首页 > 最新文献

2007 International Conference on Signal Processing, Communications and Networking最新文献

英文 中文
Dominating Set Theory Based Semantic Overlay Networks for Efficient Content Distribution 基于支配集理论的高效内容分发语义覆盖网络
Pub Date : 2007-11-05 DOI: 10.1109/ICSCN.2007.350736
J. Amutharaj, S. Radhakrishnan
Overlay networks have emerged as a powerful and highly flexible method of delivering content. An overlay network is a network running on top of another network, usually the Internet. These networks are employed in many settings to provide logical communication infrastructure over an existing communication network. The main objective of the overlay network is to reduce routing path lengths, stretched by the overlay routing process. In most solutions developed, a kind of fixed infrastructure in the form of excessive message exchange is necessary to guarantee good overlay locality properties. This paper presents a richly connected overlay networks based on Dominating Set Theory to optimize the number of nodes for large data transfer. Fast Replica algorithm is applied to reduce the content transfer time for replicating the content within the semantic network. To download a file from different peers in parallel from the semantic overlay network (SON) a dynamic parallel access scheme is introduced where end users access the members of the SON at the same time, fetching different portions of that file from different peers and reassembling them locally. The load is dynamically shared among all the peers. An enhanced digital fountain with Tornado codes is applied to eliminate the need for retransmission requests from the end users. Receivers run the decoding algorithm to reconstruct the original content. In this no feedback mechanisms are needed to ensure reliable delivery. This paper analyzes the performance of sequential unicast and multiple unicast content distribution strategies and compares their performance with our scheme and also analyzes the impact of dominating set theory for the construction of semantic overlays
覆盖网络已经成为一种强大而高度灵活的内容传递方式。覆盖网络是运行在另一个网络(通常是因特网)之上的网络。这些网络在许多设置中用于在现有通信网络上提供逻辑通信基础设施。覆盖网络的主要目标是减少路由路径长度,这是由覆盖路由过程拉伸的。在大多数已开发的解决方案中,为了保证良好的覆盖局部性,需要一种固定的基础设施(以过度消息交换的形式)。为了优化大数据传输的节点数,提出了一种基于支配集理论的多连通叠加网络。采用快速复制算法对语义网络内的内容进行复制,减少了内容传输时间。为了从语义覆盖网络(SON)上从不同节点并行下载文件,引入了一种动态并行访问方案,即终端用户同时访问SON的成员,从不同节点获取该文件的不同部分并在本地重新组装它们。负载在所有对等体之间动态共享。一个增强的数字喷泉与龙卷风代码被应用,以消除需要从终端用户的重传请求。接收器运行解码算法来重建原始内容。在这种情况下,不需要反馈机制来确保可靠的交付。本文分析了顺序单播和多单播内容分发策略的性能,并与我们的方案进行了性能比较,同时分析了支配集理论对构建语义覆盖的影响
{"title":"Dominating Set Theory Based Semantic Overlay Networks for Efficient Content Distribution","authors":"J. Amutharaj, S. Radhakrishnan","doi":"10.1109/ICSCN.2007.350736","DOIUrl":"https://doi.org/10.1109/ICSCN.2007.350736","url":null,"abstract":"Overlay networks have emerged as a powerful and highly flexible method of delivering content. An overlay network is a network running on top of another network, usually the Internet. These networks are employed in many settings to provide logical communication infrastructure over an existing communication network. The main objective of the overlay network is to reduce routing path lengths, stretched by the overlay routing process. In most solutions developed, a kind of fixed infrastructure in the form of excessive message exchange is necessary to guarantee good overlay locality properties. This paper presents a richly connected overlay networks based on Dominating Set Theory to optimize the number of nodes for large data transfer. Fast Replica algorithm is applied to reduce the content transfer time for replicating the content within the semantic network. To download a file from different peers in parallel from the semantic overlay network (SON) a dynamic parallel access scheme is introduced where end users access the members of the SON at the same time, fetching