首页 > 最新文献

2008 IEEE International Multitopic Conference最新文献

英文 中文
A wavelet based algorithm for Ocular Artifact detection In the EEG signals 基于小波的脑电信号眼伪影检测算法
Pub Date : 2008-12-01 DOI: 10.1109/INMIC.2008.4777729
M. Kiamini, S. Alirezaee, B. Perseh, M. Ahmadi
Artifacts are noises introduced to an electroencephalogram (EEG) signal by patient's movements. Eye-blinks and movements of the eyeballs produce electrical signals that are collectively known as Ocular Artifacts (OA) and these are 10-100 times stronger than EEG signal which is being recorded. Removing artifacts from EEG signal may aid the work of doctors, because artifacts disturb their attention. This paper present a new method to automatically identify the position of Ocular Artifacts zones in contaminated EEG signal. Then only removing it's to obtain clean EEG based on the stationary wavelet transform (SWT). In this case, correlation coefficient between wavelet coefficients of the Ocular Artifacts zones in contaminated EEG signal and same zones in electrooculogram (EOG) will be used to generate the wavelet coefficients for artifact-free EEG signal.
伪影是由患者的运动引入到脑电图信号中的噪声。眨眼和眼球运动产生的电信号统称为眼伪影(OA),这些信号比记录的脑电图信号强10-100倍。去除脑电图信号中的伪影可能有助于医生的工作,因为伪影会干扰他们的注意力。提出了一种自动识别受污染脑电信号中眼伪影区位置的新方法。然后基于平稳小波变换(SWT)将其去除,得到干净的脑电信号。在这种情况下,将利用污染脑电信号中眼伪影区域的小波系数与眼电图中相同区域的小波系数之间的相关系数来生成无伪影脑电信号的小波系数。
{"title":"A wavelet based algorithm for Ocular Artifact detection In the EEG signals","authors":"M. Kiamini, S. Alirezaee, B. Perseh, M. Ahmadi","doi":"10.1109/INMIC.2008.4777729","DOIUrl":"https://doi.org/10.1109/INMIC.2008.4777729","url":null,"abstract":"Artifacts are noises introduced to an electroencephalogram (EEG) signal by patient's movements. Eye-blinks and movements of the eyeballs produce electrical signals that are collectively known as Ocular Artifacts (OA) and these are 10-100 times stronger than EEG signal which is being recorded. Removing artifacts from EEG signal may aid the work of doctors, because artifacts disturb their attention. This paper present a new method to automatically identify the position of Ocular Artifacts zones in contaminated EEG signal. Then only removing it's to obtain clean EEG based on the stationary wavelet transform (SWT). In this case, correlation coefficient between wavelet coefficients of the Ocular Artifacts zones in contaminated EEG signal and same zones in electrooculogram (EOG) will be used to generate the wavelet coefficients for artifact-free EEG signal.","PeriodicalId":112530,"journal":{"name":"2008 IEEE International Multitopic Conference","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117090846","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Evaluation of control flow traces in software applications for intrusion detection 入侵检测软件应用中控制流轨迹的评估
Pub Date : 2008-12-01 DOI: 10.1109/INMIC.2008.4777765
Imran Asad Gul, Nils Sommer, Matthias Rohr, Andre van Hoom, Wilhelm Hasselbring
Software security has become an important requirement, particularly for systems that are publicly accessible through the Internet. Such systems can be equipped with intrusion detection systems to uncover security breaches. In this paper, we present a novel application-level intrusion detection approach. A normal behavior profile is created from application-internal control flow in terms of operation execution traces. Anomalous control flows indicative for intrusion attempts are detected by continuously monitoring and analyzing the software system. A case study demonstrates the intrusion detection approach's applicability in the context of a multi-user Java Web application.
