首页 > 最新文献

16th International Conference on Advanced Communication Technology最新文献

英文 中文
Survey on LEACH-based security protocols 基于leach的安全协议综述
Pub Date : 2014-03-27 DOI: 10.1109/ICACT.2014.6778970
T. M. Rahayu, Sanggon Lee, Hoon-Jae Lee
Energy efficiency is one of the major concerns in designing protocols for WSNs. One of the energy-efficient communication protocols for this network is LEACH that works on cluster-based homogeneous WSNs. Though LEACH is energy-efficient but it does not take security into account. Because WSNs are usually deployed in remote and hostile areas, security becomes a concern in designing a protocol. In this paper we present our security analysis of five security protocols that have been proposed to strengthen LEACH protocols. Those protocols are SLEACH, SecLEACH, SC-LEACH, Armor LEACH and MS-LEACH.
能源效率是无线传感器网络协议设计的主要问题之一。该网络的节能通信协议之一是LEACH协议,该协议适用于基于集群的同构wsn。虽然LEACH是节能的,但它没有考虑到安全性。由于无线传感器网络通常部署在偏远和敌对地区,因此安全成为设计协议时需要考虑的问题。在本文中,我们提出了我们的安全分析,已经提出了五个安全协议,以加强LEACH协议。这些协议是SLEACH, SecLEACH, SC-LEACH, Armor LEACH和MS-LEACH。
{"title":"Survey on LEACH-based security protocols","authors":"T. M. Rahayu, Sanggon Lee, Hoon-Jae Lee","doi":"10.1109/ICACT.2014.6778970","DOIUrl":"https://doi.org/10.1109/ICACT.2014.6778970","url":null,"abstract":"Energy efficiency is one of the major concerns in designing protocols for WSNs. One of the energy-efficient communication protocols for this network is LEACH that works on cluster-based homogeneous WSNs. Though LEACH is energy-efficient but it does not take security into account. Because WSNs are usually deployed in remote and hostile areas, security becomes a concern in designing a protocol. In this paper we present our security analysis of five security protocols that have been proposed to strengthen LEACH protocols. Those protocols are SLEACH, SecLEACH, SC-LEACH, Armor LEACH and MS-LEACH.","PeriodicalId":6380,"journal":{"name":"16th International Conference on Advanced Communication Technology","volume":"27 1","pages":"304-309"},"PeriodicalIF":0.0,"publicationDate":"2014-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85426301","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 25
Method and utility for recovering code algorithms of telecommunication devices for vulnerability search 一种用于漏洞搜索的电信设备代码算法的恢复方法和实用程序
Pub Date : 2014-03-27 DOI: 10.1109/ICACT.2014.6778943
M. Buinevich, K. Izrailov
The article describes a method for searching vulnerabilities in machine code based on the analysis of its algorithmized representation obtained with the help of an utility being a part of the method. Vulnerability search falls within the field of telecommunication devices. Phase-by-phase description of the method is discussed, as well as the software architecture of the utility and their limitations in terms of application and preliminary effectiveness estimate results. A forecast is given as to developing the method and the utility in the near future.
本文介绍了一种查找机器码漏洞的方法,通过分析机器码漏洞的算法表示,利用该方法中的一个实用程序对机器码漏洞进行搜索。漏洞搜索属于电信设备领域。讨论了该方法的分阶段描述,以及实用程序的软件体系结构及其在应用和初步有效性评估结果方面的局限性。对该方法的发展和应用前景作了展望。
{"title":"Method and utility for recovering code algorithms of telecommunication devices for vulnerability search","authors":"M. Buinevich, K. Izrailov","doi":"10.1109/ICACT.2014.6778943","DOIUrl":"https://doi.org/10.1109/ICACT.2014.6778943","url":null,"abstract":"The article describes a method for searching vulnerabilities in machine code based on the analysis of its algorithmized representation obtained with the help of an utility being a part of the method. Vulnerability search falls within the field of telecommunication devices. Phase-by-phase description of the method is discussed, as well as the software architecture of the utility and their limitations in terms of application and preliminary effectiveness estimate results. A forecast is given as to developing the method and the utility in the near future.","PeriodicalId":6380,"journal":{"name":"16th International Conference on Advanced Communication Technology","volume":"48 1","pages":"172-176"},"PeriodicalIF":0.0,"publicationDate":"2014-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80858617","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Brain Machine Interface for wrist movement using Robotic Arm 脑机接口的手腕运动使用机械臂
Pub Date : 2014-03-27 DOI: 10.1109/ICACT.2014.6779014
Sidhika Varshney, Bhoomika Gaur, Omar Farooq, Y. Khan
Brain Machine Interface (BMI) has made it possible for the disabled people to communicate with the external machine using their own senses. In the field of BMI, the invasive techniques have been widely used. This paper deals with the study of features of Electroencephalography (EEG), a non invasive technique that has been used for classifying two classes of movements, namely Extension and Flexion. Classification of movements is done on the basis of energy, entropy, skewness, kurtosis and their various combinations. The maximum accuracy of 91.93% has been obtained using discrete cosine transformation of energy and entropy. Finally the detected wrist movement is implemented on a mechanical Robotic Arm using ARDUINO UNO and MATLAB.
