首页 > 最新文献

2015 Long Island Systems, Applications and Technology最新文献

英文 中文
Selective forwarding detection (SFD) in wireless sensor networks 无线传感器网络中的选择性转发检测(SFD)
Pub Date : 2015-05-01 DOI: 10.1109/LISAT.2015.7160207
Naser Alajmi, K. Elleithy
Security is the critical subject in wireless sensor networks. Therefore, WSNs are susceptible to several types of security attacks. One reason to attack sensor networks is the limited capacity of sensor nodes. The security attacks could affect the most significant applications in WSNs area such as military surveillance, traffic monitor, and healthcare. Thus, there are different types of detection approaches against security attacks on the network layer in WSNs. Also, there are severe constraints on sensor nodes like reliability, energy efficiency, and scalability, which affect the security in WSNs. Since the sensor nodes have limited capabilities for most of these constraints, a selective forwarding attack is difficult to detect in the networks. Malicious nodes in the selective forwarding attack, work as normal nodes. However, it attempts to find the sensitive messages and drop them before sending the packet to other nodes. In order to keep this type of attacks away from networks, we propose a multi layers approach (SFD) that preserves the safely of data transmission between sensor nodes while detecting the selective forwarding attack. Furthermore, the approach includes reliability, energy efficiency, and scalability.
安全是无线传感器网络的关键问题。因此,wsn容易受到多种类型的安全攻击。攻击传感器网络的一个原因是传感器节点的容量有限。安全攻击可能影响wsn领域中最重要的应用,如军事监视、交通监控和医疗保健。因此,在无线传感器网络中,针对网络层的安全攻击有不同类型的检测方法。同时,传感器节点在可靠性、能效、可扩展性等方面存在严格的限制,影响了无线传感器网络的安全性。由于传感器节点对这些约束的能力有限,因此在网络中很难检测到选择性转发攻击。恶意节点在选择性转发攻击中,与正常节点一样工作。但是,它会尝试找到敏感消息并在将数据包发送到其他节点之前丢弃它们。为了防止这种类型的攻击远离网络,我们提出了一种多层方法(SFD),该方法在检测选择性转发攻击的同时保持传感器节点之间数据传输的安全性。此外,该方法还包括可靠性、能效和可扩展性。
{"title":"Selective forwarding detection (SFD) in wireless sensor networks","authors":"Naser Alajmi, K. Elleithy","doi":"10.1109/LISAT.2015.7160207","DOIUrl":"https://doi.org/10.1109/LISAT.2015.7160207","url":null,"abstract":"Security is the critical subject in wireless sensor networks. Therefore, WSNs are susceptible to several types of security attacks. One reason to attack sensor networks is the limited capacity of sensor nodes. The security attacks could affect the most significant applications in WSNs area such as military surveillance, traffic monitor, and healthcare. Thus, there are different types of detection approaches against security attacks on the network layer in WSNs. Also, there are severe constraints on sensor nodes like reliability, energy efficiency, and scalability, which affect the security in WSNs. Since the sensor nodes have limited capabilities for most of these constraints, a selective forwarding attack is difficult to detect in the networks. Malicious nodes in the selective forwarding attack, work as normal nodes. However, it attempts to find the sensitive messages and drop them before sending the packet to other nodes. In order to keep this type of attacks away from networks, we propose a multi layers approach (SFD) that preserves the safely of data transmission between sensor nodes while detecting the selective forwarding attack. Furthermore, the approach includes reliability, energy efficiency, and scalability.","PeriodicalId":235333,"journal":{"name":"2015 Long Island Systems, Applications and Technology","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115001358","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Development of a microcontroller based electrical impedance tomography system 基于单片机的电阻抗层析成像系统的研制
Pub Date : 2015-05-01 DOI: 10.1109/LISAT.2015.7160174
Gurmeet Singh, S. Anand, Brejesh Lall, Anurag Srivastava, Vaneet Singh
Electrical Impedance Tomography (EIT) is one of the growing and optimistic imaging modality for clinical imaging with such advantages as: non-invasive, low cost, ease of use and practicality, this method has been used in many areas of science and research. This paper consists of designing and development of hardware for EIT system using microcontroller MSP430G2 and AVR ATMEGA 16. A 16-electrode phantom is developed and studied with an instrumentation for EIT. Using serial communication data applies to PC for image reconstruction using EIDORS.
