2015 IEEE Pacific Rim Conference on Communications, Computers and Signal Processing (PACRIM)最新文献

筛选
英文 中文
A TDMA modem design for multiparty communications with the relay function 一种TDMA调制解调器设计,用于具有中继功能的多方通信
Dong Jegal, B. Ahn
{"title":"A TDMA modem design for multiparty communications with the relay function","authors":"Dong Jegal, B. Ahn","doi":"10.1109/PACRIM.2015.7334868","DOIUrl":"https://doi.org/10.1109/PACRIM.2015.7334868","url":null,"abstract":"By utilizing the channel bandwidth in a pre-assigned time slot, TDMA is very useful to communicate voice and data for small group. It also provides the increased battery life by transmitting data in an assigned slot. Instead of two party communications, it can be applied to multiparty communications. This paper presents a design of the TDMA baseband modem to support multiparty voice communications with the relay functions to extend the communication distance. The baseband modem supports an ad-hoc function for multiparty communications and relays voice data from a slave node to the master node. The proposed baseband modem is expandable up to 8 relay nodes. The communication distance is extended up to 1.6Km when 2.4GHz frequency is used for a RF transmitter. To implement the multi-party communications and the relay function, the TDMA baseband modem consists of a cycle network controller, a sync time controller, a buffer controller and an asynchronous serial block. The protocol is programmed on Xilinx Zynq 7000 with Verilog HDL. The baseband modem is tested and verified its functions for 8-node relay communications and its measured maximum delay time is about 120msec for 8-node voice relay.","PeriodicalId":350052,"journal":{"name":"2015 IEEE Pacific Rim Conference on Communications, Computers and Signal Processing (PACRIM)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128624355","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Interference analysis and visualization for multiple radio equipment coexistence 多台无线电设备共存干扰分析与可视化
Baocong Wang, Qixun Zhang, Chao Gao, Z. Feng, Yifan Zhang
{"title":"Interference analysis and visualization for multiple radio equipment coexistence","authors":"Baocong Wang, Qixun Zhang, Chao Gao, Z. Feng, Yifan Zhang","doi":"10.1109/PACRIM.2015.7334851","DOIUrl":"https://doi.org/10.1109/PACRIM.2015.7334851","url":null,"abstract":"Due to the diverse and complex tasks for the formation, many different radio communication equipment are densely deployed on board, leading to the coexistence among different equipment a big problem. Therefore, this paper has proposed an interference analysis algorithm for communication and radar systems and developed a link level simulation system to solve the coexistence problem between radar and communication systems. Both frequency and distance isolation boundaries are achieved by theoretical analysis to guarantee the coexistence constraints of different equipment in the ship formation. Simulation results verify the effectiveness and accuracy of proposed interference coexistence methods with frequency and distance isolation boundaries. Finally, the electromagnetic situation map is also designed and developed to identify the source of potential interference among fleet and facilitate the interference analysis.","PeriodicalId":350052,"journal":{"name":"2015 IEEE Pacific Rim Conference on Communications, Computers and Signal Processing (PACRIM)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117114091","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Design and evaluation of stochastic FIR filters 随机FIR滤波器的设计与评价
Ran Wang, Jie Han, B. Cockburn, D. Elliott
{"title":"Design and evaluation of stochastic FIR filters","authors":"Ran Wang, Jie Han, B. Cockburn, D. Elliott","doi":"10.1109/PACRIM.2015.7334871","DOIUrl":"https://doi.org/10.1109/PACRIM.2015.7334871","url":null,"abstract":"The compact arithmetic units in stochastic computing can potentially lower the implementation cost with respect to silicon area and power consumption. In addition, stochastic computing provides inherent tolerance of transient errors at the cost of a less efficient signal encoding. In this paper, a novel FIR filter design using the stochastic approach based on multiplexers are proposed. The required stochastic sequence length is determined for different signal resolutions by matching the performance of the proposed FIR filter with that of the conventional binary design. Silicon area, power and maximum clock frequency are obtained to evaluate the throughput per area (TPA) and the energy per operation (EPO). For equivalent filtering performance, the stochastic FIR filter underperforms in terms of TPA and EPO compared to the conventional binary design, albeit with some advantages in circuit area and power consumption. The stochastic design, however, shows a graceful degradation in performance with a significant reduction in energy consumption as the stochastic sequences are shortened. The fault-tolerance of the stochastic circuit is compared with that of the binary circuit equipped with triple modular redundancy. It is shown that the stochastic circuit is more reliable than the conventional binary design and its triple modular redundancy (TMR) implementation with unreliable voters, but it is less reliable than the binary TMR implementation when the voters are fault-free.","PeriodicalId":350052,"journal":{"name":"2015 IEEE Pacific Rim Conference on Communications, Computers and Signal Processing (PACRIM)","volume":"118 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116348753","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A comparison of conventional and meta-model based global optimization methods 传统和基于元模型的全局优化方法的比较
