首页 > 最新文献

2014 IEEE REGION 10 SYMPOSIUM最新文献

英文 中文
Absorptive SPDT switch design using cascaded switchable parallel-coupled stub resonator and switchable radial stub resonator 采用级联可切换并联耦合短段谐振器和可切换径向短段谐振器的吸收式SPDT开关设计
Pub Date : 2014-04-14 DOI: 10.1109/TENCONSPRING.2014.6863048
N. Shairi, Badrul Hisham Ahmad, P. Wong
An absorptive Single Pole Double Throw (SPDT) switch using cascaded switchable parallel-coupled stub resonator and switchable radial stub resonator is proposed in this paper. By using mathematical model, theories of the switchable resonators are discussed. The switchable resonators are reconfigured between bandstop and allpass response in the absorptive SPDT switch design. The allpass response is operated in wide bandwidth centered at resonant frequency. Frequency spectrum in 3.5 GHz band has been chosen to demonstrate the design where the targeted application is Time Division Duplex (TDD) switching in wideband wireless data communication systems. The proposed absorptive SPDT switch is simulated in an electronic design automation software for analysis in terms of insertion loss, return loss and isolation. Result in simulation shows less than 2 dB of insertion loss, more than 14 dB of return loss at absorptive ports and more than 39 dB of isolation from 3.4 to 3.6 GHz.
提出了一种利用级联可切换平行耦合短段谐振器和可切换径向短段谐振器的吸收式单极双掷开关。利用数学模型,讨论了可切换谐振器的理论。在吸收式SPDT开关设计中,可切换谐振器在带阻和全通响应之间重新配置。全通响应工作在以谐振频率为中心的宽带内。选择3.5 GHz频段的频谱来演示设计,其中目标应用是宽带无线数据通信系统中的时分双工(TDD)交换。在电子设计自动化软件中对所提出的吸收式SPDT开关进行了仿真,分析了插入损耗、回波损耗和隔离度。仿真结果表明,在3.4 ~ 3.6 GHz范围内,插入损耗小于2 dB,吸收口回波损耗大于14 dB,隔离度大于39 dB。
{"title":"Absorptive SPDT switch design using cascaded switchable parallel-coupled stub resonator and switchable radial stub resonator","authors":"N. Shairi, Badrul Hisham Ahmad, P. Wong","doi":"10.1109/TENCONSPRING.2014.6863048","DOIUrl":"https://doi.org/10.1109/TENCONSPRING.2014.6863048","url":null,"abstract":"An absorptive Single Pole Double Throw (SPDT) switch using cascaded switchable parallel-coupled stub resonator and switchable radial stub resonator is proposed in this paper. By using mathematical model, theories of the switchable resonators are discussed. The switchable resonators are reconfigured between bandstop and allpass response in the absorptive SPDT switch design. The allpass response is operated in wide bandwidth centered at resonant frequency. Frequency spectrum in 3.5 GHz band has been chosen to demonstrate the design where the targeted application is Time Division Duplex (TDD) switching in wideband wireless data communication systems. The proposed absorptive SPDT switch is simulated in an electronic design automation software for analysis in terms of insertion loss, return loss and isolation. Result in simulation shows less than 2 dB of insertion loss, more than 14 dB of return loss at absorptive ports and more than 39 dB of isolation from 3.4 to 3.6 GHz.","PeriodicalId":270495,"journal":{"name":"2014 IEEE REGION 10 SYMPOSIUM","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114664809","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Phosphor thickness effects on the optical performance of high power phosphor converted chip-on-board light-emitting diodes 荧光粉厚度对大功率荧光粉转换片上发光二极管光学性能的影响
Pub Date : 2014-04-14 DOI: 10.1109/TENCONSPRING.2014.6863044
H. Peng, Hsien Shiung Hwang, M. Devarajan
The optical performance of high-power multichip Chip-on-Board (COB) white light-emitting diodes (WLEDs) with different phosphor layer thicknesses ranging from 1.5mm to 3.5mm were investigated in this paper. This investigation reports that the optical performance in terms of phosphor conversion efficiency, Correlated Color Temperature (CCT) and Color Rendering Index (CRI) readings of WLEDs are significantly dependent on the phosphor layer thickness (or phosphor-dispersed epoxy weight). WLED packages with thicker phosphor layer have lesser phosphor conversion efficiency, and functions with an excessive yellow-to-blue ratio that shifts white light output to a yellowish color, lowering both CCT and CRI values.