电阻抗断层成像(EIT)是一种日益发展和被看好的临床成像方式,具有无创、成本低、使用方便、实用性强等优点,已被应用于许多科学和研究领域。本文采用单片机MSP430G2和AVR atmega16进行EIT系统的硬件设计与开发。研制了一种16电极的电致发光体,并利用电致发光仪器进行了研究。利用串行通信数据适用于PC机进行EIDORS图像重建。
{"title":"Development of a microcontroller based electrical impedance tomography system","authors":"Gurmeet Singh, S. Anand, Brejesh Lall, Anurag Srivastava, Vaneet Singh","doi":"10.1109/LISAT.2015.7160174","DOIUrl":"https://doi.org/10.1109/LISAT.2015.7160174","url":null,"abstract":"Electrical Impedance Tomography (EIT) is one of the growing and optimistic imaging modality for clinical imaging with such advantages as: non-invasive, low cost, ease of use and practicality, this method has been used in many areas of science and research. This paper consists of designing and development of hardware for EIT system using microcontroller MSP430G2 and AVR ATMEGA 16. A 16-electrode phantom is developed and studied with an instrumentation for EIT. Using serial communication data applies to PC for image reconstruction using EIDORS.","PeriodicalId":235333,"journal":{"name":"2015 Long Island Systems, Applications and Technology","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116644665","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Initiated decoy states in quantum key distribution protocol by 3 ways channel 量子密钥分配协议中由三路信道发起的诱饵状态
Pub Date : 2015-05-01 DOI: 10.1109/LISAT.2015.7160178
Abdulbast A. Abushgra, K. Elleithy
After decades of research, computer scientists have in recent years come close to reaching substantive results which prove the usability of quantum key distribution (QKD). Several QKD protocols and different schemes have surfaced since the last century. Additionally, some of these protocols were created in new algorithms and up until now, have been proven to be secure; however, other scientists only made modifications to previous original protocols. This paper seeks to create a new scheme in QKD that will communicate between two parties and will give them a high level of security against any well-known attacks while handling both of parties in a manner that will reduce their dependency on both classic communication and the classical channel.
经过几十年的研究,计算机科学家近年来已经接近取得实质性成果,证明了量子密钥分发(QKD)的可用性。自上个世纪以来,出现了几种QKD协议和不同的方案。此外,其中一些协议是用新算法创建的,到目前为止,已被证明是安全的;然而,其他科学家只是对先前的原始协议进行了修改。本文试图在QKD中创建一个新的方案,该方案将在双方之间进行通信,并将为他们提供针对任何已知攻击的高级别安全性,同时以一种减少双方对经典通信和经典通道的依赖的方式处理双方。
{"title":"Initiated decoy states in quantum key distribution protocol by 3 ways channel","authors":"Abdulbast A. Abushgra, K. Elleithy","doi":"10.1109/LISAT.2015.7160178","DOIUrl":"https://doi.org/10.1109/LISAT.2015.7160178","url":null,"abstract":"After decades of research, computer scientists have in recent years come close to reaching substantive results which prove the usability of quantum key distribution (QKD). Several QKD protocols and different schemes have surfaced since the last century. Additionally, some of these protocols were created in new algorithms and up until now, have been proven to be secure; however, other scientists only made modifications to previous original protocols. This paper seeks to create a new scheme in QKD that will communicate between two parties and will give them a high level of security against any well-known attacks while handling both of parties in a manner that will reduce their dependency on both classic communication and the classical channel.","PeriodicalId":235333,"journal":{"name":"2015 Long Island Systems, Applications and Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129471924","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
IPLMS: An intelligent parking lot management system IPLMS:智能停车场管理系统
Pub Date : 2015-05-01 DOI: 10.1109/LISAT.2015.7160219
Jiameng Wang, Stefanie Gebara, Zhengyi Sun, Qi Wu, Keqin Zong, Hao Sun, A. Farajidavar
In this paper, we are introducing an intelligent valet parking management system that guides the cars to autonomously park within a parking lot. The IPLMS for Intelligent Parking Lot Management System, consists of two modules: 1) a model car with a set of micro-controllers and sensors which can scan the environment for suitable parking spot and avoid collision to obstacles, and a Parking Lot Management System (IPLMS) which screens the parking spaces within the parking lot and offers guidelines to the car. The model car has the capability to autonomously maneuver within the parking lot using a fuzzy logic algorithm, and execute parking in the spot determined by the IPLMS, using a parking algorithm. The car receives the instructions from the IPLMS through a wireless communication link. The IPLMS has the flexibility to be adopted by any parking management system, and can potentially save the clients time to look for a parking spot, and/or to stroll from an inaccessible parking space. Moreover, the IPLMS can decrease the financial burden from the parking lot management by offering an easy-to-install system for self-guided valet parking.
