首页 > 最新文献

2017 IEEE National Aerospace and Electronics Conference (NAECON)最新文献

英文 中文
Medical applications of conformai flexible antennas 保形柔性天线的医疗应用
Pub Date : 2017-06-01 DOI: 10.1109/NAECON.2017.8268776
A. Ferendeci
Flexible conformai antennas are developed for medical applications. The overall antenna thicknesses are thin and processed on flexible substrates. In addition to normal metallic antennas, slotted versions are developed so that they can be more flexible and cover wider frequency ranges. Various antenna configurations such as Composite Right/Left-Handed (CRLH), fractal, elongated circular and logarithmic spiral antennas were processed. Possible applications are listed.
柔性共形天线是为医疗应用而开发的。天线的整体厚度很薄,并在柔性基板上加工。除了普通的金属天线外,还开发了开槽天线,使其更加灵活,覆盖更广的频率范围。对复合左/右(CRLH)天线、分形天线、细长圆形天线和对数螺旋天线等天线构型进行了处理。列出了可能的应用程序。
{"title":"Medical applications of conformai flexible antennas","authors":"A. Ferendeci","doi":"10.1109/NAECON.2017.8268776","DOIUrl":"https://doi.org/10.1109/NAECON.2017.8268776","url":null,"abstract":"Flexible conformai antennas are developed for medical applications. The overall antenna thicknesses are thin and processed on flexible substrates. In addition to normal metallic antennas, slotted versions are developed so that they can be more flexible and cover wider frequency ranges. Various antenna configurations such as Composite Right/Left-Handed (CRLH), fractal, elongated circular and logarithmic spiral antennas were processed. Possible applications are listed.","PeriodicalId":306091,"journal":{"name":"2017 IEEE National Aerospace and Electronics Conference (NAECON)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129792695","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The use of automated theorem proving for error analysis and removal in safety critical embedded system specifications 在安全关键嵌入式系统规范中使用自动化定理证明进行错误分析和消除
Pub Date : 2017-06-01 DOI: 10.1109/NAECON.2017.8268802
Jonathan Lockhart, C. Purdy, P. Wilsey
As embedded systems increase in complexity, more and more functionality is being migrated to software. Much of the migrated software is critical to the well-being of the system and users. Thus, methods to produce high quality software are needed. Software development today focuses on taking requirements and producing software as fast as possible. Traditional methods have been augmented or replaced with new, agile methods (like SCRUM) designed to produce bits of code as quickly and cheaply as possible. Unfortunately many of these methods ignore standard testing procedures and rely on reported errors to drive corrections in future releases. Traditional methods require exhaustive testing to eliminate a majority of errors. Both processes are time intensive and in the long run cost the project more to correct errors. This paper demonstrates that errors in requirements and design can be discovered and eliminated prior to implementation with the use of automated theorem provers for formal methods. This illustration is key to saving time and costs in the software development life cycle.
