首页 > 最新文献

2007 International Conference on Signal Processing, Communications and Networking最新文献

英文 中文
SOVA-Based Turbo Equalization and Decoding for Indoor Wireless Channels 基于sova的室内无线信道Turbo均衡与解码
Pub Date : 2007-11-05 DOI: 10.1109/ICSCN.2007.350706
A. Tripathy, S. S. Pathak, Soumen Chakrabarti
The soft output Viterbi algorithm (SOVA) is used for data detection in indoor wireless channels representative of the JTC and wireless local area network (WLAN). The performance of SOVA-SOVA permutation as an equalizer followed by a decoder is evaluated by simulation experiment. The performance does not improve much for more than three iterations in these ISI channels. The results obtained for 1 dB to 4 dB bit energy to noise power approach the coded AWGN performance by the end of the third iteration
软输出维特比算法(SOVA)用于JTC和无线局域网(WLAN)代表的室内无线信道的数据检测。通过仿真实验对SOVA-SOVA置换作为均衡器后加解码器的性能进行了评价。在这些ISI通道中,超过三次迭代的性能并没有得到很大的改善。第三次迭代时,得到的1 ~ 4 dB比特能量与噪声功率之比接近编码AWGN的性能
{"title":"SOVA-Based Turbo Equalization and Decoding for Indoor Wireless Channels","authors":"A. Tripathy, S. S. Pathak, Soumen Chakrabarti","doi":"10.1109/ICSCN.2007.350706","DOIUrl":"https://doi.org/10.1109/ICSCN.2007.350706","url":null,"abstract":"The soft output Viterbi algorithm (SOVA) is used for data detection in indoor wireless channels representative of the JTC and wireless local area network (WLAN). The performance of SOVA-SOVA permutation as an equalizer followed by a decoder is evaluated by simulation experiment. The performance does not improve much for more than three iterations in these ISI channels. The results obtained for 1 dB to 4 dB bit energy to noise power approach the coded AWGN performance by the end of the third iteration","PeriodicalId":257948,"journal":{"name":"2007 International Conference on Signal Processing, Communications and Networking","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129554568","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Challenges in the Design of an Impulse Radio Based Ultra Wide Band Transceiver 基于脉冲无线电的超宽带收发器设计中的挑战
Pub Date : 2007-11-05 DOI: 10.1109/ICSCN.2007.350669
A. T. Kalghatgi
Ultra wide band (UWB) is one of the key emerging short-range wireless technology that can answer many of the problems faced by narrow band technologies. UWB offers all the advantages of spread spectrum including GHz of RF bandwidth and high data rate. UWB signals are virtually undetectable operating at noise like low power levels. UWB offers very fine range resolution and also immune to multipath fading. Conventionally UWB is defined as carrier free, impulse based radio, which communicates in time domain by only using sharp rising pulses of the order of fraction of nano seconds. In this paper challenges in the design and development of impulse radio based ultra wide band transceiver is explained. Antennas that work in time domain, UWB impulses that meet the required FCC mask on EIRP and digitizer that has to sample and process at the rate of Gigasamples per second are some of the key challenges
超宽带(UWB)是新兴的关键短距离无线技术之一,它可以解决窄带技术面临的许多问题。超宽带具有扩频的所有优点,包括GHz的射频带宽和高数据速率。在像低功率水平这样的噪声下,超宽带信号实际上是无法检测到的。超宽带提供了非常好的距离分辨率,并且不受多径衰落的影响。传统上,超宽带被定义为无载波、基于脉冲的无线电,它在时域内仅使用纳秒数量级的急剧上升脉冲进行通信。本文阐述了基于脉冲无线电的超宽带收发器的设计与开发所面临的挑战。在时域工作的天线、满足EIRP上FCC掩码要求的UWB脉冲以及必须以每秒千兆样本的速率进行采样和处理的数字化仪是一些关键挑战
{"title":"Challenges in the Design of an Impulse Radio Based Ultra Wide Band Transceiver","authors":"A. T. Kalghatgi","doi":"10.1109/ICSCN.2007.350669","DOIUrl":"https://doi.org/10.1109/ICSCN.2007.350669","url":null,"abstract":"Ultra wide band (UWB) is one of the key emerging short-range wireless technology that can answer many of the problems faced by narrow band technologies. UWB offers all the advantages of spread spectrum including GHz of RF bandwidth and high data rate. UWB signals are virtually undetectable operating at noise like low power levels. UWB offers very fine range resolution and also immune to multipath fading. Conventionally UWB is defined as carrier free, impulse based radio, which communicates in time domain by only using sharp rising pulses of the order of fraction of nano seconds. In this paper challenges in the design and development of impulse radio based ultra wide band transceiver is explained. Antennas that work in time domain, UWB impulses that meet the required FCC mask on EIRP and digitizer that has to sample and process at the rate of Gigasamples per second are some of the key challenges","PeriodicalId":257948,"journal":{"name":"2007 International Conference on Signal Processing, Communications and Networking","volume":"189 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121851978","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Curvelet Transform Based Embedded Lossy Image Compression 基于曲波变换的嵌入式有损图像压缩
