Pub Date : 2013-03-23DOI: 10.1109/ICIST.2013.6747761
Junyue Qu, Yueming Cai, Wendong Yang
In this paper, we investigate the problem of joint resource allocation in two-way OFDM relay systems under the QoS (Quality of Services) constraints of sum rate and symbol error rate. Assuming perfect knowledge of the instantaneous channel gains for the whole system, we propose a joint resource allocation scheme aiming at maximizing the energy efficiency of the system. We first select the best relay node from all the potential relay nodes and then employ subcarrier pairing, and finally we apply joint power allocation and bit loading. Simulation results show that the proposed scheme can significantly improve the energy efficiency of the system. And we also find that bit loading has more effect on the performance of the system than subcarrier pairing does.
{"title":"Energy-efficient joint resource allocation in two-way OFDM relay systems","authors":"Junyue Qu, Yueming Cai, Wendong Yang","doi":"10.1109/ICIST.2013.6747761","DOIUrl":"https://doi.org/10.1109/ICIST.2013.6747761","url":null,"abstract":"In this paper, we investigate the problem of joint resource allocation in two-way OFDM relay systems under the QoS (Quality of Services) constraints of sum rate and symbol error rate. Assuming perfect knowledge of the instantaneous channel gains for the whole system, we propose a joint resource allocation scheme aiming at maximizing the energy efficiency of the system. We first select the best relay node from all the potential relay nodes and then employ subcarrier pairing, and finally we apply joint power allocation and bit loading. Simulation results show that the proposed scheme can significantly improve the energy efficiency of the system. And we also find that bit loading has more effect on the performance of the system than subcarrier pairing does.","PeriodicalId":415759,"journal":{"name":"2013 IEEE Third International Conference on Information Science and Technology (ICIST)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128605638","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-03-23DOI: 10.1109/ICIST.2013.6747584
Xiaofeng Wang
Digital watermarking technology is currently mainly focused on image, video and audio, text-based digital watermarking technology is very few. This paper analyzes several of common text digital watermarking technologies, designes and implementes a text digital watermarking algorithm of character-based scaling. This algorithm greatly improves the embedding capacity and robustness, and has some practical value.
{"title":"Digital watermarking research based on text","authors":"Xiaofeng Wang","doi":"10.1109/ICIST.2013.6747584","DOIUrl":"https://doi.org/10.1109/ICIST.2013.6747584","url":null,"abstract":"Digital watermarking technology is currently mainly focused on image, video and audio, text-based digital watermarking technology is very few. This paper analyzes several of common text digital watermarking technologies, designes and implementes a text digital watermarking algorithm of character-based scaling. This algorithm greatly improves the embedding capacity and robustness, and has some practical value.","PeriodicalId":415759,"journal":{"name":"2013 IEEE Third International Conference on Information Science and Technology (ICIST)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129152924","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-03-23DOI: 10.1109/ICIST.2013.6747793
Gaoming Du, Mingliang He, Y. Song, Duoli Zhang
H.264/AVC has excellent compression efficiency and network-friendly design, but it gets the advanced performance at the expense of highly complex calculation, resulting in huge hardware cost, especially motion estimation (ME) module. To reduce the logic resource consumption (LRC) without any obvious increase of the bit-rate, this paper simplifies the calculation of the block matching parameter with replaced pixel-bits and replaced pixels, and discusses how the LRC of ME module and the bit-rate are affected by the number of replaced bits and replaced pixels for different video motion scenes based on FPGA. The experimental results show three reasonable optimization approaches, in which the ratio of bit-rate increment is less than 0.47% and the LRC drops 24% to 45% compared with full search (FS) algorithm.
