首页 > 最新文献

2016 IEEE 10th International Conference on Application of Information and Communication Technologies (AICT)最新文献

英文 中文
Development of intelligent learning system based on the ontological approach 基于本体论方法的智能学习系统开发
A. Afanasyev, N. N. Voit, D. Kanev
The paper has analyzed the current methods for developing automated adaptive learning systems. The authors have proposed the adaptive learning system based on the author's method of the synthesis of a learning path and the set of main models (models of subject domain, designer' profile, test) for training designers. The paper has presented the problems relating to the development of learning system architecture.
本文分析了目前开发自动自适应学习系统的方法。基于作者提出的学习路径与主要模型集(学科领域模型、设计师简介模型、测试模型)相结合的方法,提出了一套用于培养设计师的自适应学习系统。本文提出了与学习系统架构开发有关的问题。
{"title":"Development of intelligent learning system based on the ontological approach","authors":"A. Afanasyev, N. N. Voit, D. Kanev","doi":"10.1109/ICAICT.2016.7991794","DOIUrl":"https://doi.org/10.1109/ICAICT.2016.7991794","url":null,"abstract":"The paper has analyzed the current methods for developing automated adaptive learning systems. The authors have proposed the adaptive learning system based on the author's method of the synthesis of a learning path and the set of main models (models of subject domain, designer' profile, test) for training designers. The paper has presented the problems relating to the development of learning system architecture.","PeriodicalId":446472,"journal":{"name":"2016 IEEE 10th International Conference on Application of Information and Communication Technologies (AICT)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129056227","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Fuzzy method of revealing implicit causality within a control system 揭示控制系统内隐含因果关系的模糊方法
D. Nazarov, S. V. Begicheva, D. A. Azarov
The article addresses the problem of identifying subtle causal relations between sets of data defining a control system. The key pros and cons of using a fuzzy method are later examined. It explains the primary aspects of the fuzzy model for revealing implicit causality within a control system based on a combination of a fuzzy set approach and data mining techniques. The tool for carrying out evaluation in natural language resulting from utilizing an automated learning algorithm is advanced afterwards. The paper lastly proves its applicability to modeling mutual effects of a number of economic objects on each other.
本文讨论了在定义控制系统的数据集之间识别微妙的因果关系的问题。使用模糊方法的主要优点和缺点将在后面讨论。它解释了基于模糊集方法和数据挖掘技术相结合的控制系统中揭示隐含因果关系的模糊模型的主要方面。随后提出了利用自动学习算法在自然语言中进行评估的工具。最后证明了该方法对多个经济对象之间相互影响的建模的适用性。
{"title":"Fuzzy method of revealing implicit causality within a control system","authors":"D. Nazarov, S. V. Begicheva, D. A. Azarov","doi":"10.1109/ICAICT.2016.7991681","DOIUrl":"https://doi.org/10.1109/ICAICT.2016.7991681","url":null,"abstract":"The article addresses the problem of identifying subtle causal relations between sets of data defining a control system. The key pros and cons of using a fuzzy method are later examined. It explains the primary aspects of the fuzzy model for revealing implicit causality within a control system based on a combination of a fuzzy set approach and data mining techniques. The tool for carrying out evaluation in natural language resulting from utilizing an automated learning algorithm is advanced afterwards. The paper lastly proves its applicability to modeling mutual effects of a number of economic objects on each other.","PeriodicalId":446472,"journal":{"name":"2016 IEEE 10th International Conference on Application of Information and Communication Technologies (AICT)","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115994681","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Towards optimization of availability and cost in selection of geo-distributed clouds datacenter 地理分布式云数据中心选择的可用性和成本优化
Hasan Ziafat, S. M. Babamir
With increasing data clouds in different geographical areas, the availability of a datacenter and the cost of using the datacenter are two concerned factors of clouds users. The present research aims to present a method using K-means clustering and NSGA-II multi-objective algorithm to maximize availability and minimizes cost in selecting a datacenter. The proposed approach was applied to some real geographically distributed datacenters. Results showed that proposed approach outperforms greedy and random common algorithms.
