首页 > 最新文献

2013 13th International Symposium on Communications and Information Technologies (ISCIT)最新文献

英文 中文
A novel two-stage Multi-crieteria evaluation for internal attack in WSN 一种新的两阶段多准则无线传感器网络内部攻击评估方法
Muhammad R. Ahmed, Xu Huang, Hongyan Cui, N. K. Srinath
Wireless sensor networks (WSNs) are an emerging technology for collecting data about the natural or built environment. They consist of low-cost and multifunctional resources and autonomous nodes comprising the appropriate sensors along with computational devices that transmit and receive data wirelessly. The nodes work independently to function on environmental conditions. Normally each node cooperates with its neighbours to wirelessly transmit their readings via a deployed network. A wireless sensor network can be used for many different applications range from a military implementation in the battlefield, an environmental monitoring, playing an function in health sector as well as emergency response of surveillance. With its nature and application scenario WSN had drawn a great attention to the increasing applications. In order to ensure its functionality especially in malicious environments, security mechanisms become essential. Internal attacks have gained prominence and pose most challenging threats to all WSNs. Althougḩ a number of works has been done to secure a WSN but internal attacks have gained little attention. The conventional cryptographic technique does not give the appropriate security to save the network from internal attack that cause by abnormally behaved legitimate nodes. In this paper, we have proposed a new approach for detecting internal attack in two stages with multi-criteria evaluation. A prior to the stage of implementation we have checked whether the targeted node is in transmission range or not then in the current stage, we will make a misbehavior judgment with Abnormal Behavior Identification Mechanism (ABIM) by using cosine similarity for abnormality. Secondly, we combined the multiple pieces of evidences made by the internal attacker or the abnormally behaved nodes evidenced by information sources and then using the Dempester-Shafer Theory (DST) to make final decision. The advantage of this method is that it does not need the knowledge about the normal or malicious node in advance.
无线传感器网络(WSNs)是一种用于收集自然或建筑环境数据的新兴技术。它们由低成本和多功能资源和自主节点组成,这些节点包括适当的传感器以及无线传输和接收数据的计算设备。这些节点根据环境条件独立工作。通常情况下,每个节点与相邻节点合作,通过部署的网络无线传输它们的读数。无线传感器网络可用于许多不同的应用,从战场上的军事实施,环境监测,在卫生部门发挥作用以及监测的应急响应。无线传感器网络以其自身的特性和应用场景引起了越来越多的关注。为了确保其功能,特别是在恶意环境中,安全机制变得至关重要。内部攻击日益突出,对所有无线传感器网络构成最具挑战性的威胁。虽然已经做了许多工作来保护WSN,但内部攻击很少受到关注。传统的加密技术不能提供适当的安全性来保护网络免受合法节点异常行为引起的内部攻击。本文提出了一种基于多准则评估的两阶段内部攻击检测方法。在实施阶段之前,我们已经检查了目标节点是否在传输范围内,那么在当前阶段,我们将使用异常行为识别机制(ABIM)对异常使用余弦相似度进行错误行为判断。其次,我们将内部攻击者提供的多条证据或信息源证明的异常节点结合起来,然后使用Dempester-Shafer理论(DST)进行最终决策。该方法的优点是不需要事先了解正常节点或恶意节点。
{"title":"A novel two-stage Multi-crieteria evaluation for internal attack in WSN","authors":"Muhammad R. Ahmed, Xu Huang, Hongyan Cui, N. K. Srinath","doi":"10.1109/ISCIT.2013.6645849","DOIUrl":"https://doi.org/10.1109/ISCIT.2013.6645849","url":null,"abstract":"Wireless sensor networks (WSNs) are an emerging technology for collecting data about the natural or built environment. They consist of low-cost and multifunctional resources and autonomous nodes comprising the appropriate sensors along with computational devices that transmit and receive data wirelessly. The nodes work independently to function on environmental conditions. Normally each node cooperates with its neighbours to wirelessly transmit their readings via a deployed network. A wireless sensor network can be used for many different applications range from a military implementation in the battlefield, an environmental monitoring, playing an function in health sector as well as emergency response of surveillance. With its nature and application scenario WSN had drawn a great attention to the increasing applications. In order to ensure its functionality especially in malicious environments, security mechanisms become