首页 > 最新文献

2005 IEEE International Conference on Electro Information Technology最新文献

英文 中文
Imposed constraints on the Smith-Waterman alignment algorithm for enhanced modeling of a single-molecule DNA sequencer 为增强单分子DNA测序仪的建模,对史密斯-沃特曼比对算法施加了约束
Pub Date : 2005-05-22 DOI: 10.1109/EIT.2005.1627002
P. G. Humphrey, G. Bashford
An effort has been underway to develop a system for de novo sequencing of single DNA molecules with very long reads. The system operates by optically detecting the passage of fluorescently tagged DNA bases through a detection zone. A successful system would be revolutionary with respect to speed, read length, cost and minimized laboratory infrastructure. An important part of system development is modeling of the detection process. In particular, predicting the expected error from a set of sequencing parameters is helpful in system design. This paper describes variations on the Smith-Waterman algorithm for subsequence alignment used in a single-molecule detection model. The alignment algorithm is used to check the modeled output sequence generated from a known input sequence. Variations based on reasonable assumptions led to over an order of magnitude improvement in alignment speed
人们正在努力开发一种系统,用于对具有很长读数的单个DNA分子进行从头测序。该系统通过光学检测荧光标记的DNA碱基通过检测区。一个成功的系统在速度、读取长度、成本和最小化实验室基础设施方面将是革命性的。系统开发的一个重要部分是检测过程的建模。特别是,从一组排序参数中预测期望误差对系统设计很有帮助。本文描述了在单分子检测模型中用于子序列比对的史密斯-沃特曼算法的变化。对齐算法用于检查由已知输入序列生成的建模输出序列。基于合理假设的变化导致对准速度超过一个数量级的提高
{"title":"Imposed constraints on the Smith-Waterman alignment algorithm for enhanced modeling of a single-molecule DNA sequencer","authors":"P. G. Humphrey, G. Bashford","doi":"10.1109/EIT.2005.1627002","DOIUrl":"https://doi.org/10.1109/EIT.2005.1627002","url":null,"abstract":"An effort has been underway to develop a system for de novo sequencing of single DNA molecules with very long reads. The system operates by optically detecting the passage of fluorescently tagged DNA bases through a detection zone. A successful system would be revolutionary with respect to speed, read length, cost and minimized laboratory infrastructure. An important part of system development is modeling of the detection process. In particular, predicting the expected error from a set of sequencing parameters is helpful in system design. This paper describes variations on the Smith-Waterman algorithm for subsequence alignment used in a single-molecule detection model. The alignment algorithm is used to check the modeled output sequence generated from a known input sequence. Variations based on reasonable assumptions led to over an order of magnitude improvement in alignment speed","PeriodicalId":358002,"journal":{"name":"2005 IEEE International Conference on Electro Information Technology","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124402929","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Two approaches to improve Java MIDP record management system in wireless devices 改进无线设备中Java MIDP记录管理系统的两种方法
Pub Date : 2005-05-22 DOI: 10.1109/EIT.2005.1627036
H. Kimm, S. Shin, Charlie Y. Shim
In this paper, we propose two approaches to improve current Java mobile information device profile (MIDP) record management system (RMS) in wireless devices and compare the approaches with current MIDP RMS. These approaches promote the efficient use of Java MIDP RMS in wireless devices such that a faster record retrieval using a smaller memory is achieved, which makes the device consume less battery power. The comparable program segments, which show how to use Java MIDP RMS with or without record-enumeration interface efficiently, are presented and analyzed. The first approach in the paper proposes to use a circular linked list in RMS RecordEnumeration interface. This requires less storage to represent a recordID as a node in the circular linked list than the current RecordEnumeration interface that uses a doubly linked list. The second approach supports the faster access of record traversal, which shows O(log n) time to retrieve any record in MIDP RMS file, while the record retrieval in the current Java MIDP RMS takes O(n) time. In addition, the second approach uses less RMS storage than the method using RecordEnumeration interface does
