首页 > 最新文献

2013 IEEE Recent Advances in Intelligent Computational Systems (RAICS)最新文献

英文 中文
Coding rates and MCS using adaptive modulation for WiMAX in OFDM systems using GNU Radio 在使用GNU无线电的OFDM系统中使用WiMAX自适应调制的编码速率和MCS
Pub Date : 2013-12-01 DOI: 10.1109/RAICS.2013.6745446
Lakshmi Boppana, Chandana N. Amanchi, R. Kodali
Various Various wireless technologies have been emerging with ever increasing demand for higher data rates along with low bit error rates (BER's). Adaptive modulation and coding (AMC) schemes, when incorporated into WiMAX helps the system to react dynamically to the channel variations thereby providing higher data rates and improve BER performance. Based on the channel state information, both the modulation and coding rates can be varied so as to achieve higher throughput and improve spectral efficiency. This work proposes an efficient adaptive modulation coding technique, which maximizes the throughput, while maintaining a target BER. It proposes to select a particular modulation coding scheme along with the corresponding coding rates based on the given threshold. The parameter values, such as SNR, BER, CINR, BLER channel attenuation factor, are accepted and then the modulation schemes with an appropriate coding rate are selected for the operation of a OFDM system in GNU Radio.
随着对高数据速率和低误码率(BER)的需求不断增长,各种无线技术不断涌现。自适应调制和编码(AMC)方案,当合并到WiMAX时,有助于系统对信道变化做出动态反应,从而提供更高的数据速率并改善误码率性能。基于信道状态信息,可以改变调制速率和编码速率,从而实现更高的吞吐量和提高频谱效率。这项工作提出了一种有效的自适应调制编码技术,该技术在保持目标误码率的同时最大限度地提高了吞吐量。提出根据给定的阈值选择特定的调制编码方案以及相应的编码速率。接受SNR、BER、CINR、BLER信道衰减系数等参数值,选择合适编码率的调制方案,用于GNU无线电中OFDM系统的运行。
{"title":"Coding rates and MCS using adaptive modulation for WiMAX in OFDM systems using GNU Radio","authors":"Lakshmi Boppana, Chandana N. Amanchi, R. Kodali","doi":"10.1109/RAICS.2013.6745446","DOIUrl":"https://doi.org/10.1109/RAICS.2013.6745446","url":null,"abstract":"Various Various wireless technologies have been emerging with ever increasing demand for higher data rates along with low bit error rates (BER's). Adaptive modulation and coding (AMC) schemes, when incorporated into WiMAX helps the system to react dynamically to the channel variations thereby providing higher data rates and improve BER performance. Based on the channel state information, both the modulation and coding rates can be varied so as to achieve higher throughput and improve spectral efficiency. This work proposes an efficient adaptive modulation coding technique, which maximizes the throughput, while maintaining a target BER. It proposes to select a particular modulation coding scheme along with the corresponding coding rates based on the given threshold. The parameter values, such as SNR, BER, CINR, BLER channel attenuation factor, are accepted and then the modulation schemes with an appropriate coding rate are selected for the operation of a OFDM system in GNU Radio.","PeriodicalId":184155,"journal":{"name":"2013 IEEE Recent Advances in Intelligent Computational Systems (RAICS)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123782266","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Improvised geographic scheme for greedy perimeter stateless routing 贪婪边界无状态路由的临时地理方案
Pub Date : 2013-12-01 DOI: 10.1109/RAICS.2013.6745449
Debasis Das, R. Misra
Geographic Perimeter Stateless Routing (GPSR) use local information to forward packets greedily. Nodes need to keep only this information, hence called as stateless. When not possible the algorithm and Greedy forwarding recovers to this scenario by switching to face routing, which is further based on the right-hand rule in the planarized node graph, in order to route around the void. The Gabriel Graph(GG) and the Relative Neighbourhood Graph (RNG) are the two graphs used for the planarization, but results in graph partitioning. In this work, we propose an improvised RNG-GG algorithm which makes sure to avoid the partitioning of the underlying connected graph and the cross-link, which remain in the node connectivity graph. We have given simulation results for the performance analysis of our proposed protocol compared to the competitive schemes and found improvement in terms of an increased packet delivery success rate, reducing routing protocol overhead and increased the path length.