essential. Internal attacks have gained prominence and pose most challenging threats to all WSNs. Althougḩ a number of works has been done to secure a WSN but internal attacks have gained little attention. The conventional cryptographic technique does not give the appropriate security to save the network from internal attack that cause by abnormally behaved legitimate nodes. In this paper, we have proposed a new approach for detecting internal attack in two stages with multi-criteria evaluation. A prior to the stage of implementation we have checked whether the targeted node is in transmission range or not then in the current stage, we will make a misbehavior judgment with Abnormal Behavior Identification Mechanism (ABIM) by using cosine similarity for abnormality. Secondly, we combined the multiple pieces of evidences made by the internal attacker or the abnormally behaved nodes evidenced by information sources and then using the Dempester-Shafer Theory (DST) to make final decision. The advantage of this method is that it does not need the knowledge about the normal or malicious node in advance.","PeriodicalId":356009,"journal":{"name":"2013 13th International Symposium on Communications and Information Technologies (ISCIT)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128734691","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performance evaluation of cooperative communications for STFC MB-OFDM UWB STFC MB-OFDM超宽带协同通信性能评价
Zixuan Lin, Le Chung Tran, F. Safaei
Recently, the combination of cooperative communication, Space-Time-Frequency Codes (STFCs) and Multiband OFDM Ultra-Wideband (MB-OFDM UWB) has been proposed to improve the data rate, system capacity and reliability. This paper provides insightful performance evaluation for our previous proposed cooperative communication schemes for MB-OFDM UWB systems. In particular, this paper shows that the usefulness of cooperative communication schemes is decided by the mutual relation between the signal-to-noise ratio (SNR) of the inter-node links, referred to as inter-node SNR, and that of the uplinks, which is referred to as uplink SNR. For a certain uplink SNR value, cooperative communication becomes useful when the inter-node SNR is above a certain threshold, the so-called cooperative SNR value, and vice versa. The cooperative SNR values corresponding to different uplink conditions have been derived from the simulation results for the UWB channel models CM1 and CM2 for illustration. Two important observations drawn from this paper are that, in some cases, cooperative communication for MB-OFDM UWB might be still beneficial even when the inter-node links are relatively noisy, and/or when the source nodes are located further apart from each other than from the destination node; and this benefit over a non-cooperative counterpart is more significant when the uplink channels are more dispersive.
近年来,人们提出将协同通信、空时频码(stfc)和多频带OFDM超宽带(MB-OFDM UWB)相结合,以提高数据速率、系统容量和可靠性。本文对我们之前提出的MB-OFDM UWB系统的协作通信方案进行了有见地的性能评价。具体而言,本文表明,协作通信方案的有效性取决于节点间链路的信噪比(SNR)(节点间信噪比)与上行链路的信噪比(SNR)(上行信噪比)之间的相互关系。对于一定的上行信噪比值,当节点间信噪比超过一定的阈值,即所谓的合作信噪比值时,协作通信才有用,反之亦然。通过UWB信道模型CM1和CM2的仿真结果,推导出了不同上行条件下的协同信噪比值。从本文中得出的两个重要观察结果是,在某些情况下,即使节点间链路相对嘈杂,和/或源节点彼此之间的距离比目标节点更远,MB-OFDM UWB的合作通信仍然可能是有益的;当上行信道越分散时,这种优势就越明显。
{"title":"Performance evaluation of cooperative communications for STFC MB-OFDM UWB","authors":"Zixuan Lin, Le Chung Tran, F. Safaei","doi":"10.1109/ISCIT.2013.6645820","DOIUrl":"https://doi.org/10.1109/ISCIT.2013.6645820","url":null,"abstract":"Recently, the combination of cooperative communication, Space-Time-Frequency Codes (STFCs) and Multiband OFDM Ultra-Wideband (MB-OFDM UWB) has been proposed to improve the data rate, system capacity and reliability. This paper provides insightful performance evaluation for our previous proposed cooperative communication schemes for MB-OFDM UWB systems. In particular, this paper shows that the usefulness of cooperative communication schemes is decided by the mutual relation between the signal-to-noise ratio (SNR) of the