本文提出了两种改进无线设备中现有Java移动信息设备档案(MIDP)记录管理系统(RMS)的方法,并与现有MIDP档案管理系统进行了比较。这些方法促进了在无线设备中有效地使用Java MIDP RMS,这样可以使用更小的内存实现更快的记录检索,从而使设备消耗更少的电池电量。给出并分析了可比较的程序段,这些程序段展示了如何有效地使用带有或不带有记录枚举接口的Java MIDP RMS。本文中的第一种方法建议在RMS recordeneration接口中使用循环链表。与当前使用双重链表的recordeneration接口相比,将recordID表示为循环链表中的节点需要更少的存储空间。第二种方法支持更快的记录遍历访问,检索MIDP RMS文件中的任何记录需要O(log n)时间,而当前Java MIDP RMS中的记录检索需要O(n)时间。此外,第二种方法比使用RecordEnumeration接口的方法使用更少的RMS存储
{"title":"Two approaches to improve Java MIDP record management system in wireless devices","authors":"H. Kimm, S. Shin, Charlie Y. Shim","doi":"10.1109/EIT.2005.1627036","DOIUrl":"https://doi.org/10.1109/EIT.2005.1627036","url":null,"abstract":"In this paper, we propose two approaches to improve current Java mobile information device profile (MIDP) record management system (RMS) in wireless devices and compare the approaches with current MIDP RMS. These approaches promote the efficient use of Java MIDP RMS in wireless devices such that a faster record retrieval using a smaller memory is achieved, which makes the device consume less battery power. The comparable program segments, which show how to use Java MIDP RMS with or without record-enumeration interface efficiently, are presented and analyzed. The first approach in the paper proposes to use a circular linked list in RMS RecordEnumeration interface. This requires less storage to represent a recordID as a node in the circular linked list than the current RecordEnumeration interface that uses a doubly linked list. The second approach supports the faster access of record traversal, which shows O(log n) time to retrieve any record in MIDP RMS file, while the record retrieval in the current Java MIDP RMS takes O(n) time. In addition, the second approach uses less RMS storage than the method using RecordEnumeration interface does","PeriodicalId":358002,"journal":{"name":"2005 IEEE International Conference on Electro Information Technology","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125249329","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Optimize defect detection techniques through empirical software engineering method 通过经验软件工程方法优化缺陷检测技术
Pub Date : 2005-05-22 DOI: 10.1109/EIT.2005.1627056
H. T. Sun
This paper introduces twelve defect detection techniques and describes a non-controlled experiment related to defect detection techniques to address the uncertainty of how to test an embedded software and find defects effectively. In this non-controlled experiment, three common testing techniques were applied to a large scale embedded system. This study is intended to evaluate different defect detection techniques that are actually used by software engineers using empirical software engineering method. The objective of empirical software engineering is to improve the software development processes and quality. This could be done by evaluating, comparing and controlling defect detection methods. This study is also intended to find a best method to reduce defects and increase the defect detection rate in a large scale embedded system, since defect detection is considered as one of the most costly development process in software development cycle
本文介绍了12种缺陷检测技术,并描述了一个与缺陷检测技术相关的非控制实验,以解决如何有效地测试嵌入式软件并发现缺陷的不确定性。在这个非对照实验中,三种常用的测试技术应用于一个大型嵌入式系统。本研究旨在评估软件工程师使用经验软件工程方法实际使用的不同缺陷检测技术。经验软件工程的目标是改进软件开发过程和质量。这可以通过评估、比较和控制缺陷检测方法来实现。在大规模嵌入式系统中,缺陷检测被认为是软件开发周期中成本最高的开发过程之一,因此本研究旨在寻找一种减少缺陷和提高缺陷检出率的最佳方法
