首页 > 最新文献

2013 Third International Conference on Instrumentation, Measurement, Computer, Communication and Control最新文献

英文 中文
Study on Computer Network Intrusion Effect Evaluation 计算机网络入侵效果评估研究
Jing-ju Liu, Yong-jie Wang
It is very important to study computer network intrusion effect evaluation on studying security of computer network information system and harmfulness of computer network intrusion behavior. This is a concise overview paper about main research results and development foreground of computer network intrusion effect evaluation. In this paper we focus on the research results of the follow aspects: formal analysis of computer network intrusion behavior, taxonomy and analysis of security vulnerability and intrusion behavior, modeling and simulation of computer network intrusion behavior, evaluation model and method of computer network intrusion effect. In this paper we have given a full analysis of the main research work on computer network intrusion effect evaluation. At the end of this paper we summarize computer network intrusion effect evaluation and open up prospects for this area.
研究计算机网络入侵效果评估对研究计算机网络信息系统的安全性和计算机网络入侵行为的危害性具有十分重要的意义。本文对计算机网络入侵效果评价的主要研究成果和发展前景进行了简要概述。本文重点介绍了计算机网络入侵行为的形式化分析、安全漏洞与入侵行为的分类与分析、计算机网络入侵行为的建模与仿真、计算机网络入侵效果评估模型与方法等方面的研究成果。本文对计算机网络入侵效果评估的主要研究工作进行了全面的分析。最后对计算机网络入侵效果评估进行了总结,并对该领域的发展前景进行了展望。
{"title":"Study on Computer Network Intrusion Effect Evaluation","authors":"Jing-ju Liu, Yong-jie Wang","doi":"10.1109/IMCCC.2013.80","DOIUrl":"https://doi.org/10.1109/IMCCC.2013.80","url":null,"abstract":"It is very important to study computer network intrusion effect evaluation on studying security of computer network information system and harmfulness of computer network intrusion behavior. This is a concise overview paper about main research results and development foreground of computer network intrusion effect evaluation. In this paper we focus on the research results of the follow aspects: formal analysis of computer network intrusion behavior, taxonomy and analysis of security vulnerability and intrusion behavior, modeling and simulation of computer network intrusion behavior, evaluation model and method of computer network intrusion effect. In this paper we have given a full analysis of the main research work on computer network intrusion effect evaluation. At the end of this paper we summarize computer network intrusion effect evaluation and open up prospects for this area.","PeriodicalId":360796,"journal":{"name":"2013 Third International Conference on Instrumentation, Measurement, Computer, Communication and Control","volume":"517 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133340429","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Liquid Opacity Detection Method Based on Bidimensional Empirical Mode Decomposition 基于二维经验模态分解的液体不透明度检测方法
Guo Qiang, Song Wen-ming
According to the problem that liquid turbidity detection is vulnerable to the noise, a novel liquid turbidity detection method based on Bidimensional Empirical Mode Decomposition (BEMD) and Robert operator is proposed. The key part of method is the BEMD algorithm, with which, liquid images can be decomposed to several Intrinsic Mode Functions (IMFs), then we can use Robert operator to detect the edge of each IMF to reconstruct the image edges selectively for highlighting edge details of the liquid and impurity. Experimental results show that the method presented can reduce the influence of random noise on the turbidity detection effectively, and improve the accuracy of turbidity detection.
