Pub Date : 2013-12-10DOI: 10.1109/ICICS.2013.6782925
H. Y. Shwe, P. Chong
Localization using sensor network has attracted much attention for its comparable low-cost and potential use with monitoring and targeting purposes in real and hostile application scenarios. Currently, there are many available approaches to locate persons/things based of GPS and RFID technologies. However, in some application scenario, e.g., disaster rescue application, such localization devices may be damaged and may not provide the location information of the survivors. The main goal of this paper is to design and develop a robust localization technique for human existence detection in case of disasters such as earthquake or fire. In this paper, we propose a 3-D localization technique based on the hop-count data collected from sensor anchors to estimate the location of the activated sensor mote in 3-D coordination. Our algorithm incorporates two salient features, grid-based output and event-triggering mechanism, to guarantee both improve accuracy and power efficiency. Simulation results indicate that the proposed algorithm can improve the localization precision of the human existence and work well in real environment.
{"title":"Cubic-based 3-D localization for wireless sensor networks","authors":"H. Y. Shwe, P. Chong","doi":"10.1109/ICICS.2013.6782925","DOIUrl":"https://doi.org/10.1109/ICICS.2013.6782925","url":null,"abstract":"Localization using sensor network has attracted much attention for its comparable low-cost and potential use with monitoring and targeting purposes in real and hostile application scenarios. Currently, there are many available approaches to locate persons/things based of GPS and RFID technologies. However, in some application scenario, e.g., disaster rescue application, such localization devices may be damaged and may not provide the location information of the survivors. The main goal of this paper is to design and develop a robust localization technique for human existence detection in case of disasters such as earthquake or fire. In this paper, we propose a 3-D localization technique based on the hop-count data collected from sensor anchors to estimate the location of the activated sensor mote in 3-D coordination. Our algorithm incorporates two salient features, grid-based output and event-triggering mechanism, to guarantee both improve accuracy and power efficiency. Simulation results indicate that the proposed algorithm can improve the localization precision of the human existence and work well in real environment.","PeriodicalId":184544,"journal":{"name":"2013 9th International Conference on Information, Communications & Signal Processing","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132267924","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-12-01DOI: 10.1109/ICICS.2013.6782900
Sheng Luo, Yongxu Hu, K. C. Teh
Various advantages including higher order of diversity gain and transmission power saving can be obtained in wireless communications through relay-aided transmissions. In this paper, the energy efficiency of a wireless relaying system based on an automatic repeat request (ARQ) protocol is investigated. A system with multiple relays between a source node (SN) and a destination node (DN) is considered. The signal transmission consists of two phases and in each phase the ARQ protocol is used. Some of the relay nodes are selected for forwarding the message and overhearing between them in the second phase is allowed. As a result, the number of relay nodes that can decode source message increases as the ARQ round goes on. The energy efficiency of two relaying schemes, namely the selection relay (SR) scheme and the distributed space-time block coding (D-STBC) scheme, are investigated. It is shown that the energy efficiency of the system can be improved through inter-relay listening and the SR-ARQ scheme has better energy efficiency as compared with the D-STBC scheme.
{"title":"Energy efficiency of relaying systems with ARQ and inter-relay listening","authors":"Sheng Luo, Yongxu Hu, K. C. Teh","doi":"10.1109/ICICS.2013.6782900","DOIUrl":"https://doi.org/10.1109/ICICS.2013.6782900","url":null,"abstract":"Various advantages including higher order of diversity gain and transmission power saving can be obtained in wireless communications through relay-aided transmissions. In this paper, the energy efficiency of a wireless relaying system based on an automatic repeat request (ARQ) protocol is investigated. A system with multiple relays between a source node (SN) and a destination node (DN) is considered. The signal transmission consists of two phases and in each phase the ARQ protocol is used. Some of the relay nodes are selected for forwarding the message and overhearing between them in the second phase is allowed. As a result, the number of relay nodes that can decode source message increases as the ARQ round goes on. The energy efficiency of two relaying schemes, namely the selection relay (SR) scheme and the distributed space-time block coding (D-STBC) scheme, are investigated. It is shown that the energy efficiency of the system can be improved through inter-relay listening and the SR-ARQ scheme has better energy efficiency as compared with the D-STBC scheme.","PeriodicalId":184544,"journal":{"name":"2013 9th International Conference on Information, Communications & Signal Processing","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123054088","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-12-01DOI: 10.1109/ICICS.2013.6782773
Natsuki Uesako, Y. Kajikawa
Loudspeaker systems generate nonlinear distortions due to their complex structures. The nonlinear distortions degrade the sound quality. A solution of this problem is to use Mirror filter. Mirror filter is used for the compensation of nonlinear distortions for electro-dynamic loudspeaker systems and is based on the nonlinear differential equations. The design of Mirror filter requires the estimated parameters of a target loudspeaker system. If you obtain the corresponding parameters of a target loudspeaker system and arrange Mirror filter designed using those parameters in front of the loudspeaker, then the nonlinear distortions can be compensated. Hence, the estimated parameters are very important to achieve high compensation performance. In this paper, we examine the relationship between the nonlinear distortions compensation performance and each parameter of the electro-dynamic loudspeaker system. Concretely, we clarify the effects by varying each nonlinear parameter in Mirror filter. Simulation and experimental results demonstrate that the compensation performance for the second order nonlinear distortions depends on a nonlinear parameter of the force factor in loudspeaker systems.