{"title":"Optimize defect detection techniques through empirical software engineering method","authors":"H. T. Sun","doi":"10.1109/EIT.2005.1627056","DOIUrl":"https://doi.org/10.1109/EIT.2005.1627056","url":null,"abstract":"This paper introduces twelve defect detection techniques and describes a non-controlled experiment related to defect detection techniques to address the uncertainty of how to test an embedded software and find defects effectively. In this non-controlled experiment, three common testing techniques were applied to a large scale embedded system. This study is intended to evaluate different defect detection techniques that are actually used by software engineers using empirical software engineering method. The objective of empirical software engineering is to improve the software development processes and quality. This could be done by evaluating, comparing and controlling defect detection methods. This study is also intended to find a best method to reduce defects and increase the defect detection rate in a large scale embedded system, since defect detection is considered as one of the most costly development process in software development cycle","PeriodicalId":358002,"journal":{"name":"2005 IEEE International Conference on Electro Information Technology","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114940921","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A mobility based link layer approach for mobile wireless sensor networks 移动无线传感器网络中基于可移动性的链路层方法
Pub Date : 2005-05-22 DOI: 10.1109/EIT.2005.1626974
P. Raviraj, H. Sharif, M. Hempel, S. Ci, H. Ali, Jong-Hoon Youn
Several MAC protocols have been proposed for wireless sensor networks (WSNs). These include T-MAC, D-MAC and the more commonly utilized SMAC. In this paper, we propose a new MAC layer approach to support mobility in WSNs. The proposed technique utilizes an adaptive frame size approach to overcome the effect of frame losses caused by the Doppler shifts under mobile scenarios. An extended Kalman filter is used to predict the frame size for each transmission, which also directly enhances the energy efficiency of the system. Our results show that based on the adaptive frame size predictor and its comparison with the SMAC protocol, the proposed technique can improve overall system performance and deliver enhanced energy efficiency of 24% under mobility. The current implementation of ns-2 does not take into consideration the packet error rate. As another contribution of our work, we have developed a physical layer model for ns-2, which processes the received frame based not only on the fading characteristics of the signal but also the SNR and relative velocity between the nodes. To characterize a more accurate wireless sensor networks' physical layer, we have modeled the Mica-2 sensors in MATLAB and implemented the model in ns-2 for simulations
针对无线传感器网络(wsn),已经提出了几种MAC协议。这些包括麦迪,麦迪和更常用的SMAC。本文提出了一种新的MAC层方法来支持无线传感器网络的移动性。该技术利用自适应帧长方法克服了移动场景下多普勒频移引起的帧丢失的影响。采用扩展的卡尔曼滤波来预测每次传输的帧大小,这也直接提高了系统的能量效率。我们的研究结果表明,基于自适应帧大小预测器及其与SMAC协议的比较,所提出的技术可以提高系统的整体性能,并在移动性下提高24%的能源效率。目前的ns-2实现没有考虑包错误率。作为我们工作的另一个贡献,我们开发了ns-2的物理层模型,该模型不仅基于信号的衰落特性,而且基于信噪比和节点之间的相对速度来处理接收到的帧。为了更准确地描述无线传感器网络的物理层,我们在MATLAB中对Mica-2传感器进行了建模,并在ns-2中实现了该模型进行仿真
{"title":"A mobility based link layer approach for mobile wireless sensor networks","authors":"P. Raviraj, H. Sharif, M. Hempel, S. Ci, H. Ali, Jong-Hoon Youn","doi":"10.1109/EIT.2005.1626974","DOIUrl":"https://doi.org/10.1109/EIT.2005.1626974","url":null,"abstract":"Several MAC protocols have been proposed for wireless sensor networks (WSNs). These include T-MAC, D-MAC and the more commonly utilized SMAC. In this paper, we propose a new MAC layer approach to support mobility in WSNs. The proposed technique utilizes an adaptive frame size approach to overcome the effect of frame losses caused by the Doppler shifts under mobile scenarios. An extended Kalman filter is used to predict the frame size for each transmission, which also directly enhances the energy efficiency of the system. Our results show that based on the adaptive frame size predictor and its comparison with the SMAC protocol, the proposed technique can improve overall system performance and deliver enhanced energy efficiency of 24% under mobility. The current implementation of ns-2 does not take into consideration the packet error rate. As another contribution of our work, we have developed a physical layer model for ns-2, which processes the received frame based not only on the fading characteristics of the signal but also the SNR and relative velocity between the nodes. To characterize a more accurate wireless sensor networks' physical layer, we have modeled the Mica-2 sensors in MATLAB and implemented the model in ns-2 for simulations","PeriodicalId":358002,"journal":{"name":"2005 IEEE International Conference on Electro Information Technology","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122360108","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Frequency Domain Real Time Digital Image Watermarking 频域实时数字图像水印