Pub Date : 2007-11-05 DOI: 10.1109/ICSCN.2007.350745
M. Manikandan, A. Saravanan, K. Bagan
Curvelet transform is one of the recently developed multiscale transform, which possess directional features and provides optimally sparse representation of objects with edges. In this paper an algorithm for lossy image compression based on the second generation digital curvelet transform is proposed. The results are compared with the results obtained from wavelet based image compression methods. Compression ratio and PSNR are selected as the performance metrics,and it is shown that curvelet transform require fewer coefficients than wavelet transform to represent an image faithfully
曲波变换是近年来发展起来的一种多尺度变换,它具有方向性特征,能够对具有边缘的物体进行最优的稀疏表示。提出了一种基于第二代数字曲线变换的有损图像压缩算法。将所得结果与基于小波变换的图像压缩方法进行了比较。选择压缩比和PSNR作为性能指标,曲线变换比小波变换需要更少的系数来真实地表示图像
{"title":"Curvelet Transform Based Embedded Lossy Image Compression","authors":"M. Manikandan, A. Saravanan, K. Bagan","doi":"10.1109/ICSCN.2007.350745","DOIUrl":"https://doi.org/10.1109/ICSCN.2007.350745","url":null,"abstract":"Curvelet transform is one of the recently developed multiscale transform, which possess directional features and provides optimally sparse representation of objects with edges. In this paper an algorithm for lossy image compression based on the second generation digital curvelet transform is proposed. The results are compared with the results obtained from wavelet based image compression methods. Compression ratio and PSNR are selected as the performance metrics,and it is shown that curvelet transform require fewer coefficients than wavelet transform to represent an image faithfully","PeriodicalId":257948,"journal":{"name":"2007 International Conference on Signal Processing, Communications and Networking","volume":"116 1-4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120889912","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
An Efficient Reconfigurable Image Compression Architecture 一种高效的可重构图像压缩体系结构
Pub Date : 2007-11-05 DOI: 10.1109/ICSCN.2007.350743
D.U. Perumal, Shylendra Kumar, S. Prasanth, P. Kumar, M. Kannan, V. Vaidehi
This paper describes the development of a novel image compression architecture on runtime reconfigurable FPGAs. The partially reconfigurable discrete cosine transform architecture (PRDCT) is implemented by creating a difference bit stream between two possible architectures using flexible multiplier and accumulator (MAC) units. The non-reconfigurable modules make use of a multiplexed bus system to communicate with the reconfigurable modules. This scheme helps the user achieve significant reduction in area and power during run-time
本文介绍了一种基于运行时可重构fpga的新型图像压缩体系结构的开发。部分可重构的离散余弦变换架构(PRDCT)是通过使用灵活的乘法器和累加器(MAC)单元在两种可能的架构之间创建一个差分比特流来实现的。非可重构模块利用多路总线系统与可重构模块通信。该方案可帮助用户在运行期间显著减少面积和功耗
{"title":"An Efficient Reconfigurable Image Compression Architecture","authors":"D.U. Perumal, Shylendra Kumar, S. Prasanth, P. Kumar, M. Kannan, V. Vaidehi","doi":"10.1109/ICSCN.2007.350743","DOIUrl":"https://doi.org/10.1109/ICSCN.2007.350743","url":null,"abstract":"This paper describes the development of a novel image compression architecture on runtime reconfigurable FPGAs. The partially reconfigurable discrete cosine transform architecture (PRDCT) is implemented by creating a difference bit stream between two possible architectures using flexible multiplier and accumulator (MAC) units. The non-reconfigurable modules make use of a multiplexed bus system to communicate with the reconfigurable modules. This scheme helps the user achieve significant reduction in area and power during run-time","PeriodicalId":257948,"journal":{"name":"2007 International Conference on Signal Processing, Communications and Networking","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127536672","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Secure Steganography using Colour Palette Decomposition 使用调色板分解的安全隐写
Pub Date : 2007-11-05 DOI: 10.1109/ICSCN.2007.350699
K. Raja, S. Siddaraju, K. Venugopal, L. Patnaik
