首页 > 最新文献

2017 International Conference on Communication, Computing and Digital Systems (C-CODE)最新文献

英文 中文
A control channel based MAC protocol for time critical and emergency communications in Industrial Wireless Sensor Networks 一种基于控制信道的MAC协议,用于工业无线传感器网络中的时间关键和应急通信
M. Raza, H. Le‐Minh, N. Aslam, S. Hussain, W. Ellahi
For time critical applications in industrial environments, failure in communication or unwanted delay can have devastating effects. It is therefore, important that Industrial Wireless Sensor Networks (IWSNs) offer reliable communication platform for time critical applications without violating the hard deadlines. In this paper, a MAC protocol for time critical and emergency communications is proposed. The proposed protocol, EE-MAC incorporates emergency communication and allows immediate channel access for such data. The paper presents mathematical model of the proposed protocol. For evaluation purposes, the performance of EE-MAC is compared to IEEE 802.15.4e LLDN. The results show that the proposed protocol offers up to 92% reduction in channel access delay of emergency communication at the cost of 5% to 15% increase in delay of non-critical and less time-sensitive data.
对于工业环境中的时间关键型应用程序,通信故障或不必要的延迟可能会产生破坏性影响。因此,重要的是工业无线传感器网络(iwsn)为时间关键型应用提供可靠的通信平台,而不会违反硬截止日期。本文提出了一种用于时间关键型和紧急通信的MAC协议。提议的协议EE-MAC包含紧急通信,并允许对此类数据进行即时通道访问。本文给出了该协议的数学模型。为了评估目的,将EE-MAC的性能与IEEE 802.15.4e LLDN进行比较。结果表明,该协议可将应急通信的信道访问延迟降低92%,但代价是非关键数据和时间敏感性较低的数据的延迟增加5% ~ 15%。
{"title":"A control channel based MAC protocol for time critical and emergency communications in Industrial Wireless Sensor Networks","authors":"M. Raza, H. Le‐Minh, N. Aslam, S. Hussain, W. Ellahi","doi":"10.1109/C-CODE.2017.7918914","DOIUrl":"https://doi.org/10.1109/C-CODE.2017.7918914","url":null,"abstract":"For time critical applications in industrial environments, failure in communication or unwanted delay can have devastating effects. It is therefore, important that Industrial Wireless Sensor Networks (IWSNs) offer reliable communication platform for time critical applications without violating the hard deadlines. In this paper, a MAC protocol for time critical and emergency communications is proposed. The proposed protocol, EE-MAC incorporates emergency communication and allows immediate channel access for such data. The paper presents mathematical model of the proposed protocol. For evaluation purposes, the performance of EE-MAC is compared to IEEE 802.15.4e LLDN. The results show that the proposed protocol offers up to 92% reduction in channel access delay of emergency communication at the cost of 5% to 15% increase in delay of non-critical and less time-sensitive data.","PeriodicalId":344222,"journal":{"name":"2017 International Conference on Communication, Computing and Digital Systems (C-CODE)","volume":"111 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124761555","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Architectural review of polynomial bases finite field multipliers over GF(2m) GF(2m)上多项式基有限域乘法器的结构综述
Malik Imran, M. Rashid
In elliptic curve cryptography (ECC), hardware architectures of finite field (FF) multipliers are frequently proposed for polynomial as well as for normal bases representations over GF(2m). Although the polynomial bases provide efficient FF multiplication as compared to normal bases, the performance of the entire elliptic cryptosystem mainly depends upon its FF multiplier. Consequently, this paper provides a comparative overview of the recent hardware architectures of FF multipliers for polynomial bases over GF(2m). This is achieved by classifying the most recent state-of-the-art research practices into three categories: bit-serial, bit-parallel and digit-serial multipliers. The comparison of multiple techniques in this article enables the designer to select a suitable multiplier according to different application requirements such as high speed/performance, constrained environments and high throughput/area applications.
