首页 > 最新文献

2018 IEEE International Conference on the Science of Electrical Engineering in Israel (ICSEE)最新文献

英文 中文
Nearest Neighbor MPPT with Cross-Entropy Method optimization 基于交叉熵法优化的最近邻MPPT
R. Machlev, Y. Levron
Maximum power point tracking (MPPT) techniques are being used to improve the efficiency of photovoltaic (PV) systems. In this paper, a Nearest Neighbor(NN)-based MPPT with Cross-Entropy (CE) Method optimization algorithm is proposed. The proposed method is system-independent, accurate and easy to implement. the performance of the algorithm is validate in simulation using profile of different irradiances.
最大功率点跟踪(MPPT)技术被用于提高光伏发电系统的效率。提出了一种基于交叉熵方法的最近邻优化算法。该方法与系统无关,精度高,易于实现。利用不同辐照度的轮廓进行了仿真,验证了算法的性能。
{"title":"Nearest Neighbor MPPT with Cross-Entropy Method optimization","authors":"R. Machlev, Y. Levron","doi":"10.1109/ICSEE.2018.8646091","DOIUrl":"https://doi.org/10.1109/ICSEE.2018.8646091","url":null,"abstract":"Maximum power point tracking (MPPT) techniques are being used to improve the efficiency of photovoltaic (PV) systems. In this paper, a Nearest Neighbor(NN)-based MPPT with Cross-Entropy (CE) Method optimization algorithm is proposed. The proposed method is system-independent, accurate and easy to implement. the performance of the algorithm is validate in simulation using profile of different irradiances.","PeriodicalId":254455,"journal":{"name":"2018 IEEE International Conference on the Science of Electrical Engineering in Israel (ICSEE)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133265499","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Persistent Memory Based and Feature Rich File System Design 基于持久内存和特性丰富的文件系统设计
Netanel Katzburg, Amit Golander
Persistent memory (PM) is an emerging technology that has substantial advantages compared to current flash and block-based storage devices. With PM, system performance may be substantially improved, storage bottlenecks are reduced, and application design can be made simpler. Yet, new software is required to allow application to efficiently leverage PM. In this paper we survey the entire stack bottom up. We begin with partitioning PM hardware types and describe the three main software approaches to leverage such PM. We then zoom in on PM-based file systems and provide architectural insight into the only feature-rich industrial PM-based file system (to date). Finally, we broaden the scope again and classify the 12 academic and industrial PM-related file systems proposed to date.
持久内存(PM)是一种新兴技术,与当前的闪存和基于块的存储设备相比,它具有实质性的优势。有了PM,系统性能可以得到很大的提高,存储瓶颈可以减少,应用程序设计可以变得更简单。然而,需要新的软件来允许应用程序有效地利用PM。在本文中,我们从下往上考察整个堆栈。我们从划分PM硬件类型开始,并描述利用此类PM的三种主要软件方法。然后,我们将放大基于pm的文件系统,并提供对唯一一个功能丰富的基于pm的工业文件系统(到目前为止)的架构洞察力。最后,我们再次扩大范围,并对迄今为止提出的12个学术和工业pm相关的文件系统进行分类。
{"title":"Persistent Memory Based and Feature Rich File System Design","authors":"Netanel Katzburg, Amit Golander","doi":"10.1109/ICSEE.2018.8646066","DOIUrl":"https://doi.org/10.1109/ICSEE.2018.8646066","url":null,"abstract":"Persistent memory (PM) is an emerging technology that has substantial advantages compared to current flash and block-based storage devices. With PM, system performance may be substantially improved, storage bottlenecks are reduced, and application design can be made simpler. Yet, new software is required to allow application to efficiently leverage PM. In this paper we survey the entire stack bottom up. We begin with partitioning PM hardware types and describe the three main software approaches to leverage such PM. We then zoom in on PM-based file systems and provide architectural insight into the only feature-rich industrial PM-based file system (to date). Finally, we broaden the scope again and classify the 12 academic and industrial PM-related file systems proposed to date.","PeriodicalId":254455,"journal":{"name":"2018 IEEE International Conference on the Science of Electrical Engineering in Israel (ICSEE)","volume":"518 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133824964","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
NVDIMM-N Persistent Memory and its Impact on Two Relational Databases NVDIMM-N Persistent Memory及其对两个关系数据库的影响
Netanel Katzburg, Amit Golander, S. Weiss
