首页 > 最新文献

2009 International Conference on Industrial and Information Systems (ICIIS)最新文献

英文 中文
Resource-Allocating Codebook for patch-based face recognition 基于补丁的人脸识别资源分配码本
Pub Date : 2009-12-28 DOI: 10.1109/ICIINFS.2009.5429854
A. Ramanan, M. Niranjan
In this paper we propose a novel approach to constructing a discriminant visual codebook in a simple and extremely fast way as a one-pass, that we call Resource-Allocating Codebook (RAC), inspired by the Resource Allocating Network (RAN) algorithms developed in the artificial neural networks literature. Unlike density preserving clustering, this approach retains data spread out more widely in the input space, thereby including rare low level features in the codebook. We show that the codebook constructed by the RAC technique outperforms the codebook constructed by K-means clustering in recognition performance and computation on two standard face databases, namely the AT&T and Yale faces, performed with SIFT features.
本文受人工神经网络文献中资源分配网络(RAN)算法的启发,提出了一种新的方法,以一种简单而极快的方式构建一个判别视觉码本,我们称之为资源分配码本(RAC)。与保持密度的聚类不同,这种方法保留了在输入空间中更广泛分布的数据,从而包括了码本中罕见的低级特征。我们证明RAC技术构建的码本在识别性能和计算上优于K-means聚类构建的码本,在两个标准人脸数据库(即AT&T和Yale人脸)上执行SIFT特征。
{"title":"Resource-Allocating Codebook for patch-based face recognition","authors":"A. Ramanan, M. Niranjan","doi":"10.1109/ICIINFS.2009.5429854","DOIUrl":"https://doi.org/10.1109/ICIINFS.2009.5429854","url":null,"abstract":"In this paper we propose a novel approach to constructing a discriminant visual codebook in a simple and extremely fast way as a one-pass, that we call Resource-Allocating Codebook (RAC), inspired by the Resource Allocating Network (RAN) algorithms developed in the artificial neural networks literature. Unlike density preserving clustering, this approach retains data spread out more widely in the input space, thereby including rare low level features in the codebook. We show that the codebook constructed by the RAC technique outperforms the codebook constructed by K-means clustering in recognition performance and computation on two standard face databases, namely the AT&T and Yale faces, performed with SIFT features.","PeriodicalId":117199,"journal":{"name":"2009 International Conference on Industrial and Information Systems (ICIIS)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126939552","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
FPGA-based compact and flexible architecture for real-time embedded vision systems 基于fpga的实时嵌入式视觉系统结构紧凑灵活
Pub Date : 2009-12-01 DOI: 10.1109/ICIINFS.2009.5429839
Mahendra Samarawickrama, A. Pasqual, R. Rodrigo
A single-chip FPGA implementation of a vision core is an efficient way to design fast and compact embedded vision systems from the PCB design level. The scope of the research is to design a novel FPGA-based parallel architecture for embedded vision entirely with on-chip FPGA resources. We designed it by utilizing block-RAMs and IO interfaces on the FPGA. As a result, the system is compact, fast and flexible. We evaluated this architecture for several mid-level neighborhood algorithms using Xilinx Virtex-2 Pro (XC2VP30) FPGA. Our algorithm uses a vision core with a 100 MHz system clock which supports image processing on a low-resolution image of 128×128 pixels up to 200 images per second. The results are accurate. We have compared our results with existing FPGA implementations. The performance of the algorithms could be substantially improved by applying sufficient parallelism.