脑机接口(BMI)使残疾人能够利用自己的感官与外部机器进行交流。在BMI领域,有创技术得到了广泛的应用。本文研究了脑电图(EEG)的特征,脑电图是一种非侵入性技术,已被用于分类两类运动,即伸展和屈曲。运动分类是根据能量、熵、偏度、峰度及其各种组合进行的。利用能量和熵的离散余弦变换,获得了91.93%的最高精度。最后利用ARDUINO、UNO和MATLAB在机械臂上实现检测到的手腕运动。
{"title":"Brain Machine Interface for wrist movement using Robotic Arm","authors":"Sidhika Varshney, Bhoomika Gaur, Omar Farooq, Y. Khan","doi":"10.1109/ICACT.2014.6779014","DOIUrl":"https://doi.org/10.1109/ICACT.2014.6779014","url":null,"abstract":"Brain Machine Interface (BMI) has made it possible for the disabled people to communicate with the external machine using their own senses. In the field of BMI, the invasive techniques have been widely used. This paper deals with the study of features of Electroencephalography (EEG), a non invasive technique that has been used for classifying two classes of movements, namely Extension and Flexion. Classification of movements is done on the basis of energy, entropy, skewness, kurtosis and their various combinations. The maximum accuracy of 91.93% has been obtained using discrete cosine transformation of energy and entropy. Finally the detected wrist movement is implemented on a mechanical Robotic Arm using ARDUINO UNO and MATLAB.","PeriodicalId":6380,"journal":{"name":"16th International Conference on Advanced Communication Technology","volume":"5 1","pages":"518-522"},"PeriodicalIF":0.0,"publicationDate":"2014-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88237186","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A novel approach of automatic music genre classification based on timbrai texture and rhythmic content features 一种基于音色织体和节奏内容特征的音乐类型自动分类方法
Pub Date : 2014-03-27 DOI: 10.1109/ICACT.2014.6778929
B. K. Baniya, D. Ghimire, Joonwhoan Lee
Music genre classification is an essential component for the music information retrieval system. There are two important components to be considered for better genre classification, which are audio feature extraction and classifier. This paper incorporates two different kinds of features for genre classification, timbrai texture and rhythmic content features. Timbrai texture contains the Mel-frequency Cepstral Coefficient (MFCC) with other several spectral features. Before choosing a timbrai feature we explore which feature plays an insignificant role on genre discrimination. This facilitates the reduction of feature dimension. For the timbrai features up to the 4-th order central moments and the covariance components of mutual features are considered to improve the overall classification result. For the rhythmic content the features extracted from beat histogram are selected. In the paper Extreme Learning Machine (ELM) with bagging is used as the classifier for classifying the genres. Based on the proposed feature sets and classifier, experiment is performed with well-known datasets: GTZAN with ten different music genres. The proposed method acquires better classification accuracy compared to the existing methodologies.
