首页 > 最新文献

2010 Second International Conference on Communication Software and Networks最新文献

英文 中文
Implementation of HVAC System Through Wireless Sensor Network 利用无线传感器网络实现暖通空调系统
Pub Date : 2011-05-06 DOI: 10.1109/iccsn.2010.64
Sana Sultan, T. Khan, Sairah Khatoon
A wireless sensor network (WSN) in its simplest form can be defined as a network of sensors denoted as nodes that blankets a region and provides information about it. They can sense the environment and communicate the data gathered from the monitored field through wireless links. Processing is done at the sensor level. WSN have numerous applications ranging from indoor deployment scenarios in the home and office to outdoor deployment scenarios in natural and military settings. In some of these scenarios, lives may depend on the timelines and correctness of the sensor data obtained from dispersed sensor nodes. The analysis aims at employing WSN for one of its industrial application, i.e. “For Monitoring HVAC Systems”. Significant advances in computer technology have made it possible to develop a wireless sensor network (WSN) capable of monitoring and operating a scheduling system for heating, ventilation, and air- conditioning (HVAC). The proposed system includes features such as monitoring, measurement, networking, and control. This system provides an energy efficient solution to the monitoring and controlling of a HVAC system. This design enables users to make cost-effective energy decisions with no interaction with the HVAC system.
无线传感器网络(WSN)最简单的形式可以被定义为覆盖一个区域并提供有关该区域信息的节点组成的传感器网络。它们可以感知环境,并通过无线链路传输从监测现场收集的数据。处理在传感器级别完成。WSN有许多应用,从家庭和办公室的室内部署场景到自然和军事环境的室外部署场景。在某些情况下,寿命可能取决于从分散的传感器节点获得的传感器数据的时间线和正确性。分析的目的是将WSN用于其工业应用之一,即“用于监控HVAC系统”。计算机技术的重大进步使得开发一种无线传感器网络(WSN)成为可能,该网络能够监控和操作供暖、通风和空调(HVAC)的调度系统。该系统包括监控、测量、联网和控制等功能。该系统为暖通空调系统的监测和控制提供了一个节能的解决方案。这种设计使用户能够在不与暖通空调系统交互的情况下做出具有成本效益的能源决策。
{"title":"Implementation of HVAC System Through Wireless Sensor Network","authors":"Sana Sultan, T. Khan, Sairah Khatoon","doi":"10.1109/iccsn.2010.64","DOIUrl":"https://doi.org/10.1109/iccsn.2010.64","url":null,"abstract":"A wireless sensor network (WSN) in its simplest form can be defined as a network of sensors denoted as nodes that blankets a region and provides information about it. They can sense the environment and communicate the data gathered from the monitored field through wireless links. Processing is done at the sensor level. WSN have numerous applications ranging from indoor deployment scenarios in the home and office to outdoor deployment scenarios in natural and military settings. In some of these scenarios, lives may depend on the timelines and correctness of the sensor data obtained from dispersed sensor nodes. The analysis aims at employing WSN for one of its industrial application, i.e. “For Monitoring HVAC Systems”. Significant advances in computer technology have made it possible to develop a wireless sensor network (WSN) capable of monitoring and operating a scheduling system for heating, ventilation, and air- conditioning (HVAC). The proposed system includes features such as monitoring, measurement, networking, and control. This system provides an energy efficient solution to the monitoring and controlling of a HVAC system. This design enables users to make cost-effective energy decisions with no interaction with the HVAC system.","PeriodicalId":255246,"journal":{"name":"2010 Second International Conference on Communication Software and Networks","volume":"294 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115219127","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
IPv6 MANET: An Essential Technology for Future Pervasive Computing IPv6 MANET:未来普适计算的基本技术
Pub Date : 2010-03-25 DOI: 10.1109/ICCSN.2010.117
J. Jayanthi, S. Rabara, A. Rex, Macedo Arokiaraj
In the near future, a pervasive computing environment can be expected to be based on the recent progresses and advances in computing and communication technologies. The Next generation (Next-Gen) of mobile communications will include both prestigious infrastructured wireless networks and novel infrastructureless Mobile Adhoc NETworks (MANETs). The special features of MANET bring great opportunities together with severe challenges. With this insight, an empirical study on MANET is being conducted. Some of the technical challenges MANET poses are also presented. The paper points out some of the key research issues to promote the development and accelerate the commercial applications of the MANET technology. A special attention is paid on to highlight the integration of MANET with the significant features of IPv6 such as integrated security, end-to-end communication. This paper also briefs and focuses the research directions towards the IPv6 based MANET which is the most essential for growing mobile population.
