首页 > 最新文献

2013 13th International Symposium on Communications and Information Technologies (ISCIT)最新文献

英文 中文
Multiple video watermarking algorithm based on wavelet transform 基于小波变换的多重视频水印算法
J. Panyavaraporn
Digital watermarking techniques embed information in multimedia, such as image, audio and video. The watermark has been resolved copyright ownership and verifying the integrity of content. This paper proposed a watermarking technique based on wavelet transform and binary watermark. The embedded algorithm has been done in two bands of video. Furthermore, the watermark extraction process does not need the original video sequence. The experimental results show the algorithm is more robust and it can achieve copyright protection and authentication.
数字水印技术将信息嵌入到图像、音频和视频等多媒体中。水印解决了版权归属和验证内容完整性的问题。提出了一种基于小波变换和二值水印的图像水印技术。嵌入式算法在两个波段的视频中实现。此外,水印提取过程不需要原始视频序列。实验结果表明,该算法具有较强的鲁棒性,能够实现版权保护和认证。
{"title":"Multiple video watermarking algorithm based on wavelet transform","authors":"J. Panyavaraporn","doi":"10.1109/ISCIT.2013.6645890","DOIUrl":"https://doi.org/10.1109/ISCIT.2013.6645890","url":null,"abstract":"Digital watermarking techniques embed information in multimedia, such as image, audio and video. The watermark has been resolved copyright ownership and verifying the integrity of content. This paper proposed a watermarking technique based on wavelet transform and binary watermark. The embedded algorithm has been done in two bands of video. Furthermore, the watermark extraction process does not need the original video sequence. The experimental results show the algorithm is more robust and it can achieve copyright protection and authentication.","PeriodicalId":356009,"journal":{"name":"2013 13th International Symposium on Communications and Information Technologies (ISCIT)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123734058","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Study of comparison between the DCG-FGT and its equivalent circuit in MOS technology MOS技术中DCG-FGT及其等效电路的比较研究
A. Marzaki, V. Bidal, R. Laffont, W. Rahajandraibe, J. Portal, R. Bouchakour
In this paper, a comparison between the DCG-FGT (Dual-Control-Gate Floating-Gate Transistor) and its equivalent circuit composed of standard components is proposed. We demonstrate the DCG-FGT advantages with measurement and simulations under electrical simulator (ELDO). It is not easily to reproduce the DCG-FGT operating mode with standard MOS technology.
本文对双控门浮栅晶体管(DCG-FGT)及其由标准件组成的等效电路进行了比较。我们通过电子模拟器(ELDO)下的测量和仿真证明了DCG-FGT的优势。用标准MOS技术再现DCG-FGT工作模式并不容易。
{"title":"Study of comparison between the DCG-FGT and its equivalent circuit in MOS technology","authors":"A. Marzaki, V. Bidal, R. Laffont, W. Rahajandraibe, J. Portal, R. Bouchakour","doi":"10.1109/ISCIT.2013.6645858","DOIUrl":"https://doi.org/10.1109/ISCIT.2013.6645858","url":null,"abstract":"In this paper, a comparison between the DCG-FGT (Dual-Control-Gate Floating-Gate Transistor) and its equivalent circuit composed of standard components is proposed. We demonstrate the DCG-FGT advantages with measurement and simulations under electrical simulator (ELDO). It is not easily to reproduce the DCG-FGT operating mode with standard MOS technology.","PeriodicalId":356009,"journal":{"name":"2013 13th International Symposium on Communications and Information Technologies (ISCIT)","volume":"452 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124297425","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A simple adaptive STFC MB-OFDM UWB system for WBAN applications 一个简单的自适应STFC MB-OFDM UWB系统,用于WBAN应用
Miftadi Sudjai, Le Chung Tran, F. Safaei
This paper proposes a simple, but efficient, adaptive space-time-frequency coded (STFC) multiband orthogonal frequency division multiplexing ultra-wideband (MB-OFDM UWB) system to improve the average BER performance for body-to-external link wireless body area network (WBAN) applications. The novelty of this paper is the proposed body direction based adaptive algorithm that controls the set of modulation scheme, space-time-frequency code (STFC) coding rate, and power of signal constellations implemented in STFC MB-OFDM UWB WBAN. Simulation results show that the proposed system can provide a consistent 1-2 dB improvement in the case of 2I1O configuration, and 1-3 dB improvement in a medium-to-high SNR region in the case of 2I2O configuration, compared to the non-adaptive system. The improvement practically means a possible reduction of 12.5%-50% of the total transmitted power to achieve the similar performance as the non-adaptive system. In other words, it can save significantly the power consumption and prolong the battery life of WBAN devices.
