首页 > 最新文献

2015 Long Island Systems, Applications and Technology最新文献

英文 中文
Development of a microcontroller based electrical impedance tomography system 基于单片机的电阻抗层析成像系统的研制
Pub Date : 2015-05-01 DOI: 10.1109/LISAT.2015.7160174
Gurmeet Singh, S. Anand, Brejesh Lall, Anurag Srivastava, Vaneet Singh
Electrical Impedance Tomography (EIT) is one of the growing and optimistic imaging modality for clinical imaging with such advantages as: non-invasive, low cost, ease of use and practicality, this method has been used in many areas of science and research. This paper consists of designing and development of hardware for EIT system using microcontroller MSP430G2 and AVR ATMEGA 16. A 16-electrode phantom is developed and studied with an instrumentation for EIT. Using serial communication data applies to PC for image reconstruction using EIDORS.
电阻抗断层成像(EIT)是一种日益发展和被看好的临床成像方式,具有无创、成本低、使用方便、实用性强等优点,已被应用于许多科学和研究领域。本文采用单片机MSP430G2和AVR atmega16进行EIT系统的硬件设计与开发。研制了一种16电极的电致发光体,并利用电致发光仪器进行了研究。利用串行通信数据适用于PC机进行EIDORS图像重建。
{"title":"Development of a microcontroller based electrical impedance tomography system","authors":"Gurmeet Singh, S. Anand, Brejesh Lall, Anurag Srivastava, Vaneet Singh","doi":"10.1109/LISAT.2015.7160174","DOIUrl":"https://doi.org/10.1109/LISAT.2015.7160174","url":null,"abstract":"Electrical Impedance Tomography (EIT) is one of the growing and optimistic imaging modality for clinical imaging with such advantages as: non-invasive, low cost, ease of use and practicality, this method has been used in many areas of science and research. This paper consists of designing and development of hardware for EIT system using microcontroller MSP430G2 and AVR ATMEGA 16. A 16-electrode phantom is developed and studied with an instrumentation for EIT. Using serial communication data applies to PC for image reconstruction using EIDORS.","PeriodicalId":235333,"journal":{"name":"2015 Long Island Systems, Applications and Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2015-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116644665","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
A new selected points to enhance radio wave propagation strength outside the coverage area of the mobile towers in the dead spots of cellular mobile WiFi downloads 在蜂窝移动wi - fi下载的死点移动塔覆盖区域外的新选点增强无线电波传播强度
Pub Date : 2015-05-01 DOI: 10.1109/LISAT.2015.7160194
Zyad Nossire, J. Dichter, Navarun Gupta, J. Fathi
Mobile phone base station (tower) provides coverage for one or more geographical areas, known as cells. A mobile phone network is made up of a base station operating in conjunction with adjacent base stations. Base stations must be carefully located in relation to each other, so each cell in the network functions efficiently to ensure minimum interference between cells and good signal quality. One of the major problems for cellular wireless devices is calls being dropped and failure in downloading data. Our research uses a new recommendation in determining tower positions. Thus, providing an easy interface to replace traditional control methods and maintain signal levels. The weak WiFi wave propagation outside tower's coverage areas is investigated at the University of Bridgeport (UB) campus. The campus serves as good experimental settings because it exemplifies typical signal dead spots, locations where little to no WiFi signal is available. In this paper, we investigate path loss propagation between the base stations and we identify and categorize these problems. We then apply our path loss propagation algorithmic models to show that signal strength is significantly improved when applying the proposed model. Finally, we show the efficiency of the proposed positions.