随着不同地理区域的数据云的增加,数据中心的可用性和使用数据中心的成本是云用户关心的两个因素。本研究旨在提出一种利用k -均值聚类和NSGA-II多目标算法实现可用性最大化和成本最小化的数据中心选择方法。将该方法应用于实际的地理分布式数据中心。结果表明,该方法优于贪婪算法和随机算法。
{"title":"Towards optimization of availability and cost in selection of geo-distributed clouds datacenter","authors":"Hasan Ziafat, S. M. Babamir","doi":"10.1109/ICAICT.2016.7991769","DOIUrl":"https://doi.org/10.1109/ICAICT.2016.7991769","url":null,"abstract":"With increasing data clouds in different geographical areas, the availability of a datacenter and the cost of using the datacenter are two concerned factors of clouds users. The present research aims to present a method using K-means clustering and NSGA-II multi-objective algorithm to maximize availability and minimizes cost in selecting a datacenter. The proposed approach was applied to some real geographically distributed datacenters. Results showed that proposed approach outperforms greedy and random common algorithms.","PeriodicalId":446472,"journal":{"name":"2016 IEEE 10th International Conference on Application of Information and Communication Technologies (AICT)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117210336","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
The impact of pulse shaping filters on OFDM-based visible light communications 脉冲整形滤波器对ofdm可见光通信的影响
Omer Narmanlioglu, Refik Caglar Kizilirmak, M. Uysal
This paper discusses the impact of pulse shaping filter on the performance of orthogonal frequency division multiplexing (OFDM) based visible light communication (VLC) systems. Particularly, direct current biased optical OFDM (DCO-OFDM) with square-root-raised-cosine (SRRC) pulse shaping filters is investigated. The bit-error-rate (BER) performance of the system is evaluated for different excess bandwidth parameters (roll-off factors) and compared with the performance with rectangular pulse shaping filter through Monte Carlo simulations.
本文讨论了脉冲整形滤波器对正交频分复用(OFDM)可见光通信(VLC)系统性能的影响。特别地,研究了带有平方根提高余弦脉冲整形滤波器的直流偏置光OFDM (DCO-OFDM)。通过蒙特卡罗仿真,对不同超额带宽参数(滚降因子)下系统的误码率性能进行了评价,并与矩形脉冲整形滤波器的性能进行了比较。
{"title":"The impact of pulse shaping filters on OFDM-based visible light communications","authors":"Omer Narmanlioglu, Refik Caglar Kizilirmak, M. Uysal","doi":"10.1109/ICAICT.2016.7991796","DOIUrl":"https://doi.org/10.1109/ICAICT.2016.7991796","url":null,"abstract":"This paper discusses the impact of pulse shaping filter on the performance of orthogonal frequency division multiplexing (OFDM) based visible light communication (VLC) systems. Particularly, direct current biased optical OFDM (DCO-OFDM) with square-root-raised-cosine (SRRC) pulse shaping filters is investigated. The bit-error-rate (BER) performance of the system is evaluated for different excess bandwidth parameters (roll-off factors) and compared with the performance with rectangular pulse shaping filter through Monte Carlo simulations.","PeriodicalId":446472,"journal":{"name":"2016 IEEE 10th International Conference on Application of Information and Communication Technologies (AICT)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115483925","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Information interaction of decentralized group control of unmanned vehicles 无人驾驶车辆分散群控的信息交互
S. Tikhonov, R. Sirazetdinov, N. R. Surkin
In this article, we research decentralized group (swarm) of unmanned vehicles two-level control, as a set of material points. We provide methods for information exchange in the group and algorithms of distributed control based on imitation of different aggregate states of matter by a group of unmanned vehicles. In the article, we review three swarm “aggregate states”: solid, liquid and gas, examine issues of sustainability of the system in different variants of the aggregation state simulating algorithms.