{"title":"Relationship between the nonlinear distortions compensation performance and each parameter of the electro-dynamic loudspeaker system","authors":"Natsuki Uesako, Y. Kajikawa","doi":"10.1109/ICICS.2013.6782773","DOIUrl":"https://doi.org/10.1109/ICICS.2013.6782773","url":null,"abstract":"Loudspeaker systems generate nonlinear distortions due to their complex structures. The nonlinear distortions degrade the sound quality. A solution of this problem is to use Mirror filter. Mirror filter is used for the compensation of nonlinear distortions for electro-dynamic loudspeaker systems and is based on the nonlinear differential equations. The design of Mirror filter requires the estimated parameters of a target loudspeaker system. If you obtain the corresponding parameters of a target loudspeaker system and arrange Mirror filter designed using those parameters in front of the loudspeaker, then the nonlinear distortions can be compensated. Hence, the estimated parameters are very important to achieve high compensation performance. In this paper, we examine the relationship between the nonlinear distortions compensation performance and each parameter of the electro-dynamic loudspeaker system. Concretely, we clarify the effects by varying each nonlinear parameter in Mirror filter. Simulation and experimental results demonstrate that the compensation performance for the second order nonlinear distortions depends on a nonlinear parameter of the force factor in loudspeaker systems.","PeriodicalId":184544,"journal":{"name":"2013 9th International Conference on Information, Communications & Signal Processing","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116797718","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-12-01DOI: 10.1109/ICICS.2013.6782914
Chong Fu, Shuai Hou, Wei Zhou, Wen-qi Liu, Dongliang Wang
In recent years, chaos-based image encryption technology has been extensively studied to meet the increasing demand for online secure image transmission over open networks. However, many of them suffer from known/chosen plaintext attacks as the diffusion key stream used in those schemes is solely determined by the key. To address this problem, a plaintext-related diffusion strategy is presented in this paper. In the diffusion stage, the key stream elements produced by Chen's chaotic system are circularly shifted under the control of plain pixel. As a result, the key stream is related not only to the key but also to the plain image, which effectively promotes the ability against known/chosen plaintext attack. Moreover, compared with 1-dimensional chaotic maps, the Chen's chaotic system has more complicated dynamical property and number of state variables, which further enhance the security of the cryptosystem. Thorough security analysis is carried out with detailed analysis, demonstrating the satisfactory security of the proposed scheme.
{"title":"A chaos-based image encryption scheme with a plaintext related diffusion","authors":"Chong Fu, Shuai Hou, Wei Zhou, Wen-qi Liu, Dongliang Wang","doi":"10.1109/ICICS.2013.6782914","DOIUrl":"https://doi.org/10.1109/ICICS.2013.6782914","url":null,"abstract":"In recent years, chaos-based image encryption technology has been extensively studied to meet the increasing demand for online secure image transmission over open networks. However, many of them suffer from known/chosen plaintext attacks as the diffusion key stream used in those schemes is solely determined by the key. To address this problem, a plaintext-related diffusion strategy is presented in this paper. In the diffusion stage, the key stream elements produced by Chen's chaotic system are circularly shifted under the control of plain pixel. As a result, the key stream is related not only to the key but also to the plain image, which effectively promotes the ability against known/chosen plaintext attack. Moreover, compared with 1-dimensional chaotic maps, the Chen's chaotic system has more complicated dynamical property and number of state variables, which further enhance the security of the cryptosystem. Thorough security analysis is carried out with detailed analysis, demonstrating the satisfactory security of the proposed scheme.","PeriodicalId":184544,"journal":{"name":"2013 9th International Conference on Information, Communications & Signal Processing","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121263823","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-12-01DOI: 10.1109/ICICS.2013.6782834
R. Shavelis, M. Greitans
The paper proposes an extension of the classical Fourier series for analysis of signals with time-varying spectral content. This, in comparison to classical series, allows reducing the number of coefficients that represent the signal if the fundamental frequency of the extended Fourier series is chosen according to the time-varying bandwidth of the signal. The advantage of the proposed series is demonstrated by numerical results for various test signals.