地理边界无状态路由(GPSR)利用本地信息贪婪地转发报文。节点只需要保留这些信息,因此称为无状态。在不可能的情况下,算法和贪婪转发通过切换到面路由来恢复这种情况,面路由进一步基于平面化节点图中的右手规则,以绕过空洞。加布里埃尔图(GG)和相对邻域图(RNG)是用于平面化的两个图,但会导致图分区。在这项工作中,我们提出了一种改进的RNG-GG算法,该算法确保避免了底层连接图和交叉链接的划分,它们仍然存在于节点连接图中。我们给出了与竞争方案相比,我们提出的协议性能分析的仿真结果,并发现在增加数据包传输成功率,减少路由协议开销和增加路径长度方面有所改进。
{"title":"Improvised geographic scheme for greedy perimeter stateless routing","authors":"Debasis Das, R. Misra","doi":"10.1109/RAICS.2013.6745449","DOIUrl":"https://doi.org/10.1109/RAICS.2013.6745449","url":null,"abstract":"Geographic Perimeter Stateless Routing (GPSR) use local information to forward packets greedily. Nodes need to keep only this information, hence called as stateless. When not possible the algorithm and Greedy forwarding recovers to this scenario by switching to face routing, which is further based on the right-hand rule in the planarized node graph, in order to route around the void. The Gabriel Graph(GG) and the Relative Neighbourhood Graph (RNG) are the two graphs used for the planarization, but results in graph partitioning. In this work, we propose an improvised RNG-GG algorithm which makes sure to avoid the partitioning of the underlying connected graph and the cross-link, which remain in the node connectivity graph. We have given simulation results for the performance analysis of our proposed protocol compared to the competitive schemes and found improvement in terms of an increased packet delivery success rate, reducing routing protocol overhead and increased the path length.","PeriodicalId":184155,"journal":{"name":"2013 IEEE Recent Advances in Intelligent Computational Systems (RAICS)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128796590","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Speaker recognition system for security applications 安全应用的说话人识别系统
Pub Date : 2013-12-01 DOI: 10.1109/RAICS.2013.6745441
K. Selvan, M. Tech, Aju Joseph, Anish Babu
Due to the rapid advances in algorithms, VLSI design and computer technology, security systems based on speaker recognition are on the verge of commercial success. Nowadays, it is obvious that speakers can be identified from their voices. In this paper, an improved strategy for Text Dependent Automatic Speaker Verification (TD-ASV) system based on Malayalam and English language has been proposed and comparison of results are discussed. The system performs on Hidden Markov Model (HMM) technique with cepstral based features. Different speech pre-processing techniques like pre-emphasis filtering, frame blocking and windowing have been used to process the speech utterances. MFCC, ΔMFCC and Δ ΔMFCC have been used to extract the features. Speaker Identification (SI) is performed using Continuous Hidden Markov Model. The performance is analyzed in terms of Percentage Correctness (PC) and accuracy and result is visualized in a confusion matrix. The system has percentage correctness of 99.71% in English and 99.71% in Malayalam language. An application with Graphical User Interface (GUI) is also developed for security purposes using the system. The system is developed using the framework of Hidden Markov Model Tool Kit (HTK).
