首页 > 最新文献

2013 13th International Symposium on Communications and Information Technologies (ISCIT)最新文献

英文 中文
MCMA equalization without signal permutation for MIMO-OFDM systems using M-QAM 基于M-QAM的MIMO-OFDM系统的无信号置换MCMA均衡
Masathune Ishihara, N. Sasaoka, I. Yoshio, J. Okello
We propose a blind equalization system using an all-pass filter for de-mixing orthogonal frequency division multiplexing (OFDM) symbols in multiple-input multiple-output (MIMO) - OFDM system. In a conventional blind MIMO equalization, there is a possibility that originally transmitted streams are permutated, resulting in being unable to retrieve desired signals at the receiver. In order to solve the problem, each transmitted stream of the proposed MIMO-OFDM system is pre-filtered by a unique all-pass filter. The filter is referred to as Transmit tagging filter (TT-Filter) in this paper. At a receiver, an inverse filter of the TT-filter is used to blindly equalize a MIMO channel without any permutation. The system was originally designed for constant modulus symbol such as PSK signal. This paper evaluates the performance of a QAM Transmission which is non-constant.
针对多输入多输出(MIMO) - OFDM系统中正交频分复用(OFDM)符号的解混问题,提出了一种采用全通滤波器的盲均衡系统。在传统的盲MIMO均衡中,存在一种可能,即最初传输的流被排列,导致无法在接收器处检索所需的信号。为了解决这一问题,MIMO-OFDM系统的每个传输流都通过一个唯一的全通滤波器进行预滤波。本文将该滤波器称为传输标签滤波器(TT-Filter)。在接收端,采用tt滤波器的逆滤波器对MIMO信道进行无置换盲均衡。该系统最初是针对PSK信号等恒模符号设计的。本文对非常数QAM传输的性能进行了评价。
{"title":"MCMA equalization without signal permutation for MIMO-OFDM systems using M-QAM","authors":"Masathune Ishihara, N. Sasaoka, I. Yoshio, J. Okello","doi":"10.1109/ISCIT.2013.6645831","DOIUrl":"https://doi.org/10.1109/ISCIT.2013.6645831","url":null,"abstract":"We propose a blind equalization system using an all-pass filter for de-mixing orthogonal frequency division multiplexing (OFDM) symbols in multiple-input multiple-output (MIMO) - OFDM system. In a conventional blind MIMO equalization, there is a possibility that originally transmitted streams are permutated, resulting in being unable to retrieve desired signals at the receiver. In order to solve the problem, each transmitted stream of the proposed MIMO-OFDM system is pre-filtered by a unique all-pass filter. The filter is referred to as Transmit tagging filter (TT-Filter) in this paper. At a receiver, an inverse filter of the TT-filter is used to blindly equalize a MIMO channel without any permutation. The system was originally designed for constant modulus symbol such as PSK signal. This paper evaluates the performance of a QAM Transmission which is non-constant.","PeriodicalId":356009,"journal":{"name":"2013 13th International Symposium on Communications and Information Technologies (ISCIT)","volume":"150 6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130946211","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A new user cooperative protocol based on code-shifted differential chaos shift keying modulation 一种基于码移差分混沌移键控调制的新型用户协作协议
Weikai Xu, Lin Wang, Zhuhan Jiang
In this paper, a new cooperative protocol based on code-shifted differential chaos shift keying (CS-DCSK) modulation, which is an improved differential chaos shifted keying modulation scheme no requirement delay circuits at autocorrelation receiver (AcR), is proposed. The relay user transmits own data while piggybacks other user's data which are received and decoded at pre-phase utilizing the multiple bit-streams transmission property of generalized CS-DCSK (GCS-DCSK). Moreover, the cooperative user may forward the estimated data only when its data is correctly decoded using cyclic redundancy check (CRC) code, namely selective decode-and-forward (DAF). Simulation results show that the proposed protocol has better performance than that of conventional four phase cooperative protocol in bit error rate (BER) and system throughput.
