IJCNIS Vol. 2, No. 1, Nov. 2010
Cover page and Table of Contents: PDF (size: 123KB)
REGULAR PAPERS
To solve the problem of nonlinear blind source separation (BSS), a novel algorithm based on kernel multi-set canonical correlation analysis (MCCA) is presented. Combining complementary research fields of kernel feature spaces and BSS using MCCA, the proposed approach yields a highly efficient and elegant algorithm for nonlinear BSS with invertible nonlinearity. The algorithm works as follows: First, the input data is mapped to a high-dimensional feature space and perform dimension reduction to extract the effective reduced feature space, translate the nonlinear problem in the input space to a linear problem in reduced feature space. In the second step, the MCCA algorithm was used to obtain the original signals.
[...] Read more.This paper analyzes the PHY layer of IEEE 802.11 standards for a variety of transmission rates, after learning that MAC layer does not provide adaptive approach for rate control. With the study of various adaptive algorithms, the SAARF (Simulated Annealing Auto Rate Fallback) protocol based on simulated annealing algorithm is proposed on rate adaptation in MAC Layer, which can adaptively adjust transmitting rate. Compared with ARF (Auto Rate Fallback) protocol, SAARF can more effectively improve network performance from the simulation results.
[...] Read more.With the problems of high speed and asynchronism in a multi-channel video, a video monitor system based on FPGA and SRAM is designed and implemented. The system adopts the method of time-division multiplexing to realize the function of four-channel video parallel acquisition. The synchronization between four-channel video is achieved by using the field-selected algorithm. The four-channel video can be outputted to LCD with the technique of ping-pang cache. The LCD display sequences are generated by the finite state machine using Verilog HDL. The system is simple, flexible and with high-quality, and it has a broad application prospect.
[...] Read more.For CR systems, where primary and CR users co-exist in adjacent bands, it is important to keep the interference introduced to the primary user (PU) band within a tolerable range. In this paper, we investigate the subcarrier and power allocation problem in CR systems, where primary and CR users co-exist in adjacent bands, while keeping the total interference introduced to the PU band below a certain threshold and the total power allocated to the CR users under a constraint. First, according to the different purposes of the resource allocation, several suboptimal subcarrier allocation algorithms are investigated, which are termed as Max-Rate, Min-Interference and Fair-Rate subcarrier allocation algorithm, separately. Further, for a given subcarrier allocation three suboptimal power allocation algorithms which have less complexity are proposed and compared to the optimal power allocation algorithm. Numerical results are obtained for the behaviors and performance of our proposed algorithms.
[...] Read more.Wireless ad hoc networks are usually composed of autonomous nodes, which are powered by batteries only. The energy-efficiency is perhaps one of the most important factors for each operation in terms of networks. Broadcast, for example, is one of the fundamental operations in modern telecom networks. In this paper a broadcast tree, which is rooted at a source and spans all the destination nodes, has been constructed in a way that the total transmission energy consumption is minimized. This paper describes two polynomial-time heuristics for the energy-efficient broadcasting in static ad hoc wireless networks. Both of the developed approaches are on the basis of a fuzzy greedy evaluation function, which prioritize the network nodes. According to the prioritized order of the nodes, each new node is selected for incorporation in the construction of a solution. Computational experiments indicate that our algorithms improve the well-known Broadcast Link-based Minimum Spanning Tree (BLiMST) and Broadcast Least-Unicast-cost (BLU) heuristics. It will be seen that the BLiMST and the BLU methods are a special case of our more general heuristics.
[...] Read more.This paper presents the use of a fuzzy logic controller combined with Machine Vision to improve the accuracy to identify the ball and speed of approaching the ball in Robot Soccer. The conventional robot control consists of methods for path generation and path following. When a robot moves away the desired track, it must return immediately, and while doing so, the obstacle avoidance behavior and the effectiveness of such a path are not guaranteed. So, motion control is a difficult task, especially in real time and high speed control. To achieve good control performance and requirements for timeliness, accuracy to identify and approach the ball, the paper designs a sugeno fuzzy control system, which could make robot complete the whole football performance, including finding, approaching and shooting ball. At the end of the paper, to validate the proposed fuzzy algorithm, the experiment on METALFIGHTER-2 humanoid robot has been run, which showed that the fuzzy controller is effectiveness and robustness.
[...] Read more.Localization is one of the most important technologies in wireless sensor network, and mobile beacon assisted localization is a promising localization method. The mobile beacon trajectory planning is a basic and important problem in these methods. There are many obstacles in the real world, which obstruct the moving of mobile beacon. This paper focuses on the obstacle avoidance trajectory planning scheme. After partitioning the deployment area with fixed cell decomposition, the beacon trajectory are divided into global and local trajectory. The approximate shortest global trajectory is obtained by depth-first search, greedy strategy method and ant colony algorithm, while local trajectory is any existing trajectories. Simulation results show that this method can avoid obstacles in the network deployment area, and the smaller cell size leads to longer beacon trajectory and more localizable sensor nodes.
[...] Read more.According to the relevant criterion and principle for designing and evaluating various trusted computing chips, we have proposed a new trusted SoC chip, and have given the implementation of its basic functional modules. In detail, we have discussed the design of the trusted SoC security architecture and the main module functional modules such as microprocessor, cryptographic function module, security management module, input/output interface, along with the most important memory management unit. Moreover, we have discussed reliability of relevant parameters and transfer strategy for trusted root in chip development and application, together with the simulation and validation of corresponding functions. At last, we point out that one of the most important further research directions is the trusted measurement of dynamic data and software running in security environment.
[...] Read more.