{"title":"Optimizing hardware cost of motion estimation module for H.264/AVC based on FPGA","authors":"Gaoming Du, Mingliang He, Y. Song, Duoli Zhang","doi":"10.1109/ICIST.2013.6747793","DOIUrl":"https://doi.org/10.1109/ICIST.2013.6747793","url":null,"abstract":"H.264/AVC has excellent compression efficiency and network-friendly design, but it gets the advanced performance at the expense of highly complex calculation, resulting in huge hardware cost, especially motion estimation (ME) module. To reduce the logic resource consumption (LRC) without any obvious increase of the bit-rate, this paper simplifies the calculation of the block matching parameter with replaced pixel-bits and replaced pixels, and discusses how the LRC of ME module and the bit-rate are affected by the number of replaced bits and replaced pixels for different video motion scenes based on FPGA. The experimental results show three reasonable optimization approaches, in which the ratio of bit-rate increment is less than 0.47% and the LRC drops 24% to 45% compared with full search (FS) algorithm.","PeriodicalId":415759,"journal":{"name":"2013 IEEE Third International Conference on Information Science and Technology (ICIST)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129539545","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-03-23DOI: 10.1109/ICIST.2013.6747505
Shengwang Li, Bin Li, Chengrang Li
Firstly, this paper analyzes the main factors which can affect the outlet temperature of the decomposition furnace in the process of cement production. PID-type controller may encounter many problems, such as large overshoot, long adjusting time and even poor stability in the control of decomposition furnace with time delay. Hence, according to the characteristics and difficulties of the decomposition furnace control, a fuzzy immune self-adaptive PID control method is brought forward and designed in detail. At last, the field application experiments proved that the fuzzy-immune PID control is an effective arithmetic with the advantages of quick response and good robust in control of outlet temperature. Using the method can achieve ideal control effect.
{"title":"The study of temperature control of cement decomposition furnace on the basis of fuzzy immune self-adaptive PID control method","authors":"Shengwang Li, Bin Li, Chengrang Li","doi":"10.1109/ICIST.2013.6747505","DOIUrl":"https://doi.org/10.1109/ICIST.2013.6747505","url":null,"abstract":"Firstly, this paper analyzes the main factors which can affect the outlet temperature of the decomposition furnace in the process of cement production. PID-type controller may encounter many problems, such as large overshoot, long adjusting time and even poor stability in the control of decomposition furnace with time delay. Hence, according to the characteristics and difficulties of the decomposition furnace control, a fuzzy immune self-adaptive PID control method is brought forward and designed in detail. At last, the field application experiments proved that the fuzzy-immune PID control is an effective arithmetic with the advantages of quick response and good robust in control of outlet temperature. Using the method can achieve ideal control effect.","PeriodicalId":415759,"journal":{"name":"2013 IEEE Third International Conference on Information Science and Technology (ICIST)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114357859","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-03-23DOI: 10.1109/ICIST.2013.6747730
Xin Shi, Linghua Zhang
The inherent characteristics of Wireless Sensor Network (WSN) make node localization become a major challenge. A high-precision weighted Bounding Box (HPWB) algorithm is proposed to improve the localization accuracy of original Bounding Box algorithm. In HPWB algorithm, unknown nodes are divided into three categories according to the number of neighbor anchors. As for nodes in category one, a weighted method based on RSSI (Received Signal Strength Indicator) is proposed. As for category two and three, an exclusion method is presented. Simulation results show that our proposed algorithm HPWB achieves higher precision, compared with the original Bounding Box algorithm and Weighted Centroid algorithm.