移动电话基站(塔)提供覆盖一个或多个地理区域,称为小区。移动电话网络是由一个基站与相邻的基站一起操作组成的。基站之间必须仔细定位,这样网络中的每个小区才能有效地工作,以确保小区之间的干扰最小和良好的信号质量。蜂窝无线设备的主要问题之一是掉线和下载数据失败。我们的研究采用了一种新的建议来确定塔的位置。因此,提供了一个简单的接口,以取代传统的控制方法和维持信号电平。在布里奇波特大学(University of Bridgeport, UB)校园内,对塔架覆盖区域外的弱WiFi波传播进行了研究。校园是一个很好的实验场所,因为它是典型的信号盲区,在那里几乎没有WiFi信号可用。本文研究了基站间的路径损耗传播问题,并对这些问题进行了识别和分类。然后,我们应用我们的路径损耗传播算法模型来表明,当应用所提出的模型时,信号强度显着提高。最后,我们展示了所提出的位置的效率。
{"title":"A new selected points to enhance radio wave propagation strength outside the coverage area of the mobile towers in the dead spots of cellular mobile WiFi downloads","authors":"Zyad Nossire, J. Dichter, Navarun Gupta, J. Fathi","doi":"10.1109/LISAT.2015.7160194","DOIUrl":"https://doi.org/10.1109/LISAT.2015.7160194","url":null,"abstract":"Mobile phone base station (tower) provides coverage for one or more geographical areas, known as cells. A mobile phone network is made up of a base station operating in conjunction with adjacent base stations. Base stations must be carefully located in relation to each other, so each cell in the network functions efficiently to ensure minimum interference between cells and good signal quality. One of the major problems for cellular wireless devices is calls being dropped and failure in downloading data. Our research uses a new recommendation in determining tower positions. Thus, providing an easy interface to replace traditional control methods and maintain signal levels. The weak WiFi wave propagation outside tower's coverage areas is investigated at the University of Bridgeport (UB) campus. The campus serves as good experimental settings because it exemplifies typical signal dead spots, locations where little to no WiFi signal is available. In this paper, we investigate path loss propagation between the base stations and we identify and categorize these problems. We then apply our path loss propagation algorithmic models to show that signal strength is significantly improved when applying the proposed model. Finally, we show the efficiency of the proposed positions.","PeriodicalId":235333,"journal":{"name":"2015 Long Island Systems, Applications and Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2015-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117214180","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A modified region growing based algorithm to vessel segmentation in magnetic resonance angiography 一种改进的基于区域增长的磁共振血管造影血管分割算法
Pub Date : 2015-05-01 DOI: 10.1109/LISAT.2015.7160191
M. Almi'ani, B. Barkana
The progress of medical imaging instrumentation has stirred the development of new computer-aided methods of image processing and analysis for better understanding and interpretation of medical images for differential diagnosis, intervention, and treatment monitoring. Image processing and analysis methods have been used to help physicians to make important medical decisions through physician-computer interaction. A modified region growing algorithm is proposed to extract cerebral vessels using a magnetic resonance angiography (MRA) database. To improve the performance of the image segmentation method, as a pre-processing step, image enhancement methods are applied by the gamma correction technique and spatial operations. This step improves the detection of gray-level discontinuities in MRA images. The traditional region growing method is modified by extending the neighborhood as 24 pixels and by defining a filling protocol to label vascular structure. The performance of the proposed algorithm is compared with that of the traditional region growing method and four other segmentation methods. Our proposed method outperformed the other methods. The minimum and maximum errors of the modified region growing method is calculated as zero and 0.82, respectively while the traditional region growing method has 1.85 and 21.91.
医学成像仪器的进步促进了新的计算机辅助图像处理和分析方法的发展,以便更好地理解和解释用于鉴别诊断、干预和治疗监测的医学图像。图像处理和分析方法已被用于帮助医生通过医生-计算机交互做出重要的医疗决策。提出了一种改进的区域增长算法,利用磁共振血管成像(MRA)数据库提取脑血管。为了提高图像分割方法的性能,作为预处理步骤,采用了伽玛校正技术和空间运算的图像增强方法。这一步改进了MRA图像中灰度不连续性的检测。对传统的区域生长方法进行了改进,将邻域扩展为24像素,并定义了填充协议来标记维管结构。将该算法的性能与传统的区域增长方法和其他四种分割方法进行了比较。我们提出的方法优于其他方法。改进区域生长法的最小和最大误差分别为0和0.82,而传统区域生长法的最小和最大误差分别为1.85和21.91。