The architecture of Database Management Systems (DBMS) is closely related to the characteristics of the storage hierarchy, because durability and response time are highly dependent on the physical properties of the target storage. Main memory volatility requires a DBMS to provide durability by software means as data continuously moves between volatile memory buffers and input/output persistent media. In traditional storage systems applications use complex concurrency control schemes to reduce latency and increase throughput and in order to utilize multicore hardware and shared system resources. New persistent memory (PM) devices emerging in the last decade, such as PCM, RRAM and MRAM, exhibit near-DRAM speed and characteristics, provide data persistence, and could be game changing for storage bound applications. In this paper we focus on benefits of persistent memory and their impact on database management systems. We consider methods for application speedup that are applicable to DBMSs that use PM. These optimization methods depend on the characteristics of PM storage. We consider concurrency and mutual resource contention, explore and rethink major application components, and finally combine static code optimization. Running the on-line transaction processing (OLTP) workload, the DBMSs explored here show performance gains relative to traditional storage systems by a factor of 3.17 and 1.79 for PostgreSQL and SQLite respectively.
数据库管理系统(DBMS)的体系结构与存储层次结构的特征密切相关,因为持久性和响应时间高度依赖于目标存储的物理属性。当数据在易失性存储器缓冲区和输入/输出持久介质之间连续移动时,主存易失性要求DBMS通过软件手段提供持久性。在传统的存储系统中,应用程序使用复杂的并发控制方案来减少延迟和提高吞吐量,并利用多核硬件和共享系统资源。在过去十年中出现的新的持久性存储器(PM)设备,如PCM、RRAM和MRAM,表现出接近dram的速度和特性,提供数据持久性,并可能改变存储绑定应用程序的游戏规则。在本文中,我们关注持久内存的好处及其对数据库管理系统的影响。我们考虑了适用于使用PM的dbms的应用程序加速方法。这些优化方法取决于PM存储的特性。我们考虑并发性和相互资源争用,探索和重新思考主要应用组件,最后结合静态代码优化。在运行联机事务处理(OLTP)工作负载时,本文所研究的dbms相对于传统存储系统的性能分别提高了3.17倍和1.79倍(PostgreSQL和SQLite)。
{"title":"NVDIMM-N Persistent Memory and its Impact on Two Relational Databases","authors":"Netanel Katzburg, Amit Golander, S. Weiss","doi":"10.1109/ICSEE.2018.8646020","DOIUrl":"https://doi.org/10.1109/ICSEE.2018.8646020","url":null,"abstract":"The architecture of Database Management Systems (DBMS) is closely related to the characteristics of the storage hierarchy, because durability and response time are highly dependent on the physical properties of the target storage. Main memory volatility requires a DBMS to provide durability by software means as data continuously moves between volatile memory buffers and input/output persistent media. In traditional storage systems applications use complex concurrency control schemes to reduce latency and increase throughput and in order to utilize multicore hardware and shared system resources. New persistent memory (PM) devices emerging in the last decade, such as PCM, RRAM and MRAM, exhibit near-DRAM speed and characteristics, provide data persistence, and could be game changing for storage bound applications. In this paper we focus on benefits of persistent memory and their impact on database management systems. We consider methods for application speedup that are applicable to DBMSs that use PM. These optimization methods depend on the characteristics of PM storage. We consider concurrency and mutual resource contention, explore and rethink major application components, and finally combine static code optimization. Running the on-line transaction processing (OLTP) workload, the DBMSs explored here show performance gains relative to traditional storage systems by a factor of 3.17 and 1.79 for PostgreSQL and SQLite respectively.","PeriodicalId":254455,"journal":{"name":"2018 IEEE International Conference on the Science of Electrical Engineering in Israel (ICSEE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125806906","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Probability Based Keys Sharing for IOT Security 基于概率的物联网安全密钥共享
G. Leshem, Esther David, M. Domb