The steganography is the embedding of secret message in the cover image for covert communication. In this paper we present a high capacity data embedding using colour palette decomposition (CPD) in which the payload is embedded into the cover image as an index of shifted centroids which is derived from the clustering of the cover image to derive the stego image. The error control coding is applied to stego image to increase PSNR, capacity and security. It is observed that our algorithm has higher PSNR and capacity in comparison to earlier works
隐写术是将秘密信息嵌入到封面图像中进行秘密通信。在本文中,我们提出了一种使用调色板分解(CPD)的高容量数据嵌入,其中有效载荷被嵌入到覆盖图像中,作为从覆盖图像聚类导出的移位质心的索引,以导出隐写图像。对隐写图像进行误差控制编码,提高了图像的信噪比、容量和安全性。实验结果表明,该算法具有较高的PSNR和容量
{"title":"Secure Steganography using Colour Palette Decomposition","authors":"K. Raja, S. Siddaraju, K. Venugopal, L. Patnaik","doi":"10.1109/ICSCN.2007.350699","DOIUrl":"https://doi.org/10.1109/ICSCN.2007.350699","url":null,"abstract":"The steganography is the embedding of secret message in the cover image for covert communication. In this paper we present a high capacity data embedding using colour palette decomposition (CPD) in which the payload is embedded into the cover image as an index of shifted centroids which is derived from the clustering of the cover image to derive the stego image. The error control coding is applied to stego image to increase PSNR, capacity and security. It is observed that our algorithm has higher PSNR and capacity in comparison to earlier works","PeriodicalId":257948,"journal":{"name":"2007 International Conference on Signal Processing, Communications and Networking","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132635054","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Dominating Set Theory Based Semantic Overlay Networks for Efficient Content Distribution 基于支配集理论的高效内容分发语义覆盖网络
Pub Date : 2007-11-05 DOI: 10.1109/ICSCN.2007.350736
J. Amutharaj, S. Radhakrishnan
Overlay networks have emerged as a powerful and highly flexible method of delivering content. An overlay network is a network running on top of another network, usually the Internet. These networks are employed in many settings to provide logical communication infrastructure over an existing communication network. The main objective of the overlay network is to reduce routing path lengths, stretched by the overlay routing process. In most solutions developed, a kind of fixed infrastructure in the form of excessive message exchange is necessary to guarantee good overlay locality properties. This paper presents a richly connected overlay networks based on Dominating Set Theory to optimize the number of nodes for large data transfer. Fast Replica algorithm is applied to reduce the content transfer time for replicating the content within the semantic network. To download a file from different peers in parallel from the semantic overlay network (SON) a dynamic parallel access scheme is introduced where end users access the members of the SON at the same time, fetching different portions of that file from different peers and reassembling them locally. The load is dynamically shared among all the peers. An enhanced digital fountain with Tornado codes is applied to eliminate the need for retransmission requests from the end users. Receivers run the decoding algorithm to reconstruct the original content. In this no feedback mechanisms are needed to ensure reliable delivery. This paper analyzes the performance of sequential unicast and multiple unicast content distribution strategies and compares their performance with our scheme and also analyzes the impact of dominating set theory for the construction of semantic overlays
覆盖网络已经成为一种强大而高度灵活的内容传递方式。覆盖网络是运行在另一个网络(通常是因特网)之上的网络。这些网络在许多设置中用于在现有通信网络上提供逻辑通信基础设施。覆盖网络的主要目标是减少路由路径长度,这是由覆盖路由过程拉伸的。在大多数已开发的解决方案中,为了保证良好的覆盖局部性,需要一种固定的基础设施(以过度消息交换的形式)。为了优化大数据传输的节点数,提出了一种基于支配集理论的多连通叠加网络。采用快速复制算法对语义网络内的内容进行复制,减少了内容传输时间。为了从语义覆盖网络(SON)上从不同节点并行下载文件,引入了一种动态并行访问方案,即终端用户同时访问SON的成员,从不同节点获取该文件的不同部分并在本地重新组装它们。负载在所有对等体之间动态共享。一个增强的数字喷泉与龙卷风代码被应用,以消除需要从终端用户的重传请求。接收器运行解码算法来重建原始内容。在这种情况下,不需要反馈机制来确保可靠的交付。本文分析了顺序单播和多单播内容分发策略的性能,并与我们的方案进行了性能比较,同时分析了支配集理论对构建语义覆盖的影响
