首页 > 最新文献

2013 9th International Conference on Information, Communications & Signal Processing最新文献

英文 中文
High efficient joint fingerprinting and decryption for multimedia distribution 用于多媒体分发的高效联合指纹和解密
Pub Date : 2013-12-01 DOI: 10.1109/ICICS.2013.6782792
Panyaporn Prangjarote, Chih-Yang Lin, C. Yeh
In fingerprint-based secure multimedia distribution systems, the encryption process is performed at the sender side before transmission, and the fingerprint embedding and decryption processes are performed at the receiver side simultaneously. In this paper, a low complexity joint fingerprint and decryption (JFD) scheme based on exclusive-or operations has been proposed, which can be effectively used for traitor tracing. The scheme encrypts only sub-pixels of the entire image using a tiny lookup table generated by a stream cipher. In the decryption process, some pixels can be completely recovered and the fingerprinting process depends on four different directions of sub-image blocks. The method successfully leaves the user's fingerprint during decryption and produces slightly different media copies. The experimental results show that the proposed scheme is highly effective in terms of perceptual security and fingerprinted visual quality.
在基于指纹的安全多媒体分发系统中,发送端在传输前进行加密处理,接收端同时进行指纹嵌入和解密处理。本文提出了一种基于异或操作的低复杂度联合指纹解密(JFD)方案,该方案可有效地用于叛逆者跟踪。该方案仅使用流密码生成的小查找表对整个图像的子像素进行加密。在解密过程中,一些像素可以完全恢复,指纹识别过程取决于子图像块的四个不同方向。该方法成功地在解密过程中留下用户的指纹,并产生略有不同的媒体副本。实验结果表明,该方案在感知安全性和指纹视觉质量方面具有很高的有效性。
{"title":"High efficient joint fingerprinting and decryption for multimedia distribution","authors":"Panyaporn Prangjarote, Chih-Yang Lin, C. Yeh","doi":"10.1109/ICICS.2013.6782792","DOIUrl":"https://doi.org/10.1109/ICICS.2013.6782792","url":null,"abstract":"In fingerprint-based secure multimedia distribution systems, the encryption process is performed at the sender side before transmission, and the fingerprint embedding and decryption processes are performed at the receiver side simultaneously. In this paper, a low complexity joint fingerprint and decryption (JFD) scheme based on exclusive-or operations has been proposed, which can be effectively used for traitor tracing. The scheme encrypts only sub-pixels of the entire image using a tiny lookup table generated by a stream cipher. In the decryption process, some pixels can be completely recovered and the fingerprinting process depends on four different directions of sub-image blocks. The method successfully leaves the user's fingerprint during decryption and produces slightly different media copies. The experimental results show that the proposed scheme is highly effective in terms of perceptual security and fingerprinted visual quality.","PeriodicalId":184544,"journal":{"name":"2013 9th International Conference on Information, Communications & Signal Processing","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124729093","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Web image mining for facial age estimation 基于Web图像挖掘的面部年龄估计
Pub Date : 2013-12-01 DOI: 10.1109/ICICS.2013.6782962
Phyo-Kyaw Sai, Jian-Gang Wang, E. Teoh
Face image based age estimation is an approach to classify face images into one of several pre-defined age-groups. It is challenging because the aging variation is specific to a given individual and is determined by not only the person's gene, but also by many external factors, such as exposure, weather conditions (e.g. ambient humidity), health, gender, living style and living location. Age categorization is a multiclass problem. Lack of a good public aging dataset makes it difficult to estimate age from face image. Due to large multiclass nature of human ages, it is difficult to collect large aging database. In this paper, we proposed a novel approach to collect high quality aging face images. Application Programming Interface (API) services provided by Microsoft Search Engine Bing are adopted for this purpose. Automatic collection of age-specified query images was implemented in C# programming interface with Microsoft BING API services. The experimental results of age estimation has verified that our approach is a good way to collect aging images in huge volume since internet hosts a large number of images with age labeling. It serves as an alternative cheap platform to gather face images for age classification.