本文提出了一种简单而高效的自适应空时频编码(STFC)多频带正交频分复用超宽带(MB-OFDM)系统,以提高体对外部链路无线体域网络(WBAN)应用的平均误码率性能。本文的新颖之处在于提出了基于体向的自适应算法,该算法控制了在STFC MB-OFDM UWB WBAN中实现的调制方案集、空时频码(STFC)编码速率和信号星座功率。仿真结果表明,与非自适应系统相比,该系统在2I2O配置下可提供1-2 dB的一致性改进,在2I2O配置下可提供1-3 dB的中高信噪比区域改进。这种改进实际上意味着可能减少12.5%-50%的总传输功率,以达到与非自适应系统相似的性能。换句话说,它可以显著节省WBAN设备的功耗,延长电池寿命。
{"title":"A simple adaptive STFC MB-OFDM UWB system for WBAN applications","authors":"Miftadi Sudjai, Le Chung Tran, F. Safaei","doi":"10.1109/ISCIT.2013.6645823","DOIUrl":"https://doi.org/10.1109/ISCIT.2013.6645823","url":null,"abstract":"This paper proposes a simple, but efficient, adaptive space-time-frequency coded (STFC) multiband orthogonal frequency division multiplexing ultra-wideband (MB-OFDM UWB) system to improve the average BER performance for body-to-external link wireless body area network (WBAN) applications. The novelty of this paper is the proposed body direction based adaptive algorithm that controls the set of modulation scheme, space-time-frequency code (STFC) coding rate, and power of signal constellations implemented in STFC MB-OFDM UWB WBAN. Simulation results show that the proposed system can provide a consistent 1-2 dB improvement in the case of 2I1O configuration, and 1-3 dB improvement in a medium-to-high SNR region in the case of 2I2O configuration, compared to the non-adaptive system. The improvement practically means a possible reduction of 12.5%-50% of the total transmitted power to achieve the similar performance as the non-adaptive system. In other words, it can save significantly the power consumption and prolong the battery life of WBAN devices.","PeriodicalId":356009,"journal":{"name":"2013 13th International Symposium on Communications and Information Technologies (ISCIT)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124348802","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Hand gesture recognition using codebook model and Pixel-Based Hierarchical-Feature Adaboosting 基于码本模型和基于像素的层次特征自提升的手势识别
Kanjana Pattanaworapan, K. Chamnongthai, Jing-Ming Guo
This paper presents an approach for hand gesture recognition that can be employed to enhance the capability of existing applications, especially in sign language communication. For practical use, the hand posture is taken at the back instead of the front and occurred under unexpected background environment. Unlike the front-hand, the back hand view image is less information than the front-viewed. Thus, the recognition among lack of information is the challenge of this task. Codebook-based foreground detection model is used to detect the hand region under an unexpected background environment. Moreover, the Pixel-Based Hierarchical Feature method is proposed to extract the importance features which are further classified by Adaboosting that yields a high recognition rate. For performance evaluation, we have applied perturbation recognition rate analysis of five alphabet patterns and the experimental results shows that the proposed method provides higher recognition accuracy than existing method.