在椭圆曲线密码学(ECC)中,有限域(FF)乘法器的硬件架构经常被提出用于多项式和GF(2m)上的正规基表示。虽然多项式基与普通基相比提供了高效的FF乘法,但整个椭圆密码系统的性能主要取决于其FF乘法器。因此,本文对GF(2m)上多项式基的FF乘法器的最新硬件架构进行了比较概述。这是通过将最新的最先进的研究实践分为三类来实现的:位串行,位并行和数字串行乘法器。本文中多种技术的比较使设计人员能够根据高速/性能、受限环境和高吞吐量/区域应用等不同的应用需求选择合适的乘法器。
{"title":"Architectural review of polynomial bases finite field multipliers over GF(2m)","authors":"Malik Imran, M. Rashid","doi":"10.1109/C-CODE.2017.7918952","DOIUrl":"https://doi.org/10.1109/C-CODE.2017.7918952","url":null,"abstract":"In elliptic curve cryptography (ECC), hardware architectures of finite field (FF) multipliers are frequently proposed for polynomial as well as for normal bases representations over GF(2m). Although the polynomial bases provide efficient FF multiplication as compared to normal bases, the performance of the entire elliptic cryptosystem mainly depends upon its FF multiplier. Consequently, this paper provides a comparative overview of the recent hardware architectures of FF multipliers for polynomial bases over GF(2m). This is achieved by classifying the most recent state-of-the-art research practices into three categories: bit-serial, bit-parallel and digit-serial multipliers. The comparison of multiple techniques in this article enables the designer to select a suitable multiplier according to different application requirements such as high speed/performance, constrained environments and high throughput/area applications.","PeriodicalId":344222,"journal":{"name":"2017 International Conference on Communication, Computing and Digital Systems (C-CODE)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126807507","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Robotic navigation based on logic-based planning 基于逻辑规划的机器人导航
S. Zaman, N. Haq, Muhammad Ibtisam Gul, Arslan Habib
Logic and Planning are interesting artificial intelligence problems in the context of robotic systems, i.e., robotic navigation. For such an autonomous system one of the requisites is that the goal has to be achieved without intervention of human being. We present a practical implementation of autonomous robotic navigation based on logic-based planning. We achieve this by using strength of PROLOG in order to generate plan to reach goal position from an initial. We utilize First Order Logic (FOL) that automatically asserts and retracts facts at runtime dynamically. All possible plans are computed using local search strategies (e.g., Depth and Breadth First) on state space representing a real, dynamic, and unpredictable environment. In order to navigate in the environment following optimized plan - one with fewest states, a balanced size 4-wheel differential drive robot has been carefully constructed. It can turn 90° and actuate forward by controlling linear (νt = 0.25m/s) and angular (ωt = Π/8 rad/s) velocities of two rear motorized wheels. It is also equipped with an Ultrasonic sensor to avoid collision with obstacles. The system is evaluated in an environment comprising of corridors with adjacent rooms. Graphical User Interface (GUI) is developed in .Net (C#) to map situation in Prolog and transmit plan to hardware for execution. Average time calculated for a plan to generate is 0.065 seconds. The robot moves block by block where each block in the state space represents 2m2 area. In addition to minors, our major contribution is that we offer a unified scheme for robotic navigation without calculating odometry data with the assumption the robot cannot be kidnapped nor slipped.
逻辑和规划是机器人系统背景下有趣的人工智能问题,即机器人导航。对于这样一个自治系统,一个必要条件是目标的实现必须没有人类的干预。我们提出了一种基于逻辑规划的自主机器人导航的实际实现。我们通过使用PROLOG的强度来实现这一点,以便从初始生成到达目标位置的计划。我们利用一阶逻辑(FOL)在运行时动态地自动断言和撤销事实。所有可能的计划都使用本地搜索策略(例如,深度和广度优先)在状态空间上计算,表示一个真实的、动态的和不可预测的环境。为了在环境中按照状态最少的优化方案进行导航,精心构造了一个平衡尺寸的四轮差动驱动机器人。通过控制两个后机动轮的直线速度(νt = 0.25m/s)和角速度(ωt = Π/8 rad/s),实现90°转弯和向前驱动。它还配备了超声波传感器,以避免与障碍物碰撞。该系统在一个由走廊和相邻房间组成的环境中进行评估。图形用户界面(GUI)是在。net (c#)中开发的,用于映射Prolog中的情况并将计划传输到硬件执行。计划生成的平均时间计算为0.065秒。机器人逐块移动,状态空间中的每个块代表2m2的面积。除了未成年人之外,我们的主要贡献是在假设机器人不能被绑架或滑动的情况下,我们提供了一个统一的机器人导航方案,而不需要计算里程计数据。