{"title":"A modified region growing based algorithm to vessel segmentation in magnetic resonance angiography","authors":"M. Almi'ani, B. Barkana","doi":"10.1109/LISAT.2015.7160191","DOIUrl":"https://doi.org/10.1109/LISAT.2015.7160191","url":null,"abstract":"The progress of medical imaging instrumentation has stirred the development of new computer-aided methods of image processing and analysis for better understanding and interpretation of medical images for differential diagnosis, intervention, and treatment monitoring. Image processing and analysis methods have been used to help physicians to make important medical decisions through physician-computer interaction. A modified region growing algorithm is proposed to extract cerebral vessels using a magnetic resonance angiography (MRA) database. To improve the performance of the image segmentation method, as a pre-processing step, image enhancement methods are applied by the gamma correction technique and spatial operations. This step improves the detection of gray-level discontinuities in MRA images. The traditional region growing method is modified by extending the neighborhood as 24 pixels and by defining a filling protocol to label vascular structure. The performance of the proposed algorithm is compared with that of the traditional region growing method and four other segmentation methods. Our proposed method outperformed the other methods. The minimum and maximum errors of the modified region growing method is calculated as zero and 0.82, respectively while the traditional region growing method has 1.85 and 21.91.","PeriodicalId":235333,"journal":{"name":"2015 Long Island Systems, Applications and Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2015-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132474813","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Model of indoor signal propagation using log-normal shadowing 使用对数正态阴影的室内信号传播模型
Pub Date : 2015-05-01 DOI: 10.1109/LISAT.2015.7160217
R. Desimone, Betsy Mendieta Brito, J. Baston
Indoor signal propagation characteristics can be difficult to predict accurately. Factors such as building layout and building materials can have a major effect on signal propagation. In this paper we will model indoor signal propagation using lognormal shadowing characteristics. The benefit of this model over others is its simplicity. The accuracy of this model at predicting the relationship between received signal strength (RSS) and the distance from transmitter to receiver will be determined. The link that was tested and modeled uses the IEEE 802.11n standard. Both 2.4 GHz and 5 GHz Industrial Scientific and Medical (ISM) bands were tested and modeled.
室内信号的传播特性很难准确预测。建筑布局和建筑材料等因素对信号传播有重要影响。在本文中,我们将使用对数正态阴影特性来模拟室内信号传播。这个模型相对于其他模型的好处是简单。该模型在预测接收信号强度(RSS)与发射机到接收机的距离之间的关系方面的准确性将被确定。测试和建模的链路使用IEEE 802.11n标准。对2.4 GHz和5 GHz工业科学和医疗(ISM)频段进行了测试和建模。
{"title":"Model of indoor signal propagation using log-normal shadowing","authors":"R. Desimone, Betsy Mendieta Brito, J. Baston","doi":"10.1109/LISAT.2015.7160217","DOIUrl":"https://doi.org/10.1109/LISAT.2015.7160217","url":null,"abstract":"Indoor signal propagation characteristics can be difficult to predict accurately. Factors such as building layout and building materials can have a major effect on signal propagation. In this paper we will model indoor signal propagation using lognormal shadowing characteristics. The benefit of this model over others is its simplicity. The accuracy of this model at predicting the relationship between received signal strength (RSS) and the distance from transmitter to receiver will be determined. The link that was tested and modeled uses the IEEE 802.11n standard. Both 2.4 GHz and 5 GHz Industrial Scientific and Medical (ISM) bands were tested and modeled.","PeriodicalId":235333,"journal":{"name":"2015 Long Island Systems, Applications and Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2015-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134217111","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A novel video steganography algorithm in the wavelet domain based on the KLT tracking algorithm and BCH codes 基于KLT跟踪算法和BCH码的小波域视频隐写新算法
Pub Date : 2015-05-01 DOI: 10.1109/LISAT.2015.7160192
Ramadhan J. Mstafa, K. Elleithy
Recently, video steganography has become a popular option for a secret data communication. The performance of any steganography algorithm is based on the embedding efficiency, embedding payload, and robustness against attackers. In this paper, we propose a novel video steganography algorithm in the wavelet domain based on the KLT tracking algorithm and BCH codes. The proposed algorithm includes four different phases. First, the secret message is preprocessed, and BCH codes (n, k, t) are applied in order to produce an encoded message. Second, face detection and face tracking algorithms are applied on the cover videos in order to identify the facial regions of interest. Third, the process of embedding the encoded message into the high and middle frequency wavelet coefficients of all facial regions is performed. Forth, the process of extracting the secret message from the high and middle frequency wavelet coefficients for each RGB components of all facial regions is accomplished. Experimental results of the proposed video steganography algorithm have demonstrated a high embedding efficiency and a high embedding payload.
