首页 > 最新文献

2011 IEEE International Conference on Communications (ICC)最新文献

英文 中文
Self-Deployment Algorithms for Field Coverage in a Network of Nonidentical Mobile Sensors 非相同移动传感器网络中现场覆盖的自部署算法
Pub Date : 2011-12-22 DOI: 10.1109/ICC.2011.5963398
Hamid Mahboobi Baghdad Abad, Kaveh Moezzi, A. Aghdam, K. Sayrafian-Pour
In this paper, efficient deployment algorithms are proposed for a mobile sensor network to improve coverage. The proposed algorithms calculate the position of the sensors iteratively based on the existing coverage holes in the target field. The multiplicatively weighted Voronoi diagram (MW-Voronoi diagram) is used to discover the coverage holes corresponding to different sensors with different sensing ranges. The algorithms proposed in this paper consider the distances of each sensor and the points inside its corresponding MW-Voronoi region from the boundary curves of the region. Under the proposed algorithms, the sensors move in such a way that the coverage holes in the target field are reduced. Simulations confirm the effectiveness of the deployment algorithms proposed in this paper.
本文提出了一种有效的移动传感器网络部署算法,以提高网络的覆盖范围。该算法基于目标场中已有的覆盖孔,迭代计算传感器的位置。利用乘加权Voronoi图(MW-Voronoi图)发现不同传感器与不同传感距离对应的覆盖孔。本文提出的算法考虑了每个传感器及其对应的MW-Voronoi区域内的点与区域边界曲线的距离。在提出的算法下,传感器以减少目标区域覆盖空洞的方式移动。仿真结果验证了本文提出的部署算法的有效性。
{"title":"Self-Deployment Algorithms for Field Coverage in a Network of Nonidentical Mobile Sensors","authors":"Hamid Mahboobi Baghdad Abad, Kaveh Moezzi, A. Aghdam, K. Sayrafian-Pour","doi":"10.1109/ICC.2011.5963398","DOIUrl":"https://doi.org/10.1109/ICC.2011.5963398","url":null,"abstract":"In this paper, efficient deployment algorithms are proposed for a mobile sensor network to improve coverage. The proposed algorithms calculate the position of the sensors iteratively based on the existing coverage holes in the target field. The multiplicatively weighted Voronoi diagram (MW-Voronoi diagram) is used to discover the coverage holes corresponding to different sensors with different sensing ranges. The algorithms proposed in this paper consider the distances of each sensor and the points inside its corresponding MW-Voronoi region from the boundary curves of the region. Under the proposed algorithms, the sensors move in such a way that the coverage holes in the target field are reduced. Simulations confirm the effectiveness of the deployment algorithms proposed in this paper.","PeriodicalId":336561,"journal":{"name":"2011 IEEE International Conference on Communications (ICC)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121462412","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Designing Securely Connected Wireless Sensor Networks in the Presence of Unreliable Links 在链路不可靠的情况下设计安全连接的无线传感器网络
Pub Date : 2011-07-29 DOI: 10.1109/icc.2011.5962806
Osman Yağan, A. Makowski
We investigate the secure connectivity of wireless sensor networks under the pairwise key distribution scheme of Chan et al.. Unlike recent work which was carried out under the assumption of full visibility, here we assume a (simplified) communication model where unreliable wireless links are represented as on/off channels. We present conditions on how to scale the model parameters so that the network i) has no secure node which is isolated, and ii) is securely connected, both with high probability when the number of sensor nodes becomes large. The results are given in the form of zero-one laws, and exhibit significant differences with corresponding results in the full visibility case.