The Internet of Things (IoT) is composed of a vast number of connected devices, interacting among them in real-time and high messaging volume. Such setting is in high probability to be targeted by malicious attackers. Therefore, robust security measures are required. Encryption is one of the ways to prevent the exposure of the transmitted messages and authenticate it. The main challenge of implementing encryption, is the need to frequently and securely change the encryption keys, which require constant key construction and key distribution. IoT devices have poor memory, storage, and processing bandwidth. Most of the existing security solutions cannot be implemented on them, and so leading to lack of adequate security. Allowing safe interaction between any two IoT-devices, means having a unique encryption key per conversation. This requires frequent changes of the encryption keys. To increase the availability of keys at each IoT-device, we propose an ongoing key construction process that loads the network with a common key-pool. The protocol is scalable to ensure long term security sustainability and encryption availability. The proposed protocol is based on a probability analysis that ensures the existence of a common key between any pair of IoT devices in a predefine probability which is set by the system designer. The implementation proves the feasibility of our proposed security protocol for IoT networks.
物联网(IoT)由大量连接的设备组成,这些设备之间实时交互,消息量很大。这样的设置很有可能成为恶意攻击者的目标。因此,需要健壮的安全措施。加密是防止传输的消息暴露并对其进行身份验证的方法之一。实现加密的主要挑战是需要频繁且安全地更改加密密钥,这需要不断地构造密钥和分发密钥。物联网设备的内存、存储和处理带宽较差。大多数现有的安全解决方案不能在它们上实现,因此导致缺乏足够的安全性。允许任何两个物联网设备之间的安全交互,意味着每次会话都有一个唯一的加密密钥。这需要经常更改加密密钥。为了提高每个物联网设备上密钥的可用性,我们提出了一个持续的密钥构建过程,该过程用一个公共密钥池加载网络。该协议是可扩展的,以确保长期的安全可持续性和加密可用性。所提出的协议基于概率分析,该分析确保任何一对物联网设备之间以由系统设计者设置的预定义概率存在公共密钥。实现证明了我们提出的物联网网络安全协议的可行性。
{"title":"Probability Based Keys Sharing for IOT Security","authors":"G. Leshem, Esther David, M. Domb","doi":"10.1109/icsee.2018.8645999","DOIUrl":"https://doi.org/10.1109/icsee.2018.8645999","url":null,"abstract":"The Internet of Things (IoT) is composed of a vast number of connected devices, interacting among them in real-time and high messaging volume. Such setting is in high probability to be targeted by malicious attackers. Therefore, robust security measures are required. Encryption is one of the ways to prevent the exposure of the transmitted messages and authenticate it. The main challenge of implementing encryption, is the need to frequently and securely change the encryption keys, which require constant key construction and key distribution. IoT devices have poor memory, storage, and processing bandwidth. Most of the existing security solutions cannot be implemented on them, and so leading to lack of adequate security. Allowing safe interaction between any two IoT-devices, means having a unique encryption key per conversation. This requires frequent changes of the encryption keys. To increase the availability of keys at each IoT-device, we propose an ongoing key construction process that loads the network with a common key-pool. The protocol is scalable to ensure long term security sustainability and encryption availability. The proposed protocol is based on a probability analysis that ensures the existence of a common key between any pair of IoT devices in a predefine probability which is set by the system designer. The implementation proves the feasibility of our proposed security protocol for IoT networks.","PeriodicalId":254455,"journal":{"name":"2018 IEEE International Conference on the Science of Electrical Engineering in Israel (ICSEE)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126195488","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Automatic Detection of Insulting Sentences in Conversation 会话中侮辱性语句的自动检测
Merav Allouch, A. Azaria, Rina Azoulay, Ester Ben-Izchak, M. Zwilling, D. Zachor
An overall goal of our work is to use machine-learning based solutions to assist children with communication difficulties in their communication task. In this paper, we concentrate on the problem of recognizing insulting sentences the child says, or insulting sentences that are told to him. An automated agent that is able to recognize such sentences can alert the child in real time situations, and can suggest how to respond to the resulting social situation. We composed a dataset of 1241 non-insulting and 1255 insulting sentences. We trained different machine learning methods on 90% randomly chosen sentences from the dataset and tested it on the remaining. We used the following machine learning methods: Multi-Layer Neural Network, SVM, Naive Bayes, Decision Tree, and Tree Bagger for the task. We found that the best predictors of the insulting sentences, were the SVM method, with 80% recall and over 75%precision, and the Multi-Layer Neural Network and the Tree Bagger, with precision and recall exceeding 75%, We also found that adding additional data to the learning process, such as 9500 labeled sentences from twitter, or adding the word “positive” and the word “negative” to sentences including positive or negative words, respectively, slightly improves the results in most of the cases. Our results provide the cornerstones for an automated system that would enable on-line assistance and consultation for children with communication disabilities, and also for other persons with communication problems, in a way that will enable them to function better in society through this assistance.
我们工作的总体目标是使用基于机器学习的解决方案来帮助有沟通困难的儿童完成沟通任务。在本文中,我们集中研究识别孩子所说的侮辱性句子或告诉他的侮辱性句子的问题。一个能够识别这些句子的自动代理可以在实时情况下提醒孩子,并可以建议如何应对由此产生的社交情况。我们组成了一个包含1241个非侮辱性句子和1255个侮辱性句子的数据集。我们在数据集中随机选择的90%的句子上训练了不同的机器学习方法,并在剩下的句子上进行了测试。我们使用了以下机器学习方法:多层神经网络、支持向量机、朴素贝叶斯、决策树和树袋机。我们发现,对侮辱性句子进行预测的最佳方法是支持向量机方法(SVM),其查全率为80%,查全率超过75%,以及多层神经网络和Tree Bagger,其查全率和查全率均超过75%。我们还发现,在学习过程中添加额外的数据,例如从twitter中添加9500个标记句子,或者在句子中分别添加单词“positive”和单词“negative”,包括正面或负面词汇。在大多数情况下会稍微改善结果。我们的研究结果为自动化系统提供了基础,该系统可以为有沟通障碍的儿童以及其他有沟通问题的人提供在线帮助和咨询,从而使他们能够通过这种帮助更好地在社会中发挥作用。
{"title":"Automatic Detection of Insulting Sentences in Conversation","authors":"Merav Allouch, A. Azaria, Rina Azoulay, Ester Ben-Izchak, M. Zwilling, D. Zachor","doi":"10.1109/ICSEE.2018.8646165","DOIUrl":"https://doi.org/10.1109/ICSEE.2018.8646165","url":null,"abstract":"An overall goal of our work is to use machine-learning based solutions to assist children with communication difficulties in their communication task. In this paper, we concentrate on the problem of recognizing insulting sentences the child says, or insulting sentences that are told to him. An automated agent that is able to recognize such sentences can alert the child in real time situations, and can suggest how to respond to the resulting social situation. We composed a dataset of 1241 non-insulting and 1255 insulting sentences. We trained different machine learning methods on 90% randomly chosen sentences from the dataset and tested it on the remaining. We used the following machine learning methods: Multi-Layer Neural Network, SVM, Naive Bayes, Decision Tree, and Tree Bagger for the task. We found that the best predictors of the insulting sentences, were the SVM method, with 80% recall and over 75%precision, and the Multi-Layer Neural Network and the Tree Bagger, with precision and recall exceeding 75%, We also found that adding additional data to the learning process, such as 9500 labeled sentences from twitter, or adding the word “positive” and the word “negative” to sentences including positive or negative words, respectively, slightly improves the results in most of the cases. Our results provide the cornerstones for an automated system that would enable on-line assistance and consultation for children with communication disabilities, and also for other persons with communication problems, in a way that will enable them to function better in society through this assistance.","PeriodicalId":254455,"journal":{"name":"2018 IEEE International Conference on the Science of Electrical Engineering in Israel (ICSEE)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116750544","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Low-Complexity Video Classification using Recurrent Neural Networks 基于递归神经网络的低复杂度视频分类
Ifat Abramovich, Tomer Ben-Yehuda, R. Cohen
