首页 > 最新文献

2007 International Conference on Signal Processing, Communications and Networking最新文献

英文 中文
Performance Analysis of Rake Receiver with M-BOK Keying in DS-UWB System DS-UWB系统中带M-BOK键控的Rake接收机性能分析
Pub Date : 2007-11-05 DOI: 10.1109/ICSCN.2007.350703
Wu Lan, Yu Ningmei
In this paper, the principle of M-BOK keying was analyzed and the performance of Rake receiver on direct sequence ultra-wideband (DS-UWB) system was studied, based on a S-V multi-path statistical propagation channel model which can describe propagation characteristic of UWB signal more precisely. The simulation results show that in the UWB channel model, M-BOK keying not only achieves two functions of spreading coding and BPSK modulation, but also improves the system performance. As to different receivers, selective rake (S-Rake) receiver is much more applicable than the Partial Rake (P-Rake) receiver. For S-Rake receiver, there isn't notable difference between MRC and EGC, but EGC combination could simplify the structure of receiver
本文在分析M-BOK键控原理的基础上,基于S-V多径统计传播信道模型,对直接序列超宽带(DS-UWB)系统中的Rake接收机性能进行了研究,该模型能更准确地描述超宽带信号的传播特性。仿真结果表明,在UWB信道模型下,M-BOK键控不仅实现了扩频编码和BPSK调制两个功能,而且提高了系统性能。对于不同的接收机,选择性耙(S-Rake)接收机比部分耙(P-Rake)接收机更适用。对于S-Rake接收机,MRC和EGC之间没有显著差异,但EGC组合可以简化接收机的结构
{"title":"Performance Analysis of Rake Receiver with M-BOK Keying in DS-UWB System","authors":"Wu Lan, Yu Ningmei","doi":"10.1109/ICSCN.2007.350703","DOIUrl":"https://doi.org/10.1109/ICSCN.2007.350703","url":null,"abstract":"In this paper, the principle of M-BOK keying was analyzed and the performance of Rake receiver on direct sequence ultra-wideband (DS-UWB) system was studied, based on a S-V multi-path statistical propagation channel model which can describe propagation characteristic of UWB signal more precisely. The simulation results show that in the UWB channel model, M-BOK keying not only achieves two functions of spreading coding and BPSK modulation, but also improves the system performance. As to different receivers, selective rake (S-Rake) receiver is much more applicable than the Partial Rake (P-Rake) receiver. For S-Rake receiver, there isn't notable difference between MRC and EGC, but EGC combination could simplify the structure of receiver","PeriodicalId":257948,"journal":{"name":"2007 International Conference on Signal Processing, Communications and Networking","volume":"34 16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123145497","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Mobility Patterns in Macrocellular Wireless Networks 大蜂窝无线网络中的移动模式
Pub Date : 2007-11-05 DOI: 10.1109/ICSCN.2007.350716
M. S. Sricharan, V. Vaidehi
Realistic user models are indispensable for performance evaluation of mobility prediction algorithms. The macrocellular wireless service user population comprises users with diverse mobility characteristics. This paper investigates mobility patterns in macrocellular wireless networks, based on empirical data gathered from several users. Based on the observed statistics a user classification based on mobility is achieved. Further the paper characterizes the distribution of cell residence time (CRT), which is the length of time that a user spends in a cell, before moving into the service area of another cell. Studies reported in literature concentrate on cell residence time distribution of mobile terminals in-session (dedicated channel allocated) and ignore their out-of-session (idle mode) characteristics, which critically influence several network management tasks. Investigation shows that a user's out-of-session CRT distribution can be accurately modeled using heavy-tailed arithmetic distribution with infinite mean and variance, contrary to the assumptions made in the literature
对移动性预测算法进行性能评估,必须建立真实的用户模型。所述大蜂窝无线业务用户群包括具有不同移动性特征的用户。本文基于从几个用户收集的经验数据,研究了大蜂窝无线网络中的移动模式。根据观察到的统计信息,实现了基于移动性的用户分类。此外,本文还描述了小区停留时间(CRT)的分布,即用户在进入另一个小区的服务区域之前在一个小区中花费的时间长度。文献报道的研究集中于会话中移动终端(分配专用信道)的小区驻留时间分布,而忽略了会话外移动终端(空闲模式)的特性,这些特性对若干网络管理任务具有重要影响。调查表明,与文献中的假设相反,用户的非会话CRT分布可以使用具有无限均值和方差的重尾算术分布准确地建模
