首页 > 最新文献

2016 Third International Conference on Digital Information Processing, Data Mining, and Wireless Communications (DIPDMWC)最新文献

英文 中文
Monitoring of urban subsidence in coastal cities: Case studies Vancouver and Seattle 沿海城市下沉监测:以温哥华和西雅图为例
S. Samsonov, K. Tiampo
The advanced processing methodology is presented for extracting information from earth observation data. Using imagery from various Synthetic Aperture Radar (SAR) satellites and Multidimensional Small Baseline Subset Differential Interferometric SAR (MSBAS-DInSAR) processing methodology we observed ground subsidence in Vancouver (British Columbia, Canada) and Seattle (Washington, USA). In Vancouver, subsidence with rate of up to 2 cm/year was detected during 1995-2012 over a broad area, including the Vancouver International Airport. In Seattle, subsidence with rate of up to 3 cm/ year was detected during 2012-2015. Between August 2014 and August 2015, unusually fast subsidence occurred beneath the city center. This subsidence is caused mainly by human activities, such as construction, urban infrastructure development and groundwater extraction, but also by natural processes, such as consolidation of sediments. Located in coastal areas, these cities may become affected by flooding if ground level subsides below the sea level or due to storm surge. The risk of flooding increases as the sea level continues to rise due to the climate change. The advanced image processing methodology of earth observation data described here allows near real-time monitoring of ground subsidence with high spatial resolution and high precision, therefore increasing level of preparedness and mitigating risk.
提出了从对地观测数据中提取信息的先进处理方法。利用各种合成孔径雷达(SAR)卫星和多维小基线子集差分干涉SAR (MSBAS-DInSAR)处理方法的图像,我们观察了加拿大温哥华(不列颠哥伦比亚省)和美国西雅图(华盛顿州)的地面沉降情况。在温哥华,1995年至2012年期间,包括温哥华国际机场在内的广大地区的下沉速度高达2厘米/年。在西雅图,在2012-2015年期间,沉降速度高达3厘米/年。2014年8月至2015年8月期间,市中心地下发生了异常快速的下沉。这种下沉主要是由人类活动造成的,如建筑、城市基础设施发展和地下水开采,但也有自然过程造成的,如沉积物的固结。这些城市位于沿海地区,如果地面下降到海平面以下或由于风暴潮,这些城市可能会受到洪水的影响。由于气候变化,海平面持续上升,洪水的风险也随之增加。本文所描述的地球观测数据的先进图像处理方法允许以高空间分辨率和高精度近实时监测地面沉降,从而提高准备水平并降低风险。
{"title":"Monitoring of urban subsidence in coastal cities: Case studies Vancouver and Seattle","authors":"S. Samsonov, K. Tiampo","doi":"10.1109/DIPDMWC.2016.7529360","DOIUrl":"https://doi.org/10.1109/DIPDMWC.2016.7529360","url":null,"abstract":"The advanced processing methodology is presented for extracting information from earth observation data. Using imagery from various Synthetic Aperture Radar (SAR) satellites and Multidimensional Small Baseline Subset Differential Interferometric SAR (MSBAS-DInSAR) processing methodology we observed ground subsidence in Vancouver (British Columbia, Canada) and Seattle (Washington, USA). In Vancouver, subsidence with rate of up to 2 cm/year was detected during 1995-2012 over a broad area, including the Vancouver International Airport. In Seattle, subsidence with rate of up to 3 cm/ year was detected during 2012-2015. Between August 2014 and August 2015, unusually fast subsidence occurred beneath the city center. This subsidence is caused mainly by human activities, such as construction, urban infrastructure development and groundwater extraction, but also by natural processes, such as consolidation of sediments. Located in coastal areas, these cities may become affected by flooding if ground level subsides below the sea level or due to storm surge. The risk of flooding increases as the sea level continues to rise due to the climate change. The advanced image processing methodology of earth observation data described here allows near real-time monitoring of ground subsidence with high spatial resolution and high precision, therefore increasing level of preparedness and mitigating risk.","PeriodicalId":298218,"journal":{"name":"2016 Third International Conference on Digital Information Processing, Data Mining, and Wireless Communications (DIPDMWC)","volume":"172 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131819923","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Scalable processor core for high-speed pattern matching architecture on FPGA 基于FPGA的高速模式匹配架构的可扩展处理器核心
A. Alyushin, S. Alyushin, V. Arkhangelsky