本文研究了不同荧光粉层厚度(1.5 ~ 3.5mm)的高功率多片片上白光二极管(wled)的光学性能。该研究报告了wled在荧光粉转换效率、相关色温(CCT)和显色指数(CRI)读数方面的光学性能显著依赖于荧光粉层厚度(或磷分散环氧树脂重量)。具有较厚荧光粉层的WLED封装具有较低的荧光粉转换效率,并且具有过高的黄蓝比,使白光输出变为淡黄色,降低CCT和CRI值。
{"title":"Phosphor thickness effects on the optical performance of high power phosphor converted chip-on-board light-emitting diodes","authors":"H. Peng, Hsien Shiung Hwang, M. Devarajan","doi":"10.1109/TENCONSPRING.2014.6863044","DOIUrl":"https://doi.org/10.1109/TENCONSPRING.2014.6863044","url":null,"abstract":"The optical performance of high-power multichip Chip-on-Board (COB) white light-emitting diodes (WLEDs) with different phosphor layer thicknesses ranging from 1.5mm to 3.5mm were investigated in this paper. This investigation reports that the optical performance in terms of phosphor conversion efficiency, Correlated Color Temperature (CCT) and Color Rendering Index (CRI) readings of WLEDs are significantly dependent on the phosphor layer thickness (or phosphor-dispersed epoxy weight). WLED packages with thicker phosphor layer have lesser phosphor conversion efficiency, and functions with an excessive yellow-to-blue ratio that shifts white light output to a yellowish color, lowering both CCT and CRI values.","PeriodicalId":270495,"journal":{"name":"2014 IEEE REGION 10 SYMPOSIUM","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115037206","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
BER analysis of CVSD vocoder for WiMAX using GNU Radio 使用GNU Radio对WiMAX的CVSD声码器进行误码率分析
Pub Date : 2014-04-14 DOI: 10.1109/TENCONSPRING.2014.6863107
B. Siva Kumar Reddy, Lakshmi Boppana, Ashok Agarwal
An OFDM based WiMAX physical layer combining with Continuously Variable Slope Delta (CVSD) speech coding strategy has been implemented utilizing GNU Radio and USRP N210. CVSD vocoder is a non linear sampled data feedback framework which recognizes a band limited analog signal and converts it into binary form for transmission through a digital channel. The binary signal is decoded into a nearby estimate of original analog signal at the receiver. We executed a complete transceiver chain using testbed for WiMAX specifications. Further, we measure the performance of the testbed by evaluating error rate performance. The CVSD coding system is implemented in GNU Radio and the test outcomes demonstrated that coding has better Bit Error Rate (BER) and Symbol Error Rate (SER) values when integrated with FEC (Forward Error Correction). FEC has been carried out by linking convolutional coder (CCSDS coder) and Reed Muller (RM) coders.