基于人脸图像的年龄估计是一种将人脸图像划分为几个预先定义的年龄组之一的方法。这是具有挑战性的,因为衰老变化是特定于特定个体的,不仅由人的基因决定,还受许多外部因素的影响,如暴露、天气条件(如环境湿度)、健康状况、性别、生活方式和生活地点。年龄分类是一个多类问题。由于缺乏一个好的公共年龄数据集,很难从人脸图像中估计年龄。由于人类年龄具有大的多类性,因此很难收集到大型的年龄数据库。本文提出了一种采集高质量老化人脸图像的新方法。采用微软搜索引擎必应提供的API (Application Programming Interface)服务。使用Microsoft BING API服务在c#编程接口中实现了年龄指定查询图像的自动收集。年龄估计的实验结果表明,由于互联网上存在大量带有年龄标记的图像,我们的方法是一种很好的大量收集年龄图像的方法。它可以作为另一种廉价的平台来收集面部图像进行年龄分类。
{"title":"Web image mining for facial age estimation","authors":"Phyo-Kyaw Sai, Jian-Gang Wang, E. Teoh","doi":"10.1109/ICICS.2013.6782962","DOIUrl":"https://doi.org/10.1109/ICICS.2013.6782962","url":null,"abstract":"Face image based age estimation is an approach to classify face images into one of several pre-defined age-groups. It is challenging because the aging variation is specific to a given individual and is determined by not only the person's gene, but also by many external factors, such as exposure, weather conditions (e.g. ambient humidity), health, gender, living style and living location. Age categorization is a multiclass problem. Lack of a good public aging dataset makes it difficult to estimate age from face image. Due to large multiclass nature of human ages, it is difficult to collect large aging database. In this paper, we proposed a novel approach to collect high quality aging face images. Application Programming Interface (API) services provided by Microsoft Search Engine Bing are adopted for this purpose. Automatic collection of age-specified query images was implemented in C# programming interface with Microsoft BING API services. The experimental results of age estimation has verified that our approach is a good way to collect aging images in huge volume since internet hosts a large number of images with age labeling. It serves as an alternative cheap platform to gather face images for age classification.","PeriodicalId":184544,"journal":{"name":"2013 9th International Conference on Information, Communications & Signal Processing","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128575360","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Efficient resiliency mechanisms for next generation passive optical networks 新一代无源光网络的有效弹性机制
Pub Date : 2013-12-01 DOI: 10.1109/ICICS.2013.6782903
Jiajia Chen
Future broadband access networks are expected to cover large service areas while fulfilling high bandwidth request on a per-user basis. The rapidly increasing traffic demand is also driven by the growing popularity of mobile data services, which is placing high-capacity requirement on the backhaul. Due to advances in wavelength division multiplexing (WDM) technology, WDM based architectures have been considered as promising candidates for next generation optical access, such as WDM passive optical network (PON), and hybrid WDM/time division multiplexing (TDM) PON. Meanwhile, resilience technique will play a more prominent role in emerging access networks due to their significantly increased capacity and coverage compared to the current deployments. Therefore, efficient resiliency mechanisms are highly required to enable uninterrupted network operation where a certain level of reliability performance can be guaranteed. In this work, we first evaluate reliability performance of each segment of next generation optical access networks and then identify the most important part for protection. A particular attention is paid to the reduction of failure impact.