In recent pattern matching architecture researches, there has been much attention to high-throughput implementations with reconfiguration on the fly on FPGAs as well as ASICs. In this paper, we propose to use self-organizing approach to synthesize two-dimensional map (cluster) of a simple processing units with lateral links for fast pattern matching of one-dimensional input event. We suggest scalable processor core with heterogeneous cluster architecture. Experimental results show that the proposed architecture has advantages over the previously developed architectures in the terms of operating frequency, time delay and data bandwidth. For state-of-the-art FPGA we achieve operating frequency 600-500 MHz for the processor core with single cluster (input pattern of 8-512 bits, rule set of 64 bits), 490-440 MHz for the processor core with multiple clusters (rule set of 128 - 4096 bits, input pattern of 512 bits). Each cluster is characterized by low pipeline time delay of 3 ~ 5 clock cycles.
在最近的模式匹配体系结构研究中,fpga和asic上基于动态重构的高吞吐量实现备受关注。本文提出利用自组织方法合成具有横向链接的简单处理单元的二维映射(聚类),实现一维输入事件的快速模式匹配。我们建议采用异构集群架构的可扩展处理器核心。实验结果表明,该架构在工作频率、时延和数据带宽等方面均优于现有架构。对于最先进的FPGA,我们实现了单个集群处理器核心的600-500 MHz(输入模式为8-512位,规则集为64位),多集群处理器核心的490-440 MHz(规则集为128 - 4096位,输入模式为512位)的工作频率。每个集群的特点是管道时间延迟低3 ~ 5个时钟周期。
{"title":"Scalable processor core for high-speed pattern matching architecture on FPGA","authors":"A. Alyushin, S. Alyushin, V. Arkhangelsky","doi":"10.1109/DIPDMWC.2016.7529380","DOIUrl":"https://doi.org/10.1109/DIPDMWC.2016.7529380","url":null,"abstract":"In recent pattern matching architecture researches, there has been much attention to high-throughput implementations with reconfiguration on the fly on FPGAs as well as ASICs. In this paper, we propose to use self-organizing approach to synthesize two-dimensional map (cluster) of a simple processing units with lateral links for fast pattern matching of one-dimensional input event. We suggest scalable processor core with heterogeneous cluster architecture. Experimental results show that the proposed architecture has advantages over the previously developed architectures in the terms of operating frequency, time delay and data bandwidth. For state-of-the-art FPGA we achieve operating frequency 600-500 MHz for the processor core with single cluster (input pattern of 8-512 bits, rule set of 64 bits), 490-440 MHz for the processor core with multiple clusters (rule set of 128 - 4096 bits, input pattern of 512 bits). Each cluster is characterized by low pipeline time delay of 3 ~ 5 clock cycles.","PeriodicalId":298218,"journal":{"name":"2016 Third International Conference on Digital Information Processing, Data Mining, and Wireless Communications (DIPDMWC)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124970642","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Development approach to the attack modeling for the needs of cyber security education 针对网络安全教育需求的攻击建模开发方法
B. Ivanc, B. Blažič
Critical infrastructure faces changed landscape of threats which requires progress in the understanding of highly sophisticated attacks. A reflection of this awareness is the upcoming technical documentation of umbrella organizations in critical infrastructure. The attack modeling is an important approach in the design stage of the system. The attack tree is a structural technique for attack modeling. In terms of graphic presentation, attack trees are not complex and can be designed manually, also, they are an important tool in recognizing threats and evaluating risks. The absence of the presentation of comprehensive and systematic approaches to the attack modeling is often reflected in rather generalized and inconsistent presentations of the attack modeling as well as in difficult transfer of attack modeling techniques into practice. The current absence of the agreement and lack of consistency in the development approach of structural attack models limits the transfer of concepts in the field of cyber-attacks to educational environments. The purpose of the paper is to present, in clear practical example, a proposal for the development approach to the attack modeling. Thus, we want to contribute to the implementation of attack modeling into practice, especially in the field of cyber security education.
