首页 > 最新文献

2020 28th Signal Processing and Communications Applications Conference (SIU)最新文献

英文 中文
Blockchain-based Fog Computing Applications in Healthcare 基于区块链的雾计算在医疗保健中的应用
Pub Date : 2020-10-05 DOI: 10.1109/SIU49456.2020.9302168
Beyhan Adanur, Burcu Bakir-Güngör, Ahmet Soran
Recently, the use of blockchain technology in the field of healthcare has increased. Although blockchain technology brought several innovations to healthcare, still there are problems waiting to be resolved. In order to provide alternative solutions to these problems, the use of fog computing together with blockchain technology has been proposed. In this study, the applications of blockchain based fog computing technology in healthcare are investigated. The aim of this study is to provide the readers an idea about the interactive use of blockchain and fog computing in the field of healthcare. For this purpose, firstly, fog computing and blockchain technologies are introduced. Afterwards, the integration of these areas, the advantages and disadvantages of using these technologies in the field of healthcare is discussed and a new system architecture is proposed.
最近,区块链技术在医疗保健领域的使用有所增加。尽管区块链技术为医疗保健带来了一些创新,但仍有一些问题有待解决。为了提供这些问题的替代解决方案,已经提出将雾计算与区块链技术结合使用。本研究探讨了基于区块链的雾计算技术在医疗保健中的应用。本研究的目的是为读者提供一个关于区块链和雾计算在医疗保健领域的交互式使用的想法。为此,首先介绍了雾计算和区块链技术。然后,讨论了这些领域的整合,以及这些技术在医疗保健领域应用的优缺点,并提出了一种新的系统架构。
{"title":"Blockchain-based Fog Computing Applications in Healthcare","authors":"Beyhan Adanur, Burcu Bakir-Güngör, Ahmet Soran","doi":"10.1109/SIU49456.2020.9302168","DOIUrl":"https://doi.org/10.1109/SIU49456.2020.9302168","url":null,"abstract":"Recently, the use of blockchain technology in the field of healthcare has increased. Although blockchain technology brought several innovations to healthcare, still there are problems waiting to be resolved. In order to provide alternative solutions to these problems, the use of fog computing together with blockchain technology has been proposed. In this study, the applications of blockchain based fog computing technology in healthcare are investigated. The aim of this study is to provide the readers an idea about the interactive use of blockchain and fog computing in the field of healthcare. For this purpose, firstly, fog computing and blockchain technologies are introduced. Afterwards, the integration of these areas, the advantages and disadvantages of using these technologies in the field of healthcare is discussed and a new system architecture is proposed.","PeriodicalId":312627,"journal":{"name":"2020 28th Signal Processing and Communications Applications Conference (SIU)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115692910","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Metric Learning with Quadruplets on Non-Hierarchical Labeled Datasets 非层次标记数据集上的四胞胎度量学习
Pub Date : 2020-10-05 DOI: 10.1109/SIU49456.2020.9302178
Kaan Karaman, Ibrahim Batuhan Akkaya, A. Alatan
Metric learning is a frequently utilized method that can be applied to many different computer vision problems and; thus, facilitates these problems. In this paper, the proposed method for manipulating the feature space with the help of quadruplets, which is one of the metric learning methods, is explained with details, and the results obtained by using it are shown. Many methods used in the field of metric learning, have been developed on the Siamese and triplet structures and satisfactory results have been obtained by them. Similarly, the quadruplet structure is still being studied and different approaches are proposed in the literature. How to select four elements for generating a quadruplet is not standardized at present. However, by looking at the mining methods of Siamese and triplet samples, it can be concluded that each sample in the dataset that is trained with quadruplet samples, must have at least two hierarchical labels. This makes it possible to train the quadruplet structure only on certain datasets that have the hierarchical labels. In this paper, an unsupervised method is proposed to use the quadruplet structure in datasets that do not have a hierarchical label structure. Besides, the performances of three different quadruplet mining methods are compared and an ablation study is conducted by discussing the advantages and disadvantages of the proposed method.