软件安全已经成为一个重要的要求,特别是对于那些可以通过Internet公开访问的系统。这种系统可以配备入侵检测系统,以发现安全漏洞。本文提出了一种新的应用层入侵检测方法。根据操作执行跟踪,从应用程序内部控制流创建正常的行为概要文件。通过对软件系统的持续监测和分析,检测出提示入侵企图的异常控制流。一个案例研究演示了入侵检测方法在多用户Java Web应用程序上下文中的适用性。
{"title":"Evaluation of control flow traces in software applications for intrusion detection","authors":"Imran Asad Gul, Nils Sommer, Matthias Rohr, Andre van Hoom, Wilhelm Hasselbring","doi":"10.1109/INMIC.2008.4777765","DOIUrl":"https://doi.org/10.1109/INMIC.2008.4777765","url":null,"abstract":"Software security has become an important requirement, particularly for systems that are publicly accessible through the Internet. Such systems can be equipped with intrusion detection systems to uncover security breaches. In this paper, we present a novel application-level intrusion detection approach. A normal behavior profile is created from application-internal control flow in terms of operation execution traces. Anomalous control flows indicative for intrusion attempts are detected by continuously monitoring and analyzing the software system. A case study demonstrates the intrusion detection approach's applicability in the context of a multi-user Java Web application.","PeriodicalId":112530,"journal":{"name":"2008 IEEE International Multitopic Conference","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121819908","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Towards a better control of change impact propagation 朝着更好地控制变更影响传播的方向发展
Pub Date : 2008-12-01 DOI: 10.1109/INMIC.2008.4777770
A. Ahmad, H. Basson, L. Deruelle, M. Bouneffa
The software evolution requires an exhaustive understanding of all the artifacts or components composing the software. In fact, any intended change may generate an impact propagated to the various software components through the different kind of relationships relating them. This situation is generally called the ripple effect and may cause several types of damages or side effects. In this paper, we focus on the potential flow of change impact propagation as provoked by the carried out change. For that purpose, we propose a structural model of software evolution (SMSE). This model is intended to represent and manage the different software artifacts and their relationships. The instantiated SMSE is used to built a knowledge base system providing, among other facilities, an assistance to the designer (or engineer) of software evolution for an a priori assessment of the change impact. The major aim of the system is to help a systematic analysis of the change impact and the identification of its propagation.
软件发展需要对组成软件的所有工件或组件有详尽的了解。事实上,任何预期的变更都可能通过不同类型的关系传播到不同的软件组件。这种情况通常被称为连锁反应,并可能导致几种类型的损害或副作用。在本文中,我们关注的是变更影响传播的潜在流,这是由执行的变更引起的。为此,我们提出了软件演化的结构模型(SMSE)。该模型旨在表示和管理不同的软件工件及其关系。实例化的SMSE用于构建一个知识库系统,在其他设施中,为软件开发的设计者(或工程师)提供对变更影响的先验评估的帮助。该系统的主要目的是帮助系统地分析变化的影响并确定其传播。
{"title":"Towards a better control of change impact propagation","authors":"A. Ahmad, H. Basson, L. Deruelle, M. Bouneffa","doi":"10.1109/INMIC.2008.4777770","DOIUrl":"https://doi.org/10.1109/INMIC.2008.4777770","url":null,"abstract":"The software evolution requires an exhaustive understanding of all the artifacts or components composing the software. In fact, any intended change may generate an impact propagated to the various software components through the different kind of relationships relating them. This situation is generally called the ripple effect and may cause several types of damages or side effects. In this paper, we focus on the potential flow of change impact propagation as provoked by the carried out change. For that purpose, we propose a structural model of software evolution (SMSE). This model is intended to represent and manage the different software artifacts and their relationships. The instantiated SMSE is used to built a knowledge base system providing, among other facilities, an assistance to the designer (or engineer) of software evolution for an a priori assessment of the change impact. The major aim of the system is to help a systematic analysis of the change impact and the identification of its propagation.","PeriodicalId":112530,"journal":{"name":"2008 IEEE International Multitopic Conference","volume":"107 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114258184","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
The Trackback-Rank algorithm for the blog search 博客搜索的Trackback-Rank算法
Pub Date : 2008-12-01 DOI: 10.1109/INMIC.2008.4777781
Jung-Hoon Kim, T. Yoon, Kunsu Kim, Jee-Hyong Lee
Blog is a personal publishing tool which encourages users to contributions in the Web. As the number of blog entries and contributors (bloggers) grows at a very fast pace, they are increasingly filling the Web space. Thus effective search in the blogspace become more important. For effective search, the page ranking algorithm is one of the most critical techniques. Blogs have the structural features, which do not exist in the traditional Web, such as trackback links, tags, comments. For this reason, the page ranking algorithms for the traditional Web may not work effectively in the blogspace. In this paper, we propose a new ldquotrackback-rankrdquo algorithm which considers the features of blogs for more effective blog search. We evaluate bloggers' authority, trackback connectivity, and users' reactivity in order to rank blog entries. These factors are created and modified by the interaction among blog users. The blog users read and evaluate contents of blog entries and then interaction other users. Thereby, these factors implicitly reflect the contents quality of the entries, and the trackback-rank algorithm could improve the relevance of the search result to the queries. Our experiments on a collection of 62,906 blog entries shows that the trackback-rank algorithm can more effectively find relevant information compared to the traditional ranking algorithm.
