首页 > 最新文献

2018 IEEE International Conference on the Science of Electrical Engineering in Israel (ICSEE)最新文献

英文 中文
Multi-Speaker Direction of Arrival Estimation using SRP-PHAT Algorithm with a Weighted Histogram 加权直方图SRP-PHAT算法的多说话人到达方向估计
E. Hadad, S. Gannot
A direction of arrival (DOA) estimator for concurrent speakers in a reverberant environment is presented. The DOA estimation task is formulated in the short-time Fourier transform (STFT) in two stages. In the first stage, a single narrow-band DOA per time-frequency (T-F) is selected, since the speech sources are assumed to exhibit disjoint activity in the STFT domain. The narrow-band DOA is obtained as the maximum of the narrow-band steered response power phase transform (SRP-PHAT) localization spectrum at that T-F bin. In addition, for each narrow-band DOA, a quality measure is calculated, which provides the confidence in the estimated decision. In the second stage, the wide-band localization spectrum is calculated using a weighted histogram of the narrow-band DOAs with the quality measures as weight. Finally, the wide-band DOA estimation is obtained by selecting the peaks in the wide-band localization spectrum. The results of our experimental study demonstrate the benefit of the proposed algorithm as compared to the wide-band SRP-PHAT algorithm in a reverberant environment.
提出了一种混响环境下并发扬声器到达方向估计方法。在短时傅里叶变换(STFT)中,DOA估计任务分为两个阶段。在第一阶段,选择单个窄带DOA /时频(T-F),因为假设语音源在STFT域中表现出不接合的活动。窄带DOA是窄带导向响应功率相位变换(SRP-PHAT)定位谱在该T-F帧处的最大值。此外,对于每个窄带DOA,计算了一个质量度量,为估计决策提供了置信度。在第二阶段,使用以质量度量为权重的窄带doa加权直方图计算宽带定位谱。最后,通过选取宽带定位谱中的峰值,得到宽带DOA估计。我们的实验研究结果表明,与宽带SRP-PHAT算法相比,该算法在混响环境中具有优势。
{"title":"Multi-Speaker Direction of Arrival Estimation using SRP-PHAT Algorithm with a Weighted Histogram","authors":"E. Hadad, S. Gannot","doi":"10.1109/ICSEE.2018.8646206","DOIUrl":"https://doi.org/10.1109/ICSEE.2018.8646206","url":null,"abstract":"A direction of arrival (DOA) estimator for concurrent speakers in a reverberant environment is presented. The DOA estimation task is formulated in the short-time Fourier transform (STFT) in two stages. In the first stage, a single narrow-band DOA per time-frequency (T-F) is selected, since the speech sources are assumed to exhibit disjoint activity in the STFT domain. The narrow-band DOA is obtained as the maximum of the narrow-band steered response power phase transform (SRP-PHAT) localization spectrum at that T-F bin. In addition, for each narrow-band DOA, a quality measure is calculated, which provides the confidence in the estimated decision. In the second stage, the wide-band localization spectrum is calculated using a weighted histogram of the narrow-band DOAs with the quality measures as weight. Finally, the wide-band DOA estimation is obtained by selecting the peaks in the wide-band localization spectrum. The results of our experimental study demonstrate the benefit of the proposed algorithm as compared to the wide-band SRP-PHAT algorithm in a reverberant environment.","PeriodicalId":254455,"journal":{"name":"2018 IEEE International Conference on the Science of Electrical Engineering in Israel (ICSEE)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124892111","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Bio-Inspired Micro Drones
Boaz Ben-Moshe, Yael Landau, Revital Marbel, Aviv Mishiner
This work presents a concept of intelligent micro drones which are motivated by flying insects such as bees. The presented micro drones can perform bio inspired complex tasks autonomously using simple sensors which require very low computing power. In particular, we present a set of algorithms for obstacle avoiding, navigation, swarm formation flight and mapping all based on sub-gram sensors which are applicable for on-board processing by micro drones. Using both simulation and field experiment we conclude that many bio-inspired challenges can be performed without the use of high resolution visual sensors. Moreover autonomous micro drones can take part in a wide range of research fields including: mobile sensor networks and swarm algorithms for search & rescue.
