首页 > 最新文献

2013 International Conference on Intelligent Systems and Signal Processing (ISSP)最新文献

英文 中文
Applications of MFCC and Vector Quantization in speaker recognition MFCC和矢量量化在说话人识别中的应用
Pub Date : 2013-03-01 DOI: 10.1109/ISSP.2013.6526896
A. Gupta, H. Gupta
In speaker recognition, most of the computation originates from the likelihood computations between feature vectors of the unknown speaker and the models in the database. In this paper, we concentrate on optimizing Mel Frequency Cepstral Coefficient (MFCC) for feature extraction and Vector Quantization (VQ) for feature modeling. We reduce the number of feature vectors by pre-quantizing the test sequence prior to matching, and number of speakers by ruling out unlikely speakers during recognition process. The two important parameters, Recognition rate and minimized Average Distance between the samples, depends on the codebook size and the number of cepstral coefficients. We find, that this approach yields significant performance when the changes are made in the number of mfcc's and the codebook size. Recognition rate is found to reach upto 89% and the distortion reduced upto 69%.
在说话人识别中,大部分的计算来源于未知说话人的特征向量与数据库中的模型之间的似然计算。在本文中,我们专注于优化Mel频率倒谱系数(MFCC)用于特征提取和矢量量化(VQ)用于特征建模。我们在匹配之前通过对测试序列进行预量化来减少特征向量的数量,在识别过程中通过排除不可能的说话人来减少说话人的数量。识别率和样本间最小平均距离这两个重要参数取决于码本的大小和倒谱系数的数量。我们发现,当mfcc的数量和码本大小发生变化时,这种方法产生了显著的性能。识别率高达89%,失真率降低了69%。
{"title":"Applications of MFCC and Vector Quantization in speaker recognition","authors":"A. Gupta, H. Gupta","doi":"10.1109/ISSP.2013.6526896","DOIUrl":"https://doi.org/10.1109/ISSP.2013.6526896","url":null,"abstract":"In speaker recognition, most of the computation originates from the likelihood computations between feature vectors of the unknown speaker and the models in the database. In this paper, we concentrate on optimizing Mel Frequency Cepstral Coefficient (MFCC) for feature extraction and Vector Quantization (VQ) for feature modeling. We reduce the number of feature vectors by pre-quantizing the test sequence prior to matching, and number of speakers by ruling out unlikely speakers during recognition process. The two important parameters, Recognition rate and minimized Average Distance between the samples, depends on the codebook size and the number of cepstral coefficients. We find, that this approach yields significant performance when the changes are made in the number of mfcc's and the codebook size. Recognition rate is found to reach upto 89% and the distortion reduced upto 69%.","PeriodicalId":354719,"journal":{"name":"2013 International Conference on Intelligent Systems and Signal Processing (ISSP)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125653133","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Comparative analysis of web security in open source content management system 开源内容管理系统中web安全性的比较分析
Pub Date : 2013-03-01 DOI: 10.1109/ISSP.2013.6526932
S. K. Patel, V. R. Rathod, J. Prajapati
Internet has become priceless tool that enables corporate world to show their capabilities. While Web applications have gained importance on the Internet, security is the only thing to worry. Business data is very critical that floats on the cloud and that's why Web Application Security is rapidly becoming a growing concern for all enterprises. In this paper we tried to show what is Hacking and its symptoms. In web development Content Management System (CMS) is gaining so much popularity as it uses to make easy editing and publishing process for novice even if he doesn't know web programming. There are over thousand of open source CMS available in the market. When we just talk about content management concept two or three names like Joomla, Drupal and WordPress strike in mind. As these are the one of the best CMSs in the market and their community provides nice basic security still we want to compare these CMS and want to know which CMS provides best security. To do the comparison we have done two case studies. In case 1 we have developed one common page in all CMS and host it then after we have applied different web attacks like SQLi, XSS, CSRF etc. and derived their hacking results. In case 2 we used Acunetix WVS Reporter v6.0 to find out the strength of security in different CMS. Apart from this we also try to find out Broken links in all listed CMSs.
