首页 > 最新文献

2013 13th International Symposium on Communications and Information Technologies (ISCIT)最新文献

英文 中文
Iris surface deformation and normalization 虹膜表面变形和归一化
S. Thainimit, Luís A. Alexandre, Vasco M N de Almeida
Human iris recognition systems are an attractive form of non-intrusive bio-identification with many potential applications. However, the accuracy of these systems is still limited due to challenges presented by iris surface deformation. This paper provides an introduction to the physiology of the iris, describes the problem of iris deformation, and presents a review of past and current software approaches to iris recognition. The focus is on methods related to the physiology of the iris.
人体虹膜识别系统是非侵入式生物识别的一种有吸引力的形式,具有许多潜在的应用前景。然而,由于虹膜表面变形带来的挑战,这些系统的精度仍然有限。本文介绍了虹膜的生理学,描述了虹膜变形的问题,并介绍了过去和现在的虹膜识别软件方法的回顾。重点是与虹膜生理学相关的方法。
{"title":"Iris surface deformation and normalization","authors":"S. Thainimit, Luís A. Alexandre, Vasco M N de Almeida","doi":"10.1109/ISCIT.2013.6645910","DOIUrl":"https://doi.org/10.1109/ISCIT.2013.6645910","url":null,"abstract":"Human iris recognition systems are an attractive form of non-intrusive bio-identification with many potential applications. However, the accuracy of these systems is still limited due to challenges presented by iris surface deformation. This paper provides an introduction to the physiology of the iris, describes the problem of iris deformation, and presents a review of past and current software approaches to iris recognition. The focus is on methods related to the physiology of the iris.","PeriodicalId":356009,"journal":{"name":"2013 13th International Symposium on Communications and Information Technologies (ISCIT)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125252206","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
A new user cooperative protocol based on code-shifted differential chaos shift keying modulation 一种基于码移差分混沌移键控调制的新型用户协作协议
Weikai Xu, Lin Wang, Zhuhan Jiang
In this paper, a new cooperative protocol based on code-shifted differential chaos shift keying (CS-DCSK) modulation, which is an improved differential chaos shifted keying modulation scheme no requirement delay circuits at autocorrelation receiver (AcR), is proposed. The relay user transmits own data while piggybacks other user's data which are received and decoded at pre-phase utilizing the multiple bit-streams transmission property of generalized CS-DCSK (GCS-DCSK). Moreover, the cooperative user may forward the estimated data only when its data is correctly decoded using cyclic redundancy check (CRC) code, namely selective decode-and-forward (DAF). Simulation results show that the proposed protocol has better performance than that of conventional four phase cooperative protocol in bit error rate (BER) and system throughput.
本文提出了一种新的基于码移差分混沌键控(CS-DCSK)调制的协作协议,该协议是一种改进的不需要自相关接收机(AcR)延迟电路的差分混沌键控调制方案。中继用户传输自己的数据,同时承载其他用户的数据,这些数据利用广义CS-DCSK (GCS-DCSK)的多比特流传输特性在前期接收和解码。此外,只有当其数据使用循环冗余校验(CRC)码,即选择性解码转发(DAF)正确解码时,协作用户才能转发估计的数据。仿真结果表明,该协议在误码率和系统吞吐量方面都优于传统的四相协作协议。
{"title":"A new user cooperative protocol based on code-shifted differential chaos shift keying modulation","authors":"Weikai Xu, Lin Wang, Zhuhan Jiang","doi":"10.1109/ISCIT.2013.6645821","DOIUrl":"https://doi.org/10.1109/ISCIT.2013.6645821","url":null,"abstract":"In this paper, a new cooperative protocol based on code-shifted differential chaos shift keying (CS-DCSK) modulation, which is an improved differential chaos shifted keying modulation scheme no requirement delay circuits at autocorrelation receiver (AcR), is proposed. The relay user transmits own data while piggybacks other user's data which are received and decoded at pre-phase utilizing the multiple bit-streams transmission property of generalized CS-DCSK (GCS-DCSK). Moreover, the cooperative user may forward the estimated data only when its data is correctly decoded using cyclic redundancy check (CRC) code, namely selective decode-and-forward (DAF). Simulation results show that the proposed protocol has better performance than that of conventional four phase cooperative protocol in bit error rate (BER) and system throughput.","PeriodicalId":356009,"journal":{"name":"2013 13th International Symposium on Communications and Information Technologies (ISCIT)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125488970","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Channel capacity of M-ary Differential Chaos Shift Keying modulation over AWGN channel AWGN信道上m阶差分混沌移位键控调制的信道容量
Guofa Cai, Lin Wang, Tingting Huang
In this article the capacity expression is derived for M-ary Differential Chaos Shift Keying (M-DCSK) modulation over additive white Gaussian noise (AWGN) channel. Then the capacity bound curves of M-DCSK are provided by Monte Carlo method. Theoretical analysis and simulation results show that the high dimension DCSK modulation has more obvious capacity advantage than the conventional modulations. So they are appropriate for the power-limited communication systems.