inter-node links, referred to as inter-node SNR, and that of the uplinks, which is referred to as uplink SNR. For a certain uplink SNR value, cooperative communication becomes useful when the inter-node SNR is above a certain threshold, the so-called cooperative SNR value, and vice versa. The cooperative SNR values corresponding to different uplink conditions have been derived from the simulation results for the UWB channel models CM1 and CM2 for illustration. Two important observations drawn from this paper are that, in some cases, cooperative communication for MB-OFDM UWB might be still beneficial even when the inter-node links are relatively noisy, and/or when the source nodes are located further apart from each other than from the destination node; and this benefit over a non-cooperative counterpart is more significant when the uplink channels are more dispersive.","PeriodicalId":356009,"journal":{"name":"2013 13th International Symposium on Communications and Information Technologies (ISCIT)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129154382","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A moving object tracking algorithm using support vector machines in binary sensor networks 二值传感器网络中基于支持向量机的运动目标跟踪算法
Dusadee Apicharttrisorn, Kittipat Apicharttrisorn, T. Kasetkasem
Wireless sensor technologies have enabled us to deploy such small sensors to monitor an area of interest. Object tracking is one of the most attractive applications to be implemented with wireless sensor networks (WSNs). However, many solutions are struggled with energy-draining global positioning system (GPS), poorly-performed trilateration for indoor usage, and impractical, complex algorithms to be implemented in sensor nodes. This paper proposes a moving object tracking algorithm using support vector machines (MOT-SVM). The MOT-SVM takes advantage of light-weighted directional binary sensor networks, and state-of-the-art signal processing algorithms, namely the support vector machines and particle filters. We compare our proposed algorithm with the Aslam's work [1] through the simulation. We examine our algorithms for various movement scenarios such as the linear, random and the “8”-model trajectories, and the scenarios in which observing sensors make observation errors.
无线传感器技术使我们能够部署这种小型传感器来监测感兴趣的区域。目标跟踪是无线传感器网络(WSNs)最具吸引力的应用之一。然而,许多解决方案都与消耗能量的全球定位系统(GPS)、室内使用性能差的三位一体以及在传感器节点中实现不切实际的复杂算法有关。提出了一种基于支持向量机(MOT-SVM)的运动目标跟踪算法。MOT-SVM利用了轻量级定向二元传感器网络和最先进的信号处理算法,即支持向量机和粒子滤波器。我们通过仿真将我们提出的算法与Aslam的工作[1]进行了比较。我们研究了各种运动场景的算法,如线性、随机和“8”模型轨迹,以及观察传感器产生观察误差的场景。
{"title":"A moving object tracking algorithm using support vector machines in binary sensor networks","authors":"Dusadee Apicharttrisorn, Kittipat Apicharttrisorn, T. Kasetkasem","doi":"10.1109/ISCIT.2013.6645915","DOIUrl":"https://doi.org/10.1109/ISCIT.2013.6645915","url":null,"abstract":"Wireless sensor technologies have enabled us to deploy such small sensors to monitor an area of interest. Object tracking is one of the most attractive applications to be implemented with wireless sensor networks (WSNs). However, many solutions are struggled with energy-draining global positioning system (GPS), poorly-performed trilateration for indoor usage, and impractical, complex algorithms to be implemented in sensor nodes. This paper proposes a moving object tracking algorithm using support vector machines (MOT-SVM). The MOT-SVM takes advantage of light-weighted directional binary sensor networks, and state-of-the-art signal processing algorithms, namely the support vector machines and particle filters. We compare our proposed algorithm with the Aslam's work [1] through the simulation. We examine our algorithms for various movement scenarios such as the linear, random and the “8”-model trajectories, and the scenarios in which observing sensors make observation errors.","PeriodicalId":356009,"journal":{"name":"2013 13th International Symposium on Communications and Information Technologies (ISCIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130343756","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Sufficient cloud service for steel logistic SME with limit effect to workforce 钢铁物流中小企业云服务充足,对劳动力影响有限