度量学习是一种常用的方法,可以应用于许多不同的计算机视觉问题。因此,助长了这些问题。本文详细介绍了一种度量学习方法——利用四联体对特征空间进行处理的方法,并给出了使用该方法所得到的结果。在韵律学习领域中,已经发展了许多关于连体结构和三连体结构的方法,并取得了令人满意的结果。同样,四重结构仍在研究中,文献中提出了不同的方法。如何选择生成四胞胎的四个要素目前还没有标准化。然而,通过观察连体样本和三联体样本的挖掘方法,可以得出结论,数据集中使用四联体样本训练的每个样本必须至少有两个分层标签。这使得仅在具有分层标签的某些数据集上训练四重组结构成为可能。本文提出了一种无监督的方法,在不具有分层标签结构的数据集中使用四重组结构。此外,比较了三种不同的四联体采矿方法的性能,讨论了所提方法的优缺点,并进行了烧蚀研究。
{"title":"Metric Learning with Quadruplets on Non-Hierarchical Labeled Datasets","authors":"Kaan Karaman, Ibrahim Batuhan Akkaya, A. Alatan","doi":"10.1109/SIU49456.2020.9302178","DOIUrl":"https://doi.org/10.1109/SIU49456.2020.9302178","url":null,"abstract":"Metric learning is a frequently utilized method that can be applied to many different computer vision problems and; thus, facilitates these problems. In this paper, the proposed method for manipulating the feature space with the help of quadruplets, which is one of the metric learning methods, is explained with details, and the results obtained by using it are shown. Many methods used in the field of metric learning, have been developed on the Siamese and triplet structures and satisfactory results have been obtained by them. Similarly, the quadruplet structure is still being studied and different approaches are proposed in the literature. How to select four elements for generating a quadruplet is not standardized at present. However, by looking at the mining methods of Siamese and triplet samples, it can be concluded that each sample in the dataset that is trained with quadruplet samples, must have at least two hierarchical labels. This makes it possible to train the quadruplet structure only on certain datasets that have the hierarchical labels. In this paper, an unsupervised method is proposed to use the quadruplet structure in datasets that do not have a hierarchical label structure. Besides, the performances of three different quadruplet mining methods are compared and an ablation study is conducted by discussing the advantages and disadvantages of the proposed method.","PeriodicalId":312627,"journal":{"name":"2020 28th Signal Processing and Communications Applications Conference (SIU)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114469934","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Performance Comparison of Single-Radio MultiChannel Medium Access Control Protocols 单无线电多通道介质访问控制协议的性能比较
Pub Date : 2020-10-05 DOI: 10.1109/SIU49456.2020.9302437
Umuralp Kaytaz, Seyhan Uçar, S. Coleri
Single-radio multi-channel Medium Access Control (MAC) protocols aim to transmit in parallel on distinct channels while reducing the hardware cost. Although a variety of MAC protocols have been proposed in this context, no detailed classification and performance comparison is available. In this paper, we first classify previous efforts by their rendezvous characteristics as singleand multi-rendezvous protocols. Multirendezvous protocols have the capability of supporting simultaneous handshaking on different channels whereas with single-rendezvous protocols only asynchronous channel negotiations are allowed. Then, we further classify these protocols according to their spectrum decision mechanisms. We demonstrate the functionality of singleand multi-rendezvous protocols under different scenarios via extensive simulations. Our findings show that multi-rendezvous protocol performs better when the transmission range is low and less number of channels is available. Single-rendezvous protocols, on the other hand, are more suitable for networks with larger traffic loads due to their slot-based decision-making schemes. Keywords— medium access control (MAC), multi-channel, ad hoc network. I. G R Günümüzde kullan lan kablosuz a teknolojisinin büyük bir k sm , IEEE 802.11 standard na dayanmaktad r. IEEE 802.11'de bulunan Da t lm Koordinasyon Fonksiyonu (DCF), MAC katman nda tek bir kanal kullan r. Bundan dolay , tek bir kanaldaki a trafi i yükü, yüksek oranda paket çarp mas na ve performans n dü mesine neden olmaktad r. Çok kanall yap n n telsizlerin kanal de i tirme özelli i ile birlikte kullan lmas , farkl kanallarda e zamanl aktar m sa lamak için yayg n bir yakla md r. Bu nedenle, çok kanall yap daki ileti im, daha az kar l kl giri im, daha yüksek mekânsal yeniden