互联网已经成为企业展示自身能力的无价工具。虽然Web应用程序在Internet上变得越来越重要,但安全性是唯一需要担心的事情。漂浮在云上的业务数据非常关键,这就是为什么Web应用程序安全性正迅速成为所有企业日益关注的问题。在本文中,我们试图说明什么是黑客及其症状。在web开发中,内容管理系统(CMS)越来越受欢迎,因为它可以使不懂web编程的新手轻松编辑和发布过程。市场上有上千种开源CMS。当我们谈论内容管理概念时,脑海中会浮现出两三个名字,比如Joomla、Drupal和WordPress。由于这些是市场上最好的CMS之一,他们的社区提供了很好的基本安全性,我们仍然想比较这些CMS,并想知道哪个CMS提供了最好的安全性。为了进行比较,我们做了两个案例研究。在案例1中,我们在所有CMS中开发了一个通用页面并托管它,然后我们应用了不同的web攻击,如SQLi, XSS, CSRF等,并获得了他们的黑客攻击结果。在案例2中,我们使用Acunetix WVS Reporter v6.0来找出不同CMS的安全强度。除此之外,我们还试图找出所有列出的cms中的坏链接。
{"title":"Comparative analysis of web security in open source content management system","authors":"S. K. Patel, V. R. Rathod, J. Prajapati","doi":"10.1109/ISSP.2013.6526932","DOIUrl":"https://doi.org/10.1109/ISSP.2013.6526932","url":null,"abstract":"Internet has become priceless tool that enables corporate world to show their capabilities. While Web applications have gained importance on the Internet, security is the only thing to worry. Business data is very critical that floats on the cloud and that's why Web Application Security is rapidly becoming a growing concern for all enterprises. In this paper we tried to show what is Hacking and its symptoms. In web development Content Management System (CMS) is gaining so much popularity as it uses to make easy editing and publishing process for novice even if he doesn't know web programming. There are over thousand of open source CMS available in the market. When we just talk about content management concept two or three names like Joomla, Drupal and WordPress strike in mind. As these are the one of the best CMSs in the market and their community provides nice basic security still we want to compare these CMS and want to know which CMS provides best security. To do the comparison we have done two case studies. In case 1 we have developed one common page in all CMS and host it then after we have applied different web attacks like SQLi, XSS, CSRF etc. and derived their hacking results. In case 2 we used Acunetix WVS Reporter v6.0 to find out the strength of security in different CMS. Apart from this we also try to find out Broken links in all listed CMSs.","PeriodicalId":354719,"journal":{"name":"2013 International Conference on Intelligent Systems and Signal Processing (ISSP)","volume":"134 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133500839","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Design of new scheduling algorithm LLF_DM and its comparison with existing EDF, LLF, and DM algorithms for periodic tasks 设计新的周期任务调度算法LLF_DM,并与现有的EDF、LLF和DM算法进行比较
Pub Date : 2013-03-01 DOI: 10.1109/ISSP.2013.6526871
V. Prajapati, Apurva Shah, Prem Balani
The most challenging part of scheduling in real time systems is to achieve successful completion of a job before its deadline. Mainly two categories of algorithms i.e. static and dynamic tried to achieve this but both categories failed either in under-loaded condition or in over-loaded condition. Dynamic algorithms achieve optimum results in under-loaded condition but fail to achieve the same in over-loaded condition. On the other side static algorithms do not achieve optimum performance in underloaded condition but perform well in over-loaded condition. So our idea behind designing new scheduling algorithm is to achieve optimum performance in under-loaded condition and to achieve high performance in over-loaded condition. To achieve this we schedule jobs according to dynamic scheduling algorithm LLF (Least Laxity First) when system is under-loaded and when system becomes overloaded we schedule jobs according to static algorithm DM (Deadline Monotonic). In this paper we have proposed a LLF_DM algorithm which achieves optimum performance in under-loaded condition and achieves very high performance in over loaded condition.