我们研究了在Chan等人的成对密钥分配方案下无线传感器网络的安全连接。与最近在完全可见性假设下进行的工作不同,这里我们假设一个(简化的)通信模型,其中不可靠的无线链路表示为开/关信道。我们提出了缩放模型参数的条件,使网络i)不存在孤立的安全节点,ii)安全连接,当传感器节点数量变大时,这两种情况都具有高概率。结果以0 - 1定律的形式给出,并与完全可见情况下的相应结果有显著差异。
{"title":"Designing Securely Connected Wireless Sensor Networks in the Presence of Unreliable Links","authors":"Osman Yağan, A. Makowski","doi":"10.1109/icc.2011.5962806","DOIUrl":"https://doi.org/10.1109/icc.2011.5962806","url":null,"abstract":"We investigate the secure connectivity of wireless sensor networks under the pairwise key distribution scheme of Chan et al.. Unlike recent work which was carried out under the assumption of full visibility, here we assume a (simplified) communication model where unreliable wireless links are represented as on/off channels. We present conditions on how to scale the model parameters so that the network i) has no secure node which is isolated, and ii) is securely connected, both with high probability when the number of sensor nodes becomes large. The results are given in the form of zero-one laws, and exhibit significant differences with corresponding results in the full visibility case.","PeriodicalId":336561,"journal":{"name":"2011 IEEE International Conference on Communications (ICC)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129311476","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
Relay Selection for Bi-Directional Amplify-and-Forward Wireless Networks 双向放大转发无线网络的中继选择
Pub Date : 2011-07-29 DOI: 10.1109/icc.2011.5963415
Lingyang Song
In this paper, we propose a relay selection amplify-and-forward (RS-AF) protocol in general bi-directional relay networks with two sources and $N$ relays. In the proposed scheme, the two sources first transmit to all the relays simultaneously, and then a single relay will be selected to broadcast the received signals back to both sources to achieve a minimum sum symbol error rate (SER). To facilitate the selection process, we propose sub-optimal Max-Min criterions, where a single relay which minimizes the maximum SER of two source nodes will be selected. Simulation results show that the proposed Max-Min selection approaches can obtain comparable performance as the optimal selection with a reduced-complexity. We also present simple asymptotic SER expressions and make comparison with the conventional all-participate amplify-and-forward (AP-AF) relaying scheme. The analytical results are verified through simulations. To improve the system performance, optimum power allocation (OPA) between the sources and the relay is determined based on the analytical results. Simulations indicate that the proposed RS-AF scheme with OPA yields considerable performance improvement over an equal power allocation (EPA) scheme.
本文提出了一种适用于双源双中继的双向中继网络的中继选择放大转发(RS-AF)协议。在该方案中,两个信号源首先同时发送到所有中继,然后选择一个中继将接收到的信号广播回两个信号源,以实现最小的和符号误码率(SER)。为了方便选择过程,我们提出了次优的Max-Min准则,其中将选择使两个源节点的最大SER最小的单个中继。仿真结果表明,所提出的最大-最小选择方法可以获得与最优选择相当的性能,并且降低了复杂度。我们还提出了简单的渐近SER表达式,并与传统的全参与放大转发(AP-AF)中继方案进行了比较。通过仿真验证了分析结果。为了提高系统性能,根据分析结果确定了源和继电器之间的最佳功率分配(OPA)。仿真结果表明,与等功率分配(EPA)方案相比,采用OPA的RS-AF方案具有显著的性能提高。
{"title":"Relay Selection for Bi-Directional Amplify-and-Forward Wireless Networks","authors":"Lingyang Song","doi":"10.1109/icc.2011.5963415","DOIUrl":"https://doi.org/10.1109/icc.2011.5963415","url":null,"abstract":"In this paper, we propose a relay selection amplify-and-forward (RS-AF) protocol in general bi-directional relay networks with two sources and $N$ relays. In the proposed scheme, the two sources first transmit to all the relays simultaneously, and then a single relay will be selected to broadcast the received signals back to both sources to achieve a minimum sum symbol error rate (SER). To facilitate the selection process, we propose sub-optimal Max-Min criterions, where a single relay which minimizes the maximum SER of two source nodes will be selected. Simulation results show that the proposed Max-Min selection approaches can obtain comparable performance as the optimal selection with a reduced-complexity. We also present simple asymptotic SER expressions and make comparison with the conventional all-participate amplify-and-forward (AP-AF) relaying scheme. The analytical results are verified through simulations. To improve the system performance, optimum power allocation (OPA) between the sources and the relay is determined based on the analytical results. Simulations indicate that the proposed RS-AF scheme with OPA yields considerable performance improvement over an equal power allocation (EPA) scheme.","PeriodicalId":336561,"journal":{"name":"2011 IEEE International Conference on Communications (ICC)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121516208","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Exploiting Heterogeneity to Prolong the Lifetime of Large-Scale Wireless Sensor Networks 利用异构性延长大规模无线传感器网络的寿命