未来的宽带接入网预计将覆盖更大的业务区域,同时满足每个用户的高带宽需求。快速增长的流量需求也受到移动数据业务日益普及的推动,这对回程提出了高容量要求。由于波分复用(WDM)技术的进步,基于WDM的架构被认为是下一代光接入的有希望的候选者,例如WDM无源光网络(PON)和WDM/时分复用(TDM)混合PON。与此同时,弹性技术将在新兴接入网中发挥更加突出的作用,因为它们的容量和覆盖范围比目前的部署要大得多。因此,需要高效的弹性机制来实现不间断的网络运行,保证一定程度的可靠性性能。在这项工作中,我们首先评估下一代光接入网的每个段的可靠性性能,然后确定最重要的保护部分。特别注意的是减少故障的影响。
{"title":"Efficient resiliency mechanisms for next generation passive optical networks","authors":"Jiajia Chen","doi":"10.1109/ICICS.2013.6782903","DOIUrl":"https://doi.org/10.1109/ICICS.2013.6782903","url":null,"abstract":"Future broadband access networks are expected to cover large service areas while fulfilling high bandwidth request on a per-user basis. The rapidly increasing traffic demand is also driven by the growing popularity of mobile data services, which is placing high-capacity requirement on the backhaul. Due to advances in wavelength division multiplexing (WDM) technology, WDM based architectures have been considered as promising candidates for next generation optical access, such as WDM passive optical network (PON), and hybrid WDM/time division multiplexing (TDM) PON. Meanwhile, resilience technique will play a more prominent role in emerging access networks due to their significantly increased capacity and coverage compared to the current deployments. Therefore, efficient resiliency mechanisms are highly required to enable uninterrupted network operation where a certain level of reliability performance can be guaranteed. In this work, we first evaluate reliability performance of each segment of next generation optical access networks and then identify the most important part for protection. A particular attention is paid to the reduction of failure impact.","PeriodicalId":184544,"journal":{"name":"2013 9th International Conference on Information, Communications & Signal Processing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128769363","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Glottal activity detection using Finite Rate of Innovation methods 利用有限创新率方法检测声门活动
Pub Date : 2013-12-01 DOI: 10.1109/ICICS.2013.6782776
T. Amin, P. Marziliano
A novel algorithm which accurately determines the glottal closing instants and glottal opening instants from the Differentiated Electroglottographic signals is presented.The glottal closing instants and glottal opening instant are modeled as non-bandlimited signals and methods for sampling and reconstructing signals with Finite Rate of Innovation are then used to recover the glottal closing instants and glottal opening instants. In comparison with existing methods, the proposed scheme achieves improved performance by providing 99% reliable estimates of glottal closing and opening instants respectively.
提出了一种从差分声门电信号中准确确定声门关闭时刻和声门打开时刻的算法。将声门关闭和声门打开时刻建模为无带宽限制的信号,采用有限创新率采样和重构信号的方法恢复声门关闭和声门打开时刻。与现有方法相比,该方法分别提供99%可靠的声门关闭和打开时刻估计,从而提高了性能。
{"title":"Glottal activity detection using Finite Rate of Innovation methods","authors":"T. Amin, P. Marziliano","doi":"10.1109/ICICS.2013.6782776","DOIUrl":"https://doi.org/10.1109/ICICS.2013.6782776","url":null,"abstract":"A novel algorithm which accurately determines the glottal closing instants and glottal opening instants from the Differentiated Electroglottographic signals is presented.The glottal closing instants and glottal opening instant are modeled as non-bandlimited signals and methods for sampling and reconstructing signals with Finite Rate of Innovation are then used to recover the glottal closing instants and glottal opening instants. In comparison with existing methods, the proposed scheme achieves improved performance by providing 99% reliable estimates of glottal closing and opening instants respectively.","PeriodicalId":184544,"journal":{"name":"2013 9th International Conference on Information, Communications & Signal Processing","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129394142","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Statistical properties for cascaded Rayleigh fading channel models 级联瑞利衰落信道模型的统计特性
Pub Date : 2013-12-01 DOI: 10.1109/ICICS.2013.6782974
Y. Ibdah, Yanwu Ding
In this paper, statistical models for cascaded Rayleigh fading channels with and without line-of-sight (LOS) are presented. The models comprise two individual summations of sinusoids with the Doppler frequencies calculated using fewer variables to reduce complexity. Statistical properties, including auto- and cross-correlations of the in-phase, quadrature components, and squared envelopes of the channels, are derived. The time-average statistical properties and the corresponding variance are also investigated to justify the convergence performance of the proposed models. Simulation results are provided to validate the performance of proposed models.
