Pub Date : 2014-05-29DOI: 10.1109/ICCOMM.2014.6866731
L. Tuta, R. Lexutan, Catalin Moraru
The purpose of this paper is to study and compare the radar cross-section (RCS) values for different targets (sphere, cylinder, cone and rectangular plane surface), using results obtained in simulations and experimental measurements performed using a vectorial network analyzer (VNA), in the 2-6GHz domain. These results are processed in both frequency and time (space) domain.
{"title":"Time-frequency domain radar cross-section analysis of some simple objects and shapes","authors":"L. Tuta, R. Lexutan, Catalin Moraru","doi":"10.1109/ICCOMM.2014.6866731","DOIUrl":"https://doi.org/10.1109/ICCOMM.2014.6866731","url":null,"abstract":"The purpose of this paper is to study and compare the radar cross-section (RCS) values for different targets (sphere, cylinder, cone and rectangular plane surface), using results obtained in simulations and experimental measurements performed using a vectorial network analyzer (VNA), in the 2-6GHz domain. These results are processed in both frequency and time (space) domain.","PeriodicalId":366043,"journal":{"name":"2014 10th International Conference on Communications (COMM)","volume":"1 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116798133","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-05-29DOI: 10.1109/ICCOMM.2014.6866672
A. Saenko, S. Lerm, V. Musalimov
The paper is dedicated to the problem of the quality assurance of foodstuff and particularly bacteria detection in liquid exudes. It demonstates disadvantages of the existing methods and suggests a new method based on the image processing and machine learning techniques. The principal component analysis shows that this problem is quite hard for existing algorithms. Also the usage of a few classifiers is considered and the evaluation of their effectiveness is shown.
{"title":"Analytical imaging of bacteria in foodstuff","authors":"A. Saenko, S. Lerm, V. Musalimov","doi":"10.1109/ICCOMM.2014.6866672","DOIUrl":"https://doi.org/10.1109/ICCOMM.2014.6866672","url":null,"abstract":"The paper is dedicated to the problem of the quality assurance of foodstuff and particularly bacteria detection in liquid exudes. It demonstates disadvantages of the existing methods and suggests a new method based on the image processing and machine learning techniques. The principal component analysis shows that this problem is quite hard for existing algorithms. Also the usage of a few classifiers is considered and the evaluation of their effectiveness is shown.","PeriodicalId":366043,"journal":{"name":"2014 10th International Conference on Communications (COMM)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121118199","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-05-29DOI: 10.1109/ICCOMM.2014.6866685
Stefan Arseni, E. Popovici, Liviu A. Stancu, Ovidiu G. Guta, S. Halunga
Our keystroke-based user identification system represents a minimal implementation of a software system that can be used for continuous authentication of users, based on their keystroke dynamics. This paper brings into evidence the role of an alerting subsystem as a part of the software system mentioned above. Also, the paper presents a basic implementation of such a subsystem, based on the existing Syslog protocol, and a combined method for securing the protocol.
{"title":"Securing an alerting subsystem for a keystroke-based user identification system","authors":"Stefan Arseni, E. Popovici, Liviu A. Stancu, Ovidiu G. Guta, S. Halunga","doi":"10.1109/ICCOMM.2014.6866685","DOIUrl":"https://doi.org/10.1109/ICCOMM.2014.6866685","url":null,"abstract":"Our keystroke-based user identification system represents a minimal implementation of a software system that can be used for continuous authentication of users, based on their keystroke dynamics. This paper brings into evidence the role of an alerting subsystem as a part of the software system mentioned above. Also, the paper presents a basic implementation of such a subsystem, based on the existing Syslog protocol, and a combined method for securing the protocol.","PeriodicalId":366043,"journal":{"name":"2014 10th International Conference on Communications (COMM)","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115216406","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-05-29DOI: 10.1109/ICCOMM.2014.6866727
A. Skrivervik
W-BAN applications have been around since a long time, but have been experiencing a tremendous growth during the last decades. This results in the need of dedicated antennas, which are designed and optimized taking into account their lossy surroundings. Design considerations and several examples will be presented in this paper.
{"title":"An overview of W-BAN antennas designed at LEMA","authors":"A. Skrivervik","doi":"10.1109/ICCOMM.2014.6866727","DOIUrl":"https://doi.org/10.1109/ICCOMM.2014.6866727","url":null,"abstract":"W-BAN applications have been around since a long time, but have been experiencing a tremendous growth during the last decades. This results in the need of dedicated antennas, which are designed and optimized taking into account their lossy surroundings. Design considerations and several examples will be presented in this paper.","PeriodicalId":366043,"journal":{"name":"2014 10th International Conference on Communications (COMM)","volume":"346 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116115280","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-05-29DOI: 10.1109/ICCOMM.2014.6866749
A. Digulescu, Teodor Petrut, Cindy Bernard, I. Candel, C. Ioana, A. Serbanescu
This paper presents several methods applied for the detection and localization of electrical arcs measured while survelling photovoltaic power systems. Firstly, we proposed the use of energy detectors for transients (spectrogram and wavelet) and compared them with statistical methods (Maximum Likelihood Estimation (MLE)), classical signal processing methods (Matched Filter, Zero Crossing), but not lastly with a more recent method, Recurrence Plot Analysis (RPA), which has already proved its efficiency. Afterward, we studied the precision of these methods in the localization problem. We used a four sensor detector and estimated the position of the electrical arc based on the time of arrival (TOA) obtained from the each technique.
