2013 IEEE Third International Conference on Information Science and Technology (ICIST)最新文献

筛选
英文 中文
Energy-efficient joint resource allocation in two-way OFDM relay systems 双向OFDM中继系统的节能联合资源分配
Junyue Qu, Yueming Cai, Wendong Yang
{"title":"Energy-efficient joint resource allocation in two-way OFDM relay systems","authors":"Junyue Qu, Yueming Cai, Wendong Yang","doi":"10.1109/ICIST.2013.6747761","DOIUrl":"https://doi.org/10.1109/ICIST.2013.6747761","url":null,"abstract":"In this paper, we investigate the problem of joint resource allocation in two-way OFDM relay systems under the QoS (Quality of Services) constraints of sum rate and symbol error rate. Assuming perfect knowledge of the instantaneous channel gains for the whole system, we propose a joint resource allocation scheme aiming at maximizing the energy efficiency of the system. We first select the best relay node from all the potential relay nodes and then employ subcarrier pairing, and finally we apply joint power allocation and bit loading. Simulation results show that the proposed scheme can significantly improve the energy efficiency of the system. And we also find that bit loading has more effect on the performance of the system than subcarrier pairing does.","PeriodicalId":415759,"journal":{"name":"2013 IEEE Third International Conference on Information Science and Technology (ICIST)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128605638","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Digital watermarking research based on text 基于文本的数字水印研究
Xiaofeng Wang
{"title":"Digital watermarking research based on text","authors":"Xiaofeng Wang","doi":"10.1109/ICIST.2013.6747584","DOIUrl":"https://doi.org/10.1109/ICIST.2013.6747584","url":null,"abstract":"Digital watermarking technology is currently mainly focused on image, video and audio, text-based digital watermarking technology is very few. This paper analyzes several of common text digital watermarking technologies, designes and implementes a text digital watermarking algorithm of character-based scaling. This algorithm greatly improves the embedding capacity and robustness, and has some practical value.","PeriodicalId":415759,"journal":{"name":"2013 IEEE Third International Conference on Information Science and Technology (ICIST)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129152924","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Optimizing hardware cost of motion estimation module for H.264/AVC based on FPGA 基于FPGA的H.264/AVC运动估计模块硬件成本优化
Gaoming Du, Mingliang He, Y. Song, Duoli Zhang
{"title":"Optimizing hardware cost of motion estimation module for H.264/AVC based on FPGA","authors":"Gaoming Du, Mingliang He, Y. Song, Duoli Zhang","doi":"10.1109/ICIST.2013.6747793","DOIUrl":"https://doi.org/10.1109/ICIST.2013.6747793","url":null,"abstract":"H.264/AVC has excellent compression efficiency and network-friendly design, but it gets the advanced performance at the expense of highly complex calculation, resulting in huge hardware cost, especially motion estimation (ME) module. To reduce the logic resource consumption (LRC) without any obvious increase of the bit-rate, this paper simplifies the calculation of the block matching parameter with replaced pixel-bits and replaced pixels, and discusses how the LRC of ME module and the bit-rate are affected by the number of replaced bits and replaced pixels for different video motion scenes based on FPGA. The experimental results show three reasonable optimization approaches, in which the ratio of bit-rate increment is less than 0.47% and the LRC drops 24% to 45% compared with full search (FS) algorithm.","PeriodicalId":415759,"journal":{"name":"2013 IEEE Third International Conference on Information Science and Technology (ICIST)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129539545","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The study of temperature control of cement decomposition furnace on the basis of fuzzy immune self-adaptive PID control method 基于模糊免疫自适应PID控制方法的水泥分解炉温度控制研究
Shengwang Li, Bin Li, Chengrang Li
{"title":"The study of temperature control of cement decomposition furnace on the basis of fuzzy immune self-adaptive PID control method","authors":"Shengwang Li, Bin Li, Chengrang Li","doi":"10.1109/ICIST.2013.6747505","DOIUrl":"https://doi.org/10.1109/ICIST.2013.6747505","url":null,"abstract":"Firstly, this paper analyzes the main factors which can affect the outlet temperature of the decomposition furnace in the process of cement production. PID-type controller may encounter many problems, such as large overshoot, long adjusting time and even poor stability in the control of decomposition furnace with time delay. Hence, according to the characteristics and difficulties of the decomposition furnace control, a fuzzy immune self-adaptive PID control method is brought forward and designed in detail. At last, the field application experiments proved that the fuzzy-immune PID control is an effective arithmetic with the advantages of quick response and good robust in control of outlet temperature. Using the method can achieve ideal control effect.","PeriodicalId":415759,"journal":{"name":"2013 IEEE Third International Conference on Information Science and Technology (ICIST)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114357859","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
High-precision weighted Bounding Box localization algorithm for Wireless Sensor Network 无线传感器网络高精度加权边界盒定位算法
Xin Shi, Linghua Zhang
{"title":"High-precision weighted Bounding Box localization algorithm for Wireless Sensor Network","authors":"Xin Shi, Linghua Zhang","doi":"10.1109/ICIST.2013.6747730","DOIUrl":"https://doi.org/10.1109/ICIST.2013.6747730","url":null,"abstract":"The inherent characteristics of Wireless Sensor Network (WSN) make node localization become a major challenge. A high-precision weighted Bounding Box (HPWB) algorithm is proposed to improve the localization accuracy of original Bounding Box algorithm. In HPWB algorithm, unknown nodes are divided into three categories according to the number of neighbor anchors. As for nodes in category one, a weighted method based on RSSI (Received Signal Strength Indicator) is proposed. As for category two and three, an exclusion method is presented. Simulation results show that our proposed algorithm HPWB achieves higher precision, compared with the original Bounding Box algorithm and Weighted Centroid algorithm.","PeriodicalId":415759,"journal":{"name":"2013 IEEE Third International Conference on Information Science and Technology (ICIST)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116325170","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Performance analysis and hardware design of digital transmitter system base on ZIF 基于ZIF的数字发射机系统性能分析与硬件设计