Soisala Phuttima, Worasak Rueangsirarak, R. Chaisricharoen
At the present time there are many business owners who are still managing their organizations as a manager with an old style management system. This paper seeks to explore the IT service innovation to upgrade a structural of the steel logistic business with minimum impact on work and production. In this study, the focus is on the exploration of a system service perspective using three purposes. Firstly, develop a detection system for fraudulent expenses monitoring in the steel logistic business to highlight the weak points of the organization's expenses or fraud. Secondly, discuss an efficient way to enhance and improve the overall productivity of the company using detection of fraudulent expenses in the steel logistic business without working impact. Thirdly, find out an efficient way to reduce workload (cash flow orientated) of the business owners and the way to attract them to adopt the usage of self-sufficient technology. Therefore, this paper proposes the framework of cloud computing service to detect and improve the weakness of the steel logistic SME business.
目前,有许多企业主仍然以经理的身份管理他们的组织,使用老式的管理系统。本文旨在探索在对工作和生产影响最小的情况下,通过IT服务创新实现钢铁物流企业的结构升级。在本研究中,重点是探索使用三个目的的系统服务视角。首先,开发钢铁物流业务欺诈费用监控检测系统,突出组织费用或欺诈的薄弱环节。其次,探讨了在不影响工作的情况下,利用钢材物流业务中的欺诈费用检测来提高和提高公司整体生产率的有效途径。第三,找到一种有效的方法来减少企业主的工作量(现金流导向),并吸引他们采用自给自足的技术。因此,本文提出了云计算服务框架来检测和改进钢铁物流中小企业业务的薄弱环节。
{"title":"Sufficient cloud service for steel logistic SME with limit effect to workforce","authors":"Soisala Phuttima, Worasak Rueangsirarak, R. Chaisricharoen","doi":"10.1109/ISCIT.2013.6645953","DOIUrl":"https://doi.org/10.1109/ISCIT.2013.6645953","url":null,"abstract":"At the present time there are many business owners who are still managing their organizations as a manager with an old style management system. This paper seeks to explore the IT service innovation to upgrade a structural of the steel logistic business with minimum impact on work and production. In this study, the focus is on the exploration of a system service perspective using three purposes. Firstly, develop a detection system for fraudulent expenses monitoring in the steel logistic business to highlight the weak points of the organization's expenses or fraud. Secondly, discuss an efficient way to enhance and improve the overall productivity of the company using detection of fraudulent expenses in the steel logistic business without working impact. Thirdly, find out an efficient way to reduce workload (cash flow orientated) of the business owners and the way to attract them to adopt the usage of self-sufficient technology. Therefore, this paper proposes the framework of cloud computing service to detect and improve the weakness of the steel logistic SME business.","PeriodicalId":356009,"journal":{"name":"2013 13th International Symposium on Communications and Information Technologies (ISCIT)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130407893","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Enhanced neighbor relation building algorithm for WCDMA and LTE Networks WCDMA和LTE网络的增强邻居关系构建算法
R. Wicaksono, Kwangrok Chang, William Chan, Yoshinori Nagahara, Seiji Kunishige
This paper provides an enhanced algorithm to design the neighbor cell list (NCL) in WCDMA and E-UTRAN. NCL design has been conventionally performed based on RF coverage data obtained from off-line coverage simulations tool, which requires expensive arrangement of tools and information to run. As a result, automatic and continual update of neighbor relation in the mobile network using SON (Self Optimization Network) takes high cost and complexity. The new algorithm proposed in this paper can build the reliable neighbor relations with must less efforts and information requirements like coverage simulation. The reliability of the algorithm was also verified using actual application to a live network.