本文提出了一种新的基于码移差分混沌键控(CS-DCSK)调制的协作协议,该协议是一种改进的不需要自相关接收机(AcR)延迟电路的差分混沌键控调制方案。中继用户传输自己的数据,同时承载其他用户的数据,这些数据利用广义CS-DCSK (GCS-DCSK)的多比特流传输特性在前期接收和解码。此外,只有当其数据使用循环冗余校验(CRC)码,即选择性解码转发(DAF)正确解码时,协作用户才能转发估计的数据。仿真结果表明,该协议在误码率和系统吞吐量方面都优于传统的四相协作协议。
{"title":"A new user cooperative protocol based on code-shifted differential chaos shift keying modulation","authors":"Weikai Xu, Lin Wang, Zhuhan Jiang","doi":"10.1109/ISCIT.2013.6645821","DOIUrl":"https://doi.org/10.1109/ISCIT.2013.6645821","url":null,"abstract":"In this paper, a new cooperative protocol based on code-shifted differential chaos shift keying (CS-DCSK) modulation, which is an improved differential chaos shifted keying modulation scheme no requirement delay circuits at autocorrelation receiver (AcR), is proposed. The relay user transmits own data while piggybacks other user's data which are received and decoded at pre-phase utilizing the multiple bit-streams transmission property of generalized CS-DCSK (GCS-DCSK). Moreover, the cooperative user may forward the estimated data only when its data is correctly decoded using cyclic redundancy check (CRC) code, namely selective decode-and-forward (DAF). Simulation results show that the proposed protocol has better performance than that of conventional four phase cooperative protocol in bit error rate (BER) and system throughput.","PeriodicalId":356009,"journal":{"name":"2013 13th International Symposium on Communications and Information Technologies (ISCIT)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125488970","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Real-time advisory service for orchid care 兰花护理实时咨询服务
Korakoch Kongsombut, R. Chaisricharoen
Problem in the orchid industry's production is caused by the lack of efficient technical knowledge and timely nursery environmental monitoring. Due to the constraints that the nurserymen have in accessing information, they suffered the hardship in managing the orchid care practices. Therefore, we propose a real-time advisory service by utilizing mobile application for mobility, cloud computing technology for scalability, and push notification service for early notification. The service manages to improve nurserymen decision making in orchid care management, reduce cost and time, and enhance their expertise in orchid production.
兰花产业生产中的问题是由于缺乏有效的技术知识和及时的苗圃环境监测造成的。由于苗圃人员在获取信息方面的限制,他们在管理兰花护理实践方面遇到了困难。因此,我们提出了一种实时咨询服务,利用移动应用实现移动性,利用云计算技术实现可扩展性,利用推送通知服务实现提前通知。该服务旨在改善苗圃人员在兰花护理管理方面的决策,降低成本和时间,并提高他们在兰花生产方面的专业知识。
{"title":"Real-time advisory service for orchid care","authors":"Korakoch Kongsombut, R. Chaisricharoen","doi":"10.1109/ISCIT.2013.6645947","DOIUrl":"https://doi.org/10.1109/ISCIT.2013.6645947","url":null,"abstract":"Problem in the orchid industry's production is caused by the lack of efficient technical knowledge and timely nursery environmental monitoring. Due to the constraints that the nurserymen have in accessing information, they suffered the hardship in managing the orchid care practices. Therefore, we propose a real-time advisory service by utilizing mobile application for mobility, cloud computing technology for scalability, and push notification service for early notification. The service manages to improve nurserymen decision making in orchid care management, reduce cost and time, and enhance their expertise in orchid production.","PeriodicalId":356009,"journal":{"name":"2013 13th International Symposium on Communications and Information Technologies (ISCIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114176217","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A compact class-AB bulk-driven quasi-floating gate current mirror for low voltage applications 一种紧凑的ab类大体积驱动的准浮栅电流反射镜,适用于低压应用
A. Suadet, V. Kasemsuwan
A compact class-AB bulk-driven quasi-floating gate current mirror is proposed. The circuit is based on an active class-A current mirror using bulk-driven quasi-floating gate (BD-QFG) MOS transistors and low voltage bulk-input pseudo-differential amplifier. The circuit can operate from a supply voltage as low as VT+VDSAT. The performance of the circuit is verified by SPECTRE, using a standard 0.18 μm CMOS process with a 0.5 V supply voltage. The circuit demonstrates low input impedance (934 Ω) and relatively high output impedance (1.13 MΩ). The circuit can drive the output current 8 times larger than the quiescent current. The power dissipation under quiescent condition is 8.2 μW.