在本文中,我们介绍了一种智能代客泊车管理系统,该系统可以引导车辆在停车场内自动停车。智能停车场管理系统(IPLMS)由两个模块组成:1)一个带有一组微控制器和传感器的模型车,该模型车可以扫描环境以寻找合适的停车位并避免与障碍物碰撞,以及一个停车场管理系统(IPLMS),该系统可以筛选停车场内的停车位并为汽车提供指导。模型车采用模糊逻辑算法在停车场内自主机动,并使用停车算法在IPLMS确定的位置执行停车。汽车通过无线通信链路接收来自IPLMS的指令。IPLMS具有被任何停车管理系统采用的灵活性,并且可以潜在地节省客户寻找停车位和/或从无法进入的停车位漫步的时间。此外,IPLMS可以通过提供易于安装的自动引导代客停车系统来减轻停车场管理的经济负担。
{"title":"IPLMS: An intelligent parking lot management system","authors":"Jiameng Wang, Stefanie Gebara, Zhengyi Sun, Qi Wu, Keqin Zong, Hao Sun, A. Farajidavar","doi":"10.1109/LISAT.2015.7160219","DOIUrl":"https://doi.org/10.1109/LISAT.2015.7160219","url":null,"abstract":"In this paper, we are introducing an intelligent valet parking management system that guides the cars to autonomously park within a parking lot. The IPLMS for Intelligent Parking Lot Management System, consists of two modules: 1) a model car with a set of micro-controllers and sensors which can scan the environment for suitable parking spot and avoid collision to obstacles, and a Parking Lot Management System (IPLMS) which screens the parking spaces within the parking lot and offers guidelines to the car. The model car has the capability to autonomously maneuver within the parking lot using a fuzzy logic algorithm, and execute parking in the spot determined by the IPLMS, using a parking algorithm. The car receives the instructions from the IPLMS through a wireless communication link. The IPLMS has the flexibility to be adopted by any parking management system, and can potentially save the clients time to look for a parking spot, and/or to stroll from an inaccessible parking space. Moreover, the IPLMS can decrease the financial burden from the parking lot management by offering an easy-to-install system for self-guided valet parking.","PeriodicalId":235333,"journal":{"name":"2015 Long Island Systems, Applications and Technology","volume":"112 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126361103","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
A novel video steganography algorithm in the wavelet domain based on the KLT tracking algorithm and BCH codes 基于KLT跟踪算法和BCH码的小波域视频隐写新算法
Pub Date : 2015-05-01 DOI: 10.1109/LISAT.2015.7160192
Ramadhan J. Mstafa, K. Elleithy
Recently, video steganography has become a popular option for a secret data communication. The performance of any steganography algorithm is based on the embedding efficiency, embedding payload, and robustness against attackers. In this paper, we propose a novel video steganography algorithm in the wavelet domain based on the KLT tracking algorithm and BCH codes. The proposed algorithm includes four different phases. First, the secret message is preprocessed, and BCH codes (n, k, t) are applied in order to produce an encoded message. Second, face detection and face tracking algorithms are applied on the cover videos in order to identify the facial regions of interest. Third, the process of embedding the encoded message into the high and middle frequency wavelet coefficients of all facial regions is performed. Forth, the process of extracting the secret message from the high and middle frequency wavelet coefficients for each RGB components of all facial regions is accomplished. Experimental results of the proposed video steganography algorithm have demonstrated a high embedding efficiency and a high embedding payload.