在不久的将来,普适计算环境将以计算和通信技术的最新进展和进步为基础。下一代移动通信将包括著名的基础设施无线网络和新颖的无基础设施移动自组网(manet)。MANET的特点带来了巨大的机遇,同时也带来了严峻的挑战。有了这一见解,对MANET的实证研究正在进行。本文还介绍了MANET所面临的一些技术挑战。本文指出了促进MANET技术发展和加速其商业应用的一些关键研究问题。特别强调了MANET与IPv6的重要特性(如集成安全性、端到端通信)的集成。本文还简要介绍了面向移动人口增长的基于IPv6的MANET的研究方向。
{"title":"IPv6 MANET: An Essential Technology for Future Pervasive Computing","authors":"J. Jayanthi, S. Rabara, A. Rex, Macedo Arokiaraj","doi":"10.1109/ICCSN.2010.117","DOIUrl":"https://doi.org/10.1109/ICCSN.2010.117","url":null,"abstract":"In the near future, a pervasive computing environment can be expected to be based on the recent progresses and advances in computing and communication technologies. The Next generation (Next-Gen) of mobile communications will include both prestigious infrastructured wireless networks and novel infrastructureless Mobile Adhoc NETworks (MANETs). The special features of MANET bring great opportunities together with severe challenges. With this insight, an empirical study on MANET is being conducted. Some of the technical challenges MANET poses are also presented. The paper points out some of the key research issues to promote the development and accelerate the commercial applications of the MANET technology. A special attention is paid on to highlight the integration of MANET with the significant features of IPv6 such as integrated security, end-to-end communication. This paper also briefs and focuses the research directions towards the IPv6 based MANET which is the most essential for growing mobile population.","PeriodicalId":255246,"journal":{"name":"2010 Second International Conference on Communication Software and Networks","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131212598","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Modulation Classification of MQAM Signals in Multipath Environment Using Mathematical Morphology 多径环境下MQAM信号的数学形态学调制分类
Pub Date : 2010-02-26 DOI: 10.1109/ICCSN.2010.48
B. Lan, Bingbing Li, M. Huang
This paper proposes a new method which combines blind equalization and morphology based image-processing to identify MQAM signals in multipath environment. The advantage of our approach is that, by using image-processing, only 128×128 bits data is required to be stored. Furthermore, even the eye diagram of equalized signal for 64QAM is not opened enough, it can still be used to classify. Computer simulations are made to evaluate the performance and result shows that the new approach can reach better classification accuracy than the existing methods.
本文提出了一种将盲均衡和基于形态学的图像处理相结合的多径环境下MQAM信号识别方法。我们的方法的优点是,通过使用图像处理,只需要存储128×128位数据。此外,即使64QAM的均衡信号眼图打开不够,仍然可以用来分类。通过计算机仿真对该方法进行了性能评价,结果表明该方法比现有方法具有更好的分类精度。
{"title":"Modulation Classification of MQAM Signals in Multipath Environment Using Mathematical Morphology","authors":"B. Lan, Bingbing Li, M. Huang","doi":"10.1109/ICCSN.2010.48","DOIUrl":"https://doi.org/10.1109/ICCSN.2010.48","url":null,"abstract":"This paper proposes a new method which combines blind equalization and morphology based image-processing to identify MQAM signals in multipath environment. The advantage of our approach is that, by using image-processing, only 128×128 bits data is required to be stored. Furthermore, even the eye diagram of equalized signal for 64QAM is not opened enough, it can still be used to classify. Computer simulations are made to evaluate the performance and result shows that the new approach can reach better classification accuracy than the existing methods.","PeriodicalId":255246,"journal":{"name":"2010 Second International Conference on Communication Software and Networks","volume":"293 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124274465","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
RCPC-Encoded V-BLAST MIMO with MMSE-Based Detection 基于mmse检测的rcpc编码V-BLAST MIMO
Pub Date : 2010-02-26 DOI: 10.1109/ICCSN.2010.21
L. Sari, G. Wibisono, D. Gunawan
A Rate-Compatible Punctured Convolutional (RCPC)-encoded Vertical Bell Laboratories Layered Space-Time (V-BLAST) MIMO system to provide a robust wireless communication link is proposed. The V-BLAST detection is based on Minimum Mean-Squared Error (MMSE) criterion, to alleviate the noise enhancement commonly found in the original V-BLAST scheme based on Zero Forcing criterion. Different code rates and transmit powers are allocated to data streams emitted from the multiple transmit antennas, according to the attenuation levels of the subchannels. This scheme is efficient in terms of transmit power and bandwidth usage, as the data stream entering a destructive subchannel is given low transmit power and high code rate. Simulations show that the proposed system can attain good performance at a reasonably low Eb/No.