本文提出了一种手势识别方法,可以提高现有应用程序的识别能力,特别是在手语交流方面。在实际应用中,手的姿势是在后面而不是前面,并且发生在意想不到的背景环境中。不像正手拍,反手拍的图像信息比正手拍的少。因此,在缺乏信息的情况下进行识别是这项任务的挑战。采用基于码本的前景检测模型,对意外背景下的手部区域进行检测。在此基础上,提出了基于像素的分层特征提取方法,提取出重要特征,再进行Adaboosting分类,提高了识别率。为了进行性能评价,我们对5种字母模式进行了摄动识别率分析,实验结果表明,本文提出的方法比现有方法具有更高的识别精度。
{"title":"Hand gesture recognition using codebook model and Pixel-Based Hierarchical-Feature Adaboosting","authors":"Kanjana Pattanaworapan, K. Chamnongthai, Jing-Ming Guo","doi":"10.1109/ISCIT.2013.6645918","DOIUrl":"https://doi.org/10.1109/ISCIT.2013.6645918","url":null,"abstract":"This paper presents an approach for hand gesture recognition that can be employed to enhance the capability of existing applications, especially in sign language communication. For practical use, the hand posture is taken at the back instead of the front and occurred under unexpected background environment. Unlike the front-hand, the back hand view image is less information than the front-viewed. Thus, the recognition among lack of information is the challenge of this task. Codebook-based foreground detection model is used to detect the hand region under an unexpected background environment. Moreover, the Pixel-Based Hierarchical Feature method is proposed to extract the importance features which are further classified by Adaboosting that yields a high recognition rate. For performance evaluation, we have applied perturbation recognition rate analysis of five alphabet patterns and the experimental results shows that the proposed method provides higher recognition accuracy than existing method.","PeriodicalId":356009,"journal":{"name":"2013 13th International Symposium on Communications and Information Technologies (ISCIT)","volume":"155 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116618385","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
An intensity range reduction method for the image trading system with digital fingerprinting in visually protected domain 一种视觉保护域数字指纹图像交易系统的强度范围降低方法
W. Sae-Tang, M. Fujiyoshi, H. Kiya
This paper proposes an intensity range reduction method for amplitude-only images (AOIs) which are inversely transformed amplitude components of images and are used in the digital fingerprinting-based image trading system. The conventional method using two dimensional discrete Fourier transformation (2D DFT) causes intensity range (IR) of AOIs too large to store and/or transmit, and random sign assignment (RSA) is needed in the conventional method to reduce the IR of AOIs. The proposed method uses one dimensional discrete cosine transformation (1D DCT) to generate AOIs with low IRs. In the proposed method, RSA is not needed, and the computational complexity is reduced by using 1D frequency transformation instead of 2D frequency transformation. By using DCT signs instead of DFT phases, a binary image can be used for storing and transmitting DCT signs of a purchased image from a content provider to a consumer; memory and bandwidth consumption is significantly reduced in the proposed method. In addition, a series of inverse DCT, quantization, inverse quantization, and DCT is not needed to handle DCT signs in the proposed method. That is, not only process reduction but also perfect handling of DCT signs which leads to high quality of fingerprinted images is achieved by the proposed method. Experimental results confirm the effectiveness of the proposed method in terms of both quality of fingerprinted images and fingerprinting performance.
针对纯幅图像(AOIs),提出了一种强度范围缩减方法。纯幅图像是图像振幅分量的反变换,用于基于数字指纹的图像交易系统。传统的二维离散傅立叶变换(2D DFT)方法导致aoi的强度范围太大,无法存储或传输,而传统方法需要随机符号分配(RSA)来减小aoi的强度范围。该方法采用一维离散余弦变换(1D DCT)生成低红外光谱的aoi。该方法不需要RSA,采用一维频率变换代替二维频率变换,降低了计算复杂度。通过使用DCT符号而不是DFT相位,二值图像可用于从内容提供者向消费者存储和传输购买图像的DCT符号;该方法显著降低了内存和带宽的消耗。此外,该方法不需要一系列逆DCT、量化、逆量化和DCT来处理DCT符号。也就是说,该方法不仅减少了处理过程,而且能够很好地处理DCT信号,从而获得高质量的指纹图像。实验结果验证了该方法在指纹图像质量和指纹识别性能方面的有效性。
{"title":"An intensity range reduction method for the image trading system with digital fingerprinting in visually protected domain","authors":"W. Sae-Tang, M. Fujiyoshi, H. Kiya","doi":"10.1109/ISCIT.2013.6645895","DOIUrl":"https://doi.org/10.1109/ISCIT.2013.6645895","url":null,"abstract":"This paper proposes an intensity range reduction method for amplitude-only images (AOIs) which are inversely transformed amplitude components of images and are used in the digital fingerprinting-based image trading system. The conventional method using two dimensional discrete Fourier transformation (2D DFT) causes intensity range (IR) of AOIs too large to store and/or transmit, and random sign assignment (RSA) is needed in the conventional method to reduce the IR of AOIs. The proposed method uses one dimensional discrete cosine transformation (1D DCT) to generate AOIs with low IRs. In the proposed method, RSA is not needed, and the computational complexity is reduced by using 1D frequency transformation instead of 2D frequency transformation. By using DCT signs instead of DFT phases, a binary image can be used for storing and transmitting DCT signs of a purchased image from a content provider to a consumer; memory and bandwidth consumption is significantly reduced in the proposed method. In addition, a series of