博客是一种个人发布工具,鼓励用户在网络上做出贡献。随着博客条目和贡献者(博客作者)的数量以非常快的速度增长,它们越来越多地填满了Web空间。因此,有效的搜索在博客空间变得更加重要。为了实现有效的搜索,页面排序算法是最关键的技术之一。博客具有传统Web中不存在的结构性特征,如trackback链接、标签、评论。由于这个原因,传统Web的页面排名算法在博客空间中可能无法有效地工作。在本文中,我们提出了一种新的ldquotrackback-rankrdquo算法,该算法考虑了博客的特征,以便更有效地搜索博客。为了对博客条目进行排名,我们评估了博客作者的权威性、追溯连接性和用户的反应性。这些因素是由博客用户之间的互动产生和修改的。博客用户阅读和评估博客条目的内容,然后与其他用户进行交互。因此,这些因素隐含地反映了条目的内容质量,trackback-rank算法可以提高搜索结果与查询的相关性。我们对62,906篇博客条目的实验表明,与传统排名算法相比,trackback-rank算法可以更有效地找到相关信息。
{"title":"The Trackback-Rank algorithm for the blog search","authors":"Jung-Hoon Kim, T. Yoon, Kunsu Kim, Jee-Hyong Lee","doi":"10.1109/INMIC.2008.4777781","DOIUrl":"https://doi.org/10.1109/INMIC.2008.4777781","url":null,"abstract":"Blog is a personal publishing tool which encourages users to contributions in the Web. As the number of blog entries and contributors (bloggers) grows at a very fast pace, they are increasingly filling the Web space. Thus effective search in the blogspace become more important. For effective search, the page ranking algorithm is one of the most critical techniques. Blogs have the structural features, which do not exist in the traditional Web, such as trackback links, tags, comments. For this reason, the page ranking algorithms for the traditional Web may not work effectively in the blogspace. In this paper, we propose a new ldquotrackback-rankrdquo algorithm which considers the features of blogs for more effective blog search. We evaluate bloggers' authority, trackback connectivity, and users' reactivity in order to rank blog entries. These factors are created and modified by the interaction among blog users. The blog users read and evaluate contents of blog entries and then interaction other users. Thereby, these factors implicitly reflect the contents quality of the entries, and the trackback-rank algorithm could improve the relevance of the search result to the queries. Our experiments on a collection of 62,906 blog entries shows that the trackback-rank algorithm can more effectively find relevant information compared to the traditional ranking algorithm.","PeriodicalId":112530,"journal":{"name":"2008 IEEE International Multitopic Conference","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123959492","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Design and implementation of low cost electronic prepaid energy meter 低成本电子预付费电能表的设计与实现
Pub Date : 2008-12-01 DOI: 10.1109/INMIC.2008.4777799
S.K. Ali Zaidi, H. Masroor, S. Ashraf, A. Hassan
Electronic energy meter has got numerous advantages over the conventional electromechanical meter and due to this; many countries of the world have switched to electronic metering system. But unfortunately Pakistan is still deprived of such meters. The paper is based on the final year project of the design & implementation of prepaid electronic energy meter which we are designing in order to eliminate the problems being faced by the Pakistani people. By the introduction of prepaid system in Pakistan the problem of overcharging and over billing and the trouble being faced by the customers in paying the bills will be removed all together. Since our meter is electronic in nature, it has got no moving parts and hence the problem of stability & accuracy due to temperature changes are solved. Our meter is also tamper resistant which eradicates the chances of the theft of electricity.