本研究提出了一种以蜜蜂等飞行昆虫为动力的智能微型无人机的概念。所提出的微型无人机可以使用简单的传感器自主执行生物启发的复杂任务,这需要非常低的计算能力。特别地,我们提出了一套基于亚克传感器的避障、导航、群体编队飞行和映射算法,适用于微型无人机的机载处理。通过模拟和现场实验,我们得出结论,许多仿生挑战可以在不使用高分辨率视觉传感器的情况下进行。此外,自主微型无人机可以参与广泛的研究领域,包括:移动传感器网络和搜索与救援的群体算法。
{"title":"Bio-Inspired Micro Drones","authors":"Boaz Ben-Moshe, Yael Landau, Revital Marbel, Aviv Mishiner","doi":"10.1109/ICSEE.2018.8645997","DOIUrl":"https://doi.org/10.1109/ICSEE.2018.8645997","url":null,"abstract":"This work presents a concept of intelligent micro drones which are motivated by flying insects such as bees. The presented micro drones can perform bio inspired complex tasks autonomously using simple sensors which require very low computing power. In particular, we present a set of algorithms for obstacle avoiding, navigation, swarm formation flight and mapping all based on sub-gram sensors which are applicable for on-board processing by micro drones. Using both simulation and field experiment we conclude that many bio-inspired challenges can be performed without the use of high resolution visual sensors. Moreover autonomous micro drones can take part in a wide range of research fields including: mobile sensor networks and swarm algorithms for search & rescue.","PeriodicalId":254455,"journal":{"name":"2018 IEEE International Conference on the Science of Electrical Engineering in Israel (ICSEE)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125864650","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Analysis of White Light Speckle Imaging 白光散斑成像分析
Moran Davoodi, Y. Buchris, I. Cohen
In this paper, we present a new approach for analyzing white light speckle patterns. The paper introduces an analytic model and heuristic explanations for the phenomena using the contrast and intensity statistics of the speckles. Relations between the coherence length, central wavelength and surface roughness are examined. It is shown that the speckle intensity is directly related to the autocorrelation function. We show that the new approach is consistent with previous models using simulation results and experimental data.
本文提出了一种分析白光散斑的新方法。本文介绍了利用散斑的对比度和强度统计对这一现象的解析模型和启发式解释。研究了相干长度、中心波长和表面粗糙度之间的关系。结果表明,散斑强度与自相关函数直接相关。仿真结果和实验数据表明,新方法与以往的模型是一致的。
{"title":"Analysis of White Light Speckle Imaging","authors":"Moran Davoodi, Y. Buchris, I. Cohen","doi":"10.1109/ICSEE.2018.8646158","DOIUrl":"https://doi.org/10.1109/ICSEE.2018.8646158","url":null,"abstract":"In this paper, we present a new approach for analyzing white light speckle patterns. The paper introduces an analytic model and heuristic explanations for the phenomena using the contrast and intensity statistics of the speckles. Relations between the coherence length, central wavelength and surface roughness are examined. It is shown that the speckle intensity is directly related to the autocorrelation function. We show that the new approach is consistent with previous models using simulation results and experimental data.","PeriodicalId":254455,"journal":{"name":"2018 IEEE International Conference on the Science of Electrical Engineering in Israel (ICSEE)","volume":"17 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125918236","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Optimal Time-Sharing for Multiple-Input Single Ended Primary Inductor Converter (SEPIC) 多输入单端初级电感变换器(SEPIC)的最佳分时算法
K. Ibn-Bari, Y. Horen, S. Bronshtein, D. Baimel
This paper analyses an optimal time-sharing design for obtaining the maximum efficiency of a Multiple-Input Single Ended Primary Inductor Converter (MI SEPIC). The analysis approach is based on the average model methodology and considers conduction losses. Theoretical results are supported by simulations.