单片FPGA实现视觉核心是从PCB设计层面设计快速、紧凑的嵌入式视觉系统的有效途径。研究的范围是完全利用片上FPGA资源设计一种基于FPGA的嵌入式视觉并行架构。我们利用FPGA上的块ram和IO接口来设计它。因此,该系统具有紧凑、快速、灵活的特点。我们使用Xilinx Virtex-2 Pro (XC2VP30) FPGA对该架构进行了几种中级邻域算法的评估。我们的算法使用具有100 MHz系统时钟的视觉核心,支持在128×128像素的低分辨率图像上进行图像处理,每秒高达200张图像。结果是准确的。我们将我们的结果与现有的FPGA实现进行了比较。通过应用足够的并行性,可以大大提高算法的性能。
{"title":"FPGA-based compact and flexible architecture for real-time embedded vision systems","authors":"Mahendra Samarawickrama, A. Pasqual, R. Rodrigo","doi":"10.1109/ICIINFS.2009.5429839","DOIUrl":"https://doi.org/10.1109/ICIINFS.2009.5429839","url":null,"abstract":"A single-chip FPGA implementation of a vision core is an efficient way to design fast and compact embedded vision systems from the PCB design level. The scope of the research is to design a novel FPGA-based parallel architecture for embedded vision entirely with on-chip FPGA resources. We designed it by utilizing block-RAMs and IO interfaces on the FPGA. As a result, the system is compact, fast and flexible. We evaluated this architecture for several mid-level neighborhood algorithms using Xilinx Virtex-2 Pro (XC2VP30) FPGA. Our algorithm uses a vision core with a 100 MHz system clock which supports image processing on a low-resolution image of 128×128 pixels up to 200 images per second. The results are accurate. We have compared our results with existing FPGA implementations. The performance of the algorithms could be substantially improved by applying sufficient parallelism.","PeriodicalId":117199,"journal":{"name":"2009 International Conference on Industrial and Information Systems (ICIIS)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123128067","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
9.5 Gbit/s 20 channel 1∶8 DEMUX for a coherent optical receiver DSPU ASIC input interface 9.5 Gbit/s 20通道1∶8 DEMUX为相干光接收机DSPU ASIC输入接口
Pub Date : 2009-12-01 DOI: 10.1109/ICIINFS.2009.5429846
V. R. Herath, O. Adamczyk, R. Peveling, C. Wodehoff, R. Noé
This paper presents the design of an input interface to a CMOS DSPU of an optical coherent QPSK with polarization multiplex receiver. The interface consists of a 20 channel 1:8 DEMUX. Source Coupled FET logic (SCFL) and CMOS logic were used in the design. The interface converts 10 Gbit/s input data rate to 1.25 Gbit/s at the output. The interface gives an open eye diagram at the output up to 9.5 Gbit/s input data rate. The system consumes 7.9 mW/channel.Gb/s. 130 nm bulk CMOS technology was used in the design.
介绍了一种带偏振复用接收的光相干QPSK CMOS DSPU的输入接口设计。该接口由20通道1:8 DEMUX组成。设计中采用了源耦合场效应管逻辑(SCFL)和CMOS逻辑。接口的输入速率为10gbit /s,输出速率为1.25 Gbit/s。该接口在输出高达9.5 Gbit/s的输入数据速率下给出了开眼图。系统功耗为7.9 mW/channel.Gb/s。设计中采用了130nm本体CMOS技术。
{"title":"9.5 Gbit/s 20 channel 1∶8 DEMUX for a coherent optical receiver DSPU ASIC input interface","authors":"V. R. Herath, O. Adamczyk, R. Peveling, C. Wodehoff, R. Noé","doi":"10.1109/ICIINFS.2009.5429846","DOIUrl":"https://doi.org/10.1109/ICIINFS.2009.5429846","url":null,"abstract":"This paper presents the design of an input interface to a CMOS DSPU of an optical coherent QPSK with polarization multiplex receiver. The interface consists of a 20 channel 1:8 DEMUX. Source Coupled FET logic (SCFL) and CMOS logic were used in the design. The interface converts 10 Gbit/s input data rate to 1.25 Gbit/s at the output. The interface gives an open eye diagram at the output up to 9.5 Gbit/s input data rate. The system consumes 7.9 mW/channel.Gb/s. 130 nm bulk CMOS technology was used in the design.","PeriodicalId":117199,"journal":{"name":"2009 International Conference on Industrial and Information Systems (ICIIS)","volume":"88 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116460835","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Computational intelligence techniques to optimize a constrained distribution operations 计算智能技术优化约束分布操作
Pub Date : 2009-12-01 DOI: 10.1109/ICIINFS.2009.5429861
U. Dharmapriya, S. Siyambalapitiya, A. Kulatunga