随着嵌入式系统复杂性的增加,越来越多的功能被迁移到软件中。许多迁移的软件对系统和用户的健康至关重要。因此,需要生产高质量软件的方法。今天的软件开发关注于获取需求并尽可能快地生产软件。传统方法已经被新的、敏捷的方法(比如SCRUM)所增强或取代,这些方法旨在尽可能快速、廉价地生成代码。不幸的是,这些方法中的许多都忽略了标准的测试过程,并依赖于报告的错误来驱动未来版本中的更正。传统的方法需要详尽的测试来消除大多数错误。这两个过程都是时间密集型的,从长远来看,纠正错误需要花费更多的项目成本。本文证明了需求和设计中的错误可以在使用形式化方法的自动定理证明器实现之前被发现和消除。这个说明是在软件开发生命周期中节省时间和成本的关键。
{"title":"The use of automated theorem proving for error analysis and removal in safety critical embedded system specifications","authors":"Jonathan Lockhart, C. Purdy, P. Wilsey","doi":"10.1109/NAECON.2017.8268802","DOIUrl":"https://doi.org/10.1109/NAECON.2017.8268802","url":null,"abstract":"As embedded systems increase in complexity, more and more functionality is being migrated to software. Much of the migrated software is critical to the well-being of the system and users. Thus, methods to produce high quality software are needed. Software development today focuses on taking requirements and producing software as fast as possible. Traditional methods have been augmented or replaced with new, agile methods (like SCRUM) designed to produce bits of code as quickly and cheaply as possible. Unfortunately many of these methods ignore standard testing procedures and rely on reported errors to drive corrections in future releases. Traditional methods require exhaustive testing to eliminate a majority of errors. Both processes are time intensive and in the long run cost the project more to correct errors. This paper demonstrates that errors in requirements and design can be discovered and eliminated prior to implementation with the use of automated theorem provers for formal methods. This illustration is key to saving time and costs in the software development life cycle.","PeriodicalId":306091,"journal":{"name":"2017 IEEE National Aerospace and Electronics Conference (NAECON)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132638835","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Electricity theft concerns within advanced energy technologies 先进能源技术中的窃电问题
Pub Date : 2017-06-01 DOI: 10.1109/NAECON.2017.8268784
Trevor J. Bihl, Salam Hajjar
Developments in ambient energy and radio frequency (RF) energy harvesting have the potential to provide in situ power for sensor systems; however, they also have the potential to illicitly collect generated energy. Additionally, new methods of electricity theft have appeared with the introduction of smart grid components. This paper provides an understanding of electricity theft as it relates to advanced energy applications, e.g. energy harvesting and the smart grid. A discussion is also provided of the interdisciplinary, ethical and education issues of electricity theft as it relates to these domains.
环境能量和射频(RF)能量收集的发展有可能为传感器系统提供原位电源;然而,它们也有可能非法收集产生的能量。此外,随着智能电网组件的引入,新的窃电方法也出现了。本文提供了对电力盗窃的理解,因为它涉及到先进的能源应用,例如能量收集和智能电网。讨论还提供了跨学科,道德和教育问题的窃电,因为它涉及到这些领域。
{"title":"Electricity theft concerns within advanced energy technologies","authors":"Trevor J. Bihl, Salam Hajjar","doi":"10.1109/NAECON.2017.8268784","DOIUrl":"https://doi.org/10.1109/NAECON.2017.8268784","url":null,"abstract":"Developments in ambient energy and radio frequency (RF) energy harvesting have the potential to provide in situ power for sensor systems; however, they also have the potential to illicitly collect generated energy. Additionally, new methods of electricity theft have appeared with the introduction of smart grid components. This paper provides an understanding of electricity theft as it relates to advanced energy applications, e.g. energy harvesting and the smart grid. A discussion is also provided of the interdisciplinary, ethical and education issues of electricity theft as it relates to these domains.","PeriodicalId":306091,"journal":{"name":"2017 IEEE National Aerospace and Electronics Conference (NAECON)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130950884","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Enhancing FPGA security through Trojan resilient IP creation 通过木马弹性IP创建增强FPGA安全性
Pub Date : 2017-06-01 DOI: 10.1109/NAECON.2017.8268803
Noor Ahmad Hazari, M. Niamat
In recent years FPGAs have become vulnerable to hardware Trojan attacks due to their increased use in different applications like defense, automotive, image processing, etc. Among several types of hardware Trojan attacks in FPGAs, one of them is implanting hardware Trojans using the bitstream modification. These types of hardware Trojans exploit the empty resources in FPGA by modifying the original design by bitstream modification. In this paper, Trojan Resilient IP is created by adding original design with the dummy logic design in order to provide security and trust for FPGA-based designs. Covering the unused resources with dummy logic design incurs power and delay overhead for FPGA design when the dummy logic circuit is in operation. This paper also addresses the power and delay overhead for Trojan Resilient IP Creation using different ISACS'89 benchmark circuits.
