2013 47th Annual Conference on Information Sciences and Systems (CISS)最新文献

筛选
英文 中文
A novel sub-domain cooperative scheme in random relay selection wireless networks 随机中继选择无线网络中一种新的子域协作方案
2013 47th Annual Conference on Information Sciences and Systems (CISS) Pub Date : 2013-03-20 DOI: 10.1109/CISS.2013.6552301
Yang Hu, Xuedan Zhang, Yuhan Dong
{"title":"A novel sub-domain cooperative scheme in random relay selection wireless networks","authors":"Yang Hu, Xuedan Zhang, Yuhan Dong","doi":"10.1109/CISS.2013.6552301","DOIUrl":"https://doi.org/10.1109/CISS.2013.6552301","url":null,"abstract":"In this paper, we consider the random relay selection for wireless cooperative communication systems with multiple relays. We present a sub-domain scheme to select less relay nodes before transmission instead of all the relay nodes to join the cooperative communication process, as well as an estimation method to determine the number of required relays. Numerical results has validated the effectiveness of the proposed scheme using less relay resources without significant performance degradation.","PeriodicalId":268095,"journal":{"name":"2013 47th Annual Conference on Information Sciences and Systems (CISS)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125081120","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An end-to-end exponentially secure secrecy scheme against an unbounded adversary 针对无界对手的端到端指数安全保密方案
2013 47th Annual Conference on Information Sciences and Systems (CISS) Pub Date : 2013-03-20 DOI: 10.1109/CISS.2013.6552269
Y. S. Khiabani, Shuangqing Wei
{"title":"An end-to-end exponentially secure secrecy scheme against an unbounded adversary","authors":"Y. S. Khiabani, Shuangqing Wei","doi":"10.1109/CISS.2013.6552269","DOIUrl":"https://doi.org/10.1109/CISS.2013.6552269","url":null,"abstract":"In this paper without tailoring to any physical channel condition or any restriction on adversary's computational resources we design a secrecy scheme with information leakage that decays at an exponential rate. The only advantage for legitimate users over eavesdropper is existence of a key source that is partially known by Eve. A key extractor based on a sampler and a Renyi extractor derives secret keys with the required entropy from this source. Encryption using this key with a general cipher maps Eve's uncertainty about the key to uncertainty about the plaintext that can also be interpreted as degradation in her channel. Using privacy amplification on top of this cipher based on inverse universal2 hashing results in information leakage with decreasing exponent that can be optimized to guarantee a higher level of secrecy.","PeriodicalId":268095,"journal":{"name":"2013 47th Annual Conference on Information Sciences and Systems (CISS)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125545800","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A scaling method for stochastic LDPC decoding over the binary symmetric channel 二进制对称信道随机LDPC译码的标度方法
2013 47th Annual Conference on Information Sciences and Systems (CISS) Pub Date : 2013-03-20 DOI: 10.1109/CISS.2013.6552331
Kuo-Lun Huang, V. Gaudet, M. Salehi
{"title":"A scaling method for stochastic LDPC decoding over the binary symmetric channel","authors":"Kuo-Lun Huang, V. Gaudet, M. Salehi","doi":"10.1109/CISS.2013.6552331","DOIUrl":"https://doi.org/10.1109/CISS.2013.6552331","url":null,"abstract":"Stochastic decoding is a decoding algorithm for Low-Density Parity-Check (LDPC) codes that leads to lowered routing congestion. Randomization is crucial for generating stochastic bits in stochastic decoders. In this paper, we propose a scaling method for stochastic LDPC decoding over the binary symmetric channel model that is independent of the channel error probability, and thus reduces the complexity in the conversion of received messages into stochastic streams. The scaling method not only improves the error rate performance, but lowers the error floor for stochastic decoding.","PeriodicalId":268095,"journal":{"name":"2013 47th Annual Conference on Information Sciences and Systems (CISS)","volume":"121 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130171001","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
DOA estimation error and resolution loss in linear sensor array 线性传感器阵列的方位估计误差与分辨率损失
2013 47th Annual Conference on Information Sciences and Systems (CISS) Pub Date : 2013-03-20 DOI: 10.1109/CISS.2013.6552300
Siqian Liu, Hongxiang Li, B. Gou