With the rapid development of Information Technology (IT) in recent past, number of unsolved real-world complex problems benefited immensely since solutions could be found within considerable time period. This is mainly due to the computational intelligence techniques which can deliver a reasonably good result within a shorter time period by performing complex calculations with numbers of iterations. Distribution operation is a common problem in the area of supply chain management which got the attention for many years. However, up to now only simplified versions of distribution operations such as Vehicle Routing Problem (VRP), Travelling Salesman Problem (TSP) have being considered by many researches. Some of the researchers adopted with heuristic approaches such as Simulated Annealing (SA), Genetic Algorithm (GA), Tabu Search (TS) and etc. with number of assumptions. However, the standard problems are far away from the real world problem. Furthermore, when the problem size (or scale) increases, the computational time to finds the optimal results increase exponentially, hence these problems are categorized as +P-hard problems in mathematical terms. To bridge the gap between standard problems in distribution and the real world problems, in this research, the standard VRP problem is extended to multi depot environment with split delivery option and tries to investigate the applicability of Simulated Annealing (SA) and Tabu Search (TS) to find solutions to this complex problem within considerable time frame. +umbers of simulation studies are carried out with both of these techniques and results revealed that both these techniques can be adapted to complex Multi Depot Vehicle Routing Problem with Time Windows and Split Delivery (MDVRPTWSD) problem and TS out performances in solution quality.
近年来,随着信息技术(IT)的快速发展,许多未解决的现实世界的复杂问题受益巨大,因为可以在相当长的时间内找到解决方案。这主要是由于计算智能技术,它可以通过执行具有多次迭代的复杂计算,在较短的时间内提供相当好的结果。配送操作是供应链管理领域的一个常见问题,多年来一直受到人们的关注。然而,到目前为止,许多研究只考虑了配送操作的简化版本,如车辆路线问题(VRP)、旅行商问题(TSP)。一些研究人员采用了启发式方法,如模拟退火(SA)、遗传算法(GA)、禁忌搜索(TS)等,并提出了若干假设。然而,标准问题与现实世界的问题相去甚远。此外,当问题规模(或规模)增加时,寻找最佳结果的计算时间呈指数增长,因此这些问题在数学术语中被归类为+P-hard问题。为了弥合配送中的标准问题与现实问题之间的差距,本研究将标准VRP问题扩展到具有分离配送选项的多仓库环境中,并尝试研究模拟退火(SA)和禁忌搜索(TS)的适用性,以在相当长的时间框架内找到这一复杂问题的解决方案。使用这两种技术进行了大量的仿真研究,结果表明,这两种技术都可以适用于复杂的带时间窗的多仓库车辆路线问题和分次交付(MDVRPTWSD)问题,并且在解决质量上表现良好。
{"title":"Computational intelligence techniques to optimize a constrained distribution operations","authors":"U. Dharmapriya, S. Siyambalapitiya, A. Kulatunga","doi":"10.1109/ICIINFS.2009.5429861","DOIUrl":"https://doi.org/10.1109/ICIINFS.2009.5429861","url":null,"abstract":"With the rapid development of Information Technology (IT) in recent past, number of unsolved real-world complex problems benefited immensely since solutions could be found within considerable time period. This is mainly due to the computational intelligence techniques which can deliver a reasonably good result within a shorter time period by performing complex calculations with numbers of iterations. Distribution operation is a common problem in the area of supply chain management which got the attention for many years. However, up to now only simplified versions of distribution operations such as Vehicle Routing Problem (VRP), Travelling Salesman Problem (TSP) have being considered by many researches. Some of the researchers adopted with heuristic approaches such as Simulated Annealing (SA), Genetic Algorithm (GA), Tabu Search (TS) and etc. with number of assumptions. However, the standard problems are far away from the real world problem. Furthermore, when the problem size (or scale) increases, the computational time to finds the optimal results increase exponentially, hence these problems are categorized as +P-hard problems in mathematical terms. To bridge the gap between standard problems in distribution and the real world problems, in this research, the standard VRP problem is extended to multi depot environment with split delivery option and tries to investigate the applicability of Simulated Annealing (SA) and Tabu Search (TS) to find solutions to this complex problem within considerable time frame. +umbers of simulation studies are carried out with both of these techniques and results revealed that both these techniques can be adapted to complex Multi Depot Vehicle Routing Problem with Time Windows and Split Delivery (MDVRPTWSD) problem and TS out performances in solution quality.","PeriodicalId":117199,"journal":{"name":"2009 International Conference on Industrial and Information Systems (ICIIS)","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129611854","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Second order difference based detection and directional weighted median filter for removal of random valued impulsive noise 基于二阶差分检测和方向加权中值滤波去除随机值脉冲噪声