实时系统调度中最具挑战性的部分是在截止日期之前成功完成任务。主要有两类算法,即静态和动态,试图实现这一点,但这两类算法在负载不足或过载的情况下都失败了。动态算法在欠载情况下能达到最优效果,而在过载情况下不能达到最优效果。另一方面,静态算法在欠载情况下不能达到最佳性能,但在过载情况下表现良好。因此,我们设计新的调度算法的思想是在低负载条件下实现最优性能,在过载条件下实现高性能。为了实现这一目标,我们在系统负载不足时根据动态调度算法LLF (Least Laxity First)调度作业,当系统过载时根据静态调度算法DM (Deadline Monotonic)调度作业。在本文中,我们提出了一种LLF_DM算法,该算法在低负载条件下达到最佳性能,在过载条件下达到非常高的性能。
{"title":"Design of new scheduling algorithm LLF_DM and its comparison with existing EDF, LLF, and DM algorithms for periodic tasks","authors":"V. Prajapati, Apurva Shah, Prem Balani","doi":"10.1109/ISSP.2013.6526871","DOIUrl":"https://doi.org/10.1109/ISSP.2013.6526871","url":null,"abstract":"The most challenging part of scheduling in real time systems is to achieve successful completion of a job before its deadline. Mainly two categories of algorithms i.e. static and dynamic tried to achieve this but both categories failed either in under-loaded condition or in over-loaded condition. Dynamic algorithms achieve optimum results in under-loaded condition but fail to achieve the same in over-loaded condition. On the other side static algorithms do not achieve optimum performance in underloaded condition but perform well in over-loaded condition. So our idea behind designing new scheduling algorithm is to achieve optimum performance in under-loaded condition and to achieve high performance in over-loaded condition. To achieve this we schedule jobs according to dynamic scheduling algorithm LLF (Least Laxity First) when system is under-loaded and when system becomes overloaded we schedule jobs according to static algorithm DM (Deadline Monotonic). In this paper we have proposed a LLF_DM algorithm which achieves optimum performance in under-loaded condition and achieves very high performance in over loaded condition.","PeriodicalId":354719,"journal":{"name":"2013 International Conference on Intelligent Systems and Signal Processing (ISSP)","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114834714","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
ADPLL design and implementation on FPGA ADPLL的FPGA设计与实现
Pub Date : 2013-03-01 DOI: 10.1109/ISSP.2013.6526917
K. Lata, M. Kumar
This paper presents the ADPLL design using Verilog and its implementation on FPGA. ADPLL is designed using Verilog HDL. Xilinx ISE 10.1 Simulator is used for simulating Verilog Code. This paper gives details of the basic blocks of an ADPLL. In this paper, implementation of ADPLL is described in detail. Its simulation results using Xilinx are also discussed. It also presents the FPGA implementation of ADPLL design on Xilinx vertex5 xc5vlx110t chip and its results. The ADPLL is designed of 200 kHz central frequency. The operational frequency range of ADPLL is 189 Hz to 215 kHz, which is lock range of the design.
本文介绍了基于Verilog的ADPLL设计及其在FPGA上的实现。ADPLL采用Verilog HDL进行设计。Xilinx ISE 10.1 Simulator用于模拟Verilog Code。本文详细介绍了ADPLL的基本模块。本文详细介绍了ADPLL的实现方法。文中还讨论了Xilinx软件的仿真结果。并给出了在Xilinx vertex5 xc5vlx110t芯片上ADPLL设计的FPGA实现及其结果。ADPLL的中心频率为200khz。ADPLL的工作频率范围为189hz ~ 215khz,是本设计的锁定范围。
{"title":"ADPLL design and implementation on FPGA","authors":"K. Lata, M. Kumar","doi":"10.1109/ISSP.2013.6526917","DOIUrl":"https://doi.org/10.1109/ISSP.2013.6526917","url":null,"abstract":"This paper presents the ADPLL design using Verilog and its implementation on FPGA. ADPLL is designed using Verilog HDL. Xilinx ISE 10.1 Simulator is used for simulating Verilog Code. This paper gives details of the basic blocks of an ADPLL. In this paper, implementation of ADPLL is described in detail. Its simulation results using Xilinx are also discussed. It also presents the FPGA implementation of ADPLL design on Xilinx vertex5 xc5vlx110t chip and its results. The ADPLL is designed of 200 kHz central frequency. The operational frequency range of ADPLL is 189 Hz to 215 kHz, which is lock range of the design.","PeriodicalId":354719,"journal":{"name":"2013 International Conference on Intelligent Systems and Signal Processing (ISSP)","volume":"145 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125419055","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Security attacks in wireless sensor networks: A survey 无线传感器网络中的安全攻击:综述
Pub Date : 2013-03-01 DOI: 10.1109/ISSP.2013.6526929
Manish Patel, A. Aggarwal
Wireless Sensor Network (WSN) is being emerged as a prevailing technology in future due to its wide range of applications in military and civilian domains. These networks are easily prone to security attacks, since once deployed these networks are unattended and unprotected. Some of the inherent features like limited battery and low memory make sensor networks infeasible to use conventional security solutions. There are lot of attacks on these networks which can be classified as routing attacks and data traffic attacks. Some of the data attacks in sensor nodes are wormhole, jamming, selective forwarding, sinkhole and Sybil attack. In this paper, we discussed about all these attacks and some of the mitigation schemes to defend these attacks.
