首页 > 最新文献

2010 Second International Conference on Communication Software and Networks最新文献

英文 中文
Optimal Power Allocation for Cooperative Networks 合作网络的最优功率分配
Pub Date : 2010-02-26 DOI: 10.1109/ICCSN.2010.38
Yuewu Dong, X. Wen, Wei Zheng, Yong Sun
In cellular network, the deployment of the relay station can bring spatial diversity to increase link capacity and improve communication performance. In this paper, we consider an optimal power allocation scheme for the source and the relay to minimize the bit error rate(BER) at the destination under the power and outage constraint in cooperative relay system. Simulation results show that the BER performance can achieve a significant gain by the proposed power allocation scheme. With different relay strategies such as AF and DF, different transmit power are allocated for the source and the relay to achieve the required BER performance in the downlink cooperation.
在蜂窝网络中,中继站的部署可以带来空间分集,增加链路容量,提高通信性能。本文考虑了在功率和中断约束下,以最大限度地降低目的点误码率为目标点的中继和源的最优功率分配方案。仿真结果表明,该功率分配方案能显著提高误码率。采用不同的中继策略(如AF和DF),为源和中继分配不同的发射功率,以达到下行合作所需的误码率性能。
{"title":"Optimal Power Allocation for Cooperative Networks","authors":"Yuewu Dong, X. Wen, Wei Zheng, Yong Sun","doi":"10.1109/ICCSN.2010.38","DOIUrl":"https://doi.org/10.1109/ICCSN.2010.38","url":null,"abstract":"In cellular network, the deployment of the relay station can bring spatial diversity to increase link capacity and improve communication performance. In this paper, we consider an optimal power allocation scheme for the source and the relay to minimize the bit error rate(BER) at the destination under the power and outage constraint in cooperative relay system. Simulation results show that the BER performance can achieve a significant gain by the proposed power allocation scheme. With different relay strategies such as AF and DF, different transmit power are allocated for the source and the relay to achieve the required BER performance in the downlink cooperation.","PeriodicalId":255246,"journal":{"name":"2010 Second International Conference on Communication Software and Networks","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115959766","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Finding Optimal LSB Substitution Using Ant Colony Optimization Algorithm 利用蚁群优化算法寻找最优LSB替代
Pub Date : 2010-02-26 DOI: 10.1109/ICCSN.2010.61
Ching-Sheng Hsu, Shu-Fen Tu
The Least Significant Bit (LSB) Substitution is a kind of information hiding method. The secret message is embedded into the last r bits of a cover image to get away from the notice of hackers. The security and stego-image quality are two main issues of the LSB substitution method. Therefore, some researchers propose an LSB substitution matrix to address these two issues. Finding an optimal LSB substitution matrix can be seen as a problem of combinatorial optimization. There are 2r! feasible solutions, hence the search space grows notably when r increases. Consequently, an efficient method to construct the matrix is necessary. In this paper, we apply the Ant Colony Optimization Algorithm to construct an optimal LSB substitution matrix. The experimental results show that ACO can find optimal LSB substitution matrix efficiently and improve the qualities of the stego-images.
最低有效位替换(LSB)是一种信息隐藏方法。秘密信息被嵌入封面图像的最后r位,以避开黑客的注意。安全性和隐写图像质量是LSB替代方法的两个主要问题。因此,一些研究者提出LSB替代矩阵来解决这两个问题。寻找最优LSB替换矩阵可以看作是一个组合优化问题。有2r!可行解,因此当r增大时,搜索空间显著增大。因此,需要一种有效的构造矩阵的方法。本文应用蚁群优化算法构造最优LSB替换矩阵。实验结果表明,蚁群算法能有效地找到最优的LSB替换矩阵,提高隐写图像的质量。
{"title":"Finding Optimal LSB Substitution Using Ant Colony Optimization Algorithm","authors":"Ching-Sheng Hsu, Shu-Fen Tu","doi":"10.1109/ICCSN.2010.61","DOIUrl":"https://doi.org/10.1109/ICCSN.2010.61","url":null,"abstract":"The Least Significant Bit (LSB) Substitution is a kind of information hiding method. The secret message is embedded into the last r bits of a cover image to get away from the notice of hackers. The security and stego-image quality are two main issues of the LSB substitution method. Therefore, some researchers propose an LSB substitution matrix to address these two issues. Finding an optimal LSB substitution matrix can be seen as a problem of combinatorial optimization. There are 2r! feasible solutions, hence the search space grows notably when r increases. Consequently, an efficient method to construct the matrix is necessary. In this paper, we apply the Ant Colony Optimization Algorithm to construct an optimal LSB substitution matrix. The experimental results show that ACO can find optimal LSB substitution matrix efficiently and improve the qualities of the stego-images.","PeriodicalId":255246,"journal":{"name":"2010 Second International Conference on Communication Software and Networks","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126801355","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 40
A New Method for Identification of MQAM Signals in Rayleigh Fading Channel 瑞利衰落信道中MQAM信号识别的新方法
Pub Date : 2010-02-26 DOI: 10.1109/ICCSN.2010.31
M. Huang, Bingbing Li, B. Lan, Yanling Li
This paper presents a method for the automatic classification of MQAM signals in Rayleigh fading channel. The advantage of our method is that, by designing a feature vector which is composed of higher order moments, we do not have to acquire a priori knowledge of signal parameters, what is more, it is a simple, very low complexity, robust method. Computer simulations are made and the results show that our method can reach much better classification accuracy than the existing methods.