近年来,由于fpga在国防、汽车、图像处理等不同应用中的使用越来越多,它变得容易受到硬件木马攻击。在fpga硬件木马攻击的几种类型中,利用比特流修改植入硬件木马是其中一种。这些类型的硬件木马通过修改比特流来修改FPGA的原始设计,从而利用FPGA中的空闲资源。为了给基于fpga的设计提供安全性和可信度,本文将原始设计与虚拟逻辑设计相结合,创建了木马弹性IP。当虚拟逻辑电路工作时,用虚拟逻辑设计覆盖未使用的资源会给FPGA设计带来功耗和延迟开销。本文还讨论了使用不同的ISACS'89基准电路创建木马弹性IP的功耗和延迟开销。
{"title":"Enhancing FPGA security through Trojan resilient IP creation","authors":"Noor Ahmad Hazari, M. Niamat","doi":"10.1109/NAECON.2017.8268803","DOIUrl":"https://doi.org/10.1109/NAECON.2017.8268803","url":null,"abstract":"In recent years FPGAs have become vulnerable to hardware Trojan attacks due to their increased use in different applications like defense, automotive, image processing, etc. Among several types of hardware Trojan attacks in FPGAs, one of them is implanting hardware Trojans using the bitstream modification. These types of hardware Trojans exploit the empty resources in FPGA by modifying the original design by bitstream modification. In this paper, Trojan Resilient IP is created by adding original design with the dummy logic design in order to provide security and trust for FPGA-based designs. Covering the unused resources with dummy logic design incurs power and delay overhead for FPGA design when the dummy logic circuit is in operation. This paper also addresses the power and delay overhead for Trojan Resilient IP Creation using different ISACS'89 benchmark circuits.","PeriodicalId":306091,"journal":{"name":"2017 IEEE National Aerospace and Electronics Conference (NAECON)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115551652","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A signal processing and data analysis technique for accurate extraction and estimation of FTIR signal aberrations in microsphere-lens-enhanced MWIR photo detectors via system transfer functions mathematical modeling 基于系统传递函数数学建模的微球透镜增强MWIR光电探测器中FTIR信号像差的精确提取和估计的信号处理和数据分析技术
Pub Date : 2017-06-01 DOI: 10.1109/NAECON.2017.8268768
D. Megherbi, J. DiZoglio, P. Mack, M. I. Vakil, N. Limberopoulos, A. Urbas
In this paper we focus on using signal processing techniques and mathematically-derived photo-detector models, with or without microsphere-lens-enhancement, to analyze, characterize and estimate the effect of integrated aberrations on microsphere-lens-enhanced single photo-detector sensitivity. One of the difficulties here relates to the noisy nature of detector FTIR experimental signals in the MWIR band. We show how modeling of the detector spectral response signal, combined with signal boundary-absorption partial replacement, is successfully effective in estimating integrated detector system aberrations. With the detector FTIR spectral data, considered, our findings show that (a) not all four microsphere materials, considered in this work, namely, Sapphire, SLG (Soda, Lime Glass), PS (Polystyrene) and BTG (Barium Titanate Glass) necessarily result in detector sensitivity increase at all MWIR wavelengths. The PS-microsphere-lens-enhanced detector sensitivity turns out to be less than that of the detector without enhancement in the 2700–3200 wavenumber band. This is due to the fact at this band the PS material exhibits additional significant spectral absorptions. (b) there seems to exist some global detector integrated aberrations introduced by factors such as the microsphere lens material and misalignment, silicone-or-rubber adhesive materiel, photo-detector system and others, that we globally extracted/estimated using the detector experimental FTIR spectral responses and their corresponding generated detector mathematical models. (c) comparison of single detector raw experimental spectral responses (with and without microsphere-lenses of different sizes and material types) to their respective resulting models, shows realistic synthesized detector FTIR data models. With the help of theses resulting detector FTIR response models, we are able to confirm our findings that, relatively independently of the increase in the sensitivity, the microsphere lens significantly decreases the sphere-enhanced-detector Noise to Signal Ratio (NSR), including in spectral bands of high absorption, noise, and aberration. That is, based on the data considered, (1) the resulting microsphere-enhanced photo-detector is generally less sensitive to noise in the MWIR than the mesa and (2) this, seemingly is so, independently of the detector sensitivity increase, for example, due to the microsphere size of a certain material type.