different portions of that file from different peers and reassembling them locally. The load is dynamically shared among all the peers. An enhanced digital fountain with Tornado codes is applied to eliminate the need for retransmission requests from the end users. Receivers run the decoding algorithm to reconstruct the original content. In this no feedback mechanisms are needed to ensure reliable delivery. This paper analyzes the performance of sequential unicast and multiple unicast content distribution strategies and compares their performance with our scheme and also analyzes the impact of dominating set theory for the construction of semantic overlays","PeriodicalId":257948,"journal":{"name":"2007 International Conference on Signal Processing, Communications and Networking","volume":"107 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132544300","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Arithmetic Coding with Forbidden Symbol and Optimized Adaptive Context Tree Modeling (GRASP Algorithm) for H.264 Video Coders H.264视频编码器的禁止符号算术编码和优化的自适应上下文树建模(GRASP算法)
Pub Date : 2007-11-05 DOI: 10.1109/ICSCN.2007.350679
E. Logashanmugam, B. Sreejaa, R. Ramachandran
In this paper we propose applying an adaptive context tree weighting method with a forbidden symbol in the H.264 coder. Arithmetic codes with a forbidden symbol and a trellis search techniques are employed on an order to estimate the best transmitted codeword. Instead of using the context modeling defined in the H.264 standard, the arithmetic code with a forbidden symbol uses a CTW method. The CABAC algorithm is replaced by GRASP algorithm and the experimental results show that coding gains similar or superior to those obtained with the H.264/AVC CABAC algorithm and arithmetic coding
本文提出在H.264编码器中应用一种带有禁止符号的自适应上下文树加权方法。采用带禁止符号的算术编码和网格搜索技术,估计出最佳传输码字。与H.264标准中定义的上下文建模不同,带有禁止符号的算术代码使用了CTW方法。用GRASP算法代替CABAC算法,实验结果表明,采用H.264/AVC CABAC算法和算术编码获得的编码增益接近或优于前者
{"title":"Arithmetic Coding with Forbidden Symbol and Optimized Adaptive Context Tree Modeling (GRASP Algorithm) for H.264 Video Coders","authors":"E. Logashanmugam, B. Sreejaa, R. Ramachandran","doi":"10.1109/ICSCN.2007.350679","DOIUrl":"https://doi.org/10.1109/ICSCN.2007.350679","url":null,"abstract":"In this paper we propose applying an adaptive context tree weighting method with a forbidden symbol in the H.264 coder. Arithmetic codes with a forbidden symbol and a trellis search techniques are employed on an order to estimate the best transmitted codeword. Instead of using the context modeling defined in the H.264 standard, the arithmetic code with a forbidden symbol uses a CTW method. The CABAC algorithm is replaced by GRASP algorithm and the experimental results show that coding gains similar or superior to those obtained with the H.264/AVC CABAC algorithm and arithmetic coding","PeriodicalId":257948,"journal":{"name":"2007 International Conference on Signal Processing, Communications and Networking","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133356298","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Secure Steganography using Colour Palette Decomposition 使用调色板分解的安全隐写
Pub Date : 2007-11-05 DOI: 10.1109/ICSCN.2007.350699
K. Raja, S. Siddaraju, K. Venugopal, L. Patnaik
The steganography is the embedding of secret message in the cover image for covert communication. In this paper we present a high capacity data embedding using colour palette decomposition (CPD) in which the payload is embedded into the cover image as an index of shifted centroids which is derived from the clustering of the cover image to derive the stego image. The error control coding is applied to stego image to increase PSNR, capacity and security. It is observed that our algorithm has higher PSNR and capacity in comparison to earlier works
