首页 > 最新文献

2014 IEEE Computers, Communications and IT Applications Conference最新文献

英文 中文
Overlapped-shaking: A local authentication method for mobile applications 重叠抖动:移动应用的本地认证方法
Pub Date : 2014-10-01 DOI: 10.1109/ComComAp.2014.7017177
Yu Liu, J. Niu
Mobile applications become increasingly popular currently. Both authentication and privacy are very important for mobile applications. A promising approach for local authentication is to match the acceleration sensor samples of the two candidate smart phones. However, the acceleration sensor on the smart phones sample at different rates and the starting phases are not aligned. This paper presents a new local authentication method for mobile applications called Overlapped-shaking. Overlapped-shaking is a background service for smart phones which can measure the similarities between two shaking patterns. We design a new acceleration samples matching method called SAM, which can handle the data in different sample rates and offset at the beginning. We implement a demonstration of Overlapped-shaking service on Android smart phones. Test results show that our approach works very well for acceleration-based smart phone authentications.
移动应用程序现在越来越流行。身份验证和隐私对于移动应用程序都非常重要。一种很有前途的本地认证方法是匹配两个候选智能手机的加速度传感器样本。然而,智能手机上的加速度传感器以不同的速率采样,并且启动阶段没有对齐。本文提出了一种新的移动应用本地认证方法——重叠抖动。重叠震动是智能手机的一项后台服务,可以测量两种震动模式之间的相似度。我们设计了一种新的加速样本匹配方法,称为SAM,它可以处理不同采样率和初始偏移量的数据。我们在Android智能手机上实现了重叠抖动服务的演示。测试结果表明,我们的方法对于基于加速的智能手机身份验证非常有效。
{"title":"Overlapped-shaking: A local authentication method for mobile applications","authors":"Yu Liu, J. Niu","doi":"10.1109/ComComAp.2014.7017177","DOIUrl":"https://doi.org/10.1109/ComComAp.2014.7017177","url":null,"abstract":"Mobile applications become increasingly popular currently. Both authentication and privacy are very important for mobile applications. A promising approach for local authentication is to match the acceleration sensor samples of the two candidate smart phones. However, the acceleration sensor on the smart phones sample at different rates and the starting phases are not aligned. This paper presents a new local authentication method for mobile applications called Overlapped-shaking. Overlapped-shaking is a background service for smart phones which can measure the similarities between two shaking patterns. We design a new acceleration samples matching method called SAM, which can handle the data in different sample rates and offset at the beginning. We implement a demonstration of Overlapped-shaking service on Android smart phones. Test results show that our approach works very well for acceleration-based smart phone authentications.","PeriodicalId":422906,"journal":{"name":"2014 IEEE Computers, Communications and IT Applications Conference","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125373597","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Iterative detection and decoding of MIMO signal using a low-complexity soft-output detector 基于低复杂度软输出检测器的MIMO信号迭代检测与解码
Pub Date : 2014-10-01 DOI: 10.1109/ComComAp.2014.7017196
Jin Ren, Zhengping Li, Yujie Guo
We investigate iterative detection and decoding, a.k.a. turbo detection, for multiple-input multiple-output (MIMO) transmission. This investigation is based on a low complexity soft output MIMO detector with a priori information feedback. We show that maximum a posteriori performance (without turbo iteration) can be achieved, at a much lower computational cost, by using the proposed soft-output MIMO detector.