{"title":"Mobility Patterns in Macrocellular Wireless Networks","authors":"M. S. Sricharan, V. Vaidehi","doi":"10.1109/ICSCN.2007.350716","DOIUrl":"https://doi.org/10.1109/ICSCN.2007.350716","url":null,"abstract":"Realistic user models are indispensable for performance evaluation of mobility prediction algorithms. The macrocellular wireless service user population comprises users with diverse mobility characteristics. This paper investigates mobility patterns in macrocellular wireless networks, based on empirical data gathered from several users. Based on the observed statistics a user classification based on mobility is achieved. Further the paper characterizes the distribution of cell residence time (CRT), which is the length of time that a user spends in a cell, before moving into the service area of another cell. Studies reported in literature concentrate on cell residence time distribution of mobile terminals in-session (dedicated channel allocated) and ignore their out-of-session (idle mode) characteristics, which critically influence several network management tasks. Investigation shows that a user's out-of-session CRT distribution can be accurately modeled using heavy-tailed arithmetic distribution with infinite mean and variance, contrary to the assumptions made in the literature","PeriodicalId":257948,"journal":{"name":"2007 International Conference on Signal Processing, Communications and Networking","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122861474","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Priority Based Dynamic Reconfiguration of Lightpath in WDM Networks WDM网络中基于优先级的光路动态重构
Pub Date : 2007-11-05 DOI: 10.1109/ICSCN.2007.350740
M. Sumathi, P. Vanathi
In this paper, we consider reconfiguration of the virtual topology of a wavelength division multiplexed (WDM) optical network. The traffic generated by the higher layers is dynamic; hence reconfiguration is carried out in order to maximize resource utilization. We consider reconfiguration with the objective of minimizing congestion. Priority levels are assigned to the lightpaths between various node pairs based on the traffic. During reconfiguration, new lightpaths are established and existing lightpaths are removed from congested links based on the priority levels. The earlier works considered traffic volume as the basis for reconfiguration. Thus priority is given to traffic with higher priority levels. The results for congestion with and without reconfiguration have been obtained
本文研究了波分复用(WDM)光网络虚拟拓扑的重构问题。高层产生的流量是动态的;因此,为了最大限度地利用资源,进行了重新配置。我们考虑以最小化拥塞为目标的重新配置。优先级级别是根据流量分配给不同节点对之间的光路。在重新配置过程中,根据优先级级别建立新的光路,并从拥塞链路中删除现有的光路。早期的研究以交通量作为重新配置的基础。因此,优先级较高的流量被给予优先级。得到了有重构和无重构情况下的拥塞结果
{"title":"Priority Based Dynamic Reconfiguration of Lightpath in WDM Networks","authors":"M. Sumathi, P. Vanathi","doi":"10.1109/ICSCN.2007.350740","DOIUrl":"https://doi.org/10.1109/ICSCN.2007.350740","url":null,"abstract":"In this paper, we consider reconfiguration of the virtual topology of a wavelength division multiplexed (WDM) optical network. The traffic generated by the higher layers is dynamic; hence reconfiguration is carried out in order to maximize resource utilization. We consider reconfiguration with the objective of minimizing congestion. Priority levels are assigned to the lightpaths between various node pairs based on the traffic. During reconfiguration, new lightpaths are established and existing lightpaths are removed from congested links based on the priority levels. The earlier works considered traffic volume as the basis for reconfiguration. Thus priority is given to traffic with higher priority levels. The results for congestion with and without reconfiguration have been obtained","PeriodicalId":257948,"journal":{"name":"2007 International Conference on Signal Processing, Communications and Networking","volume":"215 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123038772","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Multilayer Perceptron Neural Network Architecture using VHDL with Combinational Logic Sigmoid Function 基于组合逻辑Sigmoid函数的VHDL多层感知器神经网络结构
Pub Date : 2007-11-05 DOI: 10.1109/ICSCN.2007.350771
S. P. Joy Vasantha Rani, P. Kanagasabapathy
This paper presents the hardware realization of fast and flexible feed forward neural network which is capable of dealing with fixed point arithmetic operations using VHDL with minimum number of CLB slices and good speed of performance. The hardware architecture of neural network with two input, one output and three hidden neurons occupies only 44% of CLB slices. An efficient and fast carry look-ahead adder and Booth multiplier are the essential building blocks of the processing elements to perform parallel computation in the neural network. The activation function has been carried out based on piecewise linear approximation only with combinational logic circuits