提出了一种紧凑的ab类块驱动准浮栅电流反射镜。该电路基于有源a类电流反射镜,采用大块驱动的准浮栅(BD-QFG) MOS晶体管和低压大块输入伪差分放大器。该电路可以在低至VT+VDSAT的电源电压下工作。采用标准的0.18 μm CMOS工艺,0.5 V电源电压,SPECTRE验证了电路的性能。电路显示低输入阻抗(934 Ω)和相对较高的输出阻抗(1.13 MΩ)。该电路可以驱动比静态电流大8倍的输出电流。静态状态下的功耗为8.2 μW。
{"title":"A compact class-AB bulk-driven quasi-floating gate current mirror for low voltage applications","authors":"A. Suadet, V. Kasemsuwan","doi":"10.1109/ISCIT.2013.6645868","DOIUrl":"https://doi.org/10.1109/ISCIT.2013.6645868","url":null,"abstract":"A compact class-AB bulk-driven quasi-floating gate current mirror is proposed. The circuit is based on an active class-A current mirror using bulk-driven quasi-floating gate (BD-QFG) MOS transistors and low voltage bulk-input pseudo-differential amplifier. The circuit can operate from a supply voltage as low as VT+VDSAT. The performance of the circuit is verified by SPECTRE, using a standard 0.18 μm CMOS process with a 0.5 V supply voltage. The circuit demonstrates low input impedance (934 Ω) and relatively high output impedance (1.13 MΩ). The circuit can drive the output current 8 times larger than the quiescent current. The power dissipation under quiescent condition is 8.2 μW.","PeriodicalId":356009,"journal":{"name":"2013 13th International Symposium on Communications and Information Technologies (ISCIT)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126569821","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Channel capacity of M-ary Differential Chaos Shift Keying modulation over AWGN channel AWGN信道上m阶差分混沌移位键控调制的信道容量
Guofa Cai, Lin Wang, Tingting Huang
In this article the capacity expression is derived for M-ary Differential Chaos Shift Keying (M-DCSK) modulation over additive white Gaussian noise (AWGN) channel. Then the capacity bound curves of M-DCSK are provided by Monte Carlo method. Theoretical analysis and simulation results show that the high dimension DCSK modulation has more obvious capacity advantage than the conventional modulations. So they are appropriate for the power-limited communication systems.
本文推导了加性高斯白噪声(AWGN)信道上m阶微分混沌移键控(M-DCSK)调制的容量表达式。然后用蒙特卡罗方法给出了M-DCSK的容量界曲线。理论分析和仿真结果表明,高维DCSK调制比传统调制具有更明显的容量优势。因此,它适用于功率有限的通信系统。
{"title":"Channel capacity of M-ary Differential Chaos Shift Keying modulation over AWGN channel","authors":"Guofa Cai, Lin Wang, Tingting Huang","doi":"10.1109/ISCIT.2013.6645829","DOIUrl":"https://doi.org/10.1109/ISCIT.2013.6645829","url":null,"abstract":"In this article the capacity expression is derived for M-ary Differential Chaos Shift Keying (M-DCSK) modulation over additive white Gaussian noise (AWGN) channel. Then the capacity bound curves of M-DCSK are provided by Monte Carlo method. Theoretical analysis and simulation results show that the high dimension DCSK modulation has more obvious capacity advantage than the conventional modulations. So they are appropriate for the power-limited communication systems.","PeriodicalId":356009,"journal":{"name":"2013 13th International Symposium on Communications and Information Technologies (ISCIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127598109","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Research on influence of weak ties to information spreading in online social networks 弱联系对在线社交网络中信息传播的影响研究
Zuo Zhao, Shengbing Zhang
The introduction of the full paper discusses that the influence of weak ties to Information Spreading in online social network are different according to different online social network type. In the information exchanged social networks, removing the weak ties have little influence on the information spreading, while in the relationship social network, removing the weak ties have significant influence on the information spreading. An efficient weak ties evaluation algorithm can more accurately find the weak ties in a social network to improve the control effect of information spreading. We study the weak ties evaluation algorithm, use the concept of clustering coefficient between two friends and the global evolution to optimize the initial algorithm, in order to solve some existed problem in the initial algorithm. Analysis and experiences proved that the new algorithm perform better than the initial algorithm and the weak ties are more effective on the information spreading in online social network, but the new algorithm still has little influence on the information spreading in the information exchanged social networks.