音乐体裁分类是音乐信息检索系统的重要组成部分。为了更好地进行类型分类,需要考虑两个重要的组成部分,即音频特征提取和分类器。本文结合两种不同类型的特征进行体裁分类,即音色织体特征和节奏内容特征。音色纹理包含Mel-frequency倒谱系数(MFCC)和其他几个频谱特征。在选择音色特征之前,我们先探讨哪些特征对类型判别的作用不显著。这有利于特征维数的降维。对于4阶中心矩以下的音色特征,考虑相互特征的协方差分量,提高整体分类效果。对于节奏内容,选择从节拍直方图中提取的特征。本文采用带bagging的极限学习机(ELM)作为分类器对文体进行分类。基于所提出的特征集和分类器,使用10种不同音乐类型的知名数据集GTZAN进行实验。与现有的分类方法相比,该方法具有更好的分类精度。
{"title":"A novel approach of automatic music genre classification based on timbrai texture and rhythmic content features","authors":"B. K. Baniya, D. Ghimire, Joonwhoan Lee","doi":"10.1109/ICACT.2014.6778929","DOIUrl":"https://doi.org/10.1109/ICACT.2014.6778929","url":null,"abstract":"Music genre classification is an essential component for the music information retrieval system. There are two important components to be considered for better genre classification, which are audio feature extraction and classifier. This paper incorporates two different kinds of features for genre classification, timbrai texture and rhythmic content features. Timbrai texture contains the Mel-frequency Cepstral Coefficient (MFCC) with other several spectral features. Before choosing a timbrai feature we explore which feature plays an insignificant role on genre discrimination. This facilitates the reduction of feature dimension. For the timbrai features up to the 4-th order central moments and the covariance components of mutual features are considered to improve the overall classification result. For the rhythmic content the features extracted from beat histogram are selected. In the paper Extreme Learning Machine (ELM) with bagging is used as the classifier for classifying the genres. Based on the proposed feature sets and classifier, experiment is performed with well-known datasets: GTZAN with ten different music genres. The proposed method acquires better classification accuracy compared to the existing methodologies.","PeriodicalId":6380,"journal":{"name":"16th International Conference on Advanced Communication Technology","volume":"32 1","pages":"96-102"},"PeriodicalIF":0.0,"publicationDate":"2014-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78211211","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Bit error rate analysis for V-BLAST/STBC using interference cancellation techniques 利用干扰抵消技术分析V-BLAST/STBC的误码率
Pub Date : 2014-03-27 DOI: 10.1109/ICACT.2014.6778940
C. Kotchasarn
Multiple Input Multiple Output (MIMO) systems have been extensively studied in context of wireless communication systems, which promising the both increased capacity and link level reliability. In this paper, we proposed the interference cancellation techniques for V-BLAST/STBC architecture, which integrates Alamouti space-time block code (STBC) layer together with vertical Bell-laboratories (V-BLAST) layer. In this work, we employ four transmit and three receive antennas over frequency flat Rayleigh fading channel. This paper presents signal detectors for V-BLAST/STBC with minimum mean square error (MMSE), zero forcing (ZF), parallel interference cancellation (PIC) and successive interference cancellation-zero forcing with binary phase shift keying (BPSK). Simulation results show the bit error rate performance degradation and the computational complexity of the joint optimal detection is better than the other detection technique.
