Pub Date : 2016-06-27DOI: 10.1109/TSP.2016.7760824
Visnja Krizanovic Cik, D. Zagar, Kristijan Kordic
In this paper, an overview and comparison of analytical models used for prediction and forecast of broadband services adoption are presented. First, the importance of predictive modeling process of broadband services adoption is described. Furthermore, the comparison of several commonly used models for prediction and forecast of services adoption processes is conducted. Finally, in order to more accurately forecast the broadband services adoption paths, the appropriate models for different stages of broadband services adoption process have been identified.
{"title":"Comparison of models for prediction and forecast of broadband services adoption","authors":"Visnja Krizanovic Cik, D. Zagar, Kristijan Kordic","doi":"10.1109/TSP.2016.7760824","DOIUrl":"https://doi.org/10.1109/TSP.2016.7760824","url":null,"abstract":"In this paper, an overview and comparison of analytical models used for prediction and forecast of broadband services adoption are presented. First, the importance of predictive modeling process of broadband services adoption is described. Furthermore, the comparison of several commonly used models for prediction and forecast of services adoption processes is conducted. Finally, in order to more accurately forecast the broadband services adoption paths, the appropriate models for different stages of broadband services adoption process have been identified.","PeriodicalId":159773,"journal":{"name":"2016 39th International Conference on Telecommunications and Signal Processing (TSP)","volume":"93 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114494519","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-06-27DOI: 10.1109/TSP.2016.7760887
Ioana-Alina Banica, H. Cucu, Andi Buzo, D. Burileanu, C. Burileanu
Studies have shown that there are different types of cries depending on the newborns' need such as hunger, tiredness, discomfort and so on. Neonatologist or pediatricians can distinguish between different types of cries and can find a pattern in each type of cry. Unfortunately, this is a real problem for the parents who want to act as fast as possible to comfort the newborn. In this paper, we propose a fully automatic system that attempts to discriminate between different types of cries. The baby cry classification system is based on Gaussian Mixture Models and i-vectors. The evaluation is performed on an audio database comprising six types of cries (colic, eructation, discomfort, hunger, pain, tiredness) from 127 babies. The experiments show promising results despite the difficulty of the task.
{"title":"Baby cry recognition in real-world conditions","authors":"Ioana-Alina Banica, H. Cucu, Andi Buzo, D. Burileanu, C. Burileanu","doi":"10.1109/TSP.2016.7760887","DOIUrl":"https://doi.org/10.1109/TSP.2016.7760887","url":null,"abstract":"Studies have shown that there are different types of cries depending on the newborns' need such as hunger, tiredness, discomfort and so on. Neonatologist or pediatricians can distinguish between different types of cries and can find a pattern in each type of cry. Unfortunately, this is a real problem for the parents who want to act as fast as possible to comfort the newborn. In this paper, we propose a fully automatic system that attempts to discriminate between different types of cries. The baby cry classification system is based on Gaussian Mixture Models and i-vectors. The evaluation is performed on an audio database comprising six types of cries (colic, eructation, discomfort, hunger, pain, tiredness) from 127 babies. The experiments show promising results despite the difficulty of the task.","PeriodicalId":159773,"journal":{"name":"2016 39th International Conference on Telecommunications and Signal Processing (TSP)","volume":"106 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114525383","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-06-27DOI: 10.1109/TSP.2016.7760951
L. Said, A. Radwan, A. Madian, A. Soliman
This paper introduces a study to generalize the design of a continuous time filters into the fractional order domain. The study involves inverting and non-inverting filters based on CFOA where three responses are extracted which are high-pass, band-pass and low-pass responses. The proposed study introduces the generalized formulas for the transfer function of each response with different fractional orders. The fractional-order filters enhance the design flexibility and controllability due to the extra degree of freedom provided by the fractional order parameters. The general fundamentals of these filters are presented by calculating the cutoff frequency equation. Different numerical solutions for the generalized fractional order filters are introduced. Stability discussion is presented for different fractional order cases. Spice simulations results are introduced to validate the theoretical findings.