kullan m ve geli mi a verimlili i ile sonuçlanmaktad r. Çok kanall ileti imde i levselli i artt rmak için birçok çal ma önerilmi tir [1]. Bu yakla mlar, al c say s na ve/veya tokala ma yöntemlerine göre kategorize edilebilirler. Çok al c vericinin etkin oldu u çok kanall MAC protokolleri daha güvenilir olsa da, her bir dü üm için birden fazla radyo sa lamak donan m maliyetini art rmaktad r. Güvenilir ileti imi minimum maliyet gözeterek ara t rmak için, bu çal mam zda yaln zca tek telsiz çok kanall MAC protokollerini incelemekteyiz. Tek telsiz çok-kanall MAC protokollerinin s n fland r lmas , Tablo I de gösterildi i gibidir. Tek telsiz çok kanall MAC protokolleri, kabul edilen el s k ma prosedürüne ba l olarak tek veya çok randevulu olarak s n fland r labilirler [12]. Tek randevulu MAC için yakla mlardan biri, veri kanal anla malar için kaynak ve var (S-D) çiftleri aras nda ortak bir kontrol kanal n n kullan lmas d r [13]. Atanm Kontrol Kanal (DCC) protokolleri, tokala ma amac yla ortak bir kontrol kanal , iletimler için ise çoklu veri kanallar n kullanmaktad rlar. Tek bir telsiz ile ortak bir kontrol kanal n n kullan lmas kanalda sadece bir S-D çiftinin tokala abilmesine sebep olmaktad r. E zama
单无线电多通道介质访问控制(MAC)协议的目标是在不同的信道上并行传输,同时降低硬件成本。虽然在这种情况下已经提出了各种MAC协议,但没有详细的分类和性能比较。在本文中,我们首先根据其交会特性将先前的努力分为单交会协议和多交会协议。多交会协议支持在不同信道上同时握手,而单交会协议只允许异步信道协商。然后,根据协议的频谱决策机制对协议进行分类。我们通过广泛的模拟演示了单交会和多交会协议在不同场景下的功能。研究结果表明,多交会协议在传输范围小、可用信道数少的情况下性能更好。而单会合协议由于其基于时隙的决策方案,更适合于流量负载较大的网络。关键词:介质访问控制(MAC),多通道,自组织网络。1 . G R gg mzde kullan lan kablosuz a teknolojisin b yk bir k sm, IEEE 802.11标准na dayanmaktad R . IEEE 802.11'de bulunan Da - m koordinason Fonksiyonu (DCF), MAC katman和IEEE 802.11'de bulunan Da - m . Bundan dolay, IEEE bir kanaldaki a流量在yükü, y ksek oranda paket arp在dü mesine neden olmaktad R . Çok kanall yap和telsillerin kanal de i time özelli上的性能,farkl kanallarda e zamanl aktar m sa lamak ialak yayg n bir yakla md r. bunedenle, kanall yap daki ileti im, ksek meknsal yeniden kullan m ve geli mi a verimili i ile . Çok kanall ileti imde i levselli i arttr il al ma önerilmi tir[1]。但是,yakla mlar,所有c都说,这是一个很好的例子/veya tokala ma yöntemlerine göre分类edilebililler。Çok al c vericinin etkin oldu u ok kanall MAC protokolleri daha gvenilir olsa da,她的bir dü m birden fazla radyo sa lamak donan m maliyetini art rmaktad r. g venilir ileti imi minimum maliyet gözeterek a rmark,但。Tek telsiz。Tek telsiz ok kanall MAC protokolleri, kabul edilen els k ma procse rne ba l olarak Tek veya ok randevulu olarak s n fland r labililler[12]。Tek randevulu MAC ialin yakla mlardan biri, veri kanal和malar ialin kannak vevar (S-D) padriftereri区域和ortak birkcontrol kanal和nkullan lmas[13]。Atanm control Kanal (DCC) protokolleri, tokala ma和amac - yla或bir control Kanal, iletimler ialin、oklu veri kanallar和kullanmaktad rlar。三种不同类型的热电联产、热电联产、热电联产、热电联产、热电联产、热电联产、热电联产、热电联产、热电联产、热电联产、热电联产、热电联产、热电联产、热电联产、热电联产、热电联产。奔驰ekilde, ortak bir kontrol正构醛ve coklu真实兹米kanallar aras nda geci yaparak iletimdeki de我im donemlerini gozeten bolunmu报道protokolleri de bulunmaktad r[2],[4]。Bölünmü faz protokoleri DCC tabanl protokoller gibi, tek telsizli a larda (tokala ma iin) control kanal ve (iletimler iin) veri kanallar aras and da gei yapmak iin tek bir al c -verici kullanmaktad rlar。978-1-7281-7206-4/20/$31.00©2020 IEEE Umuralp Kaytaz Elektrik ve Elektronik m hendisli i Koç Üniversitesi istanbul, trkiye ukaytaz@ku.edu.tr Sinem Çöleri Elektrik ve Elektronik m hendisli i Koç Üniversitesi istanbul, trkiye scoleri@ku.edu.tr Seyhan uarar InfoTech Arastirma Gelistirme Laboratuvari Toyota Motor Kuzey Amerika california, ABD seyhan.ucar@toyota.com