在本文中,我们研究了分散群(群)无人驾驶车辆的两级控制,作为一组物质点。提出了群内信息交换的方法和基于群内不同物质聚合状态的分布式控制算法。在本文中,我们回顾了三种群体的“聚集状态”:固体、液体和气体,并研究了系统在不同的聚集状态模拟算法下的可持续性问题。
{"title":"Information interaction of decentralized group control of unmanned vehicles","authors":"S. Tikhonov, R. Sirazetdinov, N. R. Surkin","doi":"10.1109/ICAICT.2016.7991704","DOIUrl":"https://doi.org/10.1109/ICAICT.2016.7991704","url":null,"abstract":"In this article, we research decentralized group (swarm) of unmanned vehicles two-level control, as a set of material points. We provide methods for information exchange in the group and algorithms of distributed control based on imitation of different aggregate states of matter by a group of unmanned vehicles. In the article, we review three swarm “aggregate states”: solid, liquid and gas, examine issues of sustainability of the system in different variants of the aggregation state simulating algorithms.","PeriodicalId":446472,"journal":{"name":"2016 IEEE 10th International Conference on Application of Information and Communication Technologies (AICT)","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126187084","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Batch clustering algorithm for big data sets 大数据集的批处理聚类算法
R. Alguliyev, R. Aliguliyev, A. Bagirov, R. Karimov
Vast spread of computing technologies has led to abundance of large data sets. Today tech companies like, Google, Facebook, Twitter and Amazon handle big data sets and log terabytes, if not petabytes, of data per day. Thus, there is a need to find similarities and define groupings among the elements of these big data sets. One of the ways to find these similarities is data clustering. Currently, there exist several data clustering algorithms which differ by their application area and efficiency. Increase in computational power and algorithmic improvements have reduced the time for clustering of big data sets. But it usually happens that big data sets can't be processed whole due to hardware and computational restrictions. In this paper, the classic k-means clustering algorithm is compared to the proposed batch clustering (BC) algorithm for the required computation time and objective function. The BC algorithm is designed to cluster large data sets in batches but maintain the efficiency and quality. Several experiments confirm that batch clustering algorithm for big data sets is more efficient in using computational power, data storage and results in better clustering compared to k-means algorithm. The experiments are conducted with the data set of 2 (two) million two-dimensional data points.
计算技术的广泛传播导致了大量的大型数据集。今天,像谷歌、Facebook、Twitter和亚马逊这样的科技公司每天处理的大数据集和记录的数据即使不是拍字节,也有几兆兆字节。因此,有必要在这些大数据集的元素之间找到相似之处并定义分组。找到这些相似性的方法之一是数据聚类。目前存在着几种数据聚类算法,它们的应用领域和效率各不相同。计算能力的提高和算法的改进减少了大数据集聚类的时间。但通常情况下,由于硬件和计算的限制,大数据集不能被完整地处理。本文将经典k-means聚类算法与本文提出的批聚类(BC)算法在计算时间和目标函数上进行了比较。BC算法的目的是在保证效率和质量的前提下,对大型数据集进行批量聚类。几个实验证实,与k-means算法相比,大数据集的批聚类算法在计算能力、数据存储和聚类结果方面更有效。实验数据集为2(200)万个二维数据点。
{"title":"Batch clustering algorithm for big data sets","authors":"R. Alguliyev, R. Aliguliyev, A. Bagirov, R. Karimov","doi":"10.1109/ICAICT.2016.7991657","DOIUrl":"https://doi.org/10.1109/ICAICT.2016.7991657","url":null,"abstract":"Vast spread of computing technologies has led to abundance of large data sets. Today tech companies like, Google, Facebook, Twitter and Amazon handle big data sets and log terabytes, if not petabytes, of data per day. Thus, there is a need to find similarities and define groupings among the elements of these big data sets. One of the ways to find these similarities is data clustering. Currently, there exist several data clustering algorithms which differ by their application area and efficiency. Increase in computational power and algorithmic improvements have reduced the time for clustering of big data sets. But it usually happens that big data sets can't be processed whole due to hardware and computational restrictions. In this paper, the classic k-means clustering algorithm is compared to the proposed batch clustering (BC) algorithm for the required computation time and objective function. The BC algorithm is designed to cluster large data sets in batches but maintain the efficiency and quality. Several experiments confirm that batch clustering algorithm for big data sets is more efficient in using computational power, data storage and results in better clustering compared to k-means algorithm. The experiments are conducted with the data set of 2 (two) million two-dimensional data points.","PeriodicalId":446472,"journal":{"name":"2016 IEEE 10th International Conference on Application of Information and Communication Technologies (AICT)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124296981","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Usage of fuzzy extractors in a handwritten-signature based technology of protecting a hybrid document management system 模糊提取器在基于手写签名的混合文件管理系统保护技术中的应用
P. Lozhnikov, A. Sulavko, D. Volkov
The paper covers the issue of protecting private keys of a digital signature in a hybrid document management system. It proposes a method of generating private keys based on a handwritten signature using a method of building a reference signature description. The method demonstrates the following indicators of reliability: FRR=0.148, FAR=0.05 when the length of the key is 304 bits.
