Pub Date : 2013-10-24DOI: 10.1109/ISCIT.2013.6645949
Chaidanai Robinson, Santichai Vicha
Recently, Parasitic Infection has been shown to be a major health concern in Chiang Rai. Thai Health organisations have been focusing on the more rural areas to help decrease parasitic spread and infection, through use of education and life style alterations. The majority of children of the young populous of whom live in rural areas lack adequate health knowledge and live on their rural beliefs and culture, which is often to the detriment of their standard of living. Presently locals still lack both technology and the tools necessary to reach a solid base of understanding of public health. In this study, we plan to implement multimedia with use of animation to create a set of versatile tools to alter the behavioral habits of local hill tribe-Karen with a secondary goal of improving IT skills for people in the rural area.
{"title":"Multimedia for decreasing spread of parasitic infection: Case study of hill tribes in Chiang Rai","authors":"Chaidanai Robinson, Santichai Vicha","doi":"10.1109/ISCIT.2013.6645949","DOIUrl":"https://doi.org/10.1109/ISCIT.2013.6645949","url":null,"abstract":"Recently, Parasitic Infection has been shown to be a major health concern in Chiang Rai. Thai Health organisations have been focusing on the more rural areas to help decrease parasitic spread and infection, through use of education and life style alterations. The majority of children of the young populous of whom live in rural areas lack adequate health knowledge and live on their rural beliefs and culture, which is often to the detriment of their standard of living. Presently locals still lack both technology and the tools necessary to reach a solid base of understanding of public health. In this study, we plan to implement multimedia with use of animation to create a set of versatile tools to alter the behavioral habits of local hill tribe-Karen with a secondary goal of improving IT skills for people in the rural area.","PeriodicalId":356009,"journal":{"name":"2013 13th International Symposium on Communications and Information Technologies (ISCIT)","volume":"114 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120908522","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-10-24DOI: 10.1109/ISCIT.2013.6645835
S. Mahapakulchai, Duangjai Parnnark
In this work, the MAP source-controlled channel decoder with matched and mismatched source transition probability matrix (STPM) is intensively examined for a MPEG-4 video sequence. We attempt to answer whether or not one can use the MAP decoding with a mismatched STPM instead of the MAP decoding with the matched STPM. The matched STPM requires the transmission for every frame images. Here, the commonly "foreman" video input is extracted into 300 frame images. Each image is inserted into the MPEG-4 image transmission system over the Nakagami-m block-fading channels with m = 1.5 2.0 and 2.5. The system performance in in term of the peak signal to noise ratio (PSNR) and word error rate (WER) are summarized at 7b = 3.75 and 5 dB. The results from both MAP decoding with matched STMP and mismatched STMP show the similarity of the system performance. Moreover, the slight improvement is obtained when MAP decoder is compared with ML decoder.
{"title":"Study on mismatched source transition probability matrix using in MAP source-controlled channel decoding for MPEG-4 video sequence wireless transmission systems","authors":"S. Mahapakulchai, Duangjai Parnnark","doi":"10.1109/ISCIT.2013.6645835","DOIUrl":"https://doi.org/10.1109/ISCIT.2013.6645835","url":null,"abstract":"In this work, the MAP source-controlled channel decoder with matched and mismatched source transition probability matrix (STPM) is intensively examined for a MPEG-4 video sequence. We attempt to answer whether or not one can use the MAP decoding with a mismatched STPM instead of the MAP decoding with the matched STPM. The matched STPM requires the transmission for every frame images. Here, the commonly \"foreman\" video input is extracted into 300 frame images. Each image is inserted into the MPEG-4 image transmission system over the Nakagami-m block-fading channels with m = 1.5 2.0 and 2.5. The system performance in in term of the peak signal to noise ratio (PSNR) and word error rate (WER) are summarized at 7b = 3.75 and 5 dB. The results from both MAP decoding with matched STMP and mismatched STMP show the similarity of the system performance. Moreover, the slight improvement is obtained when MAP decoder is compared with ML decoder.","PeriodicalId":356009,"journal":{"name":"2013 13th International Symposium on Communications and Information Technologies (ISCIT)","volume":"94 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122758757","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-10-24DOI: 10.1109/ISCIT.2013.6645852
N. Chirdchoo, Weerasak Cheunta, Kanittha Saelim, P. Kovintavewat
Voice over Internet Protocol (VoIP) technology has continually gained popularity and has been widely adopted for personal and enterprise usage over the past decade. This results from its capability of reducing the cost of a pricy phone bill while being able to increase the organization's productivity as a whole. The contribution of this work is to discuss the guidelines in designing and the implementation issues in deploying a VoIP system for campus usage. Specifically, this paper illustrates how VoIP is designed to be integrated with the existing analog phone system, in order to provide a solution to the problems of internal phone line shortage and frequently damage of an analog telephone card, at Nakhon Pathom Rajabhat University (NPRU). The system's performance is then evaluated in terms of voice quality and the sufficiency of the number of trunks required, which reveals that the designed system operates with satisfactory performance.