无线传感器网络(WSN)由于其在军事和民用领域的广泛应用,正在成为未来的主流技术。这些网络很容易受到安全攻击,因为一旦部署,这些网络就无人值守和不受保护。一些固有的特性,如有限的电池和低内存,使得传感器网络无法使用传统的安全解决方案。这些网络中存在着大量的攻击,可以分为路由攻击和数据流量攻击。对传感器节点的数据攻击主要有虫洞攻击、干扰攻击、选择性转发攻击、天坑攻击和Sybil攻击。在本文中,我们讨论了所有这些攻击以及防御这些攻击的一些缓解方案。
{"title":"Security attacks in wireless sensor networks: A survey","authors":"Manish Patel, A. Aggarwal","doi":"10.1109/ISSP.2013.6526929","DOIUrl":"https://doi.org/10.1109/ISSP.2013.6526929","url":null,"abstract":"Wireless Sensor Network (WSN) is being emerged as a prevailing technology in future due to its wide range of applications in military and civilian domains. These networks are easily prone to security attacks, since once deployed these networks are unattended and unprotected. Some of the inherent features like limited battery and low memory make sensor networks infeasible to use conventional security solutions. There are lot of attacks on these networks which can be classified as routing attacks and data traffic attacks. Some of the data attacks in sensor nodes are wormhole, jamming, selective forwarding, sinkhole and Sybil attack. In this paper, we discussed about all these attacks and some of the mitigation schemes to defend these attacks.","PeriodicalId":354719,"journal":{"name":"2013 International Conference on Intelligent Systems and Signal Processing (ISSP)","volume":"249 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124005274","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 69
Virtual offense in Maharashtra (India): Legend and truth? 印度马哈拉施特拉邦的虚拟进攻:传说和真相?
Pub Date : 2013-03-01 DOI: 10.1109/ISSP.2013.6526927
Mr. D. S. Jadhav
There is a common reaction that Internet crime is an highly developed category of crime that has not yet break into developed state in India like Maharashtra. The cheerful environment of the Internet in which everybody distributes whatever thing at anytime poses a serious defense hazard for every state in India. Alas, there are no official reports about this category of crime for Maharashtra. Possibly will this indicate that it does not exist there? Here we carry out an independent investigate to find out whether cyber crimes have affected public in Maharashtra and if so, to find out where they are reported.