利用GNU Radio和USRP N210实现了一种基于OFDM的WiMAX物理层结合连续变斜率增量(CVSD)语音编码策略。CVSD声码器是一种非线性采样数据反馈框架,它识别带限模拟信号并将其转换为二进制形式,通过数字信道传输。二进制信号在接收机上被解码成原始模拟信号的附近估计值。我们使用WiMAX规范的测试平台执行了一个完整的收发器链。进一步,我们通过评估错误率性能来衡量测试平台的性能。在GNU Radio中实现了CVSD编码系统,测试结果表明,与FEC(前向纠错)集成后,编码具有更好的误码率(BER)和符号误码率(SER)值。FEC通过连接卷积编码器(CCSDS编码器)和Reed Muller编码器(RM)来实现。
{"title":"BER analysis of CVSD vocoder for WiMAX using GNU Radio","authors":"B. Siva Kumar Reddy, Lakshmi Boppana, Ashok Agarwal","doi":"10.1109/TENCONSPRING.2014.6863107","DOIUrl":"https://doi.org/10.1109/TENCONSPRING.2014.6863107","url":null,"abstract":"An OFDM based WiMAX physical layer combining with Continuously Variable Slope Delta (CVSD) speech coding strategy has been implemented utilizing GNU Radio and USRP N210. CVSD vocoder is a non linear sampled data feedback framework which recognizes a band limited analog signal and converts it into binary form for transmission through a digital channel. The binary signal is decoded into a nearby estimate of original analog signal at the receiver. We executed a complete transceiver chain using testbed for WiMAX specifications. Further, we measure the performance of the testbed by evaluating error rate performance. The CVSD coding system is implemented in GNU Radio and the test outcomes demonstrated that coding has better Bit Error Rate (BER) and Symbol Error Rate (SER) values when integrated with FEC (Forward Error Correction). FEC has been carried out by linking convolutional coder (CCSDS coder) and Reed Muller (RM) coders.","PeriodicalId":270495,"journal":{"name":"2014 IEEE REGION 10 SYMPOSIUM","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115043677","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Digital speech watermarking for anti-spoofing attack in speaker recognition 数字语音水印在说话人识别中的抗欺骗攻击
Pub Date : 2014-04-14 DOI: 10.1109/TENCONSPRING.2014.6863080
M. Nematollahi, S. Al-Haddad, S. Doraisamy, M. Ranjbari
This paper presents new method for improving the security of speaker recognition in case of spoofing attack. In the proposed technique, digital speech watermarking has been applied on speech signal to increase robustness. To achieve this purpose, watermark is embedded in claimed signal at transmission side and then it is sent through the unsecure channel. In receiver side, watermark is extracted as proof of authentication. The results shows that digital speech watermarking can successfully apply for anti-spoofing attack purposes because the quality of the speech signal is not significantly degraded by watermark.
本文提出了一种针对欺骗攻击提高说话人识别安全性的新方法。在该技术中,对语音信号进行了数字语音水印,提高了语音信号的鲁棒性。为了达到这一目的,在传输端将水印嵌入到被请求的信号中,然后通过不安全信道发送。在接收端,提取水印作为认证证明。结果表明,由于数字语音水印不会显著降低语音信号的质量,因此可以成功地应用于防欺骗攻击。
{"title":"Digital speech watermarking for anti-spoofing attack in speaker recognition","authors":"M. Nematollahi, S. Al-Haddad, S. Doraisamy, M. Ranjbari","doi":"10.1109/TENCONSPRING.2014.6863080","DOIUrl":"https://doi.org/10.1109/TENCONSPRING.2014.6863080","url":null,"abstract":"This paper presents new method for improving the security of speaker recognition in case of spoofing attack. In the proposed technique, digital speech watermarking has been applied on speech signal to increase robustness. To achieve this purpose, watermark is embedded in claimed signal at transmission side and then it is sent through the unsecure channel. In receiver side, watermark is extracted as proof of authentication. The results shows that digital speech watermarking can successfully apply for anti-spoofing attack purposes because the quality of the speech signal is not significantly degraded by watermark.","PeriodicalId":270495,"journal":{"name":"2014 IEEE REGION 10 SYMPOSIUM","volume":"246 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133615022","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Lung segmentation for HRCT thorax images using radon transform and accumulating pixel width 基于氡变换和累积像素宽度的HRCT胸部图像肺分割
Pub Date : 2014-04-14 DOI: 10.1109/TENCONSPRING.2014.6863016
Joel Chia Ming Than, N. Noor, O. M. Rijal, A. Yunus, Rosminah Md Kassim
This study's objective is to execute successful segmentation of the lung anatomy of HRCT of patients who have ILD and evaluate the segmentation performance. Initial segmentation process involved Otsu grey level thresholding and morphological filtering. Some of the problems encountered were the appearance of connected lungs because the left lung and right lung were very close to each other, and heavily diseased lungs with too much damaged tissue. By using Radon transform and accumulating the pixel width, a separation region could be found to split left lung and right lung. The separation process yielded 70.1% improvement for all the samples with connected lungs. This causes the segmentation results for Level 1 to increase to 79.01% for Right Lung and 92.59% for Left Lung, for level 2, successful segmentation increased to 88.89% for both lungs. In Level 3 segmentation results increased to 85.19% for Right Lung and 82.72% for Left Lung. For Level 4 segmentation results increased to 96.30% for Right Lung and 95.06% for Left Lung. For Level 5 segmentation results increased to 92.59% for Right Lung and 86.42% for Left Lung. Samples that could not be separated were due to the size of the splitting region which could be tackled with an adaptive splitting region in future works.