关键基础设施面临着不断变化的威胁,这需要在对高度复杂攻击的理解方面取得进展。这种意识的反映是关键基础设施中伞形组织即将发布的技术文档。攻击建模是系统设计阶段的一个重要方法。攻击树是一种用于攻击建模的结构化技术。从图形表示的角度来看,攻击树并不复杂,可以手工设计,是识别威胁和评估风险的重要工具。缺乏全面和系统的攻击建模方法,往往反映在攻击建模的描述过于一般化和不一致,以及攻击建模技术难以转化为实践。目前,结构攻击模型的发展方法缺乏一致性和一致性,限制了网络攻击领域概念向教育环境的转移。本文的目的是通过清晰的实际示例,为攻击建模的开发方法提出建议。因此,我们希望为攻击建模的实施做出贡献,特别是在网络安全教育领域。
{"title":"Development approach to the attack modeling for the needs of cyber security education","authors":"B. Ivanc, B. Blažič","doi":"10.1109/DIPDMWC.2016.7529392","DOIUrl":"https://doi.org/10.1109/DIPDMWC.2016.7529392","url":null,"abstract":"Critical infrastructure faces changed landscape of threats which requires progress in the understanding of highly sophisticated attacks. A reflection of this awareness is the upcoming technical documentation of umbrella organizations in critical infrastructure. The attack modeling is an important approach in the design stage of the system. The attack tree is a structural technique for attack modeling. In terms of graphic presentation, attack trees are not complex and can be designed manually, also, they are an important tool in recognizing threats and evaluating risks. The absence of the presentation of comprehensive and systematic approaches to the attack modeling is often reflected in rather generalized and inconsistent presentations of the attack modeling as well as in difficult transfer of attack modeling techniques into practice. The current absence of the agreement and lack of consistency in the development approach of structural attack models limits the transfer of concepts in the field of cyber-attacks to educational environments. The purpose of the paper is to present, in clear practical example, a proposal for the development approach to the attack modeling. Thus, we want to contribute to the implementation of attack modeling into practice, especially in the field of cyber security education.","PeriodicalId":298218,"journal":{"name":"2016 Third International Conference on Digital Information Processing, Data Mining, and Wireless Communications (DIPDMWC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126040592","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Origin (dynamic blacklisting) based spammer detection and spam mail filtering approach 基于起源(动态黑名单)的垃圾邮件发送者检测和垃圾邮件过滤方法
N. Agrawal, Shailendra Singh
Emails are the basic unit of internet applications. Many emails are sent & received everyday with an exponential growth day by day but spam mail has become a very serious problem in email communication environment. There are number of content-based filter techniques available namely text based, image based filtering and many more others to filter spam mails. These techniques are costlier in respect of computation and network resources as they require the examination of whole message and computation on whole content at the server. These filters are also not in dynamic nature because the nature of spam mail and spammer changes frequently. We proposed origin based spam-filtering approach, which works with respect to header information of the mail regardless of the body content of the mail. It optimizes the network and server performance.
