首页 > 最新文献

2012 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery最新文献

英文 中文
A Dual-Mode Fingerprint Fusion Encryption Method Based on Fuzzy Vault 一种基于模糊保险库的双模指纹融合加密方法
Xiaolei Li, Dongmei Sun
Fuzzy vault can be used as an encryption framework to protect the user's identity key using the biometric. This framework can provide a balance between fuzzy biometric and the accuracy of cryptography system. In this paper, we propose a method to fuse multi-biometrics and encrypt the key of users based on fuzzy vault. We test this method using the multibiometrics from the same source database made by Shandong University, and the results show the proposed method is more effective.
模糊保险库可以作为一种加密框架,利用生物特征来保护用户的身份密钥。该框架可以在模糊生物特征和密码系统的准确性之间取得平衡。本文提出了一种基于模糊保险库的多生物特征融合和用户密钥加密方法。我们用山东大学同一源数据库的多生物特征数据对该方法进行了测试,结果表明该方法更有效。
{"title":"A Dual-Mode Fingerprint Fusion Encryption Method Based on Fuzzy Vault","authors":"Xiaolei Li, Dongmei Sun","doi":"10.1109/CyberC.2012.42","DOIUrl":"https://doi.org/10.1109/CyberC.2012.42","url":null,"abstract":"Fuzzy vault can be used as an encryption framework to protect the user's identity key using the biometric. This framework can provide a balance between fuzzy biometric and the accuracy of cryptography system. In this paper, we propose a method to fuse multi-biometrics and encrypt the key of users based on fuzzy vault. We test this method using the multibiometrics from the same source database made by Shandong University, and the results show the proposed method is more effective.","PeriodicalId":416468,"journal":{"name":"2012 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116758605","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A Novel Simulation Time and Wall Clock Time Synchronization Algorithm for HLA 一种新的HLA仿真时间与挂钟时间同步算法
Zexin Jiang
In this paper, we investigate the simulation time and wall clock time synchronization problem for High Level Architecture (HLA). We first identify and analyze two drawbacks in the traditional HLA-based time synchronization algorithm. A novel time synchronization algorithm based on synchronization events is then proposed to address these two drawbacks. To verify the proposed algorithm, experiment are conducted in the HLA based distributed and hardware-in-the-loop simulation systems. The experimental result shows that our approach significantly outperforms the traditional algorithms.
本文研究了高级体系结构(HLA)的仿真时间和挂钟时间同步问题。我们首先识别并分析了传统的基于hla的时间同步算法的两个缺点。针对这两个缺点,提出了一种基于同步事件的时间同步算法。为了验证所提出的算法,在基于HLA的分布式和半实物仿真系统中进行了实验。实验结果表明,该方法明显优于传统算法。
{"title":"A Novel Simulation Time and Wall Clock Time Synchronization Algorithm for HLA","authors":"Zexin Jiang","doi":"10.1109/CyberC.2012.50","DOIUrl":"https://doi.org/10.1109/CyberC.2012.50","url":null,"abstract":"In this paper, we investigate the simulation time and wall clock time synchronization problem for High Level Architecture (HLA). We first identify and analyze two drawbacks in the traditional HLA-based time synchronization algorithm. A novel time synchronization algorithm based on synchronization events is then proposed to address these two drawbacks. To verify the proposed algorithm, experiment are conducted in the HLA based distributed and hardware-in-the-loop simulation systems. The experimental result shows that our approach significantly outperforms the traditional algorithms.","PeriodicalId":416468,"journal":{"name":"2012 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117067652","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Fragment Aware Scheduling for Advance Reservations in Multiprocessor Systems 多处理器系统中分段感知的提前预约调度
Bo Li, Enwei Zhou, Hao Wu, Yijian Pei, Bin Shen
In multiprocessor environment, resource reservation technology will split the continuous idle resources and generate resource fragments which would reduce resource utilization and job acceptance rate. In this paper, we defined resource fragments produced by resource reservation and proposed scheduling algorithms based on fragment-aware, the designs of which focus on improve acceptance ability of following-up jobs. Based on resource fragment-aware, we proposed two algorithms, Occupation Rate Best Fit and Occupation Rate Worst Fit, and in combination with heuristic algorithms, PE Worst Fit - Occupation Rate Best Fit and PE Worst Fit - Occupation Rate Worst Fit are put forward. We not only realized and analyzed algorithms in simulation, but also studied relationship between task properties and algorithms' performance. Experiments proved that PE Worst Fit - Occupation Worst Fit provides the best job acceptance rate and Occupation Rate Worst Fit has the best performance on average slowdown.
