首页 > 最新文献

2018 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET)最新文献

英文 中文
Performance Analysis for Mixed Line Rates (MLR) WDM/DWDM Networks Under Various Modulation Techniques 混合线速率(MLR) WDM/DWDM网络在不同调制技术下的性能分析
V. Kumar, Shakrajit Sahu, S. Das
In recent years, a rapid growth of new technologies requires communication systems to support higher bit rate and longer distance. The Optical network is one of the best optimal solutions which can satisfy the demand for high data rate. The performance of current optical networks depends on the traffic demands. To minimize the traffic mixed line rate (MLR) optical network is implemented. In a transparent MLR optical network, data transmission is done over different wavelength at different line rates within the same fiber. MLR optical networks with data rate 10/40/100 Gb/s over different wavelength channels is a new networking paradigm. This paper considers various modulation techniques in order to achieve better bit error rates (BER). It also shows that modulation technique has a great role in improving the data rates and quality of transmission.
近年来,新技术的快速发展要求通信系统支持更高的比特率和更远的距离。光网络是满足高数据速率需求的最佳解决方案之一。当前光网络的性能取决于业务需求。为了最大限度地减少通信量,采用了MLR光网络。在透明MLR光网络中,数据传输在同一根光纤中以不同的线速率在不同的波长上完成。基于不同波长信道的数据速率为10/40/ 100gb /s的MLR光网络是一种新的组网模式。为了获得更好的误码率,本文考虑了各种调制技术。研究表明,调制技术在提高数据速率和传输质量方面具有重要作用。
{"title":"Performance Analysis for Mixed Line Rates (MLR) WDM/DWDM Networks Under Various Modulation Techniques","authors":"V. Kumar, Shakrajit Sahu, S. Das","doi":"10.1109/WISPNET.2018.8538684","DOIUrl":"https://doi.org/10.1109/WISPNET.2018.8538684","url":null,"abstract":"In recent years, a rapid growth of new technologies requires communication systems to support higher bit rate and longer distance. The Optical network is one of the best optimal solutions which can satisfy the demand for high data rate. The performance of current optical networks depends on the traffic demands. To minimize the traffic mixed line rate (MLR) optical network is implemented. In a transparent MLR optical network, data transmission is done over different wavelength at different line rates within the same fiber. MLR optical networks with data rate 10/40/100 Gb/s over different wavelength channels is a new networking paradigm. This paper considers various modulation techniques in order to achieve better bit error rates (BER). It also shows that modulation technique has a great role in improving the data rates and quality of transmission.","PeriodicalId":6858,"journal":{"name":"2018 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET)","volume":"20 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2018-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81423220","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Automatic Segmentation of Polyps in Endoscopic Image Using Level-Set Formulation 基于水平集的内镜图像息肉自动分割
Soumayan Dutta, Pradipta Sasmal, M. Bhuyan, Y. Iwahori
Automatic segmentation of colorectal polyps from endoscopic images forms an interesting challenge in computer vision. The method proposed in this paper intends to segment colorectal polyp (abnormal) regions from normal regions from a given endoscopic image. Due to lack of any regular texture patterns in this kind of images and apparent visual similarity in background and foreground pixels, conventional texture feature extraction and classification methods do not always yield good results. Hence, active contour based method has been explored to automatically segment out probable abnormal region(s). Our aim is to automatically detect the probable polyp region(s) and then verify the results with respect to the ground truth. Due to lack of very definitive edge criteria along the boundaries of a polyp, we used “active contour without edges” instead of classical active contour.
