首页 > 最新文献

2005 IEEE International Conference on Electro Information Technology最新文献

英文 中文
An Enhanced IPSec for Anonymous Internet Communication Internet匿名通信的增强型IPSec
Pub Date : 2005-05-22 DOI: 10.1109/EIT.2005.1626961
Celia Li, Cungang Yang
Anonymity is increasingly important for networked applications amidst concerns over censorship and privacy. Even though strong anonymity and privacy guarantees are critical for many applications, current Internet networking protocols provide no support for masking the identity of communication endpoints. In this paper, we proposed an enhanced IPSec protocol (EIPSec). It supports secure and anonymous communication on the Internet. In addition, the anonymity Internet communication provides high resistance against various attacks.
由于对审查和隐私的担忧,匿名性对网络应用程序越来越重要。尽管强匿名性和隐私保证对许多应用程序至关重要,但当前的Internet网络协议不支持掩盖通信端点的身份。本文提出了一种增强型IPSec协议(EIPSec)。它支持互联网上的安全和匿名通信。此外,互联网通信的匿名性对各种攻击具有很高的抵抗力。
{"title":"An Enhanced IPSec for Anonymous Internet Communication","authors":"Celia Li, Cungang Yang","doi":"10.1109/EIT.2005.1626961","DOIUrl":"https://doi.org/10.1109/EIT.2005.1626961","url":null,"abstract":"Anonymity is increasingly important for networked applications amidst concerns over censorship and privacy. Even though strong anonymity and privacy guarantees are critical for many applications, current Internet networking protocols provide no support for masking the identity of communication endpoints. In this paper, we proposed an enhanced IPSec protocol (EIPSec). It supports secure and anonymous communication on the Internet. In addition, the anonymity Internet communication provides high resistance against various attacks.","PeriodicalId":358002,"journal":{"name":"2005 IEEE International Conference on Electro Information Technology","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125572104","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Certification of large distributed computations with task dependencies in hostile environments 敌对环境中具有任务依赖关系的大型分布式计算的认证
Pub Date : 2005-05-22 DOI: 10.1109/EIT.2005.1626985
A. Krings, Jean-Louis Roch, S. Jafar
This research addresses certification of large distributed applications executing in hostile environments, where tasks or the results they produce may have been corrupted due to benign or malicious act. We extend recent results addressing applications with task dependencies and introduce new probabilistic certification algorithms that establish whether the computations have been massively attacked. The probabilistic approach does not make any assumptions about task behavior as the result of an attack and certification errors are only due to unlucky random choices. Bounds associated with certification are provided for general graphs and for out-trees found in medical image analysis applications of the French ragtime project
本研究涉及在敌对环境中执行的大型分布式应用程序的认证,其中任务或它们产生的结果可能由于良性或恶意行为而损坏。我们扩展了处理具有任务依赖性的应用程序的最新结果,并引入了新的概率认证算法,以确定计算是否受到了大规模攻击。概率方法没有对任务行为做出任何假设,因为攻击的结果和认证错误只是由于不幸的随机选择。在法国拉格泰姆项目的医学图像分析应用中,为一般图和外树提供了与认证相关的边界
{"title":"Certification of large distributed computations with task dependencies in hostile environments","authors":"A. Krings, Jean-Louis Roch, S. Jafar","doi":"10.1109/EIT.2005.1626985","DOIUrl":"https://doi.org/10.1109/EIT.2005.1626985","url":null,"abstract":"This research addresses certification of large distributed applications executing in hostile environments, where tasks or the results they produce may have been corrupted due to benign or malicious act. We extend recent results addressing applications with task dependencies and introduce new probabilistic certification algorithms that establish whether the computations have been massively attacked. The probabilistic approach does not make any assumptions about task behavior as the result of an attack and certification errors are only due to unlucky random choices. Bounds associated with certification are provided for general graphs and for out-trees found in medical image analysis applications of the French ragtime project","PeriodicalId":358002,"journal":{"name":"2005 IEEE International Conference on Electro Information Technology","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134034521","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Business objects as part of a preprocessing based micro array data analysis 业务对象的预处理部分是基于微阵列的数据分析