Pub Date : 2011-07-29 DOI: 10.1109/icc.2011.5963081
Chul-Ho Lee, Do Young Eun
In wireless sensor networks (WSNs), sensor nodes are typically power-constrained with limited lifetime, and thus it is necessary to know how long the network sustains its networking operations. We consider the network lifetime as the time until that a majority of functional nodes remains connected of one another, forming a giant component, in the network. We then analytically examine such network lifetime of a large-scale WSN via the theory of site percolation on a random graph model with a given degree distribution. In particular, we develop an analytical framework to quantify the network lifetime if the node lifetime can be controlled based on its degree, and show in theory and simulation that, by properly exploiting the heterogeneity over the node degrees, we can always increase the network lifetime when compared with that under the comparable degree-independent node lifetime.
在无线传感器网络(wsn)中,传感器节点通常受到功率限制,寿命有限,因此有必要知道网络维持其网络运行的时间。我们认为网络生命周期是网络中大多数功能节点保持相互连接,形成一个巨大组件的时间。然后,我们利用给定度分布的随机图模型上的站点渗透理论,分析了大规模WSN的这种网络寿命。特别是,我们开发了一个分析框架,在节点寿命可以根据其程度控制的情况下量化网络寿命,并在理论和仿真中表明,通过适当利用节点在不同程度上的异质性,我们总是可以比在类似的不依赖于程度的节点寿命下增加网络寿命。
{"title":"Exploiting Heterogeneity to Prolong the Lifetime of Large-Scale Wireless Sensor Networks","authors":"Chul-Ho Lee, Do Young Eun","doi":"10.1109/icc.2011.5963081","DOIUrl":"https://doi.org/10.1109/icc.2011.5963081","url":null,"abstract":"In wireless sensor networks (WSNs), sensor nodes are typically power-constrained with limited lifetime, and thus it is necessary to know how long the network sustains its networking operations. We consider the network lifetime as the time until that a majority of functional nodes remains connected of one another, forming a giant component, in the network. We then analytically examine such network lifetime of a large-scale WSN via the theory of site percolation on a random graph model with a given degree distribution. In particular, we develop an analytical framework to quantify the network lifetime if the node lifetime can be controlled based on its degree, and show in theory and simulation that, by properly exploiting the heterogeneity over the node degrees, we can always increase the network lifetime when compared with that under the comparable degree-independent node lifetime.","PeriodicalId":336561,"journal":{"name":"2011 IEEE International Conference on Communications (ICC)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116937494","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Flexible On-Line Construction of IRA Codes for Packet Erasure Correction with Application to Aeronautical Communications 包擦除校正IRA码的在线柔性构造及其在航空通信中的应用
Pub Date : 2011-06-05 DOI: 10.1109/icc.2011.5962443
G. Liva, P. Pulini, M. Chiani
In many applications erasure correcting codes are used to recover packet losses at high protocol stack layers. The objects (e.g. files) to be transmitted often have variable sizes, resulting in a variable number of packet to be encoded by the packet-level encoder. In this paper, algorithms for the (on-line) flexible design of parity-check matrices for irregular-repeat-accumulate codes are investigated. The proposed algorithms allow designing in fast manner parity-check matrices that are suitable for low-complexity maximum-likelihood decoding. The code ensembles generated by the proposed algorithms are analyzed via extrinsic information transfer charts. Numerical results show how the designed codes can attain codeword error rates as low as 10^{-5} without appreciable losses w.r.t. the performance of idealized maximum-distance separable codes. The application of the proposed techniques to the upcoming aeronautical communication standard is investigated, proving the efficiency and the flexibility of the approach.