近年来,视频隐写术已成为一种流行的秘密数据通信选择。任何隐写算法的性能都是基于嵌入效率、嵌入有效载荷和对攻击者的鲁棒性。本文提出了一种基于KLT跟踪算法和BCH码的小波域视频隐写算法。该算法包括四个不同的阶段。首先,对秘密消息进行预处理,并应用BCH码(n, k, t)以产生编码消息。其次,将人脸检测和人脸跟踪算法应用于封面视频,以识别感兴趣的面部区域;第三,将编码后的信息嵌入到面部各区域的高、中频小波系数中;第四,从人脸各区域RGB分量的高、中频小波系数中提取秘密信息;实验结果表明,该算法具有较高的嵌入效率和嵌入有效载荷。
{"title":"A novel video steganography algorithm in the wavelet domain based on the KLT tracking algorithm and BCH codes","authors":"Ramadhan J. Mstafa, K. Elleithy","doi":"10.1109/LISAT.2015.7160192","DOIUrl":"https://doi.org/10.1109/LISAT.2015.7160192","url":null,"abstract":"Recently, video steganography has become a popular option for a secret data communication. The performance of any steganography algorithm is based on the embedding efficiency, embedding payload, and robustness against attackers. In this paper, we propose a novel video steganography algorithm in the wavelet domain based on the KLT tracking algorithm and BCH codes. The proposed algorithm includes four different phases. First, the secret message is preprocessed, and BCH codes (n, k, t) are applied in order to produce an encoded message. Second, face detection and face tracking algorithms are applied on the cover videos in order to identify the facial regions of interest. Third, the process of embedding the encoded message into the high and middle frequency wavelet coefficients of all facial regions is performed. Forth, the process of extracting the secret message from the high and middle frequency wavelet coefficients for each RGB components of all facial regions is accomplished. Experimental results of the proposed video steganography algorithm have demonstrated a high embedding efficiency and a high embedding payload.","PeriodicalId":235333,"journal":{"name":"2015 Long Island Systems, Applications and Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128546392","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 52
Analysis of video streaming using LTE technology 基于LTE技术的视频流分析
Pub Date : 2015-05-01 DOI: 10.1109/LISAT.2015.7160213
Andre Santos, Edson Pinheiro, R. Mateus, A. Odeh, Eman Abdel Fattah
Long-Term Evolution (LTE) is a radio access technology. It is a standard cellular network that enables mobile transmission of streaming high definition video in real time. This paper analyzes the development and LTE performance in streaming multimedia through an analysis of the video transmission package performance. Furthermore, we examined the influence of LTE in streaming multimedia through the adoption of a simulator.
LTE (Long-Term Evolution)是一种无线接入技术。它是一种标准的蜂窝网络,可以实时传输流媒体高清视频。本文通过对视频传输包性能的分析,分析了LTE在流媒体中的发展和性能。此外,我们通过采用模拟器来检验LTE对流媒体的影响。
{"title":"Analysis of video streaming using LTE technology","authors":"Andre Santos, Edson Pinheiro, R. Mateus, A. Odeh, Eman Abdel Fattah","doi":"10.1109/LISAT.2015.7160213","DOIUrl":"https://doi.org/10.1109/LISAT.2015.7160213","url":null,"abstract":"Long-Term Evolution (LTE) is a radio access technology. It is a standard cellular network that enables mobile transmission of streaming high definition video in real time. This paper analyzes the development and LTE performance in streaming multimedia through an analysis of the video transmission package performance. Furthermore, we examined the influence of LTE in streaming multimedia through the adoption of a simulator.","PeriodicalId":235333,"journal":{"name":"2015 Long Island Systems, Applications and Technology","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114918353","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An efficient message authentication and source privacy with a hidden generator point based on ECC 一种基于ECC的高效消息认证和带有隐藏生成点的源隐私
Pub Date : 2015-05-01 DOI: 10.1109/LISAT.2015.7160220
Remah Alshinina, K. Elleithy
Wireless Sensor Networks have been widely used by researchers in different personal and organizational applications. Recently, WSN has become the major focus of researchers to establish a secure network against malicious node. The security of WSN can be subjected to threats by attackers. In order to limit these threats on WSNs, Elliptic Curve Cryptography (ECC) introduces great features such as smaller key size, less parameters, and higher intensity compared with RSA and public key algorithms. In this paper, we proposed an ECC based approach using a unique authentication message and source privacy through a hidden generator point. This scheme contains the initialization phase, registration phase, and authentication phase. These phases were introduced to develop an efficient algorithm, decrease the overhead, and increase the authentication between nodes. The scheme allows many nodes to transfer unlimited messages without any imposed threshold and guarantee the message source privacy.
