{"title":"Serial concatenation of quadratic interleaved codes in different wireless doppler environments","authors":"A. Rahimian, F. Mehran, R. Maunder","doi":"10.1109/ICEIEC.2013.6835462","DOIUrl":"https://doi.org/10.1109/ICEIEC.2013.6835462","url":null,"abstract":"The remarkable development of mobile networks has enabled ubiquitous communications that has transformed the way people connect with each other. Meanwhile, the growing adoption of smartphones, tablets, and increasingly bandwidth-intensive applications and services is driving unprecedented mobile broadband traffic growth; therefore, finding state-of-the-art strategies for improving the wireless transmission reliability has emerged significantly. In particular, to enable significant mitigation of the detrimental effects of multipath fading, high-performance forward error correction (FEC) techniques have now recognized to become a vital part of modern digital wireless systems. This work is dedicated to address a class of high-performance iteratively decoded FECs referred to as serial concatenation of quadratic interleaved codes (SCQICs) wherein the reordering arrays for permutor and unscramble in the FEC encoding/decoding entities enjoy the remarkable algorithm proposed by Takeshita et al. seminal contribution which: (1) yields provisioning coding gain in both waterfall and error-floor regions of the bit error rate (BER) performance curve (2) enables possibility of analysis and compact representation, (3) requires straightforward implementation. We have observed that their utilization for the modern wireless communications applications remained scarce due to the lack of strong and comprehensive performance predictions over the different statistical wireless channel models. Hence, in this paper, we endeavor to analyze and examine the error-correction capability of SCQICs vastly from the various aspects, and investigate their resultant coding gains in different wireless Doppler environments.","PeriodicalId":419767,"journal":{"name":"2013 IEEE 4th International Conference on Electronics Information and Emergency Communication","volume":"218 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134231765","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Joint space-time algebraically-interleaved turbo-like Coded Incoherent MIMO systems with optimal and suboptimal MAP probability decoders","authors":"A. Rahimian, F. Mehran, R. Maunder","doi":"10.1109/ICEIEC.2013.6835440","DOIUrl":"https://doi.org/10.1109/ICEIEC.2013.6835440","url":null,"abstract":"The outstanding coding gains and also the practical complexities of the turbo-coded communication systems, heavily depend on the iterative soft-decision decoding algorithm used for the soft-input/-output component decoders. The goal of this paper is to address the investigation on the energy gaps of the enhanced channel coding entity of [1], when original and also approximated logarithmic-based iterative MAP algorithms are employed for the iterative near maximum-likelihood (ML) decoding. As far as the large decoding delays of the turbo and turbo-like code structures constitute a major disadvantage for these types of channel-codes, the previously introduced high-performance channel-codes of [1] are developed for the original and also approximated iterative BCJR-MAP turbo decoders to enable the higher level of selection flexibility in error-rate versus computational complexity tradeoff. We examine the required energy per bit Eb and the noise power spectral density N0 ratio to attain the BER ≈ 10-4 - 10-5 for the differentially encoded phase-shift keying (D-PSK) MIMO Rayleigh fading channels.","PeriodicalId":419767,"journal":{"name":"2013 IEEE 4th International Conference on Electronics Information and Emergency Communication","volume":"50 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113958345","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An improved SOC algorithm for Lithium-ion batteries in electric vehicles","authors":"Lixian Qiao, Jing Wang, Baixiang Zheng","doi":"10.1109/ICEIEC.2013.6835514","DOIUrl":"https://doi.org/10.1109/ICEIEC.2013.6835514","url":null,"abstract":"This paper puts forward an improved ampere-hour integral method to estimate SOC for Lithium-ion Battery Pack in Electric Vehicle. According to the low estimation accuracy of traditional ampere-hour integral method, based on a large number of experiments, this paper analysed the parameters which affect the estimation accuracy of integral method, then used the least square method to establish the mathematical model and realized the correction factor of the parameters. The experiments show that this method can improve the accuracy of the battery SOC, and meet the application requirements for the safe operation of the electric vehicle.","PeriodicalId":419767,"journal":{"name":"2013 IEEE 4th International Conference on Electronics Information and Emergency Communication","volume":"306 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123235629","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The design of mobile ECG monitoring system","authors":"Jihong Chai","doi":"10.1109/ICEIEC.2013.6835474","DOIUrl":"https://doi.org/10.1109/ICEIEC.2013.6835474","url":null,"abstract":"With the increasing requirements of mobile ECG monitoring, a convenient mobile ECG monitoring system solution is proposed in this paper. The monitoring terminal is designed by using MSP430 to achieve ECG signal acquisition, amplification and A/D conversion. CC2540 integrating low-power Bluetooth 4.0 BLE-Stack is also used. System has the function of mobile ECG data transmission from the monitoring terminal to the smart phone. This design can use in home healthcare, community healthcare due to the characteristics of low power consumption, small size and reliability.","PeriodicalId":419767,"journal":{"name":"2013 IEEE 4th International Conference on Electronics Information and Emergency Communication","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122771398","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A simple priority scheme with spectrum partition for multiuser opportunistic spectrum access in cognitive radio networks","authors":"Y. Chen, Jin Chen, Chenglong Xu","doi":"10.1109/ICEIEC.2013.6835453","DOIUrl":"https://doi.org/10.1109/ICEIEC.2013.6835453","url":null,"abstract":"In this paper, a multiuser optimal stopping strategy for Opportunistic Spectrum Access (OSA) is proposed. In practical cognitive radio networks (CRNs), secondary users (SUs) usually have their own priorities of spectrum occupation, that is, SU with higher priority has a better chance to access idle channels in the spectrum. Since all SUs share the same spectrum information, throughput of the SUs with low priorities will be quite low even null if idle channels are always allocated to the SUs with high priorities. In another aspect, even if the SUs with low priorities also have chance to access idle channels, collisions will happen because of the competition among SUs. In order to increase system throughput