本文给出了有视距和无视距时级联瑞利衰落信道的统计模型。该模型包括两个独立的正弦和多普勒频率计算使用较少的变量,以减少复杂性。统计特性,包括自相关和互相关的同相,正交分量,和通道的平方包络,推导。研究了时间平均统计特性和相应的方差,以证明所提出模型的收敛性能。仿真结果验证了所提模型的性能。
{"title":"Statistical properties for cascaded Rayleigh fading channel models","authors":"Y. Ibdah, Yanwu Ding","doi":"10.1109/ICICS.2013.6782974","DOIUrl":"https://doi.org/10.1109/ICICS.2013.6782974","url":null,"abstract":"In this paper, statistical models for cascaded Rayleigh fading channels with and without line-of-sight (LOS) are presented. The models comprise two individual summations of sinusoids with the Doppler frequencies calculated using fewer variables to reduce complexity. Statistical properties, including auto- and cross-correlations of the in-phase, quadrature components, and squared envelopes of the channels, are derived. The time-average statistical properties and the corresponding variance are also investigated to justify the convergence performance of the proposed models. Simulation results are provided to validate the performance of proposed models.","PeriodicalId":184544,"journal":{"name":"2013 9th International Conference on Information, Communications & Signal Processing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130931099","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Hybrid routing in lossy link mobile ad hoc networks 有损链路移动自组网中的混合路由
Pub Date : 2013-12-01 DOI: 10.1109/ICICS.2013.6782952
C. Aung, P. Chong, Xinxing Zhao, Anthony Chua Yong Pheng, Tiah Khoon Ng, See Xinyou, Kok Siong Lai
Routing protocols in mobile ad hoc network (MANET) are designed to provide data delivery in frequently changing network topology. Existing MANET routing protocols set up an end-to-end path between source and destination prior to data forwarding. Maintaining a connected path before data delivery may not work well when the network is partially disconnected or disrupted. This paper discusses Opportunistic Multi-link Delay Tolerant Routing (OMDTR) which is designed to provide data delivery in the network where fully connected network topology is not guaranteed. OMDTR learns the local network connectivity and deliver the data if there is connectivity within two-hop. OMDTR exploits the robustness of flooding-based routing when there is no local network connectivity. Performance measurements of OMDTR protocol show that OMDTR increases the data delivery compared to pure flooding-based routing and pure end-to-end routing in mobile multi-hop wireless network with relatively high and low network density.
移动自组织网络(MANET)中的路由协议是为了在频繁变化的网络拓扑中提供数据传输而设计的。现有的MANET路由协议在数据转发之前在源和目标之间建立了端到端路径。当网络部分断开或中断时,在数据传递之前保持连接的路径可能无法很好地工作。本文讨论了机会多链路容错路由(OMDTR),它被设计用于在不能保证完全连接的网络拓扑结构的网络中提供数据传输。OMDTR学习本地网络的连通性,如果在两跳内有连通性,就发送数据。当没有本地网络连接时,OMDTR利用了基于洪水的路由的鲁棒性。对OMDTR协议的性能测试表明,在网络密度相对较高和较低的移动多跳无线网络中,OMDTR协议比纯泛洪路由和纯端到端路由增加了数据传输。
{"title":"Hybrid routing in lossy link mobile ad hoc networks","authors":"C. Aung, P. Chong, Xinxing Zhao, Anthony Chua Yong Pheng, Tiah Khoon Ng, See Xinyou, Kok Siong Lai","doi":"10.1109/ICICS.2013.6782952","DOIUrl":"https://doi.org/10.1109/ICICS.2013.6782952","url":null,"abstract":"Routing protocols in mobile ad hoc network (MANET) are designed to provide data delivery in frequently changing network topology. Existing MANET routing protocols set up an end-to-end path between source and destination prior to data forwarding. Maintaining a connected path before data delivery may not work well when the network is partially disconnected or disrupted. This paper discusses Opportunistic Multi-link Delay Tolerant Routing (OMDTR) which is designed to provide data delivery in the network where fully connected network topology is not guaranteed. OMDTR learns the local network connectivity and deliver the data if there is connectivity within two-hop. OMDTR exploits the robustness of flooding-based routing when there is no local network connectivity. Performance measurements of OMDTR protocol show that OMDTR increases the data delivery compared to pure flooding-based routing and pure end-to-end routing in mobile multi-hop wireless network with relatively high and low network density.","PeriodicalId":184544,"journal":{"name":"2013 9th International Conference on Information, Communications & Signal Processing","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125730032","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Robust watermarking scheme for medical image using optimization method 基于优化方法的医学图像鲁棒水印方案
Pub Date : 2013-12-01 DOI: 10.1109/ICICS.2013.6782932
B. Lei, Tianfu Wang, Siping Chen, Dong Ni, Haijun Lei
Currently, most medical images are stored and exchanged without any consideration of security, and hence it is highly desirable to provide content protection for medical images that are used in a secured environment. In this paper, a new and robust watermarking method is proposed to address this security issue. Specifically, signature information and textual data are inserted into the original medical images. The integer wavelet transform (IWT) are combined with singular value decomposition (SVD) to provide robustness in the proposed method. Meanwhile, differential evolution (DE) is used to optimally design the quantization steps (QSs) for controlling the watermarking strength. With hybrid techniques such as IWT, SVD, and DE, the proposed watermarking algorithm not only achieves good imperceptibility, but also high robustness. Experimental results demonstrate that the proposed method outperforms existing methods.