无线传感器网络已被研究人员广泛应用于不同的个人和组织应用。近年来,如何建立一个安全的网络来抵御恶意节点已成为无线传感器网络研究的重点。无线传感器网络的安全性容易受到攻击者的威胁。为了限制这些威胁,与RSA和公钥算法相比,椭圆曲线加密(ECC)引入了更小的密钥大小、更少的参数和更高的强度等优点。在本文中,我们提出了一种基于ECC的方法,通过一个隐藏的生成器点使用唯一的认证消息和源隐私。该方案分为初始化阶段、注册阶段和认证阶段。引入这些阶段是为了开发有效的算法,减少开销,增加节点之间的身份验证。该方案允许多个节点不受限制地传输消息,保证了消息源的隐私性。
{"title":"An efficient message authentication and source privacy with a hidden generator point based on ECC","authors":"Remah Alshinina, K. Elleithy","doi":"10.1109/LISAT.2015.7160220","DOIUrl":"https://doi.org/10.1109/LISAT.2015.7160220","url":null,"abstract":"Wireless Sensor Networks have been widely used by researchers in different personal and organizational applications. Recently, WSN has become the major focus of researchers to establish a secure network against malicious node. The security of WSN can be subjected to threats by attackers. In order to limit these threats on WSNs, Elliptic Curve Cryptography (ECC) introduces great features such as smaller key size, less parameters, and higher intensity compared with RSA and public key algorithms. In this paper, we proposed an ECC based approach using a unique authentication message and source privacy through a hidden generator point. This scheme contains the initialization phase, registration phase, and authentication phase. These phases were introduced to develop an efficient algorithm, decrease the overhead, and increase the authentication between nodes. The scheme allows many nodes to transfer unlimited messages without any imposed threshold and guarantee the message source privacy.","PeriodicalId":235333,"journal":{"name":"2015 Long Island Systems, Applications and Technology","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125398311","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Fixed point performance of interpolation/extrapolation algorithms for resource constrained wireless sensors 资源受限无线传感器插值/外推算法的定点性能
Pub Date : 2015-05-01 DOI: 10.1109/LISAT.2015.7160175
B. Beheshti
Date collection in wireless networks is performed by sampling the phenomenon to be measured at recurring intervals in time. In situations where the sensors must operate over a very long time without the possibility of battery replacement, the sleep cycle for these sensors must be as long as possible (and the longest the design allows). Longer sleep cycles, while extending battery life may be too long for the sampling rate required to collect data - i.e. more frequent wake ups would be needed from the sensor. On the other hand, the sensors can collect samples at a lower than required rate, but interpolate data-points in between the actual measured sampled data. Interpolation implemented in floating point can be demanding in terms of energy cost to the sensors. Therefore as it is generally the case, fixed point implementations have to be introduced to reduce the energy demands due to excessive computations/instruction count due to floating point arithmetic. In this paper we present a fixed point implementation of the Neville's interpolation scheme, and present performance results as compared to the floating point (ideal) results.