从内镜图像中自动分割结肠直肠息肉是计算机视觉领域的一个有趣的挑战。本文提出的方法旨在从给定的内镜图像中分割结肠直肠息肉(异常)区域和正常区域。由于这类图像缺乏任何规则的纹理模式,背景和前景像素具有明显的视觉相似性,传统的纹理特征提取和分类方法往往效果不佳。为此,探索了基于活动轮廓线的自动分割可能异常区域的方法。我们的目标是自动检测可能的息肉区域,然后根据真实情况验证结果。由于缺乏非常明确的沿息肉边界的边缘标准,我们使用“无边缘的活动轮廓”代替经典的活动轮廓。
{"title":"Automatic Segmentation of Polyps in Endoscopic Image Using Level-Set Formulation","authors":"Soumayan Dutta, Pradipta Sasmal, M. Bhuyan, Y. Iwahori","doi":"10.1109/WISPNET.2018.8538615","DOIUrl":"https://doi.org/10.1109/WISPNET.2018.8538615","url":null,"abstract":"Automatic segmentation of colorectal polyps from endoscopic images forms an interesting challenge in computer vision. The method proposed in this paper intends to segment colorectal polyp (abnormal) regions from normal regions from a given endoscopic image. Due to lack of any regular texture patterns in this kind of images and apparent visual similarity in background and foreground pixels, conventional texture feature extraction and classification methods do not always yield good results. Hence, active contour based method has been explored to automatically segment out probable abnormal region(s). Our aim is to automatically detect the probable polyp region(s) and then verify the results with respect to the ground truth. Due to lack of very definitive edge criteria along the boundaries of a polyp, we used “active contour without edges” instead of classical active contour.","PeriodicalId":6858,"journal":{"name":"2018 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET)","volume":"36 9 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2018-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90650173","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Performance Enhancement of the CSMA/CA MAC Mechanisms Using a Reject Request to Send (RRTS) Message for 3.5 GHz Shared Spectrum Systems 3.5 GHz共享频谱系统中使用拒绝请求发送(RRTS)消息增强CSMA/CA MAC机制的性能
Z. Youssef, Erfan Majeed, M. Mueck, Ingolf Karls, C. Drewes, G. Bruck, P. Jung
The federal communications commission (FCC) has addressed a three-tiered spectrum access system (SAS) in the so called innovation band (3.5 GHz) which foresees besides the priority access licenses (PAL) an unlicensed spectrum access as general authorized access (GAA). In this context, the SAS assigns the spectrum to the PAL and GAA systems which are citizens broadband radio service devices (CBSDs). Thus, the issue of finding a scheme that achieves an optimal spectrum access among the CBSDs and their nodes in term of maximizing the throughput is addressed. In this paper we present the design and results of a broadcast message termed reject request to send (RRTS) based on the IEEE 802.11 distributed coordination function (DCF) mechanisms for SAS with efficient spectrum access in respect to maximize the system throughput for GAA CBSDs in an unlicensed spectrum. The system improvement shows how the RRTS message can be used in a minimum intrusive way to enhance the system throughput compared with the state-ofthe-art (SoA) DCF scheme. Moreover, the suggested scheme is able to handle a large number of accessing nodes because our scheme is robust against the number of nodes which opens a new perspective for high connection density in a SAS context and beyond 5G.
美国联邦通信委员会(FCC)已经解决了所谓创新频段(3.5 GHz)的三层频谱接入系统(SAS),该系统除了优先接入许可(PAL)之外,还将未经许可的频谱接入作为一般授权接入(GAA)。在这种情况下,SAS将频谱分配给作为公民宽带无线电业务设备(cbsd)的PAL和GAA系统。因此,在cbsd及其节点之间寻找一种以最大吞吐量实现最佳频谱访问的方案的问题得到了解决。在本文中,我们提出了基于IEEE 802.11分布式协调函数(DCF)机制的广播消息的设计和结果,称为拒绝发送请求(RRTS),用于SAS,具有有效的频谱访问,以最大限度地提高未经许可频谱中的GAA cbsd的系统吞吐量。系统改进显示了与最先进的(SoA) DCF方案相比,如何以最小的侵入方式使用RRTS消息来增强系统吞吐量。此外,建议的方案能够处理大量访问节点,因为我们的方案对节点数量是健壮的,这为SAS上下文中和5G以后的高连接密度开辟了新的视角。