本研究的目的是对ILD患者的HRCT肺解剖结构进行成功分割,并评估分割效果。初始分割过程包括大津灰度阈值和形态滤波。遇到的一些问题是,由于左肺和右肺彼此非常接近,出现连接肺,以及肺部病变严重,组织受损过多。通过Radon变换,对像素宽度进行累加,找到一个分离区域来分割左、右肺。对于所有连接肺的样本,分离过程的效率提高了70.1%。这使得一级右肺的分割结果增加到79.01%,左肺的分割结果增加到92.59%,二级双肺的分割结果增加到88.89%。三级分割结果右肺为85.19%,左肺为82.72%。对于4级分割,右肺的分割率为96.30%,左肺为95.06%。对于5级分割,右肺的分割率为92.59%,左肺的分割率为86.42%。无法分离的样本是由于分裂区域的大小,可以在未来的工作中使用自适应分裂区域来解决。
{"title":"Lung segmentation for HRCT thorax images using radon transform and accumulating pixel width","authors":"Joel Chia Ming Than, N. Noor, O. M. Rijal, A. Yunus, Rosminah Md Kassim","doi":"10.1109/TENCONSPRING.2014.6863016","DOIUrl":"https://doi.org/10.1109/TENCONSPRING.2014.6863016","url":null,"abstract":"This study's objective is to execute successful segmentation of the lung anatomy of HRCT of patients who have ILD and evaluate the segmentation performance. Initial segmentation process involved Otsu grey level thresholding and morphological filtering. Some of the problems encountered were the appearance of connected lungs because the left lung and right lung were very close to each other, and heavily diseased lungs with too much damaged tissue. By using Radon transform and accumulating the pixel width, a separation region could be found to split left lung and right lung. The separation process yielded 70.1% improvement for all the samples with connected lungs. This causes the segmentation results for Level 1 to increase to 79.01% for Right Lung and 92.59% for Left Lung, for level 2, successful segmentation increased to 88.89% for both lungs. In Level 3 segmentation results increased to 85.19% for Right Lung and 82.72% for Left Lung. For Level 4 segmentation results increased to 96.30% for Right Lung and 95.06% for Left Lung. For Level 5 segmentation results increased to 92.59% for Right Lung and 86.42% for Left Lung. Samples that could not be separated were due to the size of the splitting region which could be tackled with an adaptive splitting region in future works.","PeriodicalId":270495,"journal":{"name":"2014 IEEE REGION 10 SYMPOSIUM","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133192668","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
Driver drowsiness detection using EEG power spectrum analysis 基于脑电功率谱分析的驾驶员困倦检测
Pub Date : 2014-04-14 DOI: 10.1109/TENCONSPRING.2014.6863035
M. Awais, N. Badruddin, M. Drieberg
Driver drowsiness is considered to be a very critical issue causing many fatal accidents, injuries and property damages. Therefore, it has been an area of intensive research in recent years. In this paper, a driving simulator based study was conducted to observe the significant changes that occur in the EEG power spectrum during monotonous driving. Nine healthy university students voluntarily participated in the experiment. The absolute band power of the EEG signal was computed by taking the FFT of the time series signal and then the power spectral density was computed using Welch method. Our findings conclude that alpha and theta band powers increase significantly (p<;0.05) when a subject moves from alert state to drowsy state. These changes are more dominant in the occipital and parietal regions when compared to the other regions. The findings of this study provide a promising drowsiness indicator which can be used to prevent road accidents caused by driver drowsiness.