本文分析了多输入单端初级电感变换器(MI SEPIC)的最佳分时设计,以获得最大的效率。分析方法基于平均模型方法,并考虑了传导损耗。理论结果得到了仿真结果的支持。
{"title":"Optimal Time-Sharing for Multiple-Input Single Ended Primary Inductor Converter (SEPIC)","authors":"K. Ibn-Bari, Y. Horen, S. Bronshtein, D. Baimel","doi":"10.1109/ICSEE.2018.8646173","DOIUrl":"https://doi.org/10.1109/ICSEE.2018.8646173","url":null,"abstract":"This paper analyses an optimal time-sharing design for obtaining the maximum efficiency of a Multiple-Input Single Ended Primary Inductor Converter (MI SEPIC). The analysis approach is based on the average model methodology and considers conduction losses. Theoretical results are supported by simulations.","PeriodicalId":254455,"journal":{"name":"2018 IEEE International Conference on the Science of Electrical Engineering in Israel (ICSEE)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125399896","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
LCD TEMPEST Air-Gap Attack Reloaded LCD风暴气隙攻击重新加载
Mordechai Guri, Matan Monitz
In 1998, researcher showed how attackers can transmit data from computers through electromagnetic radio waves generated by the computer video card. 20 years later, we examine this type of threat in a context of modern cyber-attacks. In this type of threat, attackers can covertly leak sensitive data from isolated (‘air-gapped’) computers using the electromagnetic emission from the video card. We present related work and give a brief technical background. We tested the TEMPEST attack with modern LCD screens and affordable user-defined-radio hardware available today for only $30. We implement a transmitter malware that can modulate binary data and transmit it over electromagnetic waves emitted from the video cable. We also implement a remote receiver, which demodulate and decode the transmission using GNU Radio. We present an analysis of the frequency range, effective distance and the bandwidth of this covert-channel. We found that malware can covertly leak data (e.g., encryption keys, keylogging data and documents) from air-gapped computers to a nearby RF receiver via the electromagnetic emission. The effective bitrate of this channel is 60 bit/sec to 640 bit/sec.
1998年,研究人员展示了攻击者如何通过计算机显卡产生的电磁无线电波从计算机传输数据。20年后,我们在现代网络攻击的背景下审视这类威胁。在这种类型的威胁中,攻击者可以利用视频卡的电磁辐射,从隔离的(“气隙”)计算机中秘密泄露敏感数据。我们介绍了相关工作,并简要介绍了技术背景。我们用现代LCD屏幕和价格合理的用户自定义无线电硬件测试了TEMPEST攻击,目前价格仅为30美元。我们实现了一个发射器恶意软件,它可以调制二进制数据并通过视频电缆发射的电磁波传输它。我们还实现了一个远程接收器,它使用GNU Radio对传输进行解调和解码。对该转换信道的频率范围、有效距离和带宽进行了分析。我们发现恶意软件可以通过电磁发射将数据(例如,加密密钥,键盘记录数据和文件)从气隙计算机秘密泄露到附近的射频接收器。该信道的有效比特率为60 ~ 640比特/秒。
{"title":"LCD TEMPEST Air-Gap Attack Reloaded","authors":"Mordechai Guri, Matan Monitz","doi":"10.1109/ICSEE.2018.8646277","DOIUrl":"https://doi.org/10.1109/ICSEE.2018.8646277","url":null,"abstract":"In 1998, researcher showed how attackers can transmit data from computers through electromagnetic radio waves generated by the computer video card. 20 years later, we examine this type of threat in a context of modern cyber-attacks. In this type of threat, attackers can covertly leak sensitive data from isolated (‘air-gapped’) computers using the electromagnetic emission from the video card. We present related work and give a brief technical background. We tested the TEMPEST attack with modern LCD screens and affordable user-defined-radio hardware available today for only $30. We implement a transmitter malware that can modulate binary data and transmit it over electromagnetic waves emitted from the video cable. We also implement a remote receiver, which demodulate and decode the transmission using GNU Radio. We present an analysis of the frequency range, effective distance and the bandwidth of this covert-channel. We found that malware can covertly leak data (e.g., encryption keys, keylogging data and documents) from air-gapped computers to a nearby RF receiver via the electromagnetic emission. The effective bitrate of this channel is 60 bit/sec to 640 bit/sec.","PeriodicalId":254455,"journal":{"name":"2018 IEEE International Conference on the Science of Electrical Engineering in Israel (ICSEE)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122701646","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Speech Enhancement With Deep Neural Networks Using MoG Based Labels 基于MoG标签的深度神经网络语音增强