在许多应用中,擦除纠错码用于恢复高协议栈层的数据包丢失。要传输的对象(例如文件)通常有不同的大小,导致包级编码器编码的包数量不同。本文研究了不规则重复累加码的奇偶校验矩阵的(在线)柔性设计算法。提出的算法允许以快速的方式设计适合于低复杂度最大似然解码的奇偶校验矩阵。通过外部信息传递图对算法生成的代码集进行了分析。数值结果表明,所设计的码字误码率低至10^{-5},而与理想最大距离可分离码的性能相比,没有明显的损失。研究了该方法在即将出台的航空通信标准中的应用,验证了该方法的有效性和灵活性。
{"title":"Flexible On-Line Construction of IRA Codes for Packet Erasure Correction with Application to Aeronautical Communications","authors":"G. Liva, P. Pulini, M. Chiani","doi":"10.1109/icc.2011.5962443","DOIUrl":"https://doi.org/10.1109/icc.2011.5962443","url":null,"abstract":"In many applications erasure correcting codes are used to recover packet losses at high protocol stack layers. The objects (e.g. files) to be transmitted often have variable sizes, resulting in a variable number of packet to be encoded by the packet-level encoder. In this paper, algorithms for the (on-line) flexible design of parity-check matrices for irregular-repeat-accumulate codes are investigated. The proposed algorithms allow designing in fast manner parity-check matrices that are suitable for low-complexity maximum-likelihood decoding. The code ensembles generated by the proposed algorithms are analyzed via extrinsic information transfer charts. Numerical results show how the designed codes can attain codeword error rates as low as 10^{-5} without appreciable losses w.r.t. the performance of idealized maximum-distance separable codes. The application of the proposed techniques to the upcoming aeronautical communication standard is investigated, proving the efficiency and the flexibility of the approach.","PeriodicalId":336561,"journal":{"name":"2011 IEEE International Conference on Communications (ICC)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114967408","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Decentralized Scheduling of Bursty Workload on Computing Grids 计算网格上突发工作负载的分散调度
Pub Date : 2011-06-05 DOI: 10.1109/icc.2011.5962547
Juemin Zhang, N. Mi, Jianzhe Tai, W. Meleis
Bursty workloads are often observed in a variety of systems such as grid services, multi-tier architectures, and large storage systems. Studies have shown that such burstiness can dramatically degrade system performance because of overloading, increased response time, and unavailable service. Computing grids, which often use distributed, autonomous resource management, are particularly susceptible to load imbalances caused by bursty workloads. In this paper, we use a simulation environment to investigate the performance of decentralized schedulers under various intensity levels of burstiness. We first demonstrate a significant performance degradation in the presence of strong and moderate bursty workloads. Then, we describe two new hybrid schedulers, based on duplication-invalidation, and assess the effectiveness of these schedulers under different intensities of burstiness. Our simulation results show that compared to the conventional decentralized methods, the proposed schedulers achieve a 40% performance improvement under the bursty condition while obtaining similar performance in non-bursty conditions.