近年来,视频隐写术已成为一种流行的秘密数据通信选择。任何隐写算法的性能都是基于嵌入效率、嵌入有效载荷和对攻击者的鲁棒性。本文提出了一种基于KLT跟踪算法和BCH码的小波域视频隐写算法。该算法包括四个不同的阶段。首先,对秘密消息进行预处理,并应用BCH码(n, k, t)以产生编码消息。其次,将人脸检测和人脸跟踪算法应用于封面视频,以识别感兴趣的面部区域;第三,将编码后的信息嵌入到面部各区域的高、中频小波系数中;第四,从人脸各区域RGB分量的高、中频小波系数中提取秘密信息;实验结果表明,该算法具有较高的嵌入效率和嵌入有效载荷。
{"title":"A novel video steganography algorithm in the wavelet domain based on the KLT tracking algorithm and BCH codes","authors":"Ramadhan J. Mstafa, K. Elleithy","doi":"10.1109/LISAT.2015.7160192","DOIUrl":"https://doi.org/10.1109/LISAT.2015.7160192","url":null,"abstract":"Recently, video steganography has become a popular option for a secret data communication. The performance of any steganography algorithm is based on the embedding efficiency, embedding payload, and robustness against attackers. In this paper, we propose a novel video steganography algorithm in the wavelet domain based on the KLT tracking algorithm and BCH codes. The proposed algorithm includes four different phases. First, the secret message is preprocessed, and BCH codes (n, k, t) are applied in order to produce an encoded message. Second, face detection and face tracking algorithms are applied on the cover videos in order to identify the facial regions of interest. Third, the process of embedding the encoded message into the high and middle frequency wavelet coefficients of all facial regions is performed. Forth, the process of extracting the secret message from the high and middle frequency wavelet coefficients for each RGB components of all facial regions is accomplished. Experimental results of the proposed video steganography algorithm have demonstrated a high embedding efficiency and a high embedding payload.","PeriodicalId":235333,"journal":{"name":"2015 Long Island Systems, Applications and Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2015-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128546392","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 52
Analysis of video streaming using LTE technology 基于LTE技术的视频流分析
Pub Date : 2015-05-01 DOI: 10.1109/LISAT.2015.7160213
Andre Santos, Edson Pinheiro, R. Mateus, A. Odeh, Eman Abdel Fattah
Long-Term Evolution (LTE) is a radio access technology. It is a standard cellular network that enables mobile transmission of streaming high definition video in real time. This paper analyzes the development and LTE performance in streaming multimedia through an analysis of the video transmission package performance. Furthermore, we examined the influence of LTE in streaming multimedia through the adoption of a simulator.
LTE (Long-Term Evolution)是一种无线接入技术。它是一种标准的蜂窝网络,可以实时传输流媒体高清视频。本文通过对视频传输包性能的分析,分析了LTE在流媒体中的发展和性能。此外,我们通过采用模拟器来检验LTE对流媒体的影响。
{"title":"Analysis of video streaming using LTE technology","authors":"Andre Santos, Edson Pinheiro, R. Mateus, A. Odeh, Eman Abdel Fattah","doi":"10.1109/LISAT.2015.7160213","DOIUrl":"https://doi.org/10.1109/LISAT.2015.7160213","url":null,"abstract":"Long-Term Evolution (LTE) is a radio access technology. It is a standard cellular network that enables mobile transmission of streaming high definition video in real time. This paper analyzes the development and LTE performance in streaming multimedia through an analysis of the video transmission package performance. Furthermore, we examined the influence of LTE in streaming multimedia through the adoption of a simulator.","PeriodicalId":235333,"journal":{"name":"2015 Long Island Systems, Applications and Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2015-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114918353","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An efficient message authentication and source privacy with a hidden generator point based on ECC 一种基于ECC的高效消息认证和带有隐藏生成点的源隐私
Pub Date : 2015-05-01 DOI: 10.1109/LISAT.2015.7160220
Remah Alshinina, K. Elleithy
Wireless Sensor Networks have been widely used by researchers in different personal and organizational applications. Recently, WSN has become the major focus of researchers to establish a secure network against malicious node. The security of WSN can be subjected to threats by attackers. In order to limit these threats on WSNs, Elliptic Curve Cryptography (ECC) introduces great features such as smaller key size, less parameters, and higher intensity compared with RSA and public key algorithms. In this paper, we proposed an ECC based approach using a unique authentication message and source privacy through a hidden generator point. This scheme contains the initialization phase, registration phase, and authentication phase. These phases were introduced to develop an efficient algorithm, decrease the overhead, and increase the authentication between nodes. The scheme allows many nodes to transfer unlimited messages without any imposed threshold and guarantee the message source privacy.
