首页 > 最新文献

2017 International Symposium on Wireless Systems and Networks (ISWSN)最新文献

英文 中文
Radio resource management: The vital subject for evolution to 5G 无线电资源管理:向5G演进的重要课题
Pub Date : 2017-11-01 DOI: 10.1109/ISWSN.2017.8250043
A. Ali, M. Nazir
In this article, we will discuss radio resource management (RRM) as one of the major techniques for 5G networks. RRM involves sharing of the scarce spectrum among all users of the system. It includes performance gains in terms of efficient energy usage, higher throughput, lower delays, and decreased packet loss. We can take full advantage from RRM by efficient design strategies, fair resource allocation and competent packet scheduling. The goal of this paper is to present a comprehensive overview along with algorithms for RRM techniques that majorly focus on 1) efficient power utilization, 2) delay reduction and 3) throughput maximization. In this paper we will discuss various potential techniques for efficient resource planning in terms of power, throughput and delay. Some findings are also discussed to illuminate the shift towards the next generation networks.
在本文中,我们将讨论无线资源管理(RRM)作为5G网络的主要技术之一。RRM涉及在系统的所有用户之间共享稀缺频谱。它包括在有效的能源使用、更高的吞吐量、更低的延迟和更少的数据包丢失方面的性能提升。我们可以通过有效的设计策略、公平的资源分配和合理的分组调度来充分利用RRM。本文的目标是提供一个全面的概述,以及RRM技术的算法,主要集中在1)有效的功率利用,2)延迟减少和3)吞吐量最大化。在本文中,我们将讨论在功率、吞吐量和延迟方面进行有效资源规划的各种潜在技术。本文还讨论了一些研究结果,以阐明向下一代网络的转变。
{"title":"Radio resource management: The vital subject for evolution to 5G","authors":"A. Ali, M. Nazir","doi":"10.1109/ISWSN.2017.8250043","DOIUrl":"https://doi.org/10.1109/ISWSN.2017.8250043","url":null,"abstract":"In this article, we will discuss radio resource management (RRM) as one of the major techniques for 5G networks. RRM involves sharing of the scarce spectrum among all users of the system. It includes performance gains in terms of efficient energy usage, higher throughput, lower delays, and decreased packet loss. We can take full advantage from RRM by efficient design strategies, fair resource allocation and competent packet scheduling. The goal of this paper is to present a comprehensive overview along with algorithms for RRM techniques that majorly focus on 1) efficient power utilization, 2) delay reduction and 3) throughput maximization. In this paper we will discuss various potential techniques for efficient resource planning in terms of power, throughput and delay. Some findings are also discussed to illuminate the shift towards the next generation networks.","PeriodicalId":390044,"journal":{"name":"2017 International Symposium on Wireless Systems and Networks (ISWSN)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128582554","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Design of multifunctional autonomous car using ultrasonic and infrared sensors 利用超声波和红外传感器的多功能自动驾驶汽车的设计
Pub Date : 2017-11-01 DOI: 10.1109/ISWSN.2017.8250023
A. Iqbal, Syed Shaheryar Ahmed, M. Tauqeer, Ali Sultan, S. G. Abbas
The daily routine problems that common man faces on roads while commuting are becoming a serious problem with each passing day. People get late and meet accidents. The model of autonomous car presented in this research paper aims to solve these issues by taking humans off the wheels, so that they do not have to drive anymore and the risk of accidents, getting late and traffic congestions can be reduced to a minimum. This car is able to follow the track, overtake other cars, detect obstacles, take sharp bends and turns, follow traffic signals and turn on its lights under low light conditions. Circuit diagrams for performing all these functions have been presented and the mechanical model of the car has also been shown in the paper, which is practically implemented and successfully run by the authors.