{"title":"Robotic navigation based on logic-based planning","authors":"S. Zaman, N. Haq, Muhammad Ibtisam Gul, Arslan Habib","doi":"10.1109/C-CODE.2017.7918964","DOIUrl":"https://doi.org/10.1109/C-CODE.2017.7918964","url":null,"abstract":"Logic and Planning are interesting artificial intelligence problems in the context of robotic systems, i.e., robotic navigation. For such an autonomous system one of the requisites is that the goal has to be achieved without intervention of human being. We present a practical implementation of autonomous robotic navigation based on logic-based planning. We achieve this by using strength of PROLOG in order to generate plan to reach goal position from an initial. We utilize First Order Logic (FOL) that automatically asserts and retracts facts at runtime dynamically. All possible plans are computed using local search strategies (e.g., Depth and Breadth First) on state space representing a real, dynamic, and unpredictable environment. In order to navigate in the environment following optimized plan - one with fewest states, a balanced size 4-wheel differential drive robot has been carefully constructed. It can turn 90° and actuate forward by controlling linear (νt = 0.25m/s) and angular (ωt = Π/8 rad/s) velocities of two rear motorized wheels. It is also equipped with an Ultrasonic sensor to avoid collision with obstacles. The system is evaluated in an environment comprising of corridors with adjacent rooms. Graphical User Interface (GUI) is developed in .Net (C#) to map situation in Prolog and transmit plan to hardware for execution. Average time calculated for a plan to generate is 0.065 seconds. The robot moves block by block where each block in the state space represents 2m2 area. In addition to minors, our major contribution is that we offer a unified scheme for robotic navigation without calculating odometry data with the assumption the robot cannot be kidnapped nor slipped.","PeriodicalId":344222,"journal":{"name":"2017 International Conference on Communication, Computing and Digital Systems (C-CODE)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133437903","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Secure provenance in Wireless Sensor Networks - a survey of provenance schemes 无线传感器网络中的安全溯源——溯源方案综述
Khizar Hameed, Junaid Haseeb, M. Tayyab, M. Junaid, Talal Bin Maqsood, Mustahsan Hammad Naqvi
Data in wireless sensor networks are produced at sensor nodes and it is processed by multiple intermediate nodes until reaches at the base station. The diverse nature of data also highlights its associated security concerns. So, it is very important to assess trustworthiness of data to ensure that only reliable information is used in decision making process. Provenance is the effective technique to assess the trustworthiness of data, since it considers a detailed history of the ownership of data and operations performed on data. Many secure provenance schemes have been proposed in the domain of database, cloud, and workflow systems. A very few such schemes have been proposed in the wireless sensor networks. To best of our knowledge, this is the very first survey that explores the secure provenance schemes in context of addressed challenges, security properties, and detected attacks.
无线传感器网络中的数据在传感器节点产生,经过多个中间节点处理,直到到达基站。数据的多样性也凸显了其相关的安全问题。因此,对数据的可信度进行评估,以确保决策过程中只使用可靠的信息是非常重要的。来源是评估数据可信度的有效技术,因为它考虑了数据所有权和对数据执行操作的详细历史。在数据库、云和工作流系统领域已经提出了许多安全的来源方案。在无线传感器网络中,这种方案很少被提出。据我们所知,这是第一次在已解决的挑战、安全属性和检测到的攻击的背景下探索安全来源方案的调查。
{"title":"Secure provenance in Wireless Sensor Networks - a survey of provenance schemes","authors":"Khizar Hameed, Junaid Haseeb, M. Tayyab, M. Junaid, Talal Bin Maqsood, Mustahsan Hammad Naqvi","doi":"10.1109/C-CODE.2017.7918893","DOIUrl":"https://doi.org/10.1109/C-CODE.2017.7918893","url":null,"abstract":"Data in wireless sensor networks are produced at sensor nodes and it is processed by multiple intermediate nodes until reaches at the base station. The diverse nature of data also highlights its associated security concerns. So, it is very important to assess trustworthiness of data to ensure that only reliable information is used in decision making process. Provenance is the effective technique to assess the trustworthiness of data, since it considers a detailed history of the ownership of data and operations performed on data. Many secure provenance schemes have been proposed in the domain of database, cloud, and workflow systems. A very few such schemes have been proposed in the wireless sensor networks. To best of our knowledge, this is the very first survey that explores the secure provenance schemes in context of addressed challenges, security properties, and detected attacks.","PeriodicalId":344222,"journal":{"name":"2017 International Conference on Communication, Computing and Digital Systems (C-CODE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134053450","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