{"title":"A Performance Comparison of Single-Radio MultiChannel Medium Access Control Protocols","authors":"Umuralp Kaytaz, Seyhan Uçar, S. Coleri","doi":"10.1109/SIU49456.2020.9302437","DOIUrl":"https://doi.org/10.1109/SIU49456.2020.9302437","url":null,"abstract":"Single-radio multi-channel Medium Access Control (MAC) protocols aim to transmit in parallel on distinct channels while reducing the hardware cost. Although a variety of MAC protocols have been proposed in this context, no detailed classification and performance comparison is available. In this paper, we first classify previous efforts by their rendezvous characteristics as singleand multi-rendezvous protocols. Multirendezvous protocols have the capability of supporting simultaneous handshaking on different channels whereas with single-rendezvous protocols only asynchronous channel negotiations are allowed. Then, we further classify these protocols according to their spectrum decision mechanisms. We demonstrate the functionality of singleand multi-rendezvous protocols under different scenarios via extensive simulations. Our findings show that multi-rendezvous protocol performs better when the transmission range is low and less number of channels is available. Single-rendezvous protocols, on the other hand, are more suitable for networks with larger traffic loads due to their slot-based decision-making schemes. Keywords— medium access control (MAC), multi-channel, ad hoc network. I. G R Günümüzde kullan lan kablosuz a teknolojisinin büyük bir k sm , IEEE 802.11 standard na dayanmaktad r. IEEE 802.11'de bulunan Da t lm Koordinasyon Fonksiyonu (DCF), MAC katman nda tek bir kanal kullan r. Bundan dolay , tek bir kanaldaki a trafi i yükü, yüksek oranda paket çarp mas na ve performans n dü mesine neden olmaktad r. Çok kanall yap n n telsizlerin kanal de i tirme özelli i ile birlikte kullan lmas , farkl kanallarda e zamanl aktar m sa lamak için yayg n bir yakla md r. Bu nedenle, çok kanall yap daki ileti im, daha az kar l kl giri im, daha yüksek mekânsal yeniden kullan m ve geli mi a verimlili i ile sonuçlanmaktad r. Çok kanall ileti imde i levselli i artt rmak için birçok çal ma önerilmi tir [1]. Bu yakla mlar, al c say s na ve/veya tokala ma yöntemlerine göre kategorize edilebilirler. Çok al c vericinin etkin oldu u çok kanall MAC protokolleri daha güvenilir olsa da, her bir dü üm için birden fazla radyo sa lamak donan m maliyetini art rmaktad r. Güvenilir ileti imi minimum maliyet gözeterek ara t rmak için, bu çal mam zda yaln zca tek telsiz çok kanall MAC protokollerini incelemekteyiz. Tek telsiz çok-kanall MAC protokollerinin s n fland r lmas , Tablo I de gösterildi i gibidir. Tek telsiz çok kanall MAC protokolleri, kabul edilen el s k ma prosedürüne ba l olarak tek veya çok randevulu olarak s n fland r labilirler [12]. Tek randevulu MAC için yakla mlardan biri, veri kanal anla malar için kaynak ve var (S-D) çiftleri aras nda ortak bir kontrol kanal n n kullan lmas d r [13]. Atanm Kontrol Kanal (DCC) protokolleri, tokala ma amac yla ortak bir kontrol kanal , iletimler için ise çoklu veri kanallar n kullanmaktad rlar. Tek bir telsiz ile ortak bir kontrol kanal n n kullan lmas kanalda sadece bir S-D çiftinin tokala abilmesine sebep olmaktad r. E zama","PeriodicalId":312627,"journal":{"name":"2020 28th Signal Processing and Communications Applications Conference (SIU)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114492224","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Bolvadin Subsidence Analysis with Multi-Temporal InSAR Technique and Sentinel-1 Data 基于多时相InSAR技术和Sentinel-1数据的Bolvadin沉降分析
Pub Date : 2020-10-05 DOI: 10.1109/SIU49456.2020.9302459
M. Imamoglu, F. Kahraman, Z. Çakır, F. B. Sanli
Surface deformations in Bolvadin town without any devastating earthquakes have been observed in the last 10 years. In this study, ground deformation analysis of Bolvadin region was performed by Sentinel-1 synthetic aperture radar (SAR) data and multi-temporal SAR interferometry (InSAR) method. Sentinel-1 images obtained between October 2014 and October 2018 in ascending and descending orbits were processed with SNAP and StaMPS softwares. Deformation velocity maps and vertical displacement time series were produced and compared with geology and groundwater level of the region. Deformation velocity maps show significant subsidence in the region. The most severe subsidence, up to 35 mm/year, was found in the southern part of Bolvadin which is characterized by the presence of soft alluvial deposits. Both in long and short term, there was a strong correlation between the subsidence and the groundwater level. As a result, the high correlation of the vertical deformation velocity with lithological units and groundwater level indicates that subsidence in the region is probably due to the excessive use of groundwater.