电子邮件是互联网应用程序的基本单元。每天都有大量的电子邮件发送和接收,每天都呈指数级增长,但垃圾邮件已经成为电子邮件通信环境中一个非常严重的问题。有许多基于内容的过滤技术可用,即基于文本的过滤,基于图像的过滤以及更多其他过滤垃圾邮件的技术。这些技术在计算和网络资源方面的成本更高,因为它们需要检查整个消息并在服务器上对整个内容进行计算。这些过滤器也不是动态的,因为垃圾邮件和垃圾邮件发送者的性质经常变化。我们提出了基于来源的垃圾邮件过滤方法,该方法适用于邮件的标题信息,而不考虑邮件的正文内容。它优化了网络和服务器性能。
{"title":"Origin (dynamic blacklisting) based spammer detection and spam mail filtering approach","authors":"N. Agrawal, Shailendra Singh","doi":"10.1109/DIPDMWC.2016.7529371","DOIUrl":"https://doi.org/10.1109/DIPDMWC.2016.7529371","url":null,"abstract":"Emails are the basic unit of internet applications. Many emails are sent & received everyday with an exponential growth day by day but spam mail has become a very serious problem in email communication environment. There are number of content-based filter techniques available namely text based, image based filtering and many more others to filter spam mails. These techniques are costlier in respect of computation and network resources as they require the examination of whole message and computation on whole content at the server. These filters are also not in dynamic nature because the nature of spam mail and spammer changes frequently. We proposed origin based spam-filtering approach, which works with respect to header information of the mail regardless of the body content of the mail. It optimizes the network and server performance.","PeriodicalId":298218,"journal":{"name":"2016 Third International Conference on Digital Information Processing, Data Mining, and Wireless Communications (DIPDMWC)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134213444","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Variable decomposition in total variant regularizer for denoising/deblurring image 基于全变量正则化器的图像去噪去模糊变量分解
E. Sahragard, H. Farsi
The aim of image restoration is to obtain a higher quality desired image from a degraded image. In this strategy, an image inpainting methods fill the degraded or lost area of the image by appropriate information. This is performed in such a way so that the resulted image is not distinguishable for a casual person who is not familiar with the original image. In this paper, the various images are degraded with different ways: 1) the blurring and adding noise in the original image, and 2) losing a percentage of the pixels of the original image. Then, the proposed method and other methods are performed to restore the desired image. It is required that the image restoration method use optimization methods. In this paper, a linear restoration method is used based on the total variation regularizer. The variable of optimization problem is decomposed, and the new optimization problem is solved by using Lagrangian augmented method. The experimental results show that the proposed method is faster, and the restored images have higher quality than other methods.
图像恢复的目的是从退化的图像中获得更高质量的期望图像。在该策略中,一种图像补绘方法通过适当的信息填充图像的退化或丢失区域。这是以这样一种方式执行的,使得结果图像对于不熟悉原始图像的普通人来说是无法区分的。本文采用不同的方法对各种图像进行退化:1)对原始图像进行模糊处理和添加噪声;2)对原始图像进行一定比例的像素损失。然后,将所提出的方法与其他方法一起进行图像恢复。要求图像恢复方法采用优化方法。本文采用了一种基于总变分正则器的线性恢复方法。对优化问题的变量进行分解,利用拉格朗日增广法求解新的优化问题。实验结果表明,该方法具有较快的恢复速度和较高的图像质量。
{"title":"Variable decomposition in total variant regularizer for denoising/deblurring image","authors":"E. Sahragard, H. Farsi","doi":"10.1109/DIPDMWC.2016.7529373","DOIUrl":"https://doi.org/10.1109/DIPDMWC.2016.7529373","url":null,"abstract":"The aim of image restoration is to obtain a higher quality desired image from a degraded image. In this strategy, an image inpainting methods fill the degraded or lost area of the image by appropriate information. This is performed in such a way so that the resulted image is not distinguishable for a casual person who is not familiar with the original image. In this paper, the various images are degraded with different ways: 1) the blurring and adding noise in the original image, and 2) losing a percentage of the pixels of the original image. Then, the proposed method and other methods are performed to restore the desired image. It is required that the image restoration method use optimization methods. In this paper, a linear restoration method is used based on the total variation regularizer. The variable of optimization problem is decomposed, and the new optimization problem is solved by using Lagrangian augmented method. The experimental results show that the proposed method is faster, and the restored images have higher quality than other methods.","PeriodicalId":298218,"journal":{"name":"2016 Third International Conference on Digital Information Processing, Data Mining, and Wireless Communications (DIPDMWC)","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116101590","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A generalized probabilistic approach for managing inconsistency to improve classifier accuracy 一种用于管理不一致性以提高分类器准确性的广义概率方法
J. Sil, Jaydeep Sen
Removal of inconsistency from a data set contributes significantly in improving classification accuracy. Inconsistency occurs when attributes of objects have same value but they belong to different classes. Inconsistency is either inherent in the data set or appear during different data preprocessing steps, like discretization, dimensionality reduction and missing value prediction. The aim of the paper is to develop a generalized inconsistency handling scheme based on probability distribution unlike the previous methods which are context dependent. We propose two algorithms to remove inconsistency by assigning class labels to the objects afresh based on the statistical properties of the training data set. The ultimate goal of this research work is to generate consistent data which provide superior classification accuracy compare to the original data set. The proposed methods are verified with real life intrusion domain NSL-KDD data set for establishing our claim.
