首页 > 最新文献

2012 15th International Conference on Computer and Information Technology (ICCIT)最新文献

英文 中文
Adaptation of spray phase to improve the binary spray and Wait routing in Delay Tolerant Networks 自适应喷雾阶段改进延迟容忍网络中的二进制喷雾和等待路由
Pub Date : 2012-12-01 DOI: 10.1109/ICCITECHN.2012.6509723
S. Iqbal, A. K. Chowdhury
Delivering messages in Delay Tolerant Networks is a nontrivial challenge due to its sparse nature and intermittent connectivity. Therefore efficient routing of messages is vital for these networks. In this work, we aim to adapt the spray phase of the Binary Spray and Wait routing scheme in Delay Tolerant Networks to avoid large communication overhead suffered by the scheme. We define an adaptive spraying scheme to allow nodes to switch to the wait phase without lingering the spray phase unnecessarily. Binary Spray and Wait routing permits nodes to enter the wait phase when the remaining number of copies of a message reaches one. However, we permit nodes to consider the time to live value of a message instead of the number of copies to enter the wait phase. We formulate an equation to obtain a switch value to compare against the time to live value of a message to migrate to the wait phase. Furthermore, we compare our scheme with that of other schemes through simulations. Simulation results show that our proposed adaptive spraying scheme performs better than that of others in different network scenarios.
由于延迟容忍网络的稀疏特性和间歇性连接,在延迟容忍网络中传递消息是一项非同小可的挑战。因此,有效的消息路由对这些网络至关重要。在这项工作中,我们的目标是适应延迟容忍网络中二进制喷雾和等待路由方案的喷雾阶段,以避免该方案所带来的巨大通信开销。我们定义了一种自适应喷涂方案,允许节点切换到等待阶段,而不会不必要地拖延喷涂阶段。二进制喷雾和等待路由允许节点在消息的剩余副本数量达到1时进入等待阶段。但是,我们允许节点考虑消息的存活时间,而不是进入等待阶段的副本数量。我们制定了一个公式来获得一个开关值,以便与消息迁移到等待阶段的活动值的时间进行比较。并通过仿真与其他方案进行了比较。仿真结果表明,本文提出的自适应喷涂方案在不同网络场景下的性能优于其他方案。
{"title":"Adaptation of spray phase to improve the binary spray and Wait routing in Delay Tolerant Networks","authors":"S. Iqbal, A. K. Chowdhury","doi":"10.1109/ICCITECHN.2012.6509723","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2012.6509723","url":null,"abstract":"Delivering messages in Delay Tolerant Networks is a nontrivial challenge due to its sparse nature and intermittent connectivity. Therefore efficient routing of messages is vital for these networks. In this work, we aim to adapt the spray phase of the Binary Spray and Wait routing scheme in Delay Tolerant Networks to avoid large communication overhead suffered by the scheme. We define an adaptive spraying scheme to allow nodes to switch to the wait phase without lingering the spray phase unnecessarily. Binary Spray and Wait routing permits nodes to enter the wait phase when the remaining number of copies of a message reaches one. However, we permit nodes to consider the time to live value of a message instead of the number of copies to enter the wait phase. We formulate an equation to obtain a switch value to compare against the time to live value of a message to migrate to the wait phase. Furthermore, we compare our scheme with that of other schemes through simulations. Simulation results show that our proposed adaptive spraying scheme performs better than that of others in different network scenarios.","PeriodicalId":127060,"journal":{"name":"2012 15th International Conference on Computer and Information Technology (ICCIT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125005310","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
A digital video watermarking technique based on identical frame extraction in 3-Level DWT 基于同帧提取的三级小波变换数字视频水印技术
Pub Date : 2012-12-01 DOI: 10.1109/ICCITECHN.2012.6509780
Tamanna Tabassum, S. Islam
Digital video watermarking was introduced at the end of the last century to provide means of enforcing video copyright protection. Video watermarking involves embedding a secret information in the video. In this paper, we proposed a digital video watermarking technique based on identical frame extraction in 3-Level Discrete Wavelet Transform (DWT). In the proposed method, first the host video is divided into video shots. Then from each video shot one video frame called identical frame is selected for watermark embedding. Each identical frame is decomposed into 3-level DWT, then select the higher subband coefficients to embed the watermark and the watermark are adaptively embedded to these coefficients and thus guarantee the perceptual invisibility of the watermark. For watermark detection, the correlation between the watermark signal and the watermarked video is compared with a threshold value obtained from embedded watermark signal. The experimental results demonstrate that the watermarking method has strong robustness against some common attacks such as cropping, Gaussian noise adding, Salt & pepper noise adding, frame dropping and frame adding.