Pub Date : 2009-12-01 DOI: 10.1109/ICIINFS.2009.5429836
P. K. Sa, Ratnakar Dash, B. Majhi
The proposed approach of removal of random valued impulsive noise from images works in two phases. The first phase detects contaminated pixels and the second phase filters only those pixels keeping others intact. The detection scheme utilizes second order difference of pixels in a test window and the filtering scheme is a variation median filter based on the edge information. The proposed scheme is simulated extensively on standard images and comparison with existing schemes reveal that our scheme outperforms them in terms of Peak Signal to Noise Ratio (PSNR), number of false detection and miss detection. The proposed scheme is also good at preserving finer details. Further, the computational complexity and number of iterations needed by the proposed scheme is less than the existing counterparts.
所提出的去除图像中随机值脉冲噪声的方法分两个阶段进行。第一阶段检测被污染的像素,第二阶段只过滤那些保持其他像素完整的像素。检测方案利用测试窗口中像素的二阶差分,滤波方案是基于边缘信息的变差中值滤波。在标准图像上进行了广泛的仿真,并与现有方案进行了比较,结果表明我们的方案在峰值信噪比(PSNR)、误检次数和漏检次数方面都优于现有方案。拟议的方案还善于保留更精细的细节。此外,该方案的计算复杂度和迭代次数均低于现有方案。
{"title":"Second order difference based detection and directional weighted median filter for removal of random valued impulsive noise","authors":"P. K. Sa, Ratnakar Dash, B. Majhi","doi":"10.1109/ICIINFS.2009.5429836","DOIUrl":"https://doi.org/10.1109/ICIINFS.2009.5429836","url":null,"abstract":"The proposed approach of removal of random valued impulsive noise from images works in two phases. The first phase detects contaminated pixels and the second phase filters only those pixels keeping others intact. The detection scheme utilizes second order difference of pixels in a test window and the filtering scheme is a variation median filter based on the edge information. The proposed scheme is simulated extensively on standard images and comparison with existing schemes reveal that our scheme outperforms them in terms of Peak Signal to Noise Ratio (PSNR), number of false detection and miss detection. The proposed scheme is also good at preserving finer details. Further, the computational complexity and number of iterations needed by the proposed scheme is less than the existing counterparts.","PeriodicalId":117199,"journal":{"name":"2009 International Conference on Industrial and Information Systems (ICIIS)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128442653","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 33
A framework for block based image authentication (FBIA) 基于块的图像认证框架(FBIA)
Pub Date : 2009-12-01 DOI: 10.1109/ICIINFS.2009.5429840
N. Ghoshal, J. K. Mandal, A. Khamrui
This study deals with devising and implementing a novel technique for image authentication and secured message transmission based on hiding large volume of data into gray scale images. Image authentication is done by embedding message / image in spatial domain by choosing image blocks of size 3 × 3 from the source image in row major order. Three bits of authenticating message /image/message-digest are fabricated within each source image byte of each image block where the position is chosen randomly using a hash function b7b6b5 ⨁k where b7, b6, b5 are higher order three bits of each source image byte and k is an integer number varies from 0 to 7, and the process is repeated for the whole image. The dimension of authenticating image followed by message digest (MD) and the content of authenticating message/image are also embedded. To enhance the security a layer has also been fabricated by XOR operation of the embedded image with a self generated MD obtained from the source image. Reverse process is applied for decoding. The results have been tested through histogram analysis, noise analysis and standard deviation computation of the source image with the embedded image and compared with popular existing steganographic algorithms like S-Tools. It is seen that the proposed FBIA is capable to embed more information than S-Tools with better fidelity.