Pub Date : 2005-05-22 DOI: 10.1109/EIT.2005.1627003
Ravi Shah, Abhinav Agarwal, Subramaniam Ganesan
The present paper puts forward real time implementation of an algorithm for Watermarking and the results obtained using a Frequency domain approach.. The paper emphasizes an Adaptive Frequency domain watermarking approach in real time, demonstrating robustness against intentional or unintentional attacks on the watermarked image. This is achieved by modifying the middle frequency coefficients. Since the image is analyzed and modified in the frequency domain the changes made are difficult to perceive. The algorithm steps and special consideration regarding the real-time implementation on TI’s TMS320C6711 DSP are presented. Applications of watermarking process in real time are also described.
本文提出了一种实时实现的水印算法,并利用频域方法得到了结果。本文强调了一种实时自适应频域水印方法,证明了对水印图像有意或无意攻击的鲁棒性。这是通过修改中频系数来实现的。由于图像是在频域中分析和修改的,因此所做的变化很难感知。给出了算法步骤和在TI TMS320C6711 DSP上实时实现的注意事项。介绍了实时水印处理的应用。
{"title":"Frequency Domain Real Time Digital Image Watermarking","authors":"Ravi Shah, Abhinav Agarwal, Subramaniam Ganesan","doi":"10.1109/EIT.2005.1627003","DOIUrl":"https://doi.org/10.1109/EIT.2005.1627003","url":null,"abstract":"The present paper puts forward real time implementation of an algorithm for Watermarking and the results obtained using a Frequency domain approach.. The paper emphasizes an Adaptive Frequency domain watermarking approach in real time, demonstrating robustness against intentional or unintentional attacks on the watermarked image. This is achieved by modifying the middle frequency coefficients. Since the image is analyzed and modified in the frequency domain the changes made are difficult to perceive. The algorithm steps and special consideration regarding the real-time implementation on TI’s TMS320C6711 DSP are presented. Applications of watermarking process in real time are also described.","PeriodicalId":358002,"journal":{"name":"2005 IEEE International Conference on Electro Information Technology","volume":"179 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116604344","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Neural Network Based Approach for Tuning Kalman Filter 基于神经网络的卡尔曼滤波器调谐方法
Pub Date : 2005-05-22 DOI: 10.1109/EIT.2005.1626991
O. Korniyenko, M. Sharawi, D. Aloi
Kalman filter (KF) parameter tuning has been dealt with in a limited fashion and usually was left to engineering intuition due to unavailable measurements of process noise and high dimensionality of the problem. In this paper we present a simple Neural Network (NN) based approach to KF tuning problem. Since the approach trades number of KF runs required for the optimal filter tuning for KF performance, the result of the such tuning is the set of tuning parameters that gives suboptimal performance. Advantages of this approach are: 1) simple practical framework for optimal filter performance tuning, 2) the framework is independent of the type of a filter and 3) low number of filter runs required to obtain quasi optimal parameter set. The main disadvantage is the suboptimal filter performance that can be easily improved by increasing the number of filter runs. Two NN architectures were investigated, generalized regression neural network (GRNN) and regular radial basis networks (RBNN). RBNN showed much better performance for a given non-linear test function with a clear maximum peak. Performance measures along with computational efficiency for these methods were compared. A step-by-step tuning procedure is presented.