Bolvadin镇的地表变形在过去的10年里没有任何破坏性的地震。本研究采用Sentinel-1合成孔径雷达(SAR)数据和多时相SAR干涉测量(InSAR)方法对Bolvadin地区进行地面变形分析。2014年10月至2018年10月在上升和下降轨道上获得的Sentinel-1图像使用SNAP和StaMPS软件进行处理。制作了变形速度图和垂直位移时间序列,并与该地区的地质和地下水位进行了对比。变形速度图显示该地区有明显的沉降。在Bolvadin南部发现了最严重的沉降,高达35毫米/年,其特征是存在软冲积矿床。在长期和短期内,沉降与地下水位之间都有很强的相关性。因此,垂直变形速度与岩性单元和地下水位的高度相关性表明,该地区的沉降可能是由于地下水的过度使用。
{"title":"Bolvadin Subsidence Analysis with Multi-Temporal InSAR Technique and Sentinel-1 Data","authors":"M. Imamoglu, F. Kahraman, Z. Çakır, F. B. Sanli","doi":"10.1109/SIU49456.2020.9302459","DOIUrl":"https://doi.org/10.1109/SIU49456.2020.9302459","url":null,"abstract":"Surface deformations in Bolvadin town without any devastating earthquakes have been observed in the last 10 years. In this study, ground deformation analysis of Bolvadin region was performed by Sentinel-1 synthetic aperture radar (SAR) data and multi-temporal SAR interferometry (InSAR) method. Sentinel-1 images obtained between October 2014 and October 2018 in ascending and descending orbits were processed with SNAP and StaMPS softwares. Deformation velocity maps and vertical displacement time series were produced and compared with geology and groundwater level of the region. Deformation velocity maps show significant subsidence in the region. The most severe subsidence, up to 35 mm/year, was found in the southern part of Bolvadin which is characterized by the presence of soft alluvial deposits. Both in long and short term, there was a strong correlation between the subsidence and the groundwater level. As a result, the high correlation of the vertical deformation velocity with lithological units and groundwater level indicates that subsidence in the region is probably due to the excessive use of groundwater.","PeriodicalId":312627,"journal":{"name":"2020 28th Signal Processing and Communications Applications Conference (SIU)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114762344","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Circular Postamble Structure Enabling Low Complexity Equalization in Frequency Domain for Noncausal Channels: Cyclic Suffix 一种可在频域实现非因果信道低复杂度均衡的循环postble结构:循环后缀
Pub Date : 2020-10-05 DOI: 10.1109/SIU49456.2020.9302079
Altuğ Kaya, G. M. Güvensen
Realizable root-raised cosine (RRC) filters have finite length. When these filters are used in transmitter and receiver side, frequency response of the effective filter does not have flat fading characteristic and it results two-sided intersymbol interference (ISI). In addition, relatively low up sampling factors result in synchronization errors and thus, two-sided ISI. Consequently, impulse response of the effective filter becomes noncausal. Moreover, nonlinearities in transmitter and receiver chains strengthen ISI. Such a channel-like behaviour of the noncausal effective filter can be overcome by conventional Half-Duplex systems where it should be avoided by In-Band Full-Duplex and higher order constellation systems due to being vulnerable to even low powered effects. In this article, we are providing a new cyclic postamble structure, namely Cyclic Suffix (CS), for constructing circularly symmetric convolution matrices for noncausal channels. CS provides the utilization of frequency domain equalization (FDE) in a low complex manner for cancelling the effects of such noncausal channels.
可实现的提升根余弦(RRC)滤波器具有有限的长度。当这些滤波器用于发送端和接收端时,有效滤波器的频率响应不具有平坦衰落特性,会产生双向码间干扰(ISI)。此外,相对较低的上采样因子会导致同步误差,从而导致双侧ISI。因此,有效滤波器的脉冲响应是非因果的。此外,发送和接收链的非线性增强了ISI。这种非因果有效滤波器的类信道行为可以被传统的半双工系统克服,而它应该被带内全双工和高阶星座系统避免,因为它们容易受到低功率的影响。在本文中,我们提供了一种新的循环后序结构,即循环后缀(CS),用于构造非因果通道的循环对称卷积矩阵。CS以一种低复杂度的方式利用频域均衡(FDE)来消除这种非因果信道的影响。
{"title":"A Circular Postamble Structure Enabling Low Complexity Equalization in Frequency Domain for Noncausal Channels: Cyclic Suffix","authors":"Altuğ Kaya, G. M. Güvensen","doi":"10.1109/SIU49456.2020.9302079","DOIUrl":"https://doi.org/10.1109/SIU49456.2020.9302079","url":null,"abstract":"Realizable root-raised cosine (RRC) filters have finite length. When these filters are used in transmitter and receiver side, frequency response of the effective filter does not have flat fading characteristic and it results two-sided intersymbol interference (ISI). In addition, relatively low up sampling factors result in synchronization errors and thus, two-sided ISI. Consequently, impulse response of the effective filter becomes noncausal. Moreover, nonlinearities in transmitter and receiver chains strengthen ISI. Such a channel-like behaviour of the noncausal effective filter can be overcome by conventional Half-Duplex systems where it should be avoided by In-Band Full-Duplex and higher order constellation systems due to being vulnerable to even low powered effects. In this article, we are providing a new cyclic postamble structure, namely Cyclic Suffix (CS), for constructing circularly symmetric convolution matrices for noncausal channels. CS provides the utilization of frequency domain equalization (FDE) in a low complex manner for cancelling the effects of such noncausal channels.","PeriodicalId":312627,"journal":{"name":"2020 28th Signal Processing and Communications Applications Conference (SIU)","volume":"132 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115059007","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Intelligent Edge Computing: State-of-the-art Techniques and Applications 智能边缘计算:最新技术和应用
Pub Date : 2020-10-05 DOI: 10.1109/SIU49456.2020.9302149
Waris Gill, Öznur Özkasap, Attila Gürsoy
To enable intelligent decisions at the network edge, supervised and unsupervised machine learning techniques and their variations are highly utilized in recent research studies. These include techniques and the corresponding applications such as detecting manufacturing faults in a smart factory setting, monitoring patient activities and health problems in smart health systems, detecting security attacks on the Internet of Things devices, and finding the rare events in the audio signals. In this paper, we present an extensive review of state-of-the-art techniques and applications of intelligent edge computing and provide classification and discussion of various approaches in this field.