司机困倦被认为是造成许多致命事故、伤害和财产损失的一个非常关键的问题。因此,它是近年来研究的热点。本文通过驾驶模拟器的研究,观察了单调驾驶时脑电功率谱的显著变化。9名健康的大学生自愿参加了实验。先对时间序列信号进行FFT,计算脑电信号的绝对频带功率,再用Welch法计算功率谱密度。我们的研究结果表明,当受试者从清醒状态进入困倦状态时,α和θ波段功率显著增加(p< 0.05)。与其他区域相比,这些变化在枕叶和顶叶区域更为明显。本研究结果提供了一个有希望的嗜睡指标,可用于预防驾驶员嗜睡引起的交通事故。
{"title":"Driver drowsiness detection using EEG power spectrum analysis","authors":"M. Awais, N. Badruddin, M. Drieberg","doi":"10.1109/TENCONSPRING.2014.6863035","DOIUrl":"https://doi.org/10.1109/TENCONSPRING.2014.6863035","url":null,"abstract":"Driver drowsiness is considered to be a very critical issue causing many fatal accidents, injuries and property damages. Therefore, it has been an area of intensive research in recent years. In this paper, a driving simulator based study was conducted to observe the significant changes that occur in the EEG power spectrum during monotonous driving. Nine healthy university students voluntarily participated in the experiment. The absolute band power of the EEG signal was computed by taking the FFT of the time series signal and then the power spectral density was computed using Welch method. Our findings conclude that alpha and theta band powers increase significantly (p<;0.05) when a subject moves from alert state to drowsy state. These changes are more dominant in the occipital and parietal regions when compared to the other regions. The findings of this study provide a promising drowsiness indicator which can be used to prevent road accidents caused by driver drowsiness.","PeriodicalId":270495,"journal":{"name":"2014 IEEE REGION 10 SYMPOSIUM","volume":"90 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133458640","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 30
ECC with hidden generator point in WSNs 无线传感器网络中隐藏产生点的ECC
Pub Date : 2014-04-14 DOI: 10.1109/TENCONSPRING.2014.6863011
R. Kodali
Wireless Sensor Networks (WSNs), comprising of tiny nodes with limited energy, computational and communication resources, are being widely used in various application areas ranging from pollution and weather monitoring to military. Even though every application may not require data to be exchanged in a secure manner, few WSN applications may have certain security requirements. The data is encrypted by a sender and sent over the wireless links and the same is decrypted at the receiver. To meet this purpose, symmetric key cryptographic (SKC) algorithms may be used. Such SKC primitives require keys to be made available before carrying out the data transfer between the nodes. Alternately, Public Key Cryptographic techniques, such as RSA algorithm can be considered. Even though, RSA is a popular algorithm providing good security level, it is computationally intensive involving large key sizes. The RSA can not be used in WSNs, as the nodes have limited resources. Presently, it is infeasible to implement the RSA algorithm using any of the WSN nodes commercially available. Elliptic curve cryptography (ECC), another public key cryptographic (PKC) algorithm providing same level of security with smaller key size requirements, can be used as an alternative in order to provide security in WSN applications. ECC encryption and decryption use domain parameters, which includes the Generator point to be published. In most of the outdoor WSN applications, the deployment of the nodes is random and the nodes could be captured and an attacker could launch man-in-middle (MIM) attack, and break the public key thereby leading to security breach in the network. A technique to overcome such an attack is proposed in this work and the same is compared with two other similar approaches.