突发工作负载经常出现在各种系统中,例如网格服务、多层体系结构和大型存储系统。研究表明,由于超载、响应时间增加和服务不可用,这种突发会极大地降低系统性能。计算网格通常使用分布式、自治的资源管理,特别容易受到突发工作负载引起的负载不平衡的影响。在本文中,我们使用仿真环境来研究分散调度器在不同突发强度下的性能。我们首先展示了在强和中等突发工作负载下的显著性能下降。然后,我们描述了两种新的基于重复失效的混合调度程序,并评估了这两种调度程序在不同突发强度下的有效性。仿真结果表明,与传统的去中心化调度方法相比,所提出的调度方法在突发条件下的性能提高了40%,而在非突发条件下的性能也差不多。
{"title":"Decentralized Scheduling of Bursty Workload on Computing Grids","authors":"Juemin Zhang, N. Mi, Jianzhe Tai, W. Meleis","doi":"10.1109/icc.2011.5962547","DOIUrl":"https://doi.org/10.1109/icc.2011.5962547","url":null,"abstract":"Bursty workloads are often observed in a variety of systems such as grid services, multi-tier architectures, and large storage systems. Studies have shown that such burstiness can dramatically degrade system performance because of overloading, increased response time, and unavailable service. Computing grids, which often use distributed, autonomous resource management, are particularly susceptible to load imbalances caused by bursty workloads. In this paper, we use a simulation environment to investigate the performance of decentralized schedulers under various intensity levels of burstiness. We first demonstrate a significant performance degradation in the presence of strong and moderate bursty workloads. Then, we describe two new hybrid schedulers, based on duplication-invalidation, and assess the effectiveness of these schedulers under different intensities of burstiness. Our simulation results show that compared to the conventional decentralized methods, the proposed schedulers achieve a 40% performance improvement under the bursty condition while obtaining similar performance in non-bursty conditions.","PeriodicalId":336561,"journal":{"name":"2011 IEEE International Conference on Communications (ICC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115125378","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Feedback Control Game for Channel State Information in Wireless Networks 无线网络中信道状态信息的反馈控制对策
Pub Date : 2011-06-05 DOI: 10.1109/icc.2011.5962622
Lingyang Song, Zhu Han, Qihao Li, B. Jiao
It has been well recognized that channel state information (CSI) feedback is important for dowlink transmissions of closed-loop wireless networks. In this paper, we investigate the CSI feedback rate control problem in the analytical setting of a game theoretic framework, where a multiple-antenna base station (BS) communicates with a number of co-channel mobile stations (MS) through a minimum mean square error~(MMSE) precoder. Specifically, we present a non-cooperative feedback-rate control game with price (NFCP) over orthogonal feedback channels with a total bandwidth constraint. The game utility is defined as the performance gain by CSI feedback minus the price as a linear function of the CSI feedback rate, subject to an overall bandwidth constraint. The existence of the Nash equilibrium of such a game is investigated. Simulation results show that the distributed game approach results in close optimal performance compared with the centralized scheme.
信道状态信息反馈对于闭环无线网络下行传输的重要性已经得到了广泛的认识。本文研究了多天线基站(BS)通过最小均方误差(MMSE)预编码器与多个同信道移动站(MS)通信时,在博弈论框架的分析设置下的CSI反馈速率控制问题。具体地说,我们提出了一个具有总带宽约束的正交反馈信道上的带价格的非合作反馈速率控制对策(NFCP)。游戏效用被定义为CSI反馈的性能增益减去价格(CSI反馈率的线性函数),受制于整体带宽限制。研究了这种对策的纳什均衡的存在性。仿真结果表明,与集中式方案相比,分布式博弈方法具有接近最优的性能。
{"title":"Feedback Control Game for Channel State Information in Wireless Networks","authors":"Lingyang Song, Zhu Han, Qihao Li, B. Jiao","doi":"10.1109/icc.2011.5962622","DOIUrl":"https://doi.org/10.1109/icc.2011.5962622","url":null,"abstract":"It has been well recognized that channel state information (CSI) feedback is important for dowlink transmissions of closed-loop wireless networks. In this paper, we investigate the CSI feedback rate control problem in the analytical setting of a game theoretic framework, where a multiple-antenna base station (BS) communicates with a number of co-channel mobile stations (MS) through a minimum mean square error~(MMSE) precoder. Specifically, we present a non-cooperative feedback-rate control game with price (NFCP) over orthogonal feedback channels with a total bandwidth constraint. The game utility is defined as the performance gain by CSI feedback minus the price as a linear function of the CSI feedback rate, subject to an overall bandwidth constraint. The existence of the Nash equilibrium of such a game is investigated. Simulation results show that the distributed game approach results in close optimal performance compared with the centralized scheme.","PeriodicalId":336561,"journal":{"name":"2011 IEEE International Conference on Communications (ICC)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115142353","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Effective Cooperative ARQ Protocols with the Opportunistic Selective AF Relaying: The Perspectives of Outage versus Packet Error Probabilities 具有机会选择AF中继的有效合作ARQ协议:中断与包错误概率的观点
Pub Date : 2011-06-05 DOI: 10.1109/icc.2011.5963060
Chun-Kai Tseng, Sau-Hsuan Wu
In contrast to the outage analysis, the packet error rates (PERs) of two types of cooperative automatic retransmission request (ARQ) protocols with opportunistic selective amplified-and-forward (OSAF) relaying are investigated from the perspective of the maximum likelihood sequence detection (MLSD). The results show that PERs with the threshold requirements derived from the outage analysis cannot benefit from the diversity via opportunistic retransmissions. Based on the PER analysis, effective threshold setting methods for the two types of ARQs are developed to avoid the diversity losses during ARQs, and verified via simulations using convolutional codes. In contrast to the ARQ protocols with the typical opportunistic AF relaying, the new threshold setting methods allow the OSAF ARQ protocols to provide for practical systems a spatial and temporal diversity comparable to what predicts with the outage analysis.
