首页 > 最新文献

2015 World Symposium on Computer Networks and Information Security (WSCNIS)最新文献

英文 中文
Thwarting the probabilistic selfish behaviours in packet forwarding of multihop ad hoc networks 抑制多跳自组织网络报文转发中的概率自私行为
Pub Date : 2015-09-01 DOI: 10.1109/WSCNIS.2015.7368287
M. Safavi, M. Shafieian
Upcoming Wireless networks have been emerging in the real world applications as well as in researching. Multihop characteristics of ad hoc networks may lead to most of their challenges. Selfishness is an inevitable behavior in these networks and many researches have been performing to thwart it. In this paper we investigate some game theory selfish model and incentive VCG payments to motivate relay ad hoc nodes for cooperation in forwarding packets in some probabilistic ad hoc scenarios. The throughput of each scenario in simulation is shown as well as the cases where such payments are not efficient. Our proposed method for improvement payment especially in the challenging single route network scenario is suggested.
未来的无线网络已经在现实世界的应用和研究中出现。自组织网络的多跳特性可能导致其面临的大多数挑战。在这些网络中,自私是一种不可避免的行为,许多研究一直在努力阻止它。本文研究了一些基于博弈论的自利模型和VCG奖励来激励中继自组织节点在一些概率自组织场景下的合作转发数据包。模拟中显示了每个场景的吞吐量以及这种支付效率不高的情况。我们提出了改进支付的方法,特别是在具有挑战性的单路由网络场景中。
{"title":"Thwarting the probabilistic selfish behaviours in packet forwarding of multihop ad hoc networks","authors":"M. Safavi, M. Shafieian","doi":"10.1109/WSCNIS.2015.7368287","DOIUrl":"https://doi.org/10.1109/WSCNIS.2015.7368287","url":null,"abstract":"Upcoming Wireless networks have been emerging in the real world applications as well as in researching. Multihop characteristics of ad hoc networks may lead to most of their challenges. Selfishness is an inevitable behavior in these networks and many researches have been performing to thwart it. In this paper we investigate some game theory selfish model and incentive VCG payments to motivate relay ad hoc nodes for cooperation in forwarding packets in some probabilistic ad hoc scenarios. The throughput of each scenario in simulation is shown as well as the cases where such payments are not efficient. Our proposed method for improvement payment especially in the challenging single route network scenario is suggested.","PeriodicalId":253256,"journal":{"name":"2015 World Symposium on Computer Networks and Information Security (WSCNIS)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123420222","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Implementation and performance evaluation of embedded IPsec in microkernel OS 嵌入式IPsec在微内核操作系统中的实现及性能评价
Pub Date : 2015-09-01 DOI: 10.1109/WSCNIS.2015.7368294
Mohammad Hamad, V. Prevelakis
The rapid development of the embedded systems and the wide use of them in many sensitive fields require safeguarding their communications. Internet Protocol Security (IPsec) is widely used to solve network security problems by providing confidentiality and integrity for the communications in the network, but it introduces communication overhead. This overhead becomes a critical factor with embedded systems because of their low computing power and limited resources. In this research, we studied the overhead of using embedded IPsec in constrained resource systems, which run microkernel operating system (OS), in terms of the network latency and throughput. To conduct our experiment first, we ran the test with an unmodified network stack, and then we ran the same test with the modified network stack which contains the IPsec implementation. Later, we compared the results obtained from these two sets of experiments to examine the overhead. Our research demonstrated that the overhead imposed by IPsec protocols is small and well within the capabilities of even low cost microcontrollers such as the one used in the Raspberry Pi computer.