本研究设计并实现了一种基于将大量数据隐藏在灰度图像中的图像认证和安全消息传输新技术。图像认证是通过从源图像中按行主序选择大小为3 × 3的图像块,在空间域中嵌入消息/图像来实现的。在每个图像块的每个源图像字节中生成三个验证消息/图像/消息摘要,其中使用散列函数b7b6b5 k随机选择位置,其中b7, b6, b5是每个源图像字节的高阶三位,k是一个从0到7不等的整数,并且对整个图像重复该过程。同时还嵌入了身份验证图像的维度和消息摘要(MD),以及身份验证消息/图像的内容。为了提高安全性,还利用从源图像中获得的自生成MD对嵌入图像进行异或运算,从而构建了一层。译码采用反向处理。通过源图像与嵌入图像的直方图分析、噪声分析和标准差计算对结果进行了检验,并与现有流行的S-Tools等隐写算法进行了比较。结果表明,所提出的FBIA比S-Tools能够嵌入更多的信息,而且保真度更高。
{"title":"A framework for block based image authentication (FBIA)","authors":"N. Ghoshal, J. K. Mandal, A. Khamrui","doi":"10.1109/ICIINFS.2009.5429840","DOIUrl":"https://doi.org/10.1109/ICIINFS.2009.5429840","url":null,"abstract":"This study deals with devising and implementing a novel technique for image authentication and secured message transmission based on hiding large volume of data into gray scale images. Image authentication is done by embedding message / image in spatial domain by choosing image blocks of size 3 × 3 from the source image in row major order. Three bits of authenticating message /image/message-digest are fabricated within each source image byte of each image block where the position is chosen randomly using a hash function b7b6b5 ⨁k where b7, b6, b5 are higher order three bits of each source image byte and k is an integer number varies from 0 to 7, and the process is repeated for the whole image. The dimension of authenticating image followed by message digest (MD) and the content of authenticating message/image are also embedded. To enhance the security a layer has also been fabricated by XOR operation of the embedded image with a self generated MD obtained from the source image. Reverse process is applied for decoding. The results have been tested through histogram analysis, noise analysis and standard deviation computation of the source image with the embedded image and compared with popular existing steganographic algorithms like S-Tools. It is seen that the proposed FBIA is capable to embed more information than S-Tools with better fidelity.","PeriodicalId":117199,"journal":{"name":"2009 International Conference on Industrial and Information Systems (ICIIS)","volume":"05 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128693215","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Design of a fully fledged uav test-bed with internal and external pilot 具有内部和外部飞行员的完全成熟的无人机试验台的设计
Pub Date : 2009-12-01 DOI: 10.1109/ICIINFS.2009.5429795
W. Tennakoon, S. R. Munasinghe
This paper presents a real time non linear automatic UAV simulation test-bed and autonomous control implementation with way point navigation. This UAV simulator is an integrated product that combines a vehicle operator station with a synthetic environment to support UAV research, training and operations while providing the operators (Internal Pilot) with a consistent interface. the simulated air vehicle operates against simulated terrain, weather, and computer generated forces In the synthetic mission space. External pilot also interact into synthetic simulation test-bed. The autonomous control system is based on the Aerosonde UAV and major considerations of controller performance and minimum instability within manual and autonomous switching have been evaluated with full software simulation. Major requirements for the good control system are minimum overshoot, minimum setting time without undesirable oscillation and low cross coupling between high level commands. A MATLAB simulink standard configuration environment and the Aerosim Aeronautical Simulation Block Set are utilized for simulation studies, presented through a flightgear interface and Custom GUI. The AeroSim® simulation environment features a complete detailed 6 degrees-of-freedom nonlinear generic UAV model which consist earth, atmospheric, aerodynamics, inertia and equation of motion sub models.
