首页 > 最新文献

2018 5th International Conference on Signal Processing and Integrated Networks (SPIN)最新文献

英文 中文
Beamforming and Combining in Multi-User Large MIMO Systems 多用户大型MIMO系统中的波束形成与组合
M. Arti
We address the problem of beamforming and combining in a large multiple-input multiple-output systems in Rayleigh fading environment. A very large number of antennas, i.e., Ns are employed at the transmitter. Some fixed number of antennas, i.e., Nt are assigned to each user. A specific transmit weight/beamforming vector is used for transmitting the symbols of a particular user; and the user utilizes a specific combining vector for detecting the transmitted signal. Two different schemes are proposed to calculate beamforming and combining vectors. In first scheme, transmit weight vectors are chosen by using the principle of maximum ratio transmission; and maximum eigen value criterion is used for calculating the combining vector. In second scheme, the concept of null space is used for the calculation of combining vector. It is shown by simulations that proposed schemes works well and second scheme performs better than first scheme.
研究了大型多输入多输出系统在瑞利衰落环境下的波束形成和组合问题。在发射机上使用了大量的天线,即n。每个用户分配固定数量的天线,即Nt。特定发射权值/波束形成矢量用于发射特定用户的符号;用户利用特定的组合矢量来检测所传输的信号。提出了两种不同的波束形成和组合矢量计算方案。第一种方案采用最大比传输原则选择传输权向量;采用最大特征值准则计算组合向量。第二种方案利用零空间的概念进行组合向量的计算。仿真结果表明,所提方案效果良好,第二种方案的性能优于第一种方案。
{"title":"Beamforming and Combining in Multi-User Large MIMO Systems","authors":"M. Arti","doi":"10.1109/SPIN.2018.8474031","DOIUrl":"https://doi.org/10.1109/SPIN.2018.8474031","url":null,"abstract":"We address the problem of beamforming and combining in a large multiple-input multiple-output systems in Rayleigh fading environment. A very large number of antennas, i.e., Ns are employed at the transmitter. Some fixed number of antennas, i.e., Nt are assigned to each user. A specific transmit weight/beamforming vector is used for transmitting the symbols of a particular user; and the user utilizes a specific combining vector for detecting the transmitted signal. Two different schemes are proposed to calculate beamforming and combining vectors. In first scheme, transmit weight vectors are chosen by using the principle of maximum ratio transmission; and maximum eigen value criterion is used for calculating the combining vector. In second scheme, the concept of null space is used for the calculation of combining vector. It is shown by simulations that proposed schemes works well and second scheme performs better than first scheme.","PeriodicalId":184596,"journal":{"name":"2018 5th International Conference on Signal Processing and Integrated Networks (SPIN)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115704644","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
High Q Half-turn Split Inductor for RF Applications 用于射频应用的高Q半匝分路电感器
B. Murali, N. Rao
Passive components are indispensable in the design and development of Radio Frequency Integrated Circuits (RFIC). In this paper half-turn split inductor is presented with higher quality factor by 31.6% and inductance 15% over conventional planar inductor. High quality factor is a primary requirement to improve the performance of the circuit at high frequency. The quality factor and self resonant frequency is limited by parasitic capacitance effect, current crowding effect and proximity effect. In this proposed structure the quality factor is improved by dividing the each conductor turn by half and placed in to two different layers. When each conductor turns split in two layers the effective capacitance is reduced, hence quality factor is increased. The proposed structure is implemented in the area 60μm × 60μm and simulated by using the SONNET (EM) simulation tool to obtain the results.
无源元件在射频集成电路(RFIC)的设计和开发中是不可缺少的。本文设计的半匝分路电感比传统的平面电感质量因数提高31.6%,电感量提高15%。高品质因数是提高高频电路性能的首要要求。质量因数和自谐振频率受寄生电容效应、电流拥挤效应和邻近效应的限制。在这个提出的结构中,通过将每个导体匝数分成一半并放置在两个不同的层中,提高了质量因子。当每根导体分成两层时,有效电容减小,从而提高了质量因数。在60μm × 60μm的面积上实现了该结构,并利用SONNET (EM)仿真工具进行了仿真,得到了结果。
{"title":"High Q Half-turn Split Inductor for RF Applications","authors":"B. Murali, N. Rao","doi":"10.1109/SPIN.2018.8474107","DOIUrl":"https://doi.org/10.1109/SPIN.2018.8474107","url":null,"abstract":"Passive components are indispensable in the design and development of Radio Frequency Integrated Circuits (RFIC). In this paper half-turn split inductor is presented with higher quality factor by 31.6% and inductance 15% over conventional planar inductor. High quality factor is a primary requirement to improve the performance of the circuit at high frequency. The quality factor and self resonant frequency is limited by parasitic capacitance effect, current crowding effect and proximity effect. In this proposed structure the quality factor is improved by dividing the each conductor turn by half and placed in to two different layers. When each conductor turns split in two layers the effective capacitance is reduced, hence quality factor is increased. The proposed structure is implemented in the area 60μm × 60μm and simulated by using the SONNET (EM) simulation tool to obtain the results.","PeriodicalId":184596,"journal":{"name":"2018 5th International Conference on Signal Processing and Integrated Networks (SPIN)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114646968","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Enhanced Epidemic Routing Protocol in Delay Tolerant Networks 延迟容忍网络中的增强流行病路由协议
P. Garg, Hemang Kumar, R. Johari, Prabhanshu Gupta, Riya Bhatia
A delay-tolerant network is a network designed to operate over extreme distances such as those encountered in space communications, borderline networks or on an interplanetary scale. Delay tolerant networks are the opportunistic networks, that is transmission occurs as soon as two intermediate nodes comes into each others transmission range. The commonly used routing algorithm in delay tolerant networks is Epidemic Routing Protocol (ERP). Epidemic routing floods away the packets to all the neighboring nodes, which sometimes results in network congestion. The ERP doesn’t take into account the factors such as battery energy level and buffer space, so in the proposed research work, an enhanced version of ERP is hereby proposed which when deployed enables the node to consider battery energy level and buffer space while taking routing decisions. The proposed changes have resulted in the increase in message delivery ratio and decrease in traffic in the network.
容忍延迟网络是一种设计用于在极端距离上运行的网络,例如在空间通信、边界网络或行星际规模上遇到的网络。容延迟网络是一种机会网络,即两个中间节点一旦进入对方的传输范围,就立即开始传输。容延迟网络中常用的路由算法是流行路由协议(ERP)。流行路由将数据包大量发送到所有邻近节点,有时会导致网络拥塞。由于ERP没有考虑到电池电量和缓冲空间等因素,因此在本文的研究工作中,提出了一种增强版本的ERP,使节点在部署时能够在进行路由决策时考虑电池电量和缓冲空间。所提出的更改导致了消息传递率的增加和网络流量的减少。
{"title":"Enhanced Epidemic Routing Protocol in Delay Tolerant Networks","authors":"P. Garg, Hemang Kumar, R. Johari, Prabhanshu Gupta, Riya Bhatia","doi":"10.1109/SPIN.2018.8474132","DOIUrl":"https://doi.org/10.1109/SPIN.2018.8474132","url":null,"abstract":"A delay-tolerant network is a network designed to operate over extreme distances such as those encountered in space communications, borderline networks or on an interplanetary scale. Delay tolerant networks are the opportunistic networks, that is transmission occurs as soon as two intermediate nodes comes into each others transmission range. The commonly used routing algorithm in delay tolerant networks is Epidemic Routing Protocol (ERP). Epidemic routing floods away the packets to all the neighboring nodes, which sometimes results in network congestion. The ERP doesn’t take into account the factors such as battery energy level and buffer space, so in the proposed research work, an enhanced version of ERP is hereby proposed which when deployed enables the node to consider battery energy level and buffer space while taking routing decisions. The proposed changes have resulted in the increase in message delivery ratio and decrease in traffic in the network.","PeriodicalId":184596,"journal":{"name":"2018 5th International Conference on Signal Processing and Integrated Networks (SPIN)","volume":"134 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123383405","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Dual Stage Classification of Hand Gestures using Surface Electromyogram 基于表面肌电图的手势双阶段分类
Karush Suri, Rinki Gupta
Surface electromyography (sEMG) is becoming exceeding useful in applications involving analysis of human motion such as in human-machine interface, assistive technology, healthcare and prosthetic development. The proposed work presents a novel dual stage classification approach for classification of grasping gestures from sEMG signals. A statistical assessment of these activities is presented to determine the similar characteristics between the considered activities. Similar activities are grouped together. In the first stage of classification, an activity is identified as belonging to a group, which is then further classified as one of the activities within the group in the second stage of classification. The performance of the proposed approach is compared to the conventional single stage classification approach in terms of classification accuracies. The classification accuracies obtained using the proposed dual stage classification are significantly higher as compared to that for single stage classification.
表面肌电图(sEMG)在涉及人体运动分析的应用中变得非常有用,例如人机界面,辅助技术,医疗保健和假肢开发。提出了一种新的双阶段分类方法,用于从表面肌电信号中对抓取手势进行分类。提出了对这些活动的统计评估,以确定所考虑的活动之间的相似特征。相似的活动被归类在一起。在分类的第一阶段,一个活动被确定为属于一个组,然后在分类的第二阶段进一步将其分类为组内的活动之一。在分类精度方面,将该方法与传统的单阶段分类方法进行了比较。与单级分类相比,采用双级分类获得的分类精度显著提高。
{"title":"Dual Stage Classification of Hand Gestures using Surface Electromyogram","authors":"Karush Suri, Rinki Gupta","doi":"10.1109/SPIN.2018.8474145","DOIUrl":"https://doi.org/10.1109/SPIN.2018.8474145","url":null,"abstract":"Surface electromyography (sEMG) is becoming exceeding useful in applications involving analysis of human motion such as in human-machine interface, assistive technology, healthcare and prosthetic development. The proposed work presents a novel dual stage classification approach for classification of grasping gestures from sEMG signals. A statistical assessment of these activities is presented to determine the similar characteristics between the considered activities. Similar activities are grouped together. In the first stage of classification, an activity is identified as belonging to a group, which is then further classified as one of the activities within the group in the second stage of classification. The performance of the proposed approach is compared to the conventional single stage classification approach in terms of classification accuracies. The classification accuracies obtained using the proposed dual stage classification are significantly higher as compared to that for single stage classification.","PeriodicalId":184596,"journal":{"name":"2018 5th International Conference on Signal Processing and Integrated Networks (SPIN)","volume":"96 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127104743","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Modern Controller Techniques of Improve Stability of AC Microgrid 提高交流微电网稳定性的现代控制器技术
B. Rathor, M. Bhadu, S. K. Bishnoi
This paper analysis and investigates the effect of symmetrical fault on grid connected AC microgrid and improve the stability to primary control of synchronous distribution generators. In this ac microgrid four distribution generation units three renewable energy sources PV energy farm, wind energy farm and hydro power source and diesel generator is connected for backup power. The various power system stabilizers are used in control scheme and reduced the damping oscillation overshoot and settling time and comparison of time domain response having without power system stabilizes (PSS), with simple PSS like delta PSS and acceleration power (Pa) PSS, multi-band PSS (MB-PSS) and robust fuzzy based design PSS. Analyzing and performance of the various robust controller as microgrid system stability accessed on simpowersystem toolbox of MATLAB software.
分析研究了对称故障对并网交流微电网的影响,提高了同步配电发电机一次控制的稳定性。在交流微电网中,4台配电机组、3台可再生能源光伏电站、风力电站、水电电源和柴油发电机并网作为备用电源。在控制方案中采用了各种电力系统稳定器,减少了阻尼振荡超调量和稳定时间,并对无电力系统稳定器(PSS)的时域响应进行了比较,包括delta PSS和加速功率(Pa) PSS等简单的PSS,多频段PSS (MB-PSS)和基于鲁棒模糊设计的PSS。利用MATLAB软件simpowersystem工具箱对微电网系统稳定性进行了各种鲁棒控制器的分析和性能分析。
{"title":"Modern Controller Techniques of Improve Stability of AC Microgrid","authors":"B. Rathor, M. Bhadu, S. K. Bishnoi","doi":"10.1109/SPIN.2018.8474249","DOIUrl":"https://doi.org/10.1109/SPIN.2018.8474249","url":null,"abstract":"This paper analysis and investigates the effect of symmetrical fault on grid connected AC microgrid and improve the stability to primary control of synchronous distribution generators. In this ac microgrid four distribution generation units three renewable energy sources PV energy farm, wind energy farm and hydro power source and diesel generator is connected for backup power. The various power system stabilizers are used in control scheme and reduced the damping oscillation overshoot and settling time and comparison of time domain response having without power system stabilizes (PSS), with simple PSS like delta PSS and acceleration power (Pa) PSS, multi-band PSS (MB-PSS) and robust fuzzy based design PSS. Analyzing and performance of the various robust controller as microgrid system stability accessed on simpowersystem toolbox of MATLAB software.","PeriodicalId":184596,"journal":{"name":"2018 5th International Conference on Signal Processing and Integrated Networks (SPIN)","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126576750","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
C3T: Cloud based Cyclic Cryptographic Technique and it’s comparative analysis with classical cipher techniques C3T:基于云的循环密码技术及其与经典密码技术的比较分析
Shubham Gupta, R. Johari, P. Garg, Kalpana Gupta
The Symmetric and Asymmetric Cryptographic techniques and algorithms as existing in the literature are either too simple and traditional or too complex to code and understand. In the current research work, a new Cryptographic technique is being proposed which is a blend of both. To show the effectiveness of the proposed "Cyclic Cryptographic Technique", it has been compared with well-known Cryptographic technique(s) such as Caesar Cipher, Vigenere Cipher and Affine Cipher and the result exceed the expectations.
文献中存在的对称和非对称加密技术和算法要么过于简单和传统,要么过于复杂,难以编码和理解。在目前的研究工作中,提出了一种将两者结合起来的新的密码技术。为了证明所提出的“循环密码技术”的有效性,将其与Caesar密码、Vigenere密码和仿射密码等著名密码技术进行了比较,结果超出了预期。
{"title":"C3T: Cloud based Cyclic Cryptographic Technique and it’s comparative analysis with classical cipher techniques","authors":"Shubham Gupta, R. Johari, P. Garg, Kalpana Gupta","doi":"10.1109/SPIN.2018.8474121","DOIUrl":"https://doi.org/10.1109/SPIN.2018.8474121","url":null,"abstract":"The Symmetric and Asymmetric Cryptographic techniques and algorithms as existing in the literature are either too simple and traditional or too complex to code and understand. In the current research work, a new Cryptographic technique is being proposed which is a blend of both. To show the effectiveness of the proposed \"Cyclic Cryptographic Technique\", it has been compared with well-known Cryptographic technique(s) such as Caesar Cipher, Vigenere Cipher and Affine Cipher and the result exceed the expectations.","PeriodicalId":184596,"journal":{"name":"2018 5th International Conference on Signal Processing and Integrated Networks (SPIN)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125027263","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Detecting DDoS Attack using Software Defined Network (SDN) in Cloud Computing Environment 云计算环境下基于SDN的DDoS攻击检测
K. Bhushan, B. Gupta
In the last one decade, cloud computing has evolved as a new and promising computational platform that provides cost effective and scalable computing facility. The merger of SDN technology with the cloud computing environment simplifies the cloud’s networking complexities and significantly improves the manageability, programmability, dynamism, and scalability of the cloud. In the SDN-based cloud, the essential features of SDN, including global view of the whole network, software based traffic analysis, centralized control over the network, etc. greatly improves the DDoS attack detection and mitigation capabilities of the cloud. In this paper, we first discuss about various essential features of SDN that makes it suitable networking technology for cloud computing. Moreover, we propose an approach to detect DDoS attacks in SDN-based cloud by utilizing the features of SDN. The proposed approach can detect the DDoS attacks with very low communicational and computational overhead. Our claims are well supported by the extensive simulation based experiments.
在过去的十年中,云计算已经发展成为一种新的、有前途的计算平台,它提供了具有成本效益和可扩展的计算设施。SDN技术与云计算环境的融合,简化了云的组网复杂性,显著提高了云的可管理性、可编程性、动态性和可扩展性。在基于SDN的云中,SDN的全网全局视图、基于软件的流量分析、对网络的集中控制等本质特性极大地提高了云的DDoS攻击检测和缓解能力。在本文中,我们首先讨论了SDN的各种基本特征,使其适合云计算的网络技术。此外,我们提出了一种利用SDN的特性来检测基于SDN的云中的DDoS攻击的方法。该方法能够以极低的通信和计算开销检测DDoS攻击。我们的观点得到了大量模拟实验的支持。
{"title":"Detecting DDoS Attack using Software Defined Network (SDN) in Cloud Computing Environment","authors":"K. Bhushan, B. Gupta","doi":"10.1109/SPIN.2018.8474062","DOIUrl":"https://doi.org/10.1109/SPIN.2018.8474062","url":null,"abstract":"In the last one decade, cloud computing has evolved as a new and promising computational platform that provides cost effective and scalable computing facility. The merger of SDN technology with the cloud computing environment simplifies the cloud’s networking complexities and significantly improves the manageability, programmability, dynamism, and scalability of the cloud. In the SDN-based cloud, the essential features of SDN, including global view of the whole network, software based traffic analysis, centralized control over the network, etc. greatly improves the DDoS attack detection and mitigation capabilities of the cloud. In this paper, we first discuss about various essential features of SDN that makes it suitable networking technology for cloud computing. Moreover, we propose an approach to detect DDoS attacks in SDN-based cloud by utilizing the features of SDN. The proposed approach can detect the DDoS attacks with very low communicational and computational overhead. Our claims are well supported by the extensive simulation based experiments.","PeriodicalId":184596,"journal":{"name":"2018 5th International Conference on Signal Processing and Integrated Networks (SPIN)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126305396","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 31
Effect of Different Optimization Methods in Determining the Clusterheads in Wireless Sensor Network 不同优化方法对无线传感器网络簇头确定的影响
Chiranjib Patra, Samir Biswas, Sourish Mullick
In Wireless Sensor Networks (WSN) the determination of right clusters is NP-hard problem. Hence a lot of indirect methods have been used to go around and approximately solve the problem. In this communication, an effort has been made to use various objective functions from optimization methods to optimize upon this NP-hard problem in determining good clusters. Using this good clusters as solutions, we use LEACH-C framework in assessing the efficiency of the communication and connectivity of the network. Moreover, we also introduce another optimization method called simulated annealing inspired Gompertz (SAIG) to compare upon some of the well-known existing optimization methods.
在无线传感器网络中,正确聚类的确定是一个np困难问题。因此,人们采用了许多间接的方法来绕行和近似地求解这一问题。在本文中,我们努力使用各种优化方法中的目标函数来优化这个np困难问题,以确定好的聚类。利用这种良好的集群作为解决方案,我们使用LEACH-C框架来评估网络的通信和连接效率。此外,我们还介绍了另一种优化方法,即模拟退火启发的Gompertz (sagg),并对现有的一些著名的优化方法进行了比较。
{"title":"Effect of Different Optimization Methods in Determining the Clusterheads in Wireless Sensor Network","authors":"Chiranjib Patra, Samir Biswas, Sourish Mullick","doi":"10.1109/SPIN.2018.8474124","DOIUrl":"https://doi.org/10.1109/SPIN.2018.8474124","url":null,"abstract":"In Wireless Sensor Networks (WSN) the determination of right clusters is NP-hard problem. Hence a lot of indirect methods have been used to go around and approximately solve the problem. In this communication, an effort has been made to use various objective functions from optimization methods to optimize upon this NP-hard problem in determining good clusters. Using this good clusters as solutions, we use LEACH-C framework in assessing the efficiency of the communication and connectivity of the network. Moreover, we also introduce another optimization method called simulated annealing inspired Gompertz (SAIG) to compare upon some of the well-known existing optimization methods.","PeriodicalId":184596,"journal":{"name":"2018 5th International Conference on Signal Processing and Integrated Networks (SPIN)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125693733","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Sign Language Gesture Recognition using Zernike Moments and DTW 基于Zernike Moments和DTW的手语手势识别
Samridhi Mathur, Poonam Sharma
Since the last few decades, a dominant area of research in the vision community has been the gesture recognition, mainly for the purpose of Human Computer Interaction (HCI) and recognition of sign language. In this paper, we are using Zernike Moments as shape descriptors. The proposed system for recognizing sign language mainly consists of following five modules: (1) gesture segmentation based on motion detection analysis, (2) real time detection of both hand regions and face region, (3) key frame extraction for removing redundant frames, (4) the feature extraction phase consists of tracking the hands trajectory in terms of orientation, tracking distance of hands from the centre of the face and determining the hand posture using rotation invariant Zernike Moments and finally (5) gesture recognition based on these extracted features using Dynamic Time Warping (DTW) methodology.