嵌入式系统的迅速发展和在许多敏感领域的广泛应用要求对其通信进行安全保护。IPsec (Internet Protocol Security)通过为网络中的通信提供保密性和完整性,被广泛用于解决网络安全问题,但它带来了通信开销。这种开销成为嵌入式系统的一个关键因素,因为它们的计算能力较低,资源有限。在本研究中,我们从网络延迟和吞吐量方面研究了在运行微内核操作系统(OS)的受限资源系统中使用嵌入式IPsec的开销。为了进行实验,我们首先使用未修改的网络堆栈运行测试,然后使用包含IPsec实现的修改后的网络堆栈运行相同的测试。稍后,我们比较了从这两组实验中获得的结果,以检查开销。我们的研究表明,IPsec协议带来的开销很小,甚至在低成本微控制器(如Raspberry Pi计算机中使用的微控制器)的能力范围内。
{"title":"Implementation and performance evaluation of embedded IPsec in microkernel OS","authors":"Mohammad Hamad, V. Prevelakis","doi":"10.1109/WSCNIS.2015.7368294","DOIUrl":"https://doi.org/10.1109/WSCNIS.2015.7368294","url":null,"abstract":"The rapid development of the embedded systems and the wide use of them in many sensitive fields require safeguarding their communications. Internet Protocol Security (IPsec) is widely used to solve network security problems by providing confidentiality and integrity for the communications in the network, but it introduces communication overhead. This overhead becomes a critical factor with embedded systems because of their low computing power and limited resources. In this research, we studied the overhead of using embedded IPsec in constrained resource systems, which run microkernel operating system (OS), in terms of the network latency and throughput. To conduct our experiment first, we ran the test with an unmodified network stack, and then we ran the same test with the modified network stack which contains the IPsec implementation. Later, we compared the results obtained from these two sets of experiments to examine the overhead. Our research demonstrated that the overhead imposed by IPsec protocols is small and well within the capabilities of even low cost microcontrollers such as the one used in the Raspberry Pi computer.","PeriodicalId":253256,"journal":{"name":"2015 World Symposium on Computer Networks and Information Security (WSCNIS)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126854150","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
An improved reduced-complexity scheme to accelerate sphere decoding for MIMO systems 一种改进的降低复杂度的MIMO系统球解码加速方案
Pub Date : 2015-09-01 DOI: 10.1109/WSCNIS.2015.7368279
Jianping Li, Si Chen
The sphere decoding (SD) algorithm based on Schnorr-Euchner (S-E) strategy can reduce the complexity for multiple-input multiple-output (MIMO) systems to find the maximum likelihood (ML) solution by updating the search radius whenever a new lattice point was found. In this paper, we propose an improved scheme to reduce the complexity of sphere decoding. In the new method, a factor was introduced for speeding up contraction of sphere radius in each layer of the searching tree. The contraction factor was controlled by signal to noise ratio (SNR) and thus can reduce the complexity especially in low SNR region. Simulation results show that the proposed SD algorithm based on a contraction factor (SD-CF) can efficiently reduce the complexity with negligible performance degradation contrasting to traditional SD.
基于Schnorr-Euchner (S-E)策略的球面解码(SD)算法通过在发现新的点阵点时更新搜索半径来降低多输入多输出(MIMO)系统寻找最大似然(ML)解的复杂度。本文提出了一种改进方案来降低球解码的复杂度。该方法在搜索树的每一层中引入一个加速球半径收缩的因子。收缩因子由信噪比(SNR)控制,从而降低了复杂度,特别是在低信噪比区域。仿真结果表明,与传统SD相比,基于收缩因子(SD- cf)的SD算法可以有效地降低复杂度,且性能下降很小。
{"title":"An improved reduced-complexity scheme to accelerate sphere decoding for MIMO systems","authors":"Jianping Li, Si Chen","doi":"10.1109/WSCNIS.2015.7368279","DOIUrl":"https://doi.org/10.1109/WSCNIS.2015.7368279","url":null,"abstract":"The sphere decoding (SD) algorithm based on Schnorr-Euchner (S-E) strategy can reduce the complexity for multiple-input multiple-output (MIMO) systems to find the maximum likelihood (ML) solution by updating the search radius whenever a new lattice point was found. In this paper, we propose an improved scheme to reduce the complexity of sphere decoding. In the new method, a factor was introduced for speeding up contraction of sphere radius in each layer of the searching tree. The contraction factor was controlled by signal to noise ratio (SNR) and thus can reduce the complexity especially in low SNR region. Simulation results show that the proposed SD algorithm based on a contraction factor (SD-CF) can efficiently reduce the complexity with negligible performance degradation contrasting to traditional SD.","PeriodicalId":253256,"journal":{"name":"2015 World Symposium on Computer Networks and Information Security (WSCNIS)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115526581","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
3D face landmark auto detection 三维人脸地标自动检测
Pub Date : 2015-09-01 DOI: 10.1109/WSCNIS.2015.7368276
Hamdi Boukamcha, Mohamed Elhallek, Mohamed Atri, F. Smach
This paper presents our methodology for Landmark Point detection to improve 3D face recognition in a presence of variant facial expression. The objective was to develop an automatic process for distinguishing and segmenting to be embedded in a 3D face recognition system using only 3D Point Distribution Model (PDM) as input. The approach used hydride method to extract this features from the surface curvature information. Landmark Localization is done on the segmented face via finding the change that decreases the deviation of the model from the mean profile. Face registering is achieved using previous anthropometric information and the localized landmarks. The results confirm that the method used is accurate and robust for the proposed application.