提出了一种具有航路点导航的无人机实时非线性自动仿真试验台及其自主控制实现方案。该无人机模拟器是一种集成产品,将车辆操作员站与合成环境相结合,以支持无人机研究,培训和操作,同时为操作员(内部飞行员)提供一致的接口。模拟飞行器在合成任务空间中对抗模拟地形、天气和计算机生成的力量。外部导频也与综合仿真试验台相互作用。自主控制系统基于Aerosonde无人机,并通过全软件仿真评估了控制器性能和手动和自主切换时最小不稳定性的主要考虑因素。良好的控制系统的主要要求是最小的超调量,最小的设定时间没有不良的振荡和低交叉耦合的高层命令。利用MATLAB simulink标准组态环境和Aerosim航空仿真块集进行仿真研究,并通过飞行齿轮界面和自定义GUI进行了展示。AeroSim®仿真环境具有完整详细的6自由度非线性通用无人机模型,包括地球,大气,空气动力学,惯性和运动方程子模型。
{"title":"Design of a fully fledged uav test-bed with internal and external pilot","authors":"W. Tennakoon, S. R. Munasinghe","doi":"10.1109/ICIINFS.2009.5429795","DOIUrl":"https://doi.org/10.1109/ICIINFS.2009.5429795","url":null,"abstract":"This paper presents a real time non linear automatic UAV simulation test-bed and autonomous control implementation with way point navigation. This UAV simulator is an integrated product that combines a vehicle operator station with a synthetic environment to support UAV research, training and operations while providing the operators (Internal Pilot) with a consistent interface. the simulated air vehicle operates against simulated terrain, weather, and computer generated forces In the synthetic mission space. External pilot also interact into synthetic simulation test-bed. The autonomous control system is based on the Aerosonde UAV and major considerations of controller performance and minimum instability within manual and autonomous switching have been evaluated with full software simulation. Major requirements for the good control system are minimum overshoot, minimum setting time without undesirable oscillation and low cross coupling between high level commands. A MATLAB simulink standard configuration environment and the Aerosim Aeronautical Simulation Block Set are utilized for simulation studies, presented through a flightgear interface and Custom GUI. The AeroSim® simulation environment features a complete detailed 6 degrees-of-freedom nonlinear generic UAV model which consist earth, atmospheric, aerodynamics, inertia and equation of motion sub models.","PeriodicalId":117199,"journal":{"name":"2009 International Conference on Industrial and Information Systems (ICIIS)","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128793580","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Transcoding based optimum quality video streaming under limited bandwidth 有限带宽下基于转码的高质量视频流
Pub Date : 2009-12-01 DOI: 10.1109/ICIINFS.2009.5429889
Michael Medagama, D. Dias, S. Fernando
Bandwidth scarcity is a common problem faced in multimedia transmission over broadband wireless networks. From a consumer's perspective, the effectiveness of multimedia delivery suffers significantly in such networks. Further, in a mobile environment, when the number of users increases, they experience interruptions in the received multimedia streams. Adaptive streaming is one solution that can be adopted in any network environment regardless of the nature of the network. Adaptive streaming can be achieved using transcoding techniques. Transcoding is a mechanism that converts a video to a form that has less information so that the resulting data volume is appropriate for streaming over a low bandwidth network. However, the quality of the video stream drops due to transcoding. The advantage is that when there is a large number of users sharing the network, users could watch a video at a lower quality with no interruption if the transcoding is applied before the video is streamed to the end user. i.e., a compromise can be made between the video quality and network delay. The main focus of this research is to analyze the variation of transcoding parameters with respect to bandwidth, in order to achieve an adaptive streaming solution of optimum achievable quality in a low bandwidth broadband network.