本文推导了加性高斯白噪声(AWGN)信道上m阶微分混沌移键控(M-DCSK)调制的容量表达式。然后用蒙特卡罗方法给出了M-DCSK的容量界曲线。理论分析和仿真结果表明,高维DCSK调制比传统调制具有更明显的容量优势。因此,它适用于功率有限的通信系统。
{"title":"Channel capacity of M-ary Differential Chaos Shift Keying modulation over AWGN channel","authors":"Guofa Cai, Lin Wang, Tingting Huang","doi":"10.1109/ISCIT.2013.6645829","DOIUrl":"https://doi.org/10.1109/ISCIT.2013.6645829","url":null,"abstract":"In this article the capacity expression is derived for M-ary Differential Chaos Shift Keying (M-DCSK) modulation over additive white Gaussian noise (AWGN) channel. Then the capacity bound curves of M-DCSK are provided by Monte Carlo method. Theoretical analysis and simulation results show that the high dimension DCSK modulation has more obvious capacity advantage than the conventional modulations. So they are appropriate for the power-limited communication systems.","PeriodicalId":356009,"journal":{"name":"2013 13th International Symposium on Communications and Information Technologies (ISCIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127598109","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Secure wireless multicasting in presence of multiple eavesdroppers 安全无线广播在多个窃听者的存在
A. P. Shrestha, Jai-Jin Jung, K. Kwak
Physical layer security schemes for wireless communication can prevent eavesdropping even without use of upper layer cryptographic algorithms. As such, physical layer security based on information theoretic constraint is gaining both theoretical and practical importance in research community. In this paper, we investigate the physical layer security for wireless multicasting scheme consisting of a single antenna transmitter with multiple receivers and eavesdroppers both equipped with multiple antennas under quasi-static Rayleigh fading channel. We develop new closed-form expressions for the analysis of probability of positive secrecy as well as outage probability. We show that the physical layer security can be maintained even in presence of multiple eavesdroppers consisting multiple antennas. Furthermore, we also analyze the effect of number of antennas, users and eavesdroppers in the numerical results.
无线通信的物理层安全方案即使不使用上层加密算法也能防止窃听。因此,基于信息理论约束的物理层安全越来越受到学术界的重视。本文研究了准静态瑞利衰落信道下由单天线发射机、多接收机和窃听器组成的无线多播方案的物理层安全问题。我们开发了新的封闭表达式来分析正保密概率和中断概率。我们证明,即使存在由多个天线组成的多个窃听器,也可以保持物理层的安全性。此外,我们还分析了天线数目、用户数目和窃听者数目对数值结果的影响。
{"title":"Secure wireless multicasting in presence of multiple eavesdroppers","authors":"A. P. Shrestha, Jai-Jin Jung, K. Kwak","doi":"10.1109/ISCIT.2013.6645929","DOIUrl":"https://doi.org/10.1109/ISCIT.2013.6645929","url":null,"abstract":"Physical layer security schemes for wireless communication can prevent eavesdropping even without use of upper layer cryptographic algorithms. As such, physical layer security based on information theoretic constraint is gaining both theoretical and practical importance in research community. In this paper, we investigate the physical layer security for wireless multicasting scheme consisting of a single antenna transmitter with multiple receivers and eavesdroppers both equipped with multiple antennas under quasi-static Rayleigh fading channel. We develop new closed-form expressions for the analysis of probability of positive secrecy as well as outage probability. We show that the physical layer security can be maintained even in presence of multiple eavesdroppers consisting multiple antennas. Furthermore, we also analyze the effect of number of antennas, users and eavesdroppers in the numerical results.","PeriodicalId":356009,"journal":{"name":"2013 13th International Symposium on Communications and Information Technologies (ISCIT)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124418818","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Effects of time windowing for extraction of expression from Japanese speech: Higuchi's fractal dimension 时间窗对日语语音表达提取的影响:Higuchi分形维数
M. Phothisonothai, Yasunori Arita, Katsumi Watanabe
Measures of irregularity and complexity in time-series data can be quantified by using fractal dimension (FD) which may convey useful information and showing a strong correlation with the physiological data, e.g., speech. The time-dependent FD (TDFD) has been proven to be effective method in various physiological studies. However, the TDFD result depends on the time windowing, i.e., length and type which could provide different features. Therefore, in this paper, the effects of time windowing of TDFD by spanning 28 to 212-point length and four window functions were investigated. The FD was computed by using Higuchi's method. In experiment, speech data recorded from 15 Japanese utterances, 4 different ways of expression (accosting, wholehearted, normal, and uninterested). The obtained results were useful in selecting time windowing based on TDFD method in which could extract different intonations effectively.
