2012 International Conference on Computing, Networking and Communications (ICNC)最新文献

筛选
英文 中文
A novel Stochastic Discretized Weak Estimator operating in non-stationary environments 一种新的非平稳环境下的随机离散弱估计器
2012 International Conference on Computing, Networking and Communications (ICNC) Pub Date : 2012-03-12 DOI: 10.1109/ICCNC.2012.6167445
A. Yazidi, B. Oommen, Ole-Christoffer Granmo
{"title":"A novel Stochastic Discretized Weak Estimator operating in non-stationary environments","authors":"A. Yazidi, B. Oommen, Ole-Christoffer Granmo","doi":"10.1109/ICCNC.2012.6167445","DOIUrl":"https://doi.org/10.1109/ICCNC.2012.6167445","url":null,"abstract":"The task of designing estimators that are able to track time-varying distributions has found promising applications in many real-life problems. A particularly interesting family of distributions are the binomial/multinomial distributions. Existing approaches resort to sliding windows that track changes by discarding old observations. In this paper, we report a novel estimator referred to as the Stochastic Discretized Weak Estimator (SDWE), that is based on the principles of Learning Automata (LA). In brief, the estimator is able to estimate the parameters of a time varying binomial distribution using finite memory. The estimator tracks changes in the distribution by operating on a controlled random walk in a discretized probability space. The steps of the estimator are discretized so that the updates are done in jumps, and thus the convergence speed is increased. The analogous results for binomial distribution have also been extended for the multinomial case. Interestingly, the estimator possesses a low computational complexity that is independent of the number of parameters of the multinomial distribution. The paper briefly reports conclusive experimental results that demonstrate the ability of the SDWE to cope with non-stationary environments with high adaptation rate and accuracy.","PeriodicalId":125988,"journal":{"name":"2012 International Conference on Computing, Networking and Communications (ICNC)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-03-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121379021","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Advances and challenges of wireless body area networks for healthcare applications 用于医疗保健应用的无线体域网络的进展和挑战
2012 International Conference on Computing, Networking and Communications (ICNC) Pub Date : 2012-03-12 DOI: 10.1109/ICCNC.2012.6167576
Craig A. Chin, G. Crosby, Tirthankar Ghosh, R. Murimi
{"title":"Advances and challenges of wireless body area networks for healthcare applications","authors":"Craig A. Chin, G. Crosby, Tirthankar Ghosh, R. Murimi","doi":"10.1109/ICCNC.2012.6167576","DOIUrl":"https://doi.org/10.1109/ICCNC.2012.6167576","url":null,"abstract":"The term wireless body area network (WBAN) is used to describe a network of devices connected wirelessly for communication on, in and near the body. In this paper, we survey the current state of various aspects of WBAN technologies that are being used in healthcare applications. In particular, we examine the following areas: monitoring and sensing, power efficient protocols, system architectures, routing, and security. We conclude by discussing open research issues, their potential solutions and future trends.","PeriodicalId":125988,"journal":{"name":"2012 International Conference on Computing, Networking and Communications (ICNC)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-03-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127374386","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 50
Towards a global IoT: Resource re-utilization in WSNs 迈向全球物联网:无线传感器网络的资源再利用
2012 International Conference on Computing, Networking and Communications (ICNC) Pub Date : 2012-03-12 DOI: 10.1109/ICCNC.2012.6167496
Sharief M. A. Oteafy, H. Hassanein
{"title":"Towards a global IoT: Resource re-utilization in WSNs","authors":"Sharief M. A. Oteafy, H. Hassanein","doi":"10.1109/ICCNC.2012.6167496","DOIUrl":"https://doi.org/10.1109/ICCNC.2012.6167496","url":null,"abstract":"The Internet of Things (IoT) is envisioned as a paradigm shift, with a plethora of applications, on the premise of well-established enabling technologies; prominently Wireless Sensor Networks (WSNs) and RFIDs. The former has evolved to improve energy efficiency and resilient operation, yet true scalability has only been recently probed and quite sparsely advanced. Moreover, the traditional approach, whereby most WSN platforms are tailored for a single-application, imposes significant rigidity in re-utilizing platforms for new applications, and limitations on re-using previously deployed ones. In remedy, we present a novel paradigm in WSNs to efficiently utilize network resources, and extend it to a platform for multiple applications to cross-utilize resources over multiple WSNs. We present the approach in three phases; the first calibers resources in the network and their usability. Then applications are represented as finite sets of functional requirements. Finally, we present an optimization approach to find an optimal mapping between applications and resources. This paradigm presents a leap in scalability, not only in a WSN but across multiple ones, dynamically accommodating varying resources being introduced and removed; in addition to utilizing transient resources in their vicinity. To this end, we present an architecture to efficiently adopt WSNs in IoT with changing demands and scale. Our approach is further explained and demonstrated via a detailed use case depicting the premise of IoT applications.","PeriodicalId":125988,"journal":{"name":"2012 International Conference on Computing, Networking and Communications (ICNC)","volume":"660 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-03-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115123251","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