隐写术是将秘密信息嵌入到封面图像中进行秘密通信。在本文中,我们提出了一种使用调色板分解(CPD)的高容量数据嵌入,其中有效载荷被嵌入到覆盖图像中,作为从覆盖图像聚类导出的移位质心的索引,以导出隐写图像。对隐写图像进行误差控制编码,提高了图像的信噪比、容量和安全性。实验结果表明,该算法具有较高的PSNR和容量
{"title":"Secure Steganography using Colour Palette Decomposition","authors":"K. Raja, S. Siddaraju, K. Venugopal, L. Patnaik","doi":"10.1109/ICSCN.2007.350699","DOIUrl":"https://doi.org/10.1109/ICSCN.2007.350699","url":null,"abstract":"The steganography is the embedding of secret message in the cover image for covert communication. In this paper we present a high capacity data embedding using colour palette decomposition (CPD) in which the payload is embedded into the cover image as an index of shifted centroids which is derived from the clustering of the cover image to derive the stego image. The error control coding is applied to stego image to increase PSNR, capacity and security. It is observed that our algorithm has higher PSNR and capacity in comparison to earlier works","PeriodicalId":257948,"journal":{"name":"2007 International Conference on Signal Processing, Communications and Networking","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132635054","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A Distributed Approach using Entropy to Detect DDoS Attacks in ISP Domain 基于熵的分布式ISP域DDoS攻击检测方法
Pub Date : 2007-11-05 DOI: 10.1109/ICSCN.2007.350758
Krishan Kumar, Rajesh Joshi, K. Singh
DDoS attacks are best detected near the victim's site as maximum attack traffic converges at this point. In most of the current solutions, monitoring and analysis of traffic for DDoS detection have been carried at a single link which connects victim to ISP. However the mammoth volume generated by DDoS attacks pose the biggest challenge in terms of memory and computational overheads. These overheads make DDoS solution itself vulnerable against DDoS attacks. We propose to distribute these overheads amongst all POPs of the ISP using an ISP level traffic feature distribution based approach. An ISP level topology and well known attack tools are used for simulations in ns-2. The comparison with volume based approach clearly indicates the supremacy of the proposed methodology
DDoS攻击最好在受害者站点附近检测到,因为最大的攻击流量在此时聚集。在目前的大多数解决方案中,用于DDoS检测的流量监控和分析都是在连接受害者和ISP的单链路上进行的。然而,DDoS攻击产生的巨大容量在内存和计算开销方面构成了最大的挑战。这些开销使得DDoS解决方案本身容易受到DDoS攻击。我们建议使用基于ISP级流量特征分布的方法在ISP的所有pop之间分配这些开销。在ns-2的模拟中使用了ISP级拓扑和众所周知的攻击工具。与基于量的方法的比较清楚地表明了所提出方法的优越性
{"title":"A Distributed Approach using Entropy to Detect DDoS Attacks in ISP Domain","authors":"Krishan Kumar, Rajesh Joshi, K. Singh","doi":"10.1109/ICSCN.2007.350758","DOIUrl":"https://doi.org/10.1109/ICSCN.2007.350758","url":null,"abstract":"DDoS attacks are best detected near the victim's site as maximum attack traffic converges at this point. In most of the current solutions, monitoring and analysis of traffic for DDoS detection have been carried at a single link which connects victim to ISP. However the mammoth volume generated by DDoS attacks pose the biggest challenge in terms of memory and computational overheads. These overheads make DDoS solution itself vulnerable against DDoS attacks. We propose to distribute these overheads amongst all POPs of the ISP using an ISP level traffic feature distribution based approach. An ISP level topology and well known attack tools are used for simulations in ns-2. The comparison with volume based approach clearly indicates the supremacy of the proposed methodology","PeriodicalId":257948,"journal":{"name":"2007 International Conference on Signal Processing, Communications and Networking","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117311301","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 88
Fuzzy Pairwise Generalized a-Closed Mappings in Fuzzy Bitopological Spaces 模糊双拓扑空间中的模糊对广义a闭映射
Pub Date : 2007-11-05 DOI: 10.1109/ICSCN.2007.350777
K. Bhuvaneswari, S. Sivanandam