为了在网络边缘实现智能决策,监督和无监督机器学习技术及其变体在最近的研究中得到了高度利用。其中包括技术和相应的应用,例如在智能工厂设置中检测制造故障,在智能卫生系统中监测患者活动和健康问题,检测物联网设备的安全攻击,以及在音频信号中发现罕见事件。在本文中,我们对智能边缘计算的最新技术和应用进行了广泛的回顾,并对该领域的各种方法进行了分类和讨论。
{"title":"Intelligent Edge Computing: State-of-the-art Techniques and Applications","authors":"Waris Gill, Öznur Özkasap, Attila Gürsoy","doi":"10.1109/SIU49456.2020.9302149","DOIUrl":"https://doi.org/10.1109/SIU49456.2020.9302149","url":null,"abstract":"To enable intelligent decisions at the network edge, supervised and unsupervised machine learning techniques and their variations are highly utilized in recent research studies. These include techniques and the corresponding applications such as detecting manufacturing faults in a smart factory setting, monitoring patient activities and health problems in smart health systems, detecting security attacks on the Internet of Things devices, and finding the rare events in the audio signals. In this paper, we present an extensive review of state-of-the-art techniques and applications of intelligent edge computing and provide classification and discussion of various approaches in this field.","PeriodicalId":312627,"journal":{"name":"2020 28th Signal Processing and Communications Applications Conference (SIU)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115061386","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performance of Alamouti STBC-NOMA Scheme Employing Different Transmit Antenna Selection Strategies 不同发射天线选择策略下Alamouti STBC-NOMA方案的性能
Pub Date : 2020-10-05 DOI: 10.1109/SIU49456.2020.9302378
Mehmet Zahid Kartal, A. Coşkun, Veyis Solak, H. Ilhan
In this paper, the average bit error rates of nonorthogonal multiple access (NOMA)schemes employing Alamouti space-time block coding (STBC) combined with different transmit antenna selection (TAS) strategies are investigated. With this purpose, the selection criteria that have been proposed for multiple-antenna schemes such as the conventional TAS (CTAS) scheme which relies on determining the antenna with the highest channel gain, TAS-maj scheme which is based on majority voting, and, AIA and A schemes which respectively activates the antenna that maximizes the users with the worst and best channel conditions, have been considered. Within this examination, the antenna selection strategies that are proposed for single TAS case (i.e., TAS-maj, AIA and A) are adapted to the case of determining two transmit antennas which would perform Alamouti codeword transmission. By using the Monte Carlo simulation method, the average bit error rate (BER) performance of each user at the downlink phase is examined for Rayleigh fading channels. After demonstrating the simulation results corresponding to the case of no antenna selection and the introduced TAS strategies, their advantages in terms of the average signal-to-noise ratio enhancements are exhibited. Keywords—Transmit Antenna Selection; Alamouti Space-Time Block Code; Non-Orthogonal Multiple Access; Bit Error Rate.