针对液体浑浊度检测易受噪声影响的问题,提出了一种基于二维经验模态分解(BEMD)和Robert算子的液体浑浊度检测方法。该方法的关键部分是BEMD算法,该算法将液体图像分解为若干个内禀模态函数(IMFs),然后利用Robert算子检测每个内禀模态函数的边缘,有选择地重建图像边缘,突出液体和杂质的边缘细节。实验结果表明,该方法能有效降低随机噪声对浑浊度检测的影响,提高浑浊度检测的精度。
{"title":"Liquid Opacity Detection Method Based on Bidimensional Empirical Mode Decomposition","authors":"Guo Qiang, Song Wen-ming","doi":"10.1109/IMCCC.2013.277","DOIUrl":"https://doi.org/10.1109/IMCCC.2013.277","url":null,"abstract":"According to the problem that liquid turbidity detection is vulnerable to the noise, a novel liquid turbidity detection method based on Bidimensional Empirical Mode Decomposition (BEMD) and Robert operator is proposed. The key part of method is the BEMD algorithm, with which, liquid images can be decomposed to several Intrinsic Mode Functions (IMFs), then we can use Robert operator to detect the edge of each IMF to reconstruct the image edges selectively for highlighting edge details of the liquid and impurity. Experimental results show that the method presented can reduce the influence of random noise on the turbidity detection effectively, and improve the accuracy of turbidity detection.","PeriodicalId":360796,"journal":{"name":"2013 Third International Conference on Instrumentation, Measurement, Computer, Communication and Control","volume":"97 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132592441","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fault Tolerant Virtual Network Embedding Algorithm Based on Redundant Backup Resource 基于冗余备份资源的容错虚拟网络嵌入算法
Ying Yuan, Cuirong Wang, Cong Wang, Chongyang Zhang, N. Zhu
Network virtualization allows multiple virtual networks to coexist on a shared physical substrate infrastructure. As network virtualization becomes popular, the problem of efficiently mapping a virtual network while guaranteeing its survivability in the event of failures becomes increasingly important. In this paper, the reliability problem of virtual network is solved based on a node and link redundant backup strategy. We model the virtual network mapping problem as an integer linear programming and present a discrete particle swarm optimization based algorithm to solve the problem. Experimental results show that the proposed algorithm has higher recovery success ratio and can reduce backup bandwidth simultaneously.
网络虚拟化允许多个虚拟网络在共享的物理底层基础设施上共存。随着网络虚拟化的流行,有效地映射虚拟网络,同时保证其在发生故障时的生存能力的问题变得越来越重要。本文提出了一种基于节点和链路冗余备份策略的虚拟网络可靠性问题。将虚拟网络映射问题建模为整数线性规划,提出了一种基于离散粒子群优化的虚拟网络映射问题求解算法。实验结果表明,该算法具有较高的恢复成功率,同时可以减少备份带宽。
{"title":"Fault Tolerant Virtual Network Embedding Algorithm Based on Redundant Backup Resource","authors":"Ying Yuan, Cuirong Wang, Cong Wang, Chongyang Zhang, N. Zhu","doi":"10.1109/IMCCC.2013.81","DOIUrl":"https://doi.org/10.1109/IMCCC.2013.81","url":null,"abstract":"Network virtualization allows multiple virtual networks to coexist on a shared physical substrate infrastructure. As network virtualization becomes popular, the problem of efficiently mapping a virtual network while guaranteeing its survivability in the event of failures becomes increasingly important. In this paper, the reliability problem of virtual network is solved based on a node and link redundant backup strategy. We model the virtual network mapping problem as an integer linear programming and present a discrete particle swarm optimization based algorithm to solve the problem. Experimental results show that the proposed algorithm has higher recovery success ratio and can reduce backup bandwidth simultaneously.","PeriodicalId":360796,"journal":{"name":"2013 Third International Conference on Instrumentation, Measurement, Computer, Communication and Control","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131277026","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Model-Based Behavioral Fuzzing Approach for Network Service 基于模型的网络服务行为模糊测试方法
Jiajie Wang, Tao Guo, Puhan Zhang, Qixue Xiao
Network services face various security challenges such as targeted attacks exploiting security vulnerabilities. Fuzz testing plays an important role in security testing of network service. However, current fuzzing approaches focus on protocol syntax and packet structure, more than multi-phase behavioral interactions between client and server of network service. This paper presents a model-based behavioral fuzzing approach to discover vulnerabilities of network services, which supports state-aware and multi-phase fuzz testing. Based on the model-based fuzzing framework, a finite state machine model EXT-NSFSM is proposed to manipulate the fuzzing process and guarantee the validation of fuzz test cases. The approach is implemented and then is experimented on several network services of DBMS and FTP. The test result has proved effectiveness of this approach.