本文的引言部分讨论了弱联系对网络社交网络中信息传播的影响因网络社交网络类型的不同而不同。在信息交换型社会网络中,去除弱联系对信息传播影响不大,而在关系型社会网络中,去除弱联系对信息传播影响显著。有效的弱联系评价算法可以更准确地找到社会网络中的弱联系,从而提高信息传播的控制效果。研究弱联系评价算法,利用好友间聚类系数的概念和全局进化对初始算法进行优化,以解决初始算法中存在的一些问题。分析和经验证明,新算法的性能优于初始算法,弱联系对在线社交网络中的信息传播更有效,但新算法对信息交换社交网络中的信息传播影响仍然很小。
{"title":"Research on influence of weak ties to information spreading in online social networks","authors":"Zuo Zhao, Shengbing Zhang","doi":"10.1109/ISCIT.2013.6645851","DOIUrl":"https://doi.org/10.1109/ISCIT.2013.6645851","url":null,"abstract":"The introduction of the full paper discusses that the influence of weak ties to Information Spreading in online social network are different according to different online social network type. In the information exchanged social networks, removing the weak ties have little influence on the information spreading, while in the relationship social network, removing the weak ties have significant influence on the information spreading. An efficient weak ties evaluation algorithm can more accurately find the weak ties in a social network to improve the control effect of information spreading. We study the weak ties evaluation algorithm, use the concept of clustering coefficient between two friends and the global evolution to optimize the initial algorithm, in order to solve some existed problem in the initial algorithm. Analysis and experiences proved that the new algorithm perform better than the initial algorithm and the weak ties are more effective on the information spreading in online social network, but the new algorithm still has little influence on the information spreading in the information exchanged social networks.","PeriodicalId":356009,"journal":{"name":"2013 13th International Symposium on Communications and Information Technologies (ISCIT)","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131502509","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Face recognition improvement by converting expression faces to neutral faces 通过将表情脸转换为中性脸来改进人脸识别
Chayanut Petpairote, S. Madarasmi
A face recognition database generally consists of expressionless, frontal face images often referred to as neutral faces. However, we often obtain a facial image from a non-frontal view that may even contain expressions such as anger, joy, surprise, smile, sorrow, and etc. Faces with expressions often cause the underlying face recognition algorithm to fail. In this paper, we present an approach to improve face recognition by warping an image with facial expression to create a neutral, expression-invariant face. We use a modified version of the thin plate splines warping to remove the expression from a probe image with expressions to improve the correctness in face recognition using a gallery of neutral faces. We evaluate our proposed method using 2 well-known facial expression databases; namely, the AR-Face and MUG-FED databases. The experimental results for both databases show that our proposed method significantly improves the accuracy of face recognition under expression variations for the 3 commonly used approaches to face recognition including principal component analysis (PCA), linear discriminant analysis (LDA), and feature-based local binary pattern (LBP).
人脸识别数据库通常由无表情的正面人脸图像组成,通常被称为中性面孔。然而,我们通常从非正面视角获得的面部图像甚至可能包含愤怒、喜悦、惊讶、微笑、悲伤等表情。带有表情的人脸通常会导致底层人脸识别算法失败。在本文中,我们提出了一种改进人脸识别的方法,通过扭曲带有面部表情的图像来创建中性的、表情不变的人脸。利用改进的薄板样条翘曲法去除带有表情的探测图像中的表情,提高了中性人脸库人脸识别的正确性。我们使用两个知名的面部表情数据库来评估我们提出的方法;即AR-Face和MUG-FED数据库。两个数据库的实验结果表明,对于常用的3种人脸识别方法,即主成分分析(PCA)、线性判别分析(LDA)和基于特征的局部二值模式(LBP),本文提出的方法显著提高了表情变化下人脸识别的准确性。
{"title":"Face recognition improvement by converting expression faces to neutral faces","authors":"Chayanut Petpairote, S. Madarasmi","doi":"10.1109/ISCIT.2013.6645898","DOIUrl":"https://doi.org/10.1109/ISCIT.2013.6645898","url":null,"abstract":"A face recognition database generally consists of expressionless, frontal face images often referred to as neutral faces. However, we often obtain a facial image from a non-frontal view that may even contain expressions such as anger, joy, surprise, smile, sorrow, and etc. Faces with expressions often cause the underlying face recognition algorithm to fail. In this paper, we present an approach to improve face recognition by warping an image with facial expression to create a neutral, expression-invariant face. We use a modified version of the thin plate splines warping to remove the expression from a probe image with