电子电能表比传统的机电电能表具有许多优点,正因为如此;世界上许多国家已改用电子计量系统。但不幸的是,巴基斯坦仍然没有这样的米。本文是基于我们正在设计的预付费电子电能表的设计和实施的最后一年项目,以消除巴基斯坦人民面临的问题。通过在巴基斯坦引入预付费系统,收费过高和账单过多的问题以及客户在支付账单时所面临的麻烦将一起被消除。由于我们的仪表本质上是电子的,它没有运动部件,因此解决了由于温度变化而导致的稳定性和准确性问题。我们的电表也是防篡改的,杜绝了偷电的机会。
{"title":"Design and implementation of low cost electronic prepaid energy meter","authors":"S.K. Ali Zaidi, H. Masroor, S. Ashraf, A. Hassan","doi":"10.1109/INMIC.2008.4777799","DOIUrl":"https://doi.org/10.1109/INMIC.2008.4777799","url":null,"abstract":"Electronic energy meter has got numerous advantages over the conventional electromechanical meter and due to this; many countries of the world have switched to electronic metering system. But unfortunately Pakistan is still deprived of such meters. The paper is based on the final year project of the design & implementation of prepaid electronic energy meter which we are designing in order to eliminate the problems being faced by the Pakistani people. By the introduction of prepaid system in Pakistan the problem of overcharging and over billing and the trouble being faced by the customers in paying the bills will be removed all together. Since our meter is electronic in nature, it has got no moving parts and hence the problem of stability & accuracy due to temperature changes are solved. Our meter is also tamper resistant which eradicates the chances of the theft of electricity.","PeriodicalId":112530,"journal":{"name":"2008 IEEE International Multitopic Conference","volume":"118 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134101676","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 31
Implementation of SCADA system for unsought tablets detection through morphological image processing 通过形态学图像处理实现SCADA系统对未寻片剂的检测
Pub Date : 2008-12-01 DOI: 10.1109/INMIC.2008.4777789
H. Baig, M.M. Ikram, K. Shamim, A. Akbar, A. Hassan
Pharmaceutical industries which are intended for the packaging of different tablets in a strip of blister need to make sure that the tablets are free from defects before letting them go into the packing box. The purpose of this paper is to introduce an efficient, reliable and cost effective supervisory control and data acquisition (SCADA) system for detection and removing of unwanted tablet(s) strips. The system detects defective tablets by capturing image of a batch of tablets and performs morphological analysis over it. If a defective tablet is found, the system is smart enough to trace in which strip the defective tablet would be present after cutting of batch and hence instructing the remote terminal unit (RTU) to remove that strip. The status of the whole process at the completion of every order is sent to master terminal unit (MTU) which generates and saves the log file on MS-EXCEL, and is also able to send the log file to main server via electronic mail.