有一种普遍的反应是,网络犯罪是一种高度发达的犯罪类别,尚未进入印度马哈拉施特拉邦等发达国家。互联网的欢快环境,任何人都可以在任何时候分发任何东西,这对印度的每个州都构成了严重的国防威胁。唉,马哈拉施特拉邦没有关于这类犯罪的官方报告。这可能表明它不存在吗?在这里,我们进行了一项独立调查,以查明网络犯罪是否影响了马哈拉施特拉邦的公众,如果是的话,找出他们的报告地点。
{"title":"Virtual offense in Maharashtra (India): Legend and truth?","authors":"Mr. D. S. Jadhav","doi":"10.1109/ISSP.2013.6526927","DOIUrl":"https://doi.org/10.1109/ISSP.2013.6526927","url":null,"abstract":"There is a common reaction that Internet crime is an highly developed category of crime that has not yet break into developed state in India like Maharashtra. The cheerful environment of the Internet in which everybody distributes whatever thing at anytime poses a serious defense hazard for every state in India. Alas, there are no official reports about this category of crime for Maharashtra. Possibly will this indicate that it does not exist there? Here we carry out an independent investigate to find out whether cyber crimes have affected public in Maharashtra and if so, to find out where they are reported.","PeriodicalId":354719,"journal":{"name":"2013 International Conference on Intelligent Systems and Signal Processing (ISSP)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122492370","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Relevant hex patterns for malcode detection 用于恶意代码检测的相关十六进制模式
Pub Date : 2013-03-01 DOI: 10.1109/ISSP.2013.6526930
Smita Naval, Y. Meena, V. Laxmi, P. Vinod
Malware poses a big threat to computer systems now a days. Malware authors often use encryption/compression methods to conceal their malicious executables data and code. These methods that transform some or all of the original bytes into a series of random looking data bytes appear in 80 to 90% of malware samples. This fact creates special challenges for anti-virus scanners who use static and dynamic methods to analyze large malware collections. In this paper we propose a method to identify malware executables by reading initial 2500 byte patterns of the sample. Our method reduces overall scanner execution time by considering 2500 bytes instead of whole file. Experimental results are evaluated using different classification algorithms (Random Forest, Ada-Boost, IBK, J48, Naïve-Bayes) followed by a feature selection method.
如今,恶意软件对计算机系统构成了巨大的威胁。恶意软件作者经常使用加密/压缩方法来隐藏其恶意可执行数据和代码。这些将部分或全部原始字节转换为一系列随机数据字节的方法出现在80%到90%的恶意软件样本中。这一事实给使用静态和动态方法分析大型恶意软件集合的反病毒扫描程序带来了特殊的挑战。本文提出了一种通过读取样本的初始2500字节模式来识别恶意软件可执行文件的方法。我们的方法通过考虑2500字节而不是整个文件来减少整个扫描程序的执行时间。使用不同的分类算法(Random Forest, Ada-Boost, IBK, J48, Naïve-Bayes)对实验结果进行评估,然后采用特征选择方法。
{"title":"Relevant hex patterns for malcode detection","authors":"Smita Naval, Y. Meena, V. Laxmi, P. Vinod","doi":"10.1109/ISSP.2013.6526930","DOIUrl":"https://doi.org/10.1109/ISSP.2013.6526930","url":null,"abstract":"Malware poses a big threat to computer systems now a days. Malware authors often use encryption/compression methods to conceal their malicious executables data and code. These methods that transform some or all of the original bytes into a series of random looking data bytes appear in 80 to 90% of malware samples. This fact creates special challenges for anti-virus scanners who use static and dynamic methods to analyze large malware collections. In this paper we propose a method to identify malware executables by reading initial 2500 byte patterns of the sample. Our method reduces overall scanner execution time by considering 2500 bytes instead of whole file. Experimental results are evaluated using different classification algorithms (Random Forest, Ada-Boost, IBK, J48, Naïve-Bayes) followed by a feature selection method.","PeriodicalId":354719,"journal":{"name":"2013 International Conference on Intelligent Systems and Signal Processing (ISSP)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131162931","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Lifetime prolonging in LEACH protocol for wireless sensor networks 无线传感器网络LEACH协议的寿命延长
Pub Date : 2013-03-01 DOI: 10.1109/ISSP.2013.6526933
Ashish Christian, H. Soni
The expeditious transformation of hardware technology has empowered the reinforcement of small, inexpensive, static and dynamic powerful sensor nodes, which are capable of sensing, computation and wireless communication on wide range of frequency with various modulation technique. This revolutionizes the implementation of wireless sensor network for considerable dimensions like overseeing some geographic area and parameter collection task. However, a limited energy constraint presents a major challenge such vision to become reality. In this paper we have attempted to explain how the wireless sensor networks are formed and how the various nodes present in those networks act as interdependent communicating nodes. LEACH (Low Energy Adaptive Clustering Hierarchy) [2] is one of the popular cluster-based structures, which has been widely proposed in wireless sensor networks. We are proposing the iLeach protocol (Improved Low-Energy Adaptive Clustering Hierarchy) and comparing to LEACH protocol. Lifetime of sensors is evaluated in terms of FND (First Node Dies) and HND (Half of the Nodes Die) [11] which will take care for the reliability and power efficiency of a wireless sensor network.