{"title":"DOA estimation error and resolution loss in linear sensor array","authors":"Siqian Liu, Hongxiang Li, B. Gou","doi":"10.1109/CISS.2013.6552300","DOIUrl":"https://doi.org/10.1109/CISS.2013.6552300","url":null,"abstract":"In order to estimate the direction of signal arrival (DOA) precisely, array of sensors is widely used to enhance resolution and accuracy of the results. For subspace-based algorithms, array sensors' position error may severely influence the estimation result since it changes the array in manifold. In this paper, we provide an improved DOA estimation method for general linear sensor array so that the effect of position error is minimized. We analytically present the relationship between sensor position error and the array's minimum resolution. Simulation results show that the new method does enhance the accuracy of the DOA estimation and the array resolution is determined by both the number of array sensors and the position error.","PeriodicalId":268095,"journal":{"name":"2013 47th Annual Conference on Information Sciences and Systems (CISS)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127795729","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Rate regions and secrecy rate regions of cooperative relay networks 协同中继网络的速率区域和保密速率区域
2013 47th Annual Conference on Information Sciences and Systems (CISS) Pub Date : 2013-03-20 DOI: 10.1109/CISS.2013.6616691
Liang Chen
{"title":"Rate regions and secrecy rate regions of cooperative relay networks","authors":"Liang Chen","doi":"10.1109/CISS.2013.6616691","DOIUrl":"https://doi.org/10.1109/CISS.2013.6616691","url":null,"abstract":"This paper studies the transmission rates and physical layer security of cooperative relay networks. For any relay network, there are natural information theoretic cut-set bounds, which upper bound the transmission rates. We further tighten the outer bounds on rate regions. We also study the achievable rate regions in consideration of physical layer security. We analyze two cross-group cooperative strategies with decode- and-forward relaying and compress-and-forward relaying respectively. We can use the decode-and-forward scheme only if the users which have both good communication channels from the source and high levels of security clearance are selected to serve as relays; otherwise, we cannot achieve physical layer security. While the compress-and-forward scheme is used, physical layer security can be achieved even though the relays have lower security clearance than the destinations.","PeriodicalId":268095,"journal":{"name":"2013 47th Annual Conference on Information Sciences and Systems (CISS)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127946386","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimal interference pre-cancellation order in DPC-based broadcast and unicast hybrid network 基于dpc的广播与单播混合网络中最优干扰预消顺序
2013 47th Annual Conference on Information Sciences and Systems (CISS) Pub Date : 2013-03-20 DOI: 10.1109/CISS.2013.6552295
Hongxiang Li, Siqian Liu, M. Gudaitis
{"title":"Optimal interference pre-cancellation order in DPC-based broadcast and unicast hybrid network","authors":"Hongxiang Li, Siqian Liu, M. Gudaitis","doi":"10.1109/CISS.2013.6552295","DOIUrl":"https://doi.org/10.1109/CISS.2013.6552295","url":null,"abstract":"It is well known that the Dirty Paper Coding (DPC) achieves the channel capacity for multiuser degraded channels. However, the optimality of DPC remains unknown for nondegraded channel. In this paper, we derive the optimal interference pre-cancellation order for a DPC based broadcast and unicast hybrid network. Specifically, we study different DPC cancellation schemes to maximize the hybrid capacity region. The conditions for each scheme being optimal are analytically derived. Our results show that the optimal interference precancellation order varies with SNR and broadcast and unicast channel conditions.","PeriodicalId":268095,"journal":{"name":"2013 47th Annual Conference on Information Sciences and Systems (CISS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130025285","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Moment based spectrum sensing algorithm for cognitive radio networks with noise variance uncertainty 基于矩的噪声方差不确定认知无线电网络频谱感知算法
2013 47th Annual Conference on Information Sciences and Systems (CISS) Pub Date : 2013-03-20 DOI: 10.1109/CISS.2013.6552277
T. E. Bogale, L. Vandendorpe
{"title":"Moment based spectrum sensing algorithm for cognitive radio networks with noise variance uncertainty","authors":"T. E. Bogale, L. Vandendorpe","doi":"10.1109/CISS.2013.6552277","DOIUrl":"https://doi.org/10.1109/CISS.2013.6552277","url":null,"abstract":"This paper proposes simple moment based spectrum sensing algorithm for cognitive radio networks in a flat fading channel. It is assumed that the transmitted signal samples are binary (quadrature) phase-shift keying BPSK (QPSK), Mary quadrature amplitude modulation (QAM) or continuous uniformly distributed random variables and the noise samples are independent and identically distributed circularly symmetric complex Gaussian random variables all with unknown (imperfect) variance. Under these assumptions, we propose a simple test statistics employing a ratio of fourth and second moments. For this statistics, we provide analytical expressions for both probability of false alarm (Pf) and probability of detection (Pd) in an additive white Gaussian noise (AWGN) channel. We confirm the theoretical expressions by computer simulation. Furthermore, under noise variance uncertainty, simulation results demonstrate that the proposed moment based detector gives better detection performance compared to that of energy detector in AWGN and Rayleigh fading channels.","PeriodicalId":268095,"journal":{"name":"2013 47th Annual Conference on Information Sciences and Systems (CISS)","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121411952","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Performance of the instantaneous frequency based classifier distinguishing BFSK from QAM and PSK modulations for asynchronous sampling and slow and fast fading 基于瞬时频率的分类器区分BFSK与QAM和PSK调制在异步采样和慢速和快速衰落中的性能