本文提出了一种改进的WCDMA和E-UTRAN中邻居小区列表(NCL)的设计算法。传统的NCL设计是基于离线覆盖模拟工具获得的射频覆盖数据进行的,这需要昂贵的工具和信息来运行。因此,在使用SON (Self Optimization network,自优化网络)的移动网络中,邻居关系的自动持续更新成本和复杂度都很高。本文提出的新算法能够以较少的努力和较少的信息需求(如覆盖仿真)建立可靠的邻居关系。通过对实际网络的应用,验证了算法的可靠性。
{"title":"Enhanced neighbor relation building algorithm for WCDMA and LTE Networks","authors":"R. Wicaksono, Kwangrok Chang, William Chan, Yoshinori Nagahara, Seiji Kunishige","doi":"10.1109/ISCIT.2013.6645811","DOIUrl":"https://doi.org/10.1109/ISCIT.2013.6645811","url":null,"abstract":"This paper provides an enhanced algorithm to design the neighbor cell list (NCL) in WCDMA and E-UTRAN. NCL design has been conventionally performed based on RF coverage data obtained from off-line coverage simulations tool, which requires expensive arrangement of tools and information to run. As a result, automatic and continual update of neighbor relation in the mobile network using SON (Self Optimization Network) takes high cost and complexity. The new algorithm proposed in this paper can build the reliable neighbor relations with must less efforts and information requirements like coverage simulation. The reliability of the algorithm was also verified using actual application to a live network.","PeriodicalId":356009,"journal":{"name":"2013 13th International Symposium on Communications and Information Technologies (ISCIT)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130657859","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performance comparison of orthogonal and biorthogonal wavelets using technology libraries 利用技术库对正交和双正交小波进行性能比较
A. Safari, Yinan Kong
Wavelets are powerful tools that can be used in signal processing and data compression. They are an excellent alternative to Fourier transforms for applications with transient input signals. There is a large volume of published studies describing the use of wavelets in various fields. However, properties of each family for designs with technology libraries have never been investigated. The present work aims to study the most commonly used wavelets (orthogonal and biorthogonal) and compare the area, speed and power consumption of each family when the designs are synthesized using 150 nm standard cell TSMC library. The aim of this paper is to serve as a convenient reference for wavelet users and reviews.
小波是一种强大的工具,可用于信号处理和数据压缩。对于具有瞬态输入信号的应用,它们是傅里叶变换的一个很好的替代方案。有大量已发表的研究描述了小波在各个领域的应用。然而,技术库设计的每个家族的属性从未被研究过。本工作旨在研究最常用的小波(正交和双正交),并比较各系列设计在150 nm标准单元TSMC库中合成时的面积、速度和功耗。本文的目的是为小波用户和评论提供方便的参考。
{"title":"Performance comparison of orthogonal and biorthogonal wavelets using technology libraries","authors":"A. Safari, Yinan Kong","doi":"10.1109/ISCIT.2013.6645874","DOIUrl":"https://doi.org/10.1109/ISCIT.2013.6645874","url":null,"abstract":"Wavelets are powerful tools that can be used in signal processing and data compression. They are an excellent alternative to Fourier transforms for applications with transient input signals. There is a large volume of published studies describing the use of wavelets in various fields. However, properties of each family for designs with technology libraries have never been investigated. The present work aims to study the most commonly used wavelets (orthogonal and biorthogonal) and compare the area, speed and power consumption of each family when the designs are synthesized using 150 nm standard cell TSMC library. The aim of this paper is to serve as a convenient reference for wavelet users and reviews.","PeriodicalId":356009,"journal":{"name":"2013 13th International Symposium on Communications and Information Technologies (ISCIT)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121380522","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Performance evaluation of ETX metric on OLSR in heterogeneous networks 异构网络中OLSR的ETX度量性能评价
K. Kunavut
In mobile ad hoc networks, each node behaves like a router and is responsible to deliver data and control traffic to the other nodes by using specific routing protocol. However, nodes in these networks can arbitrarily move with various speeds and possibly cause the frequent link breaks. Furthermore, they are wireless nodes and inherently have limited bandwidth compared to the wired networks which usually results in the network congestion. These situations lead to more number of packet drop and ineffectiveness in data delivery. Hence, the specific ad hoc routing protocols are required to improve the quality of data transmission by selecting the high throughput path for forwarding traffic. This routing process can be achieved by using one or more effective routing metrics. Expected Transmission Count (ETX) is one of these metrics introduced to improve throughput in ad hoc networks by incorporating the link loss ratio. This loss can be possibly caused by buffer overflow in network congestion situation, link break in highly dynamic topology or unidirectional link in heterogeneous networks. In this work, various simulation scenarios are constructed to study the effect of ETX metric in load- and speed-varying conditions in heterogeneous networks.