inverse DCT, quantization, inverse quantization, and DCT is not needed to handle DCT signs in the proposed method. That is, not only process reduction but also perfect handling of DCT signs which leads to high quality of fingerprinted images is achieved by the proposed method. Experimental results confirm the effectiveness of the proposed method in terms of both quality of fingerprinted images and fingerprinting performance.","PeriodicalId":356009,"journal":{"name":"2013 13th International Symposium on Communications and Information Technologies (ISCIT)","volume":"102 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117289414","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Temporal sentiment detection for user generated video product reviews 用户生成视频产品评论的时间情感检测
M. Barakat, C. Ritz, D. Stirling
User generated video product reviews in social media gaining popularity every day due to its creditability and the broad evaluation context provided by it. Extracting sentiment automatically from such videos will help the consumers making decisions and producers improving their products. This paper investigates the feasibility of sentiment detection temporally from those videos by analyzing the transcription generated by a speech recognition system which was not investigated before. Another two main contribution for this paper is introducing a solution to the problem of fixed threshold estimation for the Naïve Bayesian classifier output probabilities and irrelative text filtering for improving the sentiment classification. Various experiments indicated the proposed system can achieve an F-score of 0.66 which is promising knowing that the sentiment classifier offers an F-score of 0.78 provided that the input text is error free.
社交媒体上用户生成的视频产品评论由于其可信度和提供的广泛评价背景,每天都在受到欢迎。从这些视频中自动提取情感将有助于消费者做出决定,也有助于生产商改进产品。本文通过分析语音识别系统生成的转录片段,探讨了从这些视频中临时检测情感的可行性。本文的另外两个主要贡献是引入了解决Naïve贝叶斯分类器输出概率的固定阈值估计问题和用于改进情感分类的不相关文本过滤。各种实验表明,所提出的系统可以达到0.66的f分,这是有希望的,因为情感分类器提供0.78的f分,前提是输入文本没有错误。
{"title":"Temporal sentiment detection for user generated video product reviews","authors":"M. Barakat, C. Ritz, D. Stirling","doi":"10.1109/ISCIT.2013.6645925","DOIUrl":"https://doi.org/10.1109/ISCIT.2013.6645925","url":null,"abstract":"User generated video product reviews in social media gaining popularity every day due to its creditability and the broad evaluation context provided by it. Extracting sentiment automatically from such videos will help the consumers making decisions and producers improving their products. This paper investigates the feasibility of sentiment detection temporally from those videos by analyzing the transcription generated by a speech recognition system which was not investigated before. Another two main contribution for this paper is introducing a solution to the problem of fixed threshold estimation for the Naïve Bayesian classifier output probabilities and irrelative text filtering for improving the sentiment classification. Various experiments indicated the proposed system can achieve an F-score of 0.66 which is promising knowing that the sentiment classifier offers an F-score of 0.78 provided that the input text is error free.","PeriodicalId":356009,"journal":{"name":"2013 13th International Symposium on Communications and Information Technologies (ISCIT)","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114981351","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
An improvement of missing value imputation in DNA microarray data using cluster-based LLS method 基于聚类的LLS方法对DNA微阵列数据缺失值输入的改进
Phimmarin Keerin, W. Kurutach, Tossapon Boongoen
Gene expressions measured during a microarray experiment usually encounter the native problem of missing values. These are due to possible errors occurring in the primary experiments, image acquisition and interpretation processes. Leaving this unsolved may critically degrade the reliability of any consequent downstream analysis or medical application. Yet, a further study of microarray data may not be possible with many standard analysis methods that require a complete data set. This paper introduces a new method to impute missing values in microarray data. The proposed algorithm, CLLS impute, is an extension of local least squares imputation with local data clustering being incorporated for improved quality and efficiency. Gene expression data is typically represented as a matrix whose rows and columns corresponds to genes and experiments, respectively. CLLS kicks off by finding a complete dataset via the removal of rows with missing value(s). Then, gene clusters and their corresponding centroids are obtained by applying a clustering technique on the complete dataset. A set of similar genes of the target gene (with missing values) are those belonging to the cluster, whose centroid is the closest to the target. Having known this, the target gene is imputed by applying regression analysis with similar genes previously determined. Empirical evaluation with several published gene expression datasets suggest that the proposed technique performs better than the classical local least square method and recently developed techniques found in the literature.
