{"title":"Development of Unscented Kalman filter algorithm for 3-D point based rigid registration","authors":"F. Zamani, A. Beheshti","doi":"10.1109/ISTEL.2008.4651367","DOIUrl":"https://doi.org/10.1109/ISTEL.2008.4651367","url":null,"abstract":"This paper proposes an effective algorithm for estimating the transformation parameters which align two data sets belonging to the rigid objects. This point based algorithm uses unscented Kalman filter for estimating the state vector of transformation which is a nonlinear function of translation and rotation. It is also assumed that the Gaussian noise is added to the fixed data set. In this paper, firstly we investigate the newest algorithm performance for point based rigid body registration using UKF and then we show the drawback of this algorithm in estimating of high range rotations. It is shown that the UKF algorithm is sensitive to selecting the appropriate initial sate vector. For solving limitation of the UKF algorithm, we propose an extended unscented kalman filter algorithm. It is shown that by exploiting this new algorithm which uses pre-registration, we can find an appropriate initial state vector. In this paper, we compare the results of EUKF algorithm with the previous UKF algorithm for different rotations. We demonstrate the effectiveness of the EUKF algorithm for estimation of high transformations between two data sets.","PeriodicalId":133602,"journal":{"name":"2008 International Symposium on Telecommunications","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131069736","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Power allocation in an amplify-and-forward cooperative network for outage probability minimization","authors":"Arash Khabbazi, Said Nader-Esfahani","doi":"10.1109/ISTEL.2008.4651307","DOIUrl":"https://doi.org/10.1109/ISTEL.2008.4651307","url":null,"abstract":"In cooperative networks, some of the users in neighborhood of the source relay the source information, in order to combat the effects of multipath fading. Recent investigations, on multirelay amplify-and-forward cooperative networks, have shown that a significant performance improvement will be obtained, if the phase information of the channel between relays and destination are feedback to the relays. As, in that case, the relays can send their signals simultaneously but with proper phases, so that these signals are combined coherently at destination. In this paper, we shall assume that the magnitude information of the channels is also feedback to the relays. We will use this information to find an optimum power allocation between the relays and the source. This optimal power allocation will be derived analytically, by minimization of outage probability. Numerical simulation shows that our optimal power allocation significantly improves the outage probability of the system, as compared with equal power allocation.","PeriodicalId":133602,"journal":{"name":"2008 International Symposium on Telecommunications","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133241333","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Jamming resistance capabilities of the Spectrally Phase Encoded OCDMA systems","authors":"M. Emadi, J. Salehi","doi":"10.1109/ISTEL.2008.4651300","DOIUrl":"https://doi.org/10.1109/ISTEL.2008.4651300","url":null,"abstract":"Although, enhanced security is often mentioned as a noticeable benefit of spectrally phase encoded optical CDMA (SPE-OCDMA) systems, the quantity and degree of security enhancement is not considered deeply in the literature. One of the facts in determining the degree of security is to assess the resistance capability of the system against various jammers attacks. In this paper, we introduce and model three types of jammers, namely (Pulse Jammer, Partialband Jammer, and Follower Jammer). We mathematically analyze the effects of the above jammers on the performance of the SPE-OCDMA systems that use On-Off Keying (OOK) modulation scheme. It is demonstrated that under certain conditions, the performance of the system can be dramatically degraded due to the jamming signals. Moreover, it is seen that the strongest jammer is the follower jammer.","PeriodicalId":133602,"journal":{"name":"2008 International Symposium on Telecommunications","volume":"330 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116455044","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Hassanzadeh, M. Parker, T. Helleseth, Y. E. Salehani, M. Abyaneh
{"title":"Differential distinguishing attack on the Shannon stream cipher based on fault analysis","authors":"M. Hassanzadeh, M. Parker, T. Helleseth, Y. E. Salehani, M. Abyaneh","doi":"10.1109/ISTEL.2008.4651385","DOIUrl":"https://doi.org/10.1109/ISTEL.2008.4651385","url":null,"abstract":"In reference, some weak points in the design of the Shannon stream cipher and a differential distinguisher with complexity of O(214.92) keystream bits (i.e. O(29.92) keystream words) were presented. Another distinguishing attack based on a multidimensional linear transformation was presented in which require 2106.996 keystream words. Both of these attacks need to have access to the initial state that is unlikely. In this paper, a likely attack using fault analysis method is exploited to solve the mentioned problem. Additionally, a new distinguisher is proposed which improves the attack complexity to four times the complexity of running the Shannon stream cipher. Only are two differential outputs needed for successful attack with error probability equal to 0.001.","PeriodicalId":133602,"journal":{"name":"2008 International Symposium on Telecommunications","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116521050","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Characterization of wireless mesh backhaul networks with MIMO systems","authors":"N. Haghighizadeh, A. Mohammadi","doi":"10.1109/ISTEL.2008.4651333","DOIUrl":"https://doi.org/10.1109/ISTEL.2008.4651333","url":null,"abstract":"In this paper, the wireless mesh backhaul using MIMO systems has been studied. In the mesh networking, information is routed from source to destination over multiple wireless links. On the other hand, using wireless MIMO systems, the channel capacity is significantly increased without additional signal power or bandwidth. We have used the linear programming to optimize the routing determination and to maximize the throughput. This technique is used to calculate the throughput for a hexagonal grid of base-stations, for single-hop, multi-hop, SISO, and MIMO transmissions for various network scenarios.","PeriodicalId":133602,"journal":{"name":"2008 International Symposium on Telecommunications","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133559939","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Low cost concurrent error detection for lattice wave digital filters","authors":"R. Yousefi, M. Sargolzaie, S. M. Fakhraie","doi":"10.1109/ISTEL.2008.4651371","DOIUrl":"https://doi.org/10.1109/ISTEL.2008.4651371","url":null,"abstract":"Wave digital filters are widely used in digital signal processing systems due to their implementation advantages such as low sensitivity, good round-off noise and wide dynamic range. A low-cost on-line test scheme for wave digital filters is proposed. Area overhead is reduced significantly with the aim to bring online testing to costumer electronics. 