{"title":"Dominating Set Theory Based Semantic Overlay Networks for Efficient Content Distribution","authors":"J. Amutharaj, S. Radhakrishnan","doi":"10.1109/ICSCN.2007.350736","DOIUrl":"https://doi.org/10.1109/ICSCN.2007.350736","url":null,"abstract":"Overlay networks have emerged as a powerful and highly flexible method of delivering content. An overlay network is a network running on top of another network, usually the Internet. These networks are employed in many settings to provide logical communication infrastructure over an existing communication network. The main objective of the overlay network is to reduce routing path lengths, stretched by the overlay routing process. In most solutions developed, a kind of fixed infrastructure in the form of excessive message exchange is necessary to guarantee good overlay locality properties. This paper presents a richly connected overlay networks based on Dominating Set Theory to optimize the number of nodes for large data transfer. Fast Replica algorithm is applied to reduce the content transfer time for replicating the content within the semantic network. To download a file from different peers in parallel from the semantic overlay network (SON) a dynamic parallel access scheme is introduced where end users access the members of the SON at the same time, fetching different portions of that file from different peers and reassembling them locally. The load is dynamically shared among all the peers. An enhanced digital fountain with Tornado codes is applied to eliminate the need for retransmission requests from the end users. Receivers run the decoding algorithm to reconstruct the original content. In this no feedback mechanisms are needed to ensure reliable delivery. This paper analyzes the performance of sequential unicast and multiple unicast content distribution strategies and compares their performance with our scheme and also analyzes the impact of dominating set theory for the construction of semantic overlays","PeriodicalId":257948,"journal":{"name":"2007 International Conference on Signal Processing, Communications and Networking","volume":"107 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132544300","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Arithmetic Coding with Forbidden Symbol and Optimized Adaptive Context Tree Modeling (GRASP Algorithm) for H.264 Video Coders H.264视频编码器的禁止符号算术编码和优化的自适应上下文树建模(GRASP算法)
Pub Date : 2007-11-05 DOI: 10.1109/ICSCN.2007.350679
E. Logashanmugam, B. Sreejaa, R. Ramachandran
In this paper we propose applying an adaptive context tree weighting method with a forbidden symbol in the H.264 coder. Arithmetic codes with a forbidden symbol and a trellis search techniques are employed on an order to estimate the best transmitted codeword. Instead of using the context modeling defined in the H.264 standard, the arithmetic code with a forbidden symbol uses a CTW method. The CABAC algorithm is replaced by GRASP algorithm and the experimental results show that coding gains similar or superior to those obtained with the H.264/AVC CABAC algorithm and arithmetic coding
本文提出在H.264编码器中应用一种带有禁止符号的自适应上下文树加权方法。采用带禁止符号的算术编码和网格搜索技术,估计出最佳传输码字。与H.264标准中定义的上下文建模不同,带有禁止符号的算术代码使用了CTW方法。用GRASP算法代替CABAC算法,实验结果表明,采用H.264/AVC CABAC算法和算术编码获得的编码增益接近或优于前者
{"title":"Arithmetic Coding with Forbidden Symbol and Optimized Adaptive Context Tree Modeling (GRASP Algorithm) for H.264 Video Coders","authors":"E. Logashanmugam, B. Sreejaa, R. Ramachandran","doi":"10.1109/ICSCN.2007.350679","DOIUrl":"https://doi.org/10.1109/ICSCN.2007.350679","url":null,"abstract":"In this paper we propose applying an adaptive context tree weighting method with a forbidden symbol in the H.264 coder. Arithmetic codes with a forbidden symbol and a trellis search techniques are employed on an order to estimate the best transmitted codeword. Instead of using the context modeling defined in the H.264 standard, the arithmetic code with a forbidden symbol uses a CTW method. The CABAC algorithm is replaced by GRASP algorithm and the experimental results show that coding gains similar or superior to those obtained with the H.264/AVC CABAC algorithm and arithmetic coding","PeriodicalId":257948,"journal":{"name":"2007 International Conference on Signal Processing, Communications and Networking","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133356298","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Combination of Symbolic and Statistical Features for Symbols Recognition 结合符号特征和统计特征进行符号识别
Pub Date : 2007-11-05 DOI: 10.1109/ICSCN.2007.350784
R.L. Qureshi, Jean-Yves Ramel, H. Cardot, P. Mukherji