在微阵列实验中测量的基因表达通常会遇到缺失值的问题。这是由于在初级实验、图像采集和解释过程中可能出现的错误。如果不解决这个问题,可能会严重降低任何后续下游分析或医疗应用的可靠性。然而,微阵列数据的进一步研究可能不可能与许多标准的分析方法,需要一个完整的数据集。本文介绍了一种新的微阵列数据缺失值的计算方法。本文提出的CLLS算法是对局部最小二乘算法的扩展,采用了局部数据聚类,提高了算法的质量和效率。基因表达数据通常表示为矩阵,其行和列分别对应于基因和实验。CLLS首先通过删除缺失值的行来查找完整的数据集。然后,利用聚类技术对完整数据集进行聚类,得到基因聚类及其相应的质心。一组与目标基因相似的基因(缺失值)是指簇中质心最接近目标的基因。在此基础上,利用回归分析的方法,对已知的相似基因进行拟合。对几个已发表的基因表达数据集的实证评估表明,所提出的技术比经典的局部最小二乘法和最近在文献中发现的技术表现得更好。
{"title":"An improvement of missing value imputation in DNA microarray data using cluster-based LLS method","authors":"Phimmarin Keerin, W. Kurutach, Tossapon Boongoen","doi":"10.1109/ISCIT.2013.6645921","DOIUrl":"https://doi.org/10.1109/ISCIT.2013.6645921","url":null,"abstract":"Gene expressions measured during a microarray experiment usually encounter the native problem of missing values. These are due to possible errors occurring in the primary experiments, image acquisition and interpretation processes. Leaving this unsolved may critically degrade the reliability of any consequent downstream analysis or medical application. Yet, a further study of microarray data may not be possible with many standard analysis methods that require a complete data set. This paper introduces a new method to impute missing values in microarray data. The proposed algorithm, CLLS impute, is an extension of local least squares imputation with local data clustering being incorporated for improved quality and efficiency. Gene expression data is typically represented as a matrix whose rows and columns corresponds to genes and experiments, respectively. CLLS kicks off by finding a complete dataset via the removal of rows with missing value(s). Then, gene clusters and their corresponding centroids are obtained by applying a clustering technique on the complete dataset. A set of similar genes of the target gene (with missing values) are those belonging to the cluster, whose centroid is the closest to the target. Having known this, the target gene is imputed by applying regression analysis with similar genes previously determined. Empirical evaluation with several published gene expression datasets suggest that the proposed technique performs better than the classical local least square method and recently developed techniques found in the literature.","PeriodicalId":356009,"journal":{"name":"2013 13th International Symposium on Communications and Information Technologies (ISCIT)","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115430900","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
On covert data falsification attacks on distributed detection systems 分布式检测系统的隐蔽数据伪造攻击研究
B. Kailkhura, Y. Han, Swastik Brahma, P. Varshney
In distributed detection systems, nodes make one bit decisions regarding the presence of a phenomenon and collaboratively make a global decision at the fusion center (FC). The performance of such systems strongly depends on the reliability of the nodes in the network. The robustness of distributed detection systems against attacks is of utmost importance for the functioning of distributed detection systems. The distributed nature of such systems makes them quite vulnerable to different types of attacks. In this paper, we introduce the problem of intelligent data falsification attacks on distributed detection systems. First, we propose a scheme to detect data falsification attacks and analytically characterize its performance. Next, we obtain the optimal attacking strategy from the point of view of a smart adversary to disguise itself from the proposed detection scheme while accomplishing its attack.