{"title":"High-precision weighted Bounding Box localization algorithm for Wireless Sensor Network","authors":"Xin Shi, Linghua Zhang","doi":"10.1109/ICIST.2013.6747730","DOIUrl":"https://doi.org/10.1109/ICIST.2013.6747730","url":null,"abstract":"The inherent characteristics of Wireless Sensor Network (WSN) make node localization become a major challenge. A high-precision weighted Bounding Box (HPWB) algorithm is proposed to improve the localization accuracy of original Bounding Box algorithm. In HPWB algorithm, unknown nodes are divided into three categories according to the number of neighbor anchors. As for nodes in category one, a weighted method based on RSSI (Received Signal Strength Indicator) is proposed. As for category two and three, an exclusion method is presented. Simulation results show that our proposed algorithm HPWB achieves higher precision, compared with the original Bounding Box algorithm and Weighted Centroid algorithm.","PeriodicalId":415759,"journal":{"name":"2013 IEEE Third International Conference on Information Science and Technology (ICIST)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116325170","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-03-23DOI: 10.1109/ICIST.2013.6747816
Lanxiang Jiang, Fei Yang
The RF systems of Digital Broadcast Transmitter generally take two forms, ZIF and DIF structure. Based on ZIF, this paper focuses on the relationship among phase imbalance, amplitude mismatch and RF performance, such as sideband suppression and modulation error. These theoretical analysis and stimulated performance provide more guidance on hardware design and debug for digital television transmitter system, based on ZIF structure.
{"title":"Performance analysis and hardware design of digital transmitter system base on ZIF","authors":"Lanxiang Jiang, Fei Yang","doi":"10.1109/ICIST.2013.6747816","DOIUrl":"https://doi.org/10.1109/ICIST.2013.6747816","url":null,"abstract":"The RF systems of Digital Broadcast Transmitter generally take two forms, ZIF and DIF structure. Based on ZIF, this paper focuses on the relationship among phase imbalance, amplitude mismatch and RF performance, such as sideband suppression and modulation error. These theoretical analysis and stimulated performance provide more guidance on hardware design and debug for digital television transmitter system, based on ZIF structure.","PeriodicalId":415759,"journal":{"name":"2013 IEEE Third International Conference on Information Science and Technology (ICIST)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121624335","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-03-23DOI: 10.1109/ICIST.2013.6747706
Yuan Zhou, Ming Wei, Zhoujie Cheng, Yinghui Ning, Linlin Qi
Strong convection is the important weather phenomenon impacting the flight safety, always causes sudden changes of meteorological elements. AMDAR data is of high resolution on spatial and temporal, which can provide vital information for the short-term forecast of strong convection weather in the airport terminal area. This paper extracts the three-dimensional vertical wind profiles and temperature profiles, and produces the wind shear warning analysis diagram in the horizontal and vertical direction. The case studied in this paper is a strong convection at April 2011 in Guangdong Province, AMDAR data, together with multi-source information such as radar, satellite and air sounding is analyzed. The study has found that with high resolution spatial and temporal AMDAR data, wind and temperature disturbance information could reveal the motion of wind shear and turbulence in the airport, so that the unique observational basis for protecting the aircraft's take-off and landing safety is provided.
{"title":"The wind and temperature information of AMDAR data applying to the analysis of severe weather nowcasting of airport","authors":"Yuan Zhou, Ming Wei, Zhoujie Cheng, Yinghui Ning, Linlin Qi","doi":"10.1109/ICIST.2013.6747706","DOIUrl":"https://doi.org/10.1109/ICIST.2013.6747706","url":null,"abstract":"Strong convection is the important weather phenomenon impacting the flight safety, always causes sudden changes of meteorological elements. AMDAR data is of high resolution on spatial and temporal, which can provide vital information for the short-term forecast of strong convection weather in the airport terminal area. This paper extracts the three-dimensional vertical wind profiles and temperature profiles, and produces the wind shear warning analysis diagram in the horizontal and vertical direction. The case studied in this paper is a strong convection at April 2011 in Guangdong Province, AMDAR data, together with multi-source information such as radar, satellite and air sounding is analyzed. The study has found that with high resolution spatial and temporal AMDAR data, wind and temperature disturbance information could reveal the motion of wind shear and turbulence in the airport, so that the unique observational basis for protecting the aircraft's take-off and landing safety is provided.","PeriodicalId":415759,"journal":{"name":"2013 IEEE Third International Conference on Information Science and Technology (ICIST)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124455005","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-03-23DOI: 10.1109/ICIST.2013.6747574
Yaohong D. Jiang, G. Gong
As the traditional EIGamal encryption system can only encrypt a plaintext every time, while present secure obfuscation of EIGamal encryption system based on polynomials over finite fields can encrypt more than one plaintext at the same time. This encryption system not only retains the EIGamal public key system functions, but also has the advantages of indistinguishability obfuscation (i.e. difficult identification). The security of this scheme mainly depends on the characteristics of the hash function and the intractability of discrete logarithm problem.