制药行业在包装不同的片剂时,需要确保片剂在进入包装盒之前没有缺陷。本文的目的是介绍一种高效,可靠和经济有效的监控和数据采集(SCADA)系统,用于检测和去除不需要的药片(s)条。该系统通过捕获一批药片的图像并对其进行形态学分析来检测缺陷药片。如果发现有缺陷的片剂,系统足够智能,可以跟踪在切割批次后,有缺陷的片剂将出现在哪个条上,从而指示远程终端单元(RTU)删除该条。每个订单完成时的整个过程的状态发送到主终端单元(MTU), MTU生成并保存在MS-EXCEL上的日志文件,也可以通过电子邮件将日志文件发送到主服务器。
{"title":"Implementation of SCADA system for unsought tablets detection through morphological image processing","authors":"H. Baig, M.M. Ikram, K. Shamim, A. Akbar, A. Hassan","doi":"10.1109/INMIC.2008.4777789","DOIUrl":"https://doi.org/10.1109/INMIC.2008.4777789","url":null,"abstract":"Pharmaceutical industries which are intended for the packaging of different tablets in a strip of blister need to make sure that the tablets are free from defects before letting them go into the packing box. The purpose of this paper is to introduce an efficient, reliable and cost effective supervisory control and data acquisition (SCADA) system for detection and removing of unwanted tablet(s) strips. The system detects defective tablets by capturing image of a batch of tablets and performs morphological analysis over it. If a defective tablet is found, the system is smart enough to trace in which strip the defective tablet would be present after cutting of batch and hence instructing the remote terminal unit (RTU) to remove that strip. The status of the whole process at the completion of every order is sent to master terminal unit (MTU) which generates and saves the log file on MS-EXCEL, and is also able to send the log file to main server via electronic mail.","PeriodicalId":112530,"journal":{"name":"2008 IEEE International Multitopic Conference","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130310108","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Architecture supporting network discovery in future heterogeneous networks 支持未来异构网络中网络发现的体系结构
Pub Date : 2008-12-01 DOI: 10.1109/INMIC.2008.4777755
R. Yaqub, I. Ul Haq, K. Yahya
The aim of this research paper is to critically analyze one of the integrated WLAN-cellular network architecture which third generation partnership project (3GPP) has also included in its release 6 i.e. generic access network (GAN) formally called unlicensed mobile access (UMA). This article analyzes the limitations of the above mentioned solution and present an architecture for future heterogeneous networks using a novel hybrid approach of network discovery, where the network will broadcast the updated network information using cell broadcast center (CBC) to the mobile station/user equipment (MS) and the MS may also enquire from the network the additional information regarding the available networks, as opposed to centralized technique used in the existing cellular networks. The proposed solution suggests a network information repository (NIR) embedded in the core network, being populated with information of all the available radio access networks (RANs) in a specific location. The information obtained from NIR will help the MS to identify the network elements ahead of time and communicate with these elements in advance. This will help the MS to fetch the general information about the available networks and select the desired network ahead of time and thus seamless connectivity/ handover will be possible for the end user.
本研究论文的目的是批判性地分析第三代合作伙伴计划(3GPP)在其第6版中也包含的集成wlan -蜂窝网络架构之一,即通用接入网(GAN),正式称为无授权移动接入(UMA)。本文分析了上述解决方案的局限性,并使用一种新的网络发现混合方法为未来的异构网络提出了一种体系结构,其中网络将使用蜂窝广播中心(CBC)向移动站/用户设备(MS)广播更新的网络信息,而MS也可以从网络询问有关可用网络的附加信息。与现有蜂窝网络中使用的集中式技术相反。所提出的解决方案建议在核心网络中嵌入网络信息存储库(NIR),其中填充了特定位置的所有可用无线接入网(ran)的信息。从近红外获得的信息将有助于MS提前识别网络元素并提前与这些元素进行通信。这将有助于MS获取有关可用网络的一般信息,并提前选择所需的网络,从而为最终用户提供无缝连接/切换。
{"title":"Architecture supporting network discovery in future heterogeneous networks","authors":"R. Yaqub, I. Ul Haq, K. Yahya","doi":"10.1109/INMIC.2008.4777755","DOIUrl":"https://doi.org/10.1109/INMIC.2008.4777755","url":null,"abstract":"The aim of this research paper is to critically analyze one of the integrated WLAN-cellular network architecture which third generation partnership project (3GPP) has also included in its release 6 i.e. generic access network (GAN) formally called unlicensed mobile access (UMA). This article analyzes the limitations of the above mentioned solution and present an architecture for future heterogeneous networks using a novel hybrid approach of network discovery, where the network will broadcast the updated network information using cell broadcast center (CBC) to the mobile station/user equipment (MS) and the MS may also enquire from the network the additional information regarding the available networks, as opposed to centralized technique used in the existing cellular networks. The proposed solution suggests a network information repository (NIR) embedded in the core network, being populated with information of all the available radio access networks (RANs) in a specific location. The information obtained from NIR will help the MS to identify the network elements ahead of time and communicate with these elements in advance. This will help the MS to fetch the general information about the available networks and select the desired network ahead of time and thus seamless connectivity/ handover will be possible for the end user.","PeriodicalId":112530,"journal":{"name":"2008 IEEE International Multitopic Conference","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115815041","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Fighting terrorism using DEW 利用露水打击恐怖主义
Pub Date : 2008-12-01 DOI: 10.1109/INMIC.2008.4777787
F. Saeed, R. Zulfiqar, A. Aziz, N. Zaman
Directed Energy Weapons (DEW) are in research phase and their use in combat is being discovered with the passage of time. In this paper we will discuss some of the threats that are emerging in this present era and along with that we will give our ideas of dealing with this nuisance of terrorism by using directed energy weapons.