本文提出了一种基于VHDL的快速灵活的前馈神经网络的硬件实现方法,该神经网络具有处理定点算术运算的能力,并且具有最少的CLB切片数和良好的性能速度。两输入一输出、三个隐藏神经元的神经网络硬件结构仅占CLB切片的44%。高效、快速的进位前瞻加法器和布斯乘法器是实现神经网络并行计算的基本组成部分。激活函数仅在组合逻辑电路中基于分段线性逼近实现
{"title":"Multilayer Perceptron Neural Network Architecture using VHDL with Combinational Logic Sigmoid Function","authors":"S. P. Joy Vasantha Rani, P. Kanagasabapathy","doi":"10.1109/ICSCN.2007.350771","DOIUrl":"https://doi.org/10.1109/ICSCN.2007.350771","url":null,"abstract":"This paper presents the hardware realization of fast and flexible feed forward neural network which is capable of dealing with fixed point arithmetic operations using VHDL with minimum number of CLB slices and good speed of performance. The hardware architecture of neural network with two input, one output and three hidden neurons occupies only 44% of CLB slices. An efficient and fast carry look-ahead adder and Booth multiplier are the essential building blocks of the processing elements to perform parallel computation in the neural network. The activation function has been carried out based on piecewise linear approximation only with combinational logic circuits","PeriodicalId":257948,"journal":{"name":"2007 International Conference on Signal Processing, Communications and Networking","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114168708","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Optimal Feature Selection and Automatic Classification of Abnormal Masses in Ultrasound Liver Images 肝脏超声图像异常肿块的最优特征选择与自动分类
Pub Date : 2007-11-05 DOI: 10.1109/ICSCN.2007.350789
S. Poonguzhali, B. Deepalakshmi, G. Ravindran
Ultrasound imaging has found its own place in medical applications as an effective diagnostic tool. Ultrasonic diagnostics has made possible the detection of cysts, tumors or cancers in abdominal organs. In this paper, the possibilities of an automatic classification of ultrasonic liver images by optimal selection of texture features are explored. These features are used to classify these images into four classes-normal, cyst, benign and malignant masses. The texture features are extracted using the various statistical and signal processing methods. The automatic optimal feature selection process is based on the principal component analysis. This method extracts the principal features, or directions of maximum information from the data set. Using this new reduced feature set, the abnormalities are classified using the K-means clustering method. Based on the correct classification rate, a new optimal reduced feature set is created by combining the principal features extracted from the different texture features, to get a higher classification rate
超声成像作为一种有效的诊断工具已经在医学应用中找到了自己的位置。超声诊断使腹部器官的囊肿、肿瘤或癌症的检测成为可能。本文探讨了通过纹理特征的优化选择对超声肝脏图像进行自动分类的可能性。这些特征被用来将这些图像分为四类:正常、囊肿、良性和恶性肿块。使用各种统计和信号处理方法提取纹理特征。基于主成分分析的自动最优特征选择过程。该方法从数据集中提取最大信息的主要特征或方向。使用这种新的简化特征集,使用K-means聚类方法对异常进行分类。在正确分类率的基础上,结合从不同纹理特征中提取的主特征,生成新的最优约简特征集,以获得更高的分类率
{"title":"Optimal Feature Selection and Automatic Classification of Abnormal Masses in Ultrasound Liver Images","authors":"S. Poonguzhali, B. Deepalakshmi, G. Ravindran","doi":"10.1109/ICSCN.2007.350789","DOIUrl":"https://doi.org/10.1109/ICSCN.2007.350789","url":null,"abstract":"Ultrasound imaging has found its own place in medical applications as an effective diagnostic tool. Ultrasonic diagnostics has made possible the detection of cysts, tumors or cancers in abdominal organs. In this paper, the possibilities of an automatic classification of ultrasonic liver images by optimal selection of texture features are explored. These features are used to classify these images into four classes-normal, cyst, benign and malignant masses. The texture features are extracted using the various statistical and signal processing methods. The automatic optimal feature selection process is based on the principal component analysis. This method extracts the principal features, or directions of maximum information from the data set. Using this new reduced feature set, the abnormalities are classified using the K-means clustering method. Based on the correct classification rate, a new optimal reduced feature set is created by combining the principal features extracted from the different texture features, to get a higher classification rate","PeriodicalId":257948,"journal":{"name":"2007 International Conference on Signal Processing, Communications and Networking","volume":"129 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122075274","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 28