Pub Date : 2005-05-22 DOI: 10.1109/EIT.2005.1627042
Dietmar P. F. Moeller
The paper presents the application of soft computing methodology in medicine. Applied to micro array data analysis one may introduce soft computing as part of sensitive networks and classifiers. While sensitized nets enable the conditioning of case study specific classifiers, scientists are able using specific linguistic IF-THEN rules to create appropriate fuzzy sets that can be helpful for use in micro array data analysis. Henceforth, scientists are empowered handling these classifiers in situ, phased to their measuring equipment and/or case study specific parameters, under case investigation
本文介绍了软计算方法在医学中的应用。应用于微阵列数据分析,可以引入软计算作为敏感网络和分类器的一部分。虽然敏感网络能够调节案例研究特定分类器,但科学家能够使用特定的语言IF-THEN规则来创建适当的模糊集,这有助于在微阵列数据分析中使用。此后,科学家有权在现场处理这些分类器,根据案例调查,逐步使用他们的测量设备和/或案例研究特定参数
{"title":"Business objects as part of a preprocessing based micro array data analysis","authors":"Dietmar P. F. Moeller","doi":"10.1109/EIT.2005.1627042","DOIUrl":"https://doi.org/10.1109/EIT.2005.1627042","url":null,"abstract":"The paper presents the application of soft computing methodology in medicine. Applied to micro array data analysis one may introduce soft computing as part of sensitive networks and classifiers. While sensitized nets enable the conditioning of case study specific classifiers, scientists are able using specific linguistic IF-THEN rules to create appropriate fuzzy sets that can be helpful for use in micro array data analysis. Henceforth, scientists are empowered handling these classifiers in situ, phased to their measuring equipment and/or case study specific parameters, under case investigation","PeriodicalId":358002,"journal":{"name":"2005 IEEE International Conference on Electro Information Technology","volume":"331 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132335745","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Carry-save and binary sign-digit representations conversion 携带保存和二进制符号-数字表示转换
Pub Date : 2005-05-22 DOI: 10.1109/EIT.2005.1626959
Guoping Wang
Computer arithmetic operations based on the binary sign-digit (BSD) numbers and carry-save addition (CSA) representation systems provide them with high-speed computations due to carry-propagation free features. However, in the previous researches, these two representations are treated respectively. In this paper, the algorithms and implementation structures are proposed for the conversion between them, thus, the arithmetic developed for one representation can be easily adapted to the other. The conversion overheads in the area and speed are also studied
基于二进制符号-位数(BSD)数和免进位加法(CSA)表示系统的计算机算术运算,由于无进位传播的特性,为它们提供了高速计算。然而,在以往的研究中,这两种表征是分别处理的。在本文中,提出了它们之间转换的算法和实现结构,因此,为一种表示开发的算法可以很容易地适应另一种表示。本文还研究了面积和速度上的转换开销
{"title":"Carry-save and binary sign-digit representations conversion","authors":"Guoping Wang","doi":"10.1109/EIT.2005.1626959","DOIUrl":"https://doi.org/10.1109/EIT.2005.1626959","url":null,"abstract":"Computer arithmetic operations based on the binary sign-digit (BSD) numbers and carry-save addition (CSA) representation systems provide them with high-speed computations due to carry-propagation free features. However, in the previous researches, these two representations are treated respectively. In this paper, the algorithms and implementation structures are proposed for the conversion between them, thus, the arithmetic developed for one representation can be easily adapted to the other. The conversion overheads in the area and speed are also studied","PeriodicalId":358002,"journal":{"name":"2005 IEEE International Conference on Electro Information Technology","volume":"96 5","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114026558","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Hierarchical organization for video annotation 视频注释的分层组织
Pub Date : 2005-05-22 DOI: 10.1109/EIT.2005.1627031
Honglin Li, S. Aahlt
