{"title":"An open source Verilog front-end for digital design analysis at word level","authors":"M. Nguyen, Quan V. Dang, Lam S. Nguyen","doi":"10.1109/CCE.2014.6916728","DOIUrl":"https://doi.org/10.1109/CCE.2014.6916728","url":null,"abstract":"We develop an open source Verilog front-end that compiles a digital circuit design into the circuit description at high level. Such description is a component net-list at a higher level than the gate net-list. In the component net-list, all high level information such as bit vector data-paths, finite state machines and counters are retained. Thus, the proposed front-end is suitable for newly proposed back-end algorithms that use high level information to synthesize, optimize and verify the circuit. Our front-end is able to parse large open-source designs.","PeriodicalId":377853,"journal":{"name":"2014 IEEE Fifth International Conference on Communications and Electronics (ICCE)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131535895","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Coordinated downlink beamforming in multicell wireless network","authors":"H. H. M. Tam, H. Tuan, E. Che","doi":"10.1109/CCE.2014.6916685","DOIUrl":"https://doi.org/10.1109/CCE.2014.6916685","url":null,"abstract":"We consider the joint design of downlink beamforming vectors in a multicell multi-antenna wireless network to maximise the network sum rate subject to base station power and quality-of-service (QoS) constraints. It is shown that the problem is reformulated by a concave program, for which an efficient iterative procedure of low complexity is then developed.","PeriodicalId":377853,"journal":{"name":"2014 IEEE Fifth International Conference on Communications and Electronics (ICCE)","volume":"1139 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132069530","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Optimal power allocation schemes for single-relay af wire-tap channels","authors":"L. Jimenez Rodriguez, N. Tran, T. Le-Ngoc","doi":"10.1109/CCE.2014.6916683","DOIUrl":"https://doi.org/10.1109/CCE.2014.6916683","url":null,"abstract":"This paper considers the wire-tap channel in which a source node communicates to a destination node with the help of a single amplify-and-forward (AF) relay and in the presence of an eavesdropper. The secrecy capacity and respective optimal power allocation scheme at the source and relay are investigated under both individual and joint power constraints. Given that the links among the nodes might not always be available for transmission (e.g., due to heavy shadowing), several network topologies are considered. These include combinations of dual-hop, orthogonal AF and direct transmission schemes. To deal with the non-concave optimization problems in solving the optimal power allocation schemes, we first propose an analytical approach based on Descartes' rule of signs. It is then shown that the power allocation strategies that maximize the secrecy rates can be obtained in closed form. Simulation results are finally provided to verify the optimality of the proposed schemes.","PeriodicalId":377853,"journal":{"name":"2014 IEEE Fifth International Conference on Communications and Electronics (ICCE)","volume":"68 Supplement 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127788126","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Quoc-Hung Nguyen, Hai Vu, Thi-Thanh-Hai Tran, Quang-Hoan Nguyen
{"title":"Mapping services in indoor environments based on image sequences","authors":"Quoc-Hung Nguyen, Hai Vu, Thi-Thanh-Hai Tran, Quang-Hoan Nguyen","doi":"10.1109/CCE.2014.6916746","DOIUrl":"https://doi.org/10.1109/CCE.2014.6916746","url":null,"abstract":"This paper describes a visual-based system that autonomously operators for both map building and localization tasks. The proposed system is to assist mapping services in small or mid-scale environments such as inside a building or campus of school where conventional positioning data such as GPS, WIFI signals are often not available. Toward this end, the proposed approaches utilize only visual data. We design an image acquisition system for data collections. On one hand, a robust visual odometry method is utilized to create routes in the environment. On the other hand, the proposed approaches utilize FAB-MAP (Fast Appearance Based Mapping) algorithm that is maybe the most successful for recognizing places in large scenarios. The building route and learning visited places are offline process in order to represent a map of environment. Through a matching image-to-map procedure, the captured images at current view are continuously positioned on the constructed map. This is an online process. The proposed system is evaluated in a corridor environment of a large building. The experimental results show that the constructed route coincides with ground truth, and matching image-to-map is high confidence. The proposed approaches are feasible to support visually impaired people navigating in the indoor environments.","PeriodicalId":377853,"journal":{"name":"2014 IEEE Fifth International Conference on Communications and Electronics (ICCE)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116504103","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance of free-space optical communications using SC-QAM signals over strong atmospheric turbulence and pointing errors","authors":"Ha Duyen Trung, D. T. Tuan","doi":"10.1109/CCE.2014.6916677","DOIUrl":"https://doi.org/10.1109/CCE.2014.6916677","url":null,"abstract":"We theoretically analyze the performance of free-space optical (FSO) communication systems using subcarrier intensity quadrature amplitude modulation (SC-QAM) signals over strong atmospheric turbulence channels together with pointing errors. We take into account atmospheric attenuation, atmospheric turbulence and pointing errors. In order to model atmospheric turbulence, we employ a gamma-gamma distribution for strong turbulent condition. Meanwhile, we study pointing errors by using a fading model where the influence of beam width, detector size and jitter variance is considered. In addition, we use a combination of these models to analyze the combined effect of atmospheric turbulence and pointing error to SC-QAM/FSO systems. Finally, we derive a closed-form expression for evaluating the average symbol error rate (ASER) performance of such systems. Numerically evaluated results present the impact of pointing errors on the performance of SC-QAM/FSO systems over strong atmospheric turbulence. Moreover, simulation results show that the