我们研究了多输入多输出(MIMO)传输的迭代检测和解码,即涡轮检测。本研究基于一种具有先验信息反馈的低复杂度软输出MIMO检测器。我们表明,通过使用所提出的软输出MIMO检测器,可以以更低的计算成本实现最大的后验性能(没有涡轮迭代)。
{"title":"Iterative detection and decoding of MIMO signal using a low-complexity soft-output detector","authors":"Jin Ren, Zhengping Li, Yujie Guo","doi":"10.1109/ComComAp.2014.7017196","DOIUrl":"https://doi.org/10.1109/ComComAp.2014.7017196","url":null,"abstract":"We investigate iterative detection and decoding, a.k.a. turbo detection, for multiple-input multiple-output (MIMO) transmission. This investigation is based on a low complexity soft output MIMO detector with a priori information feedback. We show that maximum a posteriori performance (without turbo iteration) can be achieved, at a much lower computational cost, by using the proposed soft-output MIMO detector.","PeriodicalId":422906,"journal":{"name":"2014 IEEE Computers, Communications and IT Applications Conference","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131130178","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A new I/O scheduler designed for SSD through exploring performance characteristics 通过探索性能特征,为SSD设计了一个新的I/O调度器
Pub Date : 2014-10-01 DOI: 10.1109/ComComAp.2014.7017189
Lei Han, Yi Lin, Weiwei Jia
This paper explores intrinsic characteristics of solid state device (SSD) by modifying the system schedulers as core. Based on obtained characteristics, we design a new block I/O scheduler. Different from mechanical hard disk device (HDD), SSDs have many widely cognitive features, such as none-mechanical, inherent parallelism, high read and write speeds and so on. Considering the current system schedulers are optimized for HDD, we suppose these schedulers may be not optimal for SSD. We manage to modify the essential parts of system schedulers and test them under different workloads, then summarize the characteristics for improving performance like sorting order of requests, read-write interference and parallelism. We implement a new scheduler called Layer_Read which has the different organizations according to the access pattern on a Linux 2.6.34 kernel. The scheduler divides read requests into different sub-layers in accordance with their starting sector numbers, and dispatches requests in a round-robin way among the sub-layers in order to utilize inherent parallelism. Besides that, the scheduler continuously dispatches multiple read or write requests which can reduce the read-write interference. Through the experiment validated, the scheduler has some performance improvement when compared with other system schedulers.
本文以系统调度器为核心,探讨固态设备的内在特性。基于所获得的特性,我们设计了一个新的块I/O调度器。与机械硬盘设备(HDD)不同,ssd具有非机械、固有并行性、高读写速度等广泛认知的特性。考虑到当前的系统调度器是针对HDD优化的,我们假设这些调度器可能不是针对SSD优化的。我们设法修改了系统调度器的基本部分,并在不同的工作负载下对它们进行了测试,然后总结了提高性能的特征,如请求排序顺序、读写干扰和并行性。我们实现了一个新的调度器Layer_Read,它根据Linux 2.6.34内核上的访问模式有不同的组织。调度器根据读请求的起始扇区号将读请求划分到不同的子层,并在子层之间以轮询的方式调度请求,以利用固有的并行性。此外,调度程序连续调度多个读或写请求,可以减少读写干扰。通过实验验证,与其他系统调度程序相比,该调度程序具有一定的性能提升。
{"title":"A new I/O scheduler designed for SSD through exploring performance characteristics","authors":"Lei Han, Yi Lin, Weiwei Jia","doi":"10.1109/ComComAp.2014.7017189","DOIUrl":"https://doi.org/10.1109/ComComAp.2014.7017189","url":null,"abstract":"This paper explores intrinsic characteristics of solid state device (SSD) by modifying the system schedulers as core. Based on obtained characteristics, we design a new block I/O scheduler. Different from mechanical hard disk device (HDD), SSDs have many widely cognitive features, such as none-mechanical, inherent parallelism, high read and write speeds and so on. Considering the current system schedulers are optimized for HDD, we suppose these schedulers may be not optimal for SSD. We manage to modify the essential parts of system schedulers and test them under different workloads, then summarize the characteristics for improving performance like sorting order of requests, read-write interference and parallelism. We implement a new scheduler called Layer_Read which has the different organizations according to the access pattern on a Linux 2.6.34 kernel. The scheduler divides read requests into different sub-layers in accordance with their starting sector numbers, and dispatches requests in a round-robin way among the sub-layers in order to utilize inherent parallelism. Besides that, the scheduler continuously dispatches multiple read or write requests which can reduce the read-write interference. Through the experiment validated, the scheduler has some performance improvement when compared with other system schedulers.","PeriodicalId":422906,"journal":{"name":"2014 IEEE Computers, Communications and IT Applications Conference","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129482367","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Cyber Security Backdrop: A SCADA testbed 网络安全背景:SCADA测试平台
Pub Date : 2014-10-01 DOI: 10.1109/ComComAp.2014.7017178
A. A. Farooqui, S. S. Zaidi, A. Memon, S. Qazi
Supervisory Control and Data Acquisition (SCADA) systems are traditionally proprietary and well protected. Due to increasing use of commercial/open source technology and communication protocols, there are growing concerns about the associated security threats. SCADA networks are usually employed in critical infrastructure, therefore, not much technical data of the actual systems is accessible to the research community. Most of the researchers simulate the SCADA functioning through development of testbed. Such projects are usually expensive and requiring financial sponsorship. In this paper we present a simple, inexpensive and flexible approach to develop a SCADA testbed utilizing TrueTime, a MATLAB/ Simulink based tool. The paper describes TrueTime simulation blocks, our control system, simulation of Denial of Service (DoS) attack and its effects. The main aim was to assess the effectiveness and suitability of TrueTime for the intended use in the development of a larger scale SCADA testbed. The results shown reflect that TrueTime can be effectively used for the purpose of SCADA network simulations and collection of necessary data for security analysis.