The omnipresent multimedia data calls for efficient and flexible methodologies to annotate, organize, store, and access video resources. Video annotation data, or video meta-data, plays an important role in the future annotation-driven video systems. Although the importance of the video annotation data is widely recognized and a considerable amount of research has been conducted on its various aspects, there is no consistent framework on which to structure video annotation data. In this paper, we have focused on investigating the nature of the video annotation data, and accordingly proposed one hierarchical structure for video annotations. Additionally, we have studied the techniques needed to hierarchically organize video annotations and proposed VideoML - an XML-based language - to organize the hierarchical video annotation data. VideoML is built upon the video part of MPEG-7 with special consideration of the video annotation data's hierarchical structure
无处不在的多媒体数据需要高效灵活的方法来注释、组织、存储和访问视频资源。视频注释数据或视频元数据在未来的注释驱动视频系统中扮演着重要的角色。尽管视频标注数据的重要性已得到广泛认可,并且对其各方面进行了大量的研究,但目前还没有统一的框架来构建视频标注数据。本文重点研究了视频标注数据的性质,提出了一种视频标注的层次结构。此外,我们还研究了分层组织视频注释所需的技术,并提出了VideoML(一种基于xml的语言)来组织分层视频注释数据。VideoML建立在MPEG-7的视频部分的基础上,特别考虑了视频注释数据的层次结构
{"title":"Hierarchical organization for video annotation","authors":"Honglin Li, S. Aahlt","doi":"10.1109/EIT.2005.1627031","DOIUrl":"https://doi.org/10.1109/EIT.2005.1627031","url":null,"abstract":"The omnipresent multimedia data calls for efficient and flexible methodologies to annotate, organize, store, and access video resources. Video annotation data, or video meta-data, plays an important role in the future annotation-driven video systems. Although the importance of the video annotation data is widely recognized and a considerable amount of research has been conducted on its various aspects, there is no consistent framework on which to structure video annotation data. In this paper, we have focused on investigating the nature of the video annotation data, and accordingly proposed one hierarchical structure for video annotations. Additionally, we have studied the techniques needed to hierarchically organize video annotations and proposed VideoML - an XML-based language - to organize the hierarchical video annotation data. VideoML is built upon the video part of MPEG-7 with special consideration of the video annotation data's hierarchical structure","PeriodicalId":358002,"journal":{"name":"2005 IEEE International Conference on Electro Information Technology","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128655135","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A survey of data protection technologies 数据保护技术综述
Pub Date : 2005-05-22 DOI: 10.1109/EIT.2005.1626983
Chung-Yen Chang
The most important asset in any computing environment is the data that is being processed. Lost information can be disastrous to any enterprise or corporate. Therefore, data protection is one of the most important tasks performed on any computer systems on a regular basis. The mechanisms used by data protection vary depending on the kind of data to be protected and the type of media used. Traditionally, data protection focuses mainly on backup applications which copies data to removable media that can be shelved and protected. By putting the copy on removable media, they are isolated from the problems that can cause data loss or corruption on the live system. Recent development and cost reduction in hard disk technologies and the growing concern over data safety have made it more attractive to perform data protections using online disk-based media. The author of this paper takes a broader view of data protection and surveys different technologies that are used at different places in a computer system to guard against data loss. Pros and cons of these technologies were analyzed and some best practice guidelines were provided for implementing data protection strategies
在任何计算环境中,最重要的资产是正在处理的数据。信息丢失对任何企业或公司来说都是灾难性的。因此,数据保护是在任何计算机系统上定期执行的最重要的任务之一。数据保护所使用的机制取决于要保护的数据类型和所使用的介质类型。传统上,数据保护主要集中在备份应用程序上,它将数据复制到可以搁置和保护的可移动媒体上。通过将副本放在可移动媒体上,它们与可能导致实时系统上数据丢失或损坏的问题隔离开来。硬盘技术的最新发展和成本的降低以及对数据安全的日益关注使得使用基于在线磁盘的媒体执行数据保护更具吸引力。本文的作者从更广阔的角度来看待数据保护,并调查了在计算机系统中不同位置使用的不同技术来防止数据丢失。分析了这些技术的优缺点,并为实施数据保护策略提供了一些最佳实践指南