硬件技术的飞速发展使小型、廉价、静态和动态功能强大的传感器节点得以加强,这些传感器节点能够通过各种调制技术在宽频率范围内进行传感、计算和无线通信。这就彻底改变了无线传感器网络在相当大的维度上的实现,比如监控某些地理区域和参数收集任务。然而,有限的能源限制对这一愿景的实现提出了重大挑战。在本文中,我们试图解释无线传感器网络是如何形成的,以及这些网络中存在的各种节点如何作为相互依赖的通信节点。LEACH (Low Energy Adaptive Clustering Hierarchy,低能量自适应聚类结构)[2]是一种流行的基于聚类的结构,在无线传感器网络中被广泛提出。提出了改进的低能量自适应聚类层次结构(iLeach)协议,并与LEACH协议进行了比较。传感器的寿命是根据FND(第一节点死亡)和HND(一半节点死亡)来评估的[11],这将照顾到无线传感器网络的可靠性和功率效率。
{"title":"Lifetime prolonging in LEACH protocol for wireless sensor networks","authors":"Ashish Christian, H. Soni","doi":"10.1109/ISSP.2013.6526933","DOIUrl":"https://doi.org/10.1109/ISSP.2013.6526933","url":null,"abstract":"The expeditious transformation of hardware technology has empowered the reinforcement of small, inexpensive, static and dynamic powerful sensor nodes, which are capable of sensing, computation and wireless communication on wide range of frequency with various modulation technique. This revolutionizes the implementation of wireless sensor network for considerable dimensions like overseeing some geographic area and parameter collection task. However, a limited energy constraint presents a major challenge such vision to become reality. In this paper we have attempted to explain how the wireless sensor networks are formed and how the various nodes present in those networks act as interdependent communicating nodes. LEACH (Low Energy Adaptive Clustering Hierarchy) [2] is one of the popular cluster-based structures, which has been widely proposed in wireless sensor networks. We are proposing the iLeach protocol (Improved Low-Energy Adaptive Clustering Hierarchy) and comparing to LEACH protocol. Lifetime of sensors is evaluated in terms of FND (First Node Dies) and HND (Half of the Nodes Die) [11] which will take care for the reliability and power efficiency of a wireless sensor network.","PeriodicalId":354719,"journal":{"name":"2013 International Conference on Intelligent Systems and Signal Processing (ISSP)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130755657","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
Improved histogram bin shifting based reversible watermarking 改进的基于直方图bin移位的可逆水印
Pub Date : 2013-03-01 DOI: 10.1109/ISSP.2013.6526875
P. Nagarju, R. Naskar, R. Chakraborty
Reversible w atermarking constitutes a class of fragile digital watermarking techniques that find application in authentication of medical and military imagery. Reversible watermarking techniques ensure that after watermark extraction, the original cover image can be recovered from the watermarked image pixel-by-pixel. In this paper, we propose a novel reversible watermarking technique as an improved modification of the existing histogram bin shifting technique. We develop an optimal selection scheme for the “embedding point” (grayscale value of the pixels hosting the watermark), and take advantage of multiple zero frequency pixel values (if available) in the given image to embed the watermark. Experimental results for a set of images show that the adoption of these techniques improves the peak signal-to-noise ratio (PSNR) of the watermarked image compared to previously proposed histogram bin shifting techniques.