无线网络中的数据收集是通过对待测现象在时间上的重复间隔进行采样来完成的。在传感器必须长时间工作而不可能更换电池的情况下,这些传感器的睡眠周期必须尽可能长(并且是设计允许的最长时间)。更长的睡眠周期,同时延长电池寿命,对于收集数据所需的采样率来说可能太长了——也就是说,传感器需要更频繁的唤醒。另一方面,传感器可以以低于要求的速率收集样本,但在实际测量的采样数据之间插入数据点。在浮点中实现的插值可能对传感器的能量成本要求很高。因此,通常情况下,必须引入定点实现来减少由于浮点运算导致的过多计算/指令计数而导致的能量需求。在本文中,我们提出了内维尔插值方案的定点实现,并给出了与浮点(理想)结果相比的性能结果。
{"title":"Fixed point performance of interpolation/extrapolation algorithms for resource constrained wireless sensors","authors":"B. Beheshti","doi":"10.1109/LISAT.2015.7160175","DOIUrl":"https://doi.org/10.1109/LISAT.2015.7160175","url":null,"abstract":"Date collection in wireless networks is performed by sampling the phenomenon to be measured at recurring intervals in time. In situations where the sensors must operate over a very long time without the possibility of battery replacement, the sleep cycle for these sensors must be as long as possible (and the longest the design allows). Longer sleep cycles, while extending battery life may be too long for the sampling rate required to collect data - i.e. more frequent wake ups would be needed from the sensor. On the other hand, the sensors can collect samples at a lower than required rate, but interpolate data-points in between the actual measured sampled data. Interpolation implemented in floating point can be demanding in terms of energy cost to the sensors. Therefore as it is generally the case, fixed point implementations have to be introduced to reduce the energy demands due to excessive computations/instruction count due to floating point arithmetic. In this paper we present a fixed point implementation of the Neville's interpolation scheme, and present performance results as compared to the floating point (ideal) results.","PeriodicalId":235333,"journal":{"name":"2015 Long Island Systems, Applications and Technology","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126776957","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Highly efficient novel text steganography algorithms 高效新颖的文本隐写算法
Pub Date : 2015-05-01 DOI: 10.1109/LISAT.2015.7160209
A. Odeh, K. Elleithy, M. Faezipour, Eman Abdelfattah
This paper investigates eight novel Steganography algorithms employing text file as a carrier file. The proposed model hides secret data in the text file by manipulating the font format or inserting special symbols in the text file. Furthermore, the suggested algorithms can be applied to both Unicode and ASCII code languages, regardless of the text file format. In addition, a merging capability among the techniques is introduced, which allows alternatives for users based on the system requirements. The proposed algorithms achieve a high degree of optimized Steganography attributes such as hidden ratio, robustness, and transparency.
本文研究了以文本文件为载体文件的八种新型隐写算法。该模型通过操纵字体格式或在文本文件中插入特殊符号来隐藏文本文件中的秘密数据。此外,建议的算法可以应用于Unicode和ASCII代码语言,而不考虑文本文件格式。此外,还介绍了技术之间的合并功能,它允许用户根据系统需求进行选择。提出的算法实现了隐写属性的高度优化,如隐藏比、鲁棒性和透明度。
{"title":"Highly efficient novel text steganography algorithms","authors":"A. Odeh, K. Elleithy, M. Faezipour, Eman Abdelfattah","doi":"10.1109/LISAT.2015.7160209","DOIUrl":"https://doi.org/10.1109/LISAT.2015.7160209","url":null,"abstract":"This paper investigates eight novel Steganography algorithms employing text file as a carrier file. The proposed model hides secret data in the text file by manipulating the font format or inserting special symbols in the text file. Furthermore, the suggested algorithms can be applied to both Unicode and ASCII code languages, regardless of the text file format. In addition, a merging capability among the techniques is introduced, which allows alternatives for users based on the system requirements. The proposed algorithms achieve a high degree of optimized Steganography attributes such as hidden ratio, robustness, and transparency.","PeriodicalId":235333,"journal":{"name":"2015 Long Island Systems, Applications and Technology","volume":"83 9","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134392130","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A comparison of different machine learning algorithms using single channel EEG signal for classifying human sleep stages 不同机器学习算法在单通道脑电图信号分类人类睡眠阶段的比较
Pub Date : 2015-05-01 DOI: 10.1109/LISAT.2015.7160185
K. Aboalayon, Wafaa S. Almuhammadi, M. Faezipour
In recent years, the estimation of human sleep disorders from Electroencephalogram (EEG) signals have played an important role in developing automatic detection of sleep stages. A few methods exist in the market presently towards this aim. However, sleep physicians may not have full assurance and consideration in such methods due to concerns associated with systems accuracy, sensitivity and specificity. This paper presents a novel and efficient technique that can be implemented in a microcontroller device to identify sleep stages in an effort to assist physicians in the diagnosis and treatment of related sleep disorders by enhancing the accuracy of the developed algorithm using a single channel of EEG signals. First, the dataset of EEG signal is filtered and decomposed into delta, theta, alpha, beta and gamma subbands using Butterworth band-pass filters. Second, a set of sample statistical discriminating features are derived from each frequency band. Finally, sleep stages consisting of Wakefulness, Rapid Eye Movement (REM) and Non-Rapid Eye Movement (NREM) are classified using several supervised machine learning classifiers including multi-class Support Vector Machines (SVM), Decision Trees (DT), Neural Networks (NN), K-Nearest Neighbors (KNN) and Naive Bayes (NB). This paper combines REM with Stage 1 NREM due to data similarities. Performance is then compared based on single channel EEG signals that were obtained from 20 healthy subjects. The results show that the proposed technique using DT classifier efficiently achieves high accuracy of 97.30% in differentiating sleeps stages. Also, a comparison of our method with some recent available works in the literature reiterates the high classification accuracy performance.