A. Saad, Hannan Lohrasbipeydeh, Z. Dong, G. Tzanetakis, T. Gulliver
{"title":"A comparison of conventional and meta-model based global optimization methods","authors":"A. Saad, Hannan Lohrasbipeydeh, Z. Dong, G. Tzanetakis, T. Gulliver","doi":"10.1109/PACRIM.2015.7334874","DOIUrl":"https://doi.org/10.1109/PACRIM.2015.7334874","url":null,"abstract":"Motivated by the growing number of applications in engineering, physics, science and other fields, interest in the development of global optimization algorithms is increasing. In this paper, two categories of global optimization methods are considered, namely conventional and meta-model based algorithms. Conventional algorithms require values of the objective function to obtain a solution, while meta-model based algorithms can be used with incomplete information or when there is a limit on the available time or cost. Complex functions pose a challenge to gradient-free algorithms as they may need a significant number of function evaluations, thus meta-model based techniques may be preferred. In the paper, these algorithms are compared using a set of benchmark problems which include convex and non-convex problems, as well as smooth and non-smooth problems.","PeriodicalId":350052,"journal":{"name":"2015 IEEE Pacific Rim Conference on Communications, Computers and Signal Processing (PACRIM)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116393943","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Energy efficient video streaming over wireless networks with mobile-to-mobile cooperation 节能视频流通过无线网络与移动到移动合作
D. Ma, Jun Peng, Heng Li, Weirong Liu, Zhiwu Huang, Xiaoyong Zhang
{"title":"Energy efficient video streaming over wireless networks with mobile-to-mobile cooperation","authors":"D. Ma, Jun Peng, Heng Li, Weirong Liu, Zhiwu Huang, Xiaoyong Zhang","doi":"10.1109/PACRIM.2015.7334849","DOIUrl":"https://doi.org/10.1109/PACRIM.2015.7334849","url":null,"abstract":"With the increasing trend for Internet-capable mobile devices, such as smartphones and tablet PCs, users create an explosion of media streaming traffic. Even though the current cellular networks are barely able to provide such service in tolerable data rates, it leads to significant energy consumption. Therefore, in this paper, a cooperative method is proposed to minimize the energy consumption of video data distribution. The mobile devices are divided into several clusters and only part of the video is transmitted to each cluster header by eNodeB through cell links. Then, the headers aggregate their content and transmit the whole content to their subordinate mobile devices by mobile-to-mobile links established via Wi-Fi. Numerical results demonstrate the effectiveness and superiority of the proposed method.","PeriodicalId":350052,"journal":{"name":"2015 IEEE Pacific Rim Conference on Communications, Computers and Signal Processing (PACRIM)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125783977","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Cloud Slicing a new architecture for cloud security monitoring 云切片是一种用于云安全监控的新架构
Abdulaziz Aldribi, I. Traoré, G. Létourneau
{"title":"Cloud Slicing a new architecture for cloud security monitoring","authors":"Abdulaziz Aldribi, I. Traoré, G. Létourneau","doi":"10.1109/PACRIM.2015.7334802","DOIUrl":"https://doi.org/10.1109/PACRIM.2015.7334802","url":null,"abstract":"Cloud computing has become one of the popular terms in academia and IT industry. The security of the cloud computing infrastructure is the main concern to adopt it. Despite this concern, cloud providers do not disclose any information about their security precautions. Therefore, a provider's clients cannot be certain that their applications are protected while they are in cloud. Furthermore, clients are not granted access to the network level of the system to implement any of their own security features. In this paper we propose a new model we are naming Cloud Slicing. Cloud Slicing uses a technique called logical partitioning, to divide a cloud servers resources. By doing this division, clients on a server can safely implement their own network security features to reassure themselves, and their customers, that the applications are protected.","PeriodicalId":350052,"journal":{"name":"2015 IEEE Pacific Rim Conference on Communications, Computers and Signal Processing (PACRIM)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126057188","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Design of low power operational TPMS system 低功耗操作TPMS系统的设计
So Yeon Kim, Chang Seok Chae, I. Hwang, Sol Lim, Han-wool Choi, Daejin Kim