数字视频水印是在上世纪末引入的,它提供了一种加强视频版权保护的手段。视频水印是指在视频中嵌入一个秘密信息。本文提出了一种基于三阶离散小波变换(DWT)中同帧提取的数字视频水印技术。在本文提出的方法中,首先将主机视频分割成多个视频片段。然后从每个视频中选取一帧称为同帧的视频帧进行水印嵌入。将每一帧相同的图像分解为3级小波变换,选择较高的子带系数嵌入水印,水印自适应嵌入到这些系数中,从而保证了水印的感知不可见性。对于水印检测,将水印信号与水印视频之间的相关性与嵌入的水印信号获得的阈值进行比较。实验结果表明,该水印方法对裁剪、高斯噪声添加、椒盐噪声添加、丢帧和加帧等常见攻击具有较强的鲁棒性。
{"title":"A digital video watermarking technique based on identical frame extraction in 3-Level DWT","authors":"Tamanna Tabassum, S. Islam","doi":"10.1109/ICCITECHN.2012.6509780","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2012.6509780","url":null,"abstract":"Digital video watermarking was introduced at the end of the last century to provide means of enforcing video copyright protection. Video watermarking involves embedding a secret information in the video. In this paper, we proposed a digital video watermarking technique based on identical frame extraction in 3-Level Discrete Wavelet Transform (DWT). In the proposed method, first the host video is divided into video shots. Then from each video shot one video frame called identical frame is selected for watermark embedding. Each identical frame is decomposed into 3-level DWT, then select the higher subband coefficients to embed the watermark and the watermark are adaptively embedded to these coefficients and thus guarantee the perceptual invisibility of the watermark. For watermark detection, the correlation between the watermark signal and the watermarked video is compared with a threshold value obtained from embedded watermark signal. The experimental results demonstrate that the watermarking method has strong robustness against some common attacks such as cropping, Gaussian noise adding, Salt & pepper noise adding, frame dropping and frame adding.","PeriodicalId":127060,"journal":{"name":"2012 15th International Conference on Computer and Information Technology (ICCIT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116425058","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 67
Development of a device for remote monitoring of heart rate and body temperature 研制一种远程监测心率和体温的装置
Pub Date : 2012-12-01 DOI: 10.1109/ICCITechn.2012.6509783
M. A. Rahman, Atanu Barai, Md. Asadul Islam, M. Hashem
We present a new integrated, portable device to provide a convenient solution for remote monitoring heart rate at the fingertip and body temperature using Ethernet technology and widely spreading internet. Now a day, heart related disease is rising. Most of the times in these cases, patients may not realize their actual conditions and even it is a common fact that there are no doctors by their side, especially in rural areas, but now a day's most of the diseases are curable if detected in time. We have tried to make a system which may give information about one's physical condition and help him/her to detect these deadly but curable diseases. The system gives information of heart rate and body temperature simultaneously acquired on the portable side in realtime and transmits results to web. In this system, the condition of heart and body temperature can be monitored from remote places. Eventually, this device provides a low-cost, easily accessible human health monitor solution bridging the gaps between patients and doctors.