监控和数据采集(SCADA)系统传统上是专有的,受到很好的保护。由于越来越多地使用商业/开源技术和通信协议,人们越来越关注相关的安全威胁。SCADA网络通常用于关键的基础设施,因此,研究界可以访问的实际系统的技术数据并不多。大多数研究人员通过开发测试平台来模拟SCADA的功能。这类项目通常很昂贵,需要资金赞助。在本文中,我们提出了一种简单、廉价和灵活的方法来开发一个SCADA测试平台,利用TrueTime,一个基于MATLAB/ Simulink的工具。本文介绍了TrueTime仿真模块、我们的控制系统、拒绝服务(DoS)攻击仿真及其影响。主要目的是评估TrueTime在开发更大规模SCADA测试平台中的有效性和适用性。结果表明,TrueTime可以有效地用于SCADA网络仿真和收集安全分析所需的数据。
{"title":"Cyber Security Backdrop: A SCADA testbed","authors":"A. A. Farooqui, S. S. Zaidi, A. Memon, S. Qazi","doi":"10.1109/ComComAp.2014.7017178","DOIUrl":"https://doi.org/10.1109/ComComAp.2014.7017178","url":null,"abstract":"Supervisory Control and Data Acquisition (SCADA) systems are traditionally proprietary and well protected. Due to increasing use of commercial/open source technology and communication protocols, there are growing concerns about the associated security threats. SCADA networks are usually employed in critical infrastructure, therefore, not much technical data of the actual systems is accessible to the research community. Most of the researchers simulate the SCADA functioning through development of testbed. Such projects are usually expensive and requiring financial sponsorship. In this paper we present a simple, inexpensive and flexible approach to develop a SCADA testbed utilizing TrueTime, a MATLAB/ Simulink based tool. The paper describes TrueTime simulation blocks, our control system, simulation of Denial of Service (DoS) attack and its effects. The main aim was to assess the effectiveness and suitability of TrueTime for the intended use in the development of a larger scale SCADA testbed. The results shown reflect that TrueTime can be effectively used for the purpose of SCADA network simulations and collection of necessary data for security analysis.","PeriodicalId":422906,"journal":{"name":"2014 IEEE Computers, Communications and IT Applications Conference","volume":"352 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134553852","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 31
Image latent semantic analysis based face recognition with ensemble extreme learning machine 基于图像潜在语义分析的集成极限学习机人脸识别
Pub Date : 2014-10-01 DOI: 10.1109/ComComAp.2014.7017214
Chao Wang, Ju Cheng Yang, Yarui Chen, Cao Wu, Yanbin Jiao
To overcome the shortcomings of the traditional methods, this paper proposes a novel face recognition method based on the image latent semantic features and ensemble extreme learning machine. The image latent semantic analysis is to acquire the high-level features from the face image, which has good robustness to illumination and expression changes. The image latent features are extracted as fellows: firstly, we obtain the low-level features of face image by the feature extraction methods of Gabor filter, local ternary pattern (LTP), and invariant moments. Then, we build the feature-image matrix based on the low-level features, and decompose the matrix with two dimension matrix decomposition to get the image latent semantic features. Finally, the ensemble extreme learning machine is used to classify the latent semantic features, which combines lots of extreme learning machine to obtain a stable classifier. The experimental results show that our proposed algorithm is more effective when compared with other algorithms.