{"title":"Fractional-order inverting and non-inverting filters based on CFOA","authors":"L. Said, A. Radwan, A. Madian, A. Soliman","doi":"10.1109/TSP.2016.7760951","DOIUrl":"https://doi.org/10.1109/TSP.2016.7760951","url":null,"abstract":"This paper introduces a study to generalize the design of a continuous time filters into the fractional order domain. The study involves inverting and non-inverting filters based on CFOA where three responses are extracted which are high-pass, band-pass and low-pass responses. The proposed study introduces the generalized formulas for the transfer function of each response with different fractional orders. The fractional-order filters enhance the design flexibility and controllability due to the extra degree of freedom provided by the fractional order parameters. The general fundamentals of these filters are presented by calculating the cutoff frequency equation. Different numerical solutions for the generalized fractional order filters are introduced. Stability discussion is presented for different fractional order cases. Spice simulations results are introduced to validate the theoretical findings.","PeriodicalId":159773,"journal":{"name":"2016 39th International Conference on Telecommunications and Signal Processing (TSP)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116047053","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-06-27DOI: 10.1109/TSP.2016.7760874
R. Ranjan, Pablo Mendoza Ponce, Anirudh Kankuppe, Bibin John, L. A. Saleh, D. Schroeder, W. Krautschneider
This paper details a fully programmable floating memristor (resistor with memory) emulator ASIC designed for biologically inspired memristive learning. Since real memristor is not commercially available, a compact memristor emulator is needed for device study. The designed ASIC has a memristor emulator with conductance range from 4.88nS to 4.99μS (200KΩ to 204.8MΩ). The memristor emulator is a switched-resistor based circuit with processing performed off-chip in a FPGA. The processing has been planned to be off-chip to get the freedom of programmability of any function. This paper explains the memristor emulator and the realization of synapse functionality used in neuromorphic circuits like long term potentiation (LTP), Long Term depression (LTD) and synaptic plasticity. The ASIC has been designed and fabricated in AMS 350nm process.
{"title":"Programmable memristor emulator ASIC for biologically inspired memristive learning","authors":"R. Ranjan, Pablo Mendoza Ponce, Anirudh Kankuppe, Bibin John, L. A. Saleh, D. Schroeder, W. Krautschneider","doi":"10.1109/TSP.2016.7760874","DOIUrl":"https://doi.org/10.1109/TSP.2016.7760874","url":null,"abstract":"This paper details a fully programmable floating memristor (resistor with memory) emulator ASIC designed for biologically inspired memristive learning. Since real memristor is not commercially available, a compact memristor emulator is needed for device study. The designed ASIC has a memristor emulator with conductance range from 4.88nS to 4.99μS (200KΩ to 204.8MΩ). The memristor emulator is a switched-resistor based circuit with processing performed off-chip in a FPGA. The processing has been planned to be off-chip to get the freedom of programmability of any function. This paper explains the memristor emulator and the realization of synapse functionality used in neuromorphic circuits like long term potentiation (LTP), Long Term depression (LTD) and synaptic plasticity. The ASIC has been designed and fabricated in AMS 350nm process.","PeriodicalId":159773,"journal":{"name":"2016 39th International Conference on Telecommunications and Signal Processing (TSP)","volume":"126 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128046915","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-06-27DOI: 10.1109/TSP.2016.7760935
Debashree Kashyap, Abhishek Somani, Jatin Shekhar, Anupama Bhan, M. Dutta, Radim Burget, K. Říha
Introduced in 1940, Pap smear test has proven to be an effective screening method to determine the different stages of cervical cancer. Identification and classification of Pap smear images to detect cervical cancer via manual screening is a challenging task for pathologists therefore increasing the chances of human error. In this paper, we propose an automatic method to detect and classify the grade of cervical cancer using both geometric and texture features of Pap smear images and classifying accordingly using multi SVM. The geometric features are obtained through segmentation of nucleus and cytoplasm using independent level sets, detecting whether the cell is cancerous or normal, with reference to the ground truth. By extracting well defined GLCM texture features and using a combination of PCA and the best class of multi SVM, the images are classified with an accuracy of 95%.