卡尔曼滤波(KF)参数整定的处理方式有限,由于无法测量过程噪声和问题的高维性,通常留给工程直觉。在本文中,我们提出了一种简单的基于神经网络的方法来解决KF调谐问题。由于该方法交换了KF性能的最优过滤器调优所需的KF运行数,因此这种调优的结果是一组调优参数,它提供了次优性能。该方法的优点是:1)用于最优滤波器性能调优的实用框架简单;2)该框架与滤波器类型无关;3)获得准最优参数集所需的滤波器运行次数少。主要的缺点是次优的过滤器性能,可以很容易地通过增加过滤器运行次数来改进。研究了广义回归神经网络(GRNN)和正则径向基神经网络(RBNN)两种神经网络结构。对于给定的非线性测试函数,RBNN具有明显的峰值,表现出更好的性能。比较了这些方法的性能指标和计算效率。给出了一个逐步的调优过程。
{"title":"Neural Network Based Approach for Tuning Kalman Filter","authors":"O. Korniyenko, M. Sharawi, D. Aloi","doi":"10.1109/EIT.2005.1626991","DOIUrl":"https://doi.org/10.1109/EIT.2005.1626991","url":null,"abstract":"Kalman filter (KF) parameter tuning has been dealt with in a limited fashion and usually was left to engineering intuition due to unavailable measurements of process noise and high dimensionality of the problem. In this paper we present a simple Neural Network (NN) based approach to KF tuning problem. Since the approach trades number of KF runs required for the optimal filter tuning for KF performance, the result of the such tuning is the set of tuning parameters that gives suboptimal performance. Advantages of this approach are: 1) simple practical framework for optimal filter performance tuning, 2) the framework is independent of the type of a filter and 3) low number of filter runs required to obtain quasi optimal parameter set. The main disadvantage is the suboptimal filter performance that can be easily improved by increasing the number of filter runs. Two NN architectures were investigated, generalized regression neural network (GRNN) and regular radial basis networks (RBNN). RBNN showed much better performance for a given non-linear test function with a clear maximum peak. Performance measures along with computational efficiency for these methods were compared. A step-by-step tuning procedure is presented.","PeriodicalId":358002,"journal":{"name":"2005 IEEE International Conference on Electro Information Technology","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128797408","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 47
Modeling of the biliary tree structure in MRCP images MRCP图像中胆道树状结构的建模
Pub Date : 2005-05-22 DOI: 10.1109/EIT.2005.1627008
R. Logeswaran, C. Eswaran
Magnetic resonance cholangio pancreatography (MRCP) has become a favorite imaging technique for diagnosis of liver diseases, especially those associated with the biliary track. In a typical MRCP examination, a large series of image acquisitions are taken, ranging from the positioning series, to the re-projected image sets of Tl- and T2-weighted image series. This paper describes several modeling techniques in 2D and 3D which may aid in highlighting features in the MRCP images, as well as promote some possible compression gains through replacement of certain raw images with the prescribed models
磁共振胰胆管造影(MRCP)已成为肝脏疾病,特别是与胆道相关疾病诊断的首选影像学技术。在典型的MRCP检查中,需要大量的图像采集,从定位序列到Tl和t2加权图像序列的重新投影图像集。本文描述了几种2D和3D建模技术,这些技术可以帮助突出MRCP图像中的特征,并通过用规定的模型替换某些原始图像来促进一些可能的压缩增益
{"title":"Modeling of the biliary tree structure in MRCP images","authors":"R. Logeswaran, C. Eswaran","doi":"10.1109/EIT.2005.1627008","DOIUrl":"https://doi.org/10.1109/EIT.2005.1627008","url":null,"abstract":"Magnetic resonance cholangio pancreatography (MRCP) has become a favorite imaging technique for diagnosis of liver diseases, especially those associated with the biliary track. In a typical MRCP examination, a large series of image acquisitions are taken, ranging from the positioning series, to the re-projected image sets of Tl- and T2-weighted image series. This paper describes several modeling techniques in 2D and 3D which may aid in highlighting features in the MRCP images, as well as promote some possible compression gains through replacement of certain raw images with the prescribed models","PeriodicalId":358002,"journal":{"name":"2005 IEEE International Conference on Electro Information Technology","volume":"93 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131761053","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Scalable resource allocation of dynamic multiple-services for next generation wireless networks 下一代无线网络动态多业务的可扩展资源分配