expressions to improve the correctness in face recognition using a gallery of neutral faces. We evaluate our proposed method using 2 well-known facial expression databases; namely, the AR-Face and MUG-FED databases. The experimental results for both databases show that our proposed method significantly improves the accuracy of face recognition under expression variations for the 3 commonly used approaches to face recognition including principal component analysis (PCA), linear discriminant analysis (LDA), and feature-based local binary pattern (LBP).","PeriodicalId":356009,"journal":{"name":"2013 13th International Symposium on Communications and Information Technologies (ISCIT)","volume":"462 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124186749","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Human body transfer function model for ultra wideband body area network 超宽带体域网络人体传递函数模型
S. Promwong, Jiraphan Sahakit, S. Teawehim, B. Ruckveratham
A waveform distortion on human body of an ultra wideband body area network (UWB-BAN) system can be extremely distorted through a channel even for free-space transmission because of antenna dispersion. Therefore, the understand of antenna characteristics, which effects on waveform distortion, is necessary. This paper presents the waveform distortion due to human body for wireless meadical applications based on measurement data. The template waveform is considered at the receiver side to maximize the SNR for evaluation. In this results are evaluate based on the extended Friis' transmission formula. This technique gives very accurate results and is very useful for the design and evaluation of UWB-BAN transmission waveform for wireless medical applications, especially focusing on the effect of template waveform.
在超宽带体域网络(UWB-BAN)系统中,由于天线色散,即使在自由空间传输的信道中,人体上的波形失真也会发生极大的失真。因此,了解天线特性对波形失真的影响是很有必要的。本文介绍了基于测量数据的无线医疗应用中人体产生的波形失真。在接收端考虑模板波形以最大化信噪比进行评估。根据扩展后的弗里斯传输公式对结果进行了评价。该技术对无线医疗应用中UWB-BAN传输波形的设计和评估,特别是对模板波形影响的研究具有重要的指导意义。
{"title":"Human body transfer function model for ultra wideband body area network","authors":"S. Promwong, Jiraphan Sahakit, S. Teawehim, B. Ruckveratham","doi":"10.1109/ISCIT.2013.6645942","DOIUrl":"https://doi.org/10.1109/ISCIT.2013.6645942","url":null,"abstract":"A waveform distortion on human body of an ultra wideband body area network (UWB-BAN) system can be extremely distorted through a channel even for free-space transmission because of antenna dispersion. Therefore, the understand of antenna characteristics, which effects on waveform distortion, is necessary. This paper presents the waveform distortion due to human body for wireless meadical applications based on measurement data. The template waveform is considered at the receiver side to maximize the SNR for evaluation. In this results are evaluate based on the extended Friis' transmission formula. This technique gives very accurate results and is very useful for the design and evaluation of UWB-BAN transmission waveform for wireless medical applications, especially focusing on the effect of template waveform.","PeriodicalId":356009,"journal":{"name":"2013 13th International Symposium on Communications and Information Technologies (ISCIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127875363","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Safe level graph for synthetic minority over-sampling techniques 合成少数派过采样技术的安全水平图
C. Bunkhumpornpat, Sitthichoke Subpaiboonkit
In the class imbalance problem, most existent classifiers which are designed by the distribution of balance datasets fail to recognize minority classes since a large number of negative instances can dominate a few positive instances. Borderline-SMOTE and Safe-Level-SMOTE are over-sampling techniques which are applied to handle this situation by generating synthetic instances in different regions. The former operates on the border of a minority class while the latter works inside the class far from the border. Unfortunately, a data miner is unable to conveniently justify a suitable SMOTE for each dataset. In this paper, a safe level graph is proposed as a guideline tool for selecting an appropriate SMOTE and describes the characteristic of a minority class in an imbalance dataset. Relying on advice of a safe level graph, the experimental success rate is shown to reach 73% when an F-measure is used as the performance measure and 78% for satisfactory AUCs.