多输入多输出(MIMO)系统在无线通信系统中得到了广泛的研究,它有望提高容量和链路级可靠性。本文提出了将Alamouti空时分组码(STBC)层与垂直贝尔实验室(V-BLAST)层相结合的V-BLAST/STBC体系结构的干扰消除技术。在这项工作中,我们在频率平坦的瑞利衰落信道上使用了四个发射天线和三个接收天线。本文提出了具有最小均方误差(MMSE)、零强制(ZF)、并行干扰消除(PIC)和二元相移键控(BPSK)的连续干扰消除零强制(BPSK)的V-BLAST/STBC信号检测器。仿真结果表明,联合最优检测的误码率性能下降,计算复杂度优于其他检测技术。
{"title":"Bit error rate analysis for V-BLAST/STBC using interference cancellation techniques","authors":"C. Kotchasarn","doi":"10.1109/ICACT.2014.6778940","DOIUrl":"https://doi.org/10.1109/ICACT.2014.6778940","url":null,"abstract":"Multiple Input Multiple Output (MIMO) systems have been extensively studied in context of wireless communication systems, which promising the both increased capacity and link level reliability. In this paper, we proposed the interference cancellation techniques for V-BLAST/STBC architecture, which integrates Alamouti space-time block code (STBC) layer together with vertical Bell-laboratories (V-BLAST) layer. In this work, we employ four transmit and three receive antennas over frequency flat Rayleigh fading channel. This paper presents signal detectors for V-BLAST/STBC with minimum mean square error (MMSE), zero forcing (ZF), parallel interference cancellation (PIC) and successive interference cancellation-zero forcing with binary phase shift keying (BPSK). Simulation results show the bit error rate performance degradation and the computational complexity of the joint optimal detection is better than the other detection technique.","PeriodicalId":6380,"journal":{"name":"16th International Conference on Advanced Communication Technology","volume":"50 1","pages":"157-161"},"PeriodicalIF":0.0,"publicationDate":"2014-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91530655","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Design, deployment and use of HTTP-based botnet (HBB) testbed 基于http的僵尸网络(HBB)测试平台的设计、部署和使用
Pub Date : 2014-03-27 DOI: 10.1109/ICACT.2014.6779162
Esraa Alomari, S. Manickam, B. Gupta, Parminder Singh, Mohammed Anbar
Botnet is one of the most widespread and serious malware which occur frequently in today's cyber attacks. A botnet is a group of Internet-connected computer programs communicating with other similar programs in order to perform various attacks. HTTP-based botnet is most dangerous botnet among all the different botnets available today. In botnets detection, in particularly, behavioural-based approaches suffer from the unavailability of the benchmark datasets and this lead to lack of precise results evaluation of botnet detection systems, comparison, and deployment which originates from the deficiency of adequate datasets. Most of the datasets in the botnet field are from local environment and cannot be used in the large scale due to privacy problems and do not reflect common trends, and also lack some statistical features. To the best of our knowledge, there is not any benchmark dataset available which is infected by HTTP-based botnet (HBB) for performing Distributed Denial of Service (DDoS) attacks against Web servers by using HTTP-GET flooding method. In addition, there is no Web access log infected by botnet is available for researchers. Therefore, in this paper, a complete test-bed will be illustrated in order to implement a real time HTTP-based botnet for performing variety of DDoS attacks against Web servers by using HTTP-GET flooding method. In addition to this, Web access log with http bot traces are also generated. These real time datasets and Web access logs can be useful to study the behaviour of HTTP-based botnet as well as to evaluate different solutions proposed to detect HTTP-based botnet by various researchers.
僵尸网络是当今网络攻击中最常见、最严重的恶意软件之一。僵尸网络是一组连接互联网的计算机程序,它们与其他类似的程序进行通信,以执行各种攻击。基于http的僵尸网络是当今所有可用的不同僵尸网络中最危险的僵尸网络。特别是在僵尸网络检测中,基于行为的方法受到基准数据集不可用的影响,这导致缺乏对僵尸网络检测系统,比较和部署的精确结果评估,这源于缺乏足够的数据集。僵尸网络领域的数据集大多来自局部环境,由于隐私问题无法大规模使用,不能反映共同趋势,也缺乏一些统计特征。据我们所知,没有任何可用的基准数据集被基于http的僵尸网络(HBB)感染,通过使用HTTP-GET泛洪方法对Web服务器执行分布式拒绝服务(DDoS)攻击。此外,也没有被僵尸网络感染的Web访问日志可供研究人员使用。因此,在本文中,为了实现一个实时的基于http的僵尸网络,通过使用HTTP-GET泛洪方法对Web服务器执行各种DDoS攻击,将展示一个完整的测试平台。除此之外,还会生成带有http bot跟踪的Web访问日志。这些实时数据集和Web访问日志可以用于研究基于http的僵尸网络的行为,以及评估各种研究人员提出的基于http的僵尸网络检测的不同解决方案。