定向能武器正处于研究阶段,随着时间的推移,定向能武器在战斗中的应用也在不断被发现。在本文中,我们将讨论当前时代出现的一些威胁,同时我们将给出我们的想法,通过使用定向能武器来处理这种令人讨厌的恐怖主义。
{"title":"Fighting terrorism using DEW","authors":"F. Saeed, R. Zulfiqar, A. Aziz, N. Zaman","doi":"10.1109/INMIC.2008.4777787","DOIUrl":"https://doi.org/10.1109/INMIC.2008.4777787","url":null,"abstract":"Directed Energy Weapons (DEW) are in research phase and their use in combat is being discovered with the passage of time. In this paper we will discuss some of the threats that are emerging in this present era and along with that we will give our ideas of dealing with this nuisance of terrorism by using directed energy weapons.","PeriodicalId":112530,"journal":{"name":"2008 IEEE International Multitopic Conference","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129711470","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Shape invariant recognition of segmented human face images using eigenfaces 基于特征脸的分割人脸图像形状不变性识别
Pub Date : 2008-12-01 DOI: 10.1109/INMIC.2008.4777807
Z. Riaz, M. Beetz, B. Radig
This paper describes an efficient approach for face recognition as a two step process: (1) segmenting the face region from an image by using an appearance based model, (2) using eigenfaces for person identification for segmented face region. The efficiency lies not only in generation of appearance models which uses the explicit approach for shape and texture but also the combined use of the aforementioned techniques. The result is an algorithm that is robust against facial expressions variances. Moreover it reduces the amount of texture up to 12% of the image texture instead of considering whole face image. Experiments have been performed on Cohn Kanade facial database using ten subjects for training and seven for testing purposes. This achieved a successful face recognition rate up to 92.85% with and without facial expressions. Face recognition using principal component analysis (PCA) is fast and efficient to use, while the extracted appearance model can be further used for facial recognition and tracking under lighting and pose variations. This combination is simple to model and apply in real time.