本文介绍了我们的地标点检测方法,以提高在不同面部表情存在下的3D人脸识别。目标是开发一种自动识别和分割过程,仅使用3D点分布模型(PDM)作为输入嵌入3D人脸识别系统。该方法采用氢化物法从曲面曲率信息中提取这些特征。通过寻找减少模型与平均轮廓偏差的变化,对分割后的人脸进行地标定位。人脸注册是利用先前的人体测量信息和定位的地标来实现的。结果表明,该方法具有较好的鲁棒性和准确性。
{"title":"3D face landmark auto detection","authors":"Hamdi Boukamcha, Mohamed Elhallek, Mohamed Atri, F. Smach","doi":"10.1109/WSCNIS.2015.7368276","DOIUrl":"https://doi.org/10.1109/WSCNIS.2015.7368276","url":null,"abstract":"This paper presents our methodology for Landmark Point detection to improve 3D face recognition in a presence of variant facial expression. The objective was to develop an automatic process for distinguishing and segmenting to be embedded in a 3D face recognition system using only 3D Point Distribution Model (PDM) as input. The approach used hydride method to extract this features from the surface curvature information. Landmark Localization is done on the segmented face via finding the change that decreases the deviation of the model from the mean profile. Face registering is achieved using previous anthropometric information and the localized landmarks. The results confirm that the method used is accurate and robust for the proposed application.","PeriodicalId":253256,"journal":{"name":"2015 World Symposium on Computer Networks and Information Security (WSCNIS)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127102181","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Reliable and secure regions for the Gaussian wiretap channel using LDPC codes with granular HARQ 可靠和安全区域的高斯窃听信道使用LDPC码与颗粒HARQ
Pub Date : 2015-09-01 DOI: 10.1109/WSCNIS.2015.7368289
M. H. Taieb, J. Chouinard
This paper investigates reliable and secure transmissions over the Gaussian wiretap channel. A physical layer coding scheme based on Low-Density-Parity-Check (LDPC) codes with granular Hybrid Automatic Repeat reQuest(HARQ) protocol is presented. Increasing the HARQ granularity aims at sending coded data at the minimum rate required for legitimate successful decoding. This minimizes the information leakage that may benefit to eavesdropping. It will be shown that the granularity increases the frame error rate of the eavesdropper. Since the secrecy level can be assessed through the bit error rate (BER) at the unintended receiver, intraframe and interframe error contamination is employed to convert the loss of only few packets into much higher BERs. After obtaining the BERs at the legitimate and illegitimate receivers the reliable and secret regions can be determined. It is observed that with granular HARQ and interframe error contamination, regions that are reliable and secure at the same time are expanded.