{"title":"A survey of data protection technologies","authors":"Chung-Yen Chang","doi":"10.1109/EIT.2005.1626983","DOIUrl":"https://doi.org/10.1109/EIT.2005.1626983","url":null,"abstract":"The most important asset in any computing environment is the data that is being processed. Lost information can be disastrous to any enterprise or corporate. Therefore, data protection is one of the most important tasks performed on any computer systems on a regular basis. The mechanisms used by data protection vary depending on the kind of data to be protected and the type of media used. Traditionally, data protection focuses mainly on backup applications which copies data to removable media that can be shelved and protected. By putting the copy on removable media, they are isolated from the problems that can cause data loss or corruption on the live system. Recent development and cost reduction in hard disk technologies and the growing concern over data safety have made it more attractive to perform data protections using online disk-based media. The author of this paper takes a broader view of data protection and surveys different technologies that are used at different places in a computer system to guard against data loss. Pros and cons of these technologies were analyzed and some best practice guidelines were provided for implementing data protection strategies","PeriodicalId":358002,"journal":{"name":"2005 IEEE International Conference on Electro Information Technology","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128759019","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Improving wireless link delivery ratio classification with packet SNR 利用分组信噪比改进无线链路传输比分类
Pub Date : 2005-05-22 DOI: 10.1109/EIT.2005.1626960
Yunqian Ma
Accurate link delivery ratio prediction is crucial to routing protocols in wireless mesh network. Since predicting delivery ratio directly usually requires excessive probing packets, it has been suggested to use packet SNR to predict delivery ratio, as SNR is a measure easy to obtain and "free" with every received packet. Unfortunately, several previous studies have shown that a simple direct mapping between SNR and delivery ratio values is often impossible. In this paper, we formulate the delivery ratio prediction problem as a classification problem (predicting link to be "good" or "bad), and apply various statistical classification algorithms (k-NN, kernel methods, and support vector machines) to it. We obtain the temporal data of link delivery ratios and SNR's from a measurement trace of a live wireless mesh network, and analyze the effectiveness of using SNR to enhance delivery ratio classification. Contrary to the pessimistic conclusion of previous works, we find that by incorporating SNR information in addition to historical delivery ratio data, the classification accuracy is improved in all the algorithms we used, with an average reduction of 8-10% of errors compared with using delivery ratio data alone. We therefore conclude that adding SNR can be an attractive alternative when designing a wireless link delivery ratio prediction protocol
准确的链路投递率预测是无线网状网络中路由协议的关键。由于直接预测投递比通常需要过多的探测包,因此建议使用包的信噪比来预测投递比,因为信噪比是一个易于获得且与每个接收到的包“免费”的度量。不幸的是,之前的一些研究表明,信噪比和传递比值之间的简单直接映射通常是不可能的。在本文中,我们将交付率预测问题表述为一个分类问题(预测链接是“好”还是“坏”),并将各种统计分类算法(k-NN,核方法和支持向量机)应用于该问题。从实时无线网状网络的测量轨迹中获得了链路投递比和信噪比的时间数据,并分析了利用信噪比增强投递比分类的有效性。与以往工作的悲观结论相反,我们发现除了历史交付率数据外,通过结合信噪比信息,我们使用的所有算法的分类精度都得到了提高,与单独使用交付率数据相比,平均减少了8-10%的错误。因此,我们得出结论,在设计无线链路传输比预测协议时,添加信噪比可能是一个有吸引力的替代方案
{"title":"Improving wireless link delivery ratio classification with packet SNR","authors":"Yunqian Ma","doi":"10.1109/EIT.2005.1626960","DOIUrl":"https://doi.org/10.1109/EIT.2005.1626960","url":null,"abstract":"Accurate link delivery ratio prediction is crucial to routing protocols in wireless mesh network. Since predicting delivery ratio directly usually requires excessive probing packets, it has been suggested to use packet SNR to predict delivery ratio, as SNR is a measure easy to obtain and \"free\" with every received packet. Unfortunately, several previous studies have shown that a simple direct mapping between SNR and delivery ratio values is often impossible. In this paper, we formulate the delivery ratio prediction problem as a classification problem (predicting link to be \"good\" or \"bad), and apply various statistical classification algorithms (k-NN, kernel methods, and support vector machines) to it. We obtain the temporal data of link delivery ratios and SNR's from a measurement trace of a live wireless mesh network, and analyze the effectiveness of using SNR to enhance delivery ratio classification. Contrary to the pessimistic conclusion of previous works, we find that by incorporating SNR information in addition to historical delivery ratio data, the classification accuracy is improved in all the algorithms we used, with an average reduction of 8-10% of errors compared with using delivery ratio data alone. We therefore conclude that adding SNR can be an attractive alternative when designing a wireless link delivery ratio prediction protocol","PeriodicalId":358002,"journal":{"name":"2005 IEEE International Conference on Electro Information Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129281756","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