在分布式检测系统中,节点根据现象的存在做出一位决策,并在融合中心(FC)协同做出全局决策。这类系统的性能很大程度上取决于网络中节点的可靠性。分布式检测系统对攻击的鲁棒性对分布式检测系统的功能至关重要。这种系统的分布式特性使得它们很容易受到不同类型的攻击。本文介绍了分布式检测系统中的智能数据伪造攻击问题。首先,我们提出了一种检测数据伪造攻击的方案,并对其性能进行了分析表征。接下来,我们从一个聪明的对手的角度获得最优攻击策略,在完成攻击的同时伪装自己不受所提出的检测方案的影响。
{"title":"On covert data falsification attacks on distributed detection systems","authors":"B. Kailkhura, Y. Han, Swastik Brahma, P. Varshney","doi":"10.1109/ISCIT.2013.6645893","DOIUrl":"https://doi.org/10.1109/ISCIT.2013.6645893","url":null,"abstract":"In distributed detection systems, nodes make one bit decisions regarding the presence of a phenomenon and collaboratively make a global decision at the fusion center (FC). The performance of such systems strongly depends on the reliability of the nodes in the network. The robustness of distributed detection systems against attacks is of utmost importance for the functioning of distributed detection systems. The distributed nature of such systems makes them quite vulnerable to different types of attacks. In this paper, we introduce the problem of intelligent data falsification attacks on distributed detection systems. First, we propose a scheme to detect data falsification attacks and analytically characterize its performance. Next, we obtain the optimal attacking strategy from the point of view of a smart adversary to disguise itself from the proposed detection scheme while accomplishing its attack.","PeriodicalId":356009,"journal":{"name":"2013 13th International Symposium on Communications and Information Technologies (ISCIT)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124975962","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Design and implementation of a reconfigurable SoC for high-definition video applications 高清晰度视频应用的可重构SoC的设计与实现
Shu-Wei Sun, Xiang-Yuan Liu, Lei-Bo Liu, Cao Peng
This paper proposes a reconfigurable SoC architecture based on a large-scale reconfigurable processing elements (PEs) array, a high-performance RISC core and several embedded peripherals on-chip, which are coupled tightly through System buses of AMBA2.0. The large-scale PEs array is used to process video signals with different standards under appropriate contexts disposed dynamically. The embedded peripherals are with responsibility for the input of media stream data and output of the decoded multimedia data to display, while the RISC core takes charge of the initialization of the peripherals and the reconfigurable PEs, the pretreatment of media stream data, the audio decoding, the synchronization between audio and video data, and some other scheduling functions. The antitype SoC chip is implemented based on 65nm CMOS silicon techniques, and the testing results show that the reconfigurable SoC achieves the performance of real-time decoding of videos with size of 1920*1080 @ 30fps which follow the H.264, AVS and MPEG-2 standards respectively.