In this article, we have tried to explore a new hybrid approach which well integrates the advantages of structural and statistical approaches and avoids their weaknesses. In the proposed approach, the graphic symbols are first segmented into high-level primitive like quadrilaterals. Then, a graph is built by utilizing these quadrilaterals as nodes and their spatial relationships as edges. Additional information like relative length of the quadrilaterals and their relative angles with neighbouring quadrilaterals are associated as attributes to the nodes and edges of the graph respectively. However, the observed graphs are subject to deformations due to noise and/or vectorial distortion (in case of hand-drawn images) hence differs somewhat from their ideal models by either missing or extra nodes and edges appearance. Therefore, we propose a method that computes a measure of similarity between two given graphs instead of looking for exact isomorphism. The approach is based on comparing feature vectors extracted from the graphs. The idea is to use features that can be quickly computed from a graph on the one hand, but are, on the other hand, effective in discriminating between the various graphs in the database. The nearest neighbour rule is used as a classifier due to its simplicity and good behaviour
在本文中,我们试图探索一种新的混合方法,它很好地结合了结构方法和统计方法的优点,并避免了它们的缺点。在该方法中,图形符号首先被分割成高级原语,如四边形。然后,利用这些四边形作为节点,它们之间的空间关系作为边来构建图形。附加信息,如四边形的相对长度及其与相邻四边形的相对角度,分别作为属性关联到图的节点和边。然而,观察到的图形由于噪声和/或矢量失真(在手绘图像的情况下)而变形,因此由于缺少或额外的节点和边缘外观而与理想模型有所不同。因此,我们提出了一种计算两个给定图之间相似性度量的方法,而不是寻找精确同构。该方法是基于比较从图中提取的特征向量。其思想是一方面使用可以从图中快速计算出的特征,另一方面使用可以有效区分数据库中各种图的特征。最近邻规则由于其简单和良好的性能而被用作分类器
{"title":"Combination of Symbolic and Statistical Features for Symbols Recognition","authors":"R.L. Qureshi, Jean-Yves Ramel, H. Cardot, P. Mukherji","doi":"10.1109/ICSCN.2007.350784","DOIUrl":"https://doi.org/10.1109/ICSCN.2007.350784","url":null,"abstract":"In this article, we have tried to explore a new hybrid approach which well integrates the advantages of structural and statistical approaches and avoids their weaknesses. In the proposed approach, the graphic symbols are first segmented into high-level primitive like quadrilaterals. Then, a graph is built by utilizing these quadrilaterals as nodes and their spatial relationships as edges. Additional information like relative length of the quadrilaterals and their relative angles with neighbouring quadrilaterals are associated as attributes to the nodes and edges of the graph respectively. However, the observed graphs are subject to deformations due to noise and/or vectorial distortion (in case of hand-drawn images) hence differs somewhat from their ideal models by either missing or extra nodes and edges appearance. Therefore, we propose a method that computes a measure of similarity between two given graphs instead of looking for exact isomorphism. The approach is based on comparing feature vectors extracted from the graphs. The idea is to use features that can be quickly computed from a graph on the one hand, but are, on the other hand, effective in discriminating between the various graphs in the database. The nearest neighbour rule is used as a classifier due to its simplicity and good behaviour","PeriodicalId":257948,"journal":{"name":"2007 International Conference on Signal Processing, Communications and Networking","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121351774","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Secured Data Transmission in Adhoc Networks Supporting Heterogeneous Interfaces 支持异构接口的Adhoc网络中的安全数据传输
Pub Date : 2007-11-05 DOI: 10.1109/ICSCN.2007.350666
G. Lavanya, R. Parimalam, J. Uma Maheswari
Ad hoc mobile networks are very dynamic, self organizing, self healing distributed networks which supports data networking without an infrastructure. The user can use the network services efficiently and securely while moving, by using our proposed scheme. This technique is used to store backup routes from multiple routes available between source and destination. Furthermore, it also supports heterogeneous interfaces between the nodes with a secured data transmission using voice
自组织移动网络是非常动态的、自组织的、自修复的分布式网络,它支持没有基础设施的数据网络。通过本文提出的方案,用户可以在移动中高效、安全地使用网络服务。该技术用于存储源和目的之间可用的多条路由的备份路由。此外,它还支持节点之间的异构接口,并使用语音进行安全的数据传输
