By Topic

Computational Technologies in Electrical and Electronics Engineering (SIBIRCON), 2010 IEEE Region 8 International Conference on

Date 11-15 July 2010

Filter Results

Displaying Results 1 - 25 of 171
  • [Title page]

    Publication Year: 2010, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (54 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2010, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (42 KB)
    Freely Available from IEEE
  • Sponsor page

    Publication Year: 2010, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (133 KB)
    Freely Available from IEEE
  • Committees

    Publication Year: 2010, Page(s):1 - 3
    Request permission for commercial reuse | PDF file iconPDF (101 KB)
    Freely Available from IEEE
  • Contents

    Publication Year: 2010, Page(s):1 - 9
    Request permission for commercial reuse | PDF file iconPDF (143 KB)
    Freely Available from IEEE
  • LTE-SAE: Evolution of GSM towards «all IP»

    Publication Year: 2010, Page(s): 3
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (187 KB)

    LTE and SAE form the basis of 3GPP Release 8 •LTE and SAE are IP-based, bringing reduced latency, better spectrum efficiency & flexibility, larger & more efficient cell size, and access•Provide inter-working with legacy standards (GSM, UMTS, CDMA, TD-SCDMA) View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Internet governance: From the history, via modern days to the future (is it doable?)

    Publication Year: 2010, Page(s): 4
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1991 KB) | HTML iconHTML

    Most lawyers, economists and policymakers who pontificate on Internet governance lack an adequate understanding of (a) the Internet's architecture and engineering, (b) Internet mechanisms, (c) institutions involved in Internet governance, (d) the governance of those institutions, and (e) processes involved in Internet governance. This talk is discussing these and related issues. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Experience and vision of open innovations in russia and baltic region: The FRUCT program

    Publication Year: 2010, Page(s):5 - 10
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (684 KB) | HTML iconHTML

    This paper discusses our vision and experience of developing Open Innovations framework program, how it was implemented and why. The Open Innovations paradigm is a new trend for performing research and development that was proposed only a few years ago in 2003. The main emphasis of this approach is on setting cooperation in form of direct industry-to-academia joint R&D project and development ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Applications of information theory to analysis of efficiency and capacity of computers and similar devices

    Publication Year: 2010, Page(s):11 - 14
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (436 KB) | HTML iconHTML

    We suggest a new approach to definition and estimation of the computer efficiency and the computer capacity. Our definition is based on the analysis of processor instructions and kinds of accessible memory. The suggested approach gives a new look at the construction of computers and similar devices and can be of some interest for practical applications. We consider the problem of what the efficien... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Recovery of sparse active inputs in general systems: A review

    Publication Year: 2010, Page(s):15 - 22
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (244 KB) | HTML iconHTML

    A staggering amount of attention was recently devoted to the study of compressed sensing and related areas using sparse priors in over parametrized linear models. The number of citations listed on the Rice University compressive sensing website within the last 5 years exceeds 600! The threshold phenomenon was empirically observed in early papers of Donoho et al : as the dimension of a random insta... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Uniform hypothesis testing for ergodic time series distributions

    Publication Year: 2010, Page(s):23 - 27
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (499 KB) | HTML iconHTML

    Given a discrete-valued sample X1, ..., Xn we wish to decide whether it was generated by a distribution belonging to a family H0, or it was generated by a distribution belonging to a family H1. In this work we assume that all distributions are stationary ergodic, and do not make any further assumptions (e.g. no independence or mixing rate assumptions). W... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Discovery of patterns in LZ-78 text discrimination

    Publication Year: 2010, Page(s):28 - 33
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (430 KB) | HTML iconHTML

    We continue studying a new context-free computationally simple stylometry-based text homogeneity test: the sliced conditional compression complexity (sCCC or simply CCC) of literary texts introduced and inspired by the incomputable Kolmogorov conditional complexity. Other stylometry tools can occasionally almost coincide for different authors. Our CCC-attributor is asymptotically strictly minimal ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • New results on DNA codes for additive stem similarity

    Publication Year: 2010, Page(s):34 - 39
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (363 KB) | HTML iconHTML

    We consider DNA codes based on the nearest-neighbor (stem) similarity model which adequately reflects the ”hybridization potential” of two DNA sequences. Our first aim is to discuss some optimal constructions of linear DNA codes called maximum distance separable (MDS) codes for stem distance. These constructions are compared with conventional MDS codes for Hamming distance. Our secon... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • New algorithm for message restoring with errors detection and correction using binary LDPC-codes and network coding

    Publication Year: 2010, Page(s):40 - 43
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (471 KB) | HTML iconHTML

    New algorithm for message restoring with error detection and correction using binary LDPC-codes with network coding is presented. The algorithm continues the ideas described in works of Kang et al. and also can be used in random network coding. New algorithm improves decoding characteristics over straightforward method with separate message restoring and errors detection and correction stages. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Idle time reduction in TDMP implementation of LDPC decoder