提出了一种瑞利衰落信道中MQAM信号的自动分类方法。该方法的优点在于,通过设计由高阶矩组成的特征向量,不需要先验地获取信号参数的知识,并且是一种简单、低复杂度、鲁棒性好的方法。计算机仿真结果表明,该方法比现有方法具有更高的分类精度。
{"title":"A New Method for Identification of MQAM Signals in Rayleigh Fading Channel","authors":"M. Huang, Bingbing Li, B. Lan, Yanling Li","doi":"10.1109/ICCSN.2010.31","DOIUrl":"https://doi.org/10.1109/ICCSN.2010.31","url":null,"abstract":"This paper presents a method for the automatic classification of MQAM signals in Rayleigh fading channel. The advantage of our method is that, by designing a feature vector which is composed of higher order moments, we do not have to acquire a priori knowledge of signal parameters, what is more, it is a simple, very low complexity, robust method. Computer simulations are made and the results show that our method can reach much better classification accuracy than the existing methods.","PeriodicalId":255246,"journal":{"name":"2010 Second International Conference on Communication Software and Networks","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128073175","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
ARIMA Based Network Anomaly Detection 基于ARIMA的网络异常检测
Pub Date : 2010-02-26 DOI: 10.1109/ICCSN.2010.55
A. H. Yaacob, I. Tan, S. Chien, Hongquan Tan
An early warning system on potential attacks from networks will enable network administrators or even automated network management software to take preventive measures. This is needed as we move towards maximizing the utilization of the network with new paradigms such as Web Services and Software As A Service. This paper introduces a novel approach through using Auto-Regressive Integrated Moving Average (ARIMA) technique to detect potential attacks that may occur in the network. The solution is able to provide feedback through its predictive capabilities and hence provide an early warning system. With the affirmative results, this technique can serve beyond the detection of Denial of Service (DoS) and with sufficient development; an automated defensive solution can be achieved.
网络潜在攻击的预警系统将使网络管理员甚至自动化网络管理软件能够采取预防措施。当我们通过Web服务和软件即服务(Software as A Service)等新模式实现对网络的最大利用时,这是需要的。本文介绍了一种利用自回归综合移动平均(ARIMA)技术检测网络中可能发生的潜在攻击的新方法。该解决方案能够通过其预测能力提供反馈,从而提供早期预警系统。研究结果表明,该技术不仅可以用于检测拒绝服务(DoS),而且具有充分的发展前景;可以实现自动化防御解决方案。
{"title":"ARIMA Based Network Anomaly Detection","authors":"A. H. Yaacob, I. Tan, S. Chien, Hongquan Tan","doi":"10.1109/ICCSN.2010.55","DOIUrl":"https://doi.org/10.1109/ICCSN.2010.55","url":null,"abstract":"An early warning system on potential attacks from networks will enable network administrators or even automated network management software to take preventive measures. This is needed as we move towards maximizing the utilization of the network with new paradigms such as Web Services and Software As A Service. This paper introduces a novel approach through using Auto-Regressive Integrated Moving Average (ARIMA) technique to detect potential attacks that may occur in the network. The solution is able to provide feedback through its predictive capabilities and hence provide an early warning system. With the affirmative results, this technique can serve beyond the detection of Denial of Service (DoS) and with sufficient development; an automated defensive solution can be achieved.","PeriodicalId":255246,"journal":{"name":"2010 Second International Conference on Communication Software and Networks","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130337450","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 111
VANET Security Framework for Trusted Grouping Using TPM Hardware 基于TPM硬件的可信分组VANET安全框架
Pub Date : 2010-02-26 DOI: 10.1109/ICCSN.2010.115
A. Wagan, B. M. Mughal, H. Hasbullah
Vehicular Ad hoc Network (VANET) is a network of vehicles on the roads, of which the success of its applications is highly dependent upon the underlying security mechanism. The default trial asymmetric PKI/ECDSA security mechanism is known for its high computational cost, thus lacking applicability in life-critical safety messaging. Alternative security schemes, such as symmetric methods provide faster communication at the expense of reduced security. Hence, hybrid and hardware based solutions were proposed by researchers to ease the issue. However, these solutions either do not support the existing VANET PKI standard or have larger message size. In this paper, we present a hardware based security framework that uses both standard asymmetric PKI and symmetric cryptography for faster and secure safety message exchange. The proposed framework is expected to improve security mechanism in VANET by developing trust relationship among the neighboring nodes, hence forming trusted groups. The trust is established via Trusted Platform Module (TPM) and group communication.