我们提出了一种新的集成便携式设备,为利用以太网技术和广泛传播的互联网远程监测指尖心率和体温提供了方便的解决方案。如今,与心脏相关的疾病正在上升。在这些情况下,大多数时候,患者可能没有意识到自己的实际情况,甚至没有医生在身边是一个普遍的事实,特别是在农村地区,但现在一天中的大多数疾病如果及时发现是可以治愈的。我们试图建立一个系统,它可以提供关于一个人的身体状况的信息,并帮助他/她发现这些致命但可治愈的疾病。该系统实时给出在便携端同时采集的心率和体温信息,并将结果传输到网络上。在这个系统中,可以远程监测心脏和体温的状况。最终,该设备提供了一种低成本、易于使用的人体健康监测解决方案,弥合了患者和医生之间的差距。
{"title":"Development of a device for remote monitoring of heart rate and body temperature","authors":"M. A. Rahman, Atanu Barai, Md. Asadul Islam, M. Hashem","doi":"10.1109/ICCITechn.2012.6509783","DOIUrl":"https://doi.org/10.1109/ICCITechn.2012.6509783","url":null,"abstract":"We present a new integrated, portable device to provide a convenient solution for remote monitoring heart rate at the fingertip and body temperature using Ethernet technology and widely spreading internet. Now a day, heart related disease is rising. Most of the times in these cases, patients may not realize their actual conditions and even it is a common fact that there are no doctors by their side, especially in rural areas, but now a day's most of the diseases are curable if detected in time. We have tried to make a system which may give information about one's physical condition and help him/her to detect these deadly but curable diseases. The system gives information of heart rate and body temperature simultaneously acquired on the portable side in realtime and transmits results to web. In this system, the condition of heart and body temperature can be monitored from remote places. Eventually, this device provides a low-cost, easily accessible human health monitor solution bridging the gaps between patients and doctors.","PeriodicalId":127060,"journal":{"name":"2012 15th International Conference on Computer and Information Technology (ICCIT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122817247","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
An approach to real-time portable device for face recognition system 一种用于人脸识别系统的实时便携式设备
Pub Date : 2012-12-01 DOI: 10.1109/ICCITECHN.2012.6509715
A. Mehrab, P. Debnath, G. M. Mashrur-E-Elahi
Face is the most visible organ of human which can be used to differentiate one person from another. Embedded face recognition is quite a challenging era of biometric which can be used in different applications. There are currently commercially available systems for face recognition, but they are bulky, expensive, and proprietary. In this paper we will discuss about a real-time, portable, low cost face recognition system, developed by us, we named it as RPIPD-v1 (Real Time Portable Image Processing Device Version 1) which can work as a standalone system. This system can detect and recognize human faces and there is no such portable device that is capable of having this feature together. Our main aim was to glue these two tasks (Face Detection & Face Recognition) and build a system with the hardware and software to demonstrate the performance. The accuracy of our device is about 60% in distinguishing known and unknown faces. This is a general output of our device for critical situations. For the best performance of recognizing a face we need to highlight the individuals face with proper lighting and the individual's face must be in front of the camera properly. This device is made totally portable and standalone. Small size and low power enables this device to be placed in unique environments, collecting images autonomously for face recognition and other image processing applications. Low cost is another advantage which will allow this device to be used in various places as an effective solution.