2013 47th Annual Conference on Information Sciences and Systems (CISS) Pub Date : 2013-03-20 DOI: 10.1109/CISS.2013.6552345
Mohammad Bari, H. Mustafa, M. Doroslovački
{"title":"Performance of the instantaneous frequency based classifier distinguishing BFSK from QAM and PSK modulations for asynchronous sampling and slow and fast fading","authors":"Mohammad Bari, H. Mustafa, M. Doroslovački","doi":"10.1109/CISS.2013.6552345","DOIUrl":"https://doi.org/10.1109/CISS.2013.6552345","url":null,"abstract":"In this paper we propose a feature to distinguish frequency from amplitude-phase digital modulations. We compare the performance of the feature where every symbol is sampled more than once to that where every symbol is sampled only once. The feature is based on the product of two consecutive signal values and on time averaging of the imaginary part of the product if a symbol is sampled more than once. First, the conditional probability density functions of the feature given the present modulation are determined. The central limit theorem for strictly stationary m-dependent sequences is used to obtain Gaussian approximations. Then thresholds are determined based on the minimization of the total probability of misclassification. Following that, effects of fast and slow fading, and of the symbol period and delay being non-integer multiples of sampling period on the performance are studied. In the course of doing that, the proposed classifier is compared to the maximum likelihood classifier and the wavelet based classifier using support vector machine.","PeriodicalId":268095,"journal":{"name":"2013 47th Annual Conference on Information Sciences and Systems (CISS)","volume":"221 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122866762","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Adaptive control algorithm for networked multimedia applications 网络多媒体应用的自适应控制算法
2013 47th Annual Conference on Information Sciences and Systems (CISS) Pub Date : 2013-03-20 DOI: 10.1109/CISS.2013.6624268
G. Anderson, George D. Sworo, M. Kam
{"title":"Adaptive control algorithm for networked multimedia applications","authors":"G. Anderson, George D. Sworo, M. Kam","doi":"10.1109/CISS.2013.6624268","DOIUrl":"https://doi.org/10.1109/CISS.2013.6624268","url":null,"abstract":"The effects of channel fading on application performance is often mitigated through the use of adaptive protocols such as forward-error correction (FEC). We propose an adaptive algorithm that improves the performance of a single application by minimizing data loss and decreasing packet delay. The algorithm accomplishes this task by determining dynamically how to allocate the available resources to the user applications. It attempts to solve the control problem that arises when multiple applications share these constrained network resources. An application is controlled (allocated available resources) or suspended (stopped from using network resources) so that the remaining applications can perform adequately. The operation of the proposed algorithm is demonstrated for two different scenarios; first in the presence of decreasing capacity; and then in the presence of increasing BER. The performance of the proposed method is evaluated using simulations and experimental measurements.","PeriodicalId":268095,"journal":{"name":"2013 47th Annual Conference on Information Sciences and Systems (CISS)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115522467","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On the performance of full duplex wireless networks 全双工无线网络的性能研究
2013 47th Annual Conference on Information Sciences and Systems (CISS) Pub Date : 2013-03-20 DOI: 10.1109/CISS.2013.6552332
Sanghoon Kim, W. Stark
{"title":"On the performance of full duplex wireless networks","authors":"Sanghoon Kim, W. Stark","doi":"10.1109/CISS.2013.6552332","DOIUrl":"https://doi.org/10.1109/CISS.2013.6552332","url":null,"abstract":"Half duplex radios use two separate frequency bands to enable simultaneous transmission and reception. Recently, full duplex radio that allows a wireless node to transmit and receive simultaneously in one frequency band was proposed. We propose a MAC protocol for full duplex radio networks, FDMAC, which is a simple and efficient protocol compatible with IEEE 802.11 MAC protocol. We analyze the performance of full duplex wireless networks with FD-MAC considering both the physical layer and the MAC layer.","PeriodicalId":268095,"journal":{"name":"2013 47th Annual Conference on Information Sciences and Systems (CISS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130963734","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信