{"title":"Design and implementation of a VoIP system for campus usage: A case study at NPRU","authors":"N. Chirdchoo, Weerasak Cheunta, Kanittha Saelim, P. Kovintavewat","doi":"10.1109/ISCIT.2013.6645852","DOIUrl":"https://doi.org/10.1109/ISCIT.2013.6645852","url":null,"abstract":"Voice over Internet Protocol (VoIP) technology has continually gained popularity and has been widely adopted for personal and enterprise usage over the past decade. This results from its capability of reducing the cost of a pricy phone bill while being able to increase the organization's productivity as a whole. The contribution of this work is to discuss the guidelines in designing and the implementation issues in deploying a VoIP system for campus usage. Specifically, this paper illustrates how VoIP is designed to be integrated with the existing analog phone system, in order to provide a solution to the problems of internal phone line shortage and frequently damage of an analog telephone card, at Nakhon Pathom Rajabhat University (NPRU). The system's performance is then evaluated in terms of voice quality and the sufficiency of the number of trunks required, which reveals that the designed system operates with satisfactory performance.","PeriodicalId":356009,"journal":{"name":"2013 13th International Symposium on Communications and Information Technologies (ISCIT)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115954531","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-10-24DOI: 10.1109/ISCIT.2013.6645900
Machine Bounthanh, K. Hamamoto, B. Attachoo, Tha Bounthanh
This paper, we proposed a novel framework for combining and weighting all of three i.e. color, shape and texture features to achieve higher retrieval efficiency. The color feature is extracted by quantifying the YUV color space and the color attributes like the mean value, the standard deviation, and the image bitmap of YUV color space is represented. The texture features are obtained by the entropy based on the gray level cooccurrence matrix and the edge histogram descriptor of an image. The shape feature descriptor is derived from Fourier descriptors (FDs) and the FDs derived from different signatures. When computing the similarity between the query image and target image in the database, normalization information distance is also used for adjusting distance values into the same level. And then the linear combination has used to combine the normalized distance of the color, shape and texture features to obtain the similarity as the indexing of image. Furthermore, an experimental results indicated, a weight variation to achieve higher retrieval efficiency and the proposed technique indeed outperforms other schemes in terms of the accuracy and efficiency.