脸是人类最明显的器官,可以用来区分一个人和另一个人。嵌入式人脸识别是一个具有挑战性的生物识别技术,可用于不同的应用领域。目前市面上有人脸识别系统,但它们体积庞大,价格昂贵,而且是专有的。在本文中,我们将讨论一个实时、便携、低成本的人脸识别系统,我们将其命名为RPIPD-v1 (Real Time portable Image Processing Device Version 1),它可以作为一个独立的系统工作。该系统可以检测和识别人脸,目前还没有这样的便携式设备能够同时具备这一功能。我们的主要目的是粘合这两个任务(人脸检测和人脸识别),并构建一个系统,用硬件和软件来演示性能。我们的设备在区分已知和未知面孔方面的准确率约为60%。这是我们的设备在紧急情况下的一般输出。为了最好地识别人脸,我们需要用适当的照明突出个人的脸,并且个人的脸必须正确地在相机前面。这个设备是完全便携和独立的。小尺寸和低功耗使该设备能够放置在独特的环境中,自动收集图像,用于面部识别和其他图像处理应用。低成本是另一个优势,这将使该设备作为一种有效的解决方案在各种地方使用。
{"title":"An approach to real-time portable device for face recognition system","authors":"A. Mehrab, P. Debnath, G. M. Mashrur-E-Elahi","doi":"10.1109/ICCITECHN.2012.6509715","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2012.6509715","url":null,"abstract":"Face is the most visible organ of human which can be used to differentiate one person from another. Embedded face recognition is quite a challenging era of biometric which can be used in different applications. There are currently commercially available systems for face recognition, but they are bulky, expensive, and proprietary. In this paper we will discuss about a real-time, portable, low cost face recognition system, developed by us, we named it as RPIPD-v1 (Real Time Portable Image Processing Device Version 1) which can work as a standalone system. This system can detect and recognize human faces and there is no such portable device that is capable of having this feature together. Our main aim was to glue these two tasks (Face Detection & Face Recognition) and build a system with the hardware and software to demonstrate the performance. The accuracy of our device is about 60% in distinguishing known and unknown faces. This is a general output of our device for critical situations. For the best performance of recognizing a face we need to highlight the individuals face with proper lighting and the individual's face must be in front of the camera properly. This device is made totally portable and standalone. Small size and low power enables this device to be placed in unique environments, collecting images autonomously for face recognition and other image processing applications. Low cost is another advantage which will allow this device to be used in various places as an effective solution.","PeriodicalId":127060,"journal":{"name":"2012 15th International Conference on Computer and Information Technology (ICCIT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129780641","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
High performance decision based median filter for salt and pepper noise removal in images 基于决策的中值滤波去除图像中的椒盐噪声
Pub Date : 2012-12-01 DOI: 10.1109/ICCITECHN.2012.6509707
G. M. Daiyan, M. Mottalib, Muhammad Mizanur Rahman
A high performance decision based median filter is proposed for removal of salt and pepper in images. It is an enhanced Adaptive Switching Median filter which initially detects noise pixels iteratively through several phases and replaces the noisy pixels with median value. It calculates median value without considering noisy pixels to improve the performance of median filter for high density noise. Detection of noise is done by expanding the mask until 7×7 to maintain local information extraction. Moreover, the processing pixel is replaced by last processed pixel if the algorithm fails to detect noise free pixel at 7×7. If the noise free median value is not available at 7×7 processing window, the last processed pixel take into consideration if it is noise free. If the last processed pixel is noisy, the algorithm select a window size with 15×15 dimension and calculate the number of 0's and 255's in the processing window. Then replace the processing pixel with 0 or 255 which is more in number in the selected window. Experiment result shows that it can provide very high quality restored images for images that are contaminated by “salt & pepper” noise, especially when the noise density is large.