可逆水印是一类脆弱的数字水印技术,应用于医学和军事图像的认证。可逆水印技术保证了水印提取后,可以逐像素地从水印图像中恢复原封面图像。本文提出了一种新的可逆水印技术,作为现有直方图本移技术的改进改进。我们开发了“嵌入点”(承载水印的像素的灰度值)的最佳选择方案,并利用给定图像中的多个零频率像素值(如果可用)来嵌入水印。一组图像的实验结果表明,与之前提出的直方图bin移位技术相比,采用这些技术提高了水印图像的峰值信噪比(PSNR)。
{"title":"Improved histogram bin shifting based reversible watermarking","authors":"P. Nagarju, R. Naskar, R. Chakraborty","doi":"10.1109/ISSP.2013.6526875","DOIUrl":"https://doi.org/10.1109/ISSP.2013.6526875","url":null,"abstract":"Reversible w atermarking constitutes a class of fragile digital watermarking techniques that find application in authentication of medical and military imagery. Reversible watermarking techniques ensure that after watermark extraction, the original cover image can be recovered from the watermarked image pixel-by-pixel. In this paper, we propose a novel reversible watermarking technique as an improved modification of the existing histogram bin shifting technique. We develop an optimal selection scheme for the “embedding point” (grayscale value of the pixels hosting the watermark), and take advantage of multiple zero frequency pixel values (if available) in the given image to embed the watermark. Experimental results for a set of images show that the adoption of these techniques improves the peak signal-to-noise ratio (PSNR) of the watermarked image compared to previously proposed histogram bin shifting techniques.","PeriodicalId":354719,"journal":{"name":"2013 International Conference on Intelligent Systems and Signal Processing (ISSP)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125063678","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Wavelet based image fusion techniques 基于小波的图像融合技术
Pub Date : 2013-03-01 DOI: 10.1109/ISSP.2013.6526878
P. M. Pradnya, D. Sachin
The fusion of images is the process of combining two or more images into a single image retaining important features from each. Fusion is an important technique within many disparate fields such as remote sensing, robotics and medical applications. The result of image fusion is a single image which is more suitable for human and machine perception or further image-processing tasks. The image fusion algorithm based on wavelet transform is proposed to prove the geometric resolution of the images, in which two images to be processed are firstly decomposed into sub images and then the information is performed using these images under the certain criteria and finally these sub images are reconstructed into result image with plentiful information. In this paper three different image fusion methods based wavelet transform are implemented. And the results are compared and best method is found.
图像融合是将两幅或多幅图像合并成一幅图像的过程,其中保留了每幅图像的重要特征。融合是许多不同领域的重要技术,如遥感、机器人和医疗应用。图像融合的结果是一个更适合人类和机器感知或进一步的图像处理任务的单一图像。为了证明图像的几何分辨率,提出了基于小波变换的图像融合算法,该算法首先将待处理的两幅图像分解成子图像,然后根据一定的准则对这些子图像进行信息处理,最后将这些子图像重构成信息丰富的结果图像。本文实现了三种基于小波变换的图像融合方法。并对结果进行了比较,找到了最佳方法。
{"title":"Wavelet based image fusion techniques","authors":"P. M. Pradnya, D. Sachin","doi":"10.1109/ISSP.2013.6526878","DOIUrl":"https://doi.org/10.1109/ISSP.2013.6526878","url":null,"abstract":"The fusion of images is the process of combining two or more images into a single image retaining important features from each. Fusion is an important technique within many disparate fields such as remote sensing, robotics and medical applications. The result of image fusion is a single image which is more suitable for human and machine perception or further image-processing tasks. The image fusion algorithm based on wavelet transform is proposed to prove the geometric resolution of the images, in which two images to be processed are firstly decomposed into sub images and then the information is performed using these images under the certain criteria and finally these sub images are reconstructed into result image with plentiful information. In this paper three different image fusion methods based wavelet transform are implemented. And the results are compared and best method is found.","PeriodicalId":354719,"journal":{"name":"2013 International Conference on Intelligent Systems and Signal Processing (ISSP)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127117335","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 39
期刊
2013 International Conference on Intelligent Systems and Signal Processing (ISSP)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1