{"title":"Performance Enhancement of the CSMA/CA MAC Mechanisms Using a Reject Request to Send (RRTS) Message for 3.5 GHz Shared Spectrum Systems","authors":"Z. Youssef, Erfan Majeed, M. Mueck, Ingolf Karls, C. Drewes, G. Bruck, P. Jung","doi":"10.1109/WISPNET.2018.8538708","DOIUrl":"https://doi.org/10.1109/WISPNET.2018.8538708","url":null,"abstract":"The federal communications commission (FCC) has addressed a three-tiered spectrum access system (SAS) in the so called innovation band (3.5 GHz) which foresees besides the priority access licenses (PAL) an unlicensed spectrum access as general authorized access (GAA). In this context, the SAS assigns the spectrum to the PAL and GAA systems which are citizens broadband radio service devices (CBSDs). Thus, the issue of finding a scheme that achieves an optimal spectrum access among the CBSDs and their nodes in term of maximizing the throughput is addressed. In this paper we present the design and results of a broadcast message termed reject request to send (RRTS) based on the IEEE 802.11 distributed coordination function (DCF) mechanisms for SAS with efficient spectrum access in respect to maximize the system throughput for GAA CBSDs in an unlicensed spectrum. The system improvement shows how the RRTS message can be used in a minimum intrusive way to enhance the system throughput compared with the state-ofthe-art (SoA) DCF scheme. Moreover, the suggested scheme is able to handle a large number of accessing nodes because our scheme is robust against the number of nodes which opens a new perspective for high connection density in a SAS context and beyond 5G.","PeriodicalId":6858,"journal":{"name":"2018 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET)","volume":"88 4 1","pages":"1-8"},"PeriodicalIF":0.0,"publicationDate":"2018-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89386985","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Brief Review of Fuzzy Logic and Its Usage Towards Counter-Security Issues 模糊逻辑及其在反安全问题中的应用综述
Harikrishna Pillutla, Amuthan Arjunan
Nowadays, most of the world’s population has become much dependent on computers for banking, healthcare, shopping, and telecommunication. Security has now become a basic norm for computers and its resources since it has become inherently insecure. Security issues like Denial of Service attacks, TCP SYN Flooding attacks, Packet Dropping attacks and Distributed Denial of Service attacks are some of the methods by which unauthorized users make the resource unavailable to authorized users. There are several security mechanisms like Intrusion Detection System, Anomaly detection and Trust model by which we can be able to identify and counter the abuse of computer resources by unauthorized users. This paper presents a survey of several security mechanisms which have been implemented using Fuzzy logic. Fuzzy logic is one of the rapidly developing technologies, which is used in a sophisticated control system. Fuzzy logic deals with the degree of truth rather than the Boolean logic, which carries the values of either true or false. So instead of providing only two values, we will be able to define intermediate values.
如今,世界上大多数人在银行、医疗、购物和电信方面都非常依赖电脑。安全现在已经成为计算机及其资源的基本规范,因为它本身就不安全。诸如拒绝服务攻击、TCP SYN泛洪攻击、丢包攻击和分布式拒绝服务攻击等安全问题是未经授权的用户使资源对授权用户不可用的一些方法。通过入侵检测系统、异常检测和信任模型等安全机制,我们可以识别和对抗未经授权用户滥用计算机资源的行为。本文综述了目前使用模糊逻辑实现的几种安全机制。模糊逻辑是一种发展迅速的控制技术,广泛应用于复杂的控制系统中。模糊逻辑处理的是真实程度,而不是布尔逻辑,布尔逻辑的值要么为真,要么为假。因此,我们将能够定义中间值,而不是只提供两个值。
{"title":"A Brief Review of Fuzzy Logic and Its Usage Towards Counter-Security Issues","authors":"Harikrishna Pillutla, Amuthan Arjunan","doi":"10.1109/WISPNET.2018.8538555","DOIUrl":"https://doi.org/10.1109/WISPNET.2018.8538555","url":null,"abstract":"Nowadays, most of the world’s population has become much dependent on computers for banking, healthcare, shopping, and telecommunication. Security has now become a basic norm for computers and its resources since it has become inherently insecure. Security issues like Denial of Service attacks, TCP SYN Flooding attacks, Packet Dropping attacks and Distributed Denial of Service attacks are some of the methods by which unauthorized users make the resource unavailable to authorized users. There are several security mechanisms like Intrusion Detection System, Anomaly detection and Trust model by which we can be able to identify and counter the abuse of computer resources by unauthorized users. This paper presents a survey of several security mechanisms which have been implemented using Fuzzy logic. Fuzzy logic is one of the rapidly developing