无线传感器网络(WSNs)由能量、计算和通信资源有限的微小节点组成,正广泛应用于从污染、天气监测到军事等各个应用领域。尽管并非每个应用程序都要求以安全的方式交换数据,但很少有WSN应用程序具有某些安全需求。数据由发送方加密并通过无线链路发送,同样的数据在接收方解密。为了达到这个目的,可以使用对称密钥加密(SKC)算法。此类SKC原语要求在节点之间执行数据传输之前提供可用的密钥。另外,还可以考虑使用公钥加密技术,例如RSA算法。尽管RSA是一种提供良好安全级别的流行算法,但它涉及大密钥大小的计算密集型算法。由于节点资源有限,不能在wsn中使用RSA。目前,使用任何可用的WSN节点来实现RSA算法都是不可行的。椭圆曲线加密(ECC)是另一种公钥加密(PKC)算法,具有相同的安全级别,但密钥大小要求更小,可以作为WSN应用中提供安全性的替代方案。ECC加密和解密使用域参数,其中包括要发布的Generator点。在大多数户外WSN应用中,节点的部署是随机的,并且节点可能被捕获,攻击者可能发动中间人攻击(man-in-middle attack, MIM),破解公钥,从而导致网络安全漏洞。在这项工作中提出了一种克服这种攻击的技术,并与其他两种类似的方法进行了比较。
{"title":"ECC with hidden generator point in WSNs","authors":"R. Kodali","doi":"10.1109/TENCONSPRING.2014.6863011","DOIUrl":"https://doi.org/10.1109/TENCONSPRING.2014.6863011","url":null,"abstract":"Wireless Sensor Networks (WSNs), comprising of tiny nodes with limited energy, computational and communication resources, are being widely used in various application areas ranging from pollution and weather monitoring to military. Even though every application may not require data to be exchanged in a secure manner, few WSN applications may have certain security requirements. The data is encrypted by a sender and sent over the wireless links and the same is decrypted at the receiver. To meet this purpose, symmetric key cryptographic (SKC) algorithms may be used. Such SKC primitives require keys to be made available before carrying out the data transfer between the nodes. Alternately, Public Key Cryptographic techniques, such as RSA algorithm can be considered. Even though, RSA is a popular algorithm providing good security level, it is computationally intensive involving large key sizes. The RSA can not be used in WSNs, as the nodes have limited resources. Presently, it is infeasible to implement the RSA algorithm using any of the WSN nodes commercially available. Elliptic curve cryptography (ECC), another public key cryptographic (PKC) algorithm providing same level of security with smaller key size requirements, can be used as an alternative in order to provide security in WSN applications. ECC encryption and decryption use domain parameters, which includes the Generator point to be published. In most of the outdoor WSN applications, the deployment of the nodes is random and the nodes could be captured and an attacker could launch man-in-middle (MIM) attack, and break the public key thereby leading to security breach in the network. A technique to overcome such an attack is proposed in this work and the same is compared with two other similar approaches.","PeriodicalId":270495,"journal":{"name":"2014 IEEE REGION 10 SYMPOSIUM","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116581202","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Information fusion of face and palmprint multimodal biometrics 人脸与掌纹多模态生物识别的信息融合
Pub Date : 2014-04-14 DOI: 10.1109/TENCONSPRING.2014.6863111
Muhammad Imran Ahmad, M. Z. Ilyas, Mohd Nazrin Md Isa, R. Ngadiran, A. M. Darsono
The information fusion of face and palmprint biometrics using local features is investigated at feature level. The proposed method uses local information extracted from local region of biometric image which has rich statistical information. The texture of each region is processed using multiresolution analysis with different orientations and scales. The feature dimensionality of each region is reduced to produce a compact and high discriminative feature vector used for concatenation process. Feature fusion of the extracted features is able to increase the discrimination power in the feature space. The use of principle component analysis (PCA) and linear discriminant analysis (LDA) methods significantly reduce dimension of the feature vector by removing redundant and noise data while increasing the discriminant power in the fused feature space. Results of both identification and verification rates show significant improvement compared to that achieved by single modal biometrics and several existing multimodal methods.