在类不平衡问题中,大多数根据平衡数据集分布设计的分类器无法识别少数类,因为大量的负类实例可以支配少量的正类实例。Borderline-SMOTE和Safe-Level-SMOTE是通过在不同区域生成合成实例来处理这种情况的过采样技术。前者在少数阶级的边界上活动,而后者在远离边界的阶级内部活动。不幸的是,数据挖掘器无法方便地为每个数据集确定合适的SMOTE。本文提出了一个安全水平图作为选择合适的SMOTE的指导工具,并描述了不平衡数据集中少数类的特征。根据安全水平图的建议,当使用f度量作为性能度量时,实验成功率达到73%,对于满意的auc,实验成功率达到78%。
{"title":"Safe level graph for synthetic minority over-sampling techniques","authors":"C. Bunkhumpornpat, Sitthichoke Subpaiboonkit","doi":"10.1109/ISCIT.2013.6645923","DOIUrl":"https://doi.org/10.1109/ISCIT.2013.6645923","url":null,"abstract":"In the class imbalance problem, most existent classifiers which are designed by the distribution of balance datasets fail to recognize minority classes since a large number of negative instances can dominate a few positive instances. Borderline-SMOTE and Safe-Level-SMOTE are over-sampling techniques which are applied to handle this situation by generating synthetic instances in different regions. The former operates on the border of a minority class while the latter works inside the class far from the border. Unfortunately, a data miner is unable to conveniently justify a suitable SMOTE for each dataset. In this paper, a safe level graph is proposed as a guideline tool for selecting an appropriate SMOTE and describes the characteristic of a minority class in an imbalance dataset. Relying on advice of a safe level graph, the experimental success rate is shown to reach 73% when an F-measure is used as the performance measure and 78% for satisfactory AUCs.","PeriodicalId":356009,"journal":{"name":"2013 13th International Symposium on Communications and Information Technologies (ISCIT)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129208666","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Improving identity privacy and authentication in SIP transactions 改进SIP事务中的身份隐私和身份验证
S. Kungpisdan, Atipat Thongyon
Session Initiation Protocol (SIP) has gained more acceptability as the number of Voice Over Internet Protocol (VoIP) applications grows significantly. However, SIP itself lacks user privacy, necessary security properties, and has poor performance due to chosen cryptographic operations. A number of security techniques were proposed to address user privacy issues, but they still have limitations in terms of security and performance. In this paper, SIPPEN, a SIP Privacy Enhancement with Nicknames, is introduced. SIPPEN can preserve privacy of SIP users while they communicate. Moreover, a new authentication technique between a user agent and a proxy server is introduced. The results given from our analysis show that the proposed protocol not only has higher security level, but it also has better performance comparing to existing techniques.
随着互联网语音协议(VoIP)应用的显著增长,会话发起协议(SIP)得到了越来越多的认可。然而,SIP本身缺乏用户隐私和必要的安全属性,并且由于所选择的加密操作而导致性能不佳。提出了许多安全技术来解决用户隐私问题,但它们在安全性和性能方面仍然存在局限性。本文介绍了一种基于昵称的SIP隐私增强技术SIPPEN。SIPPEN可以保护SIP用户在通信时的隐私。此外,还介绍了一种新的用户代理和代理服务器之间的身份验证技术。分析结果表明,该协议不仅具有更高的安全级别,而且与现有技术相比具有更好的性能。
{"title":"Improving identity privacy and authentication in SIP transactions","authors":"S. Kungpisdan, Atipat Thongyon","doi":"10.1109/ISCIT.2013.6645854","DOIUrl":"https://doi.org/10.1109/ISCIT.2013.6645854","url":null,"abstract":"Session Initiation Protocol (SIP) has gained more acceptability as the number of Voice Over Internet Protocol (VoIP) applications grows significantly. However, SIP itself lacks user privacy, necessary security properties, and has poor performance due to chosen cryptographic operations. A number of security techniques were proposed to address user privacy issues, but they still have limitations in terms of security and performance. In this paper, SIPPEN, a SIP Privacy Enhancement with Nicknames, is introduced. SIPPEN can preserve privacy of SIP users while they communicate. Moreover, a new authentication technique between a user agent and a proxy server is introduced. The results given from our analysis show that the proposed protocol not only has higher security level, but it also has better performance comparing to existing techniques.","PeriodicalId":356009,"journal":{"name":"2013 13th International Symposium on Communications and Information Technologies (ISCIT)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129283345","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2013 13th International Symposium on Communications and Information Technologies (ISCIT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1