针对传统人脸识别方法的不足,提出了一种基于图像潜在语义特征和集成极限学习机的人脸识别方法。图像潜在语义分析是从人脸图像中获取高级特征,对光照和表情变化具有较好的鲁棒性。首先,通过Gabor滤波、局部三元模式(LTP)和不变矩的特征提取方法获得人脸图像的底层特征;然后,基于底层特征构建特征-图像矩阵,并用二维矩阵分解对矩阵进行分解,得到图像的潜在语义特征。最后,利用集成极值学习机对潜在语义特征进行分类,将多个极值学习机组合在一起,得到一个稳定的分类器。实验结果表明,与其他算法相比,本文提出的算法更加有效。
{"title":"Image latent semantic analysis based face recognition with ensemble extreme learning machine","authors":"Chao Wang, Ju Cheng Yang, Yarui Chen, Cao Wu, Yanbin Jiao","doi":"10.1109/ComComAp.2014.7017214","DOIUrl":"https://doi.org/10.1109/ComComAp.2014.7017214","url":null,"abstract":"To overcome the shortcomings of the traditional methods, this paper proposes a novel face recognition method based on the image latent semantic features and ensemble extreme learning machine. The image latent semantic analysis is to acquire the high-level features from the face image, which has good robustness to illumination and expression changes. The image latent features are extracted as fellows: firstly, we obtain the low-level features of face image by the feature extraction methods of Gabor filter, local ternary pattern (LTP), and invariant moments. Then, we build the feature-image matrix based on the low-level features, and decompose the matrix with two dimension matrix decomposition to get the image latent semantic features. Finally, the ensemble extreme learning machine is used to classify the latent semantic features, which combines lots of extreme learning machine to obtain a stable classifier. The experimental results show that our proposed algorithm is more effective when compared with other algorithms.","PeriodicalId":422906,"journal":{"name":"2014 IEEE Computers, Communications and IT Applications Conference","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129650095","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The technical exploration of implementing hybrid TV with cloud computing in radio and TV industry 广电行业实现混合电视与云计算的技术探索
Pub Date : 2014-10-01 DOI: 10.1109/ComComAp.2014.7017201
Xiang Zheng, Fang Xiong, YaoNan Dai
Cloud computing is a new method, which provides computing capabilities on demand, integrates IT resources and services through public communication network, and offers users new types of service product and delivery model. In radio and TV industry, one important development area is hybrid TV during the transition from the mere broadcast institution to full-service provider. This paper based on the characteristic of cloud computing, tentatively proposes the solution provided by clouding computing for some problems in the implementation of hybrid TV, such as hybrid architecture, large-scale data, interaction of transmission system, and the variety of terminal requirement.