在多处理器环境下,资源预留技术将连续的闲置资源进行分割,产生资源碎片,从而降低资源利用率和作业接受率。本文定义了资源预留产生的资源碎片,提出了基于碎片感知的调度算法,其设计重点是提高后续作业的接受能力。在资源碎片感知的基础上,提出了职业率最佳拟合算法和职业率最差拟合算法,并结合启发式算法提出了PE最差拟合-职业率最佳拟合算法和PE最差拟合-职业率最差拟合算法。我们不仅在仿真中实现和分析了算法,还研究了任务属性与算法性能之间的关系。实验证明,PE最差匹配-职业最差匹配提供了最佳的工作接受率,职业率最差匹配在平均减速上具有最佳性能。
{"title":"Fragment Aware Scheduling for Advance Reservations in Multiprocessor Systems","authors":"Bo Li, Enwei Zhou, Hao Wu, Yijian Pei, Bin Shen","doi":"10.1109/CyberC.2012.54","DOIUrl":"https://doi.org/10.1109/CyberC.2012.54","url":null,"abstract":"In multiprocessor environment, resource reservation technology will split the continuous idle resources and generate resource fragments which would reduce resource utilization and job acceptance rate. In this paper, we defined resource fragments produced by resource reservation and proposed scheduling algorithms based on fragment-aware, the designs of which focus on improve acceptance ability of following-up jobs. Based on resource fragment-aware, we proposed two algorithms, Occupation Rate Best Fit and Occupation Rate Worst Fit, and in combination with heuristic algorithms, PE Worst Fit - Occupation Rate Best Fit and PE Worst Fit - Occupation Rate Worst Fit are put forward. We not only realized and analyzed algorithms in simulation, but also studied relationship between task properties and algorithms' performance. Experiments proved that PE Worst Fit - Occupation Worst Fit provides the best job acceptance rate and Occupation Rate Worst Fit has the best performance on average slowdown.","PeriodicalId":416468,"journal":{"name":"2012 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery","volume":"120 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115757364","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Enabling Dynamic Analysis of Anonymized Social Network Data 启用匿名社交网络数据的动态分析
Xuan Ding, Wei Wang
Anonymization is a widely used technique for the private publication of social network data. However, since the existing social network anonymization methods consider only one-time releases, they only reserve the static utility of the anonymized data. As social network evolves, these methods have posed severe challenges to the emerging requirement of dynamic social network analysis, which requires the dynamic utility of an evolving social network to be reserved for analysis. Instead of proposing a new anonymization method to handle dynamics, in this paper, we address these challenges by rebuilding connections between the sequentially published, anonymized data. By doing so, we have enabled a broad range of dynamic analysis to be applied to those already anonymized data without re-generating them. This suggests that our method is transparent to both the existing anonymization methods and the anonymized data. We adopt a combination of data-mining and graph-matching techniques to accomplish this task. The effectiveness of our method has been demonstrated on a series of real, dynamic social network data.
匿名化是一种广泛使用的技术,用于社交网络数据的私人发布。然而,由于现有的社交网络匿名化方法只考虑一次性发布,它们只保留匿名数据的静态效用。随着社会网络的发展,这些方法对动态社会网络分析的新需求提出了严峻的挑战,这就要求在分析中保留不断发展的社会网络的动态效用。在本文中,我们没有提出一种新的匿名化方法来处理动态,而是通过重建顺序发布的匿名数据之间的连接来解决这些挑战。通过这样做,我们可以将广泛的动态分析应用于那些已经匿名的数据,而无需重新生成它们。这表明我们的方法对现有的匿名化方法和匿名化数据都是透明的。我们采用数据挖掘和图匹配技术的结合来完成这项任务。该方法的有效性已经在一系列真实的、动态的社会网络数据上得到了验证。
{"title":"Enabling Dynamic Analysis of Anonymized Social Network Data","authors":"Xuan Ding, Wei Wang","doi":"10.1109/CyberC.2012.13","DOIUrl":"https://doi.org/10.1109/CyberC.2012.13","url":null,"abstract":"Anonymization is a widely used technique for the private publication of social network data. However, since the existing social network anonymization methods consider only one-time releases, they only reserve the static utility of the anonymized data. As social network evolves, these methods have posed severe challenges to the emerging requirement of dynamic social network analysis, which requires the dynamic utility of an evolving social network to be reserved for analysis. Instead of proposing a new anonymization method to handle dynamics, in this paper, we address these challenges by rebuilding connections between the sequentially published, anonymized data. By doing so, we have enabled a broad range of dynamic analysis to be applied to those already anonymized data without re-generating them. This suggests that our method is transparent to both the existing anonymization methods and the anonymized data. We adopt a combination of data-mining and graph-matching techniques to accomplish this task. The effectiveness of our method has been demonstrated on a series of real, dynamic social network data.","PeriodicalId":416468,"journal":{"name":"2012 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125968557","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Improvement of Texture Image Retrieval Algorithm Based on Sparse Coding 基于稀疏编码的纹理图像检索算法改进
Yansi Yang, Yingyun Yang, Xuan Zeng
The demerits of the texture image retrieval algorithm based on sparse coding are found expression in the low recall and inconspicuous serial priority of qualified images. Several methods are presented in this paper to improve the performance of the image retrieval algorithm. Firstly, Brodatz texture image filter basis function is used for processing the texture images, thereafter, the kurtosis is added to generate the eigenvector, finally, the joint-scale filter basis is utilized to advance the filter effect. Experimental results indicate that the performance of the proposed methods is positive.