近年来,从脑电图(EEG)信号中估计人类睡眠障碍在开发睡眠阶段自动检测方面发挥了重要作用。目前市场上有几种实现这一目标的方法。然而,由于对系统准确性、敏感性和特异性的担忧,睡眠医生可能对这些方法没有充分的保证和考虑。本文提出了一种新颖而有效的技术,可以在微控制器设备中实现,通过提高使用单通道脑电图信号的开发算法的准确性,来识别睡眠阶段,以协助医生诊断和治疗相关的睡眠障碍。首先,利用巴特沃斯带通滤波器对脑电信号数据集进行滤波并分解为delta、theta、alpha、beta和gamma四个子带;其次,从每个频带导出一组样本统计判别特征。最后,使用多类支持向量机(SVM)、决策树(DT)、神经网络(NN)、k近邻(KNN)和朴素贝叶斯(NB)等监督式机器学习分类器对觉醒、快速眼动(REM)和非快速眼动(NREM)组成的睡眠阶段进行分类。由于数据相似,本文将REM与第一阶段NREM相结合。然后根据从20名健康受试者获得的单通道EEG信号对性能进行比较。结果表明,基于DT分类器的睡眠阶段识别准确率高达97.30%。此外,将我们的方法与最近一些文献中可用的工作进行比较,重申了高分类精度的性能。
{"title":"A comparison of different machine learning algorithms using single channel EEG signal for classifying human sleep stages","authors":"K. Aboalayon, Wafaa S. Almuhammadi, M. Faezipour","doi":"10.1109/LISAT.2015.7160185","DOIUrl":"https://doi.org/10.1109/LISAT.2015.7160185","url":null,"abstract":"In recent years, the estimation of human sleep disorders from Electroencephalogram (EEG) signals have played an important role in developing automatic detection of sleep stages. A few methods exist in the market presently towards this aim. However, sleep physicians may not have full assurance and consideration in such methods due to concerns associated with systems accuracy, sensitivity and specificity. This paper presents a novel and efficient technique that can be implemented in a microcontroller device to identify sleep stages in an effort to assist physicians in the diagnosis and treatment of related sleep disorders by enhancing the accuracy of the developed algorithm using a single channel of EEG signals. First, the dataset of EEG signal is filtered and decomposed into delta, theta, alpha, beta and gamma subbands using Butterworth band-pass filters. Second, a set of sample statistical discriminating features are derived from each frequency band. Finally, sleep stages consisting of Wakefulness, Rapid Eye Movement (REM) and Non-Rapid Eye Movement (NREM) are classified using several supervised machine learning classifiers including multi-class Support Vector Machines (SVM), Decision Trees (DT), Neural Networks (NN), K-Nearest Neighbors (KNN) and Naive Bayes (NB). This paper combines REM with Stage 1 NREM due to data similarities. Performance is then compared based on single channel EEG signals that were obtained from 20 healthy subjects. The results show that the proposed technique using DT classifier efficiently achieves high accuracy of 97.30% in differentiating sleeps stages. Also, a comparison of our method with some recent available works in the literature reiterates the high classification accuracy performance.","PeriodicalId":235333,"journal":{"name":"2015 Long Island Systems, Applications and Technology","volume":"99 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134641059","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 41
期刊
2015 Long Island Systems, Applications and Technology
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1