20% fault coverage improvement is also achieved by using the proposed simple test scheme.","PeriodicalId":133602,"journal":{"name":"2008 International Symposium on Telecommunications","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124915958","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Three-dimensional finite-difference time-domain analysis of gas ionization","authors":"H. Rastegarfar, A. A. Shishegar","doi":"10.1109/ISTEL.2008.4651292","DOIUrl":"https://doi.org/10.1109/ISTEL.2008.4651292","url":null,"abstract":"The propagation of intense optical beams in a gas undergoing ionization is analyzed through a three-dimensional finite-difference time-domain (3D-FDTD) scheme. The propagation dynamics include the effects of diffraction, nonlinear self-focusing, and ionization. For sufficiently intense optical beams the neutral gas undergoes ionization, generating a plasma which tends to defocus the beam. Balancing of diffraction, plasma defocusing, and nonlinear self-focusing may lead to self-guided results. In this paper, necessary relations have been introduced into the conventional FDTD formulation to account for the nonlinear behaviors. Furthermore, a concurrent utilization of computer memory and disk storage helps us in expanding the simulation domain to a considerable extent. Results of various simulation scenarios are offered using our FDTD code. Simulations indicate that gas ionization has considerable effects on the propagation characteristics of intense optical beams.","PeriodicalId":133602,"journal":{"name":"2008 International Symposium on Telecommunications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130271012","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A new 3-layer replication and scheduling strategy In data grid","authors":"R. Sepahvand, A. Horri, G. Dastghaibyfard","doi":"10.1109/ISTEL.2008.4651347","DOIUrl":"https://doi.org/10.1109/ISTEL.2008.4651347","url":null,"abstract":"In data grids huge amount of data are generated and processed by users around the world. Objective of dynamic replica strategies is reducing file access time by reducing network traffic, which leads to reducing job runtime. In this paper a replication algorithm for a 3-level hierarchical structure and a scheduling algorithm are proposed. The simulation results with optorsim show better performance (over 13%) comparing to current algorithms.","PeriodicalId":133602,"journal":{"name":"2008 International Symposium on Telecommunications","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127613209","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Fathy, M. Soryani, A. E. Zonouz, A. Asad, M. Seyrafi
{"title":"Some enhanced cache replacement policies for reducing power in mobile devices","authors":"M. Fathy, M. Soryani, A. E. Zonouz, A. Asad, M. Seyrafi","doi":"10.1109/ISTEL.2008.4651305","DOIUrl":"https://doi.org/10.1109/ISTEL.2008.4651305","url":null,"abstract":"Developing widely useful mobile computing applications presents difficult challenges. On one hand, mobile users demand fast response times, and deep relevant content. On the other hand, mobile devices have limited storage, power and communication resources. Caching frequently accessed data items on the mobile client is an effective technique to improve the system performance in mobile environment. Due to cache size limitation, the choice of cache replacement technique to find a suitable subset of items for eviction from cache becomes important. Power consumption and lookup latency both are crucial factors of performance in embedded systems. One important decision in designing hierarchical memories is selection of cache replacement policies. In this paper, we firstly explain briefly some of the available and used replacement policies in modern cache structures. Then we propose some improved replacement policies and evaluate their performance. We show that, taking the dirty blocks into account in cache policy will reduce the average power consumption by some percents.","PeriodicalId":133602,"journal":{"name":"2008 International Symposium on Telecommunications","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127838702","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Local reconstruction of virtual backbone to support mobility in wireless ad hoc networks","authors":"P. Teymoori, N. Yazdani","doi":"10.1109/ISTEL.2008.4651332","DOIUrl":"https://doi.org/10.1109/ISTEL.2008.4651332","url":null,"abstract":"Constructing a connected dominating set (CDS) has been widely used as a topology control method and a virtual backbone to reduce energy consumption and communication overhead. Previous works emphasize on constructing the minimum CDS (MCDS) and do not consider node mobility and CDS reconstruction where energy balancing is required. In this paper, we propose a CDS reconstruction algorithm which is able to reconfigure the CDS locally in the presence of mobility and energy balancing without the need for reconstructing the whole CDS. The algorithm does not increase the approximation factor of the algorithm which has constructed the CDS already and it has O(Delta log Delta) and O(Delta) time and message complexity, respectively, which is a great improvement in comparison with the other approaches, where Delta is the maximum degree of the network graph.","PeriodicalId":133602,"journal":{"name":"2008 International Symposium on Telecommunications","volume":"75 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120923071","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}