本文研究了在高斯窃听信道上可靠和安全的传输。提出了一种基于低密度奇偶校验(LDPC)码和粒度混合自动重复请求(HARQ)协议的物理层编码方案。增加HARQ粒度旨在以合法成功解码所需的最小速率发送编码数据。这样可以最大限度地减少可能有利于窃听的信息泄漏。结果表明,粒度增加了窃听器的帧错误率。由于保密级别可以通过意外接收端的误码率(BER)来评估,因此采用帧内和帧间错误污染将少量数据包的丢失转换为更高的误码率。获取合法和非法接收者的ber后,就可以确定可靠区域和秘密区域。结果表明,在存在颗粒级HARQ和帧间误差污染的情况下,可靠和安全区域得到了扩展。
{"title":"Reliable and secure regions for the Gaussian wiretap channel using LDPC codes with granular HARQ","authors":"M. H. Taieb, J. Chouinard","doi":"10.1109/WSCNIS.2015.7368289","DOIUrl":"https://doi.org/10.1109/WSCNIS.2015.7368289","url":null,"abstract":"This paper investigates reliable and secure transmissions over the Gaussian wiretap channel. A physical layer coding scheme based on Low-Density-Parity-Check (LDPC) codes with granular Hybrid Automatic Repeat reQuest(HARQ) protocol is presented. Increasing the HARQ granularity aims at sending coded data at the minimum rate required for legitimate successful decoding. This minimizes the information leakage that may benefit to eavesdropping. It will be shown that the granularity increases the frame error rate of the eavesdropper. Since the secrecy level can be assessed through the bit error rate (BER) at the unintended receiver, intraframe and interframe error contamination is employed to convert the loss of only few packets into much higher BERs. After obtaining the BERs at the legitimate and illegitimate receivers the reliable and secret regions can be determined. It is observed that with granular HARQ and interframe error contamination, regions that are reliable and secure at the same time are expanded.","PeriodicalId":253256,"journal":{"name":"2015 World Symposium on Computer Networks and Information Security (WSCNIS)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127524172","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Image watermarking using data compression 使用数据压缩的图像水印
Pub Date : 2015-09-01 DOI: 10.1109/WSCNIS.2015.7368290
M. Talbi, Siraa Ben Ftima, A. Cherif
In this paper we propose a new image watermarking technique using data compression. This technique consists at first step in getting the first color in case of RGB image and obtaining a two dimensional matrix. Then the 2-D lifting wavelet transform (LWT2) (Sema KAYHAN, Ergun ERçELEB, 2011), is applied to this two dimensional matrix or image in order to have four sub-images, cA1, cH 1, cV1 and cD 1. Then the Discrete Cosine Transform (DCT) is applied to cA1 and we insert the Watermark signal into the obtained DCT values. This Watermark signal is obtained after compression of the original signal which is a speech waveform. This compression is performed in the wavelet domain. After inserting the watermark signal, the inverse of DCT is applied in order to obtain the sub-image, cA11. The watermarked image is finally obtained by the application of the inverse of LWT2, ILWT2, to the four sub-images, cA11, cH 1, cV1 and cD 1. The extraction process is simply subtracting the original DCT coefficients from the watermarked sub-image (cA11) ones. After extracting the compressed signal, the latter is decompressed in order to recover the original signal. The proposed image watermarking technique is applied on a number of color images and a speech waveform is used in experiments. The obtained results from PSNR, MSE SSIM, SIM and SNR, show the performance of the proposed image watermarking technique.