普通人在上下班路上遇到的日常问题正日益成为一个严重的问题。人们迟到,遇到事故。本文提出的自动驾驶汽车模型旨在解决这些问题,将人类从车轮上解放出来,使人类不再需要开车,将事故、迟到和交通拥堵的风险降至最低。这辆车能够跟随轨道,超车,探测障碍物,急转弯,跟随交通信号,并在弱光条件下打开灯。文中给出了实现这些功能的电路图,并给出了小车的力学模型,该模型已实际实现并成功运行。
{"title":"Design of multifunctional autonomous car using ultrasonic and infrared sensors","authors":"A. Iqbal, Syed Shaheryar Ahmed, M. Tauqeer, Ali Sultan, S. G. Abbas","doi":"10.1109/ISWSN.2017.8250023","DOIUrl":"https://doi.org/10.1109/ISWSN.2017.8250023","url":null,"abstract":"The daily routine problems that common man faces on roads while commuting are becoming a serious problem with each passing day. People get late and meet accidents. The model of autonomous car presented in this research paper aims to solve these issues by taking humans off the wheels, so that they do not have to drive anymore and the risk of accidents, getting late and traffic congestions can be reduced to a minimum. This car is able to follow the track, overtake other cars, detect obstacles, take sharp bends and turns, follow traffic signals and turn on its lights under low light conditions. Circuit diagrams for performing all these functions have been presented and the mechanical model of the car has also been shown in the paper, which is practically implemented and successfully run by the authors.","PeriodicalId":390044,"journal":{"name":"2017 International Symposium on Wireless Systems and Networks (ISWSN)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126357706","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Requirement based transform coefficient coding architecture for DCT/DST for HEVC 基于需求的HEVC DCT/DST变换系数编码体系
Pub Date : 2017-11-01 DOI: 10.1109/ISWSN.2017.8250029
Zahra Rauf Saleemi, G. Raja
This paper proposes a Transform Coefficient Coding (TCC) architecture for High Efficiency Video Coding (HEVC) by using Selective Implementation Patterns. The architecture developed targets to exploit the benefits of tradeoffs between number of cycles and complexity depending upon the requirements, hence reducing the execution time. The input configuration to be sent in parallel, semi parallel and serial manner, efficiently implements the design. The so- called method of Pipelining is the key to selection of different pixel combinations of input video signal, allowing to give maximum flexibility to compute the integral part of TCC, the One Dimensional Discrete Cosine Transform (1D-DCT) and Two-Dimensional Discrete Cosine Transform (2D-DCT). Furthermore, with a slight modification, the same design can be used for computing Discrete Sine Transform (DST) as well. Coding in Verilog HDL and Implementation in Spartan 3 FPGA Kit enhances the adaptability of the proposed scheme. By evaluating the best available option, lowest hardware complexity, with 11 Look Up Tables (LUTs) and 7 registers, is achieved. The idea is to introduce selectivity and reuse in architecture in Video Coding technique so that the hardware cost and computational time can be reduced.
本文提出了一种采用选择性实现模式的高效视频编码(HEVC)变换系数编码(TCC)体系结构。体系结构开发的目标是利用根据需求在周期数量和复杂性之间进行权衡的好处,从而减少执行时间。输入配置以并行、半并行和串行方式发送,有效地实现了设计。所谓的流水线方法是选择输入视频信号的不同像素组合的关键,允许最大限度地灵活计算TCC的积分部分,一维离散余弦变换(1D-DCT)和二维离散余弦变换(2D-DCT)。此外,稍加修改,同样的设计也可以用于计算离散正弦变换(DST)。采用Verilog HDL编码,Spartan 3 FPGA实现,增强了方案的适应性。通过评估最佳可用选项,可以实现最低的硬件复杂性,即11个查找表(lookup Tables, lut)和7个寄存器。其思想是在视频编码技术的体系结构中引入选择性和可重用性,从而降低硬件成本和计算时间。
{"title":"Requirement based transform coefficient coding architecture for DCT/DST for HEVC","authors":"Zahra Rauf Saleemi, G. Raja","doi":"10.1109/ISWSN.2017.8250029","DOIUrl":"https://doi.org/10.1109/ISWSN.2017.8250029","url":null,"abstract":"This paper proposes a Transform Coefficient Coding (TCC) architecture for High Efficiency Video Coding (HEVC) by using Selective Implementation Patterns. The architecture developed targets to exploit the benefits of tradeoffs between number of cycles and complexity depending upon the requirements, hence reducing the execution time. The input configuration to be sent in parallel, semi parallel and serial manner, efficiently implements the design. The so- called method of Pipelining is the key to selection of different pixel combinations of input video signal, allowing to give maximum flexibility to compute the integral part of TCC, the One Dimensional Discrete Cosine Transform (1D-DCT) and Two-Dimensional Discrete Cosine Transform (2D-DCT). Furthermore, with a slight modification, the same design can be used for computing Discrete Sine Transform (DST) as well. Coding in Verilog HDL and Implementation in Spartan 3 FPGA Kit enhances the adaptability of the proposed scheme. By evaluating the best available option, lowest hardware complexity, with 11 Look Up Tables (LUTs) and 7 registers, is achieved. The idea is to introduce selectivity and reuse in architecture in Video Coding technique so that the hardware cost and computational time can be reduced.","PeriodicalId":390044,"journal":{"name":"2017 International Symposium on Wireless Systems and Networks (ISWSN)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126118898","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Study of detecting and overcoming black hole attacks in MANET: A review 黑洞攻击的探测与克服研究综述