of all SUs and avoid such collisions, we formulate this problem as an optimal stopping problem and propose an effective priority scheme with spectrum partition. In view of users' priorities, spectrum is partitioned completely into several channel sets, the amount of which equals to that of SUs. Thus, the problem can be simplified into multiple single-user cases. In each slot, each SU utilizes optimal stopping rule to determine which channel to access in consideration of channel states and exploration overhead. Simulation results show the effectiveness of the proposed strategy.","PeriodicalId":419767,"journal":{"name":"2013 IEEE 4th International Conference on Electronics Information and Emergency Communication","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128386603","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An efficient routing scheme for irregular mesh NoCs","authors":"Qingli Xiao, Hongzhou Fu, Lu Zheng, Dexue Zhang","doi":"10.1109/ICEIEC.2013.6835468","DOIUrl":"https://doi.org/10.1109/ICEIEC.2013.6835468","url":null,"abstract":"Topological structure is an important part of the design of network on chip systems. The majority of current NoC architectures employ mesh topology, but at some practical application, NoC systems often integrate a number of heterogeneous blocks, or some fabrication faults, reliability issues, may lead to the need of irregular topologies. Consequently, simplistic routing techniques such as XY scheme can not be employed in irregular topologies. This paper presents an efficient specific routing scheme for the irregular mesh network which can be guaranteed for the connection in irregular topologies. This paper applies routing tables (RT) to realize the algorithm and use OVP (Open Virtual Platforms)+ TLM (Transaction Level Modeling)+systemC to create a virtual platform, achieving a 16 x16 irregular mesh topology of heterogeneous systems. Finally the routing scheme is applied to test specific real application network instances, and the result shows its connectivity and efficiency.","PeriodicalId":419767,"journal":{"name":"2013 IEEE 4th International Conference on Electronics Information and Emergency Communication","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124552416","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A new energy efficient cooperative multicast transmission scheme in clustered WSNs","authors":"Yun Zhu, Yuhong Zhang, Yuanhang Pu, Zuojian Yan","doi":"10.1109/ICEIEC.2013.6835492","DOIUrl":"https://doi.org/10.1109/ICEIEC.2013.6835492","url":null,"abstract":"Wireless sensor networks are formed by connected sensor nodes that each have the ability to collect, process, and store environmental information as well as communicate with other nodes via inter-node wireless communication. These characteristics allow wireless sensor networks to be used in a wide range of applications. Cluster-based protocols attempt to solve this problem by load balancing within the cluster and rotating the job of cluster head every few rounds in wireless sensor networks. In this paper, we derive the formulation of the power consumption for opportunistic network-coded cooperative multicast schemes. Simulation results show that our approach can remarkably improve the performance of outage probability than direct multicast.","PeriodicalId":419767,"journal":{"name":"2013 IEEE 4th International Conference on Electronics Information and Emergency Communication","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130574488","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Hardware Trojan detection by specifying malicious circuit properties","authors":"Michael Rathmair, F. Schupfer","doi":"10.1109/ICEIEC.2013.6835515","DOIUrl":"https://doi.org/10.1109/ICEIEC.2013.6835515","url":null,"abstract":"This work addresses the increasing danger of shipping integrated circuits (either fully digital or mixed signal) that contain malicious hardware modifications. Potential security threads are established by so called hardware Trojans, implemented in the physical silicon structure. A desire of system engineers is to identify such back-door functionalities during an early design phase. The paper discusses how techniques deduced from model checking applications can be used for Trojan detection. A set of potential malicious properties is defined and handed to an automatic tool. Any returned counterexample identifies a feasible attack path and is a basis for further detailed inspection.","PeriodicalId":419767,"journal":{"name":"2013 IEEE 4th International Conference on Electronics Information and Emergency Communication","volume":"215 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121191088","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research and application of a daily monitoring method of WCDMA network quality along arterial highways","authors":"Xiao Liu, Kaicun Yuan, Linhai Mo, B. Ji","doi":"10.1109/ICEIEC.2013.6835456","DOIUrl":"https://doi.org/10.1109/ICEIEC.2013.6835456","url":null,"abstract":"The communication quality of WCDMA network along arterial highways has always been the focus in wireless communication field. Drive Test (DT), as a traditional method, is high cost, time-consuming and inefficient. A new approach based on measurement report (MR) is proposed in this paper, and applied to network monitoring along the highways and railways, which is a necessary complement to traditional ways. A kind of searching algorithm and assessing approach of network quality is presented based on MR data, which is lower-cost, more accurate and efficient in a statistical sense.","PeriodicalId":419767,"journal":{"name":"2013 IEEE 4th International Conference on Electronics Information and Emergency Communication","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130241485","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A shadow detection method based on improved Gaussian Mixture Model","authors":"Jing Li, Geng Wang","doi":"10.1109/ICEIEC.2013.6835454","DOIUrl":"https://doi.org/10.1109/ICEIEC.2013.6835454","url":null,"abstract":"The shadows of moving objects have great influence on the accuracy and effectiveness of objects tracking and behavior recognition, this paper proposes an elimination method based on Gaussian Mixture Model (GMM). First, we improve the adaptability of GMM by making learning rate change with the speed of the moving object to eliminate ghost. Then, we come up with a shadow elimination method based on normalized RGB space and segment shadows by their characteristics of brightness, color and the spatial relationship between shadows and moving objects. At last, under different light and projecting surfaces, we take a large number of experiments of moving objects, showing the method of this paper has good adaptability and robustness.","PeriodicalId":419767,"journal":{"name":"2013 IEEE 4th International Conference on Electronics Information and Emergency Communication","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131525119","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}