In this paper we introduce and study the concept of (taui , tauj)-fuzzy generalized alpha-closed sets, (tau i, tauj)-fuzzy pair wise generalized xi-mappings, where xiisin {continuous, open closed and irresolute}
本文引入并研究了(taui, tauj)-模糊广义封闭集、(taui, tauj)-模糊对广义xi-映射的概念,其中xiisin{连续、开闭、不确定}
{"title":"Fuzzy Pairwise Generalized a-Closed Mappings in Fuzzy Bitopological Spaces","authors":"K. Bhuvaneswari, S. Sivanandam","doi":"10.1109/ICSCN.2007.350777","DOIUrl":"https://doi.org/10.1109/ICSCN.2007.350777","url":null,"abstract":"In this paper we introduce and study the concept of (tau<sub>i </sub>, tau<sub>j</sub>)-fuzzy generalized alpha-closed sets, (tau <sub>i</sub>, tau<sub>j</sub>)-fuzzy pair wise generalized xi-mappings, where xiisin {continuous, open closed and irresolute}","PeriodicalId":257948,"journal":{"name":"2007 International Conference on Signal Processing, Communications and Networking","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114965972","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On Image Generation by Sequential/Parallel Array Grammars 基于顺序/并行数组语法的图像生成
Pub Date : 2007-11-05 DOI: 10.1109/ICSCN.2007.350698
K. G. Subramanian, S. Hemalatha, C. Sri, Hari Nagore
A two-dimensional array grammar that uses sequential rewriting in a horizontal phase and parallel rewriting in the vertical phase, is proposed for generation of images that are rectangular arrays of symbols. This model which is related but different from a similar model introduced, is compared with the other model, for its image generative power. An application to generation of interesting patterns is also considered
提出了一种二维数组语法,该语法在水平阶段使用顺序重写,在垂直阶段使用并行重写,用于生成矩形符号数组图像。该模型与已介绍的同类模型既有联系又有区别,并与其他模型进行了图像生成能力的比较。还考虑了一个生成有趣模式的应用程序
{"title":"On Image Generation by Sequential/Parallel Array Grammars","authors":"K. G. Subramanian, S. Hemalatha, C. Sri, Hari Nagore","doi":"10.1109/ICSCN.2007.350698","DOIUrl":"https://doi.org/10.1109/ICSCN.2007.350698","url":null,"abstract":"A two-dimensional array grammar that uses sequential rewriting in a horizontal phase and parallel rewriting in the vertical phase, is proposed for generation of images that are rectangular arrays of symbols. This model which is related but different from a similar model introduced, is compared with the other model, for its image generative power. An application to generation of interesting patterns is also considered","PeriodicalId":257948,"journal":{"name":"2007 International Conference on Signal Processing, Communications and Networking","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125380599","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Curvelet Transform Based Embedded Lossy Image Compression 基于曲波变换的嵌入式有损图像压缩
Pub Date : 2007-11-05 DOI: 10.1109/ICSCN.2007.350745
M. Manikandan, A. Saravanan, K. Bagan
Curvelet transform is one of the recently developed multiscale transform, which possess directional features and provides optimally sparse representation of objects with edges. In this paper an algorithm for lossy image compression based on the second generation digital curvelet transform is proposed. The results are compared with the results obtained from wavelet based image compression methods. Compression ratio and PSNR are selected as the performance metrics,and it is shown that curvelet transform require fewer coefficients than wavelet transform to represent an image faithfully
曲波变换是近年来发展起来的一种多尺度变换,它具有方向性特征,能够对具有边缘的物体进行最优的稀疏表示。提出了一种基于第二代数字曲线变换的有损图像压缩算法。将所得结果与基于小波变换的图像压缩方法进行了比较。选择压缩比和PSNR作为性能指标,曲线变换比小波变换需要更少的系数来真实地表示图像