网络服务面临各种安全挑战,如利用安全漏洞的针对性攻击。模糊测试在网络服务的安全测试中起着重要的作用。然而,目前的模糊测试方法主要关注协议语法和数据包结构,而不是网络服务客户端和服务器之间的多阶段行为交互。提出了一种基于模型的行为模糊方法来发现网络服务的漏洞,该方法支持状态感知和多阶段模糊测试。在基于模型的模糊框架的基础上,提出了有限状态机模型EXT-NSFSM来控制模糊过程,保证模糊测试用例的有效性。该方法在数据库管理系统(DBMS)和FTP网络服务上进行了实现和实验。试验结果证明了该方法的有效性。
{"title":"A Model-Based Behavioral Fuzzing Approach for Network Service","authors":"Jiajie Wang, Tao Guo, Puhan Zhang, Qixue Xiao","doi":"10.1109/IMCCC.2013.250","DOIUrl":"https://doi.org/10.1109/IMCCC.2013.250","url":null,"abstract":"Network services face various security challenges such as targeted attacks exploiting security vulnerabilities. Fuzz testing plays an important role in security testing of network service. However, current fuzzing approaches focus on protocol syntax and packet structure, more than multi-phase behavioral interactions between client and server of network service. This paper presents a model-based behavioral fuzzing approach to discover vulnerabilities of network services, which supports state-aware and multi-phase fuzz testing. Based on the model-based fuzzing framework, a finite state machine model EXT-NSFSM is proposed to manipulate the fuzzing process and guarantee the validation of fuzz test cases. The approach is implemented and then is experimented on several network services of DBMS and FTP. The test result has proved effectiveness of this approach.","PeriodicalId":360796,"journal":{"name":"2013 Third International Conference on Instrumentation, Measurement, Computer, Communication and Control","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115795513","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
A New Maximum Power Point Tracking Scheme for Building Integrated Photovoltaic Systems 建筑集成光伏系统最大功率点跟踪新方案
Yajun Rong, Le Chen, Mingyong Cui
Building integrated photo-voltaic systems often operate under partially shaded conditions. Current versus voltage characteristics and power versus voltage characteristics of PV arrays are characterized by multiple steps and peaks under partially shaded conditions. Most of existing strategies always fail to track the real maximum power. On the basis of improving the conventional MPPT method perturbation and observation (P&O) and analysis of characteristic curves under uniform and non uniform solar irradiance, this paper proposes a novel algorithm combining the improved P&O method and scanning method to track the global power peak under partially shaded conditions for building integrated photovoltaic systems (BIPV). This algorithm has high efficiency and avoids oscillation. It has all the advantages of the P&O method, also may not fail into the global maximum power point. The control algorithm is verified to be effective by simulations.
建筑集成光伏系统通常在部分遮阳条件下运行。在部分遮光条件下,光伏阵列的电流电压特性和功率电压特性具有多个台阶和峰值特征。大多数现有的策略总是不能跟踪实际的最大功率。在改进传统的扰动观测(P&O)方法,分析均匀和非均匀太阳辐照度下的特征曲线的基础上,提出了一种将改进的扰动观测(P&O)方法与扫描法相结合的建筑集成光伏系统(BIPV)部分遮阳条件下全局功率峰值跟踪算法。该算法效率高,避免了振荡。它具有P&O方法的所有优点,也不会失败到全局最大功率点。仿真结果验证了该控制算法的有效性。
{"title":"A New Maximum Power Point Tracking Scheme for Building Integrated Photovoltaic Systems","authors":"Yajun Rong, Le Chen, Mingyong Cui","doi":"10.1109/IMCCC.2013.139","DOIUrl":"https://doi.org/10.1109/IMCCC.2013.139","url":null,"abstract":"Building integrated photo-voltaic systems often operate under partially shaded conditions. Current versus voltage characteristics and power versus voltage characteristics of PV arrays are characterized by multiple steps and peaks under partially shaded conditions. Most of existing strategies always fail to track the real maximum power. On the basis of improving the conventional MPPT method perturbation and observation (P&O) and analysis of characteristic curves under uniform and non uniform solar irradiance, this paper proposes a novel algorithm combining the improved P&O method and scanning method to track the global power peak under partially shaded conditions for building integrated photovoltaic systems (BIPV). This algorithm has high efficiency and avoids oscillation. It has all the advantages of the P&O method, also may not fail into the global maximum power point. The control algorithm is verified to be effective by simulations.","PeriodicalId":360796,"journal":{"name":"2013 Third International Conference on Instrumentation, Measurement, Computer, Communication and Control","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124114879","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The Intelligent Platform of Bus Industry Based on Car Networking 基于车联网的客车行业智能平台
Xingming Hou
In recent years, with the application of GPS, RFID, sensor technology, rapid development and popularization of 3G network technology and IT technology, car networking applications in the transportation industry has been more and more deeply. Along with the network popularization, make it become an important part of transportation industry of the Internet of things. The network technology into the bus industry, combined with intelligent scheduling and can bus technology, make the public transit service implementation more automation, intelligent. This paper presents the cloud platform architecture of intelligent public transportation system. Intelligent scheduling algorithm based on the collected information, vehicle location, vehicle condition information and other business data through the acquisition of the Intelligent Car Networking system, automatic generation of bus service data through the information system, and based on the data details automatically generated summary report. At the same time, also can be combined with GIS technology and create a smart and efficient platform for public enterprises.