从数据集中去除不一致性有助于显著提高分类精度。当对象的属性具有相同的值但它们属于不同的类时,就会发生不一致。不一致性要么是数据集固有的,要么是在不同的数据预处理步骤中出现的,比如离散化、降维和缺失值预测。本文的目的是开发一种基于概率分布的通用不一致处理方案,而不是像以前的方法那样依赖于上下文。我们提出了两种算法,通过根据训练数据集的统计属性为对象重新分配类标签来消除不一致性。本研究工作的最终目标是生成一致的数据,提供优于原始数据集的分类精度。用实际入侵域NSL-KDD数据集验证了所提方法的正确性。
{"title":"A generalized probabilistic approach for managing inconsistency to improve classifier accuracy","authors":"J. Sil, Jaydeep Sen","doi":"10.1109/DIPDMWC.2016.7529366","DOIUrl":"https://doi.org/10.1109/DIPDMWC.2016.7529366","url":null,"abstract":"Removal of inconsistency from a data set contributes significantly in improving classification accuracy. Inconsistency occurs when attributes of objects have same value but they belong to different classes. Inconsistency is either inherent in the data set or appear during different data preprocessing steps, like discretization, dimensionality reduction and missing value prediction. The aim of the paper is to develop a generalized inconsistency handling scheme based on probability distribution unlike the previous methods which are context dependent. We propose two algorithms to remove inconsistency by assigning class labels to the objects afresh based on the statistical properties of the training data set. The ultimate goal of this research work is to generate consistent data which provide superior classification accuracy compare to the original data set. The proposed methods are verified with real life intrusion domain NSL-KDD data set for establishing our claim.","PeriodicalId":298218,"journal":{"name":"2016 Third International Conference on Digital Information Processing, Data Mining, and Wireless Communications (DIPDMWC)","volume":"122 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127978128","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Feature extraction and recognition methods based on phonocardiogram 基于心音图的特征提取与识别方法
Xiefeng Cheng, Kexue Sun, Xuejun Zhang, Chenjun She
One-dimensional heart sounds signal is converted into two-dimensional phonocardiogram (2D-PCG), then extracts image feature of heart sounds based on image processing technology in a 2D-PCG. Firstly we realize the wavelet noise reduction and amplitude normalization of one-dimensional heart sounds by one-dimensional signal processing method, and then convert Heart sounds into 2D-PCG with uniformity and comparability, and pretreatment. And analyze the image features of 2D-PCG which is characterization of Heart sounds' physiological information combining with heart sounds' physiological significance and 2D-PCG's image features, focus on vertical and horizontal ratio of coordinate and sequence code of inflection point. In order to quickly classify the heart sound signal, the paper introduces the new concept: degree of heart sound signal certainty (HSSCD). Finally, efficiency and feasibility are verified through the heart sound acquisition, classification and identification experiments. At last, explore the feasibility of classification and identification of 2D-PCG using Euclidean distance and degree of heart sound signal certainty based on vertical and horizontal ratio of coordinate and sequence code of inflection point and wavelet coefficients. Experimental results show that the three features can achieve the classification and recognition of the 2D-PCG, and inflection point sequence code gets the highest recognition rate. The method of 2D-PCG classification and identification based on a two-image processing has the feasibility and practical applicability, and has broad application prospects.