在移动自组织网络中,每个节点的行为就像一个路由器,通过使用特定的路由协议负责向其他节点传递数据和控制流量。然而,这些网络中的节点可以任意地以不同的速度移动,并可能导致频繁的链路中断。此外,它们是无线节点,与有线网络相比,固有的带宽有限,这通常会导致网络拥塞。这些情况导致丢包数量增加,数据传输效率降低。因此,需要特定的ad hoc路由协议,通过选择转发流量的高吞吐量路径来提高数据传输质量。此路由过程可以通过使用一个或多个有效的路由度量来实现。期望传输计数(ETX)是通过结合链路损失率来提高自组织网络吞吐量的指标之一。这种损失可能是由于网络拥塞情况下的缓冲区溢出、高动态拓扑中的链路中断或异构网络中的单向链路造成的。在这项工作中,构建了各种模拟场景来研究异构网络中负载和速度变化条件下ETX度量的影响。
{"title":"Performance evaluation of ETX metric on OLSR in heterogeneous networks","authors":"K. Kunavut","doi":"10.1109/ISCIT.2013.6645815","DOIUrl":"https://doi.org/10.1109/ISCIT.2013.6645815","url":null,"abstract":"In mobile ad hoc networks, each node behaves like a router and is responsible to deliver data and control traffic to the other nodes by using specific routing protocol. However, nodes in these networks can arbitrarily move with various speeds and possibly cause the frequent link breaks. Furthermore, they are wireless nodes and inherently have limited bandwidth compared to the wired networks which usually results in the network congestion. These situations lead to more number of packet drop and ineffectiveness in data delivery. Hence, the specific ad hoc routing protocols are required to improve the quality of data transmission by selecting the high throughput path for forwarding traffic. This routing process can be achieved by using one or more effective routing metrics. Expected Transmission Count (ETX) is one of these metrics introduced to improve throughput in ad hoc networks by incorporating the link loss ratio. This loss can be possibly caused by buffer overflow in network congestion situation, link break in highly dynamic topology or unidirectional link in heterogeneous networks. In this work, various simulation scenarios are constructed to study the effect of ETX metric in load- and speed-varying conditions in heterogeneous networks.","PeriodicalId":356009,"journal":{"name":"2013 13th International Symposium on Communications and Information Technologies (ISCIT)","volume":"2 5","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114023887","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Deciles-based bilateral filtering 基于十分位数的双边滤波
Wachirapong Kesjindatanawaj, Sanun Srisuk
The histogram-based bilateral filtering was developed from bilateral filtering as the constant speed on any size of filtering window. It uses local image histogram to constant the filtering usage time. As it uses the histogram for filtering, the speed of filtering is depended on the number of histogram bins. To increase the filtering speed, the total number of bins must be lower. However, the quality of filtered image is dropped by the low number of bins. The new algorithm, deciles-based bilateral filtering is introduced as the filtering that uses only selected 12 value in histogram of filtering window. It requires less computational loops when compared with B loops of histogram bins in histogram-based filtering. The deciles-based algorithm is tested with many standard images. The output images were compared with normal bilateral filtering and they have PSNR around 42 dB which passes the acceptable threshold at more than 40 dB. To avoid O(B) complexity as histogram-based, the deciles-based algorithm use histogram extract that depend on the size of filtering window. The experimental show that for small to medium size of filtering window, the deciles-based has faster speed and better PSNR value than the histogram-based algorithm at 32 bins.