近年来,随着GPS、RFID、传感器技术的应用,3G网络技术和IT技术的快速发展和普及,车联网在交通行业的应用已经越来越深入。随着网络的普及,使其成为交通运输行业物联网的重要组成部分。将网络技术引入公交行业,结合智能调度和can公交技术,使公共交通服务实现更加自动化、智能化。提出了智能公交系统的云平台架构。智能调度算法根据采集到的信息,通过智能车联网系统获取车辆位置、车况信息等业务数据,通过信息系统自动生成公交服务数据,并根据数据明细自动生成汇总报表。同时,还可以与GIS技术相结合,为公共企业打造一个智能、高效的平台。
{"title":"The Intelligent Platform of Bus Industry Based on Car Networking","authors":"Xingming Hou","doi":"10.1109/IMCCC.2013.90","DOIUrl":"https://doi.org/10.1109/IMCCC.2013.90","url":null,"abstract":"In recent years, with the application of GPS, RFID, sensor technology, rapid development and popularization of 3G network technology and IT technology, car networking applications in the transportation industry has been more and more deeply. Along with the network popularization, make it become an important part of transportation industry of the Internet of things. The network technology into the bus industry, combined with intelligent scheduling and can bus technology, make the public transit service implementation more automation, intelligent. This paper presents the cloud platform architecture of intelligent public transportation system. Intelligent scheduling algorithm based on the collected information, vehicle location, vehicle condition information and other business data through the acquisition of the Intelligent Car Networking system, automatic generation of bus service data through the information system, and based on the data details automatically generated summary report. At the same time, also can be combined with GIS technology and create a smart and efficient platform for public enterprises.","PeriodicalId":360796,"journal":{"name":"2013 Third International Conference on Instrumentation, Measurement, Computer, Communication and Control","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124320922","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
SMT Solvers for Integer Overflows 整数溢出的SMT求解器
Qixue Xiao, Yu Chen, Hui Huang, Lan-lan Qi
SMT solver which is an automated program analysis technique is increasingly used by Vulnerability discovering platforms, especially in the integer security problems checking. An integer vulnerability discovering platform is mostly decided by the SMT solver. We have analyzed integer security problems and several SMT solvers, such as Boolector, Z3, STP and so on. We evaluated the ability of the SMT solvers in integer overflows checking from the view of vulnerability discovering. We also developed a set of APIs to check the integer overflows based on STP.
SMT求解器作为一种自动化的程序分析技术,越来越多地应用于漏洞发现平台,特别是在整数安全问题的检测中。整数漏洞发现平台主要由SMT求解器决定。分析了整数安全问题和几种SMT求解器,如Boolector、Z3、STP等。从漏洞发现的角度对SMT求解器在整数溢出检测中的能力进行了评价。我们还开发了一套api来检查基于STP的整数溢出。
{"title":"SMT Solvers for Integer Overflows","authors":"Qixue Xiao, Yu Chen, Hui Huang, Lan-lan Qi","doi":"10.1109/IMCCC.2013.30","DOIUrl":"https://doi.org/10.1109/IMCCC.2013.30","url":null,"abstract":"SMT solver which is an automated program analysis technique is increasingly used by Vulnerability discovering platforms, especially in the integer security problems checking. An integer vulnerability discovering platform is mostly decided by the SMT solver. We have analyzed integer security problems and several SMT solvers, such as Boolector, Z3, STP and so on. We evaluated the ability of the SMT solvers in integer overflows checking from the view of vulnerability discovering. We also developed a set of APIs to check the integer overflows based on STP.","PeriodicalId":360796,"journal":{"name":"2013 Third International Conference on Instrumentation, Measurement, Computer, Communication and Control","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114772962","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Contour Matching Based on Local Curvature Scale 基于局部曲率尺度的轮廓匹配
Zhao Yan, Xu Gui-li, Tian Yu-peng, Gu Rui-peng, Wang Biao, Li Kai-yu
Image matching based on contour is an important issue in computer vision, navigation and pattern recognition. The image matching methods like curvature-based methods and corner-based methods have poor robustness to the contour's noise and distortion, and some matching methods are applied only to closed contours. A novel contour representation and matching algorithm, based on local curvature scale, is proposed in this paper. First, build each point's c-scale segment and calculate the curvature of contour points. Then, the invariant characteristic curve is established based on curvature integral, which is invariant to RST (rotation, scale and translation). Finally, the matching points of contours are captured by measuring the similarity of invariant characteristic curves. Experimental results show that this method can achieve better performance than previous methods. Also it fits for the matching between two closed contours, two open curves and the matching between an open contour and a part of closed contour. The proposed method reduces the impact of noise and scale variation effectively, and it has better robustness to rotation, scale and translation of contour.