将一维心音信号转换成二维心音图(2D-PCG),然后利用二维心音图中的图像处理技术提取心音的图像特征。首先通过一维信号处理方法实现一维心音的小波降噪和幅度归一化,然后将心音转换成具有均匀性和可比性的二维pcg,并进行预处理。结合心音的生理意义和2D-PCG的图像特征,分析2D-PCG的图像特征,即心音生理信息的表征,重点研究坐标的纵横比和拐点的序列编码。为了对心音信号进行快速分类,本文引入了心音信号确定性度(HSSCD)这一新的概念。最后通过心音采集、分类和识别实验验证了该方法的有效性和可行性。最后,探讨了基于坐标纵横比、拐点序列码和小波系数的欧氏距离和心音信号确定度对2D-PCG进行分类识别的可行性。实验结果表明,这三个特征都能实现二维pcg的分类识别,拐点序列码的识别率最高。基于双图像处理的二维pcg分类识别方法具有可行性和实用性,具有广阔的应用前景。
{"title":"Feature extraction and recognition methods based on phonocardiogram","authors":"Xiefeng Cheng, Kexue Sun, Xuejun Zhang, Chenjun She","doi":"10.1109/DIPDMWC.2016.7529369","DOIUrl":"https://doi.org/10.1109/DIPDMWC.2016.7529369","url":null,"abstract":"One-dimensional heart sounds signal is converted into two-dimensional phonocardiogram (2D-PCG), then extracts image feature of heart sounds based on image processing technology in a 2D-PCG. Firstly we realize the wavelet noise reduction and amplitude normalization of one-dimensional heart sounds by one-dimensional signal processing method, and then convert Heart sounds into 2D-PCG with uniformity and comparability, and pretreatment. And analyze the image features of 2D-PCG which is characterization of Heart sounds' physiological information combining with heart sounds' physiological significance and 2D-PCG's image features, focus on vertical and horizontal ratio of coordinate and sequence code of inflection point. In order to quickly classify the heart sound signal, the paper introduces the new concept: degree of heart sound signal certainty (HSSCD). Finally, efficiency and feasibility are verified through the heart sound acquisition, classification and identification experiments. At last, explore the feasibility of classification and identification of 2D-PCG using Euclidean distance and degree of heart sound signal certainty based on vertical and horizontal ratio of coordinate and sequence code of inflection point and wavelet coefficients. Experimental results show that the three features can achieve the classification and recognition of the 2D-PCG, and inflection point sequence code gets the highest recognition rate. The method of 2D-PCG classification and identification based on a two-image processing has the feasibility and practical applicability, and has broad application prospects.","PeriodicalId":298218,"journal":{"name":"2016 Third International Conference on Digital Information Processing, Data Mining, and Wireless Communications (DIPDMWC)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125928982","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Practical studying of Wi-Fi network vulnerabilities Wi-Fi网络漏洞的实践研究
Aigerim Ismukhamedova, Yelena Satimova, A. Nikiforov, N. Miloslavskaya
Currently great attention is paid to the operating system (OS) protection against malicious malware, viruses, etc. Wi-Fi is the most popular and demanded way of connection to the Internet, which is used in many companies and by the individuals. Wi-Fi is a widespread technology and in different situations it requires additional software for a protected installation. Wi-Fi networks can be cracked, and personal data can be stolen or compromised. A process of Wi-Fi network's hacking for educational purposes is considered in the paper. Some hacking techniques are shown as implemented in the laboratory works.
