首页 > 最新文献

2013 9th International Conference on Information, Communications & Signal Processing最新文献

英文 中文
Impulsive noise mitigation using an adaptive WMA-MVDR estimator for array based wireless communications 基于阵列无线通信的自适应WMA-MVDR估计脉冲噪声抑制
Pub Date : 2013-12-01 DOI: 10.1109/ICICS.2013.6782865
Xing Guang John Yang, W. Ser, S. G. Razul, C. See
In this paper, we propose an adaptive WMA-MVDR estimator for mitigating impulsive noise in a multiple-access interference (MAI) environment. A time-domain Bernoulli-Gaussian process is used to model the impulsive noise. The estimator comprises two stages of processing: an adaptive window-mean amplitude (WMA) filter and a modified MVDR (Minimum Variance Distortionless Response) estimator. Numerical results show that the bit error rate (BER) performance of the proposed algorithm outperforms some existing estimators under the impulsive noise environment.
本文提出了一种自适应WMA-MVDR估计器,用于抑制多址干扰(MAI)环境下的脉冲噪声。采用时域伯努利-高斯过程对脉冲噪声进行建模。该估计器包括两个处理阶段:自适应窗均幅(WMA)滤波器和改进的最小方差无失真响应(MVDR)估计器。数值结果表明,在脉冲噪声环境下,该算法的误码率(BER)性能优于现有的估计器。
{"title":"Impulsive noise mitigation using an adaptive WMA-MVDR estimator for array based wireless communications","authors":"Xing Guang John Yang, W. Ser, S. G. Razul, C. See","doi":"10.1109/ICICS.2013.6782865","DOIUrl":"https://doi.org/10.1109/ICICS.2013.6782865","url":null,"abstract":"In this paper, we propose an adaptive WMA-MVDR estimator for mitigating impulsive noise in a multiple-access interference (MAI) environment. A time-domain Bernoulli-Gaussian process is used to model the impulsive noise. The estimator comprises two stages of processing: an adaptive window-mean amplitude (WMA) filter and a modified MVDR (Minimum Variance Distortionless Response) estimator. Numerical results show that the bit error rate (BER) performance of the proposed algorithm outperforms some existing estimators under the impulsive noise environment.","PeriodicalId":184544,"journal":{"name":"2013 9th International Conference on Information, Communications & Signal Processing","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124556443","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A simple >100-Gb/s multiband DDO-OFDM receiver for high splitting ratio long reach PON systems 一种简单的> 100gb /s多频带do - ofdm接收机,适用于高分割比长程PON系统
Pub Date : 2013-12-01 DOI: 10.1109/ICICS.2013.6782795
K. Feng, Jhih-Heng Yan, You-Wei Chen
In this paper, we demonstrate a simple receiving system for decoding a >100-Gb/s double-sided multiband DDO-OFDM system. In a LR-PON system, with this simple receiving design, 120 Gb/s capacity and splitting ratio of 128 have been achieved.
在本文中,我们展示了一个简单的接收系统解码>100 gb /s的双面多波段的DDO-OFDM系统。在LR-PON系统中,采用这种简单的接收设计,实现了120gb /s的容量和128的分割比。
{"title":"A simple >100-Gb/s multiband DDO-OFDM receiver for high splitting ratio long reach PON systems","authors":"K. Feng, Jhih-Heng Yan, You-Wei Chen","doi":"10.1109/ICICS.2013.6782795","DOIUrl":"https://doi.org/10.1109/ICICS.2013.6782795","url":null,"abstract":"In this paper, we demonstrate a simple receiving system for decoding a >100-Gb/s double-sided multiband DDO-OFDM system. In a LR-PON system, with this simple receiving design, 120 Gb/s capacity and splitting ratio of 128 have been achieved.","PeriodicalId":184544,"journal":{"name":"2013 9th International Conference on Information, Communications & Signal Processing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129082412","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Provably secure mutual authentication and key agreement scheme with user anonymity 具有用户匿名性的可证明安全的相互认证和密钥协议方案
Pub Date : 2013-12-01 DOI: 10.1109/ICICS.2013.6782847
T. Hwang, P. Gope
With the widespread use of several mobile gadgets, privacy and anonymity of the mobile subscriber becomes a major issue in mobile communication. Through the roaming technology of the global mobility networks, a legitimate subscriber can enjoy the ubiquitous services. Where, the mutual authentication and key agreement between the mobile subscriber and roaming network (VLR/SGSN) is the primary security aspect of many commercial mobile networks. For personal privacy perspective, it is important to develop a mutual authentication and key agreement scheme with several security features including the user anonymity. In this article, we come up with a novel authentication and key agreement scheme, which can assure privacy against eavesdroppers (PAE) with the subscriber anonymity. Simultaneously, here we argue that the proposed scheme can also withstand several other security vulnerabilities like redirection attack, forging-mobile-user attack and location privacy etc. with the less communication cost.
