{"title":"A Novel Approach to Improving Burst Errors Correction Capability of Hamming Code","authors":"Jianwu Zhao, Yibing Shi","doi":"10.1109/ICCCAS.2007.4348260","DOIUrl":"https://doi.org/10.1109/ICCCAS.2007.4348260","url":null,"abstract":"Error detection and correction is critical to accurate data transmission, storage and retrieval. Error correction coding (ECC) has been a crucial part of data transmission or storage. In high-reliability applications, the single error correction and double error detections (SEC-DED) Hamming code may not provide adequate protection against burst errors. This makes multiple-error correction (MEC) highly desirable. This paper proposed a novel approach to improving burst errors correction capability of the extended Hamming Code, with the target objective of minimizing the redundancy, while retaining code rate as maximum as possible. Design algorithms of Hamming encoding and decoding are proposed in this paper, and the simplicity and ease of their implementations are demonstrated with example.","PeriodicalId":218351,"journal":{"name":"2007 International Conference on Communications, Circuits and Systems","volume":"121 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132199835","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Genetic Scheduling Algorithm Based on Knowledge for Multiprocessor System","authors":"Lan Zhou, Sun Shi-xin","doi":"10.1109/ICCCAS.2007.4348194","DOIUrl":"https://doi.org/10.1109/ICCCAS.2007.4348194","url":null,"abstract":"With the extensive studies of the task scheduling problem, many new methods, especial genetic algorithms, have been introduced into this field. In this paper, we develop a novel genetic algorithm, namely the knowledge-based genetic scheduling (KGS) algorithm with task duplication. KGS is different from the previously proposed genetic algorithms in a number of ways. Unlike the others genetic algorithms, KGS initializes population based on more knowledge to provide itself a better iterative basis. KGS also designs an effective decoding algorithm to get the best schedule scheme for a certain chromosome. In addition, KGS uses the relative precedence constraints other than absolute priorities to determine the schedule order of tasks. Simulation results show that KGS outperforms the previously proposed algorithms in terms of the solution quality and the execution time.","PeriodicalId":218351,"journal":{"name":"2007 International Conference on Communications, Circuits and Systems","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129166400","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Minghua Zhao, Dakui Wu, Yong Fan, J. Zhan, Yonghong Zhang
{"title":"A New 94.5GHz Avalanche Diode High Order Frequency Multiplier","authors":"Minghua Zhao, Dakui Wu, Yong Fan, J. Zhan, Yonghong Zhang","doi":"10.1109/ICCCAS.2007.4348244","DOIUrl":"https://doi.org/10.1109/ICCCAS.2007.4348244","url":null,"abstract":"An investigation of 94.5 GHz avalanche diode high order frequency multiplier is presented. The nonlinearity property of avalanche phenomenon has evoked great interest in high order frequency multiplication. Theoretical analysis of harmonic characters of avalanche current is outlined. In experiment 4.1 mW output power and 0.8% efficiency are obtained. Meanwhile the phase noise of 84 dBc/Hz at 10 KHz offset is measured.","PeriodicalId":218351,"journal":{"name":"2007 International Conference on Communications, Circuits and Systems","volume":"164 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133246475","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Hybrid Artificial Immune Network with Swarm Learning","authors":"Jian Fu, Zhonghua Li, Hongzhou Tan","doi":"10.1109/ICCCAS.2007.4348196","DOIUrl":"https://doi.org/10.1109/ICCCAS.2007.4348196","url":null,"abstract":"The artificial immune system is a new approach inspired from abundant mechanisms of biological immune system. It includes such basic operations as clone, mutation, and selection, even crossover. It is widely applied to function optimization, abnormal detection, pattern recognition, computer security, machine learning, control engineering, etc. However, the evolutionary process of the current artificial immune system depends on only two factors. One is the fitness between antibody and antigen, and the other is the concentration of antibody population. As a global searching method, particle swarm optimization includes an important social learning mechanism that enables it to fast approximate the global optimum. This paper proposed a hybrid artificial immune network for optimization with swarm learning and elite-keeping. Simulation results indicated this hybrid method has lower time complexity and fast convergence, and is an effective optimization tool.","PeriodicalId":218351,"journal":{"name":"2007 International Conference on Communications, Circuits and Systems","volume":"126 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133321323","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analysis for MIMO correlated frequency-selective channel in the presence of interference","authors":"Hailin Xiao, Z. Nie","doi":"10.1109/ICCCAS.2007.6250064","DOIUrl":"https://doi.org/10.1109/ICCCAS.2007.6250064","url":null,"abstract":"Adopt space time spreading, superimposed training sequences and space-time coding to obtain a closed-form of average error probability upper bound and maximum likelihood estimation expression for multiple input and multiple output (MIMO) correlated frequency-selective channel in the presence of interference(co-channel interference and jamming signals). Moreover, the correlation at both ends of the wireless link can be incorporated equivalently into correlation at the transmit end is derived. The simulation results are presented to validate the proposed analysis.","PeriodicalId":218351,"journal":{"name":"2007 International Conference on Communications, Circuits and Systems","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132743842","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Fengli Zhang, Ji Geng, Zhiguang Qin, Mingtian Zhou