Hodaya Hammer, Gilad Rath, Shlomo E. Chazan, J. Goldberger, S. Gannot
In this paper we present a mixture of Gaussians-deep neural network (MoG-DNN) algorithm for single-microphone speech enhancement. We combine between the generative mixture of Gaussians (MoG) model and the discriminative deep neural network (DNN). The proposed algorithm consists of two phases, the training phase and the test phase. In the training phase, the clean speech power spectral density (PSD) is modeled as a MoG representing an unsupervised assortment of the speech signal. Following, the database is labeled to fit the given MoG. DNN is then trained to classify noisy time-frame features to one of the Gaussians from the already inferred MoG. Given the classification results, a speech presence probability (SPP) is obtained in the test phase. Using the SPP, soft spectral subtraction is then applied, while, simultaneously updating the noise statistics. The generative unsupervised MoG can be applied to any unknown database, in addition to preserving the speech spectral structure. Furthermore, the discriminative DNN maintains the continuity of the speech. Experimental study shows that the proposed algorithm produces higher objective measurements scores compared to other speech enhancement algorithms.
本文提出了一种混合高斯-深度神经网络(MoG-DNN)算法用于单麦克风语音增强。我们将生成混合高斯模型(MoG)与判别深度神经网络(DNN)相结合。该算法分为两个阶段:训练阶段和测试阶段。在训练阶段,将干净语音功率谱密度(PSD)建模为表示语音信号无监督分类的MoG。接下来,对数据库进行标记以符合给定的MoG。然后训练DNN将有噪声的时间框架特征从已经推断的MoG中分类为高斯函数之一。根据分类结果,在测试阶段得到语音存在概率(SPP)。使用SPP,然后应用软谱减法,同时更新噪声统计量。在保留语音频谱结构的基础上,生成无监督MoG可以应用于任何未知数据库。此外,判别DNN保持了语音的连续性。实验研究表明,与其他语音增强算法相比,该算法具有更高的客观测量分数。
{"title":"Speech Enhancement With Deep Neural Networks Using MoG Based Labels","authors":"Hodaya Hammer, Gilad Rath, Shlomo E. Chazan, J. Goldberger, S. Gannot","doi":"10.1109/ICSEE.2018.8646105","DOIUrl":"https://doi.org/10.1109/ICSEE.2018.8646105","url":null,"abstract":"In this paper we present a mixture of Gaussians-deep neural network (MoG-DNN) algorithm for single-microphone speech enhancement. We combine between the generative mixture of Gaussians (MoG) model and the discriminative deep neural network (DNN). The proposed algorithm consists of two phases, the training phase and the test phase. In the training phase, the clean speech power spectral density (PSD) is modeled as a MoG representing an unsupervised assortment of the speech signal. Following, the database is labeled to fit the given MoG. DNN is then trained to classify noisy time-frame features to one of the Gaussians from the already inferred MoG. Given the classification results, a speech presence probability (SPP) is obtained in the test phase. Using the SPP, soft spectral subtraction is then applied, while, simultaneously updating the noise statistics. The generative unsupervised MoG can be applied to any unknown database, in addition to preserving the speech spectral structure. Furthermore, the discriminative DNN maintains the continuity of the speech. Experimental study shows that the proposed algorithm produces higher objective measurements scores compared to other speech enhancement algorithms.","PeriodicalId":254455,"journal":{"name":"2018 IEEE International Conference on the Science of Electrical Engineering in Israel (ICSEE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123385954","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Robust Motion Compensation for Forensic Analysis of Egocentric Video using Joint Stabilization and Tracking 基于关节稳定和跟踪的自中心视频取证分析鲁棒运动补偿
Oren Cohen, Alexander Apartsin, J. Alon, E. Katz