{"title":"Design, deployment and use of HTTP-based botnet (HBB) testbed","authors":"Esraa Alomari, S. Manickam, B. Gupta, Parminder Singh, Mohammed Anbar","doi":"10.1109/ICACT.2014.6779162","DOIUrl":"https://doi.org/10.1109/ICACT.2014.6779162","url":null,"abstract":"Botnet is one of the most widespread and serious malware which occur frequently in today's cyber attacks. A botnet is a group of Internet-connected computer programs communicating with other similar programs in order to perform various attacks. HTTP-based botnet is most dangerous botnet among all the different botnets available today. In botnets detection, in particularly, behavioural-based approaches suffer from the unavailability of the benchmark datasets and this lead to lack of precise results evaluation of botnet detection systems, comparison, and deployment which originates from the deficiency of adequate datasets. Most of the datasets in the botnet field are from local environment and cannot be used in the large scale due to privacy problems and do not reflect common trends, and also lack some statistical features. To the best of our knowledge, there is not any benchmark dataset available which is infected by HTTP-based botnet (HBB) for performing Distributed Denial of Service (DDoS) attacks against Web servers by using HTTP-GET flooding method. In addition, there is no Web access log infected by botnet is available for researchers. Therefore, in this paper, a complete test-bed will be illustrated in order to implement a real time HTTP-based botnet for performing variety of DDoS attacks against Web servers by using HTTP-GET flooding method. In addition to this, Web access log with http bot traces are also generated. These real time datasets and Web access logs can be useful to study the behaviour of HTTP-based botnet as well as to evaluate different solutions proposed to detect HTTP-based botnet by various researchers.","PeriodicalId":6380,"journal":{"name":"16th International Conference on Advanced Communication Technology","volume":"17 1","pages":"1265-1269"},"PeriodicalIF":0.0,"publicationDate":"2014-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73460739","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 29
Centrality-based network coding node selection mechanism for improving network throughput 基于中心性的网络编码节点选择机制,提高网络吞吐量
Pub Date : 2014-03-27 DOI: 10.1109/ICACT.2014.6779083
Tae-hwa Kim, Hyungwoo Choi, Hong-shik Park
The problem of minimizing the number of coding nodes is caused by network coding overhead and is proved to be NP-hard. To resolve this issue, this paper proposes Centrality-based Network Coding Node Selection (CNCNS) that is the heuristic and distributed mechanism to minimize the number of network coding (NC) nodes without compromising the achievable network throughput. CNCNS iteratively analyses the node centrality and selects NC node in the specific area. Since CNCNS operates with distributed manner, it can dynamically adapt the network status with approximately minimizing network coding nodes. Especially, CNCNS adjusts the network performance of network throughput and reliability using control indicator. Simulation results show that the well selected network coding nodes can improve the network throughput and almost close to throughput performance of a system where all network nodes operate network coding.
编码节点数最小化问题是由网络编码开销引起的,被证明是np困难问题。为了解决这个问题,本文提出了基于中心性的网络编码节点选择(CNCNS),这是一种启发式和分布式的机制,可以在不影响可实现的网络吞吐量的情况下最小化网络编码(NC)节点的数量。CNCNS迭代分析节点的中心性,选择特定区域内的NC节点。由于CNCNS采用分布式方式运行,可以动态适应网络状态,使网络编码节点近似最小化。特别是CNCNS通过控制指标调节网络吞吐量和可靠性的网络性能。仿真结果表明,选择合适的网络编码节点可以提高网络吞吐量,几乎接近所有网络节点都进行网络编码的系统的吞吐量性能。
{"title":"Centrality-based network coding node selection mechanism for improving network throughput","authors":"Tae-hwa Kim, Hyungwoo Choi, Hong-shik Park","doi":"10.1109/ICACT.2014.6779083","DOIUrl":"https://doi.org/10.1109/ICACT.2014.6779083","url":null,"abstract":"The problem of minimizing the number of coding nodes is caused by network coding overhead and is proved to be NP-hard. To resolve this issue, this paper proposes Centrality-based Network Coding Node Selection (CNCNS) that is the heuristic and distributed mechanism to minimize the number of network coding (NC) nodes without compromising the achievable network throughput. CNCNS iteratively analyses the node centrality and selects NC node in the specific area. Since CNCNS operates with distributed manner, it can dynamically adapt the network status with approximately minimizing network coding nodes. Especially, CNCNS adjusts the network performance of network throughput and reliability using control indicator. Simulation results show that the well selected network coding nodes can improve the network throughput and almost close to throughput performance of a system where all network nodes operate network coding.","PeriodicalId":6380,"journal":{"name":"16th International Conference on Advanced Communication Technology","volume":"1 1","pages":"864-867"},"PeriodicalIF":0.0,"publicationDate":"2014-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90400234","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