在过去的几十年里,视觉界的一个主要研究领域是手势识别,主要是为了人机交互(HCI)和手语识别。在本文中,我们使用泽尼克矩作为形状描述符。本文提出的手语识别系统主要由以下五个模块组成:(1)基于运动检测分析的手势分割;(2)手部区域和面部区域的实时检测;(3)关键帧提取,去除冗余帧;(4)特征提取阶段包括从方向上跟踪手部轨迹;利用旋转不变泽尼克矩(Zernike Moments)跟踪手距面部中心的距离,确定手的姿态;最后(5)利用动态时间扭曲(Dynamic Time Warping, DTW)方法基于这些提取的特征进行手势识别。
{"title":"Sign Language Gesture Recognition using Zernike Moments and DTW","authors":"Samridhi Mathur, Poonam Sharma","doi":"10.1109/SPIN.2018.8474179","DOIUrl":"https://doi.org/10.1109/SPIN.2018.8474179","url":null,"abstract":"Since the last few decades, a dominant area of research in the vision community has been the gesture recognition, mainly for the purpose of Human Computer Interaction (HCI) and recognition of sign language. In this paper, we are using Zernike Moments as shape descriptors. The proposed system for recognizing sign language mainly consists of following five modules: (1) gesture segmentation based on motion detection analysis, (2) real time detection of both hand regions and face region, (3) key frame extraction for removing redundant frames, (4) the feature extraction phase consists of tracking the hands trajectory in terms of orientation, tracking distance of hands from the centre of the face and determining the hand posture using rotation invariant Zernike Moments and finally (5) gesture recognition based on these extracted features using Dynamic Time Warping (DTW) methodology.","PeriodicalId":184596,"journal":{"name":"2018 5th International Conference on Signal Processing and Integrated Networks (SPIN)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122252624","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Secure Data Aggregation with Mean Field Extensive Game Theoretic Framework 基于平均场扩展博弈论框架的安全数据聚合
Khyati Chopra, R. Bose, A. Joshi
In this paper, game theoretic framework is used as a mathematical tool to address security problems in mobile wireless sensor network (MWSN). In most of the existing works, only attacker and a defender are considered as the two players of the game. With the use of recent advancements made in the mean field game theory, we have proposed a novel extensive game with multiple players for MWSN security, such that the aggregator node can securely compute aggregation data even in the presence of an attack. The proposed scheme enables the aggregator node and an individual node in MWSN to strategically make defense decisions and hence, the confidential data could be faithfully transmitted to base station (BS) for security. Also, each node in this dynamic distributed network, knows the information about its own state and the information about the other nodes’ aggregate effect in the MWSN. Optimal strategic equilibrium solution to our proposed mean field extensive game is given, such that the utility of each player is maximized in the game. Extensive game analysis and study shows that our proposed dynamic algorithm strategically outperforms existing static approach.
本文采用博弈论框架作为数学工具来解决移动无线传感器网络中的安全问题。在现有的大多数作品中,只有进攻者和防守者被认为是游戏的两个玩家。利用平均场博弈理论的最新进展,我们提出了一种具有多个参与者的新型广泛博弈方法,用于MWSN的安全性,使聚合器节点即使在存在攻击的情况下也能安全地计算聚合数据。该方案使MWSN中的聚合节点和单个节点能够有策略地进行防御决策,从而保证机密数据忠实地传输到基站,保证安全。此外,动态分布式网络中的每个节点都知道自己的状态信息和其他节点在MWSN中的聚合效应信息。给出了平均场扩展博弈的最优策略均衡解,使博弈中每个参与人的效用最大化。广泛的博弈分析和研究表明,我们提出的动态算法在策略上优于现有的静态方法。
{"title":"Secure Data Aggregation with Mean Field Extensive Game Theoretic Framework","authors":"Khyati Chopra, R. Bose, A. Joshi","doi":"10.1109/SPIN.2018.8474175","DOIUrl":"https://doi.org/10.1109/SPIN.2018.8474175","url":null,"abstract":"In this paper, game theoretic framework is used as a mathematical tool to address security problems in mobile wireless sensor network (MWSN). In most of the existing works, only attacker and a defender are considered as the two players of the game. With the use of recent advancements made in the mean field game theory, we have proposed a novel extensive game with multiple players for MWSN security, such that the aggregator node can securely compute aggregation data even in the presence of an attack. The proposed scheme enables the aggregator node and an individual node in MWSN to strategically make defense decisions and hence, the confidential data could be faithfully transmitted to base station (BS) for security. Also, each node in this dynamic distributed network, knows the information about its own state and the information about the other nodes’ aggregate effect in the MWSN. Optimal strategic equilibrium solution to our proposed mean field extensive game is given, such that the utility of each player is maximized in the game. Extensive game analysis and study shows that our proposed dynamic algorithm strategically outperforms existing static approach.","PeriodicalId":184596,"journal":{"name":"2018 5th International Conference on Signal Processing and Integrated Networks (SPIN)","volume":"491 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116448389","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2018 5th International Conference on Signal Processing and Integrated Networks (SPIN)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1