{"title":"Content-based image retrieval system based on combined and weighted multi-features","authors":"Machine Bounthanh, K. Hamamoto, B. Attachoo, Tha Bounthanh","doi":"10.1109/ISCIT.2013.6645900","DOIUrl":"https://doi.org/10.1109/ISCIT.2013.6645900","url":null,"abstract":"This paper, we proposed a novel framework for combining and weighting all of three i.e. color, shape and texture features to achieve higher retrieval efficiency. The color feature is extracted by quantifying the YUV color space and the color attributes like the mean value, the standard deviation, and the image bitmap of YUV color space is represented. The texture features are obtained by the entropy based on the gray level cooccurrence matrix and the edge histogram descriptor of an image. The shape feature descriptor is derived from Fourier descriptors (FDs) and the FDs derived from different signatures. When computing the similarity between the query image and target image in the database, normalization information distance is also used for adjusting distance values into the same level. And then the linear combination has used to combine the normalized distance of the color, shape and texture features to obtain the similarity as the indexing of image. Furthermore, an experimental results indicated, a weight variation to achieve higher retrieval efficiency and the proposed technique indeed outperforms other schemes in terms of the accuracy and efficiency.","PeriodicalId":356009,"journal":{"name":"2013 13th International Symposium on Communications and Information Technologies (ISCIT)","volume":"587 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115978879","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-10-24DOI: 10.1109/ISCIT.2013.6645881
P. Duangphasuk, W. Kurutach
Tattoos, a soft biometric trait, are gradually being used for suspect and victim identifications in forensics and law enforcement. Particularly, tattoos are raising obvious evident attention because of their visual and demographic traits as well as their increasing prevalence. However, tattoos on human skin are complicated and large invariance in both structure and skin surface. In order to improve tattoo image retrieval and matching, this paper proposes an approach of tattoo skin detection and segmentation using the image negative method in the pre-processing part. The process is composed of three steps. The first one is the skin detection where we use a variety of skin patches to do the task of human skin colour segmentation using the HSV model, especially, Asian skin colour. Then, in the second step, the image negative method is used for detecting the clear graphic image of the tattoo segment. Finally, we extract the tattoo segment from the skin area of the negative image and, as a result, the tattoo negative image is obtained and can be used for retrieval. Our experimentation has been carried out based on the dataset of tattoo images, gathered from Thai Criminal Records Division - Royal Thai Police, Kingdom of Thailand. Based on the concept of CBIR (Content-Based Image Retrieval), SIFT (Scale Invariance Feature Transform) has been employed in the process of image matching and retrieval. The result has illustrated that the tattoo skin detection and segmentation are efficient and effective for tattoo image retrieval, and, also, reduce the possibility of illogical matches.
{"title":"Tattoo skin detection and segmentation using image negative method","authors":"P. Duangphasuk, W. Kurutach","doi":"10.1109/ISCIT.2013.6645881","DOIUrl":"https://doi.org/10.1109/ISCIT.2013.6645881","url":null,"abstract":"Tattoos, a soft biometric trait, are gradually being used for suspect and victim identifications in forensics and law enforcement. Particularly, tattoos are raising obvious evident attention because of their visual and demographic traits as well as their increasing prevalence. However, tattoos on human skin are complicated and large invariance in both structure and skin surface. In order to improve tattoo image retrieval and matching, this paper proposes an approach of tattoo skin detection and segmentation using the image negative method in the pre-processing part. The process is composed of three steps. The first one is the skin detection where we use a variety of skin patches to do the task of human skin colour segmentation using the HSV model, especially, Asian skin colour. Then, in the second step, the image negative method is used for detecting the clear graphic image of the tattoo segment. Finally, we extract the tattoo segment from the skin area of the negative image and, as a result, the tattoo negative image is obtained and can be used for retrieval. Our experimentation has been carried out based on the dataset of tattoo images, gathered from Thai Criminal Records Division - Royal Thai Police, Kingdom of Thailand. Based on the concept of CBIR (Content-Based Image Retrieval), SIFT (Scale Invariance Feature Transform) has been employed in the process of image matching and retrieval. The result has illustrated that the tattoo skin detection and segmentation are efficient and effective for tattoo image retrieval, and, also, reduce the possibility of illogical matches.","PeriodicalId":356009,"journal":{"name":"2013 13th International Symposium on Communications and Information Technologies (ISCIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133933240","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-10-24DOI: 10.1109/ISCIT.2013.6645850
Mohamed Tekaya, N. Tabbane, S. Tabbane
Mobile Ad hoc Networks (MANET) are wireless networks consisting of a collection of mobile nodes with no fixed infrastructure or centralized administration. With this dynamic topology, ad hoc network presents many specific problems which had influence on solution that assure QoS such as multimedia applications. However, the rapid growth in number and diversity of real-time network applications has made it imperative to consider the impact of end-to-end delay requirements of traffic on network. The main problems are: node mobility and link failure. Hence, there is a need for efficient routing protocols to allow the nodes to communicate with some QoS guarantee. In this work, the AutoRegressive Moving Average (ARMA) model is used to forecasting resources to meet the QoS requirements in ad hoc networks. We apply this model in Ad hoc On demand Multipath Distance Vector (AOMDV) protocol. The results obtained show that the combination of the AOMDV protocol with the time QoS forecasting mechanisms for real-time service support based on ARMA processes performs better than based on AR processes and the conventional AOMDV.