目前,大多数医学图像的存储和交换都没有考虑到安全性,因此非常需要为在安全环境中使用的医学图像提供内容保护。本文提出了一种新的鲁棒水印方法来解决这一安全问题。具体而言,在原始医学图像中插入签名信息和文本数据。该方法将整数小波变换与奇异值分解相结合,增强了算法的鲁棒性。同时,采用差分进化算法优化设计量化步骤,控制水印强度。该算法采用小波变换、奇异值分解和分解等混合技术,不仅具有良好的不可感知性,而且具有较高的鲁棒性。实验结果表明,该方法优于现有方法。
{"title":"Robust watermarking scheme for medical image using optimization method","authors":"B. Lei, Tianfu Wang, Siping Chen, Dong Ni, Haijun Lei","doi":"10.1109/ICICS.2013.6782932","DOIUrl":"https://doi.org/10.1109/ICICS.2013.6782932","url":null,"abstract":"Currently, most medical images are stored and exchanged without any consideration of security, and hence it is highly desirable to provide content protection for medical images that are used in a secured environment. In this paper, a new and robust watermarking method is proposed to address this security issue. Specifically, signature information and textual data are inserted into the original medical images. The integer wavelet transform (IWT) are combined with singular value decomposition (SVD) to provide robustness in the proposed method. Meanwhile, differential evolution (DE) is used to optimally design the quantization steps (QSs) for controlling the watermarking strength. With hybrid techniques such as IWT, SVD, and DE, the proposed watermarking algorithm not only achieves good imperceptibility, but also high robustness. Experimental results demonstrate that the proposed method outperforms existing methods.","PeriodicalId":184544,"journal":{"name":"2013 9th International Conference on Information, Communications & Signal Processing","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114576074","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
On the design of GSC beamformer in reverberant environment 混响环境下GSC波束形成器的设计
Pub Date : 2013-12-01 DOI: 10.1109/ICICS.2013.6782893
Zhibao Li, K. Yiu
The generalized sidelobe canceller (GSC) beamformer is an effective and efficient technique for speech enhancement, whereas the design of beamformer is still a challenge in a reverberant environment, due to the difficulty of room impulse responses (RIRs) estimation. In this paper, we will study the design of GSC beamformer based on the RIRs estimated by image source method, which is a simple but effective method for room acoustics simulation.
广义旁瓣对消波束形成器是一种有效的语音增强技术,但在混响环境下,由于房间脉冲响应估计困难,波束形成器的设计仍然是一个挑战。本文将研究基于像源法估计RIRs的GSC波束形成器的设计,这是一种简单而有效的室内声学仿真方法。
{"title":"On the design of GSC beamformer in reverberant environment","authors":"Zhibao Li, K. Yiu","doi":"10.1109/ICICS.2013.6782893","DOIUrl":"https://doi.org/10.1109/ICICS.2013.6782893","url":null,"abstract":"The generalized sidelobe canceller (GSC) beamformer is an effective and efficient technique for speech enhancement, whereas the design of beamformer is still a challenge in a reverberant environment, due to the difficulty of room impulse responses (RIRs) estimation. In this paper, we will study the design of GSC beamformer based on the RIRs estimated by image source method, which is a simple but effective method for room acoustics simulation.","PeriodicalId":184544,"journal":{"name":"2013 9th International Conference on Information, Communications & Signal Processing","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121100362","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Convex optimization and its applications in robust adaptive beamforming 凸优化及其在鲁棒自适应波束形成中的应用
Pub Date : 2013-12-01 DOI: 10.1109/ICICS.2013.6782919
Z. Yu, Z. Gu, W. Ser, M. Er
Convex optimization plays an important role in science and engineering research. In many signal processing applications, convex optimization is one of the critical mathematical tools. For example, robust adaptive beamformer is always formulated as quadratic optimization problem with some linear or quadratic constraints. In this paper, we review some of the progresses of our group on using Constraints on Magnitude Response (CMRs) for robust adaptive beamforming. Some mathematical skills on how to transform the beamformer with CMRs into convex programming problems are introduced. With proper convex formulations, the proposed beamformers posses simple implementation, flexible performance control, as well as significant SINR enhancement.