Pub Date : 2005-05-22 DOI: 10.1109/EIT.2005.1626963
Seok-Yee Tang, S. Thilakawarda, R. Tafazolli, Y. Qian
In this paper, the concept of scalable resource allocation (ScRA) technique is introduced and the ScRA technique efficiency is investigated in a diverse and dynamic traffic scenario. Detailed performance analysis of the ScRA through simulations is also presented in this paper. Most importantly, our simulation results indicate that significant radio resource utilization gain can be achieved with the use of ScRA scheme over the conventional static resource allocation (StRA) technique. This superior performance is credited to its flexible and adaptive radio channel allocation (or re-allocation) between the multiple-services at each sampled time
本文引入了可扩展资源分配(ScRA)技术的概念,并研究了可扩展资源分配技术在多种动态交通场景下的效率。本文还通过仿真对ScRA进行了详细的性能分析。最重要的是,我们的仿真结果表明,与传统的静态资源分配(StRA)技术相比,使用ScRA方案可以获得显着的无线电资源利用增益。这种优越的性能归功于它在每个采样时间在多个服务之间灵活和自适应的无线电信道分配(或重新分配)
{"title":"Scalable resource allocation of dynamic multiple-services for next generation wireless networks","authors":"Seok-Yee Tang, S. Thilakawarda, R. Tafazolli, Y. Qian","doi":"10.1109/EIT.2005.1626963","DOIUrl":"https://doi.org/10.1109/EIT.2005.1626963","url":null,"abstract":"In this paper, the concept of scalable resource allocation (ScRA) technique is introduced and the ScRA technique efficiency is investigated in a diverse and dynamic traffic scenario. Detailed performance analysis of the ScRA through simulations is also presented in this paper. Most importantly, our simulation results indicate that significant radio resource utilization gain can be achieved with the use of ScRA scheme over the conventional static resource allocation (StRA) technique. This superior performance is credited to its flexible and adaptive radio channel allocation (or re-allocation) between the multiple-services at each sampled time","PeriodicalId":358002,"journal":{"name":"2005 IEEE International Conference on Electro Information Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131158953","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Theft-induced checkpointing for reconfigurable dataflow applications 可重构数据流应用程序的盗窃诱发检查点
Pub Date : 2005-05-22 DOI: 10.1109/EIT.2005.1626998
S. Jafar, A. Krings, T. Gautier, Jean-Louis Roch
In this paper a new checkpoint/recovery protocol called theft-induced checkpointing is defined for dataflow computations in large heterogeneous environments. The protocol is especially useful in massively parallel multi-threaded computations as found in cluster or grid computing and utilizes the principle of work-stealing to distribute work. By basing the state of executions on a macro dataflow graph, the protocol shows extreme flexibility with respect to rollback. Specifically, it allows local rollback in dynamic heterogeneous systems, even under a different number of processors and processes. To maximize run-time efficiency, the overhead associated with checkpointing is shifted to the rollback operations whenever possible. Experimental results show the overhead induced is very small
本文针对大型异构环境下的数据流计算,定义了一种新的检查点/恢复协议——盗窃诱发检查点。该协议在集群或网格计算中发现的大规模并行多线程计算中特别有用,并利用工作窃取原理来分配工作。通过基于宏数据流图的执行状态,该协议在回滚方面显示出极大的灵活性。具体来说,它允许在动态异构系统中进行本地回滚,即使在不同数量的处理器和进程下也是如此。为了最大化运行时效率,与检查点相关的开销尽可能地转移到回滚操作上。实验结果表明,产生的开销很小