Analysis Methods of Firewall Policies by using Spatial Relationships between Filters 基于过滤器空间关系的防火墙策略分析方法
Pub Date : 2007-11-05 DOI: 10.1109/ICSCN.2007.350761
Y. Yin, R. Bhuvaneswaran, Y. Katayama, N. Takahashi
Network security can be increased by filtering packets at a firewall. Packet filtering examines network packets and decides whether to accept or deny them, and these decisions are made according to policies that are established by the network administrator and implemented by specific filters. An administrator who finds it hard to understand and maintain a policy, will not easily find problems that occur when the filters are changed (added, deleted, or replaced) or when hierarchical firewalls are used and will therefore not be certain that the intended policies are implemented correctly and completely. In this paper, we consider the relations of filters as spatial relations, and propose three analysis methods (impact inferring, equality judgment, and composition analysis) to determine anomalies of firewall policies by using spatial relations between filters
通过在防火墙对数据包进行过滤,可以提高网络安全性。包过滤对网络数据包进行检测,并根据网络管理员制定的策略决定是否接受或拒绝这些数据包,这些策略由特定的过滤器实现。如果管理员很难理解和维护策略,那么在更改过滤器(添加、删除或替换)或使用分层防火墙时,就不容易发现出现的问题,因此无法确定预期的策略是否得到了正确和完整的实现。本文将过滤器之间的关系视为空间关系,提出了三种分析方法(影响推断、相等性判断和成分分析),利用过滤器之间的空间关系来判断防火墙策略的异常
{"title":"Analysis Methods of Firewall Policies by using Spatial Relationships between Filters","authors":"Y. Yin, R. Bhuvaneswaran, Y. Katayama, N. Takahashi","doi":"10.1109/ICSCN.2007.350761","DOIUrl":"https://doi.org/10.1109/ICSCN.2007.350761","url":null,"abstract":"Network security can be increased by filtering packets at a firewall. Packet filtering examines network packets and decides whether to accept or deny them, and these decisions are made according to policies that are established by the network administrator and implemented by specific filters. An administrator who finds it hard to understand and maintain a policy, will not easily find problems that occur when the filters are changed (added, deleted, or replaced) or when hierarchical firewalls are used and will therefore not be certain that the intended policies are implemented correctly and completely. In this paper, we consider the relations of filters as spatial relations, and propose three analysis methods (impact inferring, equality judgment, and composition analysis) to determine anomalies of firewall policies by using spatial relations between filters","PeriodicalId":257948,"journal":{"name":"2007 International Conference on Signal Processing, Communications and Networking","volume":"2012 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128974312","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Spatial Domain- High Capacity Data Hiding in ROI Images 空间域-高容量数据隐藏在ROI图像
Pub Date : 2007-11-05 DOI: 10.1109/ICSCN.2007.350657
B. Smitha, K. A. Navas
Digital watermarking, one of the data hiding techniques has become an emerging area of research due to the wide spread use of Internet and intranets. Though the watermark is used for authentication purpose, its methodology has been adapted for hiding data in many applications namely electronic patient record (EPR) data hiding in medical images. Medical images are usually large sized images and stored without loss of redundancy. Recent researches have proven that appropriate level of JPEG (joint picture expert group) compression may be used on these image types without loss of diagnostic content. This has provided an opportunity for more rapid image transmission. This work focuses on the estimation of the data hiding capacity of region of interest (ROI) medical images and optimizing the JPEG survival level that allow acceptable JPEG compression for conventional spatial domain watermarking techniques namely LSB technique, additive technique and spread spectrum technique
数字水印作为一种数据隐藏技术,随着Internet和intranet的广泛应用而成为一个新兴的研究领域。虽然水印被用于认证目的,但其方法已被用于许多应用中的数据隐藏,即电子病历(EPR)数据隐藏在医学图像中。医学图像通常是大尺寸的图像,存储时不丢失冗余。最近的研究证明,在不丢失诊断内容的情况下,可以对这些图像类型使用适当水平的JPEG(联合图像专家组)压缩。这为更快速的图像传输提供了机会。本文主要研究感兴趣区域(ROI)医学图像的数据隐藏能力估计,并优化JPEG生存水平,使传统的空间域水印技术(LSB技术、加性技术和扩频技术)能够接受JPEG压缩