基于轮廓的图像匹配是计算机视觉、导航和模式识别中的一个重要问题。基于曲率的图像匹配方法和基于角点的图像匹配方法对轮廓噪声和畸变的鲁棒性较差,有些匹配方法仅适用于封闭轮廓。提出了一种基于局部曲率尺度的轮廓表示与匹配算法。首先,建立每个点的c尺度线段,计算轮廓点的曲率。然后,基于曲率积分建立不变特征曲线,该特征曲线对RST(旋转、缩放、平移)不变;最后,通过测量不变特征曲线的相似度来获取轮廓的匹配点。实验结果表明,该方法比以往的方法具有更好的性能。适用于两条闭合轮廓之间的匹配、两条开放曲线之间的匹配以及开放轮廓与部分闭合轮廓之间的匹配。该方法有效地降低了噪声和尺度变化的影响,对轮廓的旋转、尺度和平移具有较好的鲁棒性。
{"title":"Contour Matching Based on Local Curvature Scale","authors":"Zhao Yan, Xu Gui-li, Tian Yu-peng, Gu Rui-peng, Wang Biao, Li Kai-yu","doi":"10.1109/IMCCC.2013.376","DOIUrl":"https://doi.org/10.1109/IMCCC.2013.376","url":null,"abstract":"Image matching based on contour is an important issue in computer vision, navigation and pattern recognition. The image matching methods like curvature-based methods and corner-based methods have poor robustness to the contour's noise and distortion, and some matching methods are applied only to closed contours. A novel contour representation and matching algorithm, based on local curvature scale, is proposed in this paper. First, build each point's c-scale segment and calculate the curvature of contour points. Then, the invariant characteristic curve is established based on curvature integral, which is invariant to RST (rotation, scale and translation). Finally, the matching points of contours are captured by measuring the similarity of invariant characteristic curves. Experimental results show that this method can achieve better performance than previous methods. Also it fits for the matching between two closed contours, two open curves and the matching between an open contour and a part of closed contour. The proposed method reduces the impact of noise and scale variation effectively, and it has better robustness to rotation, scale and translation of contour.","PeriodicalId":360796,"journal":{"name":"2013 Third International Conference on Instrumentation, Measurement, Computer, Communication and Control","volume":"294 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116411960","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analysis of AM Phenomenon in GPS Signal GPS信号中的调幅现象分析
Zhang Xin, Sha Hai, Zhang Yong-hu, Zhang Guo-zhu, Ou Gang
When transmitting BPSK modulated signal, GPS simulator can be used to calibrate hardware delay under a wide variety of conditions by determine the average measured time difference between the one pulse-per-second (1 pps) reference and the bi-phase modulated code transition point. In practice, an AM (Amplitude Modulation) phenomenon rather than ideal BPSK modulation code transition point can be observed. Considering the structure of GPS L1CA signal, this AM phenomenon is analyzed by using Fourier series expansion, and serious impact of signal reflection on AM phenomenon is assessed by simulation.