technologies, which is used in a sophisticated control system. Fuzzy logic deals with the degree of truth rather than the Boolean logic, which carries the values of either true or false. So instead of providing only two values, we will be able to define intermediate values.","PeriodicalId":6858,"journal":{"name":"2018 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET)","volume":"153 8 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2018-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83130854","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Significance of Feature Selection for Acoustic Modeling in Dysarthric Speech Recognition 困难语音识别中声学建模特征选择的意义
Jerin Baby Mathew, Jonie Jacob, Karun Sajeev, Jithin Joy, R. Rajan
In this paper, a comparative study of various feature extraction methods is carried out on dysarthric speech. Dysarthric speech is difficult to recognize and thus pose challenges that normal speech does not. Since various features can be used to model phonemes in hidden Markov model (HMM) based recognition system, which feature is suitable for the task specified is a topic to be addressed.Dysarthric speech becomes unintelligible due to the improper coordination of articulators. In this paper, recognition results are compared using mel-frequency cepstral coefficients (MFCC), perceptual linear prediction (PLP), filter bank and reflection coefficients feature sets. The performance is analyzed using TORGO database. Phonemes are grouped for the analysis. Our study shows that MFCC and PLP gave better results than filter bank and reflection coefficients for dysarthric speech analysis.
本文对各种特征提取方法进行了对比研究。困难言语是难以识别的,因此构成了正常言语所没有的挑战。在基于隐马尔可夫模型(HMM)的识别系统中,可以使用各种特征来对音素进行建模,因此哪些特征适合指定的任务是一个需要研究的问题。由于发音器的不适当协调,言语变得难以理解。本文使用mel-frequency倒谱系数(MFCC)、感知线性预测(PLP)、滤波器组和反射系数特征集对识别结果进行了比较。使用TORGO数据库进行性能分析。对音素进行分组分析。我们的研究表明,MFCC和PLP比滤波器组和反射系数对困难语音的分析效果更好。
{"title":"Significance of Feature Selection for Acoustic Modeling in Dysarthric Speech Recognition","authors":"Jerin Baby Mathew, Jonie Jacob, Karun Sajeev, Jithin Joy, R. Rajan","doi":"10.1109/WISPNET.2018.8538531","DOIUrl":"https://doi.org/10.1109/WISPNET.2018.8538531","url":null,"abstract":"In this paper, a comparative study of various feature extraction methods is carried out on dysarthric speech. Dysarthric speech is difficult to recognize and thus pose challenges that normal speech does not. Since various features can be used to model phonemes in hidden Markov model (HMM) based recognition system, which feature is suitable for the task specified is a topic to be addressed.Dysarthric speech becomes unintelligible due to the improper coordination of articulators. In this paper, recognition results are compared using mel-frequency cepstral coefficients (MFCC), perceptual linear prediction (PLP), filter bank and reflection coefficients feature sets. The performance is analyzed using TORGO database. Phonemes are grouped for the analysis. Our study shows that MFCC and PLP gave better results than filter bank and reflection coefficients for dysarthric speech analysis.","PeriodicalId":6858,"journal":{"name":"2018 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET)","volume":"62 1","pages":"1-4"},"PeriodicalIF":0.0,"publicationDate":"2018-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80726272","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Accelerated Feature Descriptor Matching in Images Using Threshold Accepting 使用阈值接受加速图像特征描述符匹配
Savinu T. Vijay, P.N. Poumami
The process of matching two visual descriptions of images is a major task in Computer Vision. This matching is generally done using Exhaustive search (Brute-Force) and Nearest Neighbor search which has been proved computationally expensive in some cases. This paper proposes a heuristic method to perform feature descriptor matching. The heuristic approach applied here works based on a combinatorial optimization algorithm called Threshold Accepting. The experiments performed suggest that the proposed algorithm can produce better results within a minimum number of iterations than existing algorithms.