Error performance of cooperative diversity with distributed space-time code 分布式空时码协同分集的误差性能
2012 International Conference on Computing, Networking and Communications (ICNC) Pub Date : 2012-03-12 DOI: 10.1109/ICCNC.2012.6167379
Peng Huo, Lei Cao
{"title":"Error performance of cooperative diversity with distributed space-time code","authors":"Peng Huo, Lei Cao","doi":"10.1109/ICCNC.2012.6167379","DOIUrl":"https://doi.org/10.1109/ICCNC.2012.6167379","url":null,"abstract":"This paper considers a cooperative communications system consisting of a source, a relay and a destination and using the amplify-and-forward protocol. In the first time phase, the source node radiates data to both the relay and the destination nodes. In the second time phase, however, the relay node and the source node transmit cooperatively to build up a distributed space-time coding scheme. For such a system with independent Rayleigh fading in each link, we obtain its exact BER performance in a one-integral form which can be numerically calculated. The analytic results match accurately with simulation results in various channel conditions.","PeriodicalId":125988,"journal":{"name":"2012 International Conference on Computing, Networking and Communications (ICNC)","volume":"195 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-03-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122521877","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Greedy pursuits: Stability of recovery performance against general perturbations 贪婪追求:对一般扰动恢复性能的稳定性
2012 International Conference on Computing, Networking and Communications (ICNC) Pub Date : 2012-03-12 DOI: 10.1109/ICCNC.2012.6167554
Laming Chen, Jiong Chen, Yuantao Gu
{"title":"Greedy pursuits: Stability of recovery performance against general perturbations","authors":"Laming Chen, Jiong Chen, Yuantao Gu","doi":"10.1109/ICCNC.2012.6167554","DOIUrl":"https://doi.org/10.1109/ICCNC.2012.6167554","url":null,"abstract":"Applying the theory of Compressive Sensing in practice must take different kinds of perturbations into consideration. In this paper, the recovery performance of greedy pursuits is analyzed when both the measurement vector and the sensing matrix are contaminated. Specifically, the error bounds of the solutions of CoSaMP, SP, and IHT are derived respectively, and these bounds are compared with oracle recovery - least squares solution with support known a priori. The results show that the bounds are almost proportional to both perturbations, and the three greedy algorithms can provide near-oracle recovery performance against general perturbations. Several numerical simulations verify this conclusion.","PeriodicalId":125988,"journal":{"name":"2012 International Conference on Computing, Networking and Communications (ICNC)","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-03-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128285963","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Survivable smart grid communication: Smart-meters meshes to the rescue 可生存的智能电网通信:智能电表网的救援
2012 International Conference on Computing, Networking and Communications (ICNC) Pub Date : 2012-03-12 DOI: 10.1109/ICCNC.2012.6167367
A. Athreya, P. Tague
{"title":"Survivable smart grid communication: Smart-meters meshes to the rescue","authors":"A. Athreya, P. Tague","doi":"10.1109/ICCNC.2012.6167367","DOIUrl":"https://doi.org/10.1109/ICCNC.2012.6167367","url":null,"abstract":"Smart grids are critical cyber-physical infrastructures in the world now. Since these infrastructures are prone to large scale outages due to disasters or faults, a resilient and survivable communication architecture is desired. In this work, we propose a resilient and survivable hierarchical communication architecture for the smart grid that mirrors the hierarchy of the existing power grid. Post-disaster resilience in grid communication is achieved through the grid flattening process. This process involves smart-meters and other disaster surviving elements of higher system levels of the grid forming a wireless mesh network. The flattened network of grid elements with one-hop communication links help in reliable and timely relaying of grid's health information to working regions of the grid. This allows for swift action by control engineers of the utility provider and emergency services with real-time data. We propose analytical models to study the performance of the flattened architecture as a function of outage area, smart-meter density and smart-meter's neighborhood size. The results from the analytical model will be compared with simulation results from OPNET.","PeriodicalId":125988,"journal":{"name":"2012 International Conference on Computing, Networking and Communications (ICNC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-03-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128721253","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
Iterative nonlinear precoding and link adaptation for MU-MIMO with CSI impairments 带有CSI损伤的MU-MIMO的迭代非线性预编码和链路自适应
2012 International Conference on Computing, Networking and Communications (ICNC) Pub Date : 2012-03-12 DOI: 10.1109/ICCNC.2012.6167376
Hongsan Sheng, Yingxue Li