{"title":"Extended Fourier series representation of signals with time-varying bandwidth","authors":"R. Shavelis, M. Greitans","doi":"10.1109/ICICS.2013.6782834","DOIUrl":"https://doi.org/10.1109/ICICS.2013.6782834","url":null,"abstract":"The paper proposes an extension of the classical Fourier series for analysis of signals with time-varying spectral content. This, in comparison to classical series, allows reducing the number of coefficients that represent the signal if the fundamental frequency of the extended Fourier series is chosen according to the time-varying bandwidth of the signal. The advantage of the proposed series is demonstrated by numerical results for various test signals.","PeriodicalId":184544,"journal":{"name":"2013 9th International Conference on Information, Communications & Signal Processing","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127117029","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-12-01DOI: 10.1109/ICICS.2013.6782907
Yang Yan, Lihui Chen, C. K. Chan
Semi-supervised clustering is a popular machine learning technique, used for challenge data categorization tasks, when some prior knowledge is available to users. In this paper, we report the empirical studies on our newly proposed semi-supervised clustering framework, which utilizes multiple viewpoints for the similarity measure, with the help of the prior knowledge. Two different MVS-based approaches are developed for knowledge given in either class labels or pair-wise constraints, namely LMVS and PMVS respectively. Extensive experimental studies performed on a few benchmark datasets demonstrate the effectiveness of the proposed methods. Comparisons are also made between LMVS and PMVS, together with a few well-known semi-supervised clustering algorithms.
{"title":"MVS-based semi-supervised clustering","authors":"Yang Yan, Lihui Chen, C. K. Chan","doi":"10.1109/ICICS.2013.6782907","DOIUrl":"https://doi.org/10.1109/ICICS.2013.6782907","url":null,"abstract":"Semi-supervised clustering is a popular machine learning technique, used for challenge data categorization tasks, when some prior knowledge is available to users. In this paper, we report the empirical studies on our newly proposed semi-supervised clustering framework, which utilizes multiple viewpoints for the similarity measure, with the help of the prior knowledge. Two different MVS-based approaches are developed for knowledge given in either class labels or pair-wise constraints, namely LMVS and PMVS respectively. Extensive experimental studies performed on a few benchmark datasets demonstrate the effectiveness of the proposed methods. Comparisons are also made between LMVS and PMVS, together with a few well-known semi-supervised clustering algorithms.","PeriodicalId":184544,"journal":{"name":"2013 9th International Conference on Information, Communications & Signal Processing","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127453350","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-12-01DOI: 10.1109/ICICS.2013.6782851
T. Miyata, N. Aikawa
In this paper, we propose a design method for complex coefficients FIR variable digital filter (VDF) with changeable multicomponent in the stopband. The proposed VDF has piecewise high attenuation in the stopband, and the VDF varies some characteristics in the stopband using variable parameters. The complex filter coefficients are composed polynomial expression using variable parameters to vary the filter characteristics. The proposed method, the minimization problem for the complex coefficients FIR VDF with changeable multicomponent are formulated as semidefinite programming (SDP) in the frequency domain. Finally, we demonstrate the effectiveness of the proposed method.
{"title":"A design method for complex coefficient FIR filters with variable stopband characteristics","authors":"T. Miyata, N. Aikawa","doi":"10.1109/ICICS.2013.6782851","DOIUrl":"https://doi.org/10.1109/ICICS.2013.6782851","url":null,"abstract":"In this paper, we propose a design method for complex coefficients FIR variable digital filter (VDF) with changeable multicomponent in the stopband. The proposed VDF has piecewise high attenuation in the stopband, and the VDF varies some characteristics in the stopband using variable parameters. The complex filter coefficients are composed polynomial expression using variable parameters to vary the filter characteristics. The proposed method, the minimization problem for the complex coefficients FIR VDF with changeable multicomponent are formulated as semidefinite programming (SDP) in the frequency domain. Finally, we demonstrate the effectiveness of the proposed method.","PeriodicalId":184544,"journal":{"name":"2013 9th International Conference on Information, Communications & Signal Processing","volume":"100 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126149619","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-12-01DOI: 10.1109/ICICS.2013.6782874
Q. Meng, Xinyong Dong, K. Ni, Zhemin Chen
A refractive index (RI) sensor was proposed and demonstrated. The sensor head was manufactured by splicing a section of multimode fiber between two single-mode fiber segments (SMS). The SMS structure was used as a filter and inserted into an Erbium fiber ring to generate laser, which can improved the detection accuracy of the sensor. The sensor provides an excellent linear response. RI sensitivity of 84.489 nm/RIU has been achieved and the measurement range is from 1.345 to 1.386.