研究了混合文件管理系统中数字签名私钥的保护问题。提出了一种基于手写签名生成私钥的方法,该方法采用构建参考签名描述的方法。该方法的可靠性指标如下:当密钥长度为304位时,FRR=0.148, FAR=0.05。
{"title":"Usage of fuzzy extractors in a handwritten-signature based technology of protecting a hybrid document management system","authors":"P. Lozhnikov, A. Sulavko, D. Volkov","doi":"10.1109/ICAICT.2016.7991728","DOIUrl":"https://doi.org/10.1109/ICAICT.2016.7991728","url":null,"abstract":"The paper covers the issue of protecting private keys of a digital signature in a hybrid document management system. It proposes a method of generating private keys based on a handwritten signature using a method of building a reference signature description. The method demonstrates the following indicators of reliability: FRR=0.148, FAR=0.05 when the length of the key is 304 bits.","PeriodicalId":446472,"journal":{"name":"2016 IEEE 10th International Conference on Application of Information and Communication Technologies (AICT)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123497257","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Construction of individual educational trajectory of students based on e-learning 基于e-learning的学生个性化教育轨迹构建
Rinat R. Ibatullin, E. Anisimova
The most important task of the modern education system is implementation of individual educational trajectory of each student. In this regard, adaptation of the educational process to personality development of each student becomes extremely necessary. One of the ways of tackling the ensuing problem is e-learning as a model of organization of interaction between the teacher, student and information technologies. Currently, there are developed plenty of distance learning courses personifying learning process. This article describes the use of e-learning courses on the example of such disciplines as “Economic Informatics” and “Numerical Methods”, their influence on the construction of individual educational trajectory of students; as well the paper analyses the impact of e-learning courses on the quality of students' academic achievement.
现代教育体系最重要的任务是实现每个学生的个性化教育轨迹。在这方面,使教育过程适应每个学生的个性发展是非常必要的。解决随之而来的问题的方法之一是将电子学习作为教师、学生和信息技术之间互动的组织模式。目前,开发了大量的远程学习课程,将学习过程人格化。本文以“经济信息学”和“数值方法”等学科为例,阐述了电子学习课程的应用对学生个体教育轨迹构建的影响;文章还分析了网络学习课程对学生学业成绩质量的影响。
{"title":"Construction of individual educational trajectory of students based on e-learning","authors":"Rinat R. Ibatullin, E. Anisimova","doi":"10.1109/ICAICT.2016.7991799","DOIUrl":"https://doi.org/10.1109/ICAICT.2016.7991799","url":null,"abstract":"The most important task of the modern education system is implementation of individual educational trajectory of each student. In this regard, adaptation of the educational process to personality development of each student becomes extremely necessary. One of the ways of tackling the ensuing problem is e-learning as a model of organization of interaction between the teacher, student and information technologies. Currently, there are developed plenty of distance learning courses personifying learning process. This article describes the use of e-learning courses on the example of such disciplines as “Economic Informatics” and “Numerical Methods”, their influence on the construction of individual educational trajectory of students; as well the paper analyses the impact of e-learning courses on the quality of students' academic achievement.","PeriodicalId":446472,"journal":{"name":"2016 IEEE 10th International Conference on Application of Information and Communication Technologies (AICT)","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121824508","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Anomaly detection in network traffic using extreme learning machine 基于极限学习机的网络流量异常检测
Y. Imamverdiyev, L. Sukhostat
Intrusion detection systems are one of the most relevant security features against network attacks. Machine learning methods are used to analyze network traffic parameters for the presence of an attack signs. In this paper, extreme learning machine method is considered for intrusion detection in network traffic. The experimental results lead to the conclusion of practical significance of the proposed approach for attacks detection in network traffic.