在本文中,我们重点利用信号处理技术和数学推导的光电探测器模型,分析、表征和估计集成像差对微球透镜增强的单光电探测器灵敏度的影响。这里的困难之一涉及到探测器FTIR实验信号在MWIR波段的噪声性质。我们展示了探测器光谱响应信号的建模,结合信号边界吸收部分替换,是如何成功有效地估计集成探测器系统像差的。考虑到探测器的FTIR光谱数据,我们的研究结果表明(a)并非所有四种微球材料,即蓝宝石,SLG(苏打,石灰玻璃),PS(聚苯乙烯)和BTG(钛酸钡玻璃)都必然导致探测器在所有MWIR波长下的灵敏度增加。在2700 ~ 3200波数范围内,ps -微球透镜增强后的探测器灵敏度低于未增强的探测器。这是因为在这一波段,PS材料表现出额外的显著的光谱吸收。(b)我们利用探测器实验FTIR光谱响应及其相应生成的探测器数学模型,对探测器整体集成像差进行了提取/估计,这些像差是由微球透镜材料和不对准、硅或橡胶胶粘剂材料、光电探测器系统等因素引入的。(c)将单个探测器的原始实验光谱响应(有和没有不同尺寸和材料类型的微球透镜)与各自的结果模型进行比较,显示出真实的合成探测器FTIR数据模型。在这些探测器FTIR响应模型的帮助下,我们能够证实我们的发现,相对独立于灵敏度的增加,微球透镜显著降低了球体增强探测器的噪声与信号比(NSR),包括在高吸收、噪声和像差的光谱波段。也就是说,根据所考虑的数据,(1)所得的微球增强光探测器对MWIR中的噪声的敏感性通常低于台面;(2)这似乎与探测器灵敏度的增加无关,例如,由于某种材料类型的微球尺寸。
{"title":"A signal processing and data analysis technique for accurate extraction and estimation of FTIR signal aberrations in microsphere-lens-enhanced MWIR photo detectors via system transfer functions mathematical modeling","authors":"D. Megherbi, J. DiZoglio, P. Mack, M. I. Vakil, N. Limberopoulos, A. Urbas","doi":"10.1109/NAECON.2017.8268768","DOIUrl":"https://doi.org/10.1109/NAECON.2017.8268768","url":null,"abstract":"In this paper we focus on using signal processing techniques and mathematically-derived photo-detector models, with or without microsphere-lens-enhancement, to analyze, characterize and estimate the effect of integrated aberrations on microsphere-lens-enhanced single photo-detector sensitivity. One of the difficulties here relates to the noisy nature of detector FTIR experimental signals in the MWIR band. We show how modeling of the detector spectral response signal, combined with signal boundary-absorption partial replacement, is successfully effective in estimating integrated detector system aberrations. With the detector FTIR spectral data, considered, our findings show that (a) not all four microsphere materials, considered in this work, namely, Sapphire, SLG (Soda, Lime Glass), PS (Polystyrene) and BTG (Barium Titanate Glass) necessarily result in detector sensitivity increase at all MWIR wavelengths. The PS-microsphere-lens-enhanced detector sensitivity turns out to be less than that of the detector without enhancement in the 2700–3200 wavenumber band. This is due to the fact at this band the PS material exhibits additional significant spectral absorptions. (b) there seems to exist some global detector integrated aberrations introduced by factors such as the microsphere lens material and misalignment, silicone-or-rubber adhesive materiel, photo-detector system and others, that we globally extracted/estimated using the detector experimental FTIR spectral responses and their corresponding generated detector mathematical models. (c) comparison of single detector raw experimental spectral responses (with and without microsphere-lenses of different sizes and material types) to their respective resulting models, shows realistic synthesized detector FTIR data models. With the help of theses resulting detector FTIR response models, we are able to confirm our findings that, relatively independently of the increase in the sensitivity, the microsphere lens significantly decreases the sphere-enhanced-detector Noise to Signal Ratio (NSR), including in spectral bands of high absorption, noise, and aberration. That is, based on the data considered, (1) the resulting microsphere-enhanced photo-detector is generally less sensitive to noise in the MWIR than the mesa and (2) this, seemingly is so, independently of the detector sensitivity increase, for example, due to the microsphere size of a certain material type.","PeriodicalId":306091,"journal":{"name":"2017 IEEE National Aerospace and Electronics Conference (NAECON)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121136880","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Design and implementation of a customized encryption algorithm for authentication and secure communication between devices 设计和实现一种自定义的加密算法,用于设备之间的认证和安全通信