The integrated management method of slow varying ISL's for MEO satellite network MEO卫星网络慢变ISL综合管理方法
Pub Date : 2014-03-27 DOI: 10.1109/ICACT.2014.6779092
L. Jing, Ye Gang-qiang, Zhang Tian-jiao, Yu Pei-jun
In the paper, the constellation composed of MEO (Medium Earth Orbit) satellite is put as a researching scenario, the relative measurement and data transmission task which are finished by slow changing ISLs are put as a researching object, the integrated management of relative measurement and data transmission task inside the satellite network is put as a studying objective. Firstly, the characteristic of relative measurement and data transmission task is analyzed, and the ISLs constrained conditions are researched for both of them. Then, the topology structure of satellite network is designed according to the characteristic of slow changing ISLs and taking account into the specified requirement of measurement and data transmission task Thirdly, in order to realize integrated management of measurement and data transmission task the routing strategy is designed according to the topology structure of satellite network Finally, the researching results will be validated through the example. The technical reference will be provided by the researching results for the fields of space internet application, space based TT&C (Tracking, Telemetry and Control) and satellite communication in the future.
本文以中地球轨道卫星组成的星座为研究场景,以慢变isl完成的相对测量和数据传输任务为研究对象,以卫星网络内部相对测量和数据传输任务的综合管理为研究目标。首先,分析了相对测量任务和数据传输任务的特点,研究了两者的ISLs约束条件;然后,根据isl变化缓慢的特点,考虑测量和数据传输任务的具体要求,设计了卫星网络拓扑结构;然后,为了实现测量和数据传输任务的综合管理,根据卫星网络拓扑结构设计了路由策略;最后,通过实例验证了研究结果。研究成果将为未来空间互联网应用、天基测控、卫星通信等领域提供技术参考。
{"title":"The integrated management method of slow varying ISL's for MEO satellite network","authors":"L. Jing, Ye Gang-qiang, Zhang Tian-jiao, Yu Pei-jun","doi":"10.1109/ICACT.2014.6779092","DOIUrl":"https://doi.org/10.1109/ICACT.2014.6779092","url":null,"abstract":"In the paper, the constellation composed of MEO (Medium Earth Orbit) satellite is put as a researching scenario, the relative measurement and data transmission task which are finished by slow changing ISLs are put as a researching object, the integrated management of relative measurement and data transmission task inside the satellite network is put as a studying objective. Firstly, the characteristic of relative measurement and data transmission task is analyzed, and the ISLs constrained conditions are researched for both of them. Then, the topology structure of satellite network is designed according to the characteristic of slow changing ISLs and taking account into the specified requirement of measurement and data transmission task Thirdly, in order to realize integrated management of measurement and data transmission task the routing strategy is designed according to the topology structure of satellite network Finally, the researching results will be validated through the example. The technical reference will be provided by the researching results for the fields of space internet application, space based TT&C (Tracking, Telemetry and Control) and satellite communication in the future.","PeriodicalId":6380,"journal":{"name":"16th International Conference on Advanced Communication Technology","volume":"20 1","pages":"907-911"},"PeriodicalIF":0.0,"publicationDate":"2014-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90441455","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Effect of narrow band signal interference caused by CFO on OFDM system for proximity-based direct communication 基于邻近直接通信的OFDM系统窄带CFO信号干扰的影响
Pub Date : 2014-03-27 DOI: 10.1109/ICACT.2014.6778973
Seokki Kim, Sungcheol Chang
Proximity-based direct communication is the technology that devices in the near distance can use the radio resource efficiently by operating distributedly without control of BS or AP. Many technologies are proposed for proximity-based direct communication and taking the operation in unlicensed band into account. Thus, coexistence techniques are needed for coexistence with different kind of devices which operate in unlicensed band such as Wireless LAN. A blocking signal transmission scheme to avoid contention with other devices by transmitting narrow band signal is proposed as one of the coexistence schemes for coexistence with different kind of devices. In this work, we present analysis of the effect of narrow band interference such as blocking signal caused by CFO on OFDM system for proximity-based direct communication and validate the theoretical results by means of computer simulation.