{"title":"Secured Data Transmission in Adhoc Networks Supporting Heterogeneous Interfaces","authors":"G. Lavanya, R. Parimalam, J. Uma Maheswari","doi":"10.1109/ICSCN.2007.350666","DOIUrl":"https://doi.org/10.1109/ICSCN.2007.350666","url":null,"abstract":"Ad hoc mobile networks are very dynamic, self organizing, self healing distributed networks which supports data networking without an infrastructure. The user can use the network services efficiently and securely while moving, by using our proposed scheme. This technique is used to store backup routes from multiple routes available between source and destination. Furthermore, it also supports heterogeneous interfaces between the nodes with a secured data transmission using voice","PeriodicalId":257948,"journal":{"name":"2007 International Conference on Signal Processing, Communications and Networking","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129369039","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performance Improvement of FH CDMA Signals using Rate Compatible Parallel Concatenated Block Codes 用速率兼容并行串接分组码改进跳频CDMA信号的性能
Pub Date : 2007-11-05 DOI: 10.1109/ICSCN.2007.350705
K. Sudha, R. Rao
Frequency-hopped (FH) CDMA is a digital multiple access system in which individual users selects one of Q frequencies within a wideband channel as carrier frequency. Main drawback of FH CDMA is, it is interference limited. In this paper we analyze the performance of frequency-hopped spread spectrum networks (FHSS) with turbo block codes. After the development of turbo code, using block component codes have received less attention. Block component codes are particularly suited for high rate applications with short block lengths and allow high degree of parallel processing which is desirable for delay sensitive applications. Rate compatible coding is appropriate for communication systems that experience a range of operating SNRs but seek to adhere to a single under laying codec structure. This paper suggests the performance improvement of FH SS signals by using rate compatible parallel-concatenated block codes using BCH (Bose, Chaudhuri, Hocquenghem) codes as component codes and usage of puncturing for making it rate compatible. These codes enjoy more freedom in puncturing pattern selection thus allowing for an almost continuous spectrum of code rates
跳频(FH) CDMA是一种数字多址系统,用户在宽带信道中选择Q个频率中的一个作为载波频率。跳频CDMA的主要缺点是受干扰的限制。本文分析了带turbo分组码的跳频扩频网络的性能。在turbo码发展之后,使用块组件码已经很少受到重视。块组件代码特别适合于具有短块长度的高速率应用,并允许高度并行处理,这是延迟敏感应用所需要的。速率兼容编码适用于经历一系列操作信噪比的通信系统,但寻求坚持单一的底层编解码器结构。本文提出了采用BCH (Bose, Chaudhuri, Hocquenghem)码作为分量码,并采用穿刺使其速率兼容的方法来提高跳频SS信号的性能。这些代码在穿刺模式选择方面享有更多的自由,从而允许几乎连续的码率频谱
{"title":"Performance Improvement of FH CDMA Signals using Rate Compatible Parallel Concatenated Block Codes","authors":"K. Sudha, R. Rao","doi":"10.1109/ICSCN.2007.350705","DOIUrl":"https://doi.org/10.1109/ICSCN.2007.350705","url":null,"abstract":"Frequency-hopped (FH) CDMA is a digital multiple access system in which individual users selects one of Q frequencies within a wideband channel as carrier frequency. Main drawback of FH CDMA is, it is interference limited. In this paper we analyze the performance of frequency-hopped spread spectrum networks (FHSS) with turbo block codes. After the development of turbo code, using block component codes have received less attention. Block component codes are particularly suited for high rate applications with short block lengths and allow high degree of parallel processing which is desirable for delay sensitive applications. Rate compatible coding is appropriate for communication systems that experience a range of operating SNRs but seek to adhere to a single under laying codec structure. This paper suggests the performance improvement of FH SS signals by using rate compatible parallel-concatenated block codes using BCH (Bose, Chaudhuri, Hocquenghem) codes as component codes and usage of puncturing for making it rate compatible. These codes enjoy more freedom in puncturing pattern selection thus allowing for an almost continuous spectrum of code rates","PeriodicalId":257948,"journal":{"name":"2007 International Conference on Signal Processing, Communications and Networking","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129056505","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2007 International Conference on Signal Processing, Communications and Networking
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1