车辆自组织网络(Vehicular Ad hoc Network, VANET)是一种由道路上的车辆组成的网络,其应用的成功与否高度依赖于其底层的安全机制。默认的试用非对称PKI/ECDSA安全机制以其高计算成本而闻名,因此在生命攸关的安全消息传递中缺乏适用性。其他安全方案,如对称方法,以降低安全性为代价提供更快的通信。因此,研究人员提出了基于混合和硬件的解决方案来缓解这个问题。然而,这些解决方案要么不支持现有的VANET PKI标准,要么具有更大的消息大小。在本文中,我们提出了一个基于硬件的安全框架,它使用标准的非对称PKI和对称加密来实现更快和更安全的安全消息交换。该框架有望通过在相邻节点之间建立信任关系,从而形成可信组,从而改善VANET中的安全机制。通过可信平台模块(Trusted Platform Module, TPM)和组通信建立信任。
{"title":"VANET Security Framework for Trusted Grouping Using TPM Hardware","authors":"A. Wagan, B. M. Mughal, H. Hasbullah","doi":"10.1109/ICCSN.2010.115","DOIUrl":"https://doi.org/10.1109/ICCSN.2010.115","url":null,"abstract":"Vehicular Ad hoc Network (VANET) is a network of vehicles on the roads, of which the success of its applications is highly dependent upon the underlying security mechanism. The default trial asymmetric PKI/ECDSA security mechanism is known for its high computational cost, thus lacking applicability in life-critical safety messaging. Alternative security schemes, such as symmetric methods provide faster communication at the expense of reduced security. Hence, hybrid and hardware based solutions were proposed by researchers to ease the issue. However, these solutions either do not support the existing VANET PKI standard or have larger message size. In this paper, we present a hardware based security framework that uses both standard asymmetric PKI and symmetric cryptography for faster and secure safety message exchange. The proposed framework is expected to improve security mechanism in VANET by developing trust relationship among the neighboring nodes, hence forming trusted groups. The trust is established via Trusted Platform Module (TPM) and group communication.","PeriodicalId":255246,"journal":{"name":"2010 Second International Conference on Communication Software and Networks","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130985871","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 57
An Imperceptible Frequency-Domain Watermarking Scheme without Resorting to the Original Image 一种不依赖原始图像的不可感知频域水印方案
Pub Date : 2010-02-26 DOI: 10.1109/ICCSN.2010.28
Shu-Fen Tu, Ching-Sheng Hsu
The aim of this paper is to propose an imperceptible wavelet-based watermarking scheme. In our scheme, we use variation to define the degree of transparence of coefficients of LL band and further determine transparent coefficients of HL3 and LH3 bands. Then, the watermark is embedded into those coefficients. In addition, the modular operation is utilized during watermark embedding. In the experimental results, we simulate some common attacks on the watermarked image. It is shown that our scheme is robust against most attacks; moreover, the watermarked image is highly imperceptible.