5G cellular network integration with SDN: Challenges, issues and beyond 5G蜂窝网络与SDN的集成:挑战、问题及未来
Sahrish Khan Tayyaba, M. A. Shah
The tremendous growth in communication technology is shaping a hyper-connected network where billions or connected devices are producing a huge volume of data. Cellular and mobile network is a major contributor towards this technology shift and require new architectural paradigm to provide low latency, high performance in a resource constrained environment. 5G technology deployment with fully IP-based connectivity is anticipated by 2020. However, there is no standard established for 5G technology and many efforts are being made to establish a unified 5G stander. In this context, variant technology such as Software Defined Network (SDN) and Network Function virtualization (NFV) are the best candidate. SDN dissociate control plane from data plane and network management is done on the centralized control plane. In this paper, a survey on state of the art on the 5G integration with the SDN is presented. A comprehensive review is presented for the different integrated architectures of 5G wireless network and the generalized solutions over the period 2010–2016. This comparative analysis of the existing solutions of SDN-based cellular network (5G) implementations provides an easy and concise view of the emerging trends by 2020.
通信技术的巨大发展正在塑造一个超连接网络,数十亿或连接的设备正在产生大量数据。蜂窝和移动网络是这种技术转变的主要贡献者,需要新的架构范例来在资源受限的环境中提供低延迟、高性能。预计到2020年将部署完全基于ip连接的5G技术。然而,5G技术还没有建立标准,人们正在努力建立统一的5G标准。在这种情况下,软件定义网络(SDN)和网络功能虚拟化(NFV)等变体技术是最佳选择。SDN将控制平面与数据平面分离,网络管理在集中控制平面上完成。本文对5G与SDN融合的最新研究现状进行了综述。全面回顾了2010-2016年期间5G无线网络的不同集成架构和通用解决方案。本文对基于sdn的蜂窝网络(5G)实现的现有解决方案进行了比较分析,为2020年的新兴趋势提供了一个简单而简洁的视图。
{"title":"5G cellular network integration with SDN: Challenges, issues and beyond","authors":"Sahrish Khan Tayyaba, M. A. Shah","doi":"10.1109/C-CODE.2017.7918900","DOIUrl":"https://doi.org/10.1109/C-CODE.2017.7918900","url":null,"abstract":"The tremendous growth in communication technology is shaping a hyper-connected network where billions or connected devices are producing a huge volume of data. Cellular and mobile network is a major contributor towards this technology shift and require new architectural paradigm to provide low latency, high performance in a resource constrained environment. 5G technology deployment with fully IP-based connectivity is anticipated by 2020. However, there is no standard established for 5G technology and many efforts are being made to establish a unified 5G stander. In this context, variant technology such as Software Defined Network (SDN) and Network Function virtualization (NFV) are the best candidate. SDN dissociate control plane from data plane and network management is done on the centralized control plane. In this paper, a survey on state of the art on the 5G integration with the SDN is presented. A comprehensive review is presented for the different integrated architectures of 5G wireless network and the generalized solutions over the period 2010–2016. This comparative analysis of the existing solutions of SDN-based cellular network (5G) implementations provides an easy and concise view of the emerging trends by 2020.","PeriodicalId":344222,"journal":{"name":"2017 International Conference on Communication, Computing and Digital Systems (C-CODE)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125118919","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Security framework of Ultralightweight Mutual Authentication Protocols for low cost RFID tags 低成本RFID标签的轻量级互认证协议安全框架
Madiha Khalid, U. Mujahid
RFID is one of the rapidly growing identification schemes. Unique identification, non-line of sight capability and functional haste result its massive deployment in many supply chain applications. Because of limited computational capabilities at tag side Ultra lightweight protocols are the only solution to ensure secure communication in RFID systems. In this paper we have presented a detailed working of three eminent UMAPs. Further, a generic desynchronization attack model on these UMAPs has been discussed. Then finally, a novel security framework for low cost UMAPs has been presented to avoid all possible desynchronization attacks. The proposed security model is generic in nature therefore can be implemented to all upcoming UMAPs as well.