时间序列数据中的不规则性和复杂性可以通过使用分形维数(FD)来量化,它可以传递有用的信息,并显示出与生理数据(例如语音)的强相关性。时间依赖FD (TDFD)已被证明是一种有效的生理研究方法。然而,TDFD结果取决于时间窗,即长度和类型,可以提供不同的特征。因此,本文研究了28 ~ 212点长度和4种窗函数对TDFD时间窗的影响。FD采用Higuchi方法计算。在实验中,我们记录了15个日语话语,4种不同的表达方式(搭讪、全心全意、正常、不感兴趣)。所得结果可用于基于TDFD方法的时间窗选择,该方法可以有效地提取不同的语调。
{"title":"Effects of time windowing for extraction of expression from Japanese speech: Higuchi's fractal dimension","authors":"M. Phothisonothai, Yasunori Arita, Katsumi Watanabe","doi":"10.1109/ISCIT.2013.6645938","DOIUrl":"https://doi.org/10.1109/ISCIT.2013.6645938","url":null,"abstract":"Measures of irregularity and complexity in time-series data can be quantified by using fractal dimension (FD) which may convey useful information and showing a strong correlation with the physiological data, e.g., speech. The time-dependent FD (TDFD) has been proven to be effective method in various physiological studies. However, the TDFD result depends on the time windowing, i.e., length and type which could provide different features. Therefore, in this paper, the effects of time windowing of TDFD by spanning 28 to 212-point length and four window functions were investigated. The FD was computed by using Higuchi's method. In experiment, speech data recorded from 15 Japanese utterances, 4 different ways of expression (accosting, wholehearted, normal, and uninterested). The obtained results were useful in selecting time windowing based on TDFD method in which could extract different intonations effectively.","PeriodicalId":356009,"journal":{"name":"2013 13th International Symposium on Communications and Information Technologies (ISCIT)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133745149","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A test automation framework in POCT system using TDD techniques 一个使用TDD技术的POCT系统测试自动化框架
Ratchanok Chaipraserth, A. Leelasantitham, S. Kiattisin
Nowadays, the growth of IT business are highly competitive both of development process and functionality of software to meet mostly customer requirements. Normally, software performance should develop to increase the high quality whilst it should reduce both of the cost and the time. The IT business is to start the attention with satisfaction of the customer for expanding opportunities of grown business. The problem of former software development is an operation under the pressure conditions affecting to see more bugs of the software in a period of testing system and delivering the program to the required customer. This paper presents an implementation of approach which is an agile development (If what we do that able to modify the code to meet the requirement in the future, that's call agile.) using Test Driven Development (TDD) in automation testing framework for software development process. It helps optimization of software testing as it can found early bug, flexible for requirement changes in the future, either to increase or change requirement without any effect on coding behavior. It also helps to reduce cost of software development as a human resource, time and rapid feedback of test result. We apply this approach with prototype in software development processes using the Point of care testing (POCT) system which is as an example to create test case with black-box and white-box testing techniques based on the requirements specification to improve more product quality.