凸优化在科学和工程研究中有着重要的作用。在许多信号处理应用中,凸优化是重要的数学工具之一。例如,鲁棒自适应波束形成器通常被表述为带有一些线性或二次约束的二次优化问题。本文综述了本课组在利用幅度响应约束(CMRs)实现鲁棒自适应波束形成方面的一些研究进展。介绍了将带cmr的波束形成器转化为凸规划问题的一些数学技巧。该波束形成器采用适当的凸型设计,实现简单,性能控制灵活,信噪比显著提高。
{"title":"Convex optimization and its applications in robust adaptive beamforming","authors":"Z. Yu, Z. Gu, W. Ser, M. Er","doi":"10.1109/ICICS.2013.6782919","DOIUrl":"https://doi.org/10.1109/ICICS.2013.6782919","url":null,"abstract":"Convex optimization plays an important role in science and engineering research. In many signal processing applications, convex optimization is one of the critical mathematical tools. For example, robust adaptive beamformer is always formulated as quadratic optimization problem with some linear or quadratic constraints. In this paper, we review some of the progresses of our group on using Constraints on Magnitude Response (CMRs) for robust adaptive beamforming. Some mathematical skills on how to transform the beamformer with CMRs into convex programming problems are introduced. With proper convex formulations, the proposed beamformers posses simple implementation, flexible performance control, as well as significant SINR enhancement.","PeriodicalId":184544,"journal":{"name":"2013 9th International Conference on Information, Communications & Signal Processing","volume":"156 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126897159","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
GPP-based optimization for joint-detection in TD-SCDMA uplink 基于gpp的TD-SCDMA上行链路联合检测优化
Pub Date : 2013-12-01 DOI: 10.1109/ICICS.2013.6782863
Jinde Zhou, K. Niu, Zhiqiang He, Jiaru Lin
Joint detection is a high complexity module in TD-SCDMA system. This paper analyzes the selection of algorithm, and presents an overview of optimization methods for the selected algorithm based on general purpose processors (GPPs) It includes look-up-able (LUT), Single Instruction Multiple Data (SIMD) and Intel Integrated Performance Primitives (Intel IPP) Library. The results of timing test illustrate that with utilizing these methods, the joint detection module in TD-SCDMA system can achieve huge benefits in real-time performance.
联合检测是TD-SCDMA系统中复杂度较高的模块。本文分析了算法的选择,并概述了基于通用处理器(GPPs)的算法选择的优化方法,包括可查找(LUT)、单指令多数据(SIMD)和英特尔集成性能原语(Intel IPP)库。时序测试结果表明,利用这些方法,TD-SCDMA系统中的联合检测模块在实时性方面取得了巨大的优势。
{"title":"GPP-based optimization for joint-detection in TD-SCDMA uplink","authors":"Jinde Zhou, K. Niu, Zhiqiang He, Jiaru Lin","doi":"10.1109/ICICS.2013.6782863","DOIUrl":"https://doi.org/10.1109/ICICS.2013.6782863","url":null,"abstract":"Joint detection is a high complexity module in TD-SCDMA system. This paper analyzes the selection of algorithm, and presents an overview of optimization methods for the selected algorithm based on general purpose processors (GPPs) It includes look-up-able (LUT), Single Instruction Multiple Data (SIMD) and Intel Integrated Performance Primitives (Intel IPP) Library. The results of timing test illustrate that with utilizing these methods, the joint detection module in TD-SCDMA system can achieve huge benefits in real-time performance.","PeriodicalId":184544,"journal":{"name":"2013 9th International Conference on Information, Communications & Signal Processing","volume":"58 36","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131471042","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2013 9th International Conference on Information, Communications & Signal Processing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1