首页 > 最新文献

2014 Ninth International Conference on Broadband and Wireless Computing, Communication and Applications最新文献

英文 中文
THEEM: Threshold-Sensitive Energy Efficient Multi-hop Routing Protocol for WSNs THEEM:用于WSNs的阈值敏感节能多跳路由协议
W. Raza, Ilyas Khan, F. Arshad, I. Naqvi, U. Qasim, Z. Khan, N. Javai
Randomly deployed nodes in wireless sensor network (WSN) have limited energy so their energy should be efficiently utilized. Early death of nodes is the major problem in WSN as it causes uneven load distribution. Compared with dynamic clustering schemes, multi hop communication in static clustering improves the stability region. It also provides better coverage and reduces energy hole problem. But, as the life of network proceeds, premature death of data forwarding nodes reduces stability region and prolongs unstable region. To address this we proposed THEEM, a hybrid approach which brings threshold sensitivity with static clustering multi hop routing protocol. Additionally data forwarding nodes are provided with extra energy but it is compensated from other nodes. We included random uniform packet drop model to include the effect of the wireless medium. Results show that our strategy improves stable region and network lifetime and minimizes energy hole problem.
无线传感器网络中随机部署的节点能量有限,需要有效利用节点能量。节点早死是无线传感器网络的主要问题,它会导致负载分布不均匀。与动态聚类方案相比,静态聚类中的多跳通信提高了稳定区域。它还提供了更好的覆盖,减少了能量洞问题。但是,随着网络寿命的延长,数据转发节点的过早死亡减少了稳定区域,延长了不稳定区域。为了解决这个问题,我们提出了一种将阈值灵敏度与静态集群多跳路由协议相结合的混合方法THEEM。此外,数据转发节点提供了额外的能量,但由其他节点补偿。我们采用随机均匀丢包模型来考虑无线介质的影响。结果表明,该策略提高了稳定区域和网络寿命,最大限度地减少了能量空洞问题。
{"title":"THEEM: Threshold-Sensitive Energy Efficient Multi-hop Routing Protocol for WSNs","authors":"W. Raza, Ilyas Khan, F. Arshad, I. Naqvi, U. Qasim, Z. Khan, N. Javai","doi":"10.1109/BWCCA.2014.40","DOIUrl":"https://doi.org/10.1109/BWCCA.2014.40","url":null,"abstract":"Randomly deployed nodes in wireless sensor network (WSN) have limited energy so their energy should be efficiently utilized. Early death of nodes is the major problem in WSN as it causes uneven load distribution. Compared with dynamic clustering schemes, multi hop communication in static clustering improves the stability region. It also provides better coverage and reduces energy hole problem. But, as the life of network proceeds, premature death of data forwarding nodes reduces stability region and prolongs unstable region. To address this we proposed THEEM, a hybrid approach which brings threshold sensitivity with static clustering multi hop routing protocol. Additionally data forwarding nodes are provided with extra energy but it is compensated from other nodes. We included random uniform packet drop model to include the effect of the wireless medium. Results show that our strategy improves stable region and network lifetime and minimizes energy hole problem.","PeriodicalId":195099,"journal":{"name":"2014 Ninth International Conference on Broadband and Wireless Computing, Communication and Applications","volume":"334 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131468565","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
An Efficient and Flexible Dynamic Remote Attestation Method 一种高效灵活的动态远程认证方法
Hongjiao Li, Shan Wang
Remote attestation is an important characteristic of trusted computing technology which provides reliable evidence that a trusted environment actually exists. In this paper, we present a new paradigm that leverages software attack graph for dynamic remote attestation. The major contributions of this paper are two-folds: (1) From the angle of attack, we propose a method to reduce the number of objects to be monitored. (2)We propose a flexible and complete execution status information collection method at operating system level. (3)Software attack graph is introduced as the basis for remote attestation. Analysis shows that our method is complete, efficient and flexible.
远程认证是可信计算技术的一个重要特征,它为可信环境的真实存在提供可靠的证据。本文提出了一种利用软件攻击图进行动态远程认证的新范式。本文的主要贡献有两个方面:(1)从攻角上提出了一种减少被监控对象数量的方法。(2)提出了一种灵活完整的操作系统级执行状态信息收集方法。(3)引入软件攻击图作为远程认证的基础。分析表明,该方法完备、高效、灵活。
{"title":"An Efficient and Flexible Dynamic Remote Attestation Method","authors":"Hongjiao Li, Shan Wang","doi":"10.1109/BWCCA.2014.138","DOIUrl":"https://doi.org/10.1109/BWCCA.2014.138","url":null,"abstract":"Remote attestation is an important characteristic of trusted computing technology which provides reliable evidence that a trusted environment actually exists. In this paper, we present a new paradigm that leverages software attack graph for dynamic remote attestation. The major contributions of this paper are two-folds: (1) From the angle of attack, we propose a method to reduce the number of objects to be monitored. (2)We propose a flexible and complete execution status information collection method at operating system level. (3)Software attack graph is introduced as the basis for remote attestation. Analysis shows that our method is complete, efficient and flexible.","PeriodicalId":195099,"journal":{"name":"2014 Ninth International Conference on Broadband and Wireless Computing, Communication and Applications","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127754329","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Construction of a Communication Support Tool for Understanding Emotion in an Unstable Narrowband Network 不稳定窄带网络中情感理解的通信支持工具构建
Kaoru Sugita, Kaori Urabe, Ken Nishimura
In this paper, we propose a communication support tool for understanding emotion in an unstable narrowband network. The tool can reflect some emotion with a selected voice to character-based real time communication such as chat. The voice data is transmitted asynchronously and stored in local storage. In order to evaluate the effectiveness of communication to play voice data according to emotion, we implemented Web-based voice contents classified according to some massage types and primitive emotion.
在本文中,我们提出了一种用于理解不稳定窄带网络中的情感的通信支持工具。该工具可以用选定的声音反映一些情感,以基于角色的实时交流,如聊天。语音数据异步传输并存储在本地存储中。为了评估基于情感播放语音数据的沟通效果,我们实现了基于web的基于按摩类型和原始情感的语音内容分类。
{"title":"Construction of a Communication Support Tool for Understanding Emotion in an Unstable Narrowband Network","authors":"Kaoru Sugita, Kaori Urabe, Ken Nishimura","doi":"10.1109/BWCCA.2014.100","DOIUrl":"https://doi.org/10.1109/BWCCA.2014.100","url":null,"abstract":"In this paper, we propose a communication support tool for understanding emotion in an unstable narrowband network. The tool can reflect some emotion with a selected voice to character-based real time communication such as chat. The voice data is transmitted asynchronously and stored in local storage. In order to evaluate the effectiveness of communication to play voice data according to emotion, we implemented Web-based voice contents classified according to some massage types and primitive emotion.","PeriodicalId":195099,"journal":{"name":"2014 Ninth International Conference on Broadband and Wireless Computing, Communication and Applications","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132653698","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Improved Authenticated Skip List for Relational Query Authentication 一种改进的关系查询认证的已验证跳跃表
Jian Xu, Ze Cao, Qiong Xiao, Fu-cai Zhou
Some authenticated data structures (ADS) can reduce authentication cost with using signature aggregation method, such as authenticated skip list, merkle hash tree etc. But these ADS cannot solve the complicated authenticated problems, such as relational query authentication. Pang et al present signature chain scheme aims at various types of relational query but has high cost. Therefore an improved authenticated skip list (I-ASL for short) which is a new authenticated data structure is proposed in this paper. The formal definition of I-ASL and the construction method is presented. Based on the I-ASL, the paper presents the new relational query authentication methods to outsourced database. Moreover, our new relational query authentication methods achieve authentication in relational algebra, which includes select, projection, join, aggregate functions and other query operations. In addition, we analyze the security of our methods and prove that our methods could detect multiple possible adversaries' behaviors, and thus ensure the soundness of various relational query results.
一些已认证数据结构(ADS)采用签名聚合方法可以降低认证成本,如已认证跳跃表、默克尔哈希树等。但是这些ADS不能解决复杂的身份验证问题,如关系查询身份验证。Pang等人提出的签名链方案针对各种类型的关系查询,但成本较高。为此,本文提出了一种改进的身份验证跳表(I-ASL),即一种新的身份验证数据结构。给出了I-ASL的形式化定义和构造方法。基于I-ASL,提出了面向外包数据库的新型关系查询认证方法。此外,我们的新的关系查询认证方法实现了关系代数中的认证,包括选择、投影、连接、聚合函数和其他查询操作。此外,我们分析了我们的方法的安全性,并证明了我们的方法可以检测到多种可能的对手行为,从而保证了各种关系查询结果的可靠性。
{"title":"An Improved Authenticated Skip List for Relational Query Authentication","authors":"Jian Xu, Ze Cao, Qiong Xiao, Fu-cai Zhou","doi":"10.1109/BWCCA.2014.75","DOIUrl":"https://doi.org/10.1109/BWCCA.2014.75","url":null,"abstract":"Some authenticated data structures (ADS) can reduce authentication cost with using signature aggregation method, such as authenticated skip list, merkle hash tree etc. But these ADS cannot solve the complicated authenticated problems, such as relational query authentication. Pang et al present signature chain scheme aims at various types of relational query but has high cost. Therefore an improved authenticated skip list (I-ASL for short) which is a new authenticated data structure is proposed in this paper. The formal definition of I-ASL and the construction method is presented. Based on the I-ASL, the paper presents the new relational query authentication methods to outsourced database. Moreover, our new relational query authentication methods achieve authentication in relational algebra, which includes select, projection, join, aggregate functions and other query operations. In addition, we analyze the security of our methods and prove that our methods could detect multiple possible adversaries' behaviors, and thus ensure the soundness of various relational query results.","PeriodicalId":195099,"journal":{"name":"2014 Ninth International Conference on Broadband and Wireless Computing, Communication and Applications","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124224566","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Non-supervised Rule for Direct Sequence Spread Spectrum Signal Sequence Acquisition 直接序列扩频信号序列采集的非监督规则
H. Cheng, Zhenghua Luo, Guolin Sun
Having not the apriority knowledge about the DSSS signal in the non-cooperation condition, we proposed a Non-Supervised neural network algorithm to detect and identify the PN sequence. A cognitive learning algorithms for estimation the direct sequence spread spectrum (DSSS) signal pseudo-noise (PN) sequence is presented. The non-supervised learning algorithm is proposed according to the Kohonen rule in SOFM. The blind algorithm can also estimation the PN sequence in low SNR and computer simulation demonstrated that the algorithm is effective. Comparing the traditional algorithm based on slip-correlation, the cognitive algorithm's bit error rate (BER) and complexity is lower.
在不知道非合作状态下DSSS信号的优先级的情况下,我们提出了一种无监督神经网络算法来检测和识别PN序列。提出了一种估计直接序列扩频(DSSS)信号伪噪声(PN)序列的认知学习算法。根据SOFM中的Kohonen规则提出了一种无监督学习算法。该盲算法在低信噪比条件下也能估计出PN序列,计算机仿真结果表明该算法是有效的。与基于滑移相关的传统算法相比,认知算法的误码率和复杂度都较低。
{"title":"Non-supervised Rule for Direct Sequence Spread Spectrum Signal Sequence Acquisition","authors":"H. Cheng, Zhenghua Luo, Guolin Sun","doi":"10.1109/BWCCA.2014.59","DOIUrl":"https://doi.org/10.1109/BWCCA.2014.59","url":null,"abstract":"Having not the apriority knowledge about the DSSS signal in the non-cooperation condition, we proposed a Non-Supervised neural network algorithm to detect and identify the PN sequence. A cognitive learning algorithms for estimation the direct sequence spread spectrum (DSSS) signal pseudo-noise (PN) sequence is presented. The non-supervised learning algorithm is proposed according to the Kohonen rule in SOFM. The blind algorithm can also estimation the PN sequence in low SNR and computer simulation demonstrated that the algorithm is effective. Comparing the traditional algorithm based on slip-correlation, the cognitive algorithm's bit error rate (BER) and complexity is lower.","PeriodicalId":195099,"journal":{"name":"2014 Ninth International Conference on Broadband and Wireless Computing, Communication and Applications","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132414392","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Performance Comparison of DTN Routing Protocols in Vehicular-DTN Environment 车载-DTN环境下DTN路由协议性能比较
Makoto Ikeda, Taiki Honda, S. Ishikawa, L. Barolli
The Delay/Disruption Tolerant Networking (DTN) aims to provide inter-operable communications with wide range of networks which have poor performance characteristics. In this paper, we propose a message suppression method for Vehicular DTN (VDTN). The simulations for two scenarios are conducted considering obstacles (buildings), where Message Suppression with Road Side Units (MSRs) are present or not present. We consider 802.11p standard and send bundle messages in a realistic scenario of east side of Tokyo station area in Japan imported from open street map. We use the packet delivery ratio, duplicated bundle messages and end-to-end delay as evaluation metrics. We can observe that our proposed method can reduce the duplicated bundle messages, even if the number of vehicles is increased. Moreover, our message suppression method has almost the same packet delivery ratio with the Epidemic conventional method.
延迟/中断容忍网络(DTN)旨在为性能较差的大范围网络提供可互操作的通信。本文提出了一种车载DTN (VDTN)的信息抑制方法。两种情况下的模拟是在考虑障碍物(建筑物)的情况下进行的,其中存在或不存在带有路边单元(msr)的消息抑制。我们考虑802.11p标准,并在日本东京车站东侧从开放街道地图导入的现实场景中发送捆绑消息。我们使用包传送率、重复包消息和端到端延迟作为评估指标。我们可以观察到,即使车辆数量增加,我们提出的方法也可以减少重复的捆绑消息。此外,我们的消息抑制方法具有与Epidemic常规方法几乎相同的包投递率。
{"title":"Performance Comparison of DTN Routing Protocols in Vehicular-DTN Environment","authors":"Makoto Ikeda, Taiki Honda, S. Ishikawa, L. Barolli","doi":"10.1109/BWCCA.2014.71","DOIUrl":"https://doi.org/10.1109/BWCCA.2014.71","url":null,"abstract":"The Delay/Disruption Tolerant Networking (DTN) aims to provide inter-operable communications with wide range of networks which have poor performance characteristics. In this paper, we propose a message suppression method for Vehicular DTN (VDTN). The simulations for two scenarios are conducted considering obstacles (buildings), where Message Suppression with Road Side Units (MSRs) are present or not present. We consider 802.11p standard and send bundle messages in a realistic scenario of east side of Tokyo station area in Japan imported from open street map. We use the packet delivery ratio, duplicated bundle messages and end-to-end delay as evaluation metrics. We can observe that our proposed method can reduce the duplicated bundle messages, even if the number of vehicles is increased. Moreover, our message suppression method has almost the same packet delivery ratio with the Epidemic conventional method.","PeriodicalId":195099,"journal":{"name":"2014 Ninth International Conference on Broadband and Wireless Computing, Communication and Applications","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115903133","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Rule-Based Business Data Processing in Service Coordination Systems 服务协调系统中基于规则的业务数据处理
Jie Yuan, L. Qiu
How to make software developers focus on building the basic infrastructure and enabling environment and the business users themselves configure the resources to fulfill their certain requirements is critical. To support rapid service coordination system, the method of redesigning and redeploying is needed. Business events are changes of state in enterprises or business correlated cases under the condition that the expected changes fail to appear. In this paper, we propose a rule-based business data processing method with event management in service coordination systems.
如何使软件开发人员专注于构建基本的基础设施和启用环境,以及业务用户自己配置资源以满足他们的特定需求是至关重要的。为了支持快速的服务协调系统,需要采用重新设计和重新部署的方法。业务事件是指企业或业务相关案例在预期变化未出现的情况下发生的状态变化。本文提出了一种基于规则的业务数据处理方法,并在服务协调系统中进行了事件管理。
{"title":"Rule-Based Business Data Processing in Service Coordination Systems","authors":"Jie Yuan, L. Qiu","doi":"10.1109/BWCCA.2014.82","DOIUrl":"https://doi.org/10.1109/BWCCA.2014.82","url":null,"abstract":"How to make software developers focus on building the basic infrastructure and enabling environment and the business users themselves configure the resources to fulfill their certain requirements is critical. To support rapid service coordination system, the method of redesigning and redeploying is needed. Business events are changes of state in enterprises or business correlated cases under the condition that the expected changes fail to appear. In this paper, we propose a rule-based business data processing method with event management in service coordination systems.","PeriodicalId":195099,"journal":{"name":"2014 Ninth International Conference on Broadband and Wireless Computing, Communication and Applications","volume":"88 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131807030","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design and Implementation of an Omnidirectional Wheelchair: Control System and Its Applications 全向轮椅控制系统的设计与实现及其应用
Keita Matsuo, L. Barolli
With the accelerating development of aged tendency of population and rapid growth in the number of the disabled caused by diseases or injuries, the wheelchair with good performance for the aged and disabled is attracting the attention from the society. A wheelchair can provide the user with many benefits, such as maintaining mobility, continuing or broadening community and social activities, conserving strength and energy, and enhancing quality of life. The wheelchair body must be compact enough to go through narrow doorways. The wheelchair must be wide enough to prevent the patient from falling on the floor. A large footprint is therefore desirable for stability and safety, while wheelchairs must conform to dimensional constraints. For this reason, in this paper, we present the design and implementation of an omni directional wheelchair, which has a small size and can move easily in narrow spaces. We present the design of the proposed omni directional wheelchair and discuss some implementation and application issues.
随着人口老龄化趋势的加速发展和因病或伤致残人数的快速增长,对老年人和残疾人具有良好性能的轮椅正受到社会的关注。轮椅可以为使用者提供许多好处,例如保持行动能力,继续或扩大社区和社会活动,保存力量和能量,提高生活质量。轮椅的身体必须足够紧凑,才能通过狭窄的门道。轮椅必须足够宽,以防止病人摔倒在地板上。因此,为了稳定和安全,需要大的占地面积,而轮椅必须符合尺寸限制。因此,在本文中,我们设计并实现了一种全向轮椅,该轮椅体积小,可以在狭窄的空间中轻松移动。本文给出了所提出的全向轮椅的设计,并讨论了一些实现和应用问题。
{"title":"Design and Implementation of an Omnidirectional Wheelchair: Control System and Its Applications","authors":"Keita Matsuo, L. Barolli","doi":"10.1109/BWCCA.2014.123","DOIUrl":"https://doi.org/10.1109/BWCCA.2014.123","url":null,"abstract":"With the accelerating development of aged tendency of population and rapid growth in the number of the disabled caused by diseases or injuries, the wheelchair with good performance for the aged and disabled is attracting the attention from the society. A wheelchair can provide the user with many benefits, such as maintaining mobility, continuing or broadening community and social activities, conserving strength and energy, and enhancing quality of life. The wheelchair body must be compact enough to go through narrow doorways. The wheelchair must be wide enough to prevent the patient from falling on the floor. A large footprint is therefore desirable for stability and safety, while wheelchairs must conform to dimensional constraints. For this reason, in this paper, we present the design and implementation of an omni directional wheelchair, which has a small size and can move easily in narrow spaces. We present the design of the proposed omni directional wheelchair and discuss some implementation and application issues.","PeriodicalId":195099,"journal":{"name":"2014 Ninth International Conference on Broadband and Wireless Computing, Communication and Applications","volume":"163 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117141145","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
An Efficient Head Pose Determination and its Application to Face Recognition Using Multi-pose Face DB and SVM 基于多姿态人脸DB和SVM的有效头部姿态确定及其在人脸识别中的应用
Jun Lee, Yongho Seo
This paper proposes an efficient head pose determination method and its application to face recognition on a multi-pose face DB in order to solve the pose variation-related problem. The first step is to detect a facial region using Adaboost. Next, after undergoing preprocessing on the detected face, a mask covers it. At the detected facial region, the pose is determined by relations of the position of centroid points on the eyes and lip regions, which are detected by using the ellipse fitting method. Finally, we select Pose DB and SVM Classification that correspond to the point determined in input facial images. Then, we perform face recognition based on the learning data of the subject present in SVM Classification. It was found that recognition performance has been improved through the comparative experiment of the proposed method and the multi-view face recognition of the template matching algorithm using multi-view low-capacity DB.