基于直方图的双边滤波是在任意大小的滤波窗口上以等速进行双边滤波的基础上发展起来的。它使用局部图像直方图来固定滤波的使用时间。由于它使用直方图进行过滤,因此过滤的速度取决于直方图bins的数量。为了提高过滤速度,必须降低桶的总数。但是,由于箱数过少,过滤后的图像质量下降。介绍了一种新的基于十分位数的双边滤波算法,该算法只使用滤波窗口直方图中选定的12个值进行滤波。与基于直方图的过滤中直方图bin的B循环相比,它需要更少的计算循环。在许多标准图像上对基于十分位数的算法进行了测试。输出图像与正常的双边滤波进行比较,它们的PSNR在42 dB左右,超过40 dB的可接受阈值。为了避免基于直方图的复杂度为0 (B),基于十分位数的算法使用依赖于过滤窗口大小的直方图提取。实验表明,对于中小尺寸的滤波窗口,在32个bin下,基于十分位数的算法比基于直方图的算法速度更快,PSNR值更好。
{"title":"Deciles-based bilateral filtering","authors":"Wachirapong Kesjindatanawaj, Sanun Srisuk","doi":"10.1109/ISCIT.2013.6645896","DOIUrl":"https://doi.org/10.1109/ISCIT.2013.6645896","url":null,"abstract":"The histogram-based bilateral filtering was developed from bilateral filtering as the constant speed on any size of filtering window. It uses local image histogram to constant the filtering usage time. As it uses the histogram for filtering, the speed of filtering is depended on the number of histogram bins. To increase the filtering speed, the total number of bins must be lower. However, the quality of filtered image is dropped by the low number of bins. The new algorithm, deciles-based bilateral filtering is introduced as the filtering that uses only selected 12 value in histogram of filtering window. It requires less computational loops when compared with B loops of histogram bins in histogram-based filtering. The deciles-based algorithm is tested with many standard images. The output images were compared with normal bilateral filtering and they have PSNR around 42 dB which passes the acceptable threshold at more than 40 dB. To avoid O(B) complexity as histogram-based, the deciles-based algorithm use histogram extract that depend on the size of filtering window. The experimental show that for small to medium size of filtering window, the deciles-based has faster speed and better PSNR value than the histogram-based algorithm at 32 bins.","PeriodicalId":356009,"journal":{"name":"2013 13th International Symposium on Communications and Information Technologies (ISCIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132354155","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Comparison of the spatial resolution with the histogram equalization-obligated linear function on structural pixel position scheme 结构像素位置方案空间分辨率与直方图均衡化约束线性函数的比较
B. Homnan, W. Benjapolakul
In the image's structural pixel position schemes, the controlled approaches have been proposed. This paper compares the histogram equalization-obligated linear function with the spatial resolution on the structural pixel position scheme. The results show that the obligated linear function of the histogram equalization can maintain the pixel retention with lower span and lower covariance, in addition, gives higher peak signal to noise ratio. On the other side, the spatial resolution can improve the pixel distribution with almost full span, but gives similar complexity.