基于稀疏编码的纹理图像检索算法的缺点主要表现在合格图像的召回率低、序列优先级不显著。本文提出了几种提高图像检索算法性能的方法。首先利用Brodatz纹理图像滤波基函数对纹理图像进行处理,然后加入峰度生成特征向量,最后利用联合尺度滤波基推进滤波效果。实验结果表明,所提方法具有良好的性能。
{"title":"Improvement of Texture Image Retrieval Algorithm Based on Sparse Coding","authors":"Yansi Yang, Yingyun Yang, Xuan Zeng","doi":"10.1109/CyberC.2012.92","DOIUrl":"https://doi.org/10.1109/CyberC.2012.92","url":null,"abstract":"The demerits of the texture image retrieval algorithm based on sparse coding are found expression in the low recall and inconspicuous serial priority of qualified images. Several methods are presented in this paper to improve the performance of the image retrieval algorithm. Firstly, Brodatz texture image filter basis function is used for processing the texture images, thereafter, the kurtosis is added to generate the eigenvector, finally, the joint-scale filter basis is utilized to advance the filter effect. Experimental results indicate that the performance of the proposed methods is positive.","PeriodicalId":416468,"journal":{"name":"2012 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121227510","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Arithmetic Operations on Elliptic Curves Defined over Un-conventional Element Finite Fields 非常规单元有限域上椭圆曲线的算术运算
M. N. Daikpor, O. Adegbenro
This paper presents arithmetic operations on elliptic curves defined over an un-conventional number system character digit element finite field. A high speed elliptic curve scalar multiplication algorithm in this special field domain is also presented. The heuristically-obtained results show the efficient nature of the proposed elliptic curve arithmetic operations.
本文给出了在非常规数制字符元有限域上定义的椭圆曲线的算术运算。提出了一种高速椭圆曲线标量乘法算法。启发式计算结果表明所提出的椭圆曲线算术运算的有效性。
{"title":"Arithmetic Operations on Elliptic Curves Defined over Un-conventional Element Finite Fields","authors":"M. N. Daikpor, O. Adegbenro","doi":"10.1109/CyberC.2012.29","DOIUrl":"https://doi.org/10.1109/CyberC.2012.29","url":null,"abstract":"This paper presents arithmetic operations on elliptic curves defined over an un-conventional number system character digit element finite field. A high speed elliptic curve scalar multiplication algorithm in this special field domain is also presented. The heuristically-obtained results show the efficient nature of the proposed elliptic curve arithmetic operations.","PeriodicalId":416468,"journal":{"name":"2012 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130237984","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
FFT-Based OFDM in Broadband-PLC and Narrowband-PLC 基于fft的OFDM在宽带plc和窄带plc中的应用
Tongfei Zhang, Wenjing Liu
With the development of the smart grid, power line communications (PLC) is becoming more and more important. Compared with traditional modulation, Orthogonal Frequency Division Multiplexing (OFDM) has the advantages of the full use of spectrum, inherent robustness against narrowband interference, and excellent robustness in multi-path environments. This article is devoted to compare FFT-based OFDM in Broadband-PLC (BB-PLC) with in Narrowband-PLC (NB-PLC), conduct experiments to get the PLC channel characteristics and give some advice to the standard in progress.