无线传感器网络已被研究人员广泛应用于不同的个人和组织应用。近年来,如何建立一个安全的网络来抵御恶意节点已成为无线传感器网络研究的重点。无线传感器网络的安全性容易受到攻击者的威胁。为了限制这些威胁,与RSA和公钥算法相比,椭圆曲线加密(ECC)引入了更小的密钥大小、更少的参数和更高的强度等优点。在本文中,我们提出了一种基于ECC的方法,通过一个隐藏的生成器点使用唯一的认证消息和源隐私。该方案分为初始化阶段、注册阶段和认证阶段。引入这些阶段是为了开发有效的算法,减少开销,增加节点之间的身份验证。该方案允许多个节点不受限制地传输消息,保证了消息源的隐私性。
{"title":"An efficient message authentication and source privacy with a hidden generator point based on ECC","authors":"Remah Alshinina, K. Elleithy","doi":"10.1109/LISAT.2015.7160220","DOIUrl":"https://doi.org/10.1109/LISAT.2015.7160220","url":null,"abstract":"Wireless Sensor Networks have been widely used by researchers in different personal and organizational applications. Recently, WSN has become the major focus of researchers to establish a secure network against malicious node. The security of WSN can be subjected to threats by attackers. In order to limit these threats on WSNs, Elliptic Curve Cryptography (ECC) introduces great features such as smaller key size, less parameters, and higher intensity compared with RSA and public key algorithms. In this paper, we proposed an ECC based approach using a unique authentication message and source privacy through a hidden generator point. This scheme contains the initialization phase, registration phase, and authentication phase. These phases were introduced to develop an efficient algorithm, decrease the overhead, and increase the authentication between nodes. The scheme allows many nodes to transfer unlimited messages without any imposed threshold and guarantee the message source privacy.","PeriodicalId":235333,"journal":{"name":"2015 Long Island Systems, Applications and Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2015-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125398311","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Fixed point performance of interpolation/extrapolation algorithms for resource constrained wireless sensors 资源受限无线传感器插值/外推算法的定点性能
Pub Date : 2015-05-01 DOI: 10.1109/LISAT.2015.7160175
B. Beheshti
Date collection in wireless networks is performed by sampling the phenomenon to be measured at recurring intervals in time. In situations where the sensors must operate over a very long time without the possibility of battery replacement, the sleep cycle for these sensors must be as long as possible (and the longest the design allows). Longer sleep cycles, while extending battery life may be too long for the sampling rate required to collect data - i.e. more frequent wake ups would be needed from the sensor. On the other hand, the sensors can collect samples at a lower than required rate, but interpolate data-points in between the actual measured sampled data. Interpolation implemented in floating point can be demanding in terms of energy cost to the sensors. Therefore as it is generally the case, fixed point implementations have to be introduced to reduce the energy demands due to excessive computations/instruction count due to floating point arithmetic. In this paper we present a fixed point implementation of the Neville's interpolation scheme, and present performance results as compared to the floating point (ideal) results.