RFID是一种发展迅速的识别技术。独特的识别性、非视线性和功能快速性使其在许多供应链应用中得到大规模部署。由于标签端的计算能力有限,超轻量级协议是确保RFID系统安全通信的唯一解决方案。在本文中,我们介绍了三个杰出的umap的详细工作。在此基础上,讨论了针对这些umap的通用去同步攻击模型。最后,提出了一种新的低成本umap安全框架,以避免各种可能的非同步攻击。所建议的安全模型本质上是通用的,因此也可以实现到所有即将到来的umap。
{"title":"Security framework of Ultralightweight Mutual Authentication Protocols for low cost RFID tags","authors":"Madiha Khalid, U. Mujahid","doi":"10.1109/C-CODE.2017.7918896","DOIUrl":"https://doi.org/10.1109/C-CODE.2017.7918896","url":null,"abstract":"RFID is one of the rapidly growing identification schemes. Unique identification, non-line of sight capability and functional haste result its massive deployment in many supply chain applications. Because of limited computational capabilities at tag side Ultra lightweight protocols are the only solution to ensure secure communication in RFID systems. In this paper we have presented a detailed working of three eminent UMAPs. Further, a generic desynchronization attack model on these UMAPs has been discussed. Then finally, a novel security framework for low cost UMAPs has been presented to avoid all possible desynchronization attacks. The proposed security model is generic in nature therefore can be implemented to all upcoming UMAPs as well.","PeriodicalId":344222,"journal":{"name":"2017 International Conference on Communication, Computing and Digital Systems (C-CODE)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122073479","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Performance comparisons of fixed and adaptive beamforming techniques for 4G smart antennas 4G智能天线固定和自适应波束形成技术性能比较
A. A. Awan, Irfanullah, S. Khattak, A. Malik
Much attention has been paid to the design and implementation of adaptive antenna arrays (also called smart antennas), intended for use in current and future wireless communication systems. The motivation is that employment of such array antennas can significantly increase the range and capacity of wireless systems by orienting the main beam towards the desired direction while simultaneously placing nulls toward the interferers (thereby increasing the signal to interference SIR ratio). In this paper, various adaptive beamforming algorithms have been compared based on nulls location, gain and half-power beamwidth (HPBW). Performance comparisons of matrix inversion beamforming algorithm (used for fixed beamforming) and LMS, RLS (used for adaptive beamforming) are investigated in terms of their effects on main beam scanning, resolution and convergence. In particular, the effects of nulls location on the gain and half power beamwidth (HPBW) of main beam have been investigated for the fixed vs adaptive beamforming algorithms.
自适应天线阵列(也称为智能天线)的设计和实现已经引起了人们的极大关注,旨在用于当前和未来的无线通信系统。其动机是,这种阵列天线的使用可以显著增加无线系统的范围和容量,通过将主波束定向到期望的方向,同时将空方向朝向干扰(从而增加信号与干扰SIR比)。本文比较了各种基于零点位置、增益和半功率波束宽度(HPBW)的自适应波束形成算法。研究了矩阵反转波束形成算法(用于固定波束形成)和LMS、RLS算法(用于自适应波束形成)在主波束扫描、分辨率和收敛方面的性能比较。研究了固定波束形成算法和自适应波束形成算法中,零点位置对主波束增益和半功率波束宽度的影响。
{"title":"Performance comparisons of fixed and adaptive beamforming techniques for 4G smart antennas","authors":"A. A. Awan, Irfanullah, S. Khattak, A. Malik","doi":"10.1109/C-CODE.2017.7918894","DOIUrl":"https://doi.org/10.1109/C-CODE.2017.7918894","url":null,"abstract":"Much attention has been paid to the design and implementation of adaptive antenna arrays (also called smart antennas), intended for use in current and future wireless communication systems. The motivation is that employment of such array antennas can significantly increase the range and capacity of wireless systems by orienting the main beam towards the desired direction while simultaneously placing nulls toward the interferers (thereby increasing the signal to interference SIR ratio). In this paper, various adaptive beamforming algorithms have been compared based on nulls location, gain and half-power beamwidth (HPBW). Performance comparisons of matrix inversion beamforming algorithm (used for fixed beamforming) and LMS, RLS (used for adaptive beamforming) are investigated in terms of their effects on main beam scanning, resolution and convergence. In particular, the effects of nulls location on the gain and half power beamwidth (HPBW) of main beam have been investigated for the fixed vs adaptive beamforming algorithms.","PeriodicalId":344222,"journal":{"name":"2017 International Conference on Communication, Computing and Digital Systems (C-CODE)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126016855","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Increasing energy efficiency with channel condition based activation for a cognitive radio mobile network 基于信道条件激活的认知无线移动网络提高能源效率
M. Sarwar, M. Saleem, M. Haider, Junaid Imtiaz
Cognitive radio is an uprising technique designed to solve the problem of spectrum utilization effectively. In a cooperative cognitive radio mobile network (CRMN), battery-powered cognitive mobile node (CMN) frequently sense and report primary user's (PU's) existence to exploit a spectrum hole. The energy consumption increases when all CMN sense and report to centralized controller (CC) in order to make a final global decision. An appropriate strategy is needed to be developed in order to decrease the overall energy consumption, improving energy efficiency (EE). This paper proposes communication channel based activation (CCBA) for CMN in a CRMN. Numerical results shows that even with CCBA limiting some CMN to be activated, helps in increasing EE and global probability of false alarm (FA/W) for the CRMN.