{"title":"Advanced signal processing techniques for detection and localization of electrical arcs","authors":"A. Digulescu, Teodor Petrut, Cindy Bernard, I. Candel, C. Ioana, A. Serbanescu","doi":"10.1109/ICCOMM.2014.6866749","DOIUrl":"https://doi.org/10.1109/ICCOMM.2014.6866749","url":null,"abstract":"This paper presents several methods applied for the detection and localization of electrical arcs measured while survelling photovoltaic power systems. Firstly, we proposed the use of energy detectors for transients (spectrogram and wavelet) and compared them with statistical methods (Maximum Likelihood Estimation (MLE)), classical signal processing methods (Matched Filter, Zero Crossing), but not lastly with a more recent method, Recurrence Plot Analysis (RPA), which has already proved its efficiency. Afterward, we studied the precision of these methods in the localization problem. We used a four sensor detector and estimated the position of the electrical arc based on the time of arrival (TOA) obtained from the each technique.","PeriodicalId":366043,"journal":{"name":"2014 10th International Conference on Communications (COMM)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130561447","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-05-29DOI: 10.1109/ICCOMM.2014.6866673
A. Florescu, É. Chouzenoux, J. Pesquet, S. Ciochină
Complex-valued data play a prominent role in a number of signal and image processing applications. The aim of this paper is to establish some theoretical results concerning the Cramer-Rao bound for estimating a sparse complex-valued vector. Instead of considering a countable dictionary of vectors, we address the more challenging case of an uncountable set of vectors parameterized by a real variable. We also present a proximal forward-backward algorithm to minimize an ℓ0 penalized cost, which allows us to approach the derived bounds. These results are illustrated on a spectrum analysis problem in the case of irregularly sampled observations.
{"title":"Cramer-Rao bound for a sparse complex model","authors":"A. Florescu, É. Chouzenoux, J. Pesquet, S. Ciochină","doi":"10.1109/ICCOMM.2014.6866673","DOIUrl":"https://doi.org/10.1109/ICCOMM.2014.6866673","url":null,"abstract":"Complex-valued data play a prominent role in a number of signal and image processing applications. The aim of this paper is to establish some theoretical results concerning the Cramer-Rao bound for estimating a sparse complex-valued vector. Instead of considering a countable dictionary of vectors, we address the more challenging case of an uncountable set of vectors parameterized by a real variable. We also present a proximal forward-backward algorithm to minimize an ℓ0 penalized cost, which allows us to approach the derived bounds. These results are illustrated on a spectrum analysis problem in the case of irregularly sampled observations.","PeriodicalId":366043,"journal":{"name":"2014 10th International Conference on Communications (COMM)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126796494","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-05-29DOI: 10.1109/ICCOMM.2014.6866657
Adrian Popescu
The creation and the distribution of video content is a multi-stage process that refers to the aquisition of video source, content production and packaging, and distribution to customers. The major components are the access networks, metro/edge networks, core networks, data centers and storage networks.The creation and the distribution of video content is a multi-stage process that refers to the aquisition of video source, content production and packaging, and distribution to customers. The major components are the access networks, metro/edge networks, core networks, data centers and storage networks.
{"title":"Greening of IP-based video distribution networks: Developments and challenges","authors":"Adrian Popescu","doi":"10.1109/ICCOMM.2014.6866657","DOIUrl":"https://doi.org/10.1109/ICCOMM.2014.6866657","url":null,"abstract":"The creation and the distribution of video content is a multi-stage process that refers to the aquisition of video source, content production and packaging, and distribution to customers. The major components are the access networks, metro/edge networks, core networks, data centers and storage networks.The creation and the distribution of video content is a multi-stage process that refers to the aquisition of video source, content production and packaging, and distribution to customers. The major components are the access networks, metro/edge networks, core networks, data centers and storage networks.","PeriodicalId":366043,"journal":{"name":"2014 10th International Conference on Communications (COMM)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121685491","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-05-29DOI: 10.1109/ICCOMM.2014.6866698
P. Dascal, T. Palade, P. Dolea, O. Cristea
This paper focuses on characterizing the behavior of in-orbit small satellites using ground-based radio observations. The monitoring focused on low-Earth orbit (LEO) university Cubesats which operate in the UHF amateur radio band. The orbital behavior may be estimated by characterizing and analyzing the received signal transmitted by the satellite during multiple passes. The correlated data obtained from several ground observations of a selected Cubesat indicate that periodic deep fluctuations in the received signal are caused most likely by the tumbling of the satellite.
{"title":"Aspects regarding the characterization of in-orbit satellites using radio observations","authors":"P. Dascal, T. Palade, P. Dolea, O. Cristea","doi":"10.1109/ICCOMM.2014.6866698","DOIUrl":"https://doi.org/10.1109/ICCOMM.2014.6866698","url":null,"abstract":"This paper focuses on characterizing the behavior of in-orbit small satellites using ground-based radio observations. The monitoring focused on low-Earth orbit (LEO) university Cubesats which operate in the UHF amateur radio band. The orbital behavior may be estimated by characterizing and analyzing the received signal transmitted by the satellite during multiple passes. The correlated data obtained from several ground observations of a selected Cubesat indicate that periodic deep fluctuations in the received signal are caused most likely by the tumbling of the satellite.","PeriodicalId":366043,"journal":{"name":"2014 10th International Conference on Communications (COMM)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115921933","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-05-29DOI: 10.1109/ICCOMM.2014.6866761
Cansin Turguner
Mobile ad-hoc Networks are dynamic and wireless self-organized networks that many mobile nodes can connect to each other weakly. To compare with traditional networks, they suffer failures that prevent the system from working properly. Nevertheless, in this paper it is coped with many security issues such as unauthorized attempts, security threats and reliability. