Pub Date : 2017-05-16DOI: 10.1109/ICSIGSYS.2017.7967031
Jayme Milanezi, R. S. Ferreira, J. P. J. D. Da Costa, G. del Galdo, R. K. Miranda, W. Felber, E. P. de Freitas
Energy harvesting has become very attractive due to the extended usage time of devices. Among several forms of recycling energy, radiofrequency (RF) harvesting has been suggested due to its wide availability mainly in urban areas. Its applications range from sensor nodes to charging low power consumption portable devices and depend on the amount of antennas. In this paper, we evaluate the feasible application of RF harvesting for charging a cell phone. To validate our analysis, we conduct an RF measurement campaign at four important locations in Brasilia, Brazil. Considering the average incidence of 11 dBm, we achieve the final value of 2.5 mW/m2. With an incident power of +10 dBm, only 2 rectennas per hour are needed to charge a cell phone whose battery is approximately 3.72 mWh. We perform a comparison between rectenna arrays and simple antennas directly connected to one external matching circuit, dismissing adaptive beamforming circuits as a way of avoiding intermediate energy losses. In order to apply RF energy harvesting in higher power consumption devices, we propose a rectenna array system which increases considerably the amount of recycled power. For both Line-of-Sight (LOS) and Non-Line-of-Sight (NLOS) paths, harvesting systems based on rectenna arrays outperform standard antenna array based solutions.
{"title":"Radiofrequency energy harvesting system based on a rectenna array in urban environments","authors":"Jayme Milanezi, R. S. Ferreira, J. P. J. D. Da Costa, G. del Galdo, R. K. Miranda, W. Felber, E. P. de Freitas","doi":"10.1109/ICSIGSYS.2017.7967031","DOIUrl":"https://doi.org/10.1109/ICSIGSYS.2017.7967031","url":null,"abstract":"Energy harvesting has become very attractive due to the extended usage time of devices. Among several forms of recycling energy, radiofrequency (RF) harvesting has been suggested due to its wide availability mainly in urban areas. Its applications range from sensor nodes to charging low power consumption portable devices and depend on the amount of antennas. In this paper, we evaluate the feasible application of RF harvesting for charging a cell phone. To validate our analysis, we conduct an RF measurement campaign at four important locations in Brasilia, Brazil. Considering the average incidence of 11 dBm, we achieve the final value of 2.5 mW/m2. With an incident power of +10 dBm, only 2 rectennas per hour are needed to charge a cell phone whose battery is approximately 3.72 mWh. We perform a comparison between rectenna arrays and simple antennas directly connected to one external matching circuit, dismissing adaptive beamforming circuits as a way of avoiding intermediate energy losses. In order to apply RF energy harvesting in higher power consumption devices, we propose a rectenna array system which increases considerably the amount of recycled power. For both Line-of-Sight (LOS) and Non-Line-of-Sight (NLOS) paths, harvesting systems based on rectenna arrays outperform standard antenna array based solutions.","PeriodicalId":212068,"journal":{"name":"2017 International Conference on Signals and Systems (ICSigSys)","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121267945","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-05-16DOI: 10.1109/ICSIGSYS.2017.7967035
Syed Naveen Altaf Ahmed, P. Meher, A. P. Vinod
Frequency hopping is used in different communications systems for its robustness by providing frequency diversity against jamming and interfering signals. Successful detection and demodulation of a frequency hopping signal is dependent on proper tuning to transmit frequency and time synchronization of the burst. The sequence of hop frequencies is generally determined by a Pseudo-Noise (PN) sequence and time synchronization is achieved using synchronization preambles in the transmit burst. Successful acquisition of the hop frequency sequence could be achieved when at least a single burst's data is successfully decoded at the receiver. In this paper we present a low complexity, two-level acquisition based scheme for fast acquisition of the frequency hopping and time synchronization of the burst based on the Zadoff-Chu synchronization preambles. We have presented the simulation results detailing the proposed scheme's performance and proposed a low complexity hardware implementation architecture. Simulations show that the single IF channel synchronization detection performance is above 99% for SNRs more than −20dB and wideband multiple digital IF detection performance is similar to single digital IF channel performance for SNRs more than −5dB. The simulations have been carried out for characterizing the performance in different propagation channel environments such as AWGN, LTE-EVA, LTE-ETU and 6-path Rician propagation channels. The performance degradation due to the low complexity hardware is seen to be less than 1% for SNRs above −20dB and the synchronization performance difference reduces to less than 0.1% for SNRs above −5dB.
{"title":"Fast acquisition and time synchronization of frequency hopping burst signals","authors":"Syed Naveen Altaf Ahmed, P. Meher, A. P. Vinod","doi":"10.1109/ICSIGSYS.2017.7967035","DOIUrl":"https://doi.org/10.1109/ICSIGSYS.2017.7967035","url":null,"abstract":"Frequency hopping is used in different communications systems for its robustness by providing frequency diversity against jamming and interfering signals. Successful detection and demodulation of a frequency hopping signal is dependent on proper tuning to transmit frequency and time synchronization of the burst. The sequence of hop frequencies is generally determined by a Pseudo-Noise (PN) sequence and time synchronization is achieved using synchronization preambles in the transmit burst. Successful acquisition of the hop frequency sequence could be achieved when at least a single burst's data is successfully decoded at the receiver. In this paper we present a low complexity, two-level acquisition based scheme for fast acquisition of the frequency hopping and time synchronization of the burst based on the Zadoff-Chu synchronization preambles. We have presented the simulation results detailing the proposed scheme's performance and proposed a low complexity hardware implementation architecture. Simulations show that the single IF channel synchronization detection performance is above 99% for SNRs more than −20dB and wideband multiple digital IF detection performance is similar to single digital IF channel performance for SNRs more than −5dB. The simulations have been carried out for characterizing the performance in different propagation channel environments such as AWGN, LTE-EVA, LTE-ETU and 6-path Rician propagation channels. The performance degradation due to the low complexity hardware is seen to be less than 1% for SNRs above −20dB and the synchronization performance difference reduces to less than 0.1% for SNRs above −5dB.","PeriodicalId":212068,"journal":{"name":"2017 International Conference on Signals and Systems (ICSigSys)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129707508","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-05-16DOI: 10.1109/ICSIGSYS.2017.7967064
Evander Christy, R. P. Astuti, Budi Syihabuddin, B. Narottama, Obed Rhesa, F. Rachmawati
In this paper, we propose the usage of Unmanned Aerial Vehicle (UAV) as a flying mobile base tower station for discovering Device-to-Device (D2D) devices in the disaster area. In a disaster area, energy consumption of both devices and network become an important constraint. Therefore, there is a need to establish wireless network communication in large area rapidly under the condition of infrastructure failure. The previous works does not calculate the energy consumption of the UAV and consider the use cases of UAV flight path for specific disaster condition, e.g. flood, earthquake, etc. The objective of this paper is to provide UAV flying paths that can adapt according to disaster condition which satisfy the UAV energy constraint. We enhance four schemes for the UAV flying paths: O-path, Rectangular path, ZigZag-path, and S-path. This enhancement reduces the flight path gap area and lead the increasing of covered area. To examine the best UAV flight path for certain disaster cases, several simulations were performed and discussed. The results show that for distributed damage pattern, the optimum UAV flying pattern is an S - path because of its large coverage area (covering around 80 percent of total devices in altitude 100 m). Otherwise, for centralized damage pattern, the optimum UAV flying patterns are O, Rectangular, and Zigzag path because of its short flight duration and less energy consumption (eight times smaller than the S - path in altitude 100 m).
{"title":"Optimum UAV flying path for Device-to-Device communications in disaster area","authors":"Evander Christy, R. P. Astuti, Budi Syihabuddin, B. Narottama, Obed Rhesa, F. Rachmawati","doi":"10.1109/ICSIGSYS.2017.7967064","DOIUrl":"https://doi.org/10.1109/ICSIGSYS.2017.7967064","url":null,"abstract":"In this paper, we propose the usage of Unmanned Aerial Vehicle (UAV) as a flying mobile base tower station for discovering Device-to-Device (D2D) devices in the disaster area. In a disaster area, energy consumption of both devices and network become an important constraint. Therefore, there is a need to establish wireless network communication in large area rapidly under the condition of infrastructure failure. The previous works does not calculate the energy consumption of the UAV and consider the use cases of UAV flight path for specific disaster condition, e.g. flood, earthquake, etc. The objective of this paper is to provide UAV flying paths that can adapt according to disaster condition which satisfy the UAV energy constraint. We enhance four schemes for the UAV flying paths: O-path, Rectangular path, ZigZag-path, and S-path. This enhancement reduces the flight path gap area and lead the increasing of covered area. To examine the best UAV flight path for certain disaster cases, several simulations were performed and discussed. The results show that for distributed damage pattern, the optimum UAV flying pattern is an S - path because of its large coverage area (covering around 80 percent of total devices in altitude 100 m). Otherwise, for centralized damage pattern, the optimum UAV flying patterns are O, Rectangular, and Zigzag path because of its short flight duration and less energy consumption (eight times smaller than the S - path in altitude 100 m).","PeriodicalId":212068,"journal":{"name":"2017 International Conference on Signals and Systems (ICSigSys)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134283483","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-05-16DOI: 10.1109/ICSIGSYS.2017.7967024
Nur Kamila, K. Anwar
In this paper, we propose new Raptor codes suitable for uplink Internet of Things using single carrier transmission technique (SC-IoT) with low density parity check (LDPC) codes as the precode, called LDPC-Raptor codes. The utilization of LDPC as the precode is to guarantee high capability of error correction for better Raptor codes performance while keeping the computational complexity low. Raptor Codes are preferable for SC-IoT because of their flexibility with both fixed/non-fixed rate (rateless) and simplicity in decoding. The LDPC-Raptor codes is designed (sub)-optimally using Extrinsic Information Transfer (EXIT) chart to meet requirements of SC-IoT. We evaluate the performance of the proposed LDPC-Raptor codes to achieve the Shannon capacity over Binary Erasure Channels (BEC)-based equivalent additive white Gaussian noise (AWGN) and frequency-flat Rayleigh fading and show that LDPC-Raptor codes provide significant contributions than Luby Transform (LT) codes for SC-IoT.
{"title":"On the design of LDPC-based Raptor codes for single carrier Internet of Things (SC-IoT)","authors":"Nur Kamila, K. Anwar","doi":"10.1109/ICSIGSYS.2017.7967024","DOIUrl":"https://doi.org/10.1109/ICSIGSYS.2017.7967024","url":null,"abstract":"In this paper, we propose new Raptor codes suitable for uplink Internet of Things using single carrier transmission technique (SC-IoT) with low density parity check (LDPC) codes as the precode, called LDPC-Raptor codes. The utilization of LDPC as the precode is to guarantee high capability of error correction for better Raptor codes performance while keeping the computational complexity low. Raptor Codes are preferable for SC-IoT because of their flexibility with both fixed/non-fixed rate (rateless) and simplicity in decoding. The LDPC-Raptor codes is designed (sub)-optimally using Extrinsic Information Transfer (EXIT) chart to meet requirements of SC-IoT. We evaluate the performance of the proposed LDPC-Raptor codes to achieve the Shannon capacity over Binary Erasure Channels (BEC)-based equivalent additive white Gaussian noise (AWGN) and frequency-flat Rayleigh fading and show that LDPC-Raptor codes provide significant contributions than Luby Transform (LT) codes for SC-IoT.","PeriodicalId":212068,"journal":{"name":"2017 International Conference on Signals and Systems (ICSigSys)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115464429","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-05-16DOI: 10.1109/ICSIGSYS.2017.7967032
Muhsin, R. P. Astuti, B. S. Nugroho
Millimeter-wave (mm-Wave) Massive Multiple Input Multiple Output (MIMO) at 60 GHz is a candidate of advanced wireless communications for indoor environment. Mm-Wave massive MIMO antenna with lower frequency with sectoring technique has been proposed in previous research. Also dual polarized configuration for MIMO in lower frequency and lower number of antenna. Massive MIMO at 60 GHz mm-Wave is not evaluated yet in these previous research. In this paper, dual polarized mm-Wave massive MIMO has been proposed. Antennas are modeled in circular disk proximity coupled planar array. Bandwidth of dual polarized configuration is 4.349 GHz, wider than 4.303 GHz in single polarized configuration. Envelope Correlation Coefficient (ECC) of dual polarized configuration is 25 times lower compared to single polarized configuration. Dual polarized configuration shows better performance both in bandwidth and ECC compared to single polarized configuration.
{"title":"Dual polarized antenna decoupling for 60 GHz planar massive MIMO","authors":"Muhsin, R. P. Astuti, B. S. Nugroho","doi":"10.1109/ICSIGSYS.2017.7967032","DOIUrl":"https://doi.org/10.1109/ICSIGSYS.2017.7967032","url":null,"abstract":"Millimeter-wave (mm-Wave) Massive Multiple Input Multiple Output (MIMO) at 60 GHz is a candidate of advanced wireless communications for indoor environment. Mm-Wave massive MIMO antenna with lower frequency with sectoring technique has been proposed in previous research. Also dual polarized configuration for MIMO in lower frequency and lower number of antenna. Massive MIMO at 60 GHz mm-Wave is not evaluated yet in these previous research. In this paper, dual polarized mm-Wave massive MIMO has been proposed. Antennas are modeled in circular disk proximity coupled planar array. Bandwidth of dual polarized configuration is 4.349 GHz, wider than 4.303 GHz in single polarized configuration. Envelope Correlation Coefficient (ECC) of dual polarized configuration is 25 times lower compared to single polarized configuration. Dual polarized configuration shows better performance both in bandwidth and ECC compared to single polarized configuration.","PeriodicalId":212068,"journal":{"name":"2017 International Conference on Signals and Systems (ICSigSys)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125420995","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-05-16DOI: 10.1109/ICSIGSYS.2017.7967046
A. A. Salam, M. Akram, Amna Arouj, I. Basit, Tariq Shaqur, Haroon Javed, Sheeraz, Kamran Wazir
Glaucoma is a lifetime medical condition which might results in the deprivation of visual sense from an individual permanantly if remained untreated and undiagnosed at early phase. Some structural changes are observed by ophthalmologists using state of art biomedical imaging techniques i.e. Fundscopy and optical coherence tomography in retinal layers and optic nerve head of person effected by glaucoma at early phase. These structural indicators might help in diagnosis of glaucoma at early phase. Cup to disc ratio analysis using fundoscopy and analyzing retinal layer thickness using optical coherence tomography are among some of the structural changes used in glaucoma diagnosis. There are many autonomous computer aided diagnosis systems that helps ophthalmologists in analyzing the fundus and optical coherence tomography images using state of art biomedical imaging and machine learning techniques. Computer aided diagnostic systems helps in early detection of glaucoma in the areas where doctor to patient ratio is small. However, these algorithms require some annotated datasets for their evaluation and accuracy. Lack of annotated benchmark datasets with respect to cup to disc ratio for glaucoma detection has led to unavailability of comparison and evaluation of glaucoma detection algorithm globally. Proposed research aims to provide an annotated dataset with respect to glaucoma detection. Annotations are done from multiple ophthalmologists. This dataset will enable in future to measure the accuracy of proposed algorithms based on Cup to disc ratio analysis.
{"title":"Benchmark data set for glaucoma detection with annotated cup to disc ratio","authors":"A. A. Salam, M. Akram, Amna Arouj, I. Basit, Tariq Shaqur, Haroon Javed, Sheeraz, Kamran Wazir","doi":"10.1109/ICSIGSYS.2017.7967046","DOIUrl":"https://doi.org/10.1109/ICSIGSYS.2017.7967046","url":null,"abstract":"Glaucoma is a lifetime medical condition which might results in the deprivation of visual sense from an individual permanantly if remained untreated and undiagnosed at early phase. Some structural changes are observed by ophthalmologists using state of art biomedical imaging techniques i.e. Fundscopy and optical coherence tomography in retinal layers and optic nerve head of person effected by glaucoma at early phase. These structural indicators might help in diagnosis of glaucoma at early phase. Cup to disc ratio analysis using fundoscopy and analyzing retinal layer thickness using optical coherence tomography are among some of the structural changes used in glaucoma diagnosis. There are many autonomous computer aided diagnosis systems that helps ophthalmologists in analyzing the fundus and optical coherence tomography images using state of art biomedical imaging and machine learning techniques. Computer aided diagnostic systems helps in early detection of glaucoma in the areas where doctor to patient ratio is small. However, these algorithms require some annotated datasets for their evaluation and accuracy. Lack of annotated benchmark datasets with respect to cup to disc ratio for glaucoma detection has led to unavailability of comparison and evaluation of glaucoma detection algorithm globally. Proposed research aims to provide an annotated dataset with respect to glaucoma detection. Annotations are done from multiple ophthalmologists. This dataset will enable in future to measure the accuracy of proposed algorithms based on Cup to disc ratio analysis.","PeriodicalId":212068,"journal":{"name":"2017 International Conference on Signals and Systems (ICSigSys)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116083904","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-05-16DOI: 10.1109/ICSIGSYS.2017.7967026
Ines Visyeri Yuliani, K. Anwar
Efficient channel coding techniques for wireless communications become important solutions to meet the 5G requirements, especially on the aspect of high reliability and low latency communications in the Internet of Things (IoT) era. This paper proposes new degree distributions of Raptor Codes for devices supporting IoT communications with Low Density Generator Matrix (LDGM) codes as the precode, called LDGM-Raptor codes. The proposed LDGM-Raptor codes is applied for broadband IoT (BB-IoT) to support high data rate in IoT networks with high reliability while keeping low computational complexity. The degree distribution in LDGM-Raptor codes is designed by using Extrinsic Information Transfer (EXIT) charts in Binary Erasure Channel (BEC)-based equivalent Additive White Gaussian Noise (AWGN) and multipath fading channels. EXIT charts are also used to estimate Bit-Error Rate (BER) performances of the proposed codes. The results confirm that the performance with new degree distributions of LDGM-Raptor close to the Shannon limit, which is required to make BB-IoT reliable and efficient.
{"title":"Design of LDGM-based Raptor Codes for broadband Internet of Things using EXIT chart","authors":"Ines Visyeri Yuliani, K. Anwar","doi":"10.1109/ICSIGSYS.2017.7967026","DOIUrl":"https://doi.org/10.1109/ICSIGSYS.2017.7967026","url":null,"abstract":"Efficient channel coding techniques for wireless communications become important solutions to meet the 5G requirements, especially on the aspect of high reliability and low latency communications in the Internet of Things (IoT) era. This paper proposes new degree distributions of Raptor Codes for devices supporting IoT communications with Low Density Generator Matrix (LDGM) codes as the precode, called LDGM-Raptor codes. The proposed LDGM-Raptor codes is applied for broadband IoT (BB-IoT) to support high data rate in IoT networks with high reliability while keeping low computational complexity. The degree distribution in LDGM-Raptor codes is designed by using Extrinsic Information Transfer (EXIT) charts in Binary Erasure Channel (BEC)-based equivalent Additive White Gaussian Noise (AWGN) and multipath fading channels. EXIT charts are also used to estimate Bit-Error Rate (BER) performances of the proposed codes. The results confirm that the performance with new degree distributions of LDGM-Raptor close to the Shannon limit, which is required to make BB-IoT reliable and efficient.","PeriodicalId":212068,"journal":{"name":"2017 International Conference on Signals and Systems (ICSigSys)","volume":"164 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116119373","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-05-16DOI: 10.1109/ICSIGSYS.2017.7967022
T. Moir
Square-root algorithms have use in certain areas of digital signal processing. However, they are characterized as being non-linear in nature and hence their analysis is not straight-forward. This paper examines two such algorithms and shows that the convergence is guaranteed provided the closed-loop discrete-time system is stable, but that the upper limit on stability is determined by the values of the square-root coefficients themselves. The analysis is quite classical but also requires a link between Toeplitz matrices and polynomials to progress further.
{"title":"Stability and convergence of a class of nonlinear algorithms in digital signal processing","authors":"T. Moir","doi":"10.1109/ICSIGSYS.2017.7967022","DOIUrl":"https://doi.org/10.1109/ICSIGSYS.2017.7967022","url":null,"abstract":"Square-root algorithms have use in certain areas of digital signal processing. However, they are characterized as being non-linear in nature and hence their analysis is not straight-forward. This paper examines two such algorithms and shows that the convergence is guaranteed provided the closed-loop discrete-time system is stable, but that the upper limit on stability is determined by the values of the square-root coefficients themselves. The analysis is quite classical but also requires a link between Toeplitz matrices and polynomials to progress further.","PeriodicalId":212068,"journal":{"name":"2017 International Conference on Signals and Systems (ICSigSys)","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124191280","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-05-16DOI: 10.1109/ICSIGSYS.2017.7967078
Pande Gede Pradnya Jaya S.T., Bambang Hidayat, F. Y. Suratman
Technology used to hide secret message in a communication called Steganography. Secret message can be text, image or any file that can be converted into binary. This secret message inserted into cover file which can be in form of image, sound or video, basiccaly cover file must be bigger than the secret message in size. Many methods have been proposed on how to hide secret messages in a cover file. These method include spatial domain which work on bit instead of statistically on cover file. Least Significant Bit have been long known as the simplest steganography embedding method. In this research we proposed a method of LSB with enhanced technique to increase security. To extract secret message from cover file one should have particular stego key that describe the location of the message and how to reconstruct them. We utilize a people detection method as a stego key since most of video footage involving human figure, from personal video footage, movie video or security camera recording. While maintaining the appearance of the cover video from arousing suspiciousness, the size of secret message that can be embedded to be one point of consideration.