Stabilization and tracking of objects in egocentric videos captured by law enforcement body-worn cameras are often much more challenging compared to standard videos captured by regular mobile cameras. That is due to extreme motion caused either by the camera or by objects in the video frames. Therefore, standard stabilization and tracking methods may be less effective on such video clips, and more robust methods are required. The work presented in this paper describes robust methods for video frame stabilization and in-frame object stabilization and tracking for egocentric video analysis. During forensic investigations, sometimes more than one type of analysis is required for egocentric videos, captured in a variety of motion conditions. Hence we first define four types of use-cases that influence the requirements from the stabilization and tracking algorithms. These use-cases are categorized according to the camera motion vector, the type, size and number of objects in the scene, and to the relative motion between the objects. The methods we provide for those four use-cases are specifically adapted for forensic investigation, and have the ability to simultaneously stabilize and track both background as well as foreground regions in the video frames. The proposed methods are robust to the frame content, perform joint estimation and filtering of the camera path, and handle multiple moving objects in the scene, as demonstrated in our experiments.
稳定和跟踪的对象在自我中心的视频中,由执法机构随身携带的相机拍摄的,往往比普通移动相机拍摄的标准视频更具挑战性。这是由于摄像机或视频帧中的物体引起的极端运动。因此,标准的稳定和跟踪方法可能对此类视频剪辑效果较差,需要更强大的方法。本文介绍了视频帧稳定和帧内目标稳定的鲁棒方法,以及用于自我中心视频分析的跟踪方法。在法医调查期间,有时需要对以自我为中心的视频进行多种类型的分析,这些视频是在各种运动条件下拍摄的。因此,我们首先定义了四种类型的用例,这些用例影响来自稳定和跟踪算法的需求。这些用例根据相机运动矢量、场景中物体的类型、大小和数量以及物体之间的相对运动进行分类。我们为这四个用例提供的方法专门适用于法医调查,并且能够同时稳定和跟踪视频帧中的背景和前景区域。实验结果表明,该方法对帧内容具有鲁棒性,对摄像机路径进行联合估计和滤波,并能处理场景中多个运动物体。
{"title":"Robust Motion Compensation for Forensic Analysis of Egocentric Video using Joint Stabilization and Tracking","authors":"Oren Cohen, Alexander Apartsin, J. Alon, E. Katz","doi":"10.1109/ICSEE.2018.8646211","DOIUrl":"https://doi.org/10.1109/ICSEE.2018.8646211","url":null,"abstract":"Stabilization and tracking of objects in egocentric videos captured by law enforcement body-worn cameras are often much more challenging compared to standard videos captured by regular mobile cameras. That is due to extreme motion caused either by the camera or by objects in the video frames. Therefore, standard stabilization and tracking methods may be less effective on such video clips, and more robust methods are required. The work presented in this paper describes robust methods for video frame stabilization and in-frame object stabilization and tracking for egocentric video analysis. During forensic investigations, sometimes more than one type of analysis is required for egocentric videos, captured in a variety of motion conditions. Hence we first define four types of use-cases that influence the requirements from the stabilization and tracking algorithms. These use-cases are categorized according to the camera motion vector, the type, size and number of objects in the scene, and to the relative motion between the objects. The methods we provide for those four use-cases are specifically adapted for forensic investigation, and have the ability to simultaneously stabilize and track both background as well as foreground regions in the video frames. The proposed methods are robust to the frame content, perform joint estimation and filtering of the camera path, and handle multiple moving objects in the scene, as demonstrated in our experiments.","PeriodicalId":254455,"journal":{"name":"2018 IEEE International Conference on the Science of Electrical Engineering in Israel (ICSEE)","volume":"113 22","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113945555","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Thinning Satellite Communication Antenna Arrays for Dual Band Operation 双频操作的卫星通信天线阵列减薄