如今,IT业务的增长对软件的开发过程和功能的竞争非常激烈,以满足大多数客户的需求。通常情况下,软件的性能应该提高到高质量,同时应该减少成本和时间。IT业务是开始关注客户的满意,以扩大成长业务的机会。以前的软件开发的问题是在测试系统和将程序交付给所需客户的一段时间内,在压力条件下影响软件的更多缺陷的操作。本文提出了在软件开发过程自动化测试框架中使用测试驱动开发(TDD)实现敏捷开发方法(如果我们所做的事情能够修改代码以满足将来的需求,那就称为敏捷)。它有助于优化软件测试,因为它可以发现早期的错误,灵活地应对未来的需求变化,增加或改变需求,而不会对编码行为产生任何影响。它还有助于减少软件开发的人力资源成本、时间和测试结果的快速反馈。在软件开发过程中,我们以关注点测试(POCT)系统为例,运用黑盒和白盒测试技术创建基于需求规范的测试用例,从而进一步提高产品质量。
{"title":"A test automation framework in POCT system using TDD techniques","authors":"Ratchanok Chaipraserth, A. Leelasantitham, S. Kiattisin","doi":"10.1109/ISCIT.2013.6645931","DOIUrl":"https://doi.org/10.1109/ISCIT.2013.6645931","url":null,"abstract":"Nowadays, the growth of IT business are highly competitive both of development process and functionality of software to meet mostly customer requirements. Normally, software performance should develop to increase the high quality whilst it should reduce both of the cost and the time. The IT business is to start the attention with satisfaction of the customer for expanding opportunities of grown business. The problem of former software development is an operation under the pressure conditions affecting to see more bugs of the software in a period of testing system and delivering the program to the required customer. This paper presents an implementation of approach which is an agile development (If what we do that able to modify the code to meet the requirement in the future, that's call agile.) using Test Driven Development (TDD) in automation testing framework for software development process. It helps optimization of software testing as it can found early bug, flexible for requirement changes in the future, either to increase or change requirement without any effect on coding behavior. It also helps to reduce cost of software development as a human resource, time and rapid feedback of test result. We apply this approach with prototype in software development processes using the Point of care testing (POCT) system which is as an example to create test case with black-box and white-box testing techniques based on the requirements specification to improve more product quality.","PeriodicalId":356009,"journal":{"name":"2013 13th International Symposium on Communications and Information Technologies (ISCIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132314237","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Face recognition improvement by converting expression faces to neutral faces 通过将表情脸转换为中性脸来改进人脸识别
Chayanut Petpairote, S. Madarasmi
A face recognition database generally consists of expressionless, frontal face images often referred to as neutral faces. However, we often obtain a facial image from a non-frontal view that may even contain expressions such as anger, joy, surprise, smile, sorrow, and etc. Faces with expressions often cause the underlying face recognition algorithm to fail. In this paper, we present an approach to improve face recognition by warping an image with facial expression to create a neutral, expression-invariant face. We use a modified version of the thin plate splines warping to remove the expression from a probe image with expressions to improve the correctness in face recognition using a gallery of neutral faces. We evaluate our proposed method using 2 well-known facial expression databases; namely, the AR-Face and MUG-FED databases. The experimental results for both databases show that our proposed method significantly improves the accuracy of face recognition under expression variations for the 3 commonly used approaches to face recognition including principal component analysis (PCA), linear discriminant analysis (LDA), and feature-based local binary pattern (LBP).
人脸识别数据库通常由无表情的正面人脸图像组成,通常被称为中性面孔。然而,我们通常从非正面视角获得的面部图像甚至可能包含愤怒、喜悦、惊讶、微笑、悲伤等表情。带有表情的人脸通常会导致底层人脸识别算法失败。在本文中,我们提出了一种改进人脸识别的方法,通过扭曲带有面部表情的图像来创建中性的、表情不变的人脸。利用改进的薄板样条翘曲法去除带有表情的探测图像中的表情,提高了中性人脸库人脸识别的正确性。我们使用两个知名的面部表情数据库来评估我们提出的方法;即AR-Face和MUG-FED数据库。两个数据库的实验结果表明,对于常用的3种人脸识别方法,即主成分分析(PCA)、线性判别分析(LDA)和基于特征的局部二值模式(LBP),本文提出的方法显著提高了表情变化下人脸识别的准确性。