随着智能电网的发展,电力线通信(PLC)变得越来越重要。与传统调制相比,正交频分复用(OFDM)具有充分利用频谱、固有的对窄带干扰的鲁棒性以及在多径环境下的出色鲁棒性等优点。本文对基于fft的OFDM在宽带-PLC (BB-PLC)和窄带-PLC (NB-PLC)中的应用进行了比较,通过实验得到了PLC的信道特性,并对正在制定的标准提出了一些建议。
{"title":"FFT-Based OFDM in Broadband-PLC and Narrowband-PLC","authors":"Tongfei Zhang, Wenjing Liu","doi":"10.1109/CyberC.2012.86","DOIUrl":"https://doi.org/10.1109/CyberC.2012.86","url":null,"abstract":"With the development of the smart grid, power line communications (PLC) is becoming more and more important. Compared with traditional modulation, Orthogonal Frequency Division Multiplexing (OFDM) has the advantages of the full use of spectrum, inherent robustness against narrowband interference, and excellent robustness in multi-path environments. This article is devoted to compare FFT-based OFDM in Broadband-PLC (BB-PLC) with in Narrowband-PLC (NB-PLC), conduct experiments to get the PLC channel characteristics and give some advice to the standard in progress.","PeriodicalId":416468,"journal":{"name":"2012 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133337607","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
DDoS Attack by File Request Redirection in Kad P2P Network Kad P2P网络中的文件请求重定向DDoS攻击
Yeonju Lee, Kwangsoo Kim, B. Roh
In recent years, Peer to Peer system has shown tremendous growth enabling millions of concurrent users exchange information seamlessly. Kad is a Kademlia-based Distributed Hash Table implementation in real P2P applications which has millions of simultaneous users as to date. However, it comes with several vulnerable features which allow attacks, especially DDoS attacks. In this paper, we proposed a new DDoS attack caused by changing source IP address in response message of source search. In the proposed attack, there are two types of attackers, which change their KadID as KeywordID for keyword search and File Hash for source search as well. When a normal user selects the keyword and file as target, the user generates unintentionally traffics to a victim. To verify the effectiveness of our attack and its dangerousness, we test our scheme in Kad network. Our results show the potential risk of DDoS attack caused by the weakness of the Kad network.
近年来,点对点系统取得了巨大的发展,使数百万并发用户能够无缝地交换信息。Kad是一个基于kademlia的分布式哈希表实现,应用于实际的P2P应用程序,到目前为止,该应用程序拥有数百万并发用户。然而,它有几个容易受到攻击的特性,尤其是DDoS攻击。本文提出了一种通过改变源IP地址来响应源搜索消息的新型DDoS攻击方法。在提出的攻击中,有两种类型的攻击者,它们将其kdid更改为关键字搜索的KeywordID和源搜索的File Hash。当正常用户选择该关键字和文件作为攻击目标时,会在无意中产生流量。为了验证我们的攻击的有效性和危险性,我们在Kad网络上进行了测试。我们的研究结果显示了Kad网络的弱点导致DDoS攻击的潜在风险。
{"title":"DDoS Attack by File Request Redirection in Kad P2P Network","authors":"Yeonju Lee, Kwangsoo Kim, B. Roh","doi":"10.1109/CyberC.2012.91","DOIUrl":"https://doi.org/10.1109/CyberC.2012.91","url":null,"abstract":"In recent years, Peer to Peer system has shown tremendous growth enabling millions of concurrent users exchange information seamlessly. Kad is a Kademlia-based Distributed Hash Table implementation in real P2P applications which has millions of simultaneous users as to date. However, it comes with several vulnerable features which allow attacks, especially DDoS attacks. In this paper, we proposed a new DDoS attack caused by changing source IP address in response message of source search. In the proposed attack, there are two types of attackers, which change their KadID as KeywordID for keyword search and File Hash for source search as well. When a normal user selects the keyword and file as target, the user generates unintentionally traffics to a victim. To verify the effectiveness of our attack and its dangerousness, we test our scheme in Kad network. Our results show the potential risk of DDoS attack caused by the weakness of the Kad network.","PeriodicalId":416468,"journal":{"name":"2012 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133460355","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Porting of OSSIE on Texas Instrument's DAVINCI SoC Based SDR Platform OSSIE在德州仪器DAVINCI SoC SDR平台上的移植
Saleh Usman, Asad Mahmood, Muhammad Rehan Ashraf
Software Communication Architecture (SCA) is an open architecture specification for the development of Software Defined Radios (SDRs). OSSIE (Open Source SCA Implementation: Embedded) is an SCA-compliant SDR framework which provides additional tools for experimentation and rapid prototype development. OSSIE framework has stabilized and reached a level of maturity for desktop environment. Therefore there is a need to target new devices and hardware platforms because ultimately SDR's will find most of their applications in embedded forms. In this work OSSIE and its dependencies have been ported to a custom designed embedded SDR platform, based on Texas Instrument's DAVINCI technology System on Chip (SoC). Open Embedded has been used for this port which is a complete build system for embedded platforms. Successful OSSIE port has been verified by building and executing a test waveform on this SDR platform.