认知无线电是一种旨在有效解决频谱利用问题的新兴技术。在协作式认知无线移动网络(CRMN)中,电池供电的认知移动节点(CMN)频繁感知并报告主用户(PU)的存在,从而利用频谱空穴。当所有CMN感知并向中央控制器(CC)报告以做出最终的全局决策时,能量消耗增加。需要制定适当的战略,以减少总体能源消耗,提高能源效率。本文提出了一种基于通信信道的CMN激活(CCBA)方法。数值结果表明,即使CCBA限制了某些CMN的激活,也有助于提高CRMN的EE和全局虚警概率(FA/W)。
{"title":"Increasing energy efficiency with channel condition based activation for a cognitive radio mobile network","authors":"M. Sarwar, M. Saleem, M. Haider, Junaid Imtiaz","doi":"10.1109/C-CODE.2017.7918911","DOIUrl":"https://doi.org/10.1109/C-CODE.2017.7918911","url":null,"abstract":"Cognitive radio is an uprising technique designed to solve the problem of spectrum utilization effectively. In a cooperative cognitive radio mobile network (CRMN), battery-powered cognitive mobile node (CMN) frequently sense and report primary user's (PU's) existence to exploit a spectrum hole. The energy consumption increases when all CMN sense and report to centralized controller (CC) in order to make a final global decision. An appropriate strategy is needed to be developed in order to decrease the overall energy consumption, improving energy efficiency (EE). This paper proposes communication channel based activation (CCBA) for CMN in a CRMN. Numerical results shows that even with CCBA limiting some CMN to be activated, helps in increasing EE and global probability of false alarm (FA/W) for the CRMN.","PeriodicalId":344222,"journal":{"name":"2017 International Conference on Communication, Computing and Digital Systems (C-CODE)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132262988","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Usage of gamification in enterprise: A review 游戏化在企业中的应用综述
Abdul Aziz, Anam Mushtaq, Misbahul Anwar
Enterprise games have an amazing ability to hold employee's attention, build loyalty, and increase motivation. The acceptance of game context in business applications is encouraging; also, it motivates employees to perform their tasks in an enjoyable manner. Enterprise gamification is growing at an impressive rate. This analysis focuses on how enterprises could use gamification for their benefits and discusses few implemented examples. The review concentrates on positive and negative aspects of gamification in business and discusses the mechanism that helps in implementing the games in an enterprise. Our findings revealed that, gamification has a fine line between being a positive tool to motivate employees and being a source of workplace pressure, which could affect the social and mental well-being.