{"title":"Cervical cancer detection and classification using Independent Level sets and multi SVMs","authors":"Debashree Kashyap, Abhishek Somani, Jatin Shekhar, Anupama Bhan, M. Dutta, Radim Burget, K. Říha","doi":"10.1109/TSP.2016.7760935","DOIUrl":"https://doi.org/10.1109/TSP.2016.7760935","url":null,"abstract":"Introduced in 1940, Pap smear test has proven to be an effective screening method to determine the different stages of cervical cancer. Identification and classification of Pap smear images to detect cervical cancer via manual screening is a challenging task for pathologists therefore increasing the chances of human error. In this paper, we propose an automatic method to detect and classify the grade of cervical cancer using both geometric and texture features of Pap smear images and classifying accordingly using multi SVM. The geometric features are obtained through segmentation of nucleus and cytoplasm using independent level sets, detecting whether the cell is cancerous or normal, with reference to the ground truth. By extracting well defined GLCM texture features and using a combination of PCA and the best class of multi SVM, the images are classified with an accuracy of 95%.","PeriodicalId":159773,"journal":{"name":"2016 39th International Conference on Telecommunications and Signal Processing (TSP)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129927607","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-06-27DOI: 10.1109/TSP.2016.7760839
Hakan Erdol, Hasan Yavuz Ozderya, Cem Sisman, T. Kayikçioglu, I. Kaya
In this paper, Two communication protocol, IEEE 802.15.6 Wireless Body Area Network (WBAN) and IEEE 802.15.4 ZigBEE, which are designed for telemedicine field, have been studied. BER performances values of both standards are simulated using their individual physical layer profiles in Rayleigh fading and Additive White Gaussian Noise (AWGN) channels. The obtained performances are compared with each other. As a result of simulation in AWGN Channel, IEEE 802.15.4 communication protocol performs approximately 7 dB better in SNR - BER graph than IEEE 802.15.6 while in Rayleigh channel this difference increased up to 16 dB.
{"title":"BER performance comparison of IEEE 802.15.6 and IEEE 802.15.4 on PHY layer","authors":"Hakan Erdol, Hasan Yavuz Ozderya, Cem Sisman, T. Kayikçioglu, I. Kaya","doi":"10.1109/TSP.2016.7760839","DOIUrl":"https://doi.org/10.1109/TSP.2016.7760839","url":null,"abstract":"In this paper, Two communication protocol, IEEE 802.15.6 Wireless Body Area Network (WBAN) and IEEE 802.15.4 ZigBEE, which are designed for telemedicine field, have been studied. BER performances values of both standards are simulated using their individual physical layer profiles in Rayleigh fading and Additive White Gaussian Noise (AWGN) channels. The obtained performances are compared with each other. As a result of simulation in AWGN Channel, IEEE 802.15.4 communication protocol performs approximately 7 dB better in SNR - BER graph than IEEE 802.15.6 while in Rayleigh channel this difference increased up to 16 dB.","PeriodicalId":159773,"journal":{"name":"2016 39th International Conference on Telecommunications and Signal Processing (TSP)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114922850","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-06-27DOI: 10.1109/TSP.2016.7760827
V. Oujezský, T. Horváth, V. Skorpil
In this paper we present a time behavioral analysis of a simulated botnet network traffic, collected and discovered from NetFlow messages. More specifically said - lifespans. The technique, which we used, is focused on to model command and control communication in a botnet network. The lifespan of this referred traffic is modeled by lifelines using Python language.
{"title":"Modeling botnet C&C traffic lifespans from NetFlow using survival analysis","authors":"V. Oujezský, T. Horváth, V. Skorpil","doi":"10.1109/TSP.2016.7760827","DOIUrl":"https://doi.org/10.1109/TSP.2016.7760827","url":null,"abstract":"In this paper we present a time behavioral analysis of a simulated botnet network traffic, collected and discovered from NetFlow messages. More specifically said - lifespans. The technique, which we used, is focused on to model command and control communication in a botnet network. The lifespan of this referred traffic is modeled by lifelines using Python language.","PeriodicalId":159773,"journal":{"name":"2016 39th International Conference on Telecommunications and Signal Processing (TSP)","volume":"267 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114609651","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-06-27DOI: 10.1109/TSP.2016.7760825
M. Naldi
Third-party measurements of cloud availability are needed as a checkpoint of cloud providers' quality statements, and ICMP has been proposed to carry on such measurements. Simple ICMP-based measurement schemes, however, provide a poor discrimination between false outages and true cloud outages, unless the cloud outage probability is quite higher than the packet loss rate incurred by probing packets due to network failures. The use of a closely spaced sequence of probing instances, proposed to get rid of false outages, is ineffective for the purpose, unless the cloud itself is free of unavailability glitches.