无线网络中的数据收集是通过对待测现象在时间上的重复间隔进行采样来完成的。在传感器必须长时间工作而不可能更换电池的情况下,这些传感器的睡眠周期必须尽可能长(并且是设计允许的最长时间)。更长的睡眠周期,同时延长电池寿命,对于收集数据所需的采样率来说可能太长了——也就是说,传感器需要更频繁的唤醒。另一方面,传感器可以以低于要求的速率收集样本,但在实际测量的采样数据之间插入数据点。在浮点中实现的插值可能对传感器的能量成本要求很高。因此,通常情况下,必须引入定点实现来减少由于浮点运算导致的过多计算/指令计数而导致的能量需求。在本文中,我们提出了内维尔插值方案的定点实现,并给出了与浮点(理想)结果相比的性能结果。
{"title":"Fixed point performance of interpolation/extrapolation algorithms for resource constrained wireless sensors","authors":"B. Beheshti","doi":"10.1109/LISAT.2015.7160175","DOIUrl":"https://doi.org/10.1109/LISAT.2015.7160175","url":null,"abstract":"Date collection in wireless networks is performed by sampling the phenomenon to be measured at recurring intervals in time. In situations where the sensors must operate over a very long time without the possibility of battery replacement, the sleep cycle for these sensors must be as long as possible (and the longest the design allows). Longer sleep cycles, while extending battery life may be too long for the sampling rate required to collect data - i.e. more frequent wake ups would be needed from the sensor. On the other hand, the sensors can collect samples at a lower than required rate, but interpolate data-points in between the actual measured sampled data. Interpolation implemented in floating point can be demanding in terms of energy cost to the sensors. Therefore as it is generally the case, fixed point implementations have to be introduced to reduce the energy demands due to excessive computations/instruction count due to floating point arithmetic. In this paper we present a fixed point implementation of the Neville's interpolation scheme, and present performance results as compared to the floating point (ideal) results.","PeriodicalId":235333,"journal":{"name":"2015 Long Island Systems, Applications and Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2015-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126776957","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Highly efficient novel text steganography algorithms 高效新颖的文本隐写算法
Pub Date : 2015-05-01 DOI: 10.1109/LISAT.2015.7160209
A. Odeh, K. Elleithy, M. Faezipour, Eman Abdelfattah
This paper investigates eight novel Steganography algorithms employing text file as a carrier file. The proposed model hides secret data in the text file by manipulating the font format or inserting special symbols in the text file. Furthermore, the suggested algorithms can be applied to both Unicode and ASCII code languages, regardless of the text file format. In addition, a merging capability among the techniques is introduced, which allows alternatives for users based on the system requirements. The proposed algorithms achieve a high degree of optimized Steganography attributes such as hidden ratio, robustness, and transparency.
本文研究了以文本文件为载体文件的八种新型隐写算法。该模型通过操纵字体格式或在文本文件中插入特殊符号来隐藏文本文件中的秘密数据。此外,建议的算法可以应用于Unicode和ASCII代码语言,而不考虑文本文件格式。此外,还介绍了技术之间的合并功能,它允许用户根据系统需求进行选择。提出的算法实现了隐写属性的高度优化,如隐藏比、鲁棒性和透明度。
{"title":"Highly efficient novel text steganography algorithms","authors":"A. Odeh, K. Elleithy, M. Faezipour, Eman Abdelfattah","doi":"10.1109/LISAT.2015.7160209","DOIUrl":"https://doi.org/10.1109/LISAT.2015.7160209","url":null,"abstract":"This paper investigates eight novel Steganography algorithms employing text file as a carrier file. The proposed model hides secret data in the text file by manipulating the font format or inserting special symbols in the text file. Furthermore, the suggested algorithms can be applied to both Unicode and ASCII code languages, regardless of the text file format. In addition, a merging capability among the techniques is introduced, which allows alternatives for users based on the system requirements. The proposed algorithms achieve a high degree of optimized Steganography attributes such as hidden ratio, robustness, and transparency.","PeriodicalId":235333,"journal":{"name":"2015 Long Island Systems, Applications and Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2015-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134392130","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A comparison of different machine learning algorithms using single channel EEG signal for classifying human sleep stages 不同机器学习算法在单通道脑电图信号分类人类睡眠阶段的比较
Pub Date : 2015-05-01 DOI: 10.1109/LISAT.2015.7160185
K. Aboalayon, Wafaa S. Almuhammadi, M. Faezipour
In recent years, the estimation of human sleep disorders from Electroencephalogram (EEG) signals have played an important role in developing automatic detection of sleep stages. A few methods exist in the market presently towards this aim. However, sleep physicians may not have full assurance and consideration in such methods due to concerns associated with systems accuracy, sensitivity and specificity. This paper presents a novel and efficient technique that can be implemented in a microcontroller device to identify sleep stages in an effort to assist physicians in the diagnosis and treatment of related sleep disorders by enhancing the accuracy of the developed algorithm using a single channel of EEG signals. First, the dataset of EEG signal is filtered and decomposed into delta, theta, alpha, beta and gamma subbands using Butterworth band-pass filters. Second, a set of sample statistical discriminating features are derived from each frequency band. Finally, sleep stages consisting of Wakefulness, Rapid Eye Movement (REM) and Non-Rapid Eye Movement (NREM) are classified using several supervised machine learning classifiers including multi-class Support Vector Machines (SVM), Decision Trees (DT), Neural Networks (NN), K-Nearest Neighbors (KNN) and Naive Bayes (NB). This paper combines REM with Stage 1 NREM due to data similarities. Performance is then compared based on single channel EEG signals that were obtained from 20 healthy subjects. The results show that the proposed technique using DT classifier efficiently achieves high accuracy of 97.30% in differentiating sleeps stages. Also, a comparison of our method with some recent available works in the literature reiterates the high classification accuracy performance.