云计算是一种按需提供计算能力,通过公共通信网络整合IT资源和服务,为用户提供新型服务产品和交付模式的新方法。在广播电视行业中,从单纯的广播机构向全方位服务提供商转型的过程中,混合电视是一个重要的发展领域。本文根据云计算的特点,初步提出了云计算为混合电视实现中存在的混合架构、大规模数据、传输系统交互、终端需求多样化等问题提供的解决方案。
{"title":"The technical exploration of implementing hybrid TV with cloud computing in radio and TV industry","authors":"Xiang Zheng, Fang Xiong, YaoNan Dai","doi":"10.1109/ComComAp.2014.7017201","DOIUrl":"https://doi.org/10.1109/ComComAp.2014.7017201","url":null,"abstract":"Cloud computing is a new method, which provides computing capabilities on demand, integrates IT resources and services through public communication network, and offers users new types of service product and delivery model. In radio and TV industry, one important development area is hybrid TV during the transition from the mere broadcast institution to full-service provider. This paper based on the characteristic of cloud computing, tentatively proposes the solution provided by clouding computing for some problems in the implementation of hybrid TV, such as hybrid architecture, large-scale data, interaction of transmission system, and the variety of terminal requirement.","PeriodicalId":422906,"journal":{"name":"2014 IEEE Computers, Communications and IT Applications Conference","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126105813","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Software defined satellite networks: Benefits and challenges 软件定义卫星网络:优势与挑战
Pub Date : 2014-10-01 DOI: 10.1109/ComComAp.2014.7017183
Z. Tang, Bao-kang Zhao, Wanrong Yu, Zhenqian Feng, Chunqing Wu
To date, traditional satellite systems are contained-designed and inflexible for configuration update, space systems interconnections and providing fine-grained services. In this paper, we propose a novel satellite network architecture: software defined satellite networks (SDSN) to solve these problems. The new architecture is based on the central control patten of software defined networks (SDN), and takes full use of the inter-satellite links (ISLs) forwarding and GEO broadcasting for rapid network deployment. With global network view and central control ability, SDSN can (1) balance the flexibility and controllability of space dynamic routing algorithms, (2) rapidly deploy flexible and fine-grained network management strategies, (3) reduce the system cost, and (4) improve the collaboration between satellites and the compatibility of heterogeneous space systems. Meanwhile, the challenges are also introduced in designing and deploying the new architecture. Finally, the performance of the new SDSN architecture is validated in this paper.
迄今为止,传统的卫星系统在配置更新、空间系统互连和提供细粒度服务方面都是封闭设计和不灵活的。本文提出了一种新的卫星网络架构:软件定义卫星网络(SDSN)来解决这些问题。新架构基于软件定义网络(SDN)的中央控制模式,充分利用星间链路(isl)转发和GEO广播实现快速网络部署。SDSN具有全局网络视图和集中控制能力,可以(1)平衡空间动态路由算法的灵活性和可控性,(2)快速部署灵活和细粒度的网络管理策略,(3)降低系统成本,(4)提高卫星间的协作能力和异构空间系统的兼容性。同时,还介绍了在设计和部署新体系结构时所面临的挑战。最后,本文对新SDSN架构的性能进行了验证。
{"title":"Software defined satellite networks: Benefits and challenges","authors":"Z. Tang, Bao-kang Zhao, Wanrong Yu, Zhenqian Feng, Chunqing Wu","doi":"10.1109/ComComAp.2014.7017183","DOIUrl":"https://doi.org/10.1109/ComComAp.2014.7017183","url":null,"abstract":"To date, traditional satellite systems are contained-designed and inflexible for configuration update, space systems interconnections and providing fine-grained services. In this paper, we propose a novel satellite network architecture: software defined satellite networks (SDSN) to solve these problems. The new architecture is based on the central control patten of software defined networks (SDN), and takes full use of the inter-satellite links (ISLs) forwarding and GEO broadcasting for rapid network deployment. With global network view and central control ability, SDSN can (1) balance the flexibility and controllability of space dynamic routing algorithms, (2) rapidly deploy flexible and fine-grained network management strategies, (3) reduce the system cost, and (4) improve the collaboration between satellites and the compatibility of heterogeneous space systems. Meanwhile, the challenges are also introduced in designing and deploying the new architecture. Finally, the performance of the new SDSN architecture is validated in this paper.","PeriodicalId":422906,"journal":{"name":"2014 IEEE Computers, Communications and IT Applications Conference","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115307996","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 47
Optimized Bit Extraction of H.264-SVC MGS stream over error-prone channels H.264-SVC MGS流在易出错信道上的优化比特提取
Pub Date : 2014-10-01 DOI: 10.1109/ComComAp.2014.7017170
Zhao Kai, H. Cui, Tang Kun
Classical Bit Extraction algorithms can guarantee truncated scalable coded video stream with good reconstructed quality under error-free bandwidth limited channels. However, they are deficient in two folds: firstly, packet loss is not considered in the truncated rate-distortion model; secondly the reference of original video sequence is unavoidable. To overcome the above shortcomings, this paper firstly introduces a low complexity error propagation distortion model, in which error drift distortion due to rate truncation and packet loss can both be analyzed in the absence of the original sequence. Based on this model, an optimized bit extraction algorithm is proposed for the transmission of H.264/SVC MGS stream over bandwidth limited error-prone channels. Extensive simulation results show that, the error drift distortion of both base layer and enhancement layer can be accurately predicted based on the introduced error propagation distortion model. In addition, compared with the benchmark bit extraction algorithms provided by JSVM, our proposed algorithm can not only provide a higher reconstructed quality of truncated MGS video stream under various rate constraints and channel conditions, but as well achieve the promising performance with a much lower time complexity.