Pub Date : 2017-06-01 DOI: 10.1109/NAECON.2017.8268781
Bhavana Daddala, Hong Wang, A. Javaid
In the current world, encryption plays a significant role in securing relevant information from attackers. The applications of such protocols fall under numerous categories ranging from internet banking to Internet of Things (IoT). Many standards and developed encryption protocols are available as resources and are used based on the requirements. If the attacker has access to shared keys between devices, it doesn't take long to decrypt the information by using any of the standard encryption algorithms. Therefore, there is a necessity to build strong and complex encryption algorithms. In this paper, we propose a customized encryption algorithm and an authentication scheme to safely transfer information. This algorithm is a variation of Advanced Encryption Standard (AES) and devises a new protocol for key establishment. The implementation of communication protocol between two devices, with a prospect of working with multiple devices using a centralized server is presented. The outcome is to establish a different approach towards encryption and enhance security by providing protection against Man-in-the-Middle attacks. The customized algorithms are implemented using Python.
在当今世界,加密在保护相关信息不受攻击者攻击方面发挥着重要作用。这些协议的应用分为从网上银行到物联网(IoT)的许多类别。许多标准和开发的加密协议都可以作为资源使用,并根据需求进行使用。如果攻击者可以访问设备之间的共享密钥,那么使用任何标准加密算法都不会花很长时间来解密信息。因此,有必要构建强大而复杂的加密算法。在本文中,我们提出了一种定制的加密算法和认证方案来安全传输信息。该算法是对高级加密标准AES (Advanced Encryption Standard)的改进,设计了一种新的密钥建立协议。介绍了两台设备间通信协议的实现,并展望了使用集中式服务器与多台设备协同工作的前景。其结果是建立一种不同的加密方法,并通过提供针对中间人攻击的保护来增强安全性。自定义算法是使用Python实现的。
{"title":"Design and implementation of a customized encryption algorithm for authentication and secure communication between devices","authors":"Bhavana Daddala, Hong Wang, A. Javaid","doi":"10.1109/NAECON.2017.8268781","DOIUrl":"https://doi.org/10.1109/NAECON.2017.8268781","url":null,"abstract":"In the current world, encryption plays a significant role in securing relevant information from attackers. The applications of such protocols fall under numerous categories ranging from internet banking to Internet of Things (IoT). Many standards and developed encryption protocols are available as resources and are used based on the requirements. If the attacker has access to shared keys between devices, it doesn't take long to decrypt the information by using any of the standard encryption algorithms. Therefore, there is a necessity to build strong and complex encryption algorithms. In this paper, we propose a customized encryption algorithm and an authentication scheme to safely transfer information. This algorithm is a variation of Advanced Encryption Standard (AES) and devises a new protocol for key establishment. The implementation of communication protocol between two devices, with a prospect of working with multiple devices using a centralized server is presented. The outcome is to establish a different approach towards encryption and enhance security by providing protection against Man-in-the-Middle attacks. The customized algorithms are implemented using Python.","PeriodicalId":306091,"journal":{"name":"2017 IEEE National Aerospace and Electronics Conference (NAECON)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122946953","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
OPIR video preprocessing and compression for on-board aerospace computing 面向机载航天计算的OPIR视频预处理与压缩
Pub Date : 2017-06-01 DOI: 10.1109/NAECON.2017.8268759
Eric Shea, Alan D. George
Increasing bit-depth of new image sensors presents many challenges on resource-limited, on-board processors in aerospace. This paper provides new results, analysis, and insight with our novel methods for preprocessing with compression of an Overhead Persistent InfraRed (OPIR) image sensor on embedded processors including Xilinx Zynq-7020 and Amlogic S905.