{"title":"Theft-induced checkpointing for reconfigurable dataflow applications","authors":"S. Jafar, A. Krings, T. Gautier, Jean-Louis Roch","doi":"10.1109/EIT.2005.1626998","DOIUrl":"https://doi.org/10.1109/EIT.2005.1626998","url":null,"abstract":"In this paper a new checkpoint/recovery protocol called theft-induced checkpointing is defined for dataflow computations in large heterogeneous environments. The protocol is especially useful in massively parallel multi-threaded computations as found in cluster or grid computing and utilizes the principle of work-stealing to distribute work. By basing the state of executions on a macro dataflow graph, the protocol shows extreme flexibility with respect to rollback. Specifically, it allows local rollback in dynamic heterogeneous systems, even under a different number of processors and processes. To maximize run-time efficiency, the overhead associated with checkpointing is shifted to the rollback operations whenever possible. Experimental results show the overhead induced is very small","PeriodicalId":358002,"journal":{"name":"2005 IEEE International Conference on Electro Information Technology","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114844801","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Wireless SAW sensors reader: architecture and design 无线SAW传感器读取器:架构与设计
Pub Date : 2005-05-22 DOI: 10.1109/EIT.2005.1626992
S. Krishnamurthy, B. Bazuin, M. Atashbar
This paper describes a prototype burst transceiver operating in the industrial, scientific and medical band that can be used to power, interrogate and receive response from a wireless passive surface acoustic wave sensor. While the transceiver architecture for this system has been previously described, this paper focuses on the prototype construction and component and system level performance testing. Key performance factors for the transceiver include the isolation provided by various radio frequency (RF) switches, the appropriate switch timing, and the digitization and collection of burst response signals for further processing. The isolation provided by RF switches generates the signal burst, switches the transceiver from the transmission to receiving mode, and provide receiver isolation from the transmission signal and path. The measurements taken in testing the transmitter and receiver sections are presented. In addition, the frequency spectrum of the in-phase and quadrature signals obtained after digitization and data collection is shown and briefly described
本文描述了一种工作在工业、科学和医疗波段的突发收发器原型,可用于无线无源表面声波传感器的供电、询问和接收响应。虽然该系统的收发器架构之前已经描述过,但本文的重点是原型构建以及组件和系统级性能测试。收发器的关键性能因素包括各种射频(RF)开关提供的隔离,适当的开关定时,以及用于进一步处理的突发响应信号的数字化和收集。射频开关提供的隔离产生信号突发,将收发器从传输模式切换到接收模式,并提供接收器与传输信号和路径的隔离。介绍了在测试发射机和接收机部分时所采取的测量方法。此外,给出了经数字化和数据采集后得到的同相信号和正交信号的频谱,并对其进行了简要描述
{"title":"Wireless SAW sensors reader: architecture and design","authors":"S. Krishnamurthy, B. Bazuin, M. Atashbar","doi":"10.1109/EIT.2005.1626992","DOIUrl":"https://doi.org/10.1109/EIT.2005.1626992","url":null,"abstract":"This paper describes a prototype burst transceiver operating in the industrial, scientific and medical band that can be used to power, interrogate and receive response from a wireless passive surface acoustic wave sensor. While the transceiver architecture for this system has been previously described, this paper focuses on the prototype construction and component and system level performance testing. Key performance factors for the transceiver include the isolation provided by various radio frequency (RF) switches, the appropriate switch timing, and the digitization and collection of burst response signals for further processing. The isolation provided by RF switches generates the signal burst, switches the transceiver from the transmission to receiving mode, and provide receiver isolation from the transmission signal and path. The measurements taken in testing the transmitter and receiver sections are presented. In addition, the frequency spectrum of the in-phase and quadrature signals obtained after digitization and data collection is shown and briefly described","PeriodicalId":358002,"journal":{"name":"2005 IEEE International Conference on Electro Information Technology","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128613765","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
期刊
2005 IEEE International Conference on Electro Information Technology
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1