本文提出了一种新的基于数据压缩的图像水印技术。该技术的第一步是在RGB图像的情况下获得第一种颜色并获得二维矩阵。然后将二维提升小波变换(LWT2) (Sema KAYHAN, Ergun ereleb, 2011)应用于该二维矩阵或图像,得到cA1、cH 1、cV1和cD 1四个子图像。然后对cA1进行离散余弦变换(DCT),将水印信号插入到得到的DCT值中。该水印信号是对原始语音信号进行压缩后得到的。这种压缩是在小波域进行的。在插入水印信号后,应用DCT逆得到子图像cA11。将LWT2、ILWT2的逆函数应用于cA11、cH 1、cV1和cD 1四个子图像,最终得到水印图像。提取过程是简单地从加了水印的子图像(cA11)中减去原始DCT系数。在提取压缩信号后,对压缩后的信号进行解压缩,恢复原始信号。将所提出的图像水印技术应用于多幅彩色图像,并利用语音波形进行了实验。从PSNR、MSE、SSIM、SIM和信噪比等方面得到的结果表明了所提出的图像水印技术的性能。
{"title":"Image watermarking using data compression","authors":"M. Talbi, Siraa Ben Ftima, A. Cherif","doi":"10.1109/WSCNIS.2015.7368290","DOIUrl":"https://doi.org/10.1109/WSCNIS.2015.7368290","url":null,"abstract":"In this paper we propose a new image watermarking technique using data compression. This technique consists at first step in getting the first color in case of RGB image and obtaining a two dimensional matrix. Then the 2-D lifting wavelet transform (LWT2) (Sema KAYHAN, Ergun ERçELEB, 2011), is applied to this two dimensional matrix or image in order to have four sub-images, cA1, cH 1, cV1 and cD 1. Then the Discrete Cosine Transform (DCT) is applied to cA1 and we insert the Watermark signal into the obtained DCT values. This Watermark signal is obtained after compression of the original signal which is a speech waveform. This compression is performed in the wavelet domain. After inserting the watermark signal, the inverse of DCT is applied in order to obtain the sub-image, cA11. The watermarked image is finally obtained by the application of the inverse of LWT2, ILWT2, to the four sub-images, cA11, cH 1, cV1 and cD 1. The extraction process is simply subtracting the original DCT coefficients from the watermarked sub-image (cA11) ones. After extracting the compressed signal, the latter is decompressed in order to recover the original signal. The proposed image watermarking technique is applied on a number of color images and a speech waveform is used in experiments. The obtained results from PSNR, MSE SSIM, SIM and SNR, show the performance of the proposed image watermarking technique.","PeriodicalId":253256,"journal":{"name":"2015 World Symposium on Computer Networks and Information Security (WSCNIS)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122356931","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Performance evaluation of multicore LEON3 processor 多核LEON3处理器的性能评价
Pub Date : 2015-09-01 DOI: 10.1109/WSCNIS.2015.7368277
Afef Kchaou, W. El Hadj Youssef, R. Tourki
Complexity of embedded systems becomes more and more popular which integrates a hardware and software parts on common platform. This complexity can be inferred on the performance of such systems. This paper, explains the characteristics of LEON3 Soft Core processor and its implementation for several configurations, including single, dual, tri, and quad cores, as well as with and without the hardware FPU and cache system. We propose a performance evaluation methodology affected by a benchmark test. Measuring the performance of such systems becomes a very important task for any embedded system design process. The performance of such systems is affected by a benchmark test discussed for different configuration of LEON3 processor.
将硬件和软件集成在一个通用平台上的嵌入式系统的复杂性越来越受欢迎。这种复杂性可以从这些系统的性能中推断出来。本文介绍了LEON3软核处理器的特点及其在单核、双核、三核和四核以及带和不带硬件FPU和缓存系统的几种配置下的实现。我们提出了一种受基准测试影响的性能评估方法。测量嵌入式系统的性能成为任何嵌入式系统设计过程中非常重要的任务。这类系统的性能受到针对不同配置的LEON3处理器的基准测试的影响。
{"title":"Performance evaluation of multicore LEON3 processor","authors":"Afef Kchaou, W. El Hadj Youssef, R. Tourki","doi":"10.1109/WSCNIS.2015.7368277","DOIUrl":"https://doi.org/10.1109/WSCNIS.2015.7368277","url":null,"abstract":"Complexity of embedded systems becomes more and more popular which integrates a hardware and software parts on common platform. This complexity can be inferred on the performance of such systems. This paper, explains the characteristics of LEON3 Soft Core processor and its implementation for several configurations, including single, dual, tri, and quad cores, as well as with and without the hardware FPU and cache system. We propose a performance evaluation methodology affected by a benchmark test. Measuring the performance of such systems becomes a very important task for any embedded system design process. The performance of such systems is affected by a benchmark test discussed for different configuration of LEON3 processor.","PeriodicalId":253256,"journal":{"name":"2015 World Symposium on Computer Networks and Information Security (WSCNIS)","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131476385","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Optimization of WDM demultiplexer based on photonic crystal 基于光子晶体的波分复用器优化
Pub Date : 2015-09-01 DOI: 10.1109/WSCNIS.2015.7368305
M. Radhouene, M. Najjar, R. Houria
In this paper, two-dimension band pass filters are proposed to design CWDM de-multiplexer which permit to separate two telecom wavelengths (1.31 μm and 1.55 μm). The square lattice with TE mode are adapted to designed the proposed de-multiplexer with help Photonic Band Gap (PBG). The structure has been designed using silicon rods, refractive index 3.45, which are embedded in air. The Plane Wave Expansion (PWE) method and 2D Finite Difference Time Domain (FDTD) method are employed to calculate the PBG range and output spectra of the filter. The localization property of photonic crystal has been used to guide the wavelengths in two different output with high transmission.