{"title":"Predictive QoS for AOMDV protocol based on AutoRegressive Moving Average processes","authors":"Mohamed Tekaya, N. Tabbane, S. Tabbane","doi":"10.1109/ISCIT.2013.6645850","DOIUrl":"https://doi.org/10.1109/ISCIT.2013.6645850","url":null,"abstract":"Mobile Ad hoc Networks (MANET) are wireless networks consisting of a collection of mobile nodes with no fixed infrastructure or centralized administration. With this dynamic topology, ad hoc network presents many specific problems which had influence on solution that assure QoS such as multimedia applications. However, the rapid growth in number and diversity of real-time network applications has made it imperative to consider the impact of end-to-end delay requirements of traffic on network. The main problems are: node mobility and link failure. Hence, there is a need for efficient routing protocols to allow the nodes to communicate with some QoS guarantee. In this work, the AutoRegressive Moving Average (ARMA) model is used to forecasting resources to meet the QoS requirements in ad hoc networks. We apply this model in Ad hoc On demand Multipath Distance Vector (AOMDV) protocol. The results obtained show that the combination of the AOMDV protocol with the time QoS forecasting mechanisms for real-time service support based on ARMA processes performs better than based on AR processes and the conventional AOMDV.","PeriodicalId":356009,"journal":{"name":"2013 13th International Symposium on Communications and Information Technologies (ISCIT)","volume":"03 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131319600","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-10-24DOI: 10.1109/ISCIT.2013.6645944
Suchart Pharadornpanitchakul, R. Chaisricharoen
Driver's night drive vision can be seriously reduced by opposite headlight glare especially in mountainous roads. Though there are methods for reducing opposite headlight glare effects, these techniques usually deteriorate night vision in normal state. Therefore, these techniques must be deployed if and only if a certain danger from the opposite headlight glare become really danger. The method for detecting this danger is proposed based on ordinary image or video captured device as anyone who own car can buy, using properties in every still color image to extract light source and eliminate unconcerned objects such as some reflects on pavement, background color from own light beams, and then find the most area in picture to determine whether it is dangerous glare or not. The result measurement performs by manually to find trend of percentage area for warning. The proposed method is evaluated based on recorded videos from various scenarios. The test implies good result based on no probability of negative fault error with only low of positive fault error probability.