提出了一种速率兼容的穿孔卷积(RCPC)编码垂直贝尔实验室分层时空(V-BLAST) MIMO系统,以提供鲁棒的无线通信链路。V-BLAST检测基于最小均方误差(MMSE)准则,以减轻原基于零强迫准则的V-BLAST方案中常见的噪声增强问题。根据子信道的衰减程度,对多个发射天线发射的数据流分配不同的码率和发射功率。由于进入破坏子信道的数据流具有低发射功率和高码率,因此该方案在发射功率和带宽利用率方面是有效的。仿真结果表明,该系统在较低的Eb/No下可以获得较好的性能。
{"title":"RCPC-Encoded V-BLAST MIMO with MMSE-Based Detection","authors":"L. Sari, G. Wibisono, D. Gunawan","doi":"10.1109/ICCSN.2010.21","DOIUrl":"https://doi.org/10.1109/ICCSN.2010.21","url":null,"abstract":"A Rate-Compatible Punctured Convolutional (RCPC)-encoded Vertical Bell Laboratories Layered Space-Time (V-BLAST) MIMO system to provide a robust wireless communication link is proposed. The V-BLAST detection is based on Minimum Mean-Squared Error (MMSE) criterion, to alleviate the noise enhancement commonly found in the original V-BLAST scheme based on Zero Forcing criterion. Different code rates and transmit powers are allocated to data streams emitted from the multiple transmit antennas, according to the attenuation levels of the subchannels. This scheme is efficient in terms of transmit power and bandwidth usage, as the data stream entering a destructive subchannel is given low transmit power and high code rate. Simulations show that the proposed system can attain good performance at a reasonably low Eb/No.","PeriodicalId":255246,"journal":{"name":"2010 Second International Conference on Communication Software and Networks","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116975748","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
ECA Rule-Based Negotiation Agent in E-commerce 电子商务中基于ECA规则的谈判代理
Pub Date : 2010-02-26 DOI: 10.1109/ICCSN.2010.63
F. Mahan, A. Isazadeh, L. M. Khanli
E-commerce is seen as one of the key services of modern information society. The idea of automating e-commerce transactions attracted a lot of interest during the last years. Multi-agent systems are claimed to be one of promising software technologies for achieving this goal. Rules constitute a very promising approach to describing negotiation processes. We suggest ECA rule-based approaches to automated negotiations. The experimental scenario considers multiple buyer and seller agents that are performed in parallel.