本文提出了一种二维带通滤波器设计CWDM解复用器,可以分离两个通信波长(1.31 μm和1.55 μm)。采用TE模式的方晶格,设计了基于光子带隙(PBG)的解复用器。该结构采用折射率为3.45的硅棒,嵌入空气中。采用平面波展开法(PWE)和二维时域有限差分法(FDTD)计算了滤波器的PBG范围和输出光谱。利用光子晶体的局域化特性,对两种不同输出的波长进行了高透射率的引导。
{"title":"Optimization of WDM demultiplexer based on photonic crystal","authors":"M. Radhouene, M. Najjar, R. Houria","doi":"10.1109/WSCNIS.2015.7368305","DOIUrl":"https://doi.org/10.1109/WSCNIS.2015.7368305","url":null,"abstract":"In this paper, two-dimension band pass filters are proposed to design CWDM de-multiplexer which permit to separate two telecom wavelengths (1.31 μm and 1.55 μm). The square lattice with TE mode are adapted to designed the proposed de-multiplexer with help Photonic Band Gap (PBG). The structure has been designed using silicon rods, refractive index 3.45, which are embedded in air. The Plane Wave Expansion (PWE) method and 2D Finite Difference Time Domain (FDTD) method are employed to calculate the PBG range and output spectra of the filter. The localization property of photonic crystal has been used to guide the wavelengths in two different output with high transmission.","PeriodicalId":253256,"journal":{"name":"2015 World Symposium on Computer Networks and Information Security (WSCNIS)","volume":"162 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132343916","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Cuckoo filter-based location-privacy preservation in database-driven cognitive radio networks 数据库驱动的认知无线电网络中基于杜鹃滤波器的位置隐私保护
Pub Date : 2015-09-01 DOI: 10.1109/WSCNIS.2015.7368280
Mohamed Grissa, A. Yavuz, B. Hamdaoui
Cognitive Radio Networks (CRNs) enable opportunistic access to the licensed channels by allowing secondary users (SUs) to exploit vacant channel opportunities. One effective technique through which SU s acquire whether a channel is vacant is using geo-location databases. Despite their usefulness, geo-location database-driven CRN s suffer from location privacy threats, merely because SUs have to query the database with their exact locations in order to learn about spectrum availability. In this paper, we propose an efficient scheme for database-driven CRN s that preserves the location privacy of SU s while allowing them to learn about available channels in their vicinity. We present a tradeoff between offering an ideal location privacy while having a high communication overhead and compromising some of the users' coordinates at the benefit of incurring much lower overhead. We also study the effectiveness of the proposed scheme under various system parameters.