{"title":"Optical fiber laser sensor for refractive index measurement","authors":"Q. Meng, Xinyong Dong, K. Ni, Zhemin Chen","doi":"10.1109/ICICS.2013.6782874","DOIUrl":"https://doi.org/10.1109/ICICS.2013.6782874","url":null,"abstract":"A refractive index (RI) sensor was proposed and demonstrated. The sensor head was manufactured by splicing a section of multimode fiber between two single-mode fiber segments (SMS). The SMS structure was used as a filter and inserted into an Erbium fiber ring to generate laser, which can improved the detection accuracy of the sensor. The sensor provides an excellent linear response. RI sensitivity of 84.489 nm/RIU has been achieved and the measurement range is from 1.345 to 1.386.","PeriodicalId":184544,"journal":{"name":"2013 9th International Conference on Information, Communications & Signal Processing","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125371087","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-12-01DOI: 10.1109/ICICS.2013.6782973
X. Mao, Y. Lee, S. Ting
Wideband channel characteristics associated with UHF wave propagation within a shopping mall in urban areas are presented in this paper. Impulse responses, decay rate of multipath components as well as the root-mean-square (RMS) delay spread obtained from wideband sounding are studied for both the same level propagation and the inter-level propagation. Due to the enclosed structure of the shopping mall, multipath components are mainly resulted from multiple reflections within the building and therefore they decay linearly for both test scenarios. Moreover, the delay spread value obtained from the measurements is within 100 ns, therefore, the usable bandwidth is sufficient for video communication.
{"title":"Wideband channel modeling within a shopping mall in UHF band","authors":"X. Mao, Y. Lee, S. Ting","doi":"10.1109/ICICS.2013.6782973","DOIUrl":"https://doi.org/10.1109/ICICS.2013.6782973","url":null,"abstract":"Wideband channel characteristics associated with UHF wave propagation within a shopping mall in urban areas are presented in this paper. Impulse responses, decay rate of multipath components as well as the root-mean-square (RMS) delay spread obtained from wideband sounding are studied for both the same level propagation and the inter-level propagation. Due to the enclosed structure of the shopping mall, multipath components are mainly resulted from multiple reflections within the building and therefore they decay linearly for both test scenarios. Moreover, the delay spread value obtained from the measurements is within 100 ns, therefore, the usable bandwidth is sufficient for video communication.","PeriodicalId":184544,"journal":{"name":"2013 9th International Conference on Information, Communications & Signal Processing","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115068577","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-12-01DOI: 10.1109/ICICS.2013.6782789
Jian-Wei Fan, Chao-Wen Chan, Ya-Fen Chang
In 2012, Hsieh and Leu proposed a remote user authentication scheme. They use cryptographic hash functions to design their scheme. By designing a method to analyse one-way hash functions, we propose two attacks on their scheme. One is masquerade attack and another is guessing attack. In addition, we point out that their scheme provides no user anonymity and propose a remote user authentication scheme. Our scheme can provide user anonymity. Based on the one-wayness of hash functions and random increasing sequence-based hash chain, our proposed scheme can resist outsider masquerade attack and insider guessing attack.
{"title":"A random increasing sequence hash chain and smart card-based remote user authentication scheme","authors":"Jian-Wei Fan, Chao-Wen Chan, Ya-Fen Chang","doi":"10.1109/ICICS.2013.6782789","DOIUrl":"https://doi.org/10.1109/ICICS.2013.6782789","url":null,"abstract":"In 2012, Hsieh and Leu proposed a remote user authentication scheme. They use cryptographic hash functions to design their scheme. By designing a method to analyse one-way hash functions, we propose two attacks on their scheme. One is masquerade attack and another is guessing attack. In addition, we point out that their scheme provides no user anonymity and propose a remote user authentication scheme. Our scheme can provide user anonymity. Based on the one-wayness of hash functions and random increasing sequence-based hash chain, our proposed scheme can resist outsider masquerade attack and insider guessing attack.","PeriodicalId":184544,"journal":{"name":"2013 9th International Conference on Information, Communications & Signal Processing","volume":"28 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114132365","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}