本文提出了一种基于大规模可重构处理元件(PEs)阵列、高性能RISC内核和片上多个嵌入式外设,通过AMBA2.0系统总线紧密耦合的可重构SoC架构。在动态配置的适当环境下,采用大规模pe阵列对不同标准的视频信号进行处理。嵌入式外设负责媒体流数据的输入和解码后的多媒体数据的输出显示,RISC内核负责外设和可重构pe的初始化、媒体流数据的预处理、音频解码、音视频数据的同步以及其他调度功能。基于65nm CMOS硅片技术实现了原型SoC芯片,测试结果表明,可重构SoC实现了尺寸为1920*1080 @ 30fps的视频实时解码性能,分别遵循H.264、AVS和MPEG-2标准。
{"title":"Design and implementation of a reconfigurable SoC for high-definition video applications","authors":"Shu-Wei Sun, Xiang-Yuan Liu, Lei-Bo Liu, Cao Peng","doi":"10.1109/ISCIT.2013.6645897","DOIUrl":"https://doi.org/10.1109/ISCIT.2013.6645897","url":null,"abstract":"This paper proposes a reconfigurable SoC architecture based on a large-scale reconfigurable processing elements (PEs) array, a high-performance RISC core and several embedded peripherals on-chip, which are coupled tightly through System buses of AMBA2.0. The large-scale PEs array is used to process video signals with different standards under appropriate contexts disposed dynamically. The embedded peripherals are with responsibility for the input of media stream data and output of the decoded multimedia data to display, while the RISC core takes charge of the initialization of the peripherals and the reconfigurable PEs, the pretreatment of media stream data, the audio decoding, the synchronization between audio and video data, and some other scheduling functions. The antitype SoC chip is implemented based on 65nm CMOS silicon techniques, and the testing results show that the reconfigurable SoC achieves the performance of real-time decoding of videos with size of 1920*1080 @ 30fps which follow the H.264, AVS and MPEG-2 standards respectively.","PeriodicalId":356009,"journal":{"name":"2013 13th International Symposium on Communications and Information Technologies (ISCIT)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123396046","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Track-seeking control using input-shaping method to reduce vibration in HDD 采用输入整形法的寻迹控制降低硬盘振动
Wimonrat Runghimmawan, W. Chatlatanagulchai, P. Sooraksa
Hard disk drives are used for storage information in its recording disk or media. Actuator arm is mechanical part to move heads that fly over a track from any position to the target track. Accuracy signal and access time are the key parameters to control the actuator seeking position. However, the accuracy signal and access time are adverse when actuator moves faster and then the system create the residual vibration at the target track. The causes of the vibration are part from the fact that the reference signals, which are acceleration, velocity, and position, have high power spectrum energy over wide frequency range including over the actuator's natural frequency. The input shaping is convolved two signals at referent position signal and properly designed impulse signal. The impulse sequence produces an input signal to cancel residual vibration, then the result is smoother and the residual vibration is canceled in actuator-arm movement. Hence the residual vibration should be reduced by the recommended input shaping.
硬盘驱动器用于在其记录磁盘或媒体中存储信息。致动臂是一种机械部件,用于将飞行在轨道上的头从任何位置移动到目标轨道。精度信号和访问时间是控制作动器寻位的关键参数。然而,当作动器运动速度较快时,系统在目标轨迹处产生残余振动,对信号精度和访问时间不利。产生振动的部分原因是参考信号,即加速度、速度和位置,在宽频率范围内(包括执行器的固有频率)具有高功率谱能量。输入整形是将两个相对位置信号和适当设计的脉冲信号进行卷积。脉冲序列产生一个消除残余振动的输入信号,使结果更加平滑,并消除了执行臂运动中的残余振动。因此,应通过推荐的输入整形来减少残余振动。
{"title":"Track-seeking control using input-shaping method to reduce vibration in HDD","authors":"Wimonrat Runghimmawan, W. Chatlatanagulchai, P. Sooraksa","doi":"10.1109/ISCIT.2013.6645924","DOIUrl":"https://doi.org/10.1109/ISCIT.2013.6645924","url":null,"abstract":"Hard disk drives are used for storage information in its recording disk or media. Actuator arm is mechanical part to move heads that fly over a track from any position to the target track. Accuracy signal and access time are the key parameters to control the actuator seeking position. However, the accuracy signal and access time are adverse when actuator moves faster and then the system create the residual vibration at the target track. The causes of the vibration are part from the fact that the reference signals, which are acceleration, velocity, and position, have high power spectrum energy over wide frequency range including over the actuator's natural frequency. The input shaping is convolved two signals at referent position signal and properly designed impulse signal. The impulse sequence produces an input signal to cancel residual vibration, then the result is smoother and the residual vibration is canceled in actuator-arm movement. Hence the residual vibration should be reduced by the recommended input shaping.","PeriodicalId":356009,"journal":{"name":"2013 13th International Symposium on Communications and Information Technologies (ISCIT)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127710749","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2013 13th International Symposium on Communications and Information Technologies (ISCIT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1