本文研究了采用Alamouti空时分组编码(STBC)和不同发射天线选择(TAS)策略的非正交多址(NOMA)方案的平均误码率。为此,考虑了多天线方案的选择标准,如依赖于确定具有最高信道增益的传统TAS (CTAS)方案,基于多数投票的TAS-maj方案,以及分别激活具有最坏和最佳信道条件下最大用户的天线的AIA和A方案。在本研究中,针对单个TAS情况(即TAS- major、AIA和A)提出的天线选择策略适用于确定执行Alamouti码字传输的两个发射天线的情况。采用蒙特卡罗仿真方法,研究了瑞利衰落信道下行阶段各用户的平均误码率(BER)性能。通过对无天线选择情况下的仿真结果和所引入的TAS策略的对比,展示了它们在平均信噪比增强方面的优势。关键词:发射天线选择;Alamouti空时分组码;非正交多址;误码率。
{"title":"Performance of Alamouti STBC-NOMA Scheme Employing Different Transmit Antenna Selection Strategies","authors":"Mehmet Zahid Kartal, A. Coşkun, Veyis Solak, H. Ilhan","doi":"10.1109/SIU49456.2020.9302378","DOIUrl":"https://doi.org/10.1109/SIU49456.2020.9302378","url":null,"abstract":"In this paper, the average bit error rates of nonorthogonal multiple access (NOMA)schemes employing Alamouti space-time block coding (STBC) combined with different transmit antenna selection (TAS) strategies are investigated. With this purpose, the selection criteria that have been proposed for multiple-antenna schemes such as the conventional TAS (CTAS) scheme which relies on determining the antenna with the highest channel gain, TAS-maj scheme which is based on majority voting, and, AIA and A schemes which respectively activates the antenna that maximizes the users with the worst and best channel conditions, have been considered. Within this examination, the antenna selection strategies that are proposed for single TAS case (i.e., TAS-maj, AIA and A) are adapted to the case of determining two transmit antennas which would perform Alamouti codeword transmission. By using the Monte Carlo simulation method, the average bit error rate (BER) performance of each user at the downlink phase is examined for Rayleigh fading channels. After demonstrating the simulation results corresponding to the case of no antenna selection and the introduced TAS strategies, their advantages in terms of the average signal-to-noise ratio enhancements are exhibited. Keywords—Transmit Antenna Selection; Alamouti Space-Time Block Code; Non-Orthogonal Multiple Access; Bit Error Rate.","PeriodicalId":312627,"journal":{"name":"2020 28th Signal Processing and Communications Applications Conference (SIU)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115098384","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Comparison of Regression Methods in Permission Based Android Malware Detection 基于权限的Android恶意软件检测回归方法比较
Pub Date : 2020-10-05 DOI: 10.1109/SIU49456.2020.9302502
Durmuş Özkan Şahin, Oğuz Emre Kural, S. Akleylek, E. Kılıç
In this study, applications developed for Android platforms are tested by static analysis based on machine learning. Permissions that have an important place in the security of the Android operating system are used as attributes. Using the regression techniques, which are among the types of machine learning, the applications are tested. Four different regression techniques are used in this study. These are linear regression, multilayered neural network, additive regression and regression techniques based on sequential minimal optimization. As a result of 10 cross-validations, the best result is obtained by linear regression, while the worst result is obtained by regression techniques based on sequential minimal optimization. The result obtained from linear regression is 0:8655 according to the Pearson correlation coefficient.
在本研究中,针对Android平台开发的应用程序通过基于机器学习的静态分析进行测试。在Android操作系统的安全性中具有重要地位的权限被用作属性。使用回归技术,这是机器学习的类型之一,测试应用程序。本研究使用了四种不同的回归技术。这些是线性回归、多层神经网络、加性回归和基于顺序最小优化的回归技术。经过10次交叉验证,线性回归得到了最好的结果,而基于顺序最小优化的回归技术得到了最差的结果。根据Pearson相关系数,线性回归的结果为0:8655。
{"title":"Comparison of Regression Methods in Permission Based Android Malware Detection","authors":"Durmuş Özkan Şahin, Oğuz Emre Kural, S. Akleylek, E. Kılıç","doi":"10.1109/SIU49456.2020.9302502","DOIUrl":"https://doi.org/10.1109/SIU49456.2020.9302502","url":null,"abstract":"In this study, applications developed for Android platforms are tested by static analysis based on machine learning. Permissions that have an important place in the security of the Android operating system are used as attributes. Using the regression techniques, which are among the types of machine learning, the applications are tested. Four different regression techniques are used in this study. These are linear regression, multilayered neural network, additive regression and regression techniques based on sequential minimal optimization. As a result of 10 cross-validations, the best result is obtained by linear regression, while the worst result is obtained by regression techniques based on sequential minimal optimization. The result obtained from linear regression is 0:8655 according to the Pearson correlation coefficient.","PeriodicalId":312627,"journal":{"name":"2020 28th Signal Processing and Communications Applications Conference (SIU)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117029973","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Characterization of Four Wave Mixing Effect in Dense Wavelength Division Multiplexing Systems 密集波分复用系统中四波混频效应的表征
Pub Date : 2020-10-05 DOI: 10.1109/SIU49456.2020.9302452
F. E. Durak, Ş. A. Sadık, K. Boumediene, M. Khelladi, A. Altuncu
This study presents the characterization of four wave mixing (FWM) effect in dense wavelength division multiplexing (DWDM) systems with two different types of optical fibers which are standard single mode fiber (S-SMF, G.652.D) and nonzero dispersion shifted fiber (NZDSF, G.655.C), respectively. The experimental observation of FWM effect at the received signal spectrum have shown that the increase in channel spacing reduces the power of FWM tone signals. Also, we have compared FWM penalty of DWDM signals transmitted in S-SMF and NZDSF by calculating FWM efficiency affected by the channel spacing. It was shown that when the channel spacing is smaller than 0.5 nm, the FWM efficiency in NZDSF is almost 15 dB higher than the FWM efficiency obtained in S-SMF. Moreover, the results have shown that for 10, 20, 30 km of NZDSF, the FWM efficiency tends to increase with optical fiber length.