Deep learning has led to great successes in computer vision tasks such as image classification. This is mostly attributed to the availability of large image datasets such as ImageNet. However, the progress in video classification has been slower, especially due to the small size of available video datasets and larger computational and memory demands. To promote innovation and advancement in this field, Google announced the YouTube-8M dataset in 2016, which is a public video dataset containing about 8-million tagged videos. In this paper, we train several deep neural networks for video classification on a subset of YouTube-8M. Our approach is based on extracting frame-level features using the Inception-v3 network, which are later used by recurrent neural networks with LSTM/BiLSTM units for video classification. We focus on network architectures with low computational requirements and present a detailed performance comparison. We show that for 5 categories, more than 96% of the videos are labeled correctly, where for 10 categories more than 89% of the videos are labeled correctly. We demonstrate that transfer learning leads to substantial saving in training time, while offering good results.
深度学习在图像分类等计算机视觉任务中取得了巨大成功。这主要归功于像ImageNet这样的大型图像数据集的可用性。然而,视频分类的进展一直较慢,特别是由于可用视频数据集的规模较小以及对计算和内存的需求较大。为了推动这一领域的创新和进步,谷歌在2016年公布了YouTube-8M数据集,这是一个包含约800万个标记视频的公共视频数据集。在本文中,我们在YouTube-8M的一个子集上训练了几个用于视频分类的深度神经网络。我们的方法是基于使用Inception-v3网络提取帧级特征,这些特征后来被带有LSTM/BiLSTM单元的递归神经网络用于视频分类。我们关注低计算需求的网络架构,并给出了详细的性能比较。我们发现,对于5个类别,超过96%的视频被正确标记,而对于10个类别,超过89%的视频被正确标记。我们证明了迁移学习可以节省大量的训练时间,同时提供良好的效果。
{"title":"Low-Complexity Video Classification using Recurrent Neural Networks","authors":"Ifat Abramovich, Tomer Ben-Yehuda, R. Cohen","doi":"10.1109/ICSEE.2018.8646076","DOIUrl":"https://doi.org/10.1109/ICSEE.2018.8646076","url":null,"abstract":"Deep learning has led to great successes in computer vision tasks such as image classification. This is mostly attributed to the availability of large image datasets such as ImageNet. However, the progress in video classification has been slower, especially due to the small size of available video datasets and larger computational and memory demands. To promote innovation and advancement in this field, Google announced the YouTube-8M dataset in 2016, which is a public video dataset containing about 8-million tagged videos. In this paper, we train several deep neural networks for video classification on a subset of YouTube-8M. Our approach is based on extracting frame-level features using the Inception-v3 network, which are later used by recurrent neural networks with LSTM/BiLSTM units for video classification. We focus on network architectures with low computational requirements and present a detailed performance comparison. We show that for 5 categories, more than 96% of the videos are labeled correctly, where for 10 categories more than 89% of the videos are labeled correctly. We demonstrate that transfer learning leads to substantial saving in training time, while offering good results.","PeriodicalId":254455,"journal":{"name":"2018 IEEE International Conference on the Science of Electrical Engineering in Israel (ICSEE)","volume":"153 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115547168","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Rate vs. Covertness for the Packet Insertion Problem 分组插入问题的速率与覆盖度
T. G. Dvorkind, A. Cohen
The goal of covert communication is to establish a communication link between two parties (Alice and Bob) while assuring that a warden (Willie) will not be able to detect the very presence of communication. In this work, we address the covert communication problem over a packet insertion channel. Assuming a Poisson channel model, we first consider an all-aware warden, who wishes to minimize the sum of his miss detection and false alarm probabilities. We show that the covertness extent versus Alice’s transmission rate can be computed exactly. We also derive simplified bounds which are tighter than previously known results. Such a warden, however, has to be aware of Alice’s transmission rate. A more practical scenario, is when the warden does not have this information, hence wishes to operate at a certain false alarm rate. For this case, we discuss Alice’s strategy to ensure the warden’s miss detection probability is lower bounded. Finally, we study covertness in the case where Willie has uncertainty regarding the nominal channel rate as well, and show that in this case, Alice’s covert transmission rate can be even higher.