电子商务被视为现代信息社会的关键服务之一。在过去的几年里,自动化电子商务交易的想法吸引了很多人的兴趣。多代理系统被认为是实现这一目标的有前途的软件技术之一。规则是描述谈判进程的一种很有希望的方法。我们建议采用基于ECA规则的自动谈判方法。实验场景考虑并行执行的多个买方和卖方代理。
{"title":"ECA Rule-Based Negotiation Agent in E-commerce","authors":"F. Mahan, A. Isazadeh, L. M. Khanli","doi":"10.1109/ICCSN.2010.63","DOIUrl":"https://doi.org/10.1109/ICCSN.2010.63","url":null,"abstract":"E-commerce is seen as one of the key services of modern information society. The idea of automating e-commerce transactions attracted a lot of interest during the last years. Multi-agent systems are claimed to be one of promising software technologies for achieving this goal. Rules constitute a very promising approach to describing negotiation processes. We suggest ECA rule-based approaches to automated negotiations. The experimental scenario considers multiple buyer and seller agents that are performed in parallel.","PeriodicalId":255246,"journal":{"name":"2010 Second International Conference on Communication Software and Networks","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126167170","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A Novel Handover Mechanism Between Femtocell and Macrocell for LTE Based Networks 基于LTE网络的新型Femtocell和Macrocell切换机制
Pub Date : 2010-02-26 DOI: 10.1109/ICCSN.2010.91
Haijun Zhang, X. Wen, Bo Wang, Wei Zheng, Yong Sun
The femtocell networks that use Home eNodeB and existing networks as backhaul connectivity can fulfill the upcoming demand of high data rate for wireless communication system as well as can extend the coverage area. It is also of interest to minimize operational effort by introducing self-optimizing mechanisms, and the optimization of the Home eNodeB involved handover is an important goal of LTE-Advanced. Since the different network architecture and functionality between Home eNodeB and LTE eNodeB, the handover procedure between the femtocell and macrocell should be modified in LTE network. In this paper, modified signaling procedure of handover is presented in the Home eNodeB gateway based femtocell network architecture. A new handover algorithm based on the UE’s speed and QoS is proposed. The comparison between the proposed algorithm and the traditional handover algorithm shows that the algorithms proposed in this paper have a better performance in the reducing of unnecessary handovers and the number of handovers.
利用家庭eNodeB和现有网络作为回程连接的femtocell网络可以满足未来无线通信系统对高数据速率的需求,并可以扩大覆盖范围。通过引入自优化机制来最小化操作工作量也是值得关注的,而优化涉及切换的Home eNodeB是LTE-Advanced的一个重要目标。由于家庭eNodeB和LTE eNodeB的网络结构和功能不同,在LTE网络中需要修改femtocell和macrocell之间的切换过程。在基于家庭eNodeB网关的飞蜂窝网络体系结构中,提出了一种改进的切换信令过程。提出了一种基于终端速度和服务质量的切换算法。与传统切换算法的比较表明,本文提出的算法在减少不必要的切换和切换次数方面具有更好的性能。
{"title":"A Novel Handover Mechanism Between Femtocell and Macrocell for LTE Based Networks","authors":"Haijun Zhang, X. Wen, Bo Wang, Wei Zheng, Yong Sun","doi":"10.1109/ICCSN.2010.91","DOIUrl":"https://doi.org/10.1109/ICCSN.2010.91","url":null,"abstract":"The femtocell networks that use Home eNodeB and existing networks as backhaul connectivity can fulfill the upcoming demand of high data rate for wireless communication system as well as can extend the coverage area. It is also of interest to minimize operational effort by introducing self-optimizing mechanisms, and the optimization of the Home eNodeB involved handover is an important goal of LTE-Advanced. Since the different network architecture and functionality between Home eNodeB and LTE eNodeB, the handover procedure between the femtocell and macrocell should be modified in LTE network. In this paper, modified signaling procedure of handover is presented in the Home eNodeB gateway based femtocell network architecture. A new handover algorithm based on the UE’s speed and QoS is proposed. The comparison between the proposed algorithm and the traditional handover algorithm shows that the algorithms proposed in this paper have a better performance in the reducing of unnecessary handovers and the number of handovers.","PeriodicalId":255246,"journal":{"name":"2010 Second International Conference on Communication Software and Networks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129797285","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 175
Virtual Password Using Runge-Kutta Method for Internet Banking 基于龙格-库塔法的网上银行虚拟密码
Pub Date : 2010-02-26 DOI: 10.1109/ICCSN.2010.118
S. Mohammadi, Saeede Zare Hosseini
Today, user authentication is one of the fundamental procedures to ensure secure communication on online services. Among the authentication methods password –based is popular and widely used. So having a strong password authentication without any vulnerability is essential. In this paper, we propose a password-based remote user authentication with virtual password concept to secure users’ passwords in on-line environments. We use Runge-Kutta method with linear functions as virtual function to hide user password from adversary in public channel. We analyzed the vulnerabilities and possible attacks in the proposed method and suggest proper seclusions. This paper, also considers how this method can defend against password cracker, man-in-the-middle, phishing and password file compromise attacks.