{"title":"Iterative nonlinear precoding and link adaptation for MU-MIMO with CSI impairments","authors":"Hongsan Sheng, Yingxue Li","doi":"10.1109/ICCNC.2012.6167376","DOIUrl":"https://doi.org/10.1109/ICCNC.2012.6167376","url":null,"abstract":"An iterative nonlinear precoding technique based on the Tomlinson-Harashima precoder is proposed for MU-MIMO to alleviate the performance degradation due to mismatches between actual Channel State Information (CSI) and impaired CSI available at the transmitter. A robust design is presented to feedback the effective channel rather than the nonprecoded channel for relay backhaul channel. A Channel Quality Indicator (CQI) generation is proposed for the base station (eNB) to estimate the receivers' signal-to-interference-plus-noise ratio taking into account impact of quantization errors. Numerical studies verify that the combination of the proposed iterative precoding and effective channel feedback significantly reduces the high sensitivity to quantization errors and improves the quality of radio link between the eNB and receiver. The proposed CQI feedback method enables the transmitter to accurately derive the effective channel quality seen by the receiver. Therefore, a tight link adaptation loop can be achieved to fully utilize the improved radio link.","PeriodicalId":125988,"journal":{"name":"2012 International Conference on Computing, Networking and Communications (ICNC)","volume":"550 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-03-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124705557","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Channel assignment for WLAN by considering overlapping channels in SINR interference model 信噪比干扰模型中考虑信道重叠的无线局域网信道分配
2012 International Conference on Computing, Networking and Communications (ICNC) Pub Date : 2012-03-12 DOI: 10.1109/ICCNC.2012.6167358
Kunxiao Zhou, X. Jia, Liming Xie, Yanan Chang, Xing Tang
{"title":"Channel assignment for WLAN by considering overlapping channels in SINR interference model","authors":"Kunxiao Zhou, X. Jia, Liming Xie, Yanan Chang, Xing Tang","doi":"10.1109/ICCNC.2012.6167358","DOIUrl":"https://doi.org/10.1109/ICCNC.2012.6167358","url":null,"abstract":"It has been believed that the simultaneous use of multiple channels in 802.11 wireless local area networks (WLANs) can improve network performance. Many efforts have been done to better exploit multiple non-overlapped channels. However, due to the limited number of orthogonal channels in IEEE 802.11 b/g standards, using only non-overlapping channels cannot completely eliminate the interference. Recent studies indicate that we can improve the full-range channel utilization and the network throughput by properly utilizing the partially overlapping channels. However, there are only limited studies of channel assignment algorithms for partially overlapping channels. In this paper, we investigate the problem of partially overlapping channel assignment to improve the performance of 802.11 wireless networks based on SINR model. Using the SINR model, we deduce a direct relationship between maximizing system throughput and minimizing total interference when partially overlapping channels are employed. After that, we propose a greedy method to minimize the total interference for throughput maximization. We evaluate our algorithm through extensive simulations and compare its performances with those of the state-of-the-art.","PeriodicalId":125988,"journal":{"name":"2012 International Conference on Computing, Networking and Communications (ICNC)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-03-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116305888","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 34
Asymptotic performance analysis of SC over arbitrarily correlated Nakagami-m channels 任意相关Nakagami-m信道上SC的渐近性能分析
2012 International Conference on Computing, Networking and Communications (ICNC) Pub Date : 2012-03-12 DOI: 10.1109/ICCNC.2012.6167366
Xianchang Li, Julian Cheng
{"title":"Asymptotic performance analysis of SC over arbitrarily correlated Nakagami-m channels","authors":"Xianchang Li, Julian Cheng","doi":"10.1109/ICCNC.2012.6167366","DOIUrl":"https://doi.org/10.1109/ICCNC.2012.6167366","url":null,"abstract":"Asymptotic symbol error rate and outage probability are derived for multi-branch selection combining over arbitrarily correlated Nakagami-m fading channels using a new Marcum Q-function approximation. It is shown that asymptotic error rates and outage probability over correlated branches can be obtained by scaling the asymptotic error rates over independent branches with a factor, detm(√(R)), where det(√(R)) is the determinant of matrix √(R) whose elements are the square root of corresponding elements in the branch power covariance correlation matrix R.","PeriodicalId":125988,"journal":{"name":"2012 International Conference on Computing, Networking and Communications (ICNC)","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-03-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126390614","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Security architecture for cloud networking 云网络的安全架构
2012 International Conference on Computing, Networking and Communications (ICNC) Pub Date : 2012-03-12 DOI: 10.1109/ICCNC.2012.6167464
Volker Fusenig, Ayush Sharma
{"title":"Security architecture for cloud networking","authors":"Volker Fusenig, Ayush Sharma","doi":"10.1109/ICCNC.2012.6167464","DOIUrl":"https://doi.org/10.1109/ICCNC.2012.6167464","url":null,"abstract":"Cloud computing offers reduced capital expenditure, operational risks, complexity and maintenance, and increased scalability while providing services at different abstraction levels, namely Software-as-a-Service (SaaS), Platform-as-a-Service (PaaS), and Infrastructure-as-a-Service (IaaS). A new approach called cloud networking adds networking functionalities to cloud computing and enables dynamic and flexible placement of virtual resources crossing provider borders. This allows various kinds of optimization, e.g., reducing latency or network load. However, this approach introduces new security challenges. This paper presents a security architecture that enables a user of cloud networking to define security requirements and enforce them in the cloud networking infrastructure.","PeriodicalId":125988,"journal":{"name":"2012 International Conference on Computing, Networking and Communications (ICNC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-03-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126011529","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 35
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信