Pub Date : 2017-11-01 DOI: 10.1109/ISWSN.2017.8250039
Danista Khan, M. Jamil
Mobile Ad-hoc Networks (MANETs) are networks in which nodes configure themselves in dynamic topology without any centralized system. MANET's nodes communicate with each other by forming a dynamic wireless link without using previous infrastructure. In the MANETs any node can enter or leave a network at any time. Nodes can send or receive the data by using defined routing protocols and mobility models. Due to the unavailability of centralized system, MANETs are exposed to different network layer attacks. Worm Hole, Black Hole, Gray Hole, Byzantine and Sybil Attacks are some of the examples of network layer attacks, which destroys network topology resulting in data loss and network degradation. In the Black Hole Attack, a node proclaims itself as having closest paths to all the destinations. This node absorbs all the data packets of network by exploiting the routing protocol thus degrading network performance. In this Paper, we have discussed different techniques that can be used to detect and prevent MANETs from black hole attacks.
移动自组织网络(manet)是一种网络,在这种网络中,节点在动态拓扑中配置自己,而不需要任何集中的系统。MANET的节点不使用以前的基础设施,通过形成动态无线链路相互通信。在manet中,任何节点都可以在任何时间进入或离开网络。节点可以使用已定义的路由协议和移动性模型发送或接收数据。由于集中式系统的不可用性,manet容易受到不同网络层的攻击。蠕虫洞攻击、黑洞攻击、灰洞攻击、拜占庭攻击和西比尔攻击是网络层攻击的一些例子,这些攻击会破坏网络拓扑结构,导致数据丢失和网络性能下降。在黑洞攻击中,一个节点宣称自己拥有到所有目的地最近的路径。该节点利用路由协议吸收网络中的所有数据包,从而降低网络性能。在本文中,我们讨论了可用于检测和防止manet遭受黑洞攻击的不同技术。
{"title":"Study of detecting and overcoming black hole attacks in MANET: A review","authors":"Danista Khan, M. Jamil","doi":"10.1109/ISWSN.2017.8250039","DOIUrl":"https://doi.org/10.1109/ISWSN.2017.8250039","url":null,"abstract":"Mobile Ad-hoc Networks (MANETs) are networks in which nodes configure themselves in dynamic topology without any centralized system. MANET's nodes communicate with each other by forming a dynamic wireless link without using previous infrastructure. In the MANETs any node can enter or leave a network at any time. Nodes can send or receive the data by using defined routing protocols and mobility models. Due to the unavailability of centralized system, MANETs are exposed to different network layer attacks. Worm Hole, Black Hole, Gray Hole, Byzantine and Sybil Attacks are some of the examples of network layer attacks, which destroys network topology resulting in data loss and network degradation. In the Black Hole Attack, a node proclaims itself as having closest paths to all the destinations. This node absorbs all the data packets of network by exploiting the routing protocol thus degrading network performance. In this Paper, we have discussed different techniques that can be used to detect and prevent MANETs from black hole attacks.","PeriodicalId":390044,"journal":{"name":"2017 International Symposium on Wireless Systems and Networks (ISWSN)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124777093","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Single phase GSM based wireless energy metering with user notification system 基于GSM的单相无线电表用户通知系统
Pub Date : 2017-11-01 DOI: 10.1109/ISWSN.2017.8250030
Waqas Ali, H. Farooq, A. Khalid, A. Raza, N. Tanveer
The automation is now becoming necessary almost in every field including distribution, control and monitoring of electrical energy. However, in Pakistan the situation is very poor, and the country is facing the severe energy crisis because of outdated power system infrastructure. Even the energy monitoring and metering system for billing is still based on conventional electro-mechanical type meters; which are now being replaced by electronic type digital energy meters in many sub-divisions of Pakistan. However, the collection of energy meter readings data from these meters is being conducted manually which opens the doors of corruption in the form of overbilling which is a major challenge for the current government together with the electricity theft. Although; some steps, including the deployment of mobile based meter reading process using android phones, have been taken to solve this issue but the problem still persists. This is mainly because of the traditional manual meter reading method, which is obsolete, outmoded, inefficient and time consuming. So, this paper presents the simple, efficient, and inexpensive design of an automatic single phase energy meter reading system based on GSM wireless network which also has the provision for user notification. This system uses the short messaging service to transmit the energy meter readings data to utility for billing as well as to update the consumers about their energy usage on regular basis. Moreover, this paper also discusses the potential impacts of this system usage both for utilities and consumers especially in Pakistan.