本文的目的是提出一种基于小波的不可感知水印方案。在我们的方案中,我们使用变异来定义LL波段系数的透明程度,进而确定HL3和LH3波段的透明系数。然后,将水印嵌入到这些系数中。此外,在水印嵌入过程中采用了模块化运算。在实验结果中,我们模拟了几种常见的针对水印图像的攻击。结果表明,该方案对大多数攻击具有鲁棒性;而且,水印后的图像具有很强的隐蔽性。
{"title":"An Imperceptible Frequency-Domain Watermarking Scheme without Resorting to the Original Image","authors":"Shu-Fen Tu, Ching-Sheng Hsu","doi":"10.1109/ICCSN.2010.28","DOIUrl":"https://doi.org/10.1109/ICCSN.2010.28","url":null,"abstract":"The aim of this paper is to propose an imperceptible wavelet-based watermarking scheme. In our scheme, we use variation to define the degree of transparence of coefficients of LL band and further determine transparent coefficients of HL3 and LH3 bands. Then, the watermark is embedded into those coefficients. In addition, the modular operation is utilized during watermark embedding. In the experimental results, we simulate some common attacks on the watermarked image. It is shown that our scheme is robust against most attacks; moreover, the watermarked image is highly imperceptible.","PeriodicalId":255246,"journal":{"name":"2010 Second International Conference on Communication Software and Networks","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115745473","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Cross Layer Power Efficient Cooperative Diversity Scheme for Wireless Hybrid Ad Hoc Networks 无线混合Ad Hoc网络的跨层高效协同分集方案
Pub Date : 2010-02-26 DOI: 10.1109/ICCSN.2010.70
Yingji Zhong
The multi-scenario topology of the wireless hybrid Ad Hoc networks is studied and a novel Cross Layer Power Efficient Cooperative Diversity Scheme (CL-PECDS) is proposed in this paper. The comparison and the predominance of the proposed scheme are demonstrated. With the help of the simulations, the relative energy consumption and the end-to-end blocking probability are all improved. The addressing ratio of success in the condition of the unchanged parameters and external information can be increased and the network can tolerate more hops to support reliable transportation by the proposed scheme.
研究了无线混合Ad Hoc网络的多场景拓扑结构,提出了一种新的跨层高效功率协同分集方案(CL-PECDS)。并对所提出的方案进行了比较,证明了其优越性。仿真结果表明,相对能量消耗和端到端阻塞概率均有提高。在参数和外部信息不变的情况下,该方案可以提高寻址成功率,使网络能够容忍更多的跳数,以支持可靠的传输。
{"title":"Cross Layer Power Efficient Cooperative Diversity Scheme for Wireless Hybrid Ad Hoc Networks","authors":"Yingji Zhong","doi":"10.1109/ICCSN.2010.70","DOIUrl":"https://doi.org/10.1109/ICCSN.2010.70","url":null,"abstract":"The multi-scenario topology of the wireless hybrid Ad Hoc networks is studied and a novel Cross Layer Power Efficient Cooperative Diversity Scheme (CL-PECDS) is proposed in this paper. The comparison and the predominance of the proposed scheme are demonstrated. With the help of the simulations, the relative energy consumption and the end-to-end blocking probability are all improved. The addressing ratio of success in the condition of the unchanged parameters and external information can be increased and the network can tolerate more hops to support reliable transportation by the proposed scheme.","PeriodicalId":255246,"journal":{"name":"2010 Second International Conference on Communication Software and Networks","volume":"296 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124275196","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Optimal Multiple Sink Nodes Deployment in Wireless Sensor Networks Based on Gene Expression Programming 基于基因表达式编程的无线传感器网络多汇聚节点最优部署
Pub Date : 2010-02-26 DOI: 10.1109/ICCSN.2010.33
Shucheng Dai, Changjie Tang, Shaojie Qiao, Kaikuo Xu, Hongjun Li, Jun Zhu
In wireless sensor networks (WSN) data transmission is usually performed by sensors in manner of multi-hop forwarding towards a central static control center (sink). A lot of cheap, low-powered and energy-limited sensors are deployed in the monitored area and some of these nodes closer to the sink node use up their energy more quickly than other nodes because they relay more packets. Although most of the sensor nodes have enough energy left to work, the energy consumption imbalance leads to connectivity holes and coverage holes, and finally the whole network failure. The main contributions of this paper include: (a) a new scheme based on multiple sink nodes is proposed to prolong the network lifetime and to reduce the response time. It is effective, especially in the target tracking applications, (b) the deployment strategy with given number of multiple sink nodes is explored in the grid sensor network, (c) Gene Expression Programming based Multiple Sink Nodes deployment algorithm (GEP-MSN) is proposed to optimally deploy multiple sink nodes over the monitored region, (d) a data transmission cost model (TCM) is introduced to measure the cost for optimizing during the transmission phase, (e) extensive simulations are conducted to show that the scheme can greatly extend the network lifetime by around 16.6% and 36.3% on average compared with two naive methods based on random distributed sink nodes.