closed-form expression can provide a precision for evaluating ASER performance of such systems.","PeriodicalId":377853,"journal":{"name":"2014 IEEE Fifth International Conference on Communications and Electronics (ICCE)","volume":"142 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116592832","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Adaptive video streaming with smooth advertisement insertion","authors":"Hung T. Le, N. P. Ngoc, A. Pham, T. Thang","doi":"10.1109/CCE.2014.6916697","DOIUrl":"https://doi.org/10.1109/CCE.2014.6916697","url":null,"abstract":"Advertisement has contributed a significant part of video streaming revenue nowadays. So far, advertisement insertion is mostly done at a streaming server or a proxy server inside the networks. However, this approach faces problems such as complexity and scalability issues. To this end, this paper presents a client-based approach in HTTP streaming which has becomes a cost effective means in multimedia delivery. In addition, a novel method is proposed for supporting smooth advertisement insertion. The experiment results show that our method can provide smooth transitions under different network conditions.","PeriodicalId":377853,"journal":{"name":"2014 IEEE Fifth International Conference on Communications and Electronics (ICCE)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114734387","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Bernhard Isemann, Markus Gruber, J. Grunberger, Christian Schanes, T. Grechenig
{"title":"Chaotic ad-hoc data network - A bike based system for city networks","authors":"Bernhard Isemann, Markus Gruber, J. Grunberger, Christian Schanes, T. Grechenig","doi":"10.1109/CCE.2014.6916711","DOIUrl":"https://doi.org/10.1109/CCE.2014.6916711","url":null,"abstract":"Cities are facing an increasing number of bicycles being used by urban citizen and the need of monitoring and managing this type of traffic becomes part of municipality and city administration. Bicycles shall be able to communicate between each other, exchange data with information service providers in the city and broadcast alarm and emergency messages. In this work we describe a wireless sensor network infrastructure approach designed especially for data messaging for bicycles, being independent of existing networks of telecommunication operators. The proposed communication network is assumed to be a decentralized, chaotic ad-hoc network established by a transceiver mounted on each bicycle. With this approach important information from bicycles moving around in the city can be gathered without depending on 3rd party network infrastructures. This network can build the basis for further applications for bicycles like optimized traffic management.","PeriodicalId":377853,"journal":{"name":"2014 IEEE Fifth International Conference on Communications and Electronics (ICCE)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130705738","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Secret information transmission scheme using MIMO system","authors":"Takuma Takimura, H. Sasaoka, H. Iwai","doi":"10.1109/CCE.2014.6916763","DOIUrl":"https://doi.org/10.1109/CCE.2014.6916763","url":null,"abstract":"In wireless communication environment, one of measures against eavesdropping is a secret information transmission scheme. This paper focuses on the scheme using multiple-input multiple-output (MIMO) system and examines its characteristics against eavesdropping. In the proposed method information signal is handled by non-linear signal processing using artificial noise and eigenbeam space division multiplexing (E-SDM) is used to maintain the confidentiality of communication. As a result of the study, it is proved that the proposed method is effective against eavesdroppers using independent component analysis (ICA).","PeriodicalId":377853,"journal":{"name":"2014 IEEE Fifth International Conference on Communications and Electronics (ICCE)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125461980","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Wireless steganography using MIMO system","authors":"Keisuke Hokai, H. Sasaoka, H. Iwai","doi":"10.1109/CCE.2014.6916764","DOIUrl":"https://doi.org/10.1109/CCE.2014.6916764","url":null,"abstract":"As a countermeasure against eavesdropping in wireless communications the wireless steganography technique has been proposed and the fundamental performance of the technique was evaluated. In this paper, we propose a new wireless steganography using Multiple-Input Multiple-Output (MIMO) system. By computer simulations we evaluate the performance of the proposed system such as the transmission characteristics of the cover signal and the embedded signal between authorized stations, and the anti-steganalysis performance against eavesdroppers. As the result, the wireless steganography using MIMO system is found superior to that using Single-Input Single-Output (SISO) system in terms of transmission characteristics between authorized stations and the tapping resistance to the steganalysis by eavesdroppers.","PeriodicalId":377853,"journal":{"name":"2014 IEEE Fifth International Conference on Communications and Electronics (ICCE)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121854763","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A discounted stochastic game approach to intrusion detection in wireless ad hoc networks","authors":"H. Moosavi, F. Bui","doi":"10.1109/CCE.2014.6916760","DOIUrl":"https://doi.org/10.1109/CCE.2014.6916760","url":null,"abstract":"A non-cooperative non-zero-sum discounted stochastic game framework is considered in order to methodically formulate the intrusion detection problem in wireless ad hoc networks. Underlying game parameters and player objective functions are defined to characterize the security requirements of a wide range of wireless ad hoc network applications. The validity and effectiveness of the developed framework are verified by generating numerical instances of the game model and analyzing the equilibrium results. The game outcomes show that the proposed framework provides useful insights on: (1) the expected behavior of rational intruders; and (2) optimal strategies of the intrusion detection system to allocate its security resources in different operational modes of the network.","PeriodicalId":377853,"journal":{"name":"2014 IEEE Fifth International Conference on Communications and Electronics (ICCE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126565061","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}