自动化现在几乎在每个领域都是必要的,包括配电、控制和监测电能。然而,巴基斯坦的情况非常糟糕,由于落后的电力系统基础设施,该国正面临严重的能源危机。即使是计费的能源监测计量系统,也仍以传统的机电式电表为主;在巴基斯坦的许多地区,这些电能表正在被电子式数字电能表所取代。然而,从这些电表中收集电表读数数据是手工进行的,这为以超额收费的形式出现的腐败打开了大门,这是当前政府面临的一个主要挑战,同时也是电力盗窃。虽然;已经采取了一些措施来解决这个问题,包括使用android手机部署基于移动的抄表过程,但问题仍然存在。这主要是因为传统的人工抄表方式陈旧、过时、效率低、耗时长。因此,本文提出了一种基于GSM无线网络的单相自动抄表系统的设计,该系统具有用户通知功能,简单、高效、经济。该系统利用短信服务将电能表读数数据发送到公用事业单位进行计费,并定期更新用户的能源使用情况。此外,本文还讨论了该系统使用对公用事业和消费者的潜在影响,特别是在巴基斯坦。
{"title":"Single phase GSM based wireless energy metering with user notification system","authors":"Waqas Ali, H. Farooq, A. Khalid, A. Raza, N. Tanveer","doi":"10.1109/ISWSN.2017.8250030","DOIUrl":"https://doi.org/10.1109/ISWSN.2017.8250030","url":null,"abstract":"The automation is now becoming necessary almost in every field including distribution, control and monitoring of electrical energy. However, in Pakistan the situation is very poor, and the country is facing the severe energy crisis because of outdated power system infrastructure. Even the energy monitoring and metering system for billing is still based on conventional electro-mechanical type meters; which are now being replaced by electronic type digital energy meters in many sub-divisions of Pakistan. However, the collection of energy meter readings data from these meters is being conducted manually which opens the doors of corruption in the form of overbilling which is a major challenge for the current government together with the electricity theft. Although; some steps, including the deployment of mobile based meter reading process using android phones, have been taken to solve this issue but the problem still persists. This is mainly because of the traditional manual meter reading method, which is obsolete, outmoded, inefficient and time consuming. So, this paper presents the simple, efficient, and inexpensive design of an automatic single phase energy meter reading system based on GSM wireless network which also has the provision for user notification. This system uses the short messaging service to transmit the energy meter readings data to utility for billing as well as to update the consumers about their energy usage on regular basis. Moreover, this paper also discusses the potential impacts of this system usage both for utilities and consumers especially in Pakistan.","PeriodicalId":390044,"journal":{"name":"2017 International Symposium on Wireless Systems and Networks (ISWSN)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126346037","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Practical achievements on throughput improvement in real networks 在实际网络中提高吞吐量的实际成果
Pub Date : 2017-11-01 DOI: 10.1109/ISWSN.2017.8250037
Mohammad Rasoul Tanhatalab, Seyed Majid Jafari Joor Jadeh, Amirhossein Orouji Esfahani
Throughput is one of the major performance metrics for mobile networks. Higher throughput is crucially important for subscribers and service providers (operators); it helps subscribers to save time and enables them to use applications and services requiring higher throughput. The increase in data usage for subscribers experiencing higher throughput is evidenced by existing operators. This recurring revenue boost and also more efficient utilization of spectrum and infrastructure investments make higher throughput more and more attractive for operators. In this paper, we will show some practical solutions which are deployed for throughput improvement in a live mobile network consisting multi-vendor equipment — Ericsson, Nokia, HUAWEI and ZTE — and also different technologies; 2G, 3G and LTE.