随着各种移动设备的广泛使用,移动用户的隐私和匿名成为移动通信中的一个主要问题。通过全球移动网络的漫游技术,合法用户可以享受无处不在的服务。其中,移动用户与漫游网络(VLR/SGSN)之间的相互认证和密钥协议是许多商用移动网络安全的主要方面。从个人隐私的角度来看,开发一个具有包括用户匿名在内的多个安全特性的相互认证和密钥协议方案是很重要的。在本文中,我们提出了一种新的身份验证和密钥协议方案,该方案可以在用户匿名的情况下保证用户的隐私不被窃听。同时,我们认为该方案还可以抵御重定向攻击、伪造移动用户攻击和位置隐私等其他安全漏洞,并且通信成本较低。
{"title":"Provably secure mutual authentication and key agreement scheme with user anonymity","authors":"T. Hwang, P. Gope","doi":"10.1109/ICICS.2013.6782847","DOIUrl":"https://doi.org/10.1109/ICICS.2013.6782847","url":null,"abstract":"With the widespread use of several mobile gadgets, privacy and anonymity of the mobile subscriber becomes a major issue in mobile communication. Through the roaming technology of the global mobility networks, a legitimate subscriber can enjoy the ubiquitous services. Where, the mutual authentication and key agreement between the mobile subscriber and roaming network (VLR/SGSN) is the primary security aspect of many commercial mobile networks. For personal privacy perspective, it is important to develop a mutual authentication and key agreement scheme with several security features including the user anonymity. In this article, we come up with a novel authentication and key agreement scheme, which can assure privacy against eavesdroppers (PAE) with the subscriber anonymity. Simultaneously, here we argue that the proposed scheme can also withstand several other security vulnerabilities like redirection attack, forging-mobile-user attack and location privacy etc. with the less communication cost.","PeriodicalId":184544,"journal":{"name":"2013 9th International Conference on Information, Communications & Signal Processing","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129347223","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
The effect of pulse shaping on the performance of physical-layer network coding with time synchronization errors 脉冲整形对具有时间同步误差的物理层网络编码性能的影响
Pub Date : 2013-12-01 DOI: 10.1109/ICICS.2013.6782921
Rongkuan Liu, G. Wang, Bo Li
Physical-layer network coding (PNC) is a natural extension of network coding in wireless communication networks. PNC utilizes the addition characteristic of the electromagnetic wave rationally and improves the throughout in wireless networks significantly. This paper focuses on a key issue in PNC: the effect of pulse shaping on the performance of time synchronization errors. Analysis and simulation results show that raised cosine pulse with roll-off coefficient of zero can resist power penalty furthest due to time synchronization errors in PNC when adopting pulse shaping without ISI. Also when adopting Gaussian pulse shaping, we can get the best effect with parameter of one on resisting power penalty due to time synchronization errors in PNC.