Lanxiang Jiang, Fei Yang
{"title":"Performance analysis and hardware design of digital transmitter system base on ZIF","authors":"Lanxiang Jiang, Fei Yang","doi":"10.1109/ICIST.2013.6747816","DOIUrl":"https://doi.org/10.1109/ICIST.2013.6747816","url":null,"abstract":"The RF systems of Digital Broadcast Transmitter generally take two forms, ZIF and DIF structure. Based on ZIF, this paper focuses on the relationship among phase imbalance, amplitude mismatch and RF performance, such as sideband suppression and modulation error. These theoretical analysis and stimulated performance provide more guidance on hardware design and debug for digital television transmitter system, based on ZIF structure.","PeriodicalId":415759,"journal":{"name":"2013 IEEE Third International Conference on Information Science and Technology (ICIST)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121624335","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The wind and temperature information of AMDAR data applying to the analysis of severe weather nowcasting of airport AMDAR数据的风和温度信息在机场恶劣天气临近预报分析中的应用
Yuan Zhou, Ming Wei, Zhoujie Cheng, Yinghui Ning, Linlin Qi
{"title":"The wind and temperature information of AMDAR data applying to the analysis of severe weather nowcasting of airport","authors":"Yuan Zhou, Ming Wei, Zhoujie Cheng, Yinghui Ning, Linlin Qi","doi":"10.1109/ICIST.2013.6747706","DOIUrl":"https://doi.org/10.1109/ICIST.2013.6747706","url":null,"abstract":"Strong convection is the important weather phenomenon impacting the flight safety, always causes sudden changes of meteorological elements. AMDAR data is of high resolution on spatial and temporal, which can provide vital information for the short-term forecast of strong convection weather in the airport terminal area. This paper extracts the three-dimensional vertical wind profiles and temperature profiles, and produces the wind shear warning analysis diagram in the horizontal and vertical direction. The case studied in this paper is a strong convection at April 2011 in Guangdong Province, AMDAR data, together with multi-source information such as radar, satellite and air sounding is analyzed. The study has found that with high resolution spatial and temporal AMDAR data, wind and temperature disturbance information could reveal the motion of wind shear and turbulence in the airport, so that the unique observational basis for protecting the aircraft's take-off and landing safety is provided.","PeriodicalId":415759,"journal":{"name":"2013 IEEE Third International Conference on Information Science and Technology (ICIST)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124455005","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Secure obfuscation of EIGamal cryption system based on polynomials over finite fields 基于有限域上多项式的EIGamal加密系统的安全混淆
Yaohong D. Jiang, G. Gong
{"title":"Secure obfuscation of EIGamal cryption system based on polynomials over finite fields","authors":"Yaohong D. Jiang, G. Gong","doi":"10.1109/ICIST.2013.6747574","DOIUrl":"https://doi.org/10.1109/ICIST.2013.6747574","url":null,"abstract":"As the traditional EIGamal encryption system can only encrypt a plaintext every time, while present secure obfuscation of EIGamal encryption system based on polynomials over finite fields can encrypt more than one plaintext at the same time. This encryption system not only retains the EIGamal public key system functions, but also has the advantages of indistinguishability obfuscation (i.e. difficult identification). The security of this scheme mainly depends on the characteristics of the hash function and the intractability of discrete logarithm problem.","PeriodicalId":415759,"journal":{"name":"2013 IEEE Third International Conference on Information Science and Technology (ICIST)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124501848","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Forecasting software damage rate from cognitive bias in software requirements gathering and specification process 在软件需求收集和规范过程中,从认知偏差中预测软件损坏率
Noptanit Chotisarn, N. Prompoon
{"title":"Forecasting software damage rate from cognitive bias in software requirements gathering and specification process","authors":"Noptanit Chotisarn, N. Prompoon","doi":"10.1109/ICIST.2013.6747696","DOIUrl":"https://doi.org/10.1109/ICIST.2013.6747696","url":null,"abstract":"Human is the most important resource in the software project and has become the key success factor of the software project in terms of quality which is called “Human factor”. In this paper, the focus will be on the behavioral perspective of human factor in terms of psychological effect, especially on the cognitive bias at the early stages of the software development life cycle (SDLC). We aim to present a multiple regression and correlation analysis method of the human cognitive bias in the software requirements gathering and specification process, where the biases are assigned to the independent variables that affect the dependent variable or the software damage rate. The execution of our method will lead to the discovery of the factors that may affect the software damage rate.","PeriodicalId":415759,"journal":{"name":"2013 IEEE Third International Conference on Information Science and Technology (ICIST)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126366057","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Simulated conformal dome wind tunnel experiments 模拟保形圆顶风洞实验
Q. Wei, H. Jia
{"title":"Simulated conformal dome wind tunnel experiments","authors":"Q. Wei, H. Jia","doi":"10.1109/ICIST.2013.6747709","DOIUrl":"https://doi.org/10.1109/ICIST.2013.6747709","url":null,"abstract":"In this paper, a kind of wind tunnel experiment will be discussed. This wind tunnel experiment is used for conformal dome design. Wind tunnel experiments are done with different speed and attack angles. The results together with the simulation results got before will be used for coupling simulation FEA software. After analyzing and computing the data, the conformal dome's aero-optical effects are studied.","PeriodicalId":415759,"journal":{"name":"2013 IEEE Third International Conference on Information Science and Technology (ICIST)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121586131","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信