, Nessus Vulnerability Scanner和Path Analyzer Pro,便于网络攻击者使在线系统瘫痪。它能够从以下三个阶段识别通过连接的机器提供的大量网络信息流中的网络流量:数据收集、数据简化和数据分析。网络取证可以帮助检测攻击行为。本文将实时证据收集作为对抗攻击者的网络特征。识别网络数据包中的异常模式已被用于对抗恶意黑客,这些恶意黑客可能是任何心怀不满的客户,也可能是国家。这种方法可以很容易地部署,并且应该适用于任何类型的基于网络的评估。
{"title":"Forensic analysis of network packets from penetration test toolkits","authors":"Da-Yu Kao, Yu-Siang Wang, Fuching Tsai, Chien-Hung Chen","doi":"10.23919/ICACT.2018.8323757","DOIUrl":"https://doi.org/10.23919/ICACT.2018.8323757","url":null,"abstract":"Cyber-attacks are likely to continue to increase in size and frequency. As attackers get smarter than before, so do efforts made to protect against unwanted data theft. The purpose of this paper is to look for unusual patterns by repeatable experiments among the constant buzz of network packets that make up PT activities. The utilization of different PT toolkits, like Winfingerprint, Superscan, Nmap, SoftPerfect Network Scanner, NeoTrace, Nessus Vulnerability Scanner, and Path Analyzer Pro, facilitates cyber-attackers to bring down online system. It is capable of discerning network traffic on the vast streams of network information available through the connected machines from the following three phases: data collection, data reduction, and data analysis. Network forensics can aid in detecting attack behavior. This paper accommodates real-time evidence collection as a network feature against attackers. The identification of unusual patterns in network packets has been put to use in the ongoing battle to stay one step ahead of malicious hackers, who could be anyone from disgruntled customers to nation states. This approach can be easily deployed and should be applicable to any type of network-based assessment.","PeriodicalId":228625,"journal":{"name":"2018 20th International Conference on Advanced Communication Technology (ICACT)","volume":"59 9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124277530","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
TSSA: A two step scheduling algorithm for the event-driven clusters TSSA:用于事件驱动集群的两步调度算法
Pub Date : 2018-02-01 DOI: 10.23919/ICACT.2018.8323689
Yu Chen, Mingming Sun
The event-driven programming model has been proposed to efficiently process iterative applications and incremental applications. In clusters based the event-driven model, applications are structured as a series of short triggers, each of which will be invoked when associate events are trigged. And framework assigns a newly submitted trigger to a node where the relevant datasets set. Unfortunately it may lead to load imbalance because associate events may occur by chance. Numerous triggers in a node may be simultaneously invoked but other nodes have no triggers running. To the end, we provide TSSA, a new two steps event-driven for the event-driven clusters to maximize improve the utilization of node resources. Our results indicate TSSA performs well, and minimizes total execution time of applications.