经典的比特提取算法可以保证在无差错带宽有限的信道下,截断的可扩展编码视频流具有良好的重构质量。然而,它们有两个不足:一是截断率失真模型没有考虑丢包问题;其次,原始视频序列的参考是不可避免的。为了克服上述缺点,本文首先引入了一种低复杂度的错误传播失真模型,该模型可以在没有原始序列的情况下分析由速率截断和丢包引起的错误漂移失真。基于该模型,提出了一种H.264/SVC MGS流在带宽受限易出错信道上传输的优化比特提取算法。大量的仿真结果表明,基于所引入的误差传播畸变模型,可以准确地预测基层和增强层的误差漂移畸变。此外,与JSVM提供的基准比特提取算法相比,我们提出的算法不仅可以在各种速率约束和信道条件下提供更高的截断MGS视频流重构质量,而且以更低的时间复杂度取得了令人满意的性能。
{"title":"Optimized Bit Extraction of H.264-SVC MGS stream over error-prone channels","authors":"Zhao Kai, H. Cui, Tang Kun","doi":"10.1109/ComComAp.2014.7017170","DOIUrl":"https://doi.org/10.1109/ComComAp.2014.7017170","url":null,"abstract":"Classical Bit Extraction algorithms can guarantee truncated scalable coded video stream with good reconstructed quality under error-free bandwidth limited channels. However, they are deficient in two folds: firstly, packet loss is not considered in the truncated rate-distortion model; secondly the reference of original video sequence is unavoidable. To overcome the above shortcomings, this paper firstly introduces a low complexity error propagation distortion model, in which error drift distortion due to rate truncation and packet loss can both be analyzed in the absence of the original sequence. Based on this model, an optimized bit extraction algorithm is proposed for the transmission of H.264/SVC MGS stream over bandwidth limited error-prone channels. Extensive simulation results show that, the error drift distortion of both base layer and enhancement layer can be accurately predicted based on the introduced error propagation distortion model. In addition, compared with the benchmark bit extraction algorithms provided by JSVM, our proposed algorithm can not only provide a higher reconstructed quality of truncated MGS video stream under various rate constraints and channel conditions, but as well achieve the promising performance with a much lower time complexity.","PeriodicalId":422906,"journal":{"name":"2014 IEEE Computers, Communications and IT Applications Conference","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123136950","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Combine dynamic time-slice scaling with DVFS for coordinating thermal and fairness on CPU 将动态时间片缩放与DVFS相结合,以协调CPU的散热和公平性
Pub Date : 2014-10-01 DOI: 10.1109/ComComAp.2014.7017169
Gangyong Jia, Guangjie Han
As power density increases with high technology, the high temperature has threatened the system performance, reliability and even system safety. Develop a thermal management for reducing temperature, but without disturbing fairness, is becoming more and more important. Therefore, in this paper, we propose a DTS-DVFS management which combines Dynamic Time-Slice Scaling (DTS) with Dynamic Voltage and Frequency Scaling (DVFS). Through fine-grained thermal characterization based on task behavior, dynamically determine both Time-slice Scaling factor (TSF) and Voltage and Frequency Scaling factor (VSF) for each task on real-time which not only reduces temperature but also retains fairness. Besides scaling both time-slice and voltage and frequency for each task according to TSF and VSF respectively, combining alternative scheduling scheme based on boosting thermal model which predicts the temperature of the chip. Through our experiments in real machine, results demonstrate our proposed policy can reduce the chip average and peak temperature maximums by 4.2°C and 2.9°C with negligible fairness loss.