提出了一种高性能的基于决策的中值滤波器,用于去除图像中的椒盐。它是一种增强的自适应开关中值滤波器,通过几个阶段迭代检测噪声像素,并用中值替换噪声像素。在不考虑噪声像素的情况下计算中值,提高了中值滤波器处理高密度噪声的性能。噪声的检测是通过扩展掩码直到7×7来保持局部信息的提取。此外,如果算法无法检测到7×7处的无噪声像素,则将处理像素替换为最后处理像素。如果在7×7处理窗口中无噪声中值不可用,则考虑最后处理的像素是否无噪声。如果最后处理的像素有噪声,算法选择一个尺寸为15×15的窗口,计算处理窗口中0和255的个数。然后将所选窗口中数量较多的处理像素替换为0或255。实验结果表明,对于受“椒盐”噪声污染的图像,特别是在噪声密度较大的情况下,该方法可以提供非常高质量的恢复图像。
{"title":"High performance decision based median filter for salt and pepper noise removal in images","authors":"G. M. Daiyan, M. Mottalib, Muhammad Mizanur Rahman","doi":"10.1109/ICCITECHN.2012.6509707","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2012.6509707","url":null,"abstract":"A high performance decision based median filter is proposed for removal of salt and pepper in images. It is an enhanced Adaptive Switching Median filter which initially detects noise pixels iteratively through several phases and replaces the noisy pixels with median value. It calculates median value without considering noisy pixels to improve the performance of median filter for high density noise. Detection of noise is done by expanding the mask until 7×7 to maintain local information extraction. Moreover, the processing pixel is replaced by last processed pixel if the algorithm fails to detect noise free pixel at 7×7. If the noise free median value is not available at 7×7 processing window, the last processed pixel take into consideration if it is noise free. If the last processed pixel is noisy, the algorithm select a window size with 15×15 dimension and calculate the number of 0's and 255's in the processing window. Then replace the processing pixel with 0 or 255 which is more in number in the selected window. Experiment result shows that it can provide very high quality restored images for images that are contaminated by “salt & pepper” noise, especially when the noise density is large.","PeriodicalId":127060,"journal":{"name":"2012 15th International Conference on Computer and Information Technology (ICCIT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128805187","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Group Search Optimization to solve Traveling Salesman Problem 群搜索优化解决旅行商问题
Pub Date : 2012-12-01 DOI: 10.1109/ICCITECHN.2012.6509797
M. Akhand, A. B. M. Junaed, Md. Forhad Hossain, K. Murase
The goal of Traveling Salesman Problem (TSP) is to find the shortest circular tour visiting every city exactly once. TSP has many real world applications and a number of methods have been investigated to solve TSP. Recently, nature inspired algorithms are also attracted to solve it. Here we studied Group Search Optimizer(GSO), the recently proposed nature inspired algorithm, to solve TSP. GSO is a population based optimization technique on the metaphor of producer-scrounger based social behavior of animals where producer searches for finding foods and scrounger searches for joining opportunities. GSO has found as an efficient method for solving function optimization problems for which it modeled. In this study we employ the concept of Swap Operator (SO) and Swap Sequence (SS) to modify GSO for TSP. The modified GSO (mGSO) was tested on a number of benchmark TSPs and results compared with some existing approaches. mGSO has shown best results (best tour cost) for some problems and competitive performance in other cases.
旅行推销员问题(TSP)的目标是找到在每个城市只访问一次的最短循环路线。TSP在现实世界中有许多应用,人们研究了许多方法来求解TSP。最近,自然启发的算法也被吸引来解决这个问题。本文研究了最近提出的自然启发算法群搜索优化器(GSO)来求解TSP问题。GSO是一种基于种群的优化技术,以生产者-拾荒者为基础的动物社会行为为隐喻,生产者寻找食物,拾荒者寻找加入机会。GSO已被证明是求解其所建模的函数优化问题的有效方法。在本研究中,我们采用交换算子(SO)和交换序列(SS)的概念来修正TSP的GSO。改进的GSO (mGSO)在多个基准tsp上进行了测试,并与一些现有方法的结果进行了比较。mGSO在一些问题上显示出最佳结果(最佳旅行成本),在其他情况下显示出具有竞争力的表现。
{"title":"Group Search Optimization to solve Traveling Salesman Problem","authors":"M. Akhand, A. B. M. Junaed, Md. Forhad Hossain, K. Murase","doi":"10.1109/ICCITECHN.2012.6509797","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2012.6509797","url":null,"abstract":"The goal of Traveling Salesman Problem (TSP) is to find the shortest circular tour visiting every city exactly once. TSP has many real world applications and a number of methods have been investigated to solve TSP. Recently, nature inspired algorithms are also attracted to solve it. Here we studied Group Search Optimizer(GSO), the recently proposed nature inspired algorithm, to solve TSP. GSO is a population based optimization technique on the metaphor of producer-scrounger based social behavior