为了有效地处理迭代应用和增量应用,提出了事件驱动的编程模型。在基于事件驱动模型的集群中,应用程序被构造为一系列短触发器,当关联事件被触发时,每个短触发器都会被调用。框架将新提交的触发器分配给相关数据集集合的节点。不幸的是,它可能导致负载不平衡,因为关联事件可能偶然发生。一个节点中的多个触发器可以同时被调用,但其他节点没有正在运行的触发器。最后,我们为事件驱动集群提供了一种新的两步事件驱动TSSA,以最大限度地提高节点资源的利用率。我们的结果表明,TSSA性能良好,并且最小化了应用程序的总执行时间。
{"title":"TSSA: A two step scheduling algorithm for the event-driven clusters","authors":"Yu Chen, Mingming Sun","doi":"10.23919/ICACT.2018.8323689","DOIUrl":"https://doi.org/10.23919/ICACT.2018.8323689","url":null,"abstract":"The event-driven programming model has been proposed to efficiently process iterative applications and incremental applications. In clusters based the event-driven model, applications are structured as a series of short triggers, each of which will be invoked when associate events are trigged. And framework assigns a newly submitted trigger to a node where the relevant datasets set. Unfortunately it may lead to load imbalance because associate events may occur by chance. Numerous triggers in a node may be simultaneously invoked but other nodes have no triggers running. To the end, we provide TSSA, a new two steps event-driven for the event-driven clusters to maximize improve the utilization of node resources. Our results indicate TSSA performs well, and minimizes total execution time of applications.","PeriodicalId":228625,"journal":{"name":"2018 20th International Conference on Advanced Communication Technology (ICACT)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129549700","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
PAPR reduction in FBMC-OQAM signals with half complexity of trellis-based SLM 栅格SLM二分之一复杂度的FBMC-OQAM信号PAPR降低
Pub Date : 2018-02-01 DOI: 10.23919/ICACT.2018.8323623
Panya Jirajaracheep, Sunisa Sanpan, Pornpawit Boonsrimuang, P. Boonsrimuang
The filter Bank Multicarrier (FBMC) modulation with offset-QAM (OQAM) has attracted attention as a major candidate for future wireless communication systems which has several advantages. A disadvantage of FBMC-OQAM is high peak-to-average power ratio (PAPR). To overcome this problem, the trellis-based SLM technique is employed and achieved a much better PAPR reduction performance. However, The Trellis-based algorithm has also the intrinsic disadvantage of high computational complexity, to decreasing the complexity will make the system more desirable. This paper proposes the half-complexity algorithm for trellis-based SLM scheme which achieves lower computational complexity when compared to trellis-based SLM scheme with small degradation of PAPR reduction performance. From various simulation results, the proposed algorithm shows less computational complexity about 50% compared to the trellis-based algorithm with similar PAPR reduction performance.
带偏置qam (OQAM)的滤波器组多载波(FBMC)调制作为未来无线通信系统的主要候选方案受到了广泛的关注。FBMC-OQAM的缺点是峰值平均功率比(PAPR)高。为了克服这一问题,采用了基于栅格的SLM技术,取得了较好的PAPR降低性能。然而,基于网格的算法也有计算复杂度高的固有缺点,降低复杂度会使系统更理想。本文提出了基于栅格的SLM方案的半复杂度算法,与基于栅格的SLM方案相比,该算法的计算复杂度较低,且PAPR降频性能下降较小。从各种仿真结果来看,该算法与基于网格的算法相比,计算复杂度降低了50%左右,具有相似的PAPR降低性能。
{"title":"PAPR reduction in FBMC-OQAM signals with half complexity of trellis-based SLM","authors":"Panya Jirajaracheep, Sunisa Sanpan, Pornpawit Boonsrimuang, P. Boonsrimuang","doi":"10.23919/ICACT.2018.8323623","DOIUrl":"https://doi.org/10.23919/ICACT.2018.8323623","url":null,"abstract":"The filter Bank Multicarrier (FBMC) modulation with offset-QAM (OQAM) has attracted attention as a major candidate for future wireless communication systems which has several advantages. A disadvantage of FBMC-OQAM is high peak-to-average power ratio (PAPR). To overcome this problem, the trellis-based SLM technique is employed and achieved a much better PAPR reduction performance. However, The Trellis-based algorithm has also the intrinsic disadvantage of high computational complexity, to decreasing the complexity will make the system more desirable. This paper proposes the half-complexity algorithm for trellis-based SLM scheme which achieves lower computational complexity when compared to trellis-based SLM scheme with small degradation of PAPR reduction performance. From various simulation results, the proposed algorithm shows less computational complexity about 50% compared to the trellis-based algorithm with similar PAPR reduction performance.","PeriodicalId":228625,"journal":{"name":"2018 20th International Conference on Advanced Communication Technology (ICACT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129594530","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
期刊
2018 20th International Conference on Advanced Communication Technology (ICACT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1