图像的两个视觉描述的匹配过程是计算机视觉中的一个主要任务。这种匹配通常使用穷举搜索(蛮力)和最近邻搜索来完成,这在某些情况下被证明是计算昂贵的。本文提出了一种启发式的特征描述符匹配方法。这里应用的启发式方法基于一种称为阈值接受的组合优化算法。实验结果表明,与现有算法相比,该算法可以在最少的迭代次数内产生更好的结果。
{"title":"Accelerated Feature Descriptor Matching in Images Using Threshold Accepting","authors":"Savinu T. Vijay, P.N. Poumami","doi":"10.1109/WISPNET.2018.8538461","DOIUrl":"https://doi.org/10.1109/WISPNET.2018.8538461","url":null,"abstract":"The process of matching two visual descriptions of images is a major task in Computer Vision. This matching is generally done using Exhaustive search (Brute-Force) and Nearest Neighbor search which has been proved computationally expensive in some cases. This paper proposes a heuristic method to perform feature descriptor matching. The heuristic approach applied here works based on a combinatorial optimization algorithm called Threshold Accepting. The experiments performed suggest that the proposed algorithm can produce better results within a minimum number of iterations than existing algorithms.","PeriodicalId":6858,"journal":{"name":"2018 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET)","volume":"45 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2018-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76931082","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Automatic Segmentation of Exudates in Retinal Images 视网膜图像中渗出物的自动分割
S. Bharkad
This paper presents a new technique for segmentation of exudates in fundus images. This technique is based on Discrete Wavelet Transform (DWT) and histogram based thresholding procedure. In this work, Optic Disc (OD) is eliminated using DWT from original green component image prior segmentation of exudates. This step aids to avoid the misclassification of exudates region. Histogram based threshold calculation procedure is introduced for segmentation of bright regions in green component image. Hard exudates are obtained after masking the OD region in segmented bright regions of the green component image. This technique was evaluated on images from DIARETDB0 and DIARETDB1 databases. The average sensitivity, specificity and accuracy achieved by proposed method are 0.7890, 0.9972 and 0.9964 respectively. Comparison with existing methods offered in the literature shows that the performance of proposed approach is significant.
提出了一种新的眼底图像中渗出物的分割方法。该技术基于离散小波变换(DWT)和基于直方图的阈值处理。在这项工作中,使用DWT从原始绿色分量图像中去除视盘(OD)。这一步骤有助于避免对渗出区域的错误分类。介绍了一种基于直方图的阈值计算方法,用于绿色分量图像中明亮区域的分割。在绿色分量图像的分割亮区中,对OD区进行掩码处理,得到硬渗出物。该技术在DIARETDB0和DIARETDB1数据库的图像上进行了评估。该方法的平均灵敏度、特异性和准确度分别为0.7890、0.9972和0.9964。与文献中已有方法的比较表明,本文提出的方法具有显著的性能。
{"title":"Automatic Segmentation of Exudates in Retinal Images","authors":"S. Bharkad","doi":"10.1109/WISPNET.2018.8538644","DOIUrl":"https://doi.org/10.1109/WISPNET.2018.8538644","url":null,"abstract":"This paper presents a new technique for segmentation of exudates in fundus images. This technique is based on Discrete Wavelet Transform (DWT) and histogram based thresholding procedure. In this work, Optic Disc (OD) is eliminated using DWT from original green component image prior segmentation of exudates. This step aids to avoid the misclassification of exudates region. Histogram based threshold calculation procedure is introduced for segmentation of bright regions in green component image. Hard exudates are obtained after masking the OD region in segmented bright regions of the green component image. This technique was evaluated on images from DIARETDB0 and DIARETDB1 databases. The average sensitivity, specificity and accuracy achieved by proposed method are 0.7890, 0.9972 and 0.9964 respectively. Comparison with existing methods offered in the literature shows that the performance of proposed approach is significant.","PeriodicalId":6858,"journal":{"name":"2018 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET)","volume":"31 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2018-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75355066","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Iterative Detection for MIMO Systems Associated with Polar Codes 基于极化码的MIMO系统迭代检测
M. Diouf, I. Diop, I. Dioum, K. Tall, S. M. Farssi
The tools of information theory (error correcting codes) are exploited to improve the detection of MIMO channels. In particular, we use the polar codes, which currently represent the first and only code family to reach Shannon's two limits on channel and source coding. Our proposal consists in using a medium-length polar encoding, a detection minimizing the mean squared error by successive interference cancellation (MMSE- SIC) and a Successive Cancellation (SC) decoder.To improve the reliability of the information over the iterations, we added an iterative (turbo-equalization) process between the SC decoder and the MMSE-SIC detector. We have shown that the association of the SC decoder with the MMSE-SIC detector can reduce the Bit Error Rate (BER) instead of Believe Propagation (BP) decoding. This has increased the diversity and the ability to correct.