High-throughput high-performance VBLAST-OFDM via carrier interferometry 基于载波干涉的高吞吐量高性能VBLAST-OFDM
Pub Date : 2005-05-22 DOI: 10.1109/EIT.2005.1627026
Peng Liang, Shaopeng Feng, Chuan-gang Zhao, Weilin Wu
Carrier interferometry (CI) may be used to spread OFDM symbols over all N subcarriers to exploit frequency diversity without loss in throughput. In this paper, we implement the OFDM (uncoded and coded) system incorporated with the carrier interferometry and VBLAST (Vertical Bell Laboratories layered Space-Time) to undertake performance comparison in frequency selective fading channel. It is shown that the novel systems, offer considerable high throughput provided by VBLAST architecture. The novel systems simultaneously achieve dramatic performance gains by taking advantage of large frequency diversity inherent in the CI/OFDM technique. The proposed VBLAST-CI/OFDM system outperforms the VBLAST-OFDM system by 5 dB at a BER of 10-2 and 8 dB at BER of 10-3. The VBLAST-CI/COFDM system demonstrates a 4 dB performance gain at a BER of 10-3 over the VBLAST-COFDM system. VBLAST-CI/COFDM system offers a performance 2dB better than COFDM at a BER of 10-3 and simultaneously provides a throughput P(the number of transmit antennas) times that of COFDM at the expense of receiver complexity
载波干涉法(CI)可用于在所有N个子载波上传播OFDM符号,以利用频率分集而不损失吞吐量。在本文中,我们实现了结合载波干涉和VBLAST(垂直贝尔实验室分层时空)技术的OFDM(无编码和编码)系统,在频率选择衰落信道中进行性能比较。实验结果表明,该系统在VBLAST架构下具有相当高的吞吐量。新型系统利用CI/OFDM技术固有的大频率分集,同时实现了显著的性能提升。提出的VBLAST-CI/OFDM系统在10-2的误码率下比VBLAST-OFDM系统高5db,在10-3的误码率下比VBLAST-OFDM系统高8db。与VBLAST-COFDM系统相比,VBLAST-CI/COFDM系统在误码率为10-3时的性能增益为4 dB。VBLAST-CI/COFDM系统在误码率为10-3的情况下,性能比COFDM高2dB,同时在降低接收机复杂度的前提下,提供了比COFDM高2倍的吞吐量P(发射天线数)
{"title":"High-throughput high-performance VBLAST-OFDM via carrier interferometry","authors":"Peng Liang, Shaopeng Feng, Chuan-gang Zhao, Weilin Wu","doi":"10.1109/EIT.2005.1627026","DOIUrl":"https://doi.org/10.1109/EIT.2005.1627026","url":null,"abstract":"Carrier interferometry (CI) may be used to spread OFDM symbols over all N subcarriers to exploit frequency diversity without loss in throughput. In this paper, we implement the OFDM (uncoded and coded) system incorporated with the carrier interferometry and VBLAST (Vertical Bell Laboratories layered Space-Time) to undertake performance comparison in frequency selective fading channel. It is shown that the novel systems, offer considerable high throughput provided by VBLAST architecture. The novel systems simultaneously achieve dramatic performance gains by taking advantage of large frequency diversity inherent in the CI/OFDM technique. The proposed VBLAST-CI/OFDM system outperforms the VBLAST-OFDM system by 5 dB at a BER of 10-2 and 8 dB at BER of 10-3. The VBLAST-CI/COFDM system demonstrates a 4 dB performance gain at a BER of 10-3 over the VBLAST-COFDM system. VBLAST-CI/COFDM system offers a performance 2dB better than COFDM at a BER of 10-3 and simultaneously provides a throughput P(the number of transmit antennas) times that of COFDM at the expense of receiver complexity","PeriodicalId":358002,"journal":{"name":"2005 IEEE International Conference on Electro Information Technology","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116099831","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Energy efficient multi-resolution visual surveillance on wireless sensor networks 基于无线传感器网络的高能效多分辨率视觉监控
Pub Date : 2005-05-22 DOI: 10.1109/EIT.2005.1626975
K. Veeraraghavan, D. Peng, H. Sharif