R. Gal, R. Shavit
In this paper a design method is proposed to construct a dual-band operation antenna array, interleaving two arrays, operating at Ku and Ka-band frequencies, on the same real estate. Sharing the same antenna aperture is required to utilize a limited real estate for multiple tasks. First, each array configuration is examined, to achieve optimal initial guess to the thinning algorithms. Triangular lattice is applied for both arrays and overlapping elements are shifted along major axes to allow interleaving of both arrays. Circular aperture is used for the larger Ku array. To analyze the configuration performance, reference arrays are constructed, with rectangular aperture and rectangular lattice. Moreover, genetic algorithm is used to further thinning the Ku array and maintaining a required property of the application. All the analysis is taken considering a scan range of $35^{mathrm {o}} bullet 65^{mathrm {o}}$, to achieve a design that is applicable for satellite communication purposes. The optimal Ku array directivity after thinning at scan angle $theta =50^{mathrm {o}}$ is 32.53 dBi (1 dB decrease relative to reference array), using only 74% of the reference arrays elements (rectangular aperture and rectangular lattice). Side lobes level (SLL) remained at -22.19 dB (SLL requirement is -22 dB). The results for the requested scan range shows no grating-lobes in radiation patterns, and satisfactory results comparing to the reference arrays.
本文提出了一种双频工作天线阵的设计方法,即在同一地块上将两个工作在Ku和ka频段的天线阵交叉在一起。共用相同的天线孔径需要利用有限的空间来完成多个任务。首先,对每一种阵列配置进行了检验,以获得细化算法的最优初始猜测。三角晶格应用于两个阵列,重叠元素沿主轴移位,以允许两个阵列交错。圆形孔径用于较大的Ku阵列。为了分析结构性能,构造了矩形孔径和矩形晶格的参考阵列。此外,采用遗传算法进一步细化Ku数组,并保持应用程序所需的属性。所有分析都考虑到扫描范围为$35^{ mathm {o}} bullet $ 65^{ mathm {o}}$,以实现适用于卫星通信目的的设计。当扫描角$theta =50^{ mathm {o}}$减薄后,仅使用74%的参考阵列元素(矩形孔径和矩形晶格),Ku阵列的最佳指向性为32.53 dBi(相对于参考阵列减少1 dB)。侧瓣电平(SLL)保持在-22.19 dB (SLL要求为-22 dB)。结果表明,在要求的扫描范围内,辐射方向图中没有光栅瓣,与参考阵列相比,结果令人满意。
{"title":"Thinning Satellite Communication Antenna Arrays for Dual Band Operation","authors":"R. Gal, R. Shavit","doi":"10.1109/ICSEE.2018.8646194","DOIUrl":"https://doi.org/10.1109/ICSEE.2018.8646194","url":null,"abstract":"In this paper a design method is proposed to construct a dual-band operation antenna array, interleaving two arrays, operating at Ku and Ka-band frequencies, on the same real estate. Sharing the same antenna aperture is required to utilize a limited real estate for multiple tasks. First, each array configuration is examined, to achieve optimal initial guess to the thinning algorithms. Triangular lattice is applied for both arrays and overlapping elements are shifted along major axes to allow interleaving of both arrays. Circular aperture is used for the larger Ku array. To analyze the configuration performance, reference arrays are constructed, with rectangular aperture and rectangular lattice. Moreover, genetic algorithm is used to further thinning the Ku array and maintaining a required property of the application. All the analysis is taken considering a scan range of $35^{mathrm {o}} bullet 65^{mathrm {o}}$, to achieve a design that is applicable for satellite communication purposes. The optimal Ku array directivity after thinning at scan angle $theta =50^{mathrm {o}}$ is 32.53 dBi (1 dB decrease relative to reference array), using only 74% of the reference arrays elements (rectangular aperture and rectangular lattice). Side lobes level (SLL) remained at -22.19 dB (SLL requirement is -22 dB). The results for the requested scan range shows no grating-lobes in radiation patterns, and satisfactory results comparing to the reference arrays.","PeriodicalId":254455,"journal":{"name":"2018 IEEE International Conference on the Science of Electrical Engineering in Israel (ICSEE)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125639393","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Face anti-spoofing based on projective invariants 基于投影不变量的人脸防欺骗