利用信息论的工具(纠错码)来改进MIMO信道的检测。特别是,我们使用极性码,它目前代表了第一个也是唯一一个达到香农对信道和源编码的两个限制的码族。我们的建议包括使用中长度极性编码,通过连续干扰抵消(MMSE- SIC)最小化均方误差的检测和连续抵消(SC)解码器。为了提高迭代过程中信息的可靠性,我们在SC解码器和MMSE-SIC检测器之间添加了迭代(涡轮均衡)过程。我们已经证明SC解码器与MMSE-SIC检测器的关联可以降低误码率(BER)而不是相信传播(BP)解码。这增加了多样性和纠正的能力。
{"title":"Iterative Detection for MIMO Systems Associated with Polar Codes","authors":"M. Diouf, I. Diop, I. Dioum, K. Tall, S. M. Farssi","doi":"10.1109/WISPNET.2018.8538462","DOIUrl":"https://doi.org/10.1109/WISPNET.2018.8538462","url":null,"abstract":"The tools of information theory (error correcting codes) are exploited to improve the detection of MIMO channels. In particular, we use the polar codes, which currently represent the first and only code family to reach Shannon's two limits on channel and source coding. Our proposal consists in using a medium-length polar encoding, a detection minimizing the mean squared error by successive interference cancellation (MMSE- SIC) and a Successive Cancellation (SC) decoder.To improve the reliability of the information over the iterations, we added an iterative (turbo-equalization) process between the SC decoder and the MMSE-SIC detector. We have shown that the association of the SC decoder with the MMSE-SIC detector can reduce the Bit Error Rate (BER) instead of Believe Propagation (BP) decoding. This has increased the diversity and the ability to correct.","PeriodicalId":6858,"journal":{"name":"2018 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET)","volume":"36 1","pages":"1-7"},"PeriodicalIF":0.0,"publicationDate":"2018-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72724016","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Modified TEEN for Handling Inconsistent Cluster Size Problem in WSN WSN中处理簇大小不一致问题的改进TEEN
Gunjan, P. Maheshwari, A. Sharma
WSN is a network technology which is currently in use in many existing and latest applications. Among the major problems in Wireless Sensor Networks, Energy Conservation is of utmost importance since batteries used in the sensor devices are not replaceable. There are number of cluster based routing protocols such as LEACH, TEEN, SEP proposed which handle these issues. This paper introduces an extension to TEEN protocol, a reactive homogeneous protocol. Modified TEEN (MTEEN) handles hotspot problem and the problem of load balancing in existing WSN routing algorithms. On the basis of our simulation carried on MATLAB, it is found that the proposed algorithm outperforms LEACH and TEEN in network lifetime.