Visual surveillance with a distributed ad hoc sensor network enable reliable monitoring and control of a variety of applications that range from civil to military. However, due to the large volume of multimedia data associated with visual sensors, the surveillance scheme has to be architected with a goal of energy conservation and extending life expectancy. In this paper, we briefly discuss the computation and communication energy costs associated with a sensor node and explore the possibilities of extending battery life by choosing to perform local processing. We propose a discrete wavelet transform (DWT) based multi-resolution surveillance schema designed to reduce power requirement. We then compare and contrast the computational and communication power expended by a traditionally used JPEG-based scheme and illustrate the significant power savings achieved by the proposed surveillance system
具有分布式自组织传感器网络的视觉监视能够对从民用到军事的各种应用进行可靠的监视和控制。然而,由于与视觉传感器相关的大量多媒体数据,监控方案必须以节能和延长寿命为目标来构建。在本文中,我们简要讨论了与传感器节点相关的计算和通信能量成本,并探讨了通过选择执行本地处理来延长电池寿命的可能性。提出了一种基于离散小波变换(DWT)的多分辨率监控方案,以降低功耗要求。然后,我们比较和对比了传统使用的基于jpeg的方案所消耗的计算和通信功率,并说明了所提出的监控系统所实现的显著节能
{"title":"Energy efficient multi-resolution visual surveillance on wireless sensor networks","authors":"K. Veeraraghavan, D. Peng, H. Sharif","doi":"10.1109/EIT.2005.1626975","DOIUrl":"https://doi.org/10.1109/EIT.2005.1626975","url":null,"abstract":"Visual surveillance with a distributed ad hoc sensor network enable reliable monitoring and control of a variety of applications that range from civil to military. However, due to the large volume of multimedia data associated with visual sensors, the surveillance scheme has to be architected with a goal of energy conservation and extending life expectancy. In this paper, we briefly discuss the computation and communication energy costs associated with a sensor node and explore the possibilities of extending battery life by choosing to perform local processing. We propose a discrete wavelet transform (DWT) based multi-resolution surveillance schema designed to reduce power requirement. We then compare and contrast the computational and communication power expended by a traditionally used JPEG-based scheme and illustrate the significant power savings achieved by the proposed surveillance system","PeriodicalId":358002,"journal":{"name":"2005 IEEE International Conference on Electro Information Technology","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126797943","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Incorporation of sparse priors in long-code blind multiuser detection for DS-CDMA communication 结合稀疏先验的DS-CDMA通信长码盲多用户检测
Pub Date : 2005-05-22 DOI: 10.1109/EIT.2005.1627027
D. Overbye
This paper presents a new method of compensating for complex multipath channel fading in blind multiuser detection for long-code DS-CDMA communication. The system employs detectors that incorporate methods of independent component analysis (ICA). Such detectors are subject to performance degradation as the length of the user spreading code increases. When compensated through a class of sparse priors, the long-code ICA neural network detectors displayed significantly better bit error rate performance. Performance of the long-code detectors approached that of the short-code detectors in some cases
提出了一种补偿长码DS-CDMA通信盲多用户检测中复杂多径信道衰落的新方法。该系统采用结合独立成分分析(ICA)方法的检测器。随着用户扩展代码长度的增加,这种检测器的性能会下降。当通过一类稀疏先验进行补偿时,长码ICA神经网络检测器显示出较好的误码率性能。在某些情况下,长码检测器的性能接近短码检测器
{"title":"Incorporation of sparse priors in long-code blind multiuser detection for DS-CDMA communication","authors":"D. Overbye","doi":"10.1109/EIT.2005.1627027","DOIUrl":"https://doi.org/10.1109/EIT.2005.1627027","url":null,"abstract":"This paper presents a new method of compensating for complex multipath channel fading in blind multiuser detection for long-code DS-CDMA communication. The system employs detectors that incorporate methods of independent component analysis (ICA). Such detectors are subject to performance degradation as the length of the user spreading code increases. When compensated through a class of sparse priors, the long-code ICA neural network detectors displayed significantly better bit error rate performance. Performance of the long-code detectors approached that of the short-code detectors in some cases","PeriodicalId":358002,"journal":{"name":"2005 IEEE International Conference on Electro Information Technology","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115124575","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2005 IEEE International Conference on Electro Information Technology
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1