当传输BPSK调制信号时,GPS模拟器可以通过确定每秒1脉冲(1pps)参考点与双相调制码过渡点之间的平均测量时间差来校准各种条件下的硬件延迟。在实践中,可以观察到AM(调幅)现象而不是理想的BPSK调制码过渡点。结合GPS L1CA信号的结构,利用傅立叶级数展开分析了这种调幅现象,并通过仿真评估了信号反射对调幅现象的严重影响。
{"title":"Analysis of AM Phenomenon in GPS Signal","authors":"Zhang Xin, Sha Hai, Zhang Yong-hu, Zhang Guo-zhu, Ou Gang","doi":"10.1109/IMCCC.2013.159","DOIUrl":"https://doi.org/10.1109/IMCCC.2013.159","url":null,"abstract":"When transmitting BPSK modulated signal, GPS simulator can be used to calibrate hardware delay under a wide variety of conditions by determine the average measured time difference between the one pulse-per-second (1 pps) reference and the bi-phase modulated code transition point. In practice, an AM (Amplitude Modulation) phenomenon rather than ideal BPSK modulation code transition point can be observed. Considering the structure of GPS L1CA signal, this AM phenomenon is analyzed by using Fourier series expansion, and serious impact of signal reflection on AM phenomenon is assessed by simulation.","PeriodicalId":360796,"journal":{"name":"2013 Third International Conference on Instrumentation, Measurement, Computer, Communication and Control","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122065968","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Logarithmic Quantization Index Modulation Data Hiding Using the Wavelet Transform 基于小波变换的对数量化指标调制数据隐藏
Jinhua Liu, P. Ye
Conventional quantization-based data hiding algorithms used uniform quantization. This scheme may be easily estimated by averaging on a set of embedded signals. Furthermore, by uniform quantization, the perceptual characteristics of the original signal are not considered and the watermark energy is distributed uniformly within the original signal, which introduces visual distortions in some parts of it. Therefore, we introduce a logarithmic quantization-based data hiding method based on the visual model by using the wavelet transform that takes advantage of the properties of Watson's visual model and logarithmic quantization index modulation (LQIM). Its improved robustness is due to embedding in the high energy blocks of original image and by applying the logarithmic scheme. In the detection scheme, we model the wavelet coefficients of image by the generalized Gaussian distribution (GGD). Under this assumption, the bit error probability of proposed method is analytically calculated. Performance of the proposed method is analyzed and verified by simulation. Results of experiments demonstrate the imperceptibility of the proposed method and its robustness.
传统的基于量化的数据隐藏算法采用均匀量化。这种方案可以很容易地通过对一组嵌入信号进行平均来估计。此外,通过均匀量化,没有考虑原始信号的感知特性,水印能量在原始信号内均匀分布,导致了部分原始信号的视觉失真。因此,我们利用沃森可视化模型和对数量化指数调制(LQIM)的特性,利用小波变换,提出了一种基于可视化模型的对数量化数据隐藏方法。其鲁棒性的提高是由于在原始图像的高能块中进行了嵌入,并采用了对数格式。在检测方案中,采用广义高斯分布(GGD)对图像的小波系数进行建模。在此假设下,解析计算了所提方法的误码概率。通过仿真对该方法的性能进行了分析和验证。实验结果证明了该方法的不可感知性和鲁棒性。
{"title":"A Logarithmic Quantization Index Modulation Data Hiding Using the Wavelet Transform","authors":"Jinhua Liu, P. Ye","doi":"10.1109/IMCCC.2013.262","DOIUrl":"https://doi.org/10.1109/IMCCC.2013.262","url":null,"abstract":"Conventional quantization-based data hiding algorithms used uniform quantization. This scheme may be easily estimated by averaging on a set of embedded signals. Furthermore, by uniform quantization, the perceptual characteristics of the original signal are not considered and the watermark energy is distributed uniformly within the original signal, which introduces visual distortions in some parts of it. Therefore, we introduce a logarithmic quantization-based data hiding method based on the visual model by using the wavelet transform that takes advantage of the properties of Watson's visual model and logarithmic quantization index modulation (LQIM). Its improved robustness is due to embedding in the high energy blocks of original image and by applying the logarithmic scheme. In the detection scheme, we model the wavelet coefficients of image by the generalized Gaussian distribution (GGD). Under this assumption, the bit error probability of proposed method is analytically calculated. Performance of the proposed method is analyzed and verified by simulation. Results of experiments demonstrate the imperceptibility of the proposed method and its robustness.","PeriodicalId":360796,"journal":{"name":"2013 Third International Conference on Instrumentation, Measurement, Computer, Communication and Control","volume":"211 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124739053","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2013 Third International Conference on Instrumentation, Measurement, Computer, Communication and Control
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1