带宽不足是宽带无线网络多媒体传输中普遍存在的问题。从消费者的角度来看,在这样的网络中,多媒体传输的有效性受到严重影响。此外,在移动环境中,当用户数量增加时,他们在接收的多媒体流中会遇到中断。自适应流是一种可以在任何网络环境中采用的解决方案,无论网络的性质如何。自适应流可以使用转码技术来实现。转码是一种将视频转换为具有较少信息的形式的机制,以便生成的数据量适合在低带宽网络上流式传输。然而,由于转码,视频流的质量下降。优点是,当有大量用户共享网络时,如果在视频流到最终用户之前应用转码,用户可以以较低的质量观看视频,而不会中断。也就是说,可以在视频质量和网络延迟之间做出妥协。本研究的主要重点是分析转码参数随带宽的变化,以便在低带宽宽带网络中实现最佳可实现质量的自适应流解决方案。
{"title":"Transcoding based optimum quality video streaming under limited bandwidth","authors":"Michael Medagama, D. Dias, S. Fernando","doi":"10.1109/ICIINFS.2009.5429889","DOIUrl":"https://doi.org/10.1109/ICIINFS.2009.5429889","url":null,"abstract":"Bandwidth scarcity is a common problem faced in multimedia transmission over broadband wireless networks. From a consumer's perspective, the effectiveness of multimedia delivery suffers significantly in such networks. Further, in a mobile environment, when the number of users increases, they experience interruptions in the received multimedia streams. Adaptive streaming is one solution that can be adopted in any network environment regardless of the nature of the network. Adaptive streaming can be achieved using transcoding techniques. Transcoding is a mechanism that converts a video to a form that has less information so that the resulting data volume is appropriate for streaming over a low bandwidth network. However, the quality of the video stream drops due to transcoding. The advantage is that when there is a large number of users sharing the network, users could watch a video at a lower quality with no interruption if the transcoding is applied before the video is streamed to the end user. i.e., a compromise can be made between the video quality and network delay. The main focus of this research is to analyze the variation of transcoding parameters with respect to bandwidth, in order to achieve an adaptive streaming solution of optimum achievable quality in a low bandwidth broadband network.","PeriodicalId":117199,"journal":{"name":"2009 International Conference on Industrial and Information Systems (ICIIS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128657821","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A random block length based cryptosystem through multiple cascaded permutation-combinations and chaining of blocks 一个基于随机块长度的密码系统,通过多个级联排列组合和块链
Pub Date : 2009-12-01 DOI: 10.1109/ICIINFS.2009.5429895
Jayanta Pal, J. K. Mandal
In this paper a four stage character/bit level encoding technique (RBCMCPCC) has been proposed, where the first three steps take input block of length 128 bit, 192bit and 256 bit, respectively, and generate intermediate blocks of the same lengths using identical lengths of keys in each step. The fourth stage generates final cipher blocks based on random session-keys. Before execution of the fourth sage, all 256 bit blocks are passed through the chaining process to ensure the generation of non-identical intermediate stream. A two dimensional matrix based substitution and folding operation is performed in the first stage of encryption, whereas a three dimensional matrix based permutation and substitution operation is done in the next sage. Again, a four dimensional matrix oriented substitution and transposition operation is applied in the third stage. Finally, wrapping operation is done to produce the cipher text. To expound the effectiveness of the algorithm, the obtained results are compared with BAM, TDES, CTSCCT and RSA algorithms.