本文提出了一种有效的头部姿态确定方法,并将其应用于多姿态人脸数据库的人脸识别,以解决姿态变化相关的问题。第一步是使用Adaboost检测面部区域。接下来,对检测到的人脸进行预处理后,用掩膜覆盖。在被检测的面部区域,通过眼睛和嘴唇区域质心点的位置关系确定姿态,使用椭圆拟合方法检测。最后,我们选择与输入人脸图像中确定的点相对应的Pose DB和SVM分类。然后,我们基于SVM分类中存在的主体学习数据进行人脸识别。通过与多视图低容量DB模板匹配算法的多视图人脸识别进行对比实验,发现该方法的识别性能得到了提高。
{"title":"An Efficient Head Pose Determination and its Application to Face Recognition Using Multi-pose Face DB and SVM","authors":"Jun Lee, Yongho Seo","doi":"10.1109/BWCCA.2014.124","DOIUrl":"https://doi.org/10.1109/BWCCA.2014.124","url":null,"abstract":"This paper proposes an efficient head pose determination method and its application to face recognition on a multi-pose face DB in order to solve the pose variation-related problem. The first step is to detect a facial region using Adaboost. Next, after undergoing preprocessing on the detected face, a mask covers it. At the detected facial region, the pose is determined by relations of the position of centroid points on the eyes and lip regions, which are detected by using the ellipse fitting method. Finally, we select Pose DB and SVM Classification that correspond to the point determined in input facial images. Then, we perform face recognition based on the learning data of the subject present in SVM Classification. It was found that recognition performance has been improved through the comparative experiment of the proposed method and the multi-view face recognition of the template matching algorithm using multi-view low-capacity DB.","PeriodicalId":195099,"journal":{"name":"2014 Ninth International Conference on Broadband and Wireless Computing, Communication and Applications","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121849215","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A CAC Scheme Based on Fuzzy Logic for Cellular Networks Considering Security and Priority Parameters 考虑安全性和优先级参数的基于模糊逻辑的蜂窝网络CAC方案
Takaaki Inaba, Shinji Sakamoto, Vladi Koliçi, Gjergji Mino, L. Barolli
Call Admission Control (CAC) is one of the resource management functions, which regulates network access to ensure QoS provisioning. However, the decision for CAC is very challenging issue due to user mobility, limited radio spectrum, and multimedia traffic characteristics. In this paper, we propose a new CAC scheme which considers for acceptance decision except other parameters also the security and priority. We call the proposed system FACS-SP (Fuzzy Admission Control - with Security and Priority). We evaluated by simulations the performance of proposed system and show that the FACS-SP has a good behavior.
CAC (Call Admission Control)是一种资源管理功能,通过对网络访问进行调节,保证QoS的发放。然而,由于用户的移动性、有限的无线电频谱和多媒体业务特性,CAC的决策是一个非常具有挑战性的问题。本文提出了一种新的CAC方案,除了考虑其他参数外,还考虑了安全性和优先级。我们将提出的系统称为FACS-SP(模糊接纳控制-带安全性和优先级)。仿真结果表明,该系统具有良好的性能。
{"title":"A CAC Scheme Based on Fuzzy Logic for Cellular Networks Considering Security and Priority Parameters","authors":"Takaaki Inaba, Shinji Sakamoto, Vladi Koliçi, Gjergji Mino, L. Barolli","doi":"10.1109/BWCCA.2014.87","DOIUrl":"https://doi.org/10.1109/BWCCA.2014.87","url":null,"abstract":"Call Admission Control (CAC) is one of the resource management functions, which regulates network access to ensure QoS provisioning. However, the decision for CAC is very challenging issue due to user mobility, limited radio spectrum, and multimedia traffic characteristics. In this paper, we propose a new CAC scheme which considers for acceptance decision except other parameters also the security and priority. We call the proposed system FACS-SP (Fuzzy Admission Control - with Security and Priority). We evaluated by simulations the performance of proposed system and show that the FACS-SP has a good behavior.","PeriodicalId":195099,"journal":{"name":"2014 Ninth International Conference on Broadband and Wireless Computing, Communication and Applications","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122369442","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 51
期刊
2014 Ninth International Conference on Broadband and Wireless Computing, Communication and Applications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1