{"title":"A dual-channel beamformer based on time-delay compensation estimator and shifted PCA for speech enhancement","authors":"Zhang Jie, Hong Liu","doi":"10.1109/SOFTCOM.2015.7314060","DOIUrl":"https://doi.org/10.1109/SOFTCOM.2015.7314060","url":null,"abstract":"Speech enhancement is an essential technique to process degraded audio in various applications. Beamforming to eliminate interferences based on sensor arrays is the most well-known method for this issue. However, traditional beamformers often face magnitude incoherence towards received signals due to directional weighting. Therefore, a novel dual-channel beamformer based on time-delay compensation (TDC) and shifted principal components analysis (PCA) is presented in this work. Firstly, our enhancement algorithm utilizes TDC estimator to preserve binaural cues, including interaural time-delay and intensity difference. Then the estimated cues are comprised to improve the shifted PCA, which can reduce noise by extracting primary components. Finally, the aforehand processed audio are input to a beamformer with post-filter to obtain enhanced speech. Experiments have demonstrated that the proposed algorithm could achieve some superiorities in speech intelligibility compared with the state-of-the-arts against real scenarios.","PeriodicalId":264787,"journal":{"name":"2015 23rd International Conference on Software, Telecommunications and Computer Networks (SoftCOM)","volume":"8 9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123672958","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A configurable system for the definition and automatic calculation of a high number of derived discrete measures","authors":"S. Nanni, G. Mazzini","doi":"10.1109/SOFTCOM.2015.7314059","DOIUrl":"https://doi.org/10.1109/SOFTCOM.2015.7314059","url":null,"abstract":"A derived measure is elaborated on the basis of primary events and therefore requires a function that calculates it from the individual values of the primary measures. In order for a derived measure to be calculated, it is necessary to specify the primary measures on which it depends, and to define the dependency function that correlates them and allows its evaluation. In the case of a few derived measures, in the range of tens, the definition and configuration phases of the derived measures can be executed manually, typically through the use of an off-line procedure. In the case of complex systems, dealing with the transformation of hundreds of derived measures, it becomes necessary the preparation of an embedded automatic process, allowing automatic definition of a high number of derived measures, starting from the primary ones, and their calculation according to predetermined, configurable and parametrized rules.","PeriodicalId":264787,"journal":{"name":"2015 23rd International Conference on Software, Telecommunications and Computer Networks (SoftCOM)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122788959","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Centralized management of multiple WiFi connectivity services (part I)","authors":"Enrica Salbaroli, E. Benetti, G. Mazzini","doi":"10.1109/SOFTCOM.2015.7314077","DOIUrl":"https://doi.org/10.1109/SOFTCOM.2015.7314077","url":null,"abstract":"Presence of WiFi connectivity is becoming a necessity felt by everyone: at work, in schools, in public places such as squares or parks or libraries. The main purpose of this work is to start from the experience gained in recent years from LepidaSpA on the highlighted needs in this area, in the region of Emilia Romagna. The different connectivity services offered by LepidaSpA were then analyzed in order of their centralization in one more scalable and secure system.","PeriodicalId":264787,"journal":{"name":"2015 23rd International Conference on Software, Telecommunications and Computer Networks (SoftCOM)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131197568","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Crosstalk reduction using nonuniform transmission lines","authors":"M. Kachout, J. B. Tahar, F. Choubani","doi":"10.1109/SOFTCOM.2015.7314081","DOIUrl":"https://doi.org/10.1109/SOFTCOM.2015.7314081","url":null,"abstract":"In this paper, a crosstalk reduction technique is proposed which utilizes nonuniform transmission lines. We investigate the effect of the nonuniform transmission line on the crosstalk reduction by simulation. We also present a comparison between coupled lines with uniform and nonuniform structures. Results show that using nonuniform guard line reduces crosstalk by more than 10db.","PeriodicalId":264787,"journal":{"name":"2015 23rd International Conference on Software, Telecommunications and Computer Networks (SoftCOM)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123350643","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Greedy localization approach in Wireless Sensors Network","authors":"Iness Ahriz, D. L. Ruyet","doi":"10.1109/SOFTCOM.2015.7314096","DOIUrl":"https://doi.org/10.1109/SOFTCOM.2015.7314096","url":null,"abstract":"In this paper, we propose a greedy localization approach in Wireless Sensors Network (WSN) which has received much attention in the emerging area of Internet of Things (IoT). The proposed method is based on Compressive Sensing (CS) formulation and uses the inherent sparsity of the localization problem. While this is not the first work on applying CS to localize targets, in this paper, we propose a simple and novel formulation and deduce an algorithm to solve this problem, more suitable to the time and complexity constraints of IoT context. Moreover, we propose a Denoising - Greedy Recovery Algorithm (D-GRA) to deal with noise measurement affecting the received signal strength used to the sensor localization. The proposed algorithm has been compared to the classical trilateration method by performing different simulations. The obtained results demonstrate that the proposed algorithms outperform the trilateration method in a noisy environment.","PeriodicalId":264787,"journal":{"name":"2015 23rd International Conference on Software, Telecommunications and Computer Networks (SoftCOM)","volume":"112 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124021051","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Architecture improvements for an efficient emergency network","authors":"C. Taddia, F. Marcheselli, G. Mazzini","doi":"10.1109/SOFTCOM.2015.7314070","DOIUrl":"https://doi.org/10.1109/SOFTCOM.2015.7314070","url":null,"abstract":"This paper presents a modern and efficient architecture for an emergency tetra network working in the Italian Emilia-Romagna region. This network is by now fully working and serving the whole region area with an obsolete architecture so we describe the migration plan we are following in order to limit the breakdown and to guarantee better services while reducing the overall maintenance costs.","PeriodicalId":264787,"journal":{"name":"2015 23rd International Conference on Software, Telecommunications and Computer Networks (SoftCOM)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126056008","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Vasileios Gkamas, K. Christodoulopoulos, Emmanouel Varvarigos