of animals where producer searches for finding foods and scrounger searches for joining opportunities. GSO has found as an efficient method for solving function optimization problems for which it modeled. In this study we employ the concept of Swap Operator (SO) and Swap Sequence (SS) to modify GSO for TSP. The modified GSO (mGSO) was tested on a number of benchmark TSPs and results compared with some existing approaches. mGSO has shown best results (best tour cost) for some problems and competitive performance in other cases.","PeriodicalId":127060,"journal":{"name":"2012 15th International Conference on Computer and Information Technology (ICCIT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126426493","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Crosstalk analysis in digital subscriber line by evaluating power spectral density function 基于功率谱密度函数的数字用户线路串扰分析
Pub Date : 2012-12-01 DOI: 10.1109/ICCITECHN.2012.6509746
M. Mahiuddin, Md. Atikur Rahman, Md. Monirul Islam, B. Roy
Digital Subscriber Line (DSL) combines the advantages of providing fast means of internet access with the usage of an existent infrastructure known as the plain old telephone service (POTS). Transmissions that use higher frequencies are more subject to attenuation and to crosstalk. Crosstalk is the undesired radiation of energy among wires. It is more likely to occur among/between similar frequencies and results in a received wave form that differs from the original wave form that was sent. In this article we analysis the crosstalk in various DSL systems by evaluating power spectral density function, i.e. functional principles of DSL and impairment caused by crosstalk. It is performed by the analysis of the results obtained from the Matlab program.
数字用户线路(DSL)结合了提供快速互联网访问方式的优点和使用现有的基础设施,即普通老式电话服务(POTS)。使用较高频率的传输更容易受到衰减和串扰的影响。串音是电线之间不受欢迎的能量辐射。它更有可能发生在相似的频率之间,并导致接收到的波形与发送的原始波形不同。本文通过计算功率谱密度函数,即DSL的功能原理和串扰造成的损害,分析了各种DSL系统中的串扰。通过分析Matlab程序得到的结果来实现。
{"title":"Crosstalk analysis in digital subscriber line by evaluating power spectral density function","authors":"M. Mahiuddin, Md. Atikur Rahman, Md. Monirul Islam, B. Roy","doi":"10.1109/ICCITECHN.2012.6509746","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2012.6509746","url":null,"abstract":"Digital Subscriber Line (DSL) combines the advantages of providing fast means of internet access with the usage of an existent infrastructure known as the plain old telephone service (POTS). Transmissions that use higher frequencies are more subject to attenuation and to crosstalk. Crosstalk is the undesired radiation of energy among wires. It is more likely to occur among/between similar frequencies and results in a received wave form that differs from the original wave form that was sent. In this article we analysis the crosstalk in various DSL systems by evaluating power spectral density function, i.e. functional principles of DSL and impairment caused by crosstalk. It is performed by the analysis of the results obtained from the Matlab program.","PeriodicalId":127060,"journal":{"name":"2012 15th International Conference on Computer and Information Technology (ICCIT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132004637","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A secure routing scheme in MANET with CRT based secret sharing 一种基于CRT的安全路由方案
Pub Date : 2012-12-01 DOI: 10.1109/ICCITECHN.2012.6509789
Ditipriya Sinha, R. Chaki, U. Bhattacharya
Sharing of secret values in MANET is inconsistent and computationally insecure due to its dynamic nature. Over the years, key generation, encryption and decryption have evolved as important techniques for providing secure routing in MANETs. Many researchers are involved in solving the secret sharing problem. Shamir's proposal is one of the eminent secret sharing schemes. However, this scheme does not include secure key generation. This paper proposes the use of the mathematical theory of Chinese remainder theorem coupled with the commonly used RSA for generating keys. Computational complexity of CRT is less than RSA modular exponentiation scheme. This helps to reduce the computational overhead. Once a secure key has been generated, it has been used for finding a secure route between source and destination. The final route is selected based on the highest weighted trust value of the routes. The three phased approach is aimed to increase the overall performance.