在无线传感器网络(WSN)中,数据传输通常由传感器以多跳转发的方式向中央静态控制中心(sink)传输。在监控区域部署了许多廉价、低功率和能量有限的传感器,其中一些靠近汇聚节点的节点比其他节点更快地消耗能量,因为它们中继更多的数据包。虽然大多数传感器节点有足够的能量工作,但能量消耗不平衡导致连接漏洞和覆盖漏洞,最终导致整个网络故障。本文的主要贡献包括:(a)提出了一种基于多个汇聚节点的新方案,以延长网络生存期和缩短响应时间。(b)探索了网格传感器网络中给定数量的多个汇聚节点的部署策略,(c)提出了基于基因表达编程的多汇聚节点部署算法(GEP-MSN),在监测区域内最优部署多个汇聚节点,(d)引入数据传输成本模型(TCM)来衡量传输阶段的优化成本,特别是在目标跟踪应用中。(e)大量的仿真结果表明,与基于随机分布式汇聚节点的两种朴素方法相比,该方案可显著延长网络生存期,平均可延长约16.6%和36.3%。
{"title":"Optimal Multiple Sink Nodes Deployment in Wireless Sensor Networks Based on Gene Expression Programming","authors":"Shucheng Dai, Changjie Tang, Shaojie Qiao, Kaikuo Xu, Hongjun Li, Jun Zhu","doi":"10.1109/ICCSN.2010.33","DOIUrl":"https://doi.org/10.1109/ICCSN.2010.33","url":null,"abstract":"In wireless sensor networks (WSN) data transmission is usually performed by sensors in manner of multi-hop forwarding towards a central static control center (sink). A lot of cheap, low-powered and energy-limited sensors are deployed in the monitored area and some of these nodes closer to the sink node use up their energy more quickly than other nodes because they relay more packets. Although most of the sensor nodes have enough energy left to work, the energy consumption imbalance leads to connectivity holes and coverage holes, and finally the whole network failure. The main contributions of this paper include: (a) a new scheme based on multiple sink nodes is proposed to prolong the network lifetime and to reduce the response time. It is effective, especially in the target tracking applications, (b) the deployment strategy with given number of multiple sink nodes is explored in the grid sensor network, (c) Gene Expression Programming based Multiple Sink Nodes deployment algorithm (GEP-MSN) is proposed to optimally deploy multiple sink nodes over the monitored region, (d) a data transmission cost model (TCM) is introduced to measure the cost for optimizing during the transmission phase, (e) extensive simulations are conducted to show that the scheme can greatly extend the network lifetime by around 16.6% and 36.3% on average compared with two naive methods based on random distributed sink nodes.","PeriodicalId":255246,"journal":{"name":"2010 Second International Conference on Communication Software and Networks","volume":"194 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121292744","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 28
Client's Perspective: Realization as a New Generation Process for Software Project Development and Management 客户视角:实现作为软件项目开发与管理的新一代过程
Pub Date : 2010-02-26 DOI: 10.1109/ICCSN.2010.96
R. Akbar, M. Hassan, S. Safdar, M. Qureshi
IT industry despite the wide use of most modern tools and technologies has been unable to achieve targeted success. Awry situations in projects have become routine matter. Besides technical other factors influencing software development activities also need to be considered. Software development and consultancy organizations must realize the importance of such technical and non-technical factors like client’s perspective, organizational environment, company policies and social infrastructure. Identification and managing such issues are more cumbersome than routine practical tasks. This paper focuses on one of the most important and critical cum technical factor client’s perspective. Elements comprising client’s perspective are identified and the spider web model is proposed to practice it. Real projects based evaluation is made. The results elaborate the client based practices. Client based practices would be an advent of new generation of processes to overcome IT industry dilemma.