{"title":"Detecting the DDoS attacks based on SYN proxy and Hop-Count Filter","authors":"Fengli Zhang, Ji Geng, Zhiguang Qin, Mingtian Zhou","doi":"10.1109/ICCCAS.2007.6251605","DOIUrl":"https://doi.org/10.1109/ICCCAS.2007.6251605","url":null,"abstract":"This paper analyzes the principles of SYN proxy, proposes the two upgrade algorithms of SYN proxy, and gives the ideas for combining the hop-count information filter to defense DDoS, introduces the detecting method of DDoS attacks based on SYN proxy integrated the hop count filter. The test result expresses that this method may detect and defense DDos attack in heavy traffic.","PeriodicalId":218351,"journal":{"name":"2007 International Conference on Communications, Circuits and Systems","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132802807","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Dual Digital Watermarking Used in Product Casing","authors":"Jing Liu, Hongyu Zhang","doi":"10.1109/ICCCAS.2007.4348125","DOIUrl":"https://doi.org/10.1109/ICCCAS.2007.4348125","url":null,"abstract":"In this paper, it is proposed an invisible dual digital watermarking scheme based on DCT domain, which can be used in the product casing. By embedding fragile and robust watermark simultaneously, the scheme can both prevent the product from forgery and take the information of its serial number.","PeriodicalId":218351,"journal":{"name":"2007 International Conference on Communications, Circuits and Systems","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133790205","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Reliability-based data-puncturing hybrid ARQ scheme with LDPC Codes","authors":"Xiaoheng Chen, Xiangdong Jin","doi":"10.1109/ICCCAS.2007.6247589","DOIUrl":"https://doi.org/10.1109/ICCCAS.2007.6247589","url":null,"abstract":"We propose an improved data-puncturing hybrid-ARQ scheme for Low-Density Parity-Check (LDPC) codes based on codeword reliability. Incremental redundancy is generated from punctured versions of the original data using the same encoder/decoder pair. Retransmission packet sizes are determined adaptively according to the reliability level of the decoded data. We conduct detailed simulation experiments and compare the proposed scheme with RB-HARQ and DP-HARQ approaches. The RB-DP-HARQ scheme reduces the retransmission times and the feedback channel traffic for NACK signaling with negligible overhead.","PeriodicalId":218351,"journal":{"name":"2007 International Conference on Communications, Circuits and Systems","volume":"105 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122080899","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Verilog Transformation for an RTL SAT Solver in Formal Verification","authors":"Xiaoqing Yang, Jinian Bian, Shujun Deng, Yanni Zhao","doi":"10.1109/ICCCAS.2007.4348294","DOIUrl":"https://doi.org/10.1109/ICCCAS.2007.4348294","url":null,"abstract":"This paper presents a new method automatically translating the Verilog model to an RTL circuit model which can be used in a state-of-the-art finite-domain satisfiability solver EHSAT to check the verified properties. Different methods are used in the transformations of different data types and expressions of Verilog model. Effective backfilling technology is applied in the processes of if...else and case blocks. Experimental results show that this method can make the transformation effective.","PeriodicalId":218351,"journal":{"name":"2007 International Conference on Communications, Circuits and Systems","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114741643","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"LCMV Beamforming Algorithm Based on the ractiona Fourier Transform","authors":"Wu Haizhou, Tao Ran","doi":"10.1109/ICCCAS.2007.4348177","DOIUrl":"https://doi.org/10.1109/ICCCAS.2007.4348177","url":null,"abstract":"We propose a new method of LCMV beamforming based on the fractional Fourier transform (FrFT). This method encompasses the conventional linearly constrained minimum variance (LCMV) beamforming in the frequency domain or spatial domain as special cases. It is especially useful for applications involving chirp signals such as signal enhancement problems with accelerating sinusoidal sources where the Doppler effect generates chirp signals and a frequency shift and active radar problems where chirp signals are transmitted. Numerical examples demonstrate the potential advantage of the proposed method over the ordinary frequency or spatial domain beamforming for a moving a target.","PeriodicalId":218351,"journal":{"name":"2007 International Conference on Communications, Circuits and Systems","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117082579","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}