软件通信体系结构(SCA)是用于开发软件定义无线电(sdr)的开放体系结构规范。OSSIE(开源SCA实现:嵌入式)是一个与SCA兼容的SDR框架,它为实验和快速原型开发提供了额外的工具。OSSIE框架已经稳定下来,并达到了桌面环境的成熟程度。因此,有必要瞄准新的设备和硬件平台,因为最终SDR的大部分应用将以嵌入式形式出现。在这项工作中,OSSIE及其依赖项已被移植到一个定制设计的嵌入式SDR平台上,该平台基于德州仪器的DAVINCI技术片上系统(SoC)。Open Embedded已用于此端口,这是一个完整的嵌入式平台构建系统。通过在该SDR平台上构建和执行测试波形,验证了OSSIE端口的成功。
{"title":"Porting of OSSIE on Texas Instrument's DAVINCI SoC Based SDR Platform","authors":"Saleh Usman, Asad Mahmood, Muhammad Rehan Ashraf","doi":"10.1109/CyberC.2012.58","DOIUrl":"https://doi.org/10.1109/CyberC.2012.58","url":null,"abstract":"Software Communication Architecture (SCA) is an open architecture specification for the development of Software Defined Radios (SDRs). OSSIE (Open Source SCA Implementation: Embedded) is an SCA-compliant SDR framework which provides additional tools for experimentation and rapid prototype development. OSSIE framework has stabilized and reached a level of maturity for desktop environment. Therefore there is a need to target new devices and hardware platforms because ultimately SDR's will find most of their applications in embedded forms. In this work OSSIE and its dependencies have been ported to a custom designed embedded SDR platform, based on Texas Instrument's DAVINCI technology System on Chip (SoC). Open Embedded has been used for this port which is a complete build system for embedded platforms. Successful OSSIE port has been verified by building and executing a test waveform on this SDR platform.","PeriodicalId":416468,"journal":{"name":"2012 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery","volume":"26 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133754215","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Analysis and Simulation of New Method in LTE-Advanced System to Improve System Performance LTE-Advanced系统中提高系统性能新方法的分析与仿真
Gao Qiang, Yunjie Yuan
In this paper, a new method to improve system performance is presented. In Het-Net of LTE-Advanced system different cells are loaded with difference number of User Equipment (UE). This is because the different transmission powers between macro cell and pico cell are used and the UE moves randomly in the network. Sometimes, a cell could be overloading to server many UEs such that the frequency resource is used up. Due to overload, the throughput of each US is significantly reduced. However, other cells may still be lightly loaded while serving a small number of UEs. The imblanance of the resource degrades the network performance. In this paper, we analyze the load balance problem and an approach is proposed to improve the system performance.
本文提出了一种提高系统性能的新方法。在LTE-Advanced系统的Het-Net中,不同的小区承载不同数量的用户设备(UE)。这是由于宏基站和微基站的传输功率不同,且终端在网络中的移动是随机的。有时,一个单元可能会超载以服务许多ue,从而耗尽频率资源。由于过载,每个US的吞吐量大大降低。但是,在服务少量ue时,其他单元可能仍然是轻负载的。资源不均衡会导致网络性能下降。本文分析了负载均衡问题,提出了一种提高系统性能的方法。
{"title":"Analysis and Simulation of New Method in LTE-Advanced System to Improve System Performance","authors":"Gao Qiang, Yunjie Yuan","doi":"10.1109/CyberC.2012.85","DOIUrl":"https://doi.org/10.1109/CyberC.2012.85","url":null,"abstract":"In this paper, a new method to improve system performance is presented. In Het-Net of LTE-Advanced system different cells are loaded with difference number of User Equipment (UE). This is because the different transmission powers between macro cell and pico cell are used and the UE moves randomly in the network. Sometimes, a cell could be overloading to server many UEs such that the frequency resource is used up. Due to overload, the throughput of each US is significantly reduced. However, other cells may still be lightly loaded while serving a small number of UEs. The imblanance of the resource degrades the network performance. In this paper, we analyze the load balance problem and an approach is proposed to improve the system performance.","PeriodicalId":416468,"journal":{"name":"2012 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123983078","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2012 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1