入侵检测系统是抵御网络攻击最相关的安全特性之一。机器学习方法用于分析网络流量参数是否存在攻击迹象。本文将极限学习机方法应用于网络流量中的入侵检测。实验结果表明,该方法对网络流量攻击检测具有实际意义。
{"title":"Anomaly detection in network traffic using extreme learning machine","authors":"Y. Imamverdiyev, L. Sukhostat","doi":"10.1109/ICAICT.2016.7991732","DOIUrl":"https://doi.org/10.1109/ICAICT.2016.7991732","url":null,"abstract":"Intrusion detection systems are one of the most relevant security features against network attacks. Machine learning methods are used to analyze network traffic parameters for the presence of an attack signs. In this paper, extreme learning machine method is considered for intrusion detection in network traffic. The experimental results lead to the conclusion of practical significance of the proposed approach for attacks detection in network traffic.","PeriodicalId":446472,"journal":{"name":"2016 IEEE 10th International Conference on Application of Information and Communication Technologies (AICT)","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121751456","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
Performance of OFDM-based adaptive visible light communications 基于ofdm的自适应可见光通信性能研究
Omer Narmanlioglu, Refik Caglar Kizilirmak, M. Uysal
In this paper, we investigate the performance of a direct current biased optical orthogonal frequency division multiplexing (DCO-OFDM) based adaptive transmission in the context of visible light communication (VLC). We consider the reference channel model (Scenario I) of IEEE 802.15.7r1 where an indoor office room is considered and channel impulse responses are presented for 24 different points. Our results reveal that high data rates such as 100 Mbps can be achieved with the choice of optimal modulation order according to channel conditions, while non-adaptive transmission based on the worst-case design provides only 14 Mbps under the consideration of target bit-error-rate (BER) of 10−3.
本文研究了在可见光通信(VLC)环境下基于直流偏置光正交频分复用(DCO-OFDM)的自适应传输的性能。我们考虑IEEE 802.15.7r1的参考信道模型(场景I),其中考虑了室内办公室,并给出了24个不同点的信道脉冲响应。我们的研究结果表明,根据信道条件选择最优调制顺序可以实现100 Mbps的高数据速率,而基于最坏情况设计的非自适应传输在考虑目标误码率(BER)为10−3的情况下仅提供14 Mbps。
{"title":"Performance of OFDM-based adaptive visible light communications","authors":"Omer Narmanlioglu, Refik Caglar Kizilirmak, M. Uysal","doi":"10.1109/ICAICT.2016.7991759","DOIUrl":"https://doi.org/10.1109/ICAICT.2016.7991759","url":null,"abstract":"In this paper, we investigate the performance of a direct current biased optical orthogonal frequency division multiplexing (DCO-OFDM) based adaptive transmission in the context of visible light communication (VLC). We consider the reference channel model (Scenario I) of IEEE 802.15.7r1 where an indoor office room is considered and channel impulse responses are presented for 24 different points. Our results reveal that high data rates such as 100 Mbps can be achieved with the choice of optimal modulation order according to channel conditions, while non-adaptive transmission based on the worst-case design provides only 14 Mbps under the consideration of target bit-error-rate (BER) of 10−3.","PeriodicalId":446472,"journal":{"name":"2016 IEEE 10th International Conference on Application of Information and Communication Technologies (AICT)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123139386","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
2016 IEEE 10th International Conference on Application of Information and Communication Technologies (AICT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1