{"title":"Accuracy of third-party cloud availability estimation through ICMP","authors":"M. Naldi","doi":"10.1109/TSP.2016.7760825","DOIUrl":"https://doi.org/10.1109/TSP.2016.7760825","url":null,"abstract":"Third-party measurements of cloud availability are needed as a checkpoint of cloud providers' quality statements, and ICMP has been proposed to carry on such measurements. Simple ICMP-based measurement schemes, however, provide a poor discrimination between false outages and true cloud outages, unless the cloud outage probability is quite higher than the packet loss rate incurred by probing packets due to network failures. The use of a closely spaced sequence of probing instances, proposed to get rid of false outages, is ineffective for the purpose, unless the cloud itself is free of unavailability glitches.","PeriodicalId":159773,"journal":{"name":"2016 39th International Conference on Telecommunications and Signal Processing (TSP)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128518773","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-06-27DOI: 10.1109/TSP.2016.7760834
Hoang-Sy Nguyen, Hoa Bui, Thuan-An Do, T. Nguyen, M. Voznák, M. Mikulec
In this paper, we illustrate performance analysis for three and four time slot transmission schemes (3TS and 4TS) for two-way amplify-and-forward (AF) relaying channels for power transfer protocol and wireless data, in which the energy harvesting (EH) relay node helps to interchange information between two nodes. We derive the throughput and the approximate expressions of outage probability of the 3TS, 4TS transmission schemes and compare these results with the distance allocation number between source node to relay and relay to destination node, and the large scale path loss in order to calculate the optimal throughput. This result depicts that relaying scheme has high opportunities to significantly enhance the performance of systems. In the numerical results, we can see that the performance throughput declines when the distance of both sources rises. Especially, when the distance allocation number increases, the throughput trend decreases for both 3TS and 4TS.
{"title":"Wireless information and energy harvesting for bidirectional relay channels: Tradeoff between relay distance and optimal throughput","authors":"Hoang-Sy Nguyen, Hoa Bui, Thuan-An Do, T. Nguyen, M. Voznák, M. Mikulec","doi":"10.1109/TSP.2016.7760834","DOIUrl":"https://doi.org/10.1109/TSP.2016.7760834","url":null,"abstract":"In this paper, we illustrate performance analysis for three and four time slot transmission schemes (3TS and 4TS) for two-way amplify-and-forward (AF) relaying channels for power transfer protocol and wireless data, in which the energy harvesting (EH) relay node helps to interchange information between two nodes. We derive the throughput and the approximate expressions of outage probability of the 3TS, 4TS transmission schemes and compare these results with the distance allocation number between source node to relay and relay to destination node, and the large scale path loss in order to calculate the optimal throughput. This result depicts that relaying scheme has high opportunities to significantly enhance the performance of systems. In the numerical results, we can see that the performance throughput declines when the distance of both sources rises. Especially, when the distance allocation number increases, the throughput trend decreases for both 3TS and 4TS.","PeriodicalId":159773,"journal":{"name":"2016 39th International Conference on Telecommunications and Signal Processing (TSP)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133089360","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-06-27DOI: 10.1109/TSP.2016.7760830
Mariusz Słabicki, K. Grochla
In this paper we present the Python LTE Software (PyLTEs), which is a open-source framework for performance evaluation and optimization of the configuration of LTE networks deployment. It allows to define the geographic location of cells, eNodeB configuration such as e.g. TX Power and spatial distribution of the clients. The soft-frequency reuse schemes are supported, as well as different schedulers and signal propagation models. The framework implements a number of optimization methods to find the best network configuration for a given parameters. We show several examples of practical application of the described framework, as well as evaluation of its accuracy by a comparison to real life measurements.
{"title":"PyLTEs — Python LTE evaluation framework for quick and reliable network optimization","authors":"Mariusz Słabicki, K. Grochla","doi":"10.1109/TSP.2016.7760830","DOIUrl":"https://doi.org/10.1109/TSP.2016.7760830","url":null,"abstract":"In this paper we present the Python LTE Software (PyLTEs), which is a open-source framework for performance evaluation and optimization of the configuration of LTE networks deployment. It allows to define the geographic location of cells, eNodeB configuration such as e.g. TX Power and spatial distribution of the clients. The soft-frequency reuse schemes are supported, as well as different schedulers and signal propagation models. The framework implements a number of optimization methods to find the best network configuration for a given parameters. We show several examples of practical application of the described framework, as well as evaluation of its accuracy by a comparison to real life measurements.","PeriodicalId":159773,"journal":{"name":"2016 39th International Conference on Telecommunications and Signal Processing (TSP)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116795976","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}