在图像的结构像素位置方案中,提出了控制方法。本文比较了结构像素位置方案中直方图均衡化约束线性函数与空间分辨率。结果表明,直方图均衡化的义务线性函数可以保持较低跨度和较低协方差的像素保留,并具有较高的峰值信噪比。另一方面,空间分辨率可以在几乎全跨度的情况下改善像素分布,但复杂度相似。
{"title":"Comparison of the spatial resolution with the histogram equalization-obligated linear function on structural pixel position scheme","authors":"B. Homnan, W. Benjapolakul","doi":"10.1109/ISCIT.2013.6645908","DOIUrl":"https://doi.org/10.1109/ISCIT.2013.6645908","url":null,"abstract":"In the image's structural pixel position schemes, the controlled approaches have been proposed. This paper compares the histogram equalization-obligated linear function with the spatial resolution on the structural pixel position scheme. The results show that the obligated linear function of the histogram equalization can maintain the pixel retention with lower span and lower covariance, in addition, gives higher peak signal to noise ratio. On the other side, the spatial resolution can improve the pixel distribution with almost full span, but gives similar complexity.","PeriodicalId":356009,"journal":{"name":"2013 13th International Symposium on Communications and Information Technologies (ISCIT)","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134297815","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A virtual network embedding algorithm based on mapping tree 基于映射树的虚拟网络嵌入算法
G. Wang, Zhenmin Zhao, Zhaoming Lu, Yi Tong, X. Wen
Network virtualization enables the co-existence of multiple virtual networks (VNs) on the same substrate network (SN) by sharing the available resources. Virtual network embedding (VNE) plays an important role in building virtual networks. In this paper, we propose a new virtual network mapping algorithm based on a mapping tree on nodes mapping phase. Mapping tree, converted from the virtual network, is a simplified topology of virtual network, which is used to describe the hierarchical relationships among the virtual nodes. In our algorithm, different virtual nodes in a mapping tree which are directly connected by virtual links should be mapped to the same substrate node as long as the node's available resources can satisfy the total resource requirements of these virtual nodes. In link mapping phase, we use the k-shortest paths method. Simulation results show that the proposed scheme has a good performance in the acceptance ratio of virtual network requests, and the average revenue of substrate network.
网络虚拟化通过共享可用资源,使多个虚拟网络(VNs)在同一个基板网络(SN)上共存。虚拟网络嵌入(VNE)在构建虚拟网络中起着重要的作用。本文提出了一种基于节点映射阶段映射树的虚拟网络映射算法。映射树是由虚拟网络转换而来的一种简化的虚拟网络拓扑结构,用来描述虚拟节点之间的层次关系。在我们的算法中,映射树中通过虚拟链路直接连接的不同虚拟节点,只要该节点的可用资源能够满足这些虚拟节点的总资源需求,就应该映射到同一个底层节点上。在链路映射阶段,我们使用k最短路径方法。仿真结果表明,该方案在虚拟网络请求接受率和基板网络平均收益方面具有良好的性能。
{"title":"A virtual network embedding algorithm based on mapping tree","authors":"G. Wang, Zhenmin Zhao, Zhaoming Lu, Yi Tong, X. Wen","doi":"10.1109/ISCIT.2013.6645857","DOIUrl":"https://doi.org/10.1109/ISCIT.2013.6645857","url":null,"abstract":"Network virtualization enables the co-existence of multiple virtual networks (VNs) on the same substrate network (SN) by sharing the available resources. Virtual network embedding (VNE) plays an important role in building virtual networks. In this paper, we propose a new virtual network mapping algorithm based on a mapping tree on nodes mapping phase. Mapping tree, converted from the virtual network, is a simplified topology of virtual network, which is used to describe the hierarchical relationships among the virtual nodes. In our algorithm, different virtual nodes in a mapping tree which are directly connected by virtual links should be mapped to the same substrate node as long as the node's available resources can satisfy the total resource requirements of these virtual nodes. In link mapping phase, we use the k-shortest paths method. Simulation results show that the proposed scheme has a good performance in the acceptance ratio of virtual network requests, and the average revenue of substrate network.","PeriodicalId":356009,"journal":{"name":"2013 13th International Symposium on Communications and Information Technologies (ISCIT)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134341371","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
期刊
2013 13th International Symposium on Communications and Information Technologies (ISCIT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1