{"title":"Spatial Domain- High Capacity Data Hiding in ROI Images","authors":"B. Smitha, K. A. Navas","doi":"10.1109/ICSCN.2007.350657","DOIUrl":"https://doi.org/10.1109/ICSCN.2007.350657","url":null,"abstract":"Digital watermarking, one of the data hiding techniques has become an emerging area of research due to the wide spread use of Internet and intranets. Though the watermark is used for authentication purpose, its methodology has been adapted for hiding data in many applications namely electronic patient record (EPR) data hiding in medical images. Medical images are usually large sized images and stored without loss of redundancy. Recent researches have proven that appropriate level of JPEG (joint picture expert group) compression may be used on these image types without loss of diagnostic content. This has provided an opportunity for more rapid image transmission. This work focuses on the estimation of the data hiding capacity of region of interest (ROI) medical images and optimizing the JPEG survival level that allow acceptable JPEG compression for conventional spatial domain watermarking techniques namely LSB technique, additive technique and spread spectrum technique","PeriodicalId":257948,"journal":{"name":"2007 International Conference on Signal Processing, Communications and Networking","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120927203","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 27
Network Intrusion Detection using Hybrid Neural Networks 基于混合神经网络的网络入侵检测
Pub Date : 2007-11-05 DOI: 10.1109/ICSCN.2007.350665
P. G. Kumar, D. Devaraj
Intrusion detection is a critical process in network security. It is the task of detecting, preventing and possibly reacting to the attack and intrusions in a network based computer systems. This paper presents an intrusion detection system based on self-organizing maps (SOM) and back propagation network (BPN) for visualizing and classifying intrusion. The performance of the proposed hybrid neural network approach is tested using KDD cup' 99 data available in the UCI KDD archive. The proposed approach considers all kinds of attacks under major category (normal, DOS, probe,U2R, and R2L) which provides an insightful visualization for network intrusion and works well in detecting different attacks in the considered system
入侵检测是网络安全的关键环节。在基于网络的计算机系统中,它的任务是检测、防止并可能对攻击和入侵作出反应。提出了一种基于自组织映射(SOM)和反向传播网络(BPN)的入侵检测系统,用于对入侵进行可视化和分类。使用UCI KDD存档中的KDD cup' 99数据对所提出的混合神经网络方法的性能进行了测试。该方法考虑了主要类别(normal、DOS、probe、U2R和R2L)下的各种攻击,为网络入侵提供了直观的可视化,并能很好地检测所考虑系统中的各种攻击
{"title":"Network Intrusion Detection using Hybrid Neural Networks","authors":"P. G. Kumar, D. Devaraj","doi":"10.1109/ICSCN.2007.350665","DOIUrl":"https://doi.org/10.1109/ICSCN.2007.350665","url":null,"abstract":"Intrusion detection is a critical process in network security. It is the task of detecting, preventing and possibly reacting to the attack and intrusions in a network based computer systems. This paper presents an intrusion detection system based on self-organizing maps (SOM) and back propagation network (BPN) for visualizing and classifying intrusion. The performance of the proposed hybrid neural network approach is tested using KDD cup' 99 data available in the UCI KDD archive. The proposed approach considers all kinds of attacks under major category (normal, DOS, probe,U2R, and R2L) which provides an insightful visualization for network intrusion and works well in detecting different attacks in the considered system","PeriodicalId":257948,"journal":{"name":"2007 International Conference on Signal Processing, Communications and Networking","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127690572","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
A Null Symbol Detection Algorithm for DAB Receivers 一种用于DAB接收机的空符号检测算法
Pub Date : 2007-11-05 DOI: 10.1109/ICSCN.2007.350754
B. Vinod, S. Srikanth
Digital audio broadcasting (DAB) systems are expected to gain popularity in the near future as they offer better services compared to existing FM broadcasting. An important task of a DAB receiver is frame synchronization, which involves detecting the presence of a signal and determining the start of the frame. The detection method has to be robust and provide an arbitrarily low probability of false alarm in any potential channel condition. In this paper, we propose a robust algorithm to determine the start of frame and present the performance results in simulated conditions