物理层网络编码(PNC)是无线通信网络中网络编码的自然延伸。PNC合理地利用了电磁波的附加特性,显著提高了无线网络的通达性。本文重点研究了PNC中的一个关键问题:脉冲整形对时间同步误差性能的影响。分析和仿真结果表明,采用无ISI的脉冲整形时,滚转系数为零的升余弦脉冲能最大程度地抵抗PNC中时间同步误差带来的功率损失。采用高斯脉冲整形时,以1为参数对PNC中由于时间同步误差引起的功率惩罚效果最好。
{"title":"The effect of pulse shaping on the performance of physical-layer network coding with time synchronization errors","authors":"Rongkuan Liu, G. Wang, Bo Li","doi":"10.1109/ICICS.2013.6782921","DOIUrl":"https://doi.org/10.1109/ICICS.2013.6782921","url":null,"abstract":"Physical-layer network coding (PNC) is a natural extension of network coding in wireless communication networks. PNC utilizes the addition characteristic of the electromagnetic wave rationally and improves the throughout in wireless networks significantly. This paper focuses on a key issue in PNC: the effect of pulse shaping on the performance of time synchronization errors. Analysis and simulation results show that raised cosine pulse with roll-off coefficient of zero can resist power penalty furthest due to time synchronization errors in PNC when adopting pulse shaping without ISI. Also when adopting Gaussian pulse shaping, we can get the best effect with parameter of one on resisting power penalty due to time synchronization errors in PNC.","PeriodicalId":184544,"journal":{"name":"2013 9th International Conference on Information, Communications & Signal Processing","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115924186","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Adaptive fuzzy ontology for student assessment 学生评价的自适应模糊本体
Pub Date : 2013-12-01 DOI: 10.1109/ICICS.2013.6782880
Chang-Shing Lee, Mei-Hui Wang, I-Hsiang Chen, Su-Wei Lin, Pi-Hsia Hung
The traditional test usually uses a score to present the students' learning performance; however, it seems difficult to clearly understand the students' learning performance only by the score. As a result, this paper proposes an adaptive fuzzy ontology for student learning assessment and applies it to mathematics area. First, the domain experts construct the adaptive mathematics fuzzy ontology by referring to the guidelines of mathematics learning area in Grades 1-9 curriculum. The natural language processing mechanism tags each term with its speech and then filters the terms with useless speeches from the response data. Based on the genetic learning mechanism, the fuzzy reasoning mechanism then reasons the similarity strength between the kept terms and the constructed ontology. The semantic summary mechanism next summarizes the students' learning performance based on the inferred results. Finally, the diagnosis report mechanism presents the diagnosed reports to make officers, teachers, and students themselves much understand examinees' learning progress. Experimental results indicate that the proposed method can generate the suitable summarized sentences to allow teachers to quickly understand which mathematical topic is the one that students should be improved in the future.
传统的考试通常用分数来展示学生的学习表现;然而,仅凭分数似乎很难清楚地了解学生的学习表现。为此,本文提出了一种用于学生学习评价的自适应模糊本体,并将其应用于数学领域。首先,领域专家参照1-9年级课程中数学学习领域的指导思想,构建自适应数学模糊本体。自然语言处理机制用其语音标记每个术语,然后从响应数据中过滤出具有无用语音的术语。在遗传学习机制的基础上,模糊推理机制对保留的术语与构建的本体之间的相似度进行推理。然后,语义总结机制根据推断结果对学生的学习表现进行总结。最后,通过诊断报告机制呈现诊断报告,使领导、教师和学生自己都能更好地了解考生的学习进度。实验结果表明,该方法可以生成合适的总结句,让教师快速了解学生未来需要改进的数学主题。
{"title":"Adaptive fuzzy ontology for student assessment","authors":"Chang-Shing Lee, Mei-Hui Wang, I-Hsiang Chen, Su-Wei Lin, Pi-Hsia Hung","doi":"10.1109/ICICS.2013.6782880","DOIUrl":"https://doi.org/10.1109/ICICS.2013.6782880","url":null,"abstract":"The traditional test usually uses a score to present the students' learning performance; however, it seems difficult to clearly understand the students' learning performance only by the score. As a result, this paper proposes an adaptive fuzzy ontology for student learning assessment and applies it to mathematics area. First, the domain experts construct the adaptive mathematics fuzzy ontology by referring to the guidelines of mathematics learning area in Grades 1-9 curriculum. The natural language processing mechanism tags each term with its speech and then filters the terms with useless speeches from the response data. Based on the genetic learning mechanism, the fuzzy reasoning mechanism then reasons the similarity strength between the kept terms and the constructed ontology. The semantic summary mechanism next summarizes the students' learning performance based on the inferred results. Finally, the diagnosis report mechanism presents the diagnosed reports to make officers, teachers, and students themselves much understand examinees' learning progress. Experimental results indicate that the proposed method can generate the suitable summarized sentences to allow teachers to quickly understand which mathematical topic is the one that students should be improved in the future.","PeriodicalId":184544,"journal":{"name":"2013 9th International Conference on Information, Communications & Signal Processing","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125824744","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Lifetime maximization of secondary cooperative systems in underlay cognitive radio networks 底层认知无线电网络中二次协作系统的生命周期最大化
Pub Date : 2013-12-01 DOI: 10.1109/ICICS.2013.6782945
Hao Yu, Li-Chung Lo, Wan-Jen Huang
In this work, we consider relay selection strategy in an amplify-and-forward cooperative cognitive ratio system in order to prolong lifetime of the energy-constrained relay network. The network lifetime considered in this work is based on the outage probability of the secondary cooperative system. Not only the channel condition of each relay, selection of best relay has to satisfy the interference constraint for primary user as well as the residual power of each relay. Here, we proposed four strategies to select the relay for prolonging the lifetime depending on the channel state information (CSI) and residual energy information (REI). From the simulation results, the minimum outage probability strategy (MOP) performs the best among four strategies.