本文提出了一种四阶段字符/位级编码技术(RBCMCPCC),其中前三步分别取长度为128位、192位和256位的输入块,并在每步中使用相同长度的密钥生成相同长度的中间块。第四阶段根据随机会话密钥生成最终的密码块。在执行第四步之前,所有256位块都经过链化过程,以确保生成不相同的中间流。在加密的第一阶段进行基于二维矩阵的替换和折叠操作,而在第二阶段进行基于三维矩阵的排列和替换操作。同样,在第三阶段应用了面向四维矩阵的替换和转置操作。最后,进行封装操作生成密文。为了说明该算法的有效性,将得到的结果与BAM、TDES、CTSCCT和RSA算法进行了比较。
{"title":"A random block length based cryptosystem through multiple cascaded permutation-combinations and chaining of blocks","authors":"Jayanta Pal, J. K. Mandal","doi":"10.1109/ICIINFS.2009.5429895","DOIUrl":"https://doi.org/10.1109/ICIINFS.2009.5429895","url":null,"abstract":"In this paper a four stage character/bit level encoding technique (RBCMCPCC) has been proposed, where the first three steps take input block of length 128 bit, 192bit and 256 bit, respectively, and generate intermediate blocks of the same lengths using identical lengths of keys in each step. The fourth stage generates final cipher blocks based on random session-keys. Before execution of the fourth sage, all 256 bit blocks are passed through the chaining process to ensure the generation of non-identical intermediate stream. A two dimensional matrix based substitution and folding operation is performed in the first stage of encryption, whereas a three dimensional matrix based permutation and substitution operation is done in the next sage. Again, a four dimensional matrix oriented substitution and transposition operation is applied in the third stage. Finally, wrapping operation is done to produce the cipher text. To expound the effectiveness of the algorithm, the obtained results are compared with BAM, TDES, CTSCCT and RSA algorithms.","PeriodicalId":117199,"journal":{"name":"2009 International Conference on Industrial and Information Systems (ICIIS)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124591763","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
User friendly line CAPTCHAs 用户友好的行验证码
Pub Date : 2009-12-01 DOI: 10.1109/ICIINFS.2009.5429864
A. K. B. Karunathilake, B. Balasuriya, R. Ragel
CAPTCHAs or reverse Turing tests are real-time assessments used by programs (or computers) to tell humans and machines apart. This is achieved by assigning and assessing hard AI problems that could only be solved easily by human but not by machines. Applications of such assessments range from stopping spammers from automatically filling online forms to preventing hackers from performing dictionary attack. Today, the race between makers and breakers of CAPTCHAs is at a juncture, where the CAPTCHAs proposed are not even answerable by humans. We consider such CAPTCHAs as non user friendly. In this paper, we propose a novel technique for reverse Turing test - we call it the Line CAPTCHAs - that mainly focuses on user friendliness while not compromising the security aspect that is expected to be provided by such a system.
验证码或反向图灵测试是程序(或计算机)用来区分人和机器的实时评估。这是通过分配和评估人工智能难题来实现的,这些难题只能由人类轻松解决,而机器却无法解决。这种评估的应用范围从阻止垃圾邮件发送者自动填写在线表格到防止黑客进行字典攻击。今天,captcha的创造者和破坏者之间的竞争正处于一个关键时刻,所提出的captcha甚至无法由人类回答。我们认为这样的验证码对用户不友好。在本文中,我们提出了一种用于反向图灵测试的新技术-我们称之为行captcha -主要侧重于用户友好性,同时不损害这种系统所期望提供的安全方面。
{"title":"User friendly line CAPTCHAs","authors":"A. K. B. Karunathilake, B. Balasuriya, R. Ragel","doi":"10.1109/ICIINFS.2009.5429864","DOIUrl":"https://doi.org/10.1109/ICIINFS.2009.5429864","url":null,"abstract":"CAPTCHAs or reverse Turing tests are real-time assessments used by programs (or computers) to tell humans and machines apart. This is achieved by assigning and assessing hard AI problems that could only be solved easily by human but not by machines. Applications of such assessments range from stopping spammers from automatically filling online forms to preventing hackers from performing dictionary attack. Today, the race between makers and breakers of CAPTCHAs is at a juncture, where the CAPTCHAs proposed are not even answerable by humans. We consider such CAPTCHAs as non user friendly. In this paper, we propose a novel technique for reverse Turing test - we call it the Line CAPTCHAs - that mainly focuses on user friendliness while not compromising the security aspect that is expected to be provided by such a system.","PeriodicalId":117199,"journal":{"name":"2009 International Conference on Industrial and Information Systems (ICIIS)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123513708","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
期刊
2009 International Conference on Industrial and Information Systems (ICIIS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1