与中断分析相反,从最大似然序列检测(MLSD)的角度研究了两种具有机会选择性放大转发(OSAF)中继的合作式自动重传请求(ARQ)协议的包错误率(PERs)。结果表明,具有中断分析得出的阈值要求的per不能从机会重传的多样性中获益。在PER分析的基础上,提出了两种arq的有效阈值设置方法,以避免arq过程中的分集损失,并通过卷积码的仿真进行了验证。与典型的机会AF中继的ARQ协议相比,新的阈值设置方法允许OSAF ARQ协议为实际系统提供可与中断分析预测相比较的空间和时间多样性。
{"title":"Effective Cooperative ARQ Protocols with the Opportunistic Selective AF Relaying: The Perspectives of Outage versus Packet Error Probabilities","authors":"Chun-Kai Tseng, Sau-Hsuan Wu","doi":"10.1109/icc.2011.5963060","DOIUrl":"https://doi.org/10.1109/icc.2011.5963060","url":null,"abstract":"In contrast to the outage analysis, the packet error rates (PERs) of two types of cooperative automatic retransmission request (ARQ) protocols with opportunistic selective amplified-and-forward (OSAF) relaying are investigated from the perspective of the maximum likelihood sequence detection (MLSD). The results show that PERs with the threshold requirements derived from the outage analysis cannot benefit from the diversity via opportunistic retransmissions. Based on the PER analysis, effective threshold setting methods for the two types of ARQs are developed to avoid the diversity losses during ARQs, and verified via simulations using convolutional codes. In contrast to the ARQ protocols with the typical opportunistic AF relaying, the new threshold setting methods allow the OSAF ARQ protocols to provide for practical systems a spatial and temporal diversity comparable to what predicts with the outage analysis.","PeriodicalId":336561,"journal":{"name":"2011 IEEE International Conference on Communications (ICC)","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115169587","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Hinky: Defending against Text-Based Message Spam on Smartphones Hinky:在智能手机上防御基于文本的垃圾信息
Pub Date : 2011-06-05 DOI: 10.1109/icc.2011.5962722
Abdelkader Lahmadi, Laurent Delosières, O. Festor
We present a defense platform against text-based message SPAM on SmartPhones. We focus in particular on Short Message Service (SMS) based SPAM. Our solution relies on a social network based collaborative approach to filter this type of spam using Bloom filters and content hashing. We detail the design of the supporting framework and validate its efficiency in minimizing false positive and limiting the storage space.
