Sherlie Portugal, Saransh Malik, Changwoo Seo, Cheolsung Kim, I. Hwang
{"title":"Reduction of sphere decoding complexity using an adaptive SD-OSIC system","authors":"Sherlie Portugal, Saransh Malik, Changwoo Seo, Cheolsung Kim, I. Hwang","doi":"10.1109/TSP.2011.6043765","DOIUrl":"https://doi.org/10.1109/TSP.2011.6043765","url":null,"abstract":"Sphere decoding is a technique able to achieve the optimal performance of the maximum likelihood decoder, but its high and variable complexity can make the practical implementation infeasible. In this paper, we present an adaptive system, called adaptive SD-OSIC, as a way of reducing the decoding complexity while maintaining the error performance of conventional sphere decoding.","PeriodicalId":341695,"journal":{"name":"2011 34th International Conference on Telecommunications and Signal Processing (TSP)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129790430","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Accelerated modular arithmetic for low-performance devices","authors":"L. Malina, J. Hajny","doi":"10.1109/TSP.2011.6043757","DOIUrl":"https://doi.org/10.1109/TSP.2011.6043757","url":null,"abstract":"The paper deals with efficient modular arithmetic algorithms for resource restricted devices like smart-cards or sensors. The modular arithmetic is important for a wide variety of computations in these devices, from communication to signal processing. To speed up some cryptographic operations, the most widespread devices often have some cryptographic support provided by a dedicated chip. Our goal is to use the resources of a crypto-coprocessor to accelerate general modular operations. The paper describes our implementation of modular arithmetic operations with large integers, and provides the comparison of the accelerated method with three classical methods for (modular) multiplication. The standard methods are represented by the operand-scanning multiplication algorithm (the school-book method), the product-scanning method (Comba's method) and the Montgomery multiplication. The accelerated method is based on using the RSA encryption support for multiplication tunnelling. The performance characteristics of standard methods and the advanced method called ‘RSA tunnel’ are compared and concluded.","PeriodicalId":341695,"journal":{"name":"2011 34th International Conference on Telecommunications and Signal Processing (TSP)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129033581","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Towards an automatic design of non-cryptographic hash function","authors":"J. Karasek, Radim Burget, Ondrej Morsky","doi":"10.1109/TSP.2011.6043785","DOIUrl":"https://doi.org/10.1109/TSP.2011.6043785","url":null,"abstract":"This paper presents an automatic approach to a non-cryptographic hash function design based on grammar guided genetic programming. The paper describes how it is possible to design a non-cryptographic hash function, implementation issues such as terminal and nonterminal symbols, fitness measure, and used context-free grammar. The main aim of this paper is to link the expert knowledge in the design of non-cryptographic hash function and the process of automatic design which can try many more combinations then an expert can. The hash function automatically designed in the paper is competitive with human design and it is compared with the most used non-cryptographic hashes in the field of speed of processing and in the field of collision resistance. The results are discussed in the last section and further improvement is mentioned.","PeriodicalId":341695,"journal":{"name":"2011 34th International Conference on Telecommunications and Signal Processing (TSP)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130030302","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Optimization of boundary recognition algorithms for wireless sensor network applications","authors":"Milan Simek, Jan Bocek, Patrik Moravek","doi":"10.1109/TSP.2011.6043745","DOIUrl":"https://doi.org/10.1109/TSP.2011.6043745","url":null,"abstract":"Recognition of network boundaries in wireless sensor network (WSN) applications is crucial from two reasons. First, a knowledge of boundary nodes can help to increase a security performance of sensor network. And second it can significantly contributes to the energy conservation of inner nodes that can be switched into the sleeping modes during no activity is presented on the network boundaries. Furthermore, the knowledge of boundary nodes is necessary condition for some localization algorithms applied into the WSN environment. We proposed two novel algorithms referred to as BRC and BRBC and compare their recognition efficiency with three know related algorithms. The results of simulations showed that all algorithms achieved high ratio of success detections, however it is shown that only the novel algorithms achieved the low ratio of the false detections.","PeriodicalId":341695,"journal":{"name":"2011 34th International Conference on Telecommunications and Signal Processing (TSP)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115860792","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"MOS only simulated grounded negative resistors","authors":"Abdullah Sunca, O. Cicekoglu, Günhan Dündar","doi":"10.1109/TSP.2011.6043715","DOIUrl":"https://doi.org/10.1109/TSP.2011.6043715","url":null,"abstract":"In this paper, a number of tunable grounded negative resistor circuits are presented. These new negative resistors exhibit important features such as simplicity, independent tunability and wide frequency range. One of the introduced negative resistor circuits is simulated using TSMC 0.18μm process parameters and compared to a couple of other negative resistors in the literature.","PeriodicalId":341695,"journal":{"name":"2011 34th International Conference on Telecommunications and Signal Processing (TSP)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125718899","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"VHDL procedure for combinational divider","authors":"Z. Fedra, J. Kolouch","doi":"10.1109/TSP.2011.6043687","DOIUrl":"https://doi.org/10.1109/TSP.2011.6043687","url":null,"abstract":"In the paper, a synthesizable combinational integer number divider VHDL model is described that is suitable for implementation in the FPGA devices. The algorithm the divider is based on is briefly introduced. Along the model, testbench for its functional verification is presented. Results of implementation in Xilinx Spartan-3 and Spartan-6 devices — amount of FPGA resources used and maximum delay, are given in tables.","PeriodicalId":341695,"journal":{"name":"2011 34th International Conference on Telecommunications and Signal Processing (TSP)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125168777","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Monitoring system for EFIPSANS networks","authors":"Frantisek Uzsak, Csaba Simon","doi":"10.1109/TSP.2011.6043776","DOIUrl":"https://doi.org/10.1109/TSP.2011.6043776","url":null,"abstract":"In this paper, we introduce a framework that enables the deployment of autonomous services over IPv6. Then we present in detail the monitoring tool implemented as a part of the EFIPSANS project that prototypes the monitoring function of the management plane and supports the execution and verification of the elements developed during this project. The visualization tool was designed in a modular and extensible fashion and provides several useful features, which supported the debugging process. Furthermore, we aimed at simplicity, but at the same time we attempted to meet some performance and aesthetic requirements, as well.","PeriodicalId":341695,"journal":{"name":"2011 34th International Conference on Telecommunications and Signal Processing (TSP)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128276646","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Vladimir Tejkal, M. Filka, Jan Sporik, P. Reichert, P. Munster
{"title":"The influence of binary modulations in passive optical network based on WDM","authors":"Vladimir Tejkal, M. Filka, Jan Sporik, P. Reichert, P. Munster","doi":"10.1109/TSP.2011.6043755","DOIUrl":"https://doi.org/10.1109/TSP.2011.6043755","url":null,"abstract":"In this paper, a performance analysis of binary modulation formats in passive optical networks based on wavelength division multiplexing (WDM-PON) has been carried out. WDM-PON offers much higher transmission capacity and longer transmission distance than current PONs using separate wavelengths for each end unit and arrayed waveguide gratings for signal division. Nonlinearities and dispersion effects may affect a performance of transmission system and certain modulation formats can improve a quality of signal so the influence of current modulation formats on the performance of WDM-PON is tested.","PeriodicalId":341695,"journal":{"name":"2011 34th International Conference on Telecommunications and Signal Processing (TSP)","volume":"89 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130889013","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Competitive signature extraction in event forecasting WSNs","authors":"G. Ollos, R. Vida","doi":"10.1109/TSP.2011.6043752","DOIUrl":"https://doi.org/10.1109/TSP.2011.6043752","url":null,"abstract":"Signature extraction constitutes an imperative part of a reliable event forecasting system in distributed environments like wireless sensor networks. Recently we published an event forecasting framework which heavily relied on clear, artifact-free event signatures. In this paper we introduce a competitive signature extraction scheme, which can fulfill the criteria needed for reliable event forecasting. Our scheme can continuously keep the events signature database low on artifacts, it can dynamically estimate the number of sequences, and by doing so it is able to continuously extract the event signatures from noisy, overlapped events detected by different sensors in a distributed environment, where the information for a reliable forecast is scattered among the measurements. The method is based on unsupervised (Heb-bian) competitive learning used in self-organizing Kohonen maps. We evaluate the proposed solution by means of simulations and investigate its parameter sensitivity as well.","PeriodicalId":341695,"journal":{"name":"2011 34th International Conference on Telecommunications and Signal Processing (TSP)","volume":"199 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133795345","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
J. Vitasek, J. Latal, J. Skapa, P. Koudelka, F. Hanacek, P. Siska, V. Vasinek
{"title":"The optical intensity distribution in the far field","authors":"J. Vitasek, J. Latal, J. Skapa, P. Koudelka, F. Hanacek, P. Siska, V. Vasinek","doi":"10.1109/TSP.2011.6043762","DOIUrl":"https://doi.org/10.1109/TSP.2011.6043762","url":null,"abstract":"This article describes an intensity distribution of optical beam in the far field. In free space communication laser transmitters, optical lenses and other components are used. When an optical beam impacts optical lens, the diffraction can appear at the edge of lens. A laser transmitted optical beam whose intensity distribution was Gaussian. This beam was aimed at the circular apertures of different diameters. These circular apertures represented transmitting lens. We could use circular apertures instead of lenses, because we obtained the same effects of diffraction. The optical beam passed by aperture and optical intensity distribution was observed at the screen, which was placed in the far field.","PeriodicalId":341695,"journal":{"name":"2011 34th International Conference on Telecommunications and Signal Processing (TSP)","volume":"29 8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132273175","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}