{"title":"Energy-aware multi-layer flexible optical network operation","authors":"Vasileios Gkamas, K. Christodoulopoulos, Emmanouel Varvarigos","doi":"10.1109/SOFTCOM.2015.7314088","DOIUrl":"https://doi.org/10.1109/SOFTCOM.2015.7314088","url":null,"abstract":"This work studies the energy-minimized multi-layer operation of IP over flexible optical networks, under a dynamic traffic scenario. We extend a multi-layer connection establishment algorithm to jointly optimize the energy consumption of both IP and optical layers. We compare the performance of the proposed energy-aware multi-layer connection establishment algorithm when applied to fixed-grid MLR and flexible optical networks, with that of an energy-unaware solution. We observe that energy savings can be achieved especially at the optical layer, when the proposed energy-aware algorithm is applied to a flexible, as opposed to a fixed-grid MLR optical network, while we also observed a tradeoff between blocking probability and energy efficiency in the case of flexible optical networks.","PeriodicalId":264787,"journal":{"name":"2015 23rd International Conference on Software, Telecommunications and Computer Networks (SoftCOM)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126820809","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"File size-based small cell connection in Phantom Cell Concept energy savings schemes","authors":"Emmanuel Ternon, Patrick Agyapong, A. Dekorsy","doi":"10.1109/SOFTCOM.2015.7314094","DOIUrl":"https://doi.org/10.1109/SOFTCOM.2015.7314094","url":null,"abstract":"Energy savings schemes, in which unused small cells are put into a low power sleep mode, are an efficient way to reduce the energy consumption in Phantom Cell Concept (PCC) systems. Existing energy savings schemes, in which a user equipment (UE) is connected to a small cell whenever it needs to receive data, yield a significant amount of energy savings. To further reduce the energy consumption of PCC systems, we introduce in this paper two methods making a user connect or not to a small cell, based on the size of arriving files. Performance results show that using the size of the file to be received as an additional cell selection parameter can yield a further 5% energy savings in certain conditions, at minimal cost to user quality of service (QoS), with respect to the amount of energy savings obtained with existing schemes.","PeriodicalId":264787,"journal":{"name":"2015 23rd International Conference on Software, Telecommunications and Computer Networks (SoftCOM)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114327270","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Influence of the soil ionization on the transient current induced along the horizontal grounding electrode","authors":"S. Šesnić, D. Poljak, Goran Knezic","doi":"10.1109/SOFTCOM.2015.7314100","DOIUrl":"https://doi.org/10.1109/SOFTCOM.2015.7314100","url":null,"abstract":"The paper deals with the assessment of the influence of soil ionization on the transient current induced along the horizontal grounding electrode. Transient response of the grounding electrode buried in a lossy half-space is determined via the analytical solution of the corresponding Pocklington equation in the time domain. The electrode is excited by an equivalent current source representing the lightning strike current. Presence of the earth-air interface is taken into account via simplified reflection coefficient arising from the Modified Image Theory (MIT). The influence of the soil ionization is taken into account as an increase of soil conductivity when critical value of the electric field is exceeded in the vicinity of the electrode. The calculations have been performed for different steady-state conductivities of the soil, various electrode lengths and different types of lightning strikes. The results for the transient current have been compared to the results obtained by calculation without influence of soil ionization.","PeriodicalId":264787,"journal":{"name":"2015 23rd International Conference on Software, Telecommunications and Computer Networks (SoftCOM)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132728329","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Optimal chunk scheduling algorithm based on taboo search for adaptive live video streaming in CDN-P2P","authors":"M. Meskovic, M. Kos, Amir Meskovic","doi":"10.1109/SOFTCOM.2015.7314110","DOIUrl":"https://doi.org/10.1109/SOFTCOM.2015.7314110","url":null,"abstract":"With a massive increase in user device heterogeneity, an effective distribution of live video streaming that takes into consideration varying display sizes and processing capabilities of end user devices is becoming a necessity for live multimedia content providers worldwide. In order to answer the challenges of device heterogeneity, an underlying delivery architecture needs to be enhanced so that the best possible quality of video is delivered to the end user in accordance with the end users' device capabilities in a timely and effective fashion. In a primitive video streaming environment that does not take device heterogeneity into consideration, video streaming is based on a single-layered video which uses a scheduling algorithm that ensures timely download of video chunks (i.e. chunks are downloaded before they need to be played back). This paper introduces a model for chunk scheduling algorithm which examines the issue of live video streaming performance optimization as a knapsack NP-hard problem. The proposed scheduling algorithm uses a taboo search method to identify and prioritize chunk delivery in addition to taking bandwidth throughput and delivery ratio into consideration. It optimizes bandwidth utilization by identification of “useless available chunks” by identifying them via chunk playback deadline. With this approach, chunks whose playback deadline has passed as well as those who belong to layers that do not have corresponding lower values will be considered as useless and will be disposed of. Finally, this paper provides simulation results which show that the proposed algorithm significantly performs better than the `primitive' chunk scheduling strategies especially in situations with rigid bandwidth constraints.","PeriodicalId":264787,"journal":{"name":"2015 23rd International Conference on Software, Telecommunications and Computer Networks (SoftCOM)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130135506","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}