{"title":"Curvelet Transform Based Embedded Lossy Image Compression","authors":"M. Manikandan, A. Saravanan, K. Bagan","doi":"10.1109/ICSCN.2007.350745","DOIUrl":"https://doi.org/10.1109/ICSCN.2007.350745","url":null,"abstract":"Curvelet transform is one of the recently developed multiscale transform, which possess directional features and provides optimally sparse representation of objects with edges. In this paper an algorithm for lossy image compression based on the second generation digital curvelet transform is proposed. The results are compared with the results obtained from wavelet based image compression methods. Compression ratio and PSNR are selected as the performance metrics,and it is shown that curvelet transform require fewer coefficients than wavelet transform to represent an image faithfully","PeriodicalId":257948,"journal":{"name":"2007 International Conference on Signal Processing, Communications and Networking","volume":"116 1-4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120889912","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
Code Tree Extension and Performance Improvement in OVSF-CDMA Systems OVSF-CDMA系统的代码树扩展与性能改进
Pub Date : 2007-11-05 DOI: 10.1109/ICSCN.2007.350755
D. Saini, S. Bhooshan
UTRA-FDD systems use orthogonal variable spreading factor (OVSF) codes for channel separation in uplink and downlink. The OVSF codes are the limited resources in the downlink. The limited codes as well as code blocking property of OVSF codes gives lower system throughput. In this paper the OVSF code tree is extended such that the capacity of the tree becomes four times. Also the modified system uses single rake combiner providing no additional complexity increase in the user equipments (UEs). Simulation results are demonstrated to show the reduction in new call blocking probability using the OVSF code tree extension
UTRA-FDD系统在上行链路和下行链路中使用正交可变扩频因子(OVSF)编码进行信道分离。OVSF代码是下行链路中有限的资源。OVSF码的码限和码块特性使得系统吞吐量较低。本文对OVSF代码树进行了扩展,使其容量增大到原来的四倍。此外,改进后的系统使用单耙组合器,不会增加用户设备(ue)的额外复杂性。仿真结果表明,使用OVSF代码树扩展可以降低新调用阻塞概率
{"title":"Code Tree Extension and Performance Improvement in OVSF-CDMA Systems","authors":"D. Saini, S. Bhooshan","doi":"10.1109/ICSCN.2007.350755","DOIUrl":"https://doi.org/10.1109/ICSCN.2007.350755","url":null,"abstract":"UTRA-FDD systems use orthogonal variable spreading factor (OVSF) codes for channel separation in uplink and downlink. The OVSF codes are the limited resources in the downlink. The limited codes as well as code blocking property of OVSF codes gives lower system throughput. In this paper the OVSF code tree is extended such that the capacity of the tree becomes four times. Also the modified system uses single rake combiner providing no additional complexity increase in the user equipments (UEs). Simulation results are demonstrated to show the reduction in new call blocking probability using the OVSF code tree extension","PeriodicalId":257948,"journal":{"name":"2007 International Conference on Signal Processing, Communications and Networking","volume":"303 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122723059","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Effect of Adapter Promiscuous Mode Operation on DSR Performance in MANETs 适配器混杂模式操作对manet中DSR性能的影响
Pub Date : 2007-11-05 DOI: 10.1109/ICSCN.2007.350693
N. Chatterjee, Y. Jaya Lakshmi, A. Potluri, A. Negi
The route discovery stage in MANET routing requires multi-hop message communication and is a crucial stage of any MANET routing protocol. Any optimization which increases the overall effectiveness in terms of routing efficiency and power utilization would improve the MANET performance. In this paper, we present our study of the effect of promiscuous mode operation of the wireless adapters on the dynamic source routing protocol (DSR) performance in different mobility and density conditions. DSR is an on-demand routing protocol that is actively being studied by IETF for standardization. The performance, especially with respect to power dissipation is observed and we correlate this with the packet delivery ratio and present our recommendations. Contrary to the expectation that an adapter in promiscuous mode would unnecessarily dissipate more energy, from our simulations we find that the overall MANET efficiency is enhanced