{"title":"Secure obfuscation of EIGamal cryption system based on polynomials over finite fields","authors":"Yaohong D. Jiang, G. Gong","doi":"10.1109/ICIST.2013.6747574","DOIUrl":"https://doi.org/10.1109/ICIST.2013.6747574","url":null,"abstract":"As the traditional EIGamal encryption system can only encrypt a plaintext every time, while present secure obfuscation of EIGamal encryption system based on polynomials over finite fields can encrypt more than one plaintext at the same time. This encryption system not only retains the EIGamal public key system functions, but also has the advantages of indistinguishability obfuscation (i.e. difficult identification). The security of this scheme mainly depends on the characteristics of the hash function and the intractability of discrete logarithm problem.","PeriodicalId":415759,"journal":{"name":"2013 IEEE Third International Conference on Information Science and Technology (ICIST)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124501848","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-03-23DOI: 10.1109/ICIST.2013.6747696
Noptanit Chotisarn, N. Prompoon
Human is the most important resource in the software project and has become the key success factor of the software project in terms of quality which is called “Human factor”. In this paper, the focus will be on the behavioral perspective of human factor in terms of psychological effect, especially on the cognitive bias at the early stages of the software development life cycle (SDLC). We aim to present a multiple regression and correlation analysis method of the human cognitive bias in the software requirements gathering and specification process, where the biases are assigned to the independent variables that affect the dependent variable or the software damage rate. The execution of our method will lead to the discovery of the factors that may affect the software damage rate.
{"title":"Forecasting software damage rate from cognitive bias in software requirements gathering and specification process","authors":"Noptanit Chotisarn, N. Prompoon","doi":"10.1109/ICIST.2013.6747696","DOIUrl":"https://doi.org/10.1109/ICIST.2013.6747696","url":null,"abstract":"Human is the most important resource in the software project and has become the key success factor of the software project in terms of quality which is called “Human factor”. In this paper, the focus will be on the behavioral perspective of human factor in terms of psychological effect, especially on the cognitive bias at the early stages of the software development life cycle (SDLC). We aim to present a multiple regression and correlation analysis method of the human cognitive bias in the software requirements gathering and specification process, where the biases are assigned to the independent variables that affect the dependent variable or the software damage rate. The execution of our method will lead to the discovery of the factors that may affect the software damage rate.","PeriodicalId":415759,"journal":{"name":"2013 IEEE Third International Conference on Information Science and Technology (ICIST)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126366057","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-03-23DOI: 10.1109/ICIST.2013.6747709
Q. Wei, H. Jia
In this paper, a kind of wind tunnel experiment will be discussed. This wind tunnel experiment is used for conformal dome design. Wind tunnel experiments are done with different speed and attack angles. The results together with the simulation results got before will be used for coupling simulation FEA software. After analyzing and computing the data, the conformal dome's aero-optical effects are studied.
{"title":"Simulated conformal dome wind tunnel experiments","authors":"Q. Wei, H. Jia","doi":"10.1109/ICIST.2013.6747709","DOIUrl":"https://doi.org/10.1109/ICIST.2013.6747709","url":null,"abstract":"In this paper, a kind of wind tunnel experiment will be discussed. This wind tunnel experiment is used for conformal dome design. Wind tunnel experiments are done with different speed and attack angles. The results together with the simulation results got before will be used for coupling simulation FEA software. After analyzing and computing the data, the conformal dome's aero-optical effects are studied.","PeriodicalId":415759,"journal":{"name":"2013 IEEE Third International Conference on Information Science and Technology (ICIST)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121586131","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}