吞吐量是移动网络的主要性能指标之一。更高的吞吐量对用户和服务提供商(运营商)至关重要;它帮助订阅者节省时间,并使他们能够使用需要更高吞吐量的应用程序和服务。用户体验更高吞吐量的数据使用量的增加得到了现有运营商的证明。这种经常性的收入增长,以及频谱和基础设施投资的更有效利用,使得更高的吞吐量对运营商越来越有吸引力。在本文中,我们将展示一些实用的解决方案,这些解决方案用于在由多供应商设备(爱立信、诺基亚、华为和中兴)以及不同技术组成的实时移动网络中提高吞吐量;2G, 3G和LTE。
{"title":"Practical achievements on throughput improvement in real networks","authors":"Mohammad Rasoul Tanhatalab, Seyed Majid Jafari Joor Jadeh, Amirhossein Orouji Esfahani","doi":"10.1109/ISWSN.2017.8250037","DOIUrl":"https://doi.org/10.1109/ISWSN.2017.8250037","url":null,"abstract":"Throughput is one of the major performance metrics for mobile networks. Higher throughput is crucially important for subscribers and service providers (operators); it helps subscribers to save time and enables them to use applications and services requiring higher throughput. The increase in data usage for subscribers experiencing higher throughput is evidenced by existing operators. This recurring revenue boost and also more efficient utilization of spectrum and infrastructure investments make higher throughput more and more attractive for operators. In this paper, we will show some practical solutions which are deployed for throughput improvement in a live mobile network consisting multi-vendor equipment — Ericsson, Nokia, HUAWEI and ZTE — and also different technologies; 2G, 3G and LTE.","PeriodicalId":390044,"journal":{"name":"2017 International Symposium on Wireless Systems and Networks (ISWSN)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121791549","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A study of key technologies for IoT and associated security challenges 物联网关键技术及相关安全挑战研究
Pub Date : 2017-11-01 DOI: 10.1109/ISWSN.2017.8250042
Maryam Daud, Quratulain H. Khan, Y. Saleem
There are many hitches regarding security matters for Internet of Things (IoT), which need to be solved yet, including RFID tag security, cyber security wireless security, network transmission security and privacy protection etc. This article basically explores the existing studies on IoT security issues and the mixture of two main technologies of IoT in context of their threats, corresponding security requirements and their solutions while moving toward synthesizing a model for the security and data piracy issues from various viewpoints. This generic model for implementing security comprises of, combination of security standards and corresponding security requirements heading on the functional architecture of IoT.
物联网(IoT)的安全问题还有很多需要解决的问题,包括RFID标签安全、网络安全、无线安全、网络传输安全和隐私保护等。本文主要从物联网安全问题和物联网两大主要技术融合的威胁、安全需求和解决方案等方面对现有研究进行梳理,并从多个角度综合出安全与数据盗版问题的模型。这种通用的安全实现模型包括物联网功能架构上的安全标准和相应的安全需求的组合。
{"title":"A study of key technologies for IoT and associated security challenges","authors":"Maryam Daud, Quratulain H. Khan, Y. Saleem","doi":"10.1109/ISWSN.2017.8250042","DOIUrl":"https://doi.org/10.1109/ISWSN.2017.8250042","url":null,"abstract":"There are many hitches regarding security matters for Internet of Things (IoT), which need to be solved yet, including RFID tag security, cyber security wireless security, network transmission security and privacy protection etc. This article basically explores the existing studies on IoT security issues and the mixture of two main technologies of IoT in context of their threats, corresponding security requirements and their solutions while moving toward synthesizing a model for the security and data piracy issues from various viewpoints. This generic model for implementing security comprises of, combination of security standards and corresponding security requirements heading on the functional architecture of IoT.","PeriodicalId":390044,"journal":{"name":"2017 International Symposium on Wireless Systems and Networks (ISWSN)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132961335","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Estimation and equalization of sparse underwater communication channels 稀疏水下通信信道的估计与均衡
Pub Date : 2017-11-01 DOI: 10.1109/ISWSN.2017.8250017
Fahad Khalil Paracha, Sheeraz Ahmed, N. Saleem, Nisar Ahmed Qureshi, M. S. Sana, Z. Khan
Multipath channels with sparse impulse response arise in various communication scenarios. Multipath channel impulse response is depicted by a very few significant nonzero taps that are widely separated in time. In this paper, different estimation and equalization techniques are discussed which exploit sparse nature of radio communication channels. Various channel estimation techniques are implemented and a comprehensive comparative analysis is presented for sparse multipath channels. The implemented estimation algorithm/techniques include, Least Square (LS), Least Mean Square (LMS), Normalized Least Mean Square (NLMS), Variable Step Size Least Mean Square (VSSLMS), and Matching Pursuit (MP).