本文描述了一种有效的人脸识别方法,分为两个步骤:(1)使用基于外观的模型从图像中分割人脸区域,(2)使用特征脸对分割的人脸区域进行人物识别。其效率不仅体现在对形状和纹理采用显式方法的外观模型生成上,而且体现在上述技术的综合使用上。结果是一种对面部表情差异具有鲁棒性的算法。此外,它将纹理的数量减少到图像纹理的12%,而不是考虑整个人脸图像。在Cohn Kanade面部数据库上进行了实验,使用10个受试者进行训练,7个受试者进行测试。这使得有面部表情和没有面部表情的人脸识别率都达到了92.85%。基于主成分分析(PCA)的人脸识别具有快速、高效的特点,提取的外观模型可进一步用于光照和姿态变化下的人脸识别和跟踪。这种组合很容易建模并实时应用。
{"title":"Shape invariant recognition of segmented human face images using eigenfaces","authors":"Z. Riaz, M. Beetz, B. Radig","doi":"10.1109/INMIC.2008.4777807","DOIUrl":"https://doi.org/10.1109/INMIC.2008.4777807","url":null,"abstract":"This paper describes an efficient approach for face recognition as a two step process: (1) segmenting the face region from an image by using an appearance based model, (2) using eigenfaces for person identification for segmented face region. The efficiency lies not only in generation of appearance models which uses the explicit approach for shape and texture but also the combined use of the aforementioned techniques. The result is an algorithm that is robust against facial expressions variances. Moreover it reduces the amount of texture up to 12% of the image texture instead of considering whole face image. Experiments have been performed on Cohn Kanade facial database using ten subjects for training and seven for testing purposes. This achieved a successful face recognition rate up to 92.85% with and without facial expressions. Face recognition using principal component analysis (PCA) is fast and efficient to use, while the extracted appearance model can be further used for facial recognition and tracking under lighting and pose variations. This combination is simple to model and apply in real time.","PeriodicalId":112530,"journal":{"name":"2008 IEEE International Multitopic Conference","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129713637","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Performance evaluation of multiple routing protocols using multiple mobility models for mobile ad hoc networks 移动自组织网络中使用多种移动模型的多种路由协议的性能评估
Pub Date : 2008-12-01 DOI: 10.1109/INMIC.2008.4777743
Nadir Shah, D. Qian, K. Iqbal
Mobile ad hoc networks (MANETs) are networks where the nodes are mobile, communicating via wireless link, operating without fixed infrastructure and each node act as a router (forwarding the in transit packets) as well as an end host. The movement of nodes is different in different scenario depending upon applications. Several routing protocols have been proposed by researchers for mobile ad hoc networks. They perform different in different scenarios. The mobility model is one of the main aspects for testing the performance of MANETs routing protocols. We evaluate the performance of multiple routing protocols (DSDV, DSR, OLSR and AODV) using most common mobility models ( random walk, random direction, random way point) for mobile ad hoc networks. We draw the conclusions at the end from the results which will provide the idea of using routing protocol in implementation according to the mobility characteristics of underline scenario. Also we elaborate the weakness and advantages of these routing protocols.
移动自组织网络(manet)是一种网络,其中节点是移动的,通过无线链路进行通信,在没有固定基础设施的情况下运行,每个节点都充当路由器(转发传输中的数据包)和终端主机。根据不同的应用程序,节点的移动在不同的场景中是不同的。研究人员针对移动自组织网络提出了几种路由协议。它们在不同的场景中表现不同。移动性模型是测试manet路由协议性能的主要方面之一。我们使用移动自组织网络中最常见的移动模型(随机行走、随机方向、随机路径点)评估了多种路由协议(DSDV、DSR、OLSR和AODV)的性能。最后,我们从结果中得出结论,为根据底层场景的移动性特点在实现中使用路由协议提供了思路。并详细阐述了这些路由协议的优缺点。
{"title":"Performance evaluation of multiple routing protocols using multiple mobility models for mobile ad hoc networks","authors":"Nadir Shah, D. Qian, K. Iqbal","doi":"10.1109/INMIC.2008.4777743","DOIUrl":"https://doi.org/10.1109/INMIC.2008.4777743","url":null,"abstract":"Mobile ad hoc networks (MANETs) are networks where the nodes are mobile, communicating via wireless link, operating without fixed infrastructure and each node act as a router (forwarding the in transit packets) as well as an end host. The movement of nodes is different in different scenario depending upon applications. Several routing protocols have been proposed by researchers for mobile ad hoc networks. They perform different in different scenarios. The mobility model is one of the main aspects for testing the performance of MANETs routing protocols. We evaluate the performance of multiple routing protocols (DSDV, DSR, OLSR and AODV) using most common mobility models ( random walk, random direction, random way point) for mobile ad hoc networks. We draw the conclusions at the end from the results which will provide the idea of using routing protocol in implementation according to the mobility characteristics of underline scenario. Also we elaborate the weakness and advantages of these routing protocols.","PeriodicalId":112530,"journal":{"name":"2008 IEEE International Multitopic Conference","volume":"8 8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130481421","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
期刊
2008 IEEE International Multitopic Conference
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1