提高新型图像传感器的位深度对资源有限的机载处理器提出了许多挑战。本文提供了新的结果、分析和见解,以及我们在嵌入式处理器(包括Xilinx Zynq-7020和Amlogic S905)上对顶置持久红外(OPIR)图像传感器进行压缩预处理的新方法。
{"title":"OPIR video preprocessing and compression for on-board aerospace computing","authors":"Eric Shea, Alan D. George","doi":"10.1109/NAECON.2017.8268759","DOIUrl":"https://doi.org/10.1109/NAECON.2017.8268759","url":null,"abstract":"Increasing bit-depth of new image sensors presents many challenges on resource-limited, on-board processors in aerospace. This paper provides new results, analysis, and insight with our novel methods for preprocessing with compression of an Overhead Persistent InfraRed (OPIR) image sensor on embedded processors including Xilinx Zynq-7020 and Amlogic S905.","PeriodicalId":306091,"journal":{"name":"2017 IEEE National Aerospace and Electronics Conference (NAECON)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123383640","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
The response to arbitrarily bandlimited Gaussian noise of the complex stretch processor using certain range-sidelobe-reduction windows 利用一定的距离旁瓣减小窗口研究了复杂拉伸处理器对任意带限高斯噪声的响应
Pub Date : 2017-06-01 DOI: 10.1109/NAECON.2017.8268779
John N. Spitzmiller
This paper derives the response of the complex stretch processor to bandlimited Gaussian noise having arbitrary center frequency and bandwidth. The complex stretch processor uses a range-sidelobe-reduction window with a specific but common mathematical form. The paper then identifies three jamming-related applications of the derived characterization. Digital simulation results for the three identified jamming applications, assuming the complex stretch processor uses a Hamming or Hann window, verify the derivation's correctness.
本文推导了复合拉伸处理器对任意中心频率和带宽的带限高斯噪声的响应。复杂拉伸处理器使用具有特定但通用的数学形式的范围旁瓣减少窗口。然后,本文确定了派生表征的三种与干扰相关的应用。假设复杂拉伸处理器使用汉明或汉恩窗口,对三种已识别干扰应用的数字仿真结果验证了推导的正确性。
{"title":"The response to arbitrarily bandlimited Gaussian noise of the complex stretch processor using certain range-sidelobe-reduction windows","authors":"John N. Spitzmiller","doi":"10.1109/NAECON.2017.8268779","DOIUrl":"https://doi.org/10.1109/NAECON.2017.8268779","url":null,"abstract":"This paper derives the response of the complex stretch processor to bandlimited Gaussian noise having arbitrary center frequency and bandwidth. The complex stretch processor uses a range-sidelobe-reduction window with a specific but common mathematical form. The paper then identifies three jamming-related applications of the derived characterization. Digital simulation results for the three identified jamming applications, assuming the complex stretch processor uses a Hamming or Hann window, verify the derivation's correctness.","PeriodicalId":306091,"journal":{"name":"2017 IEEE National Aerospace and Electronics Conference (NAECON)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127854604","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Robust multi-view pedestrian tracking using neural networks 基于神经网络的鲁棒多视角行人跟踪
Pub Date : 2017-04-21 DOI: 10.1109/NAECON.2017.8268718
Md. Zahangir Alom, T. Taha