随着技术含量的提高,功率密度不断增大,高温对系统的性能、可靠性甚至系统安全都构成了威胁。开发一种既能降低温度又不影响公平性的热管理方法,显得越来越重要。因此,本文提出了一种将动态时间片缩放(DTS)和动态电压频率缩放(DVFS)相结合的DTS-DVFS管理方法。通过基于任务行为的细粒度热表征,实时动态确定每个任务的时间片比例因子(TSF)和电压频率比例因子(VSF),既降低了温度,又保持了公平性。除了分别根据TSF和VSF对每个任务进行时间片缩放和电压频率缩放外,还结合了基于boost热模型预测芯片温度的备选调度方案。通过我们在真实机器上的实验,结果表明我们提出的策略可以将芯片的平均温度和峰值温度分别降低4.2°C和2.9°C,而公平性损失可以忽略不计。
{"title":"Combine dynamic time-slice scaling with DVFS for coordinating thermal and fairness on CPU","authors":"Gangyong Jia, Guangjie Han","doi":"10.1109/ComComAp.2014.7017169","DOIUrl":"https://doi.org/10.1109/ComComAp.2014.7017169","url":null,"abstract":"As power density increases with high technology, the high temperature has threatened the system performance, reliability and even system safety. Develop a thermal management for reducing temperature, but without disturbing fairness, is becoming more and more important. Therefore, in this paper, we propose a DTS-DVFS management which combines Dynamic Time-Slice Scaling (DTS) with Dynamic Voltage and Frequency Scaling (DVFS). Through fine-grained thermal characterization based on task behavior, dynamically determine both Time-slice Scaling factor (TSF) and Voltage and Frequency Scaling factor (VSF) for each task on real-time which not only reduces temperature but also retains fairness. Besides scaling both time-slice and voltage and frequency for each task according to TSF and VSF respectively, combining alternative scheduling scheme based on boosting thermal model which predicts the temperature of the chip. Through our experiments in real machine, results demonstrate our proposed policy can reduce the chip average and peak temperature maximums by 4.2°C and 2.9°C with negligible fairness loss.","PeriodicalId":422906,"journal":{"name":"2014 IEEE Computers, Communications and IT Applications Conference","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125111818","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Event-based organization model for sensing data 基于事件的传感数据组织模型
Pub Date : 2014-10-01 DOI: 10.1109/ComComAp.2014.7017203
Yunchuan Sun, Junsheng Zhang, R. Bie, Hongli Yan, Ye Xia, Zhangbing Zhou
Large scaled sensing data are continuously generated by the trillions of sensing devices in the Internet of Things(IoT). It becomes a big challenge to organize and manage these sensing data. In this paper, we propose an event-based organizing model, Event-Linked Network(ELN), to manage the big sensing data. Several different types of queries are also explored, which are different from the queries on traditional relational databases.
物联网(IoT)中数以万亿计的传感设备不断产生大规模的传感数据。如何组织和管理这些传感数据成为一个巨大的挑战。在本文中,我们提出了一种基于事件的组织模型——事件链接网络(Event-Linked Network, ELN)来管理大传感数据。本文还探讨了几种不同类型的查询,这些查询与传统关系数据库上的查询不同。
{"title":"Event-based organization model for sensing data","authors":"Yunchuan Sun, Junsheng Zhang, R. Bie, Hongli Yan, Ye Xia, Zhangbing Zhou","doi":"10.1109/ComComAp.2014.7017203","DOIUrl":"https://doi.org/10.1109/ComComAp.2014.7017203","url":null,"abstract":"Large scaled sensing data are continuously generated by the trillions of sensing devices in the Internet of Things(IoT). It becomes a big challenge to organize and manage these sensing data. In this paper, we propose an event-based organizing model, Event-Linked Network(ELN), to manage the big sensing data. Several different types of queries are also explored, which are different from the queries on traditional relational databases.","PeriodicalId":422906,"journal":{"name":"2014 IEEE Computers, Communications and IT Applications Conference","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125202754","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2014 IEEE Computers, Communications and IT Applications Conference
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1