具有稀疏脉冲响应的多径信道出现在各种通信场景中。多径通道脉冲响应是由在时间上广泛分离的极少数重要的非零抽头来描述的。本文讨论了利用无线电通信信道稀疏特性的各种估计和均衡技术。实现了各种信道估计技术,并对稀疏多径信道进行了全面的比较分析。实现的估计算法/技术包括最小二乘法(LS)、最小均二乘法(LMS)、归一化最小均二乘法(NLMS)、变步长最小均二乘法(VSSLMS)和匹配追踪(MP)。
{"title":"Estimation and equalization of sparse underwater communication channels","authors":"Fahad Khalil Paracha, Sheeraz Ahmed, N. Saleem, Nisar Ahmed Qureshi, M. S. Sana, Z. Khan","doi":"10.1109/ISWSN.2017.8250017","DOIUrl":"https://doi.org/10.1109/ISWSN.2017.8250017","url":null,"abstract":"Multipath channels with sparse impulse response arise in various communication scenarios. Multipath channel impulse response is depicted by a very few significant nonzero taps that are widely separated in time. In this paper, different estimation and equalization techniques are discussed which exploit sparse nature of radio communication channels. Various channel estimation techniques are implemented and a comprehensive comparative analysis is presented for sparse multipath channels. The implemented estimation algorithm/techniques include, Least Square (LS), Least Mean Square (LMS), Normalized Least Mean Square (NLMS), Variable Step Size Least Mean Square (VSSLMS), and Matching Pursuit (MP).","PeriodicalId":390044,"journal":{"name":"2017 International Symposium on Wireless Systems and Networks (ISWSN)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134015338","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Implementation of IR sensors in thru-beam and diffuse-reflective modes for obstacle detection 红外传感器在通束和漫反射模式下的障碍物检测实现
Pub Date : 2017-11-01 DOI: 10.1109/ISWSN.2017.8250013
Asfa Javed, H. Tariq, Abdullah Khalid
The field of obstacle detection is very popular and vast these days. Lot of technologies has been developed for obstacle-detection phenomenon in recent years. Sensors are the main entity in these technologies. Systems' ability to detect an object, sensitivity, range, cost and quality, all are dependent on the fact that which type of sensors are being used is these systems. So intensive understanding for working of these detectors is mandatory to choose the best sensor according to the application-design. For this purpose, it is very necessary to understand the electronic and physical build of the sensors. Infrared sensors are most often used sensors in obstacle and motion detector systems. This study accounts for understanding the implementation of infrared sensors by using two photoelectric phenomena, Thru-beam and Diffuse- Reflection, to analyzing their function and suitability with respect to different applications. Proteous ISIS 7 is used for simulations. Practically measured results are also shown. Both simulation and experimental results are found in good agreement with theoretical knowledge.