为了延长能量受限的中继网络的寿命,研究了放大转发合作认知比系统中的中继选择策略。本文考虑的网络生存期是基于二次协作系统的中断概率。最佳中继的选择不仅要满足各中继的信道条件,还要满足主用户的干扰约束和各中继的剩余功率。在此,我们提出了四种基于信道状态信息(CSI)和剩余能量信息(REI)来选择延长寿命的中继的策略。从仿真结果来看,最小中断概率策略(MOP)在四种策略中性能最好。
{"title":"Lifetime maximization of secondary cooperative systems in underlay cognitive radio networks","authors":"Hao Yu, Li-Chung Lo, Wan-Jen Huang","doi":"10.1109/ICICS.2013.6782945","DOIUrl":"https://doi.org/10.1109/ICICS.2013.6782945","url":null,"abstract":"In this work, we consider relay selection strategy in an amplify-and-forward cooperative cognitive ratio system in order to prolong lifetime of the energy-constrained relay network. The network lifetime considered in this work is based on the outage probability of the secondary cooperative system. Not only the channel condition of each relay, selection of best relay has to satisfy the interference constraint for primary user as well as the residual power of each relay. Here, we proposed four strategies to select the relay for prolonging the lifetime depending on the channel state information (CSI) and residual energy information (REI). From the simulation results, the minimum outage probability strategy (MOP) performs the best among four strategies.","PeriodicalId":184544,"journal":{"name":"2013 9th International Conference on Information, Communications & Signal Processing","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125866893","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Image denoising via sparse representations over Sequential Generalization of K-means (SGK) 基于序列广义k均值(SGK)的稀疏表示图像去噪
Pub Date : 2013-12-01 DOI: 10.1109/ICICS.2013.6782831
S. K. Sahoo, A. Makur
We have recently proposed a Sequential Generalization of K-means (SGK) to train dictionary for sparse representation. SGK's training performance is as effective as the standard dictionary training algorithm K-SVD, alongside it has a simpler implementation to its advantage. In this piece of work, through the problem of image denoising, we are making a fair comparison between the usability of SGK and K-SVD. The obtained results suggest that we can successfully replace K-SVD with SGK, due to its quicker execution and comparable outcomes. Similarly, it is possible to extend the use of SGK to other applications of sparse representation.
我们最近提出了一种k均值序列泛化(SGK)方法来训练字典的稀疏表示。SGK的训练性能与标准字典训练算法K-SVD一样有效,同时它具有更简单的实现优势。在这项工作中,通过图像去噪问题,我们对SGK和K-SVD的可用性进行了公平的比较。所获得的结果表明,我们可以成功地用SGK代替K-SVD,因为它的执行速度更快,结果相似。类似地,可以将SGK的使用扩展到其他稀疏表示的应用程序。
{"title":"Image denoising via sparse representations over Sequential Generalization of K-means (SGK)","authors":"S. K. Sahoo, A. Makur","doi":"10.1109/ICICS.2013.6782831","DOIUrl":"https://doi.org/10.1109/ICICS.2013.6782831","url":null,"abstract":"We have recently proposed a Sequential Generalization of K-means (SGK) to train dictionary for sparse representation. SGK's training performance is as effective as the standard dictionary training algorithm K-SVD, alongside it has a simpler implementation to its advantage. In this piece of work, through the problem of image denoising, we are making a fair comparison between the usability of SGK and K-SVD. The obtained results suggest that we can successfully replace K-SVD with SGK, due to its quicker execution and comparable outcomes. Similarly, it is possible to extend the use of SGK to other applications of sparse representation.","PeriodicalId":184544,"journal":{"name":"2013 9th International Conference on Information, Communications & Signal Processing","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126697649","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Take a bite - Finding the worm in the Apple 咬一口——在苹果里找虫子
Pub Date : 2013-12-01 DOI: 10.1109/ICICS.2013.6782846
Martina Lindorfer, Bernhard Miller, M. Neugschwandtner, Christian Platzer
When it comes to security risks, especially malware, Mac OS X has the questionable reputation of being inherently safe. While there is a substantial body of research and implementations dealing with malware on Windows and, more recently, Android systems, Mac OS X has received little attention so far. To amend this shortcoming, we built a Mac OS X based high-interaction honeypot and used it to evaluate over 6,000 blacklisted URLs to estimate how widespread malware for Mac OS X is today. We further built a dynamic analysis environment and analyzed 148 malicious samples to gain insight into the current state of Mac OS X malware. To the best of our knowledge, we are the first to tackle this task.
说到安全风险,尤其是恶意软件,Mac OS X天生安全的名声值得商榷。虽然有大量的研究和实现处理Windows和最近的Android系统上的恶意软件,但到目前为止,Mac OS X几乎没有受到关注。为了弥补这个缺点,我们建立了一个基于Mac OS X的高交互性蜜罐,并使用它来评估超过6000个黑名单url,以估计Mac OS X恶意软件的传播程度。我们进一步构建了一个动态分析环境,分析了148个恶意样本,以了解Mac OS X恶意软件的现状。据我们所知,我们是第一个处理这项任务的国家。
{"title":"Take a bite - Finding the worm in the Apple","authors":"Martina Lindorfer, Bernhard Miller, M. Neugschwandtner, Christian Platzer","doi":"10.1109/ICICS.2013.6782846","DOIUrl":"https://doi.org/10.1109/ICICS.2013.6782846","url":null,"abstract":"When it comes to security risks, especially malware, Mac OS X has the questionable reputation of being inherently safe. While there is a substantial body of research and implementations dealing with malware on Windows and, more recently, Android systems, Mac OS X has received little attention so far. To amend this shortcoming, we built a Mac OS X based high-interaction honeypot and used it to evaluate over 6,000 blacklisted URLs to estimate how widespread malware for Mac OS X is today. We further built a dynamic analysis environment and analyzed 148 malicious samples to gain insight into the current state of Mac OS X malware. To the best of our knowledge, we are the first to tackle this task.","PeriodicalId":184544,"journal":{"name":"2013 9th International Conference on Information, Communications & Signal Processing","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131562733","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Statistical modeling of the Gabor filter magnitude using Gamma distribution for effectively vehicle verification 利用伽玛分布对Gabor滤波器的幅度进行统计建模,以有效地进行车辆验证
Pub Date : 2013-12-01 DOI: 10.1109/ICICS.2013.6782965
Jing-Ming Guo, Heri Prasetyo
Vehicle verification based on still image feature can be considered as supervised classification problem. An image descriptor is directly derived from the Gabor filtered output statistics of a given image. In general, the magnitude of the Gabor filtered output is modeled as the Gaussian distribution. So that the image descriptor is composed from mean, standard deviation, and skewness value of the Gabor filter magnitude [5, 6, 8]. However, Arrospide et. al. [9] argued that the skewness parameter is not meaningful for the class separation. Then, the feature descriptor is well defined only using mean and standard deviation of Gabor output distribution which leads to lower feature dimensionality. Based on our observation, the magnitude of the Gabor filter has strong tendency to follow the Gamma distribution. We propose a new texture descriptor derived from the maximum likelihood estimation of the Gamma distribution for effectively vehicle verification task. Experimental result shows that the proposed method is superior to the former approach under several classifier techniques.