在MANET路由中,路由发现阶段需要进行多跳消息通信,是任何MANET路由协议的关键阶段。任何提高路由效率和功率利用率的整体有效性的优化都将提高MANET的性能。本文研究了在不同移动和密度条件下,无线适配器的混杂模式对动态源路由协议(DSR)性能的影响。DSR是一种按需路由协议,IETF正在积极研究它的标准化。我们观察了性能,特别是功耗方面的性能,并将其与数据包传送率联系起来,并提出了我们的建议。与期望适配器在混杂模式下会不必要地消耗更多能量相反,从我们的模拟中,我们发现整体MANET效率得到了提高
{"title":"Effect of Adapter Promiscuous Mode Operation on DSR Performance in MANETs","authors":"N. Chatterjee, Y. Jaya Lakshmi, A. Potluri, A. Negi","doi":"10.1109/ICSCN.2007.350693","DOIUrl":"https://doi.org/10.1109/ICSCN.2007.350693","url":null,"abstract":"The route discovery stage in MANET routing requires multi-hop message communication and is a crucial stage of any MANET routing protocol. Any optimization which increases the overall effectiveness in terms of routing efficiency and power utilization would improve the MANET performance. In this paper, we present our study of the effect of promiscuous mode operation of the wireless adapters on the dynamic source routing protocol (DSR) performance in different mobility and density conditions. DSR is an on-demand routing protocol that is actively being studied by IETF for standardization. The performance, especially with respect to power dissipation is observed and we correlate this with the packet delivery ratio and present our recommendations. Contrary to the expectation that an adapter in promiscuous mode would unnecessarily dissipate more energy, from our simulations we find that the overall MANET efficiency is enhanced","PeriodicalId":257948,"journal":{"name":"2007 International Conference on Signal Processing, Communications and Networking","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129543375","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
SOVA-Based Turbo Equalization and Decoding for Indoor Wireless Channels 基于sova的室内无线信道Turbo均衡与解码
Pub Date : 2007-11-05 DOI: 10.1109/ICSCN.2007.350706
A. Tripathy, S. S. Pathak, Soumen Chakrabarti
The soft output Viterbi algorithm (SOVA) is used for data detection in indoor wireless channels representative of the JTC and wireless local area network (WLAN). The performance of SOVA-SOVA permutation as an equalizer followed by a decoder is evaluated by simulation experiment. The performance does not improve much for more than three iterations in these ISI channels. The results obtained for 1 dB to 4 dB bit energy to noise power approach the coded AWGN performance by the end of the third iteration
软输出维特比算法(SOVA)用于JTC和无线局域网(WLAN)代表的室内无线信道的数据检测。通过仿真实验对SOVA-SOVA置换作为均衡器后加解码器的性能进行了评价。在这些ISI通道中,超过三次迭代的性能并没有得到很大的改善。第三次迭代时,得到的1 ~ 4 dB比特能量与噪声功率之比接近编码AWGN的性能
{"title":"SOVA-Based Turbo Equalization and Decoding for Indoor Wireless Channels","authors":"A. Tripathy, S. S. Pathak, Soumen Chakrabarti","doi":"10.1109/ICSCN.2007.350706","DOIUrl":"https://doi.org/10.1109/ICSCN.2007.350706","url":null,"abstract":"The soft output Viterbi algorithm (SOVA) is used for data detection in indoor wireless channels representative of the JTC and wireless local area network (WLAN). The performance of SOVA-SOVA permutation as an equalizer followed by a decoder is evaluated by simulation experiment. The performance does not improve much for more than three iterations in these ISI channels. The results obtained for 1 dB to 4 dB bit energy to noise power approach the coded AWGN performance by the end of the third iteration","PeriodicalId":257948,"journal":{"name":"2007 International Conference on Signal Processing, Communications and Networking","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129554568","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2007 International Conference on Signal Processing, Communications and Networking
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1