秘密通信的目标是在双方(Alice和Bob)之间建立通信链接,同时确保监狱长(Willie)无法检测到通信的存在。在这项工作中,我们解决了在数据包插入通道上的隐蔽通信问题。假设一个泊松通道模型,我们首先考虑一个全意识的看守者,他希望最小化他的漏检概率和虚警概率的总和。我们证明了隐蔽程度与Alice传输速率的关系可以精确计算。我们还推导出了比先前已知结果更严格的简化界。然而,这样的监狱长必须知道爱丽丝的传播速率。更实际的情况是,当监狱长没有这些信息时,因此希望以一定的误报率运行。在这种情况下,我们讨论了爱丽丝的策略,以确保监狱长的漏检概率是下界的。最后,我们研究了威利对名义信道速率也有不确定性的情况下的隐蔽性,并表明在这种情况下,爱丽丝的隐蔽传输速率可以更高。
{"title":"Rate vs. Covertness for the Packet Insertion Problem","authors":"T. G. Dvorkind, A. Cohen","doi":"10.1109/ICSEE.2018.8646009","DOIUrl":"https://doi.org/10.1109/ICSEE.2018.8646009","url":null,"abstract":"The goal of covert communication is to establish a communication link between two parties (Alice and Bob) while assuring that a warden (Willie) will not be able to detect the very presence of communication. In this work, we address the covert communication problem over a packet insertion channel. Assuming a Poisson channel model, we first consider an all-aware warden, who wishes to minimize the sum of his miss detection and false alarm probabilities. We show that the covertness extent versus Alice’s transmission rate can be computed exactly. We also derive simplified bounds which are tighter than previously known results. Such a warden, however, has to be aware of Alice’s transmission rate. A more practical scenario, is when the warden does not have this information, hence wishes to operate at a certain false alarm rate. For this case, we discuss Alice’s strategy to ensure the warden’s miss detection probability is lower bounded. Finally, we study covertness in the case where Willie has uncertainty regarding the nominal channel rate as well, and show that in this case, Alice’s covert transmission rate can be even higher.","PeriodicalId":254455,"journal":{"name":"2018 IEEE International Conference on the Science of Electrical Engineering in Israel (ICSEE)","volume":"155 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116427352","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Combating Packet Loss in Image Coding using Oversampling and Irregular Interpolation 利用过采样和不规则插值对抗图像编码中的丢包
Mor Goren, R. Zamir
Diversity “multiple description” (MD) source coding promises graceful degradation in the presence of an unknown number of erasures in the channel. A simple solution in the case of two descriptions consists of oversampling the source by a factor of two and delta-sigma quantization. This approach was applied successfully to JPEG-based image coding over a lossy packet network, where the interpolation into two packets is done in the discrete cosine transform (DCT) domain. The extension to a larger number of descriptions, however, suffers from noise amplification whenever the received descriptions do not form a uniform sampling pattern. In this work we show how noise amplification can be reduced by optimizing the interpolation filter. We propose two interpolation methods which, for a given total coding rate, minimize the average distortion over all (K out of N) patterns of received packets. We provide simulation results comparing low pass and irregular interpolation filters, and discuss the advantage of each method.