目前,障碍物检测是一个非常热门和广阔的领域。近年来,人们开发了许多针对障碍物检测现象的技术。传感器是这些技术的主体。系统检测物体的能力、灵敏度、范围、成本和质量,都取决于使用哪种类型的传感器。因此,深入了解这些探测器的工作原理是根据应用设计选择最佳传感器的必要条件。为此,非常有必要了解传感器的电子和物理构造。红外传感器是障碍物和运动探测系统中最常用的传感器。本研究利用透射和漫反射两种光电现象来理解红外传感器的实现,分析它们在不同应用中的功能和适用性。多变的ISIS 7被用于模拟。并给出了实际测量结果。仿真和实验结果与理论知识吻合较好。
{"title":"Implementation of IR sensors in thru-beam and diffuse-reflective modes for obstacle detection","authors":"Asfa Javed, H. Tariq, Abdullah Khalid","doi":"10.1109/ISWSN.2017.8250013","DOIUrl":"https://doi.org/10.1109/ISWSN.2017.8250013","url":null,"abstract":"The field of obstacle detection is very popular and vast these days. Lot of technologies has been developed for obstacle-detection phenomenon in recent years. Sensors are the main entity in these technologies. Systems' ability to detect an object, sensitivity, range, cost and quality, all are dependent on the fact that which type of sensors are being used is these systems. So intensive understanding for working of these detectors is mandatory to choose the best sensor according to the application-design. For this purpose, it is very necessary to understand the electronic and physical build of the sensors. Infrared sensors are most often used sensors in obstacle and motion detector systems. This study accounts for understanding the implementation of infrared sensors by using two photoelectric phenomena, Thru-beam and Diffuse- Reflection, to analyzing their function and suitability with respect to different applications. Proteous ISIS 7 is used for simulations. Practically measured results are also shown. Both simulation and experimental results are found in good agreement with theoretical knowledge.","PeriodicalId":390044,"journal":{"name":"2017 International Symposium on Wireless Systems and Networks (ISWSN)","volume":"449 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124285319","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Path-Loss and Energy Efficient Model (PLEEM) for wireless body area networks (WBANs) 无线体域网络(wban)的路径损耗和能效模型(PLEEM)
Pub Date : 2017-11-01 DOI: 10.1109/ISWSN.2017.8250018
Bahrul Amin, Najeeb Ullah, Sheeraz Ahmed, M. Taqi, AbdullahAbdul Hanan
Recently research in the area of WBAN focusing on energy preservation, routing protocol and channel modeling. Considering less for path-loss. In this research a Path-loss and Energy Efficient Model (PLEEM) scheme is proposed to minimize path-loss for both on-body and off-body communications. To minimize the path-loss when the body is in movement, two off-body relays are utilized. Direct communication for regular needed data and indirect communication for normal data is employed. Cost function is calculated on the basis of residual energy of the nodes and minimum distance to sink. Simulation results show that the proposed model enhances the stability period, life time of network, residual energy and throughput. Profound results in term of path-loss for both on-body and off-body communication are found compared to its variants.
目前WBAN的研究主要集中在节能、路由协议和信道建模等方面。少考虑路径损失。本文提出了一种路径损耗和能量效率模型(PLEEM)方案,以最大限度地减少体上和体外通信的路径损耗。为了最大限度地减少身体运动时的路径损失,使用了两个离体继电器。常规需要的数据采用直接通信,正常需要的数据采用间接通信。成本函数是根据节点的剩余能量和最小下沉距离计算的。仿真结果表明,该模型提高了网络的稳定周期、寿命、剩余能量和吞吐量。与其变体相比,我们发现了身体和身体外通信在路径损失方面的深刻结果。
{"title":"Path-Loss and Energy Efficient Model (PLEEM) for wireless body area networks (WBANs)","authors":"Bahrul Amin, Najeeb Ullah, Sheeraz Ahmed, M. Taqi, AbdullahAbdul Hanan","doi":"10.1109/ISWSN.2017.8250018","DOIUrl":"https://doi.org/10.1109/ISWSN.2017.8250018","url":null,"abstract":"Recently research in the area of WBAN focusing on energy preservation, routing protocol and channel modeling. Considering less for path-loss. In this research a Path-loss and Energy Efficient Model (PLEEM) scheme is proposed to minimize path-loss for both on-body and off-body communications. To minimize the path-loss when the body is in movement, two off-body relays are utilized. Direct communication for regular needed data and indirect communication for normal data is employed. Cost function is calculated on the basis of residual energy of the nodes and minimum distance to sink. Simulation results show that the proposed model enhances the stability period, life time of network, residual energy and throughput. Profound results in term of path-loss for both on-body and off-body communication are found compared to its variants.","PeriodicalId":390044,"journal":{"name":"2017 International Symposium on Wireless Systems and Networks (ISWSN)","volume":"356 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124499548","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
期刊
2017 International Symposium on Wireless Systems and Networks (ISWSN)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1