数字音频广播(DAB)系统比现有的调频广播提供更好的服务,预计在不久的将来将得到普及。DAB接收机的一项重要任务是帧同步,它包括检测信号的存在和确定帧的开始。检测方法必须具有鲁棒性,并在任何潜在的信道条件下提供任意低的虚警概率。在本文中,我们提出了一种鲁棒的算法来确定帧的开始,并给出了在模拟条件下的性能结果
{"title":"A Null Symbol Detection Algorithm for DAB Receivers","authors":"B. Vinod, S. Srikanth","doi":"10.1109/ICSCN.2007.350754","DOIUrl":"https://doi.org/10.1109/ICSCN.2007.350754","url":null,"abstract":"Digital audio broadcasting (DAB) systems are expected to gain popularity in the near future as they offer better services compared to existing FM broadcasting. An important task of a DAB receiver is frame synchronization, which involves detecting the presence of a signal and determining the start of the frame. The detection method has to be robust and provide an arbitrarily low probability of false alarm in any potential channel condition. In this paper, we propose a robust algorithm to determine the start of frame and present the performance results in simulated conditions","PeriodicalId":257948,"journal":{"name":"2007 International Conference on Signal Processing, Communications and Networking","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131760091","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Erasure Correcting Capability of SPC Product Codes SPC产品代码的擦除校正能力
Pub Date : 2007-11-05 DOI: 10.1109/ICSCN.2007.350727
R. Amutha
Product codes are powerful codes that can be used to correct errors or recover erasures. The simplest form of a product code is that where every row and every column is terminated by a single parity bit referred to as single parity check (SPC) product code. This code has a minimum distance of four and is thus guaranteed to recover all single, double, and triple erasure patterns. Judging the code performance based on its minimum distance is very pessimistic because the code is actually capable of recovering many higher erasure patterns. A detailed mathematical analysis has been carried out for erasure pattern of the SPC product code. We derive a formula for finding the number of unrecoverable basic pattern and the number of recoverable pattern generated from the unrecoverable basic pattern. The post decoding rate is calculated for SPC product code. Our results are in good agreement with Kousa (2002). Simulation results show that the error correcting capability of the SPC product code is beyond the minimum distance
产品代码是功能强大的代码,可用于纠正错误或恢复擦除。产品代码的最简单形式是每一行和每一列都以单个奇偶校验位结束,称为单奇偶校验(SPC)产品代码。该代码的最小距离为4,因此可以保证恢复所有的单、双和三擦除模式。根据最小距离来判断代码性能是非常悲观的,因为代码实际上能够恢复许多更高的擦除模式。对SPC产品代码的擦除模式进行了详细的数学分析。导出了求不可恢复基本模式数和由不可恢复基本模式生成的可恢复模式数的公式。后解码率是为SPC产品代码计算的。我们的结果与Kousa(2002)非常一致。仿真结果表明,SPC产品码的纠错能力超过最小距离
{"title":"Erasure Correcting Capability of SPC Product Codes","authors":"R. Amutha","doi":"10.1109/ICSCN.2007.350727","DOIUrl":"https://doi.org/10.1109/ICSCN.2007.350727","url":null,"abstract":"Product codes are powerful codes that can be used to correct errors or recover erasures. The simplest form of a product code is that where every row and every column is terminated by a single parity bit referred to as single parity check (SPC) product code. This code has a minimum distance of four and is thus guaranteed to recover all single, double, and triple erasure patterns. Judging the code performance based on its minimum distance is very pessimistic because the code is actually capable of recovering many higher erasure patterns. A detailed mathematical analysis has been carried out for erasure pattern of the SPC product code. We derive a formula for finding the number of unrecoverable basic pattern and the number of recoverable pattern generated from the unrecoverable basic pattern. The post decoding rate is calculated for SPC product code. Our results are in good agreement with Kousa (2002). Simulation results show that the error correcting capability of the SPC product code is beyond the minimum distance","PeriodicalId":257948,"journal":{"name":"2007 International Conference on Signal Processing, Communications and Networking","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131832812","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2007 International Conference on Signal Processing, Communications and Networking
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1