In this paper, we present a real-time robust multi-view pedestrian detection and tracking system for video using neural networks which can be used in dynamic environments. The proposed system consists of two phases: multi-view pedestrian detection and tracking. First, pedestrian detection utilizes background subtraction to segment the foreground objects. An adaptive background subtraction method where each of the pixel of input image models as a mixture of Gaussians and uses an on-line approximation to update the model applies to extract the foreground region. The Gaussian distributions are then evaluated to determine which are most likely to result from a background process. This method produces a steady, real-time tracker in indoor and outdoor environment that consistently deals with changes of lighting condition, and long-term scene change. Second, the tracking is performed at two steps: pedestrian classification and tracking of the individual subject. A sliding window technique is used on foreground binary image which uses for determining the input target patches from input frame. The neural networks is applied for classification with PHOG features of the target patches. Finally, a Kalman filter is applied to calculate the subsequent step for tracking that aims at finding the exact position of pedestrians in an input video frames. The experimental result shows that the proposed approach yields promising performance on multi-view pedestrian detection and tracking on different benchmark datasets.
本文提出了一种基于神经网络的实时鲁棒多视角视频行人检测与跟踪系统,该系统可用于动态环境。该系统包括两个阶段:多视角行人检测和跟踪。首先,行人检测利用背景减法分割前景目标。将输入图像的每个像素作为高斯模型的混合,并使用在线逼近来更新模型的自适应背景相减方法适用于提取前景区域。然后对高斯分布进行评估,以确定哪些最可能是由背景过程产生的。该方法产生了一个稳定的、实时的室内和室外环境跟踪器,可以一致地处理照明条件的变化和长期的场景变化。其次,跟踪分两步进行:行人分类和个体跟踪。对前景二值图像采用滑动窗口技术,从输入帧中确定输入目标块。利用目标patch的PHOG特征,应用神经网络进行分类。最后,应用卡尔曼滤波器计算跟踪的后续步骤,目的是在输入视频帧中找到行人的确切位置。实验结果表明,该方法在不同基准数据集上的多视图行人检测和跟踪性能良好。
{"title":"Robust multi-view pedestrian tracking using neural networks","authors":"Md. Zahangir Alom, T. Taha","doi":"10.1109/NAECON.2017.8268718","DOIUrl":"https://doi.org/10.1109/NAECON.2017.8268718","url":null,"abstract":"In this paper, we present a real-time robust multi-view pedestrian detection and tracking system for video using neural networks which can be used in dynamic environments. The proposed system consists of two phases: multi-view pedestrian detection and tracking. First, pedestrian detection utilizes background subtraction to segment the foreground objects. An adaptive background subtraction method where each of the pixel of input image models as a mixture of Gaussians and uses an on-line approximation to update the model applies to extract the foreground region. The Gaussian distributions are then evaluated to determine which are most likely to result from a background process. This method produces a steady, real-time tracker in indoor and outdoor environment that consistently deals with changes of lighting condition, and long-term scene change. Second, the tracking is performed at two steps: pedestrian classification and tracking of the individual subject. A sliding window technique is used on foreground binary image which uses for determining the input target patches from input frame. The neural networks is applied for classification with PHOG features of the target patches. Finally, a Kalman filter is applied to calculate the subsequent step for tracking that aims at finding the exact position of pedestrians in an input video frames. The experimental result shows that the proposed approach yields promising performance on multi-view pedestrian detection and tracking on different benchmark datasets.","PeriodicalId":306091,"journal":{"name":"2017 IEEE National Aerospace and Electronics Conference (NAECON)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-04-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128282546","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2017 IEEE National Aerospace and Electronics Conference (NAECON)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1