{"title":"Danger detection from head light glare through vision estimation","authors":"Suchart Pharadornpanitchakul, R. Chaisricharoen","doi":"10.1109/ISCIT.2013.6645944","DOIUrl":"https://doi.org/10.1109/ISCIT.2013.6645944","url":null,"abstract":"Driver's night drive vision can be seriously reduced by opposite headlight glare especially in mountainous roads. Though there are methods for reducing opposite headlight glare effects, these techniques usually deteriorate night vision in normal state. Therefore, these techniques must be deployed if and only if a certain danger from the opposite headlight glare become really danger. The method for detecting this danger is proposed based on ordinary image or video captured device as anyone who own car can buy, using properties in every still color image to extract light source and eliminate unconcerned objects such as some reflects on pavement, background color from own light beams, and then find the most area in picture to determine whether it is dangerous glare or not. The result measurement performs by manually to find trend of percentage area for warning. The proposed method is evaluated based on recorded videos from various scenarios. The test implies good result based on no probability of negative fault error with only low of positive fault error probability.","PeriodicalId":356009,"journal":{"name":"2013 13th International Symposium on Communications and Information Technologies (ISCIT)","volume":"431 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133323784","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-10-24DOI: 10.1109/ISCIT.2013.6645863
Bingwei Jiang, Jun Feng
The paper analyzes the principle of the technique using low voltage current source to improve the power supply rejection ratio (PSRR) of operational amplifiers (OPAs). The technique has advantage of decreasing the parasitic gain from power supply with no detrimental effect on the output swing. A single supply two-stage Miller compensated OPA is presented as a prototyped circuit. The simulation results of the proposed OPA show that 38 dB and 17 dB improvement of PSRR at DC and 10MHz respectively compared with the OPA without the suggested circuit. Near rail-to-rail output swing and 489 MHz gain bandwidth (GBW) have been acquired to satisfy the large output swing and wideband application requirement.
{"title":"PSRR enhancement technique using low voltage current source for single supply operational amplifiers","authors":"Bingwei Jiang, Jun Feng","doi":"10.1109/ISCIT.2013.6645863","DOIUrl":"https://doi.org/10.1109/ISCIT.2013.6645863","url":null,"abstract":"The paper analyzes the principle of the technique using low voltage current source to improve the power supply rejection ratio (PSRR) of operational amplifiers (OPAs). The technique has advantage of decreasing the parasitic gain from power supply with no detrimental effect on the output swing. A single supply two-stage Miller compensated OPA is presented as a prototyped circuit. The simulation results of the proposed OPA show that 38 dB and 17 dB improvement of PSRR at DC and 10MHz respectively compared with the OPA without the suggested circuit. Near rail-to-rail output swing and 489 MHz gain bandwidth (GBW) have been acquired to satisfy the large output swing and wideband application requirement.","PeriodicalId":356009,"journal":{"name":"2013 13th International Symposium on Communications and Information Technologies (ISCIT)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130400621","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-10-24DOI: 10.1109/ISCIT.2013.6645873
Shunsuke Nakamura, Kohei Aoki, Mitsuya Uchida, Ittetsu Taniguchi, H. Tomiyama, M. Fukui
This paper proposes a new metric for basic-block level rough energy estimation for fine-grained power-gated VLIW (Very Long Instruction-set Word) data-path model. Power-gating (PG) brings a big benefit for leakage power reduction, but it makes an instruction scheduling difficult because applying PG usually takes dozens or hundreds of NOP cycles. To estimate the energy consumption of such power-gated VLIW data-path, an optimization of instruction scheduling for minimization of energy consumption is necessary. However, such instruction scheduling usually takes long time. This paper proposes a new metric for rough energy estimation taking into account power-gating effect. Proposed metric is constructed by application, architecture parameters, and power-gating parameters. Experimental results show that the correlation coefficient between proposed metric and energy consumption taking into account PG effect was more than 0.84, and the energy estimation by proposed metric is obtained less than one second.