今天,用户身份验证是确保在线服务安全通信的基本程序之一。在身份验证方法中,基于密码的身份验证方法是比较流行和广泛使用的。因此,没有任何漏洞的强密码身份验证是必不可少的。本文提出了一种基于密码的远程用户认证方法,采用虚拟密码的概念来保护在线环境下用户的密码安全。我们采用线性函数为虚函数的龙格-库塔方法在公开信道中对攻击者隐藏用户密码。我们分析了该方法的漏洞和可能的攻击,并提出了适当的隔离措施。本文还研究了该方法如何防御密码破解、中间人攻击、网络钓鱼和密码文件泄露攻击。
{"title":"Virtual Password Using Runge-Kutta Method for Internet Banking","authors":"S. Mohammadi, Saeede Zare Hosseini","doi":"10.1109/ICCSN.2010.118","DOIUrl":"https://doi.org/10.1109/ICCSN.2010.118","url":null,"abstract":"Today, user authentication is one of the fundamental procedures to ensure secure communication on online services. Among the authentication methods password –based is popular and widely used. So having a strong password authentication without any vulnerability is essential. In this paper, we propose a password-based remote user authentication with virtual password concept to secure users’ passwords in on-line environments. We use Runge-Kutta method with linear functions as virtual function to hide user password from adversary in public channel. We analyzed the vulnerabilities and possible attacks in the proposed method and suggest proper seclusions. This paper, also considers how this method can defend against password cracker, man-in-the-middle, phishing and password file compromise attacks.","PeriodicalId":255246,"journal":{"name":"2010 Second International Conference on Communication Software and Networks","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130609121","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Modeling and Simulation of BLDC Motor Using Soft Computing Techniques 基于软计算技术的无刷直流电机建模与仿真
Pub Date : 2010-02-26 DOI: 10.1109/ICCSN.2010.121
R. Saxena, Y. Pahariya, A. Tiwary
In this paper a soft computing technique PSIM is used for the performance simulation of the BLDC motor. With the help of its user friendly approach and some basic theories, the corresponding PSIM models for the BLDC can easily be constructed. The simulation results of BLDC motor performance can critically evaluate under various input parameters in the PSIM environment. The accuracy of this approach can also be verified by comparing the simulation results in PSIM with the response obtained from the BLDC motor established results.
本文采用软计算技术PSIM对无刷直流电机进行了性能仿真。利用该方法的用户友好性和一些基本理论,可以很容易地构建相应的无刷直流电机PSIM模型。在PSIM环境下,对无刷直流电机在不同输入参数下的性能仿真结果进行了批判性评价。通过将PSIM中的仿真结果与无刷直流电机的既定结果进行比较,也可以验证该方法的准确性。
{"title":"Modeling and Simulation of BLDC Motor Using Soft Computing Techniques","authors":"R. Saxena, Y. Pahariya, A. Tiwary","doi":"10.1109/ICCSN.2010.121","DOIUrl":"https://doi.org/10.1109/ICCSN.2010.121","url":null,"abstract":"In this paper a soft computing technique PSIM is used for the performance simulation of the BLDC motor. With the help of its user friendly approach and some basic theories, the corresponding PSIM models for the BLDC can easily be constructed. The simulation results of BLDC motor performance can critically evaluate under various input parameters in the PSIM environment. The accuracy of this approach can also be verified by comparing the simulation results in PSIM with the response obtained from the BLDC motor established results.","PeriodicalId":255246,"journal":{"name":"2010 Second International Conference on Communication Software and Networks","volume":"146 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114731539","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Two Phase Shortest Path Algorithm for Non-negative Weighted Undirected Graphs 非负加权无向图的两相最短路径算法
Pub Date : 2010-02-26 DOI: 10.1109/ICCSN.2010.97
M. Qureshi, M. Hassan, S. Safdar, R. Akbar