认知无线网络(crn)允许辅助用户(su)利用空闲的信道机会,从而实现对许可信道的机会访问。SU获取通道是否空闲的一种有效技术是使用地理位置数据库。尽管地理位置数据库驱动的CRN很有用,但它仍然受到位置隐私威胁的影响,这仅仅是因为用户必须使用其确切位置查询数据库以了解频谱可用性。在本文中,我们为数据库驱动的CRN提出了一种有效的方案,该方案在保留SU位置隐私的同时允许它们了解其附近的可用信道。我们在提供理想的位置隐私同时具有较高的通信开销和牺牲一些用户的坐标以产生更低的开销之间进行权衡。研究了该方案在不同系统参数下的有效性。
{"title":"Cuckoo filter-based location-privacy preservation in database-driven cognitive radio networks","authors":"Mohamed Grissa, A. Yavuz, B. Hamdaoui","doi":"10.1109/WSCNIS.2015.7368280","DOIUrl":"https://doi.org/10.1109/WSCNIS.2015.7368280","url":null,"abstract":"Cognitive Radio Networks (CRNs) enable opportunistic access to the licensed channels by allowing secondary users (SUs) to exploit vacant channel opportunities. One effective technique through which SU s acquire whether a channel is vacant is using geo-location databases. Despite their usefulness, geo-location database-driven CRN s suffer from location privacy threats, merely because SUs have to query the database with their exact locations in order to learn about spectrum availability. In this paper, we propose an efficient scheme for database-driven CRN s that preserves the location privacy of SU s while allowing them to learn about available channels in their vicinity. We present a tradeoff between offering an ideal location privacy while having a high communication overhead and compromising some of the users' coordinates at the benefit of incurring much lower overhead. We also study the effectiveness of the proposed scheme under various system parameters.","PeriodicalId":253256,"journal":{"name":"2015 World Symposium on Computer Networks and Information Security (WSCNIS)","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133012722","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Enhancing the information content of fingerprint biometrics with heartbeat signal 利用心跳信号增强指纹生物识别的信息量
Pub Date : 2015-09-01 DOI: 10.1109/WSCNIS.2015.7368284
R. M. Jomaa, Md. Saiful Islam, H. Mathkour
Heartbeat signal is an emerging biometric modality which is getting attention for its robustness against spoof attack. Introducing heartbeat into a fingerprint biometric system can yield promising results in two ways. First, it may increase the accuracy of the biometric system and second it may increase its robustness against spoof attacks. In this paper, a score level fusion is used based on the information content of the unimodal biometrics to enhance the information content of fingerprint biometrics. We measure the gain of information content of the multimodal biometric system obtained from fusion of fingerprint and heartbeat signal captured from fingers. Experimental results show that fusion of these two modalities increases the information content of the multimodal biometric system, consequently, increasing its accuracy and robustness against spoof attacks.
心跳信号是一种新兴的生物识别方式,因其抗欺骗攻击的鲁棒性而备受关注。将心跳引入指纹生物识别系统可以在两个方面产生有希望的结果。首先,它可以提高生物识别系统的准确性,其次,它可以提高其抗欺骗攻击的稳健性。本文在单峰生物特征信息含量的基础上,采用分数水平融合的方法增强指纹生物特征的信息含量。我们测量了多模态生物识别系统的信息含量的增益,该系统通过融合指纹和从手指捕获的心跳信号来获得。实验结果表明,两种模态的融合增加了多模态生物识别系统的信息量,从而提高了系统的准确性和抗欺骗攻击的鲁棒性。
{"title":"Enhancing the information content of fingerprint biometrics with heartbeat signal","authors":"R. M. Jomaa, Md. Saiful Islam, H. Mathkour","doi":"10.1109/WSCNIS.2015.7368284","DOIUrl":"https://doi.org/10.1109/WSCNIS.2015.7368284","url":null,"abstract":"Heartbeat signal is an emerging biometric modality which is getting attention for its robustness against spoof attack. Introducing heartbeat into a fingerprint biometric system can yield promising results in two ways. First, it may increase the accuracy of the biometric system and second it may increase its robustness against spoof attacks. In this paper, a score level fusion is used based on the information content of the unimodal biometrics to enhance the information content of fingerprint biometrics. We measure the gain of information content of the multimodal biometric system obtained from fusion of fingerprint and heartbeat signal captured from fingers. Experimental results show that fusion of these two modalities increases the information content of the multimodal biometric system, consequently, increasing its accuracy and robustness against spoof attacks.","PeriodicalId":253256,"journal":{"name":"2015 World Symposium on Computer Networks and Information Security (WSCNIS)","volume":"97 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133910043","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
期刊
2015 World Symposium on Computer Networks and Information Security (WSCNIS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1