{"title":"Design of low power operational TPMS system","authors":"So Yeon Kim, Chang Seok Chae, I. Hwang, Sol Lim, Han-wool Choi, Daejin Kim","doi":"10.1109/PACRIM.2015.7334859","DOIUrl":"https://doi.org/10.1109/PACRIM.2015.7334859","url":null,"abstract":"Globally, safety technology of smart cars is developing for drivers' safety. Because the eye inspection of tire pressure is difficult, automatic sensing of the tire pressure is very important. Tire pressure monitoring system measures tires' pressure and temperature. By using TPMS system we can reduce pollution emissions, fuel consumption and car accident. U.S.A NHTSA made a law to use TPMS on cars. In this paper, two short frames are designed with unidirectional communication, which use minimum number of bits for low power operation. And the software of TPMS sensor module is designed such that the sensor mostly resides in deep sleep mode.","PeriodicalId":350052,"journal":{"name":"2015 IEEE Pacific Rim Conference on Communications, Computers and Signal Processing (PACRIM)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125809522","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Secrecy for MIMO wiretap and MIMO broadcast channels with fading eavesdroppers: CSI does not increase the secure DoF 带衰落窃听器的MIMO窃听和MIMO广播信道的保密性:CSI不会增加安全深度
Mohamed Amir, T. Khattab, Tarek M. Elfouly, Amr M. Mohamed
{"title":"Secrecy for MIMO wiretap and MIMO broadcast channels with fading eavesdroppers: CSI does not increase the secure DoF","authors":"Mohamed Amir, T. Khattab, Tarek M. Elfouly, Amr M. Mohamed","doi":"10.1109/PACRIM.2015.7334884","DOIUrl":"https://doi.org/10.1109/PACRIM.2015.7334884","url":null,"abstract":"We investigate the secure degrees of freedom (SDoF) of the wiretap and the K user Gaussian broadcast channels with multiple antennas at the transmitter, the legitimate receivers and an unknown number of eavesdroppers each with a number of antennas less than or equal to a known value NE. The channel matrices between the legitimate transmitter and the receivers are available everywhere, while the legitimate pair have no information about the eavesdroppers' channels. We provide the exact sum SDoF for the considered system. A new comprehensive upperbound is deduced and a new achievable scheme based on utilizing jamming is exploited. We prove that cooperative jamming is SDoF optimal even without the eavesdropper CSI available at the transmitters.","PeriodicalId":350052,"journal":{"name":"2015 IEEE Pacific Rim Conference on Communications, Computers and Signal Processing (PACRIM)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128483849","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Data aggregation in precision agriculture for low-power and lossy networks 面向低功耗有损网络的精准农业数据聚合
Yongjoo Kim, Puleum Bae, Jina Han, Young-Bae Ko
{"title":"Data aggregation in precision agriculture for low-power and lossy networks","authors":"Yongjoo Kim, Puleum Bae, Jina Han, Young-Bae Ko","doi":"10.1109/PACRIM.2015.7334877","DOIUrl":"https://doi.org/10.1109/PACRIM.2015.7334877","url":null,"abstract":"To provide best cultivation conditions, the agricultural environment monitoring systems are developed based on various wireless sensors. RPL routing, which is targeting the large-scale wireless sensor network, can work effectively in agriculture environment consisting of constrained sensor devices. Each sensor node can transmit sensing data to monitoring system using periodic inter-sensor multi-hop communication in RPL routing. However, the number of sensors increases and each sensor node generates large volume of time-series data periodically. Therefore, it can cause network overhead, bandwidth consumption, and transmission delay, etc. In this paper, we propose data aggregation scheme for low-power and lossy-networks to reduce such a big volume. We apply RPL routing protocol in agricultural system, especially in greenhouse. After that, we collect and analyze the sensing data and reduce the amounts of data. We evaluate the performance using Cooja simulator on the Sky mote sensors based on Contiki operating system.","PeriodicalId":350052,"journal":{"name":"2015 IEEE Pacific Rim Conference on Communications, Computers and Signal Processing (PACRIM)","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132714455","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Concentration analysis by detecting face features of learners 基于学习者面部特征的注意力分析
Seunghui Cha, Wookhyun Kim
{"title":"Concentration analysis by detecting face features of learners","authors":"Seunghui Cha, Wookhyun Kim","doi":"10.1109/PACRIM.2015.7334807","DOIUrl":"https://doi.org/10.1109/PACRIM.2015.7334807","url":null,"abstract":"The paper presents an analysis on the concentration of learning. By capturing video images of students, the proposed method detects and analyzes facial features from the image data and determines the state of learner's concentration. Since the concentration is important to the learners, this method is applied to the classrooms. First, feature points are generated from the face and then feature points of the face are used to determine non-focused state. The length of the front face is used to make a decision for the face change. The coordinate value of the facial center is used to decide the face turns. The criteria value of the opened eye is used to decide whether the closed eyes or the opened eyes. Through the experiments, the proposed method detects the concentration up to 90%.","PeriodicalId":350052,"journal":{"name":"2015 IEEE Pacific Rim Conference on Communications, Computers and Signal Processing (PACRIM)","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131156430","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信