由于算法、VLSI设计和计算机技术的快速发展,基于说话人识别的安全系统即将取得商业成功。如今,很明显,说话的人可以从他们的声音中识别出来。本文提出了一种基于马拉雅拉姆语和英语的文本依赖自动说话人验证(TD-ASV)系统的改进策略,并对结果进行了比较。该系统采用基于倒谱特征的隐马尔可夫模型技术。不同的语音预处理技术,如预强调滤波,帧块和窗口被用于处理语音。使用MFCC, ΔMFCC和Δ ΔMFCC提取特征。使用连续隐马尔可夫模型进行说话人识别。从百分比正确性(PC)和准确性方面分析了性能,并将结果显示在混淆矩阵中。该系统在英语和马拉雅拉姆语中的正确率分别为99.71%和99.71%。为了安全起见,还开发了一个具有图形用户界面(GUI)的应用程序。该系统是利用隐马尔可夫模型工具包(HTK)的框架开发的。
{"title":"Speaker recognition system for security applications","authors":"K. Selvan, M. Tech, Aju Joseph, Anish Babu","doi":"10.1109/RAICS.2013.6745441","DOIUrl":"https://doi.org/10.1109/RAICS.2013.6745441","url":null,"abstract":"Due to the rapid advances in algorithms, VLSI design and computer technology, security systems based on speaker recognition are on the verge of commercial success. Nowadays, it is obvious that speakers can be identified from their voices. In this paper, an improved strategy for Text Dependent Automatic Speaker Verification (TD-ASV) system based on Malayalam and English language has been proposed and comparison of results are discussed. The system performs on Hidden Markov Model (HMM) technique with cepstral based features. Different speech pre-processing techniques like pre-emphasis filtering, frame blocking and windowing have been used to process the speech utterances. MFCC, ΔMFCC and Δ ΔMFCC have been used to extract the features. Speaker Identification (SI) is performed using Continuous Hidden Markov Model. The performance is analyzed in terms of Percentage Correctness (PC) and accuracy and result is visualized in a confusion matrix. The system has percentage correctness of 99.71% in English and 99.71% in Malayalam language. An application with Graphical User Interface (GUI) is also developed for security purposes using the system. The system is developed using the framework of Hidden Markov Model Tool Kit (HTK).","PeriodicalId":184155,"journal":{"name":"2013 IEEE Recent Advances in Intelligent Computational Systems (RAICS)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124655832","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Design of high precision electronics for laser range finder 高精度激光测距装置的设计
Pub Date : 2013-12-01 DOI: 10.1109/RAICS.2013.6745437
J. Jayarajan, R. Kumaran, Sandip Paul, R. Parmar, Purvi A. Koringa
Resolution of Time to Digital Convertor (TDC) is a critical parameter in determining the overall performance of Time Of Flight based laser range finder system. This paper focuses on designing a high resolution Laser Range Finder (LRF) using Commercial-Off-The-Shelf (COTS) components. The designed LRF consists of a high resolution Time to Digital Convertor using Virtex-4 FPGA, Parallel to USB converter, High Voltage Power Supply and Data acquisition and display module. TDC generates START pulse at pulse repetition frequency (prf). This pulse is fed as trigger to laser TX. Avalanche Photo-Diode (APD) receiver with high voltage bias (~140V) generates a STOP pulse on receipt of reflected laser beam. This pulse is level translated and fed to TDC as STOP pulse. Digital Clock Manager (DCM) is used to achieve clock interpolation for improving resolution beyond 1 clock period. The output of TDC is parallel 16-bit digital count which is converted to serial USB protocol and interfaced to PC based data acquisition system. The raw data is processed and distance information is derived after calibration with known distance sets. Graphical User Interface (GUI) is developed for display, record and calibration. Full system resolution of about 22 cm is achieved in hardware for a range of 10m. The system has a power consumption of 6.15W.