分集“多重描述”(MD)源编码在信道中存在未知数量的擦除时保证了优雅的降级。在两个描述的情况下,一个简单的解决方案是对源进行2倍的过采样和delta-sigma量化。该方法成功地应用于有损数据包网络上基于jpeg的图像编码,其中在离散余弦变换(DCT)域中对两个数据包进行插值。然而,每当接收到的描述不形成均匀的采样模式时,对大量描述的扩展就会受到噪声放大的影响。在这项工作中,我们展示了如何通过优化插值滤波器来减少噪声放大。我们提出了两种插值方法,对于给定的总编码率,最小化接收数据包的所有(K / N)模式的平均失真。我们给出了低通和不规则插值滤波器的仿真结果,并讨论了每种方法的优点。
{"title":"Combating Packet Loss in Image Coding using Oversampling and Irregular Interpolation","authors":"Mor Goren, R. Zamir","doi":"10.1109/ICSEE.2018.8646292","DOIUrl":"https://doi.org/10.1109/ICSEE.2018.8646292","url":null,"abstract":"Diversity “multiple description” (MD) source coding promises graceful degradation in the presence of an unknown number of erasures in the channel. A simple solution in the case of two descriptions consists of oversampling the source by a factor of two and delta-sigma quantization. This approach was applied successfully to JPEG-based image coding over a lossy packet network, where the interpolation into two packets is done in the discrete cosine transform (DCT) domain. The extension to a larger number of descriptions, however, suffers from noise amplification whenever the received descriptions do not form a uniform sampling pattern. In this work we show how noise amplification can be reduced by optimizing the interpolation filter. We propose two interpolation methods which, for a given total coding rate, minimize the average distortion over all (K out of N) patterns of received packets. We provide simulation results comparing low pass and irregular interpolation filters, and discuss the advantage of each method.","PeriodicalId":254455,"journal":{"name":"2018 IEEE International Conference on the Science of Electrical Engineering in Israel (ICSEE)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116633214","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Robust speaker clustering quality estimation 鲁棒说话人聚类质量估计
Yishai Cohen, I. Lapidot
This paper focuses on estimating the quality of a clustering process. In our case - the task is to cluster short speech segments that belong to different speakers. Moreover, speaker clustering quality may be well estimated on several clustering approaches if they all based on the same features. This is very important, as it allows us to use the same quality estimation system without retraining, and achieve reasonable results even when the clustering method is changed. We predict the system’s quality by applying a logistic regression estimator on a several statistical parameters of the clustering. In this paper, mean-shift clustering with either cosine or probabilistic linear discriminant analysis (PLDA) score as similarity measure, and stochastic vector quantization (VQ) with cosine distance were applied in order to cluster the short speaker segments represented by i-vectors. The quality of the clustering is measured using the average cluster purity (ACP), average speaker purity (ASP) and K. We show that these measures can be estimated fairly well by applying logistic regression based on various clustering statistics that calculated once clustering is over. These statistical parameters are used as a feature vector representing the clustering.