我们提出了一个针对智能手机上基于文本的垃圾邮件的防御平台。我们特别关注基于垃圾邮件的短消息服务(SMS)。我们的解决方案依赖于基于社交网络的协作方法,使用Bloom过滤器和内容散列来过滤这种类型的垃圾邮件。我们详细介绍了支撑框架的设计,并验证了其在减少误报和限制存储空间方面的效率。
{"title":"Hinky: Defending against Text-Based Message Spam on Smartphones","authors":"Abdelkader Lahmadi, Laurent Delosières, O. Festor","doi":"10.1109/icc.2011.5962722","DOIUrl":"https://doi.org/10.1109/icc.2011.5962722","url":null,"abstract":"We present a defense platform against text-based message SPAM on SmartPhones. We focus in particular on Short Message Service (SMS) based SPAM. Our solution relies on a social network based collaborative approach to filter this type of spam using Bloom filters and content hashing. We detail the design of the supporting framework and validate its efficiency in minimizing false positive and limiting the storage space.","PeriodicalId":336561,"journal":{"name":"2011 IEEE International Conference on Communications (ICC)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124361523","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Channel Modeling of UWB-Based Wireless Body Area Networks 基于uwb的无线体域网络信道建模
Pub Date : 2011-06-05 DOI: 10.1109/icc.2011.5962687
Xinlei Chen, Xiyu Lu, Depeng Jin, L. Su, Lieguang Zeng
This paper presents channel measurements for wireless body area network (WBAN) and provides performance evaluation using the model derived from measurement and the model in the final document of the IEEE802.15.6 channel modeling subcommittee. We measure the radio propagation from 3.0GHz to 5.0GHz which falls in ultra-wideband (UWB) frequency range in an anechoic chamber and give out a static model. 10 positions for medical entertainment and sports application are chosen to conduct measurement on a fat body, a normal body and a thin body in order to compare different path loss of different types of body for Chinese people. Moreover, we compare the bit error ratio (BER) of a single carrier UWB (SC-UWB) system which employs different receiving policies such as rake, equalizer and channel coding. The results show that slimmer people cause less path loss in the valid distance from 100mm to 1000mm. The measured model we derived has less multi-path effect than that of the model in the final report given by IEEE802.15.6 channel modeling subcommittee. Even though, rake receiver, equalizer and channel coding are needed to get a satisfying system performance.
本文介绍了无线体域网络(WBAN)的信道测量,并使用测量得出的模型和IEEE802.15.6信道建模小组委员会最终文件中的模型进行了性能评估。在消声室中测量了超宽带(UWB)频段3.0 ~ 5.0GHz的无线电传播,并给出了静态模型。选择10个医疗娱乐和体育应用体位,分别对肥胖体、正常体和瘦子体进行测量,比较中国人不同类型身体的路径损耗差异。此外,我们比较了采用不同接收策略(如rake、均衡器和信道编码)的单载波UWB (SC-UWB)系统的误码率(BER)。结果表明:在100mm ~ 1000mm的有效距离内,越瘦的人产生的路径损耗越小;我们推导的实测模型比IEEE802.15.6信道建模小组委员会最终报告中的模型具有更小的多径效应。尽管如此,为了获得令人满意的系统性能,需要rake接收器、均衡器和信道编码。
{"title":"Channel Modeling of UWB-Based Wireless Body Area Networks","authors":"Xinlei Chen, Xiyu Lu, Depeng Jin, L. Su, Lieguang Zeng","doi":"10.1109/icc.2011.5962687","DOIUrl":"https://doi.org/10.1109/icc.2011.5962687","url":null,"abstract":"This paper presents channel measurements for wireless body area network (WBAN) and provides performance evaluation using the model derived from measurement and the model in the final document of the IEEE802.15.6 channel modeling subcommittee. We measure the radio propagation from 3.0GHz to 5.0GHz which falls in ultra-wideband (UWB) frequency range in an anechoic chamber and give out a static model. 10 positions for medical entertainment and sports application are chosen to conduct measurement on a fat body, a normal body and a thin body in order to compare different path loss of different types of body for Chinese people. Moreover, we compare the bit error ratio (BER) of a single carrier UWB (SC-UWB) system which employs different receiving policies such as rake, equalizer and channel coding. The results show that slimmer people cause less path loss in the valid distance from 100mm to 1000mm. The measured model we derived has less multi-path effect than that of the model in the final report given by IEEE802.15.6 channel modeling subcommittee. Even though, rake receiver, equalizer and channel coding are needed to get a satisfying system performance.","PeriodicalId":336561,"journal":{"name":"2011 IEEE International Conference on Communications (ICC)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123068268","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
期刊
2011 IEEE International Conference on Communications (ICC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1