由于其动态特性,在MANET中秘密值的共享存在不一致性和计算不安全性。多年来,密钥生成、加密和解密已经发展成为在manet中提供安全路由的重要技术。许多研究人员都致力于解决秘密共享问题。Shamir的提议是著名的秘密共享方案之一。但是,该方案不包括安全密钥生成。本文提出了将中国剩余定理的数学理论与常用的RSA相结合来生成密钥。CRT的计算复杂度低于RSA模幂方案。这有助于减少计算开销。一旦生成了安全密钥,就可以使用它来查找源和目的地之间的安全路由。根据路由加权信任值的最大值选择最终路由。分三个阶段的方法旨在提高整体性能。
{"title":"A secure routing scheme in MANET with CRT based secret sharing","authors":"Ditipriya Sinha, R. Chaki, U. Bhattacharya","doi":"10.1109/ICCITECHN.2012.6509789","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2012.6509789","url":null,"abstract":"Sharing of secret values in MANET is inconsistent and computationally insecure due to its dynamic nature. Over the years, key generation, encryption and decryption have evolved as important techniques for providing secure routing in MANETs. Many researchers are involved in solving the secret sharing problem. Shamir's proposal is one of the eminent secret sharing schemes. However, this scheme does not include secure key generation. This paper proposes the use of the mathematical theory of Chinese remainder theorem coupled with the commonly used RSA for generating keys. Computational complexity of CRT is less than RSA modular exponentiation scheme. This helps to reduce the computational overhead. Once a secure key has been generated, it has been used for finding a secure route between source and destination. The final route is selected based on the highest weighted trust value of the routes. The three phased approach is aimed to increase the overall performance.","PeriodicalId":127060,"journal":{"name":"2012 15th International Conference on Computer and Information Technology (ICCIT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132617794","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A block based data hiding method in images using pixel value differencing and LSB substitution method 一种基于像素值差分和LSB替换的图像数据块隐藏方法
Pub Date : 2012-12-01 DOI: 10.1109/ICCITECHN.2012.6509770
Tasnuva Mahjabin, Syed Monowar Hossain, Md Shariful Haque
Information hiding is a historical but on demand fascinating research area. Now, in today's world, the availability of information has become so easy that the security and insecurity of information goes side by side. In order to provide security of information a science called, Steganography has emerged. Steganography conceals the existence of information into images to formulate a secure communication. In this paper, a Steganographic method based on Pixel Value Differencing (PVD) and LSB Substitution method is proposed. To meet the increasing demand for privacy and secrecy the method focused mainly on making it a robust, secured technique of information hiding. An efficient and dynamic embedding algorithm is proposed in this paper that not only hides the secret data with an imperceptible visual quality and increased capacity but also make secret code breaking a good annoyance for the attacker. This method also represents an extraction algorithm that effectively extracts the entire secret message without any loss of a single data. Finally, experimental results show that, the proposed method achieves an increased embedding capacity and lower image degradation with improved security as compared to LSB substitution method and some recent existing methods of data hiding.