{"title":"Enhanced LSB Steganography with people detection as stego key generator","authors":"Pande Gede Pradnya Jaya S.T., Bambang Hidayat, F. Y. Suratman","doi":"10.1109/ICSIGSYS.2017.7967078","DOIUrl":"https://doi.org/10.1109/ICSIGSYS.2017.7967078","url":null,"abstract":"Technology used to hide secret message in a communication called Steganography. Secret message can be text, image or any file that can be converted into binary. This secret message inserted into cover file which can be in form of image, sound or video, basiccaly cover file must be bigger than the secret message in size. Many methods have been proposed on how to hide secret messages in a cover file. These method include spatial domain which work on bit instead of statistically on cover file. Least Significant Bit have been long known as the simplest steganography embedding method. In this research we proposed a method of LSB with enhanced technique to increase security. To extract secret message from cover file one should have particular stego key that describe the location of the message and how to reconstruct them. We utilize a people detection method as a stego key since most of video footage involving human figure, from personal video footage, movie video or security camera recording. While maintaining the appearance of the cover video from arousing suspiciousness, the size of secret message that can be embedded to be one point of consideration.","PeriodicalId":212068,"journal":{"name":"2017 International Conference on Signals and Systems (ICSigSys)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126203658","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-05-16DOI: 10.1109/ICSIGSYS.2017.7967057
A. Harjoko, R. M. Hujja, Lukman Awaludin
3D data needs in various fields has increased along with the development of simulation and modeling technology. The current technology makes interaction with 3D data becomes easier and interesting. The existence of virtual reality and 3D printers provide ease to create and display 3D objects. The existence of a 3D scanner to reconstruct a real object into a 3D digital object is one of the practical solutions to facilitate the creation of 3D data. The methods to perform 3D object reconstruction process also began to be found, such as using a single camera, stereo camera, laser beam, structured light, and the combination of these methods with various algorithms. In this study, we create a prototype of low-cost 3D surface reconstruction system with a stereo camera. The Stereo camera using image processing to generate point cloud of the object with displacement and disparity mapping process. The point of cloud from the object then connected to produce 3D surface. Reconstruction is done by applying texture from object photograph to the surface of 3D point cloud that has been reconstructed. The system made by using a low-cost web camera to test the ability to reconstruct 3D objects surface with inexpensive equipment. Testing is done by giving structured light variable using the projector. The results of this study indicate that the calibration process camera position and light conditions will determine the outcome of reconstruction where the dual camera system is very dependent on the calibration process to produce a proper reconstruction.
{"title":"Low-cost 3D surface reconstruction using Stereo camera for small object","authors":"A. Harjoko, R. M. Hujja, Lukman Awaludin","doi":"10.1109/ICSIGSYS.2017.7967057","DOIUrl":"https://doi.org/10.1109/ICSIGSYS.2017.7967057","url":null,"abstract":"3D data needs in various fields has increased along with the development of simulation and modeling technology. The current technology makes interaction with 3D data becomes easier and interesting. The existence of virtual reality and 3D printers provide ease to create and display 3D objects. The existence of a 3D scanner to reconstruct a real object into a 3D digital object is one of the practical solutions to facilitate the creation of 3D data. The methods to perform 3D object reconstruction process also began to be found, such as using a single camera, stereo camera, laser beam, structured light, and the combination of these methods with various algorithms. In this study, we create a prototype of low-cost 3D surface reconstruction system with a stereo camera. The Stereo camera using image processing to generate point cloud of the object with displacement and disparity mapping process. The point of cloud from the object then connected to produce 3D surface. Reconstruction is done by applying texture from object photograph to the surface of 3D point cloud that has been reconstructed. The system made by using a low-cost web camera to test the ability to reconstruct 3D objects surface with inexpensive equipment. Testing is done by giving structured light variable using the projector. The results of this study indicate that the calibration process camera position and light conditions will determine the outcome of reconstruction where the dual camera system is very dependent on the calibration process to produce a proper reconstruction.","PeriodicalId":212068,"journal":{"name":"2017 International Conference on Signals and Systems (ICSigSys)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121103577","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}