基于邻近的直接通信技术是指近距离的设备在不受BS或AP控制的情况下,通过分布式操作有效地利用无线电资源的技术。考虑到无许可频段的操作,提出了许多基于邻近的直接通信技术。因此,需要在无线局域网等非授权频带中与不同类型的设备共存。提出了一种通过传输窄带信号来避免与其他设备竞争的阻塞信号传输方案,作为与不同类型设备共存的共存方案之一。在本文中,我们分析了由CFO引起的阻塞信号等窄带干扰对基于邻近直接通信的OFDM系统的影响,并通过计算机仿真验证了理论结果。
{"title":"Effect of narrow band signal interference caused by CFO on OFDM system for proximity-based direct communication","authors":"Seokki Kim, Sungcheol Chang","doi":"10.1109/ICACT.2014.6778973","DOIUrl":"https://doi.org/10.1109/ICACT.2014.6778973","url":null,"abstract":"Proximity-based direct communication is the technology that devices in the near distance can use the radio resource efficiently by operating distributedly without control of BS or AP. Many technologies are proposed for proximity-based direct communication and taking the operation in unlicensed band into account. Thus, coexistence techniques are needed for coexistence with different kind of devices which operate in unlicensed band such as Wireless LAN. A blocking signal transmission scheme to avoid contention with other devices by transmitting narrow band signal is proposed as one of the coexistence schemes for coexistence with different kind of devices. In this work, we present analysis of the effect of narrow band interference such as blocking signal caused by CFO on OFDM system for proximity-based direct communication and validate the theoretical results by means of computer simulation.","PeriodicalId":6380,"journal":{"name":"16th International Conference on Advanced Communication Technology","volume":"8 4 1","pages":"318-323"},"PeriodicalIF":0.0,"publicationDate":"2014-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78390090","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
RRM strategy based on throughput and fairness in LTE-A relay system 基于吞吐量和公平性的LTE-A中继系统RRM策略
Pub Date : 2014-03-27 DOI: 10.1109/ICACT.2014.6779121
Jintao Du, Jihong Zhao
Relay has been one of the most promising techniques towards LTE-A system, which improves cell coverage and throughput in cell edge. For the balance between system throughput and user fairness of LTE-A system with relay, this paper proposes user SINR dispersion degree as the main parameter for resource allocation, significantly improved the fairness of the center users and edge users. Simulation results show that the proposed Balanced Aim allocation algorithm which combined throughput, user fairness and game theory makes the system resource allocation more efficient, improving the overall performance of the system.
中继技术是LTE-A系统中最有前途的技术之一,它提高了小区边缘的覆盖率和吞吐量。为了平衡带中继的LTE-A系统的系统吞吐量和用户公平性,本文提出以用户SINR色散度作为资源分配的主要参数,显著提高了中心用户和边缘用户的公平性。仿真结果表明,该算法结合了吞吐量、用户公平性和博弈论,提高了系统资源分配效率,提高了系统的整体性能。
{"title":"RRM strategy based on throughput and fairness in LTE-A relay system","authors":"Jintao Du, Jihong Zhao","doi":"10.1109/ICACT.2014.6779121","DOIUrl":"https://doi.org/10.1109/ICACT.2014.6779121","url":null,"abstract":"Relay has been one of the most promising techniques towards LTE-A system, which improves cell coverage and throughput in cell edge. For the balance between system throughput and user fairness of LTE-A system with relay, this paper proposes user SINR dispersion degree as the main parameter for resource allocation, significantly improved the fairness of the center users and edge users. Simulation results show that the proposed Balanced Aim allocation algorithm which combined throughput, user fairness and game theory makes the system resource allocation more efficient, improving the overall performance of the system.","PeriodicalId":6380,"journal":{"name":"16th International Conference on Advanced Communication Technology","volume":"22 1","pages":"1059-1064"},"PeriodicalIF":0.0,"publicationDate":"2014-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76726340","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
16th International Conference on Advanced Communication Technology
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1