信息隐藏是一个历史悠久但又备受关注的研究领域。现在,在当今世界,信息的可用性变得如此容易,以至于信息的安全性和不安全性并驾齐驱。为了保证信息的安全,一门叫做隐写术的科学应运而生。隐写术将存在的信息隐藏到图像中,以形成安全的通信。提出了一种基于像素值差分(PVD)和LSB替换法的隐写方法。为了满足日益增长的隐私和保密需求,该方法主要侧重于使其成为一种鲁棒的、安全的信息隐藏技术。本文提出了一种高效的动态嵌入算法,该算法不仅隐藏了隐密数据,而且具有难以察觉的视觉质量和增加的容量,而且使密码破解成为攻击者的烦恼。该方法还表示了一种提取算法,该算法可以有效地提取整个秘密消息,而不会丢失任何单个数据。最后,实验结果表明,与LSB替代方法和现有的一些数据隐藏方法相比,该方法在提高嵌入容量和降低图像退化的同时,提高了安全性。
{"title":"A block based data hiding method in images using pixel value differencing and LSB substitution method","authors":"Tasnuva Mahjabin, Syed Monowar Hossain, Md Shariful Haque","doi":"10.1109/ICCITECHN.2012.6509770","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2012.6509770","url":null,"abstract":"Information hiding is a historical but on demand fascinating research area. Now, in today's world, the availability of information has become so easy that the security and insecurity of information goes side by side. In order to provide security of information a science called, Steganography has emerged. Steganography conceals the existence of information into images to formulate a secure communication. In this paper, a Steganographic method based on Pixel Value Differencing (PVD) and LSB Substitution method is proposed. To meet the increasing demand for privacy and secrecy the method focused mainly on making it a robust, secured technique of information hiding. An efficient and dynamic embedding algorithm is proposed in this paper that not only hides the secret data with an imperceptible visual quality and increased capacity but also make secret code breaking a good annoyance for the attacker. This method also represents an extraction algorithm that effectively extracts the entire secret message without any loss of a single data. Finally, experimental results show that, the proposed method achieves an increased embedding capacity and lower image degradation with improved security as compared to LSB substitution method and some recent existing methods of data hiding.","PeriodicalId":127060,"journal":{"name":"2012 15th International Conference on Computer and Information Technology (ICCIT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131314245","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
Performance analysis of RLS and VSS-LMS channel estimation techniques for 4G MIMO OFDM systems 4G MIMO OFDM系统中RLS和VSS-LMS信道估计技术的性能分析
Pub Date : 2012-12-01 DOI: 10.1109/ICCITECHN.2012.6509724
Moinul Hossain, S. Farhad, M. Riasat
In this paper recursive least (RLS) square and variable step size least mean (VSS-LMS) square adaptive channel estimator are described for multiple input multiple output (MIMO) orthogonal frequency division multiplexing (OFDM) system. Both the techniques uses adaptive estimator which are capable of updating the parameters of estimator continuously and therefore knowledge of channel and noise statistics are not necessary, only knowledge of receive signal is required. From the simulation result it is observed that RLS CE method works better in terms of quick convergence rate than VSS-LMS CE for MIMO OFDM system. In addition, the utilization of more multiple antennas at the transmitter and/or receiver provides a much higher performance compared with fewer antennas.
本文研究了多输入多输出(MIMO)正交频分复用(OFDM)系统中的递推最小平方(RLS)和变步长最小均值(VSS-LMS)平方自适应信道估计方法。这两种技术都使用自适应估计器,能够连续更新估计器的参数,因此不需要了解信道和噪声统计信息,只需要了解接收信号。仿真结果表明,对于MIMO OFDM系统,RLS CE方法在快速收敛速度方面优于VSS-LMS CE方法。此外,在发射器和/或接收器上使用更多的多个天线,与较少的天线相比,提供了更高的性能。
{"title":"Performance analysis of RLS and VSS-LMS channel estimation techniques for 4G MIMO OFDM systems","authors":"Moinul Hossain, S. Farhad, M. Riasat","doi":"10.1109/ICCITECHN.2012.6509724","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2012.6509724","url":null,"abstract":"In this paper recursive least (RLS) square and variable step size least mean (VSS-LMS) square adaptive channel estimator are described for multiple input multiple output (MIMO) orthogonal frequency division multiplexing (OFDM) system. Both the techniques uses adaptive estimator which are capable of updating the parameters of estimator continuously and therefore knowledge of channel and noise statistics are not necessary, only knowledge of receive signal is required. From the simulation result it is observed that RLS CE method works better in terms of quick convergence rate than VSS-LMS CE for MIMO OFDM system. In addition, the utilization of more multiple antennas at the transmitter and/or receiver provides a much higher performance compared with fewer antennas.","PeriodicalId":127060,"journal":{"name":"2012 15th International Conference on Computer and Information Technology (ICCIT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123981937","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
期刊
2012 15th International Conference on Computer and Information Technology (ICCIT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1