从特征层面研究了基于局部特征的人脸与掌纹生物特征信息融合。该方法从统计信息丰富的生物特征图像局部区域提取局部信息。利用不同方向和尺度的多分辨率分析对每个区域的纹理进行处理。对每个区域的特征维数进行降维,得到一个紧凑的、高判别性的特征向量,用于拼接处理。对提取的特征进行特征融合,可以提高特征空间的识别能力。利用主成分分析(PCA)和线性判别分析(LDA)方法,通过去除冗余和噪声数据,显著降低特征向量的维数,同时提高融合特征空间的判别能力。与单模态生物识别和几种现有的多模态方法相比,识别和验证率的结果都有显着提高。
{"title":"Information fusion of face and palmprint multimodal biometrics","authors":"Muhammad Imran Ahmad, M. Z. Ilyas, Mohd Nazrin Md Isa, R. Ngadiran, A. M. Darsono","doi":"10.1109/TENCONSPRING.2014.6863111","DOIUrl":"https://doi.org/10.1109/TENCONSPRING.2014.6863111","url":null,"abstract":"The information fusion of face and palmprint biometrics using local features is investigated at feature level. The proposed method uses local information extracted from local region of biometric image which has rich statistical information. The texture of each region is processed using multiresolution analysis with different orientations and scales. The feature dimensionality of each region is reduced to produce a compact and high discriminative feature vector used for concatenation process. Feature fusion of the extracted features is able to increase the discrimination power in the feature space. The use of principle component analysis (PCA) and linear discriminant analysis (LDA) methods significantly reduce dimension of the feature vector by removing redundant and noise data while increasing the discriminant power in the fused feature space. Results of both identification and verification rates show significant improvement compared to that achieved by single modal biometrics and several existing multimodal methods.","PeriodicalId":270495,"journal":{"name":"2014 IEEE REGION 10 SYMPOSIUM","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122325598","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
The delay and fairness study of a centralised EPON DBA algorithm 集中式EPON DBA算法的延迟与公平性研究
Pub Date : 2014-04-14 DOI: 10.1109/TENCONSPRING.2014.6863046
N. Radzi, N. M. Din, S. Sadon, M. Al-Mansoori
Ethernet Passive Optical Network (EPON) is one of the most promising technologies for FTTX deployed by service providers at the access network. Dynamic Bandwidth Allocation (DBA) for the upstream traffic can help optimize the network bandwidth utilization. This paper discusses a centralized DBA called as Universal DBA (UDBA) algorithm that supports quality of service (QoS) of the upstream traffic. UDBA algorithm is compared with other DBA algorithm to prove its advantages. It shows that UDBA algorithm improves upon expedited forwarding, assured forwarding and best effort delay on average 62.2%, 36.3%, and 23.1% respectively. The fairness index of UDBA algorithm is improved as high as 5.4%.