Alexander Naitsat, Y. Zeevi
The most common security authentication systems rely on automatic face recognition, which is particularly vulnerable to various spoofing attacks. Often these attacks include attempts to deceive a system by using a photo or video recording of a legitimate user. Recent approaches to this problem are based on pure machine learning techniques that require large training datasets and generalize or scale, poorly.By contrast, we present a geometric approach for detecting spoofing attacks in face recognition based authentication systems. By locating planar regions around racial landmarks, our method distinguishes between genuine user recordings and recordings of spoofed images such as printed photos and video replays.The proposed algorithm is based on projective invariant relationships that are independent of the camera parameters and lighting conditions. Unlike previous geometric approaches, the input to our system is a stream of two RGB cameras. Comparing with methods implemented by a single RGB camera, our approach is significantly more accurate and is completely automatic, since we do not require head movements and other user interactions. While, on the other hand, our method does not employ expensive devices, such as depth or thermal cameras, and it operates both in indoor and outdoor settings.
最常见的安全认证系统依赖于自动人脸识别,这特别容易受到各种欺骗攻击。通常这些攻击包括试图通过使用合法用户的照片或视频记录来欺骗系统。最近解决这个问题的方法是基于纯机器学习技术,需要大量的训练数据集和泛化或扩展,很差。相比之下,我们提出了一种几何方法来检测基于人脸识别的身份验证系统中的欺骗攻击。通过定位种族地标周围的平面区域,我们的方法区分了真实的用户记录和欺骗图像的记录,如打印照片和视频重播。该算法基于与摄像机参数和光照条件无关的投影不变关系。与之前的几何方法不同,我们系统的输入是由两个RGB相机组成的流。与单个RGB相机实现的方法相比,我们的方法明显更准确,而且是完全自动的,因为我们不需要头部运动和其他用户交互。然而,另一方面,我们的方法不使用昂贵的设备,如深度或热像仪,它可以在室内和室外环境中运行。
{"title":"Face anti-spoofing based on projective invariants","authors":"Alexander Naitsat, Y. Zeevi","doi":"10.1109/ICSEE.2018.8646223","DOIUrl":"https://doi.org/10.1109/ICSEE.2018.8646223","url":null,"abstract":"The most common security authentication systems rely on automatic face recognition, which is particularly vulnerable to various spoofing attacks. Often these attacks include attempts to deceive a system by using a photo or video recording of a legitimate user. Recent approaches to this problem are based on pure machine learning techniques that require large training datasets and generalize or scale, poorly.By contrast, we present a geometric approach for detecting spoofing attacks in face recognition based authentication systems. By locating planar regions around racial landmarks, our method distinguishes between genuine user recordings and recordings of spoofed images such as printed photos and video replays.The proposed algorithm is based on projective invariant relationships that are independent of the camera parameters and lighting conditions. Unlike previous geometric approaches, the input to our system is a stream of two RGB cameras. Comparing with methods implemented by a single RGB camera, our approach is significantly more accurate and is completely automatic, since we do not require head movements and other user interactions. While, on the other hand, our method does not employ expensive devices, such as depth or thermal cameras, and it operates both in indoor and outdoor settings.","PeriodicalId":254455,"journal":{"name":"2018 IEEE International Conference on the Science of Electrical Engineering in Israel (ICSEE)","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134446885","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Effect of Load Composition on the Frequency Response of the Cyprus Power System 负荷构成对塞浦路斯电力系统频率响应的影响
Elena Polykarpou, M. Asprou, E. Kyriakides, Christos Hadjilaou, A. Petoussis, Z. Achillides