企业游戏具有吸引员工注意力、建立忠诚度和提高积极性的惊人能力。在商业应用中接受游戏背景是令人鼓舞的;此外,它还能激励员工以愉快的方式完成任务。企业游戏化正在以惊人的速度发展。本分析侧重于企业如何利用游戏化来获取利益,并讨论了一些实现的例子。本文集中讨论了游戏化在商业中的积极和消极方面,并讨论了有助于在企业中实现游戏的机制。我们的研究结果表明,游戏化在成为激励员工的积极工具和成为可能影响社会和心理健康的工作场所压力来源之间有一条微妙的界限。
{"title":"Usage of gamification in enterprise: A review","authors":"Abdul Aziz, Anam Mushtaq, Misbahul Anwar","doi":"10.1109/C-CODE.2017.7918937","DOIUrl":"https://doi.org/10.1109/C-CODE.2017.7918937","url":null,"abstract":"Enterprise games have an amazing ability to hold employee's attention, build loyalty, and increase motivation. The acceptance of game context in business applications is encouraging; also, it motivates employees to perform their tasks in an enjoyable manner. Enterprise gamification is growing at an impressive rate. This analysis focuses on how enterprises could use gamification for their benefits and discusses few implemented examples. The review concentrates on positive and negative aspects of gamification in business and discusses the mechanism that helps in implementing the games in an enterprise. Our findings revealed that, gamification has a fine line between being a positive tool to motivate employees and being a source of workplace pressure, which could affect the social and mental well-being.","PeriodicalId":344222,"journal":{"name":"2017 International Conference on Communication, Computing and Digital Systems (C-CODE)","volume":"110 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126412996","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
NUAV - a testbed for developing autonomous Unmanned Aerial Vehicles NUAV -开发自主无人驾驶飞行器的试验台
Saleh Habib, Mahgul Malik, Shams ur Rahman, Muhammad Adil Raja
Contemporary models of Unmanned Aerial Vehicles (UAVs) are largely developed using simulators. In a typical scheme, a flight simulator is dovetailed with a machine learning (ML) algorithm. A good simulator provides a realistic environment for simulated aircraft. It also provides the ability to invoke and fly various models of aircraft. The ML algorithm, in turn, allows to find an appropriate set of control inputs that can be useful in flying the aircraft autonomously. Creating UAVs in this way has certain obvious benefits. The process of development can be accelerated largely by employing a testbed that allows a seamless dovetailing between the flight simulator and an ML algorithm of choice. However, an extensive testbed is largely missing from the academic landscape both in terms of implementation and technical details. This papers proposes a new testbed for the development of fully autonomous UAVs. The proposed system allows researchers to simulate UAVs for various scenarios.
当代无人驾驶飞行器(uav)的模型很大程度上是使用模拟器开发的。在一个典型的方案中,飞行模拟器与机器学习(ML)算法相结合。一个好的模拟器为模拟飞机提供了一个真实的环境。它还提供调用和飞行各种型号的飞机的能力。反过来,机器学习算法允许找到一组适当的控制输入,这些输入可以用于飞机的自主飞行。以这种方式制造无人机具有某些明显的好处。通过使用一个允许飞行模拟器和ML算法之间无缝对接的测试平台,开发过程可以在很大程度上加快。然而,无论是在实现还是技术细节方面,学术界都在很大程度上缺少一个广泛的测试平台。本文提出了一种开发全自主无人机的新型试验台。该系统允许研究人员模拟各种场景下的无人机。
{"title":"NUAV - a testbed for developing autonomous Unmanned Aerial Vehicles","authors":"Saleh Habib, Mahgul Malik, Shams ur Rahman, Muhammad Adil Raja","doi":"10.1109/C-CODE.2017.7918926","DOIUrl":"https://doi.org/10.1109/C-CODE.2017.7918926","url":null,"abstract":"Contemporary models of Unmanned Aerial Vehicles (UAVs) are largely developed using simulators. In a typical scheme, a flight simulator is dovetailed with a machine learning (ML) algorithm. A good simulator provides a realistic environment for simulated aircraft. It also provides the ability to invoke and fly various models of aircraft. The ML algorithm, in turn, allows to find an appropriate set of control inputs that can be useful in flying the aircraft autonomously. Creating UAVs in this way has certain obvious benefits. The process of development can be accelerated largely by employing a testbed that allows a seamless dovetailing between the flight simulator and an ML algorithm of choice. However, an extensive testbed is largely missing from the academic landscape both in terms of implementation and technical details. This papers proposes a new testbed for the development of fully autonomous UAVs. The proposed system allows researchers to simulate UAVs for various scenarios.","PeriodicalId":344222,"journal":{"name":"2017 International Conference on Communication, Computing and Digital Systems (C-CODE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129921355","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
期刊
2017 International Conference on Communication, Computing and Digital Systems (C-CODE)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1