IT行业尽管广泛使用了大多数现代工具和技术,却一直无法取得有针对性的成功。项目中出现的差错已经成为家常便饭。除了技术之外,还需要考虑影响软件开发活动的其他因素。软件开发和咨询机构必须认识到诸如客户观点、组织环境、公司政策和社会基础设施等技术和非技术因素的重要性。识别和管理这些问题比日常的实际任务更麻烦。本文从客户的角度出发,探讨了最重要、最关键的技术因素之一。确定了包含客户端视角的元素,并提出了蜘蛛网模型来实践它。基于实际工程进行评价。结果详细说明了基于客户的实践。基于客户端的实践将是克服IT行业困境的新一代流程的出现。
{"title":"Client's Perspective: Realization as a New Generation Process for Software Project Development and Management","authors":"R. Akbar, M. Hassan, S. Safdar, M. Qureshi","doi":"10.1109/ICCSN.2010.96","DOIUrl":"https://doi.org/10.1109/ICCSN.2010.96","url":null,"abstract":"IT industry despite the wide use of most modern tools and technologies has been unable to achieve targeted success. Awry situations in projects have become routine matter. Besides technical other factors influencing software development activities also need to be considered. Software development and consultancy organizations must realize the importance of such technical and non-technical factors like client’s perspective, organizational environment, company policies and social infrastructure. Identification and managing such issues are more cumbersome than routine practical tasks. This paper focuses on one of the most important and critical cum technical factor client’s perspective. Elements comprising client’s perspective are identified and the spider web model is proposed to practice it. Real projects based evaluation is made. The results elaborate the client based practices. Client based practices would be an advent of new generation of processes to overcome IT industry dilemma.","PeriodicalId":255246,"journal":{"name":"2010 Second International Conference on Communication Software and Networks","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123314179","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
A New Channel Estimation Method for OFDM Systems Based on Adaptive-Asymmetric Filter in the Transform Domain 基于变换域自适应非对称滤波的OFDM系统信道估计新方法
Pub Date : 2010-02-26 DOI: 10.1109/ICCSN.2010.100
Shih-Lun Feng, Zhang Eryang, Wang Chen
A new channel estimation method is proposed for orthogonal frequency division multiplexing (OFDM) mobile systems based on comb-type pilot. The proposed method utilizes adaptive-asymmetric filter in the transform domain. Asymmetric filter is proposed to reduce more noise for channel estimation based on the characteristic of transform-domain signal, and adaptive adjustment of the cutoff frequency is utilized to eliminate the error floor of channel estimation at high signal-to-noise ratios. Signal-to-noise ratio estimation is implemented in the transform domain. We investigate the performance of the proposed method by measuring symbol error rate with 16QAM as the modulation. Simulation results show that the proposed method outperforms the conventional transform-domain interpolation and the frequency-domain low-pass interpolation.
提出了一种基于梳式导频的正交频分复用(OFDM)移动系统信道估计新方法。该方法在变换域采用自适应非对称滤波。基于变换域信号的特性,提出了非对称滤波器来减少信道估计的噪声,并利用截止频率的自适应调整来消除高信噪比下信道估计的误差底限。在变换域中实现信噪比估计。我们以16QAM作为调制,通过测量符号误码率来研究该方法的性能。仿真结果表明,该方法优于传统的变换域插值和频域低通插值。
{"title":"A New Channel Estimation Method for OFDM Systems Based on Adaptive-Asymmetric Filter in the Transform Domain","authors":"Shih-Lun Feng, Zhang Eryang, Wang Chen","doi":"10.1109/ICCSN.2010.100","DOIUrl":"https://doi.org/10.1109/ICCSN.2010.100","url":null,"abstract":"A new channel estimation method is proposed for orthogonal frequency division multiplexing (OFDM) mobile systems based on comb-type pilot. The proposed method utilizes adaptive-asymmetric filter in the transform domain. Asymmetric filter is proposed to reduce more noise for channel estimation based on the characteristic of transform-domain signal, and adaptive adjustment of the cutoff frequency is utilized to eliminate the error floor of channel estimation at high signal-to-noise ratios. Signal-to-noise ratio estimation is implemented in the transform domain. We investigate the performance of the proposed method by measuring symbol error rate with 16QAM as the modulation. Simulation results show that the proposed method outperforms the conventional transform-domain interpolation and the frequency-domain low-pass interpolation.","PeriodicalId":255246,"journal":{"name":"2010 Second International Conference on Communication Software and Networks","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122649956","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
2010 Second International Conference on Communication Software and Networks
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1