针对细粒度功率门控VLIW (Very Long Instruction-set Word)数据路径模型,提出了一种新的基块级粗能量估计度量。功率门控(PG)在降低泄漏功率方面有很大的好处,但由于应用PG通常需要数十甚至数百个NOP周期,因此给指令调度带来了困难。为了估计这种功率门控VLIW数据路径的能耗,有必要对指令调度进行优化,以使能耗最小化。然而,这种指令调度通常需要较长的时间。本文提出了一种考虑功率门控效应的粗略能量估计新度量。提出的度量由应用、体系结构参数和功率门控参数组成。实验结果表明,考虑PG效应后,所提度量与能耗的相关系数大于0.84,所提度量的能量估计在1秒内完成。
{"title":"A new metric for basic-block level rough energy estimation for power-gated VLIW data-path model","authors":"Shunsuke Nakamura, Kohei Aoki, Mitsuya Uchida, Ittetsu Taniguchi, H. Tomiyama, M. Fukui","doi":"10.1109/ISCIT.2013.6645873","DOIUrl":"https://doi.org/10.1109/ISCIT.2013.6645873","url":null,"abstract":"This paper proposes a new metric for basic-block level rough energy estimation for fine-grained power-gated VLIW (Very Long Instruction-set Word) data-path model. Power-gating (PG) brings a big benefit for leakage power reduction, but it makes an instruction scheduling difficult because applying PG usually takes dozens or hundreds of NOP cycles. To estimate the energy consumption of such power-gated VLIW data-path, an optimization of instruction scheduling for minimization of energy consumption is necessary. However, such instruction scheduling usually takes long time. This paper proposes a new metric for rough energy estimation taking into account power-gating effect. Proposed metric is constructed by application, architecture parameters, and power-gating parameters. Experimental results show that the correlation coefficient between proposed metric and energy consumption taking into account PG effect was more than 0.84, and the energy estimation by proposed metric is obtained less than one second.","PeriodicalId":356009,"journal":{"name":"2013 13th International Symposium on Communications and Information Technologies (ISCIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124290170","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-10-24DOI: 10.1109/ISCIT.2013.6645818
Pongtep Poolnisai, Prawit Chumchu
IEEE 802.16e [1] standard supports mobile wireless communication. Handover schemes are considered especially. Hard handover is defined to be mandatory and it is a Break-Before-Make (BBM) procedure. The hard handover process pauses during handover operation, and it causes degradation in system performance when implemented in real-time application such as Voice over IP (VoIP) and Internet protocol Television (IPTV). However, the standard considers only the received signal strength although the velocity of mobile station is also an important factor because it makes handover delay. This paper proposes an improvement handover scheme for mobile WIMAX. The scheme depends on the velocity factor of mobile station and aims to reduce handover delay time and enhance the network resource utilization. The simulation result shows that the proposed scheme provides handover latency better than standard hard handover about 90%.
IEEE 802.16e[1]标准支持移动无线通信。特别考虑了交接方案。硬移交被定义为强制性的,它是一个先断后造(BBM)过程。硬切换过程在切换过程中会暂停,在VoIP (Voice over IP)和IPTV (Internet protocol Television)等实时应用中实现时,会导致系统性能下降。然而,该标准只考虑接收到的信号强度,尽管移动台的速度也是一个重要因素,因为它会造成切换延迟。提出了一种改进的移动WIMAX切换方案。该方案依赖于移动站的速度因子,旨在减少切换延迟时间,提高网络资源利用率。仿真结果表明,该方案的切换延时比标准硬切换延时提高约90%。
{"title":"Seamless handover for high velocity mobile station in WiMAX","authors":"Pongtep Poolnisai, Prawit Chumchu","doi":"10.1109/ISCIT.2013.6645818","DOIUrl":"https://doi.org/10.1109/ISCIT.2013.6645818","url":null,"abstract":"IEEE 802.16e [1] standard supports mobile wireless communication. Handover schemes are considered especially. Hard handover is defined to be mandatory and it is a Break-Before-Make (BBM) procedure. The hard handover process pauses during handover operation, and it causes degradation in system performance when implemented in real-time application such as Voice over IP (VoIP) and Internet protocol Television (IPTV). However, the standard considers only the received signal strength although the velocity of mobile station is also an important factor because it makes handover delay. This paper proposes an improvement handover scheme for mobile WIMAX. The scheme depends on the velocity factor of mobile station and aims to reduce handover delay time and enhance the network resource utilization. The simulation result shows that the proposed scheme provides handover latency better than standard hard handover about 90%.","PeriodicalId":356009,"journal":{"name":"2013 13th International Symposium on Communications and Information Technologies (ISCIT)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115879011","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}