近年来,从脑电图(EEG)信号中估计人类睡眠障碍在开发睡眠阶段自动检测方面发挥了重要作用。目前市场上有几种实现这一目标的方法。然而,由于对系统准确性、敏感性和特异性的担忧,睡眠医生可能对这些方法没有充分的保证和考虑。本文提出了一种新颖而有效的技术,可以在微控制器设备中实现,通过提高使用单通道脑电图信号的开发算法的准确性,来识别睡眠阶段,以协助医生诊断和治疗相关的睡眠障碍。首先,利用巴特沃斯带通滤波器对脑电信号数据集进行滤波并分解为delta、theta、alpha、beta和gamma四个子带;其次,从每个频带导出一组样本统计判别特征。最后,使用多类支持向量机(SVM)、决策树(DT)、神经网络(NN)、k近邻(KNN)和朴素贝叶斯(NB)等监督式机器学习分类器对觉醒、快速眼动(REM)和非快速眼动(NREM)组成的睡眠阶段进行分类。由于数据相似,本文将REM与第一阶段NREM相结合。然后根据从20名健康受试者获得的单通道EEG信号对性能进行比较。结果表明,基于DT分类器的睡眠阶段识别准确率高达97.30%。此外,将我们的方法与最近一些文献中可用的工作进行比较,重申了高分类精度的性能。
{"title":"A comparison of different machine learning algorithms using single channel EEG signal for classifying human sleep stages","authors":"K. Aboalayon, Wafaa S. Almuhammadi, M. Faezipour","doi":"10.1109/LISAT.2015.7160185","DOIUrl":"https://doi.org/10.1109/LISAT.2015.7160185","url":null,"abstract":"In recent years, the estimation of human sleep disorders from Electroencephalogram (EEG) signals have played an important role in developing automatic detection of sleep stages. A few methods exist in the market presently towards this aim. However, sleep physicians may not have full assurance and consideration in such methods due to concerns associated with systems accuracy, sensitivity and specificity. This paper presents a novel and efficient technique that can be implemented in a microcontroller device to identify sleep stages in an effort to assist physicians in the diagnosis and treatment of related sleep disorders by enhancing the accuracy of the developed algorithm using a single channel of EEG signals. First, the dataset of EEG signal is filtered and decomposed into delta, theta, alpha, beta and gamma subbands using Butterworth band-pass filters. Second, a set of sample statistical discriminating features are derived from each frequency band. Finally, sleep stages consisting of Wakefulness, Rapid Eye Movement (REM) and Non-Rapid Eye Movement (NREM) are classified using several supervised machine learning classifiers including multi-class Support Vector Machines (SVM), Decision Trees (DT), Neural Networks (NN), K-Nearest Neighbors (KNN) and Naive Bayes (NB). This paper combines REM with Stage 1 NREM due to data similarities. Performance is then compared based on single channel EEG signals that were obtained from 20 healthy subjects. The results show that the proposed technique using DT classifier efficiently achieves high accuracy of 97.30% in differentiating sleeps stages. Also, a comparison of our method with some recent available works in the literature reiterates the high classification accuracy performance.","PeriodicalId":235333,"journal":{"name":"2015 Long Island Systems, Applications and Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2015-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134641059","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 41
期刊
2015 Long Island Systems, Applications and Technology
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1