无线传感器网络是目前在许多现有和最新应用中使用的一种网络技术。在无线传感器网络的主要问题中,由于传感器设备中使用的电池是不可更换的,因此节能是至关重要的。针对这些问题,已经提出了许多基于集群的路由协议,如LEACH、TEEN、SEP等。本文介绍了响应式同构协议TEEN的扩展。改进的TEEN (MTEEN)解决了现有WSN路由算法中的热点问题和负载均衡问题。在MATLAB上进行仿真,发现该算法在网络寿命方面优于LEACH和TEEN。
{"title":"Modified TEEN for Handling Inconsistent Cluster Size Problem in WSN","authors":"Gunjan, P. Maheshwari, A. Sharma","doi":"10.1109/WISPNET.2018.8538464","DOIUrl":"https://doi.org/10.1109/WISPNET.2018.8538464","url":null,"abstract":"WSN is a network technology which is currently in use in many existing and latest applications. Among the major problems in Wireless Sensor Networks, Energy Conservation is of utmost importance since batteries used in the sensor devices are not replaceable. There are number of cluster based routing protocols such as LEACH, TEEN, SEP proposed which handle these issues. This paper introduces an extension to TEEN protocol, a reactive homogeneous protocol. Modified TEEN (MTEEN) handles hotspot problem and the problem of load balancing in existing WSN routing algorithms. On the basis of our simulation carried on MATLAB, it is found that the proposed algorithm outperforms LEACH and TEEN in network lifetime.","PeriodicalId":6858,"journal":{"name":"2018 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET)","volume":"52 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2018-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77242520","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Performance Analysis of Different Spatial Domain Methods for Traffic Control Using Image Processing: A LabVIEW Approach 基于图像处理的不同空间域交通控制方法的性能分析:LabVIEW方法
G. Mallikharjuna Rao, P. Srinivas
In this paper, we present a scheme for performance analysis of spatial domain methods, namely, Laplacian, Arbitrary, Sobel and Prewitt operator methods for traffic control using an image processing with LabVIEW approach, including timing constraints are used to control the signal along the crossroad signal posts. In this paperwork, the reference image and the real-time image captured from the camera is loaded in the image acquisition of LabVIEW. To process the acquired image, four different methods of kernels namely Arbitrary, Laplacian, Prewitt and Sobel methods are used to obtain an edge detection image. The edge detection images have stored and captured images are compared and the Root Mean Square Error is calculated to estimate the timing constraints to operate the traffic signal lights on a four-lane dynamically. LabVIEW graphical programming tools are used for the development of the scheme and simulation results are shown. Finally, the performance of the four methods analyzed using an image quality metric RMSE value to estimate the time in order to allow the vehicles in a particular direction and dynamically to switch them on and off control from one particular direction to another.
在本文中,我们提出了一种空间域方法的性能分析方案,即Laplacian、任意、Sobel和Prewitt算子方法,利用LabVIEW图像处理方法进行交通控制,并使用时序约束来控制十字路口信号柱上的信号。在本论文中,在LabVIEW的图像采集中加载了参考图像和从相机捕获的实时图像。对采集到的图像进行处理,采用任意、拉普拉斯、Prewitt和Sobel四种不同的核方法得到边缘检测图像。将存储的边缘检测图像与捕获的图像进行比较,计算均方根误差,估计四车道交通信号灯动态运行的时间约束。采用LabVIEW图形化编程工具对方案进行了开发,并给出了仿真结果。最后,对四种方法的性能进行了分析,采用图像质量度量RMSE值来估计时间,以便允许车辆在特定方向上行驶并动态地对它们进行开关控制,从一个特定方向切换到另一个特定方向。
{"title":"Performance Analysis of Different Spatial Domain Methods for Traffic Control Using Image Processing: A LabVIEW Approach","authors":"G. Mallikharjuna Rao, P. Srinivas","doi":"10.1109/WISPNET.2018.8538569","DOIUrl":"https://doi.org/10.1109/WISPNET.2018.8538569","url":null,"abstract":"In this paper, we present a scheme for performance analysis of spatial domain methods, namely, Laplacian, Arbitrary, Sobel and Prewitt operator methods for traffic control using an image processing with LabVIEW approach, including timing constraints are used to control the signal along the crossroad signal posts. In this paperwork, the reference image and the real-time image captured from the camera is loaded in the image acquisition of LabVIEW. To process the acquired image, four different methods of kernels namely Arbitrary, Laplacian, Prewitt and Sobel methods are used to obtain an edge detection image. The edge detection images have stored and captured images are compared and the Root Mean Square Error is calculated to estimate the timing constraints to operate the traffic signal lights on a four-lane dynamically. LabVIEW graphical programming tools are used for the development of the scheme and simulation results are shown. Finally, the performance of the four methods analyzed using an image quality metric RMSE value to estimate the time in order to allow the vehicles in a particular direction and dynamically to switch them on and off control from one particular direction to another.","PeriodicalId":6858,"journal":{"name":"2018 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET)","volume":"45 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2018-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85786765","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
2018 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1