以太网无源光网络(EPON)是运营商在接入网中部署的FTTX最有前途的技术之一。对上行流量进行动态带宽分配(Dynamic Bandwidth Allocation, DBA),可以优化网络带宽利用率。本文讨论了一种支持上游业务服务质量(QoS)的集中式DBA,称为通用DBA (UDBA)算法。通过与其他DBA算法的比较,证明了UDBA算法的优越性。结果表明,UDBA算法在加速转发、保证转发和最佳努力延迟方面的平均改进率分别为62.2%、36.3%和23.1%。UDBA算法的公平性指数提高了5.4%。
{"title":"The delay and fairness study of a centralised EPON DBA algorithm","authors":"N. Radzi, N. M. Din, S. Sadon, M. Al-Mansoori","doi":"10.1109/TENCONSPRING.2014.6863046","DOIUrl":"https://doi.org/10.1109/TENCONSPRING.2014.6863046","url":null,"abstract":"Ethernet Passive Optical Network (EPON) is one of the most promising technologies for FTTX deployed by service providers at the access network. Dynamic Bandwidth Allocation (DBA) for the upstream traffic can help optimize the network bandwidth utilization. This paper discusses a centralized DBA called as Universal DBA (UDBA) algorithm that supports quality of service (QoS) of the upstream traffic. UDBA algorithm is compared with other DBA algorithm to prove its advantages. It shows that UDBA algorithm improves upon expedited forwarding, assured forwarding and best effort delay on average 62.2%, 36.3%, and 23.1% respectively. The fairness index of UDBA algorithm is improved as high as 5.4%.","PeriodicalId":270495,"journal":{"name":"2014 IEEE REGION 10 SYMPOSIUM","volume":"109 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124981855","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Optical Code Division Multiple Access Codes comparison in free space optics and optical fiber transmission medium 光码分多址码在自由空间光学和光纤传输介质中的比较
Pub Date : 2014-04-14 DOI: 10.1109/TENCONSPRING.2014.6863021
Majid Moghaddasi, S. Seyedzadeh, Siti Barirah Ahmad Anas
Performance of three different Optical Code Division Multiple Access codes namely Prime Code (PC), Quadratic Congruence (QC), and Khazani-Syed (KS) code are compared in Free Space Optic (FSO) and optical fiber transmission. The simulation results show that efficiency of a code family is medium-dependent. While one code family performs the best in fiber medium, it is not necessary that it acts the same in FSO. For instance, KS with code weight of 6 provides BER 10-12 at 600 m distance, while other codes cannot even reach to the threshold 10-9 at this point. However this code shows vulnerability against fiber dispersion. At 5 km fiber, it provides BER of 10-7, even less then PC with 10-8. In that point KS code with weight 6 attains the best performance with BER of 10-11.
比较了三种不同的光码分多址码即质数码(PC)、二次同余码(QC)和Khazani-Syed码(KS)在自由空间光(FSO)和光纤传输中的性能。仿真结果表明,编码族的效率是中等依赖的。虽然一个代码族在光纤介质中表现最好,但它不一定在FSO中表现相同。例如码权为6的KS在600 m距离上提供了10-12的误码率,而其他码在此时甚至无法达到阈值10-9。然而,这个代码显示了对光纤分散的脆弱性。在5公里光纤下,它提供10-7的误码率,甚至低于PC的10-8。此时权值为6的KS码性能最佳,误码率为10-11。
{"title":"Optical Code Division Multiple Access Codes comparison in free space optics and optical fiber transmission medium","authors":"Majid Moghaddasi, S. Seyedzadeh, Siti Barirah Ahmad Anas","doi":"10.1109/TENCONSPRING.2014.6863021","DOIUrl":"https://doi.org/10.1109/TENCONSPRING.2014.6863021","url":null,"abstract":"Performance of three different Optical Code Division Multiple Access codes namely Prime Code (PC), Quadratic Congruence (QC), and Khazani-Syed (KS) code are compared in Free Space Optic (FSO) and optical fiber transmission. The simulation results show that efficiency of a code family is medium-dependent. While one code family performs the best in fiber medium, it is not necessary that it acts the same in FSO. For instance, KS with code weight of 6 provides BER 10-12 at 600 m distance, while other codes cannot even reach to the threshold 10-9 at this point. However this code shows vulnerability against fiber dispersion. At 5 km fiber, it provides BER of 10-7, even less then PC with 10-8. In that point KS code with weight 6 attains the best performance with BER of 10-11.","PeriodicalId":270495,"journal":{"name":"2014 IEEE REGION 10 SYMPOSIUM","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129246772","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
期刊
2014 IEEE REGION 10 SYMPOSIUM
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1