本文的重点是估计聚类过程的质量。在我们的例子中,任务是聚类属于不同说话人的短语音片段。此外,如果几种聚类方法都基于相同的特征,则可以很好地估计说话人聚类质量。这是非常重要的,因为它允许我们使用相同的质量估计系统而不需要再训练,即使改变聚类方法也能得到合理的结果。我们通过对聚类的几个统计参数应用逻辑回归估计器来预测系统的质量。本文采用余弦或概率线性判别分析(PLDA)得分作为相似性度量的均值偏移聚类和余弦距离的随机矢量量化(VQ)对i-vector表示的短说话人片段进行聚类。聚类的质量是用平均聚类纯度(ACP)、平均说话者纯度(ASP)和k来衡量的。我们表明,通过应用基于聚类结束后计算的各种聚类统计数据的逻辑回归,这些度量可以很好地估计出来。这些统计参数被用作表示聚类的特征向量。
{"title":"Robust speaker clustering quality estimation","authors":"Yishai Cohen, I. Lapidot","doi":"10.1109/ICSEE.2018.8646164","DOIUrl":"https://doi.org/10.1109/ICSEE.2018.8646164","url":null,"abstract":"This paper focuses on estimating the quality of a clustering process. In our case - the task is to cluster short speech segments that belong to different speakers. Moreover, speaker clustering quality may be well estimated on several clustering approaches if they all based on the same features. This is very important, as it allows us to use the same quality estimation system without retraining, and achieve reasonable results even when the clustering method is changed. We predict the system’s quality by applying a logistic regression estimator on a several statistical parameters of the clustering. In this paper, mean-shift clustering with either cosine or probabilistic linear discriminant analysis (PLDA) score as similarity measure, and stochastic vector quantization (VQ) with cosine distance were applied in order to cluster the short speaker segments represented by i-vectors. The quality of the clustering is measured using the average cluster purity (ACP), average speaker purity (ASP) and K. We show that these measures can be estimated fairly well by applying logistic regression based on various clustering statistics that calculated once clustering is over. These statistical parameters are used as a feature vector representing the clustering.","PeriodicalId":254455,"journal":{"name":"2018 IEEE International Conference on the Science of Electrical Engineering in Israel (ICSEE)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123986813","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Decentralized event-triggered control of large-scale systems with saturated actuators 饱和致动器大型系统的分散事件触发控制
Yiftah Kowal, A. Selivanov, E. Fridman
We consider a large-scale LTI system with multiple local communication networks connecting sensors, controllers, and actuators. The local networks operate asynchronously and independently of one another. The main novelty is that the decentralized controllers are subject to saturation. Our objective is to achieve a regional exponential stability providing a decentralized bound on the domain of attraction for each plant. We introduce a sampled-data event-triggering mechanism from sensors to controllers to reduce the amount of transmitted signals. Using the time-delay approach to networked control systems and appropriate Lyapunov-Krasovskii functionals, we derive linear matrix inequalities that allow to find the decentralized bounds on the domains of attraction for each plant. Numerical example of coupled cart-pendulums illustrates the efficiency of the method.
我们考虑一个具有多个本地通信网络连接传感器、控制器和执行器的大规模LTI系统。本地网络以异步方式相互独立地运行。主要的新颖之处在于去中心化控制器容易饱和。我们的目标是实现区域指数稳定性,为每个植物的吸引力提供一个分散的边界。我们引入了从传感器到控制器的采样数据事件触发机制,以减少传输信号的数量。利用网络控制系统的时滞方法和适当的Lyapunov-Krasovskii泛函,我们推导出线性矩阵不等式,该不等式允许在每个对象的吸引域上找到分散的界。耦合小车摆的数值算例说明了该方法的有效性。
{"title":"Decentralized event-triggered control of large-scale systems with saturated actuators","authors":"Yiftah Kowal, A. Selivanov, E. Fridman","doi":"10.1109/ICSEE.2018.8646087","DOIUrl":"https://doi.org/10.1109/ICSEE.2018.8646087","url":null,"abstract":"We consider a large-scale LTI system with multiple local communication networks connecting sensors, controllers, and actuators. The local networks operate asynchronously and independently of one another. The main novelty is that the decentralized controllers are subject to saturation. Our objective is to achieve a regional exponential stability providing a decentralized bound on the domain of attraction for each plant. We introduce a sampled-data event-triggering mechanism from sensors to controllers to reduce the amount of transmitted signals. Using the time-delay approach to networked control systems and appropriate Lyapunov-Krasovskii functionals, we derive linear matrix inequalities that allow to find the decentralized bounds on the domains of attraction for each plant. Numerical example of coupled cart-pendulums illustrates the efficiency of the method.","PeriodicalId":254455,"journal":{"name":"2018 IEEE International Conference on the Science of Electrical Engineering in Israel (ICSEE)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124038428","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2018 IEEE International Conference on the Science of Electrical Engineering in Israel (ICSEE)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1