    Publication Year: 2010, Page(s):44 - 49
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (229 KB) | HTML iconHTML

    This article concerns the hardware iterative decoder for a subclass of LDPC (Low-Density Parity-Check) codes that are implementation oriented. They are known as Architecture Aware LDPC (AA-LDPC). The decoder has been implemented in a form of parameterizable VHDL description. To achieve high clock frequency of the decoder hardware implementation, a large number of pipeline registers has been used i... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On redundancy of strong isometries of binary codes

    Publication Year: 2010, Page(s):50 - 51
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (383 KB) | HTML iconHTML

    In this paper the notion of a semistrong isometry is introduced and it is proved that any such isometry between two binary codes is extendable to an isometry of the Boolean cube. This implies that any semistrong-isometric binary codes are equivalent. It is shown that these results has unimrovable character. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Intersections of perfect binary codes

    Publication Year: 2010, Page(s):52 - 54
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (435 KB) | HTML iconHTML

    Intersections of perfect binary codes are investigated. In 1998 Etzion and Vardy proved that the intersection number η(C, D), for any two distinct perfect codes C and D, is always in the range 0 ≤ η(C, D) ≤ 2n-log(n+1) -2(n-1)/2, where the upper bound is attainable. We improve the upper bound and show that the intersection number 2n-log(n+1) -2... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • One error control scheme for ATM header

    Publication Year: 2010, Page(s):55 - 58
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (172 KB) | HTML iconHTML

    Wireless Asynchronous Transfer Mode (WATM) have been proposed by ETSI and ATM Forum for some communications applications. The ATM employs header error control (HEC) to protect the ATM cell header from bit error and/or avoid the miss forwarding of ATM cell. Standard HEC is based on CRC polynomial. Its decoding allows single error correction and it is usually based on exploitation of look-up tables ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Another derivation of Wu list decoding algorithm and interpolation in rational curve fitting

    Publication Year: 2010, Page(s):59 - 64
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (460 KB) | HTML iconHTML

    A novel derivation of the Wu list decoding algorithm for Reed-Solomon codes is provided. The algorithm is reformulated as construction of a partially homogenized interpolation polynomial. A generalization of the binary interpolation algorithm, which is based on the novel formulation of the interpolation step, is provided. It enables complexity reducion both with respect to the Wu method based on t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fast interpolation in algebraic soft decision decoding of Reed-Solomon codes

    Publication Year: 2010, Page(s):65 - 69
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (160 KB) | HTML iconHTML

    The problem of bivariate interpolation in algebraic soft-decision decoding of Reed-Solomon codes is considered. A generalization of the binary interpolation algorithm to the case of variable root multiplicity is presented. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Rank codes using weak self-orthogonal bases

    Publication Year: 2010, Page(s):70 - 71
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (461 KB) | HTML iconHTML

    Finding a syndrome is the significant part of decoding rank codes procedure. Using a weak self-orthogonal basis one can decrease its complexity. In this case the major part of complexity evaluation is approximated by N(log N)2. It is less than the complexity when using Karatsuba-Ofman algorithm only. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Logical analysis of information in tabular form

    Publication Year: 2010, Page(s):72 - 79
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1059 KB) | HTML iconHTML

    This article describes algebra for logical analyzing of vector and tabular forms of information representation to solve the problems of information retrieval, diagnosis, pattern recognition and decision-making in the vector discrete Boolean space. The high-speed models and methods for concurrent vector logical analysis of information, which completely exclude the use of arithmetic operations, incl... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • SOC verification infrastructure

    Publication Year: 2010, Page(s):80 - 85
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2540 KB) | HTML iconHTML

    The testing and verification technology for system HDL models, focused to the significant improvement of the quality of design components for digital systems on chips and reduction the development time (time-to-market) by using the simulation environment, testable analysis of the logical structure HDL-program and the optimal placement of assertion engine is proposed. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Computational technology in seismic monitoring system

    Publication Year: 2010, Page(s):86 - 90
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1032 KB) | HTML iconHTML

    Major problems of computing technologies forming a basis for modern hierarchic monitoring networks are considered. Such networks are used to trace natural processes mostly in seismic-volcano prone zones and technogenic processes associated with industrial and test site explosions, destructive processes in hydropower and nuclear power plants, etc. Algorithmic approaches for online solving of the pr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design and construction of a module for the dynamic excitation and vibrational analysis of structures

    Publication Year: 2010, Page(s):91 - 96
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (574 KB) | HTML iconHTML

    The present work is aimed at evaluating the vulnerability and seismic behavior of buildings, for which an exciter of eccentric mass has been developed. A card for data acquisition and a software for the digital processing of the vibration signals have been designed, and with the aid of an accelerometer and a varier of speed we were able to obtain the dynamic characteristics of the building under t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.