{"title":"Face recognition improvement by converting expression faces to neutral faces","authors":"Chayanut Petpairote, S. Madarasmi","doi":"10.1109/ISCIT.2013.6645898","DOIUrl":"https://doi.org/10.1109/ISCIT.2013.6645898","url":null,"abstract":"A face recognition database generally consists of expressionless, frontal face images often referred to as neutral faces. However, we often obtain a facial image from a non-frontal view that may even contain expressions such as anger, joy, surprise, smile, sorrow, and etc. Faces with expressions often cause the underlying face recognition algorithm to fail. In this paper, we present an approach to improve face recognition by warping an image with facial expression to create a neutral, expression-invariant face. We use a modified version of the thin plate splines warping to remove the expression from a probe image with expressions to improve the correctness in face recognition using a gallery of neutral faces. We evaluate our proposed method using 2 well-known facial expression databases; namely, the AR-Face and MUG-FED databases. The experimental results for both databases show that our proposed method significantly improves the accuracy of face recognition under expression variations for the 3 commonly used approaches to face recognition including principal component analysis (PCA), linear discriminant analysis (LDA), and feature-based local binary pattern (LBP).","PeriodicalId":356009,"journal":{"name":"2013 13th International Symposium on Communications and Information Technologies (ISCIT)","volume":"462 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124186749","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Human body transfer function model for ultra wideband body area network 超宽带体域网络人体传递函数模型
S. Promwong, Jiraphan Sahakit, S. Teawehim, B. Ruckveratham
A waveform distortion on human body of an ultra wideband body area network (UWB-BAN) system can be extremely distorted through a channel even for free-space transmission because of antenna dispersion. Therefore, the understand of antenna characteristics, which effects on waveform distortion, is necessary. This paper presents the waveform distortion due to human body for wireless meadical applications based on measurement data. The template waveform is considered at the receiver side to maximize the SNR for evaluation. In this results are evaluate based on the extended Friis' transmission formula. This technique gives very accurate results and is very useful for the design and evaluation of UWB-BAN transmission waveform for wireless medical applications, especially focusing on the effect of template waveform.
在超宽带体域网络(UWB-BAN)系统中,由于天线色散,即使在自由空间传输的信道中,人体上的波形失真也会发生极大的失真。因此,了解天线特性对波形失真的影响是很有必要的。本文介绍了基于测量数据的无线医疗应用中人体产生的波形失真。在接收端考虑模板波形以最大化信噪比进行评估。根据扩展后的弗里斯传输公式对结果进行了评价。该技术对无线医疗应用中UWB-BAN传输波形的设计和评估,特别是对模板波形影响的研究具有重要的指导意义。
{"title":"Human body transfer function model for ultra wideband body area network","authors":"S. Promwong, Jiraphan Sahakit, S. Teawehim, B. Ruckveratham","doi":"10.1109/ISCIT.2013.6645942","DOIUrl":"https://doi.org/10.1109/ISCIT.2013.6645942","url":null,"abstract":"A waveform distortion on human body of an ultra wideband body area network (UWB-BAN) system can be extremely distorted through a channel even for free-space transmission because of antenna dispersion. Therefore, the understand of antenna characteristics, which effects on waveform distortion, is necessary. This paper presents the waveform distortion due to human body for wireless meadical applications based on measurement data. The template waveform is considered at the receiver side to maximize the SNR for evaluation. In this results are evaluate based on the extended Friis' transmission formula. This technique gives very accurate results and is very useful for the design and evaluation of UWB-BAN transmission waveform for wireless medical applications, especially focusing on the effect of template waveform.","PeriodicalId":356009,"journal":{"name":"2013 13th International Symposium on Communications and Information Technologies (ISCIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127875363","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Safe level graph for synthetic minority over-sampling techniques 合成少数派过采样技术的安全水平图
C. Bunkhumpornpat, Sitthichoke Subpaiboonkit
In the class imbalance problem, most existent classifiers which are designed by the distribution of balance datasets fail to recognize minority classes since a large number of negative instances can dominate a few positive instances. Borderline-SMOTE and Safe-Level-SMOTE are over-sampling techniques which are applied to handle this situation by generating synthetic instances in different regions. The former operates on the border of a minority class while the latter works inside the class far from the border. Unfortunately, a data miner is unable to conveniently justify a suitable SMOTE for each dataset. In this paper, a safe level graph is proposed as a guideline tool for selecting an appropriate SMOTE and describes the characteristic of a minority class in an imbalance dataset. Relying on advice of a safe level graph, the experimental success rate is shown to reach 73% when an F-measure is used as the performance measure and 78% for satisfactory AUCs.