基于静止图像特征的车辆验证可以看作是监督分类问题。图像描述符直接从给定图像的Gabor过滤输出统计数据中派生出来。一般来说,Gabor滤波输出的幅度是按照高斯分布建模的。因此,图像描述符由Gabor滤波器幅度的均值、标准差和偏度值组成[5,6,8]。然而,Arrospide等人[9]认为偏度参数对类分离没有意义。然后,仅使用Gabor输出分布的均值和标准差来定义特征描述符,从而导致较低的特征维数。根据我们的观察,Gabor滤波器的幅度有很强的服从Gamma分布的倾向。我们提出了一种基于Gamma分布的极大似然估计的纹理描述符,用于有效的车辆验证任务。实验结果表明,该方法在几种分类器技术下均优于原方法。
{"title":"Statistical modeling of the Gabor filter magnitude using Gamma distribution for effectively vehicle verification","authors":"Jing-Ming Guo, Heri Prasetyo","doi":"10.1109/ICICS.2013.6782965","DOIUrl":"https://doi.org/10.1109/ICICS.2013.6782965","url":null,"abstract":"Vehicle verification based on still image feature can be considered as supervised classification problem. An image descriptor is directly derived from the Gabor filtered output statistics of a given image. In general, the magnitude of the Gabor filtered output is modeled as the Gaussian distribution. So that the image descriptor is composed from mean, standard deviation, and skewness value of the Gabor filter magnitude [5, 6, 8]. However, Arrospide et. al. [9] argued that the skewness parameter is not meaningful for the class separation. Then, the feature descriptor is well defined only using mean and standard deviation of Gabor output distribution which leads to lower feature dimensionality. Based on our observation, the magnitude of the Gabor filter has strong tendency to follow the Gamma distribution. We propose a new texture descriptor derived from the maximum likelihood estimation of the Gamma distribution for effectively vehicle verification task. Experimental result shows that the proposed method is superior to the former approach under several classifier techniques.","PeriodicalId":184544,"journal":{"name":"2013 9th International Conference on Information, Communications & Signal Processing","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129520608","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
One-vs-all for class imbalance learning 一对一的班级不平衡学习
Pub Date : 2013-12-01 DOI: 10.1109/ICICS.2013.6782785
Bilal Mirza, Zhiping Lin
The performance of support vector machines (SVMs) can deteriorate when the number of samples in one class is much greater than that in the other. Existing methods tackle this problem by modifying the learning algorithms or resampling the datasets. In this paper, we propose a new method called one-vs-all for class imbalance learning (OVACIL) which neither modifies the SVM learning algorithms nor resamples the datasets. In the OVACIL method, we re-group a given imbalanced dataset into a number of new datasets comprising of all the original samples and train standard SVM classifiers using each of the datasets. The output scores of these classifiers on a testing sample are then compared and a final decision is made without a fixed decision threshold. This comparison is not biased toward any particular class, resulting in high accuracies of both classes. The Gmean and Fmeasure values obtained by OVACIL on 18 real-world imbalanced datasets surpass the previous best values reported by other state-of-the-art CIL methods on most of these datasets.
当一个类别的样本数量远远大于另一个类别的样本数量时,支持向量机(svm)的性能会下降。现有的方法通过修改学习算法或对数据集重新采样来解决这个问题。在本文中,我们提出了一种新的方法,称为单对全的类不平衡学习(OVACIL),它既不修改SVM学习算法,也不重新采样数据集。在OVACIL方法中,我们将给定的不平衡数据集重新分组为由所有原始样本组成的许多新数据集,并使用每个数据集训练标准SVM分类器。然后比较这些分类器在测试样本上的输出分数,并在没有固定决策阈值的情况下做出最终决策。这种比较不偏向于任何特定的类别,从而导致两个类别都具有很高的准确性。OVACIL在18个真实不平衡数据集上获得的Gmean和Fmeasure值超过了其他最先进的CIL方法在大多数这些数据集上报告的最佳值。
{"title":"One-vs-all for class imbalance learning","authors":"Bilal Mirza, Zhiping Lin","doi":"10.1109/ICICS.2013.6782785","DOIUrl":"https://doi.org/10.1109/ICICS.2013.6782785","url":null,"abstract":"The performance of support vector machines (SVMs) can deteriorate when the number of samples in one class is much greater than that in the other. Existing methods tackle this problem by modifying the learning algorithms or resampling the datasets. In this paper, we propose a new method called one-vs-all for class imbalance learning (OVACIL) which neither modifies the SVM learning algorithms nor resamples the datasets. In the OVACIL method, we re-group a given imbalanced dataset into a number of new datasets comprising of all the original samples and train standard SVM classifiers using each of the datasets. The output scores of these classifiers on a testing sample are then compared and a final decision is made without a fixed decision threshold. This comparison is not biased toward any particular class, resulting in high accuracies of both classes. The Gmean and Fmeasure values obtained by OVACIL on 18 real-world imbalanced datasets surpass the previous best values reported by other state-of-the-art CIL methods on most of these datasets.","PeriodicalId":184544,"journal":{"name":"2013 9th International Conference on Information, Communications & Signal Processing","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132848476","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
期刊
2013 9th International Conference on Information, Communications & Signal Processing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1