目前,对操作系统(OS)的恶意软件、病毒等的保护受到了极大的关注。Wi-Fi是最受欢迎和最需要的连接互联网的方式,许多公司和个人都在使用它。Wi-Fi是一种广泛使用的技术,在不同的情况下,它需要额外的软件来保护安装。Wi-Fi网络可能被破解,个人数据可能被盗或泄露。本文研究了一个以教育为目的的Wi-Fi网络的黑客攻击过程。一些黑客技术显示在实验室工程中实现。
{"title":"Practical studying of Wi-Fi network vulnerabilities","authors":"Aigerim Ismukhamedova, Yelena Satimova, A. Nikiforov, N. Miloslavskaya","doi":"10.1109/DIPDMWC.2016.7529394","DOIUrl":"https://doi.org/10.1109/DIPDMWC.2016.7529394","url":null,"abstract":"Currently great attention is paid to the operating system (OS) protection against malicious malware, viruses, etc. Wi-Fi is the most popular and demanded way of connection to the Internet, which is used in many companies and by the individuals. Wi-Fi is a widespread technology and in different situations it requires additional software for a protected installation. Wi-Fi networks can be cracked, and personal data can be stolen or compromised. A process of Wi-Fi network's hacking for educational purposes is considered in the paper. Some hacking techniques are shown as implemented in the laboratory works.","PeriodicalId":298218,"journal":{"name":"2016 Third International Conference on Digital Information Processing, Data Mining, and Wireless Communications (DIPDMWC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129923137","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A tool for morphologically ambiguous text processing 一个用于形态学歧义文本处理的工具
E. Klyshinsky, N. Kochetkova
The main course of preliminary natural texts processing is tagging and disambiguating texts. Hence, most of modern language tools are specified for such purposes. In our projects, we carry out a shallow syntax of untagged texts. For this purpose we developed a new query language based on regular expressions. This language allows write queries according to words' ambiguity.
初步自然文本处理的主要过程是文本的标注和消歧。因此,大多数现代语言工具都是为此目的而指定的。在我们的项目中,我们对未标记文本执行浅层语法。为此,我们开发了一种新的基于正则表达式的查询语言。这种语言允许根据单词的歧义编写查询。
{"title":"A tool for morphologically ambiguous text processing","authors":"E. Klyshinsky, N. Kochetkova","doi":"10.1109/DIPDMWC.2016.7529377","DOIUrl":"https://doi.org/10.1109/DIPDMWC.2016.7529377","url":null,"abstract":"The main course of preliminary natural texts processing is tagging and disambiguating texts. Hence, most of modern language tools are specified for such purposes. In our projects, we carry out a shallow syntax of untagged texts. For this purpose we developed a new query language based on regular expressions. This language allows write queries according to words' ambiguity.","PeriodicalId":298218,"journal":{"name":"2016 Third International Conference on Digital Information Processing, Data Mining, and Wireless Communications (DIPDMWC)","volume":"326 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132949938","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Serious game design for digital forensics training 数字取证训练的严肃游戏设计
Andrej Jerman Blažič, Primoz Cigoj, B. Blažič
The research presented in this paper contributes to the advancement of the educational game design through the provision of empirical experience close to the real life environment in the selected field - digital forensics. The game was developed and designed to incorporate the learnability properties originating from the recently upgraded serious game taxonomy. The learnability properties of the game were evaluated through a student survey and educators' observations.
本文的研究通过提供贴近现实生活环境的实证经验,为教育性游戏设计的进步做出了贡献。游戏的开发和设计结合了最近升级的严肃游戏分类的易学属性。游戏的易学属性是通过学生调查和教育工作者的观察来评估的。
{"title":"Serious game design for digital forensics training","authors":"Andrej Jerman Blažič, Primoz Cigoj, B. Blažič","doi":"10.1109/DIPDMWC.2016.7529391","DOIUrl":"https://doi.org/10.1109/DIPDMWC.2016.7529391","url":null,"abstract":"The research presented in this paper contributes to the advancement of the educational game design through the provision of empirical experience close to the real life environment in the selected field - digital forensics. The game was developed and designed to incorporate the learnability properties originating from the recently upgraded serious game taxonomy. The learnability properties of the game were evaluated through a student survey and educators' observations.","PeriodicalId":298218,"journal":{"name":"2016 Third International Conference on Digital Information Processing, Data Mining, and Wireless Communications (DIPDMWC)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133441332","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
期刊
2016 Third International Conference on Digital Information Processing, Data Mining, and Wireless Communications (DIPDMWC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1