Breadth First Search (BFS) can calculate the shortest path for un-weighted graphs very efficiently but when it comes to non-negative weighted graphs it fails at a point when a successor updates a predecessor. Such nodes are being referred as Culprit nodes in this research. These Culprit nodes are the ones that cause error in shortest path in an algorithm that traverses like BFS. This research targets on recognizing and marking Culprit nodes to disengage them until they are properly and completely updated. Processing through such nodes is postponed until all possible updates are made on these nodes nullifying all possible chances of errors. As nodes are being traversed in BFS fashion with few violations and additions promising a O(k(|V| + |E|)) time algorithm where 0
广度优先搜索(BFS)可以非常有效地计算非加权图的最短路径,但当涉及到非负加权图时,它在后继图更新前导图时失败。这些节点在本研究中被称为罪魁祸首节点。这些罪魁祸首节点是在像BFS这样的遍历算法中导致最短路径错误的节点。本研究的目标是识别和标记罪魁祸首节点,直到它们被正确和完整地更新。通过这些节点的处理被推迟,直到在这些节点上进行了所有可能的更新,从而消除了所有可能的错误。由于节点以BFS方式遍历,几乎没有违反和添加,因此有望实现O(k(|V| + |E|))时间算法,其中0
{"title":"Two Phase Shortest Path Algorithm for Non-negative Weighted Undirected Graphs","authors":"M. Qureshi, M. Hassan, S. Safdar, R. Akbar","doi":"10.1109/ICCSN.2010.97","DOIUrl":"https://doi.org/10.1109/ICCSN.2010.97","url":null,"abstract":"Breadth First Search (BFS) can calculate the shortest path for un-weighted graphs very efficiently but when it comes to non-negative weighted graphs it fails at a point when a successor updates a predecessor. Such nodes are being referred as Culprit nodes in this research. These Culprit nodes are the ones that cause error in shortest path in an algorithm that traverses like BFS. This research targets on recognizing and marking Culprit nodes to disengage them until they are properly and completely updated. Processing through such nodes is postponed until all possible updates are made on these nodes nullifying all possible chances of errors. As nodes are being traversed in BFS fashion with few violations and additions promising a O(k(|V| + |E|)) time algorithm where 0","PeriodicalId":255246,"journal":{"name":"2010 Second International Conference on Communication Software and Networks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132468867","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Efficient Retransmission of RB-HARQ with LDPC Codes LDPC码下RB-HARQ的高效重传
Pub Date : 2010-02-26 DOI: 10.1109/ICCSN.2010.109
Chia-Sheng Tsai, C. Shih
In the paper, we study the RB-HARQ and the degree reliability using IEEE802.16e LDPC codes. The retransmission bits according to soft-decision output and degree in LDPC codes. We can select the bits with small absolute value of soft-decision output and the small degree has the priority to retransmit. To improve the efficiency of retransmission based on RB-HARQ using LDPC codes.
本文采用IEEE802.16e LDPC码对RB-HARQ和度可靠性进行了研究。根据LDPC码的软判决输出和程度进行重传。我们可以选择软判决输出绝对值小、度小的位优先重传。为了提高基于RB-HARQ的LDPC码重传效率。
{"title":"Efficient Retransmission of RB-HARQ with LDPC Codes","authors":"Chia-Sheng Tsai, C. Shih","doi":"10.1109/ICCSN.2010.109","DOIUrl":"https://doi.org/10.1109/ICCSN.2010.109","url":null,"abstract":"In the paper, we study the RB-HARQ and the degree reliability using IEEE802.16e LDPC codes. The retransmission bits according to soft-decision output and degree in LDPC codes. We can select the bits with small absolute value of soft-decision output and the small degree has the priority to retransmit. To improve the efficiency of retransmission based on RB-HARQ using LDPC codes.","PeriodicalId":255246,"journal":{"name":"2010 Second International Conference on Communication Software and Networks","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130226721","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2010 Second International Conference on Communication Software and Networks
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1