在类不平衡问题中,大多数根据平衡数据集分布设计的分类器无法识别少数类,因为大量的负类实例可以支配少量的正类实例。Borderline-SMOTE和Safe-Level-SMOTE是通过在不同区域生成合成实例来处理这种情况的过采样技术。前者在少数阶级的边界上活动,而后者在远离边界的阶级内部活动。不幸的是,数据挖掘器无法方便地为每个数据集确定合适的SMOTE。本文提出了一个安全水平图作为选择合适的SMOTE的指导工具,并描述了不平衡数据集中少数类的特征。根据安全水平图的建议,当使用f度量作为性能度量时,实验成功率达到73%,对于满意的auc,实验成功率达到78%。
{"title":"Safe level graph for synthetic minority over-sampling techniques","authors":"C. Bunkhumpornpat, Sitthichoke Subpaiboonkit","doi":"10.1109/ISCIT.2013.6645923","DOIUrl":"https://doi.org/10.1109/ISCIT.2013.6645923","url":null,"abstract":"In the class imbalance problem, most existent classifiers which are designed by the distribution of balance datasets fail to recognize minority classes since a large number of negative instances can dominate a few positive instances. Borderline-SMOTE and Safe-Level-SMOTE are over-sampling techniques which are applied to handle this situation by generating synthetic instances in different regions. The former operates on the border of a minority class while the latter works inside the class far from the border. Unfortunately, a data miner is unable to conveniently justify a suitable SMOTE for each dataset. In this paper, a safe level graph is proposed as a guideline tool for selecting an appropriate SMOTE and describes the characteristic of a minority class in an imbalance dataset. Relying on advice of a safe level graph, the experimental success rate is shown to reach 73% when an F-measure is used as the performance measure and 78% for satisfactory AUCs.","PeriodicalId":356009,"journal":{"name":"2013 13th International Symposium on Communications and Information Technologies (ISCIT)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129208666","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Improving identity privacy and authentication in SIP transactions 改进SIP事务中的身份隐私和身份验证
S. Kungpisdan, Atipat Thongyon
Session Initiation Protocol (SIP) has gained more acceptability as the number of Voice Over Internet Protocol (VoIP) applications grows significantly. However, SIP itself lacks user privacy, necessary security properties, and has poor performance due to chosen cryptographic operations. A number of security techniques were proposed to address user privacy issues, but they still have limitations in terms of security and performance. In this paper, SIPPEN, a SIP Privacy Enhancement with Nicknames, is introduced. SIPPEN can preserve privacy of SIP users while they communicate. Moreover, a new authentication technique between a user agent and a proxy server is introduced. The results given from our analysis show that the proposed protocol not only has higher security level, but it also has better performance comparing to existing techniques.
随着互联网语音协议(VoIP)应用的显著增长,会话发起协议(SIP)得到了越来越多的认可。然而,SIP本身缺乏用户隐私和必要的安全属性,并且由于所选择的加密操作而导致性能不佳。提出了许多安全技术来解决用户隐私问题,但它们在安全性和性能方面仍然存在局限性。本文介绍了一种基于昵称的SIP隐私增强技术SIPPEN。SIPPEN可以保护SIP用户在通信时的隐私。此外,还介绍了一种新的用户代理和代理服务器之间的身份验证技术。分析结果表明,该协议不仅具有更高的安全级别,而且与现有技术相比具有更好的性能。
{"title":"Improving identity privacy and authentication in SIP transactions","authors":"S. Kungpisdan, Atipat Thongyon","doi":"10.1109/ISCIT.2013.6645854","DOIUrl":"https://doi.org/10.1109/ISCIT.2013.6645854","url":null,"abstract":"Session Initiation Protocol (SIP) has gained more acceptability as the number of Voice Over Internet Protocol (VoIP) applications grows significantly. However, SIP itself lacks user privacy, necessary security properties, and has poor performance due to chosen cryptographic operations. A number of security techniques were proposed to address user privacy issues, but they still have limitations in terms of security and performance. In this paper, SIPPEN, a SIP Privacy Enhancement with Nicknames, is introduced. SIPPEN can preserve privacy of SIP users while they communicate. Moreover, a new authentication technique between a user agent and a proxy server is introduced. The results given from our analysis show that the proposed protocol not only has higher security level, but it also has better performance comparing to existing techniques.","PeriodicalId":356009,"journal":{"name":"2013 13th International Symposium on Communications and Information Technologies (ISCIT)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129283345","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2013 13th International Symposium on Communications and Information Technologies (ISCIT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1