采用标准单模光纤(S-SMF, G.652.D)和非零色散位移光纤(NZDSF, G.655.C)两种不同类型的光纤,研究了密集波分复用(DWDM)系统中的四波混频(FWM)效应。在接收信号频谱上对频混效应的实验观察表明,信道间距的增大会降低频混音信号的功率。通过计算信道间距对频分效率的影响,比较了在S-SMF和NZDSF中传输的DWDM信号的频分干扰。结果表明,当通道间距小于0.5 nm时,NZDSF的FWM效率比S-SMF的FWM效率高出近15 dB。此外,结果表明,对于10、20、30 km的NZDSF, FWM效率随光纤长度的增加而增加。
{"title":"Characterization of Four Wave Mixing Effect in Dense Wavelength Division Multiplexing Systems","authors":"F. E. Durak, Ş. A. Sadık, K. Boumediene, M. Khelladi, A. Altuncu","doi":"10.1109/SIU49456.2020.9302452","DOIUrl":"https://doi.org/10.1109/SIU49456.2020.9302452","url":null,"abstract":"This study presents the characterization of four wave mixing (FWM) effect in dense wavelength division multiplexing (DWDM) systems with two different types of optical fibers which are standard single mode fiber (S-SMF, G.652.D) and nonzero dispersion shifted fiber (NZDSF, G.655.C), respectively. The experimental observation of FWM effect at the received signal spectrum have shown that the increase in channel spacing reduces the power of FWM tone signals. Also, we have compared FWM penalty of DWDM signals transmitted in S-SMF and NZDSF by calculating FWM efficiency affected by the channel spacing. It was shown that when the channel spacing is smaller than 0.5 nm, the FWM efficiency in NZDSF is almost 15 dB higher than the FWM efficiency obtained in S-SMF. Moreover, the results have shown that for 10, 20, 30 km of NZDSF, the FWM efficiency tends to increase with optical fiber length.","PeriodicalId":312627,"journal":{"name":"2020 28th Signal Processing and Communications Applications Conference (SIU)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115993572","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Deep Learning-Based Fish Detection in Turbid Underwater Images 基于深度学习的浑浊水下图像鱼类检测
Pub Date : 2020-10-05 DOI: 10.1109/SIU49456.2020.9302150
Tansel Akgül, Nurullah Çalık, B. U. Töreyin
The successful results of the deep learning models in many areas have been the exit gateway to the problems faced in the challenging conditions of underwater studies. One of these problems is the detection of fish in images with a high turbid and background noise. Therefore, the detection of fish in turbid and background noisy water is an important threshold to be overcome to classify them and track their paths. In this study, videos were taken from the reservoir basin in Kahramanmaraş Ceyhan region with two different cameras. Then, a novel data set is presented which contains 400 images for the detection of fish in the wild. By using these data set, the state-of-the-art detection models, YOLO-V2, YOLO-V3, YOLO-V3 Tiny and MobileNet-SSD networks are trained with fine-tuning strategy, and then they are compared over the precision, recall and mean Average Precision (mAP) performances.
深度学习模型在许多领域的成功成果已经成为解决水下研究中面临的挑战性问题的出口门户。其中一个问题是在具有高浑浊和背景噪声的图像中检测鱼。因此,在浑浊和背景噪声的水中对鱼的检测是对鱼进行分类和跟踪的重要阈值。在本研究中,使用两台不同的摄像机从kahramanmaraki - Ceyhan地区的水库盆地拍摄视频。然后,提出了一个包含400张图像的新的数据集,用于检测野生鱼类。利用这些数据集,采用微调策略对最先进的检测模型YOLO-V2、YOLO-V3、YOLO-V3 Tiny和MobileNet-SSD网络进行了训练,并对它们的精度、召回率和平均平均精度(mAP)进行了比较。
{"title":"Deep Learning-Based Fish Detection in Turbid Underwater Images","authors":"Tansel Akgül, Nurullah Çalık, B. U. Töreyin","doi":"10.1109/SIU49456.2020.9302150","DOIUrl":"https://doi.org/10.1109/SIU49456.2020.9302150","url":null,"abstract":"The successful results of the deep learning models in many areas have been the exit gateway to the problems faced in the challenging conditions of underwater studies. One of these problems is the detection of fish in images with a high turbid and background noise. Therefore, the detection of fish in turbid and background noisy water is an important threshold to be overcome to classify them and track their paths. In this study, videos were taken from the reservoir basin in Kahramanmaraş Ceyhan region with two different cameras. Then, a novel data set is presented which contains 400 images for the detection of fish in the wild. By using these data set, the state-of-the-art detection models, YOLO-V2, YOLO-V3, YOLO-V3 Tiny and MobileNet-SSD networks are trained with fine-tuning strategy, and then they are compared over the precision, recall and mean Average Precision (mAP) performances.","PeriodicalId":312627,"journal":{"name":"2020 28th Signal Processing and Communications Applications Conference (SIU)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122047672","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
期刊
2020 28th Signal Processing and Communications Applications Conference (SIU)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1