The Cyprus power system is undergoing vast changes due to the increasing penetration of renewable energy sources. The isolated nature of the system makes it more vulnerable to large frequency deviations. As a consequence, frequency control becomes challenging especially in the case of large disturbances. To keep the system in admissible frequency limits and avoid brownouts or even system blackout, it is important to have a detailed and accurate model of the system to improve monitoring and control, and enhance the situational awareness of the system operators. One important component of the system to be modelled is the system load. Although this is not a straightforward task, the significance of load modelling can be underlined by the fact that the system response is affected by the type of the system loads. In this sense, the type of the load in combination with the increased penetration of dispersed renewable energy sources can significantly affect the system frequency response to generation loss events. In this paper, the importance of accurate load modelling and the associated effect to the response of the Cyprus power system is examined. The system frequency response to generation loss events for multiple scenarios is investigated. Various load compositions are examined, while PV generation is also considered in order to simulate realistic system conditions. Furthermore, two cases of different plant mix are also examined.
由于可再生能源的日益普及,塞浦路斯的电力系统正在发生巨大的变化。系统的孤立性使它更容易受到大频率偏差的影响。因此,频率控制变得具有挑战性,特别是在大干扰的情况下。为了使系统保持在可接受的频率范围内,避免电力系统限电甚至停电,有一个详细、准确的系统模型,以改善监测和控制,增强系统操作员的态势感知是很重要的。要建模的系统的一个重要组成部分是系统负载。尽管这不是一项直截了当的任务,但系统响应受系统负载类型的影响这一事实可以强调负载建模的重要性。从这个意义上说,负荷类型与分散可再生能源渗透率的增加相结合,可以显著影响系统对发电损耗事件的频率响应。本文探讨了准确的负荷建模及其对塞浦路斯电力系统响应的影响。研究了多种情况下系统对发电损耗事件的频率响应。研究了各种负载组成,同时也考虑了光伏发电,以模拟实际的系统条件。此外,还研究了两种不同植物混合的情况。
{"title":"Effect of Load Composition on the Frequency Response of the Cyprus Power System","authors":"Elena Polykarpou, M. Asprou, E. Kyriakides, Christos Hadjilaou, A. Petoussis, Z. Achillides","doi":"10.1109/ICSEE.2018.8646268","DOIUrl":"https://doi.org/10.1109/ICSEE.2018.8646268","url":null,"abstract":"The Cyprus power system is undergoing vast changes due to the increasing penetration of renewable energy sources. The isolated nature of the system makes it more vulnerable to large frequency deviations. As a consequence, frequency control becomes challenging especially in the case of large disturbances. To keep the system in admissible frequency limits and avoid brownouts or even system blackout, it is important to have a detailed and accurate model of the system to improve monitoring and control, and enhance the situational awareness of the system operators. One important component of the system to be modelled is the system load. Although this is not a straightforward task, the significance of load modelling can be underlined by the fact that the system response is affected by the type of the system loads. In this sense, the type of the load in combination with the increased penetration of dispersed renewable energy sources can significantly affect the system frequency response to generation loss events. In this paper, the importance of accurate load modelling and the associated effect to the response of the Cyprus power system is examined. The system frequency response to generation loss events for multiple scenarios is investigated. Various load compositions are examined, while PV generation is also considered in order to simulate realistic system conditions. Furthermore, two cases of different plant mix are also examined.","PeriodicalId":254455,"journal":{"name":"2018 IEEE International Conference on the Science of Electrical Engineering in Israel (ICSEE)","volume":"158 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132767417","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
2018 IEEE International Conference on the Science of Electrical Engineering in Israel (ICSEE)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1