时间到数字转换器(TDC)的分辨率是决定飞行时间激光测距系统整体性能的关键参数。本文主要研究利用商用现货(COTS)元件设计高分辨率激光测距仪(LRF)。所设计的LRF由采用Virtex-4 FPGA的高分辨率时间数字转换器、并行USB转换器、高压电源和数据采集与显示模块组成。TDC以脉冲重复频率(prf)产生START脉冲。该脉冲作为触发源馈送到激光器TX,高偏置电压(~140V)的雪崩光电二极管(APD)接收机接收到反射激光束后产生一个停止脉冲。该脉冲被电平转换并作为停止脉冲馈送到TDC。采用数字时钟管理器(DCM)实现时钟插值,提高1个时钟周期以上的分辨率。TDC的输出是并行的16位数字计数,转换成串行USB协议,与基于PC机的数据采集系统接口。对原始数据进行处理,用已知距离集标定后得到距离信息。图形用户界面(GUI)的开发显示,记录和校准。在10米范围内,硬件实现了约22厘米的全系统分辨率。系统功耗为6.15W。
{"title":"Design of high precision electronics for laser range finder","authors":"J. Jayarajan, R. Kumaran, Sandip Paul, R. Parmar, Purvi A. Koringa","doi":"10.1109/RAICS.2013.6745437","DOIUrl":"https://doi.org/10.1109/RAICS.2013.6745437","url":null,"abstract":"Resolution of Time to Digital Convertor (TDC) is a critical parameter in determining the overall performance of Time Of Flight based laser range finder system. This paper focuses on designing a high resolution Laser Range Finder (LRF) using Commercial-Off-The-Shelf (COTS) components. The designed LRF consists of a high resolution Time to Digital Convertor using Virtex-4 FPGA, Parallel to USB converter, High Voltage Power Supply and Data acquisition and display module. TDC generates START pulse at pulse repetition frequency (prf). This pulse is fed as trigger to laser TX. Avalanche Photo-Diode (APD) receiver with high voltage bias (~140V) generates a STOP pulse on receipt of reflected laser beam. This pulse is level translated and fed to TDC as STOP pulse. Digital Clock Manager (DCM) is used to achieve clock interpolation for improving resolution beyond 1 clock period. The output of TDC is parallel 16-bit digital count which is converted to serial USB protocol and interfaced to PC based data acquisition system. The raw data is processed and distance information is derived after calibration with known distance sets. Graphical User Interface (GUI) is developed for display, record and calibration. Full system resolution of about 22 cm is achieved in hardware for a range of 10m. The system has a power consumption of 6.15W.","PeriodicalId":184155,"journal":{"name":"2013 IEEE Recent Advances in Intelligent Computational Systems (RAICS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126507969","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Hardware implementation of a robust watermarking technique for digital images 数字图像鲁棒水印技术的硬件实现
Pub Date : 2013-12-01 DOI: 10.1109/RAICS.2013.6745490
Archana Aniyan, J. Deepa
Development of digital watermarking technology has enabled the copyright protection and content authentication of digital multimedia data. Watermarking technique for digital images uses either spatial or frequency domain method. This paper describes a discrete cosine transform (DCT) based blind watermarking method for digital images and its hardware implementation using BeagleBoard. Experimental results show that the developed method is robust against various attacks and potentially compatible with JPEG compression.
数字水印技术的发展使数字多媒体数据的版权保护和内容认证成为可能。数字图像的水印技术有两种:一种是空间域水印,另一种是频域水印。介绍了一种基于离散余弦变换(DCT)的数字图像盲水印方法及其在BeagleBoard上的硬件实现。实验结果表明,该方法对各种攻击具有较强的鲁棒性,并具有与JPEG压缩兼容的潜力。
{"title":"Hardware implementation of a robust watermarking technique for digital images","authors":"Archana Aniyan, J. Deepa","doi":"10.1109/RAICS.2013.6745490","DOIUrl":"https://doi.org/10.1109/RAICS.2013.6745490","url":null,"abstract":"Development of digital watermarking technology has enabled the copyright protection and content authentication of digital multimedia data. Watermarking technique for digital images uses either spatial or frequency domain method. This paper describes a discrete cosine transform (DCT) based blind watermarking method for digital images and its hardware implementation using BeagleBoard. Experimental results show that the developed method is robust against various attacks and potentially compatible with JPEG compression.","PeriodicalId":184155,"journal":{"name":"2013 IEEE Recent Advances in Intelligent Computational Systems (RAICS)","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125715570","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Smart camera networks: An analytical framework for auto calibration without ambiguity 智能摄像机网络:无歧义自动校准的分析框架
Pub Date : 2013-12-01 DOI: 10.1109/RAICS.2013.6745493
K. Vupparaboina, Kamala Raghavan, S. Jana
With the proliferation of smart environment, smart multi-camera networks assume growing significance. Specifically, non-intrusive calibration of such camera networks becomes imperative in smart applications such as telepresence systems, where multi-view imaging/recording needs to be performed in a dynamic setting with continuously changing intrinsic and extrinsic camera parameters. Unfortunately, popular auto calibration methods are known to introduce ambiguity or require manual intervention. In this backdrop, we propose a three-camera configuration (which can be generalized) with a stereo pair having known baseline distance and an additional (mono) camera positioned arbitrarily, and analytically establish the uniqueness of auto calibration in the proposed configuration.
随着智能环境的普及,智能多摄像头网络的重要性日益凸显。具体来说,这种摄像机网络的非侵入式校准在远程呈现系统等智能应用中变得必不可少,其中需要在不断变化的内部和外部摄像机参数的动态设置中执行多视图成像/记录。不幸的是,众所周知,流行的自动校准方法会引入歧义或需要人工干预。在此背景下,我们提出了一种具有已知基线距离的立体对和任意位置的附加(单声道)摄像机的三摄像机配置(可以推广),并在该配置中解析地建立了自动校准的唯一性。
{"title":"Smart camera networks: An analytical framework for auto calibration without ambiguity","authors":"K. Vupparaboina, Kamala Raghavan, S. Jana","doi":"10.1109/RAICS.2013.6745493","DOIUrl":"https://doi.org/10.1109/RAICS.2013.6745493","url":null,"abstract":"With the proliferation of smart environment, smart multi-camera networks assume growing significance. Specifically, non-intrusive calibration of such camera networks becomes imperative in smart applications such as telepresence systems, where multi-view imaging/recording needs to be performed in a dynamic setting with continuously changing intrinsic and extrinsic camera parameters. Unfortunately, popular auto calibration methods are known to introduce ambiguity or require manual intervention. In this backdrop, we propose a three-camera configuration (which can be generalized) with a stereo pair having known baseline distance and an additional (mono) camera positioned arbitrarily, and analytically establish the uniqueness of auto calibration in the proposed configuration.","PeriodicalId":184155,"journal":{"name":"2013 IEEE Recent Advances in Intelligent Computational Systems (RAICS)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129996273","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Detecting influential users using spread of communications 利用传播信息发现有影响力的用户
Pub Date : 2013-12-01 DOI: 10.1109/RAICS.2013.6745489
Saptaditya Maiti, D. Mandal, Pabitra Mitra
This article discusses about detecting the most influential users in an online social network. We observe that a communication of an influential user is likely to reach many more users than the same made by a user having lesser influence in the network. Based on this observation, We have formulated a method using the spread of communications (i.e., the number of users the communication reaches). We have verified the method on three datasets downloaded from `Twitter' and results are found to be the best among existing methods on the said datasets.
本文讨论了如何检测在线社交网络中最具影响力的用户。我们观察到,一个有影响力的用户的交流可能会比一个在网络中影响力较小的用户所做的交流接触到更多的用户。基于这一观察,我们制定了一种使用通信传播(即通信到达的用户数量)的方法。我们已经在从“Twitter”下载的三个数据集上验证了该方法,并且发现结果是上述数据集上现有方法中最好的。
{"title":"Detecting influential users using spread of communications","authors":"Saptaditya Maiti, D. Mandal, Pabitra Mitra","doi":"10.1109/RAICS.2013.6745489","DOIUrl":"https://doi.org/10.1109/RAICS.2013.6745489","url":null,"abstract":"This article discusses about detecting the most influential users in an online social network. We observe that a communication of an influential user is likely to reach many more users than the same made by a user having lesser influence in the network. Based on this observation, We have formulated a method using the spread of communications (i.e., the number of users the communication reaches). We have verified the method on three datasets downloaded from `Twitter' and results are found to be the best among existing methods on the said datasets.","PeriodicalId":184155,"journal":{"name":"2013 IEEE Recent Advances in Intelligent Computational Systems (RAICS)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134179564","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A novel approach in cooperative spectrum sensing for cognitive radio 认知无线电协同频谱感知新方法
Pub Date : 2013-12-01 DOI: 10.1109/RAICS.2013.6745444
Jubin James Thennattil, Ebin M. Manuel
Radio spectrum is being underutilized. Cognitive Radio acts as a solution to the problem of spectrum under-utilization. Spectrum sensing is the most important feature of Cognitive Radio. Cooperative spectrum sensing improves sensing performance by including a number of cognitive users rather than a single one. In cooperative spectrum sensing, each cognitive radio performs individual spectrum sensing by any of the available methods and individual sensing results are combined according to certain rules. We propose a novel method where signal to noise ratio, credibility and position information of secondary users are used for spectrum sensing. They are much important factors that affect the sensing, but were not considered in previous works. The performance of this scheme is investigated by simulation results and is much better than the traditional ones. Significant improvement in detection probabilities are achieved reducing false alarm rates even in situations including malicious users and hidden primary user.
无线电频谱未得到充分利用。认知无线电是解决频谱利用不足问题的一种方法。频谱感知是认知无线电的重要特征。协作频谱感知通过包含多个认知用户而不是单个用户来提高感知性能。在协同频谱感知中,每个认知无线电通过任意一种可用的方法进行单独的频谱感知,并将各个感知结果按照一定的规则进行组合。本文提出了一种利用二次用户信噪比、可信度和位置信息进行频谱感知的新方法。它们是影响传感的重要因素,但在以往的工作中没有考虑到。仿真结果表明,该方案的性能明显优于传统方案。即使在恶意用户和隐藏主用户的情况下,检测概率也显著提高,降低了误报率。
{"title":"A novel approach in cooperative spectrum sensing for cognitive radio","authors":"Jubin James Thennattil, Ebin M. Manuel","doi":"10.1109/RAICS.2013.6745444","DOIUrl":"https://doi.org/10.1109/RAICS.2013.6745444","url":null,"abstract":"Radio spectrum is being underutilized. Cognitive Radio acts as a solution to the problem of spectrum under-utilization. Spectrum sensing is the most important feature of Cognitive Radio. Cooperative spectrum sensing improves sensing performance by including a number of cognitive users rather than a single one. In cooperative spectrum sensing, each cognitive radio performs individual spectrum sensing by any of the available methods and individual sensing results are combined according to certain rules. We propose a novel method where signal to noise ratio, credibility and position information of secondary users are used for spectrum sensing. They are much important factors that affect the sensing, but were not considered in previous works. The performance of this scheme is investigated by simulation results and is much better than the traditional ones. Significant improvement in detection probabilities are achieved reducing false alarm rates even in situations including malicious users and hidden primary user.","PeriodicalId":184155,"journal":{"name":"2013 IEEE Recent Advances in Intelligent Computational Systems (RAICS)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131146333","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A framework to customize privacy settings of online social network users 一个自定义在线社交网络用户隐私设置的框架
Pub Date : 2013-12-01 DOI: 10.1109/RAICS.2013.6745471
Agrima Srivastava, G. Geethakumari
Privacy is one of the most important concerns in an online social network. Online social network data is big data as millions of users are a part of it. The personal information of every user in an online social network is an asset that may be traded by a third party for its benefits. Individuals should be aware of how much of their personal information could be shared without risk. Different people have different requirements to share a profile item hence measuring privacy of such huge and diverse population is a challenging and complicated task in itself. In this paper we have proposed a framework that ensures privacy of individuals by allowing them to measure their privacy with respect to some specific people of their choice rather than measuring it with the entire population on online social networks. We have suggested a method to choose the best model to fit the real world data and to calculate the sensitivities of various profile items. The framework gives specific labels to users that indicates their profile privacy strength and enable them to customize their privacy settings so as to improve the privacy quotient. The users can also act as advisers to their online friends whose privacy quotients are low and thus spread privacy awareness in social networks.
隐私是在线社交网络中最重要的问题之一。在线社交网络数据是大数据,因为数百万用户是其中的一部分。在线社交网络中每个用户的个人信息都是一种资产,可以被第三方交易以获取利益。个人应该意识到有多少个人信息可以在没有风险的情况下被分享。不同的人对分享个人资料有不同的要求,因此测量如此庞大和多样化的人口的隐私本身就是一项具有挑战性和复杂的任务。在这篇论文中,我们提出了一个框架,通过允许人们根据自己选择的特定人群来衡量他们的隐私,而不是用在线社交网络上的整个人群来衡量,从而确保个人的隐私。我们提出了一种选择最佳模型来拟合真实世界数据的方法,并计算了各种剖面项目的灵敏度。该框架为用户提供了特定的标签,以表明他们的个人资料隐私强度,并使他们能够自定义他们的隐私设置,以提高隐私商。用户还可以充当隐私商较低的网络好友的顾问,从而在社交网络中传播隐私意识。
{"title":"A framework to customize privacy settings of online social network users","authors":"Agrima Srivastava, G. Geethakumari","doi":"10.1109/RAICS.2013.6745471","DOIUrl":"https://doi.org/10.1109/RAICS.2013.6745471","url":null,"abstract":"Privacy is one of the most important concerns in an online social network. Online social network data is big data as millions of users are a part of it. The personal information of every user in an online social network is an asset that may be traded by a third party for its benefits. Individuals should be aware of how much of their personal information could be shared without risk. Different people have different requirements to share a profile item hence measuring privacy of such huge and diverse population is a challenging and complicated task in itself. In this paper we have proposed a framework that ensures privacy of individuals by allowing them to measure their privacy with respect to some specific people of their choice rather than measuring it with the entire population on online social networks. We have suggested a method to choose the best model to fit the real world data and to calculate the sensitivities of various profile items. The framework gives specific labels to users that indicates their profile privacy strength and enable them to customize their privacy settings so as to improve the privacy quotient. The users can also act as advisers to their online friends whose privacy quotients are low and thus spread privacy awareness in social networks.","PeriodicalId":184155,"journal":{"name":"2013 IEEE Recent Advances in Intelligent Computational Systems (RAICS)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127653066","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Classification of robotic data using artificial neural network 基于人工神经网络的机器人数据分类
Pub Date : 2013-12-01 DOI: 10.1109/RAICS.2013.6745497
Radhakrishnan Gopalapillai, J. Vidhya, Deepa Gupta, Sudarshan TSB
As time series data are common in the field of science and commerce, time series data analysis has an important role in these areas for extracting information from available data. This paper presents the application of Artificial Neural Networks (ANN) for analyzing huge amount of time series data collected by sensors mounted on a robot navigating in a simulated environment. The Artificial Neural Network system employing back propagation learning algorithm classified different scenarios encountered by the robot using the data collected by sensors.
由于时间序列数据在科学和商业领域中很常见,时间序列数据分析在这些领域中从可用数据中提取信息具有重要作用。本文介绍了应用人工神经网络(ANN)对机器人在模拟环境中导航的传感器收集的大量时间序列数据进行分析的方法。采用反向传播学习算法的人工神经网络系统利用传感器采集的数据对机器人遇到的不同场景进行分类。
{"title":"Classification of robotic data using artificial neural network","authors":"Radhakrishnan Gopalapillai, J. Vidhya, Deepa Gupta, Sudarshan TSB","doi":"10.1109/RAICS.2013.6745497","DOIUrl":"https://doi.org/10.1109/RAICS.2013.6745497","url":null,"abstract":"As time series data are common in the field of science and commerce, time series data analysis has an important role in these areas for extracting information from available data. This paper presents the application of Artificial Neural Networks (ANN) for analyzing huge amount of time series data collected by sensors mounted on a robot navigating in a simulated environment. The Artificial Neural Network system employing back propagation learning algorithm classified different scenarios encountered by the robot using the data collected by sensors.","PeriodicalId":184155,"journal":{"name":"2013 IEEE Recent Advances in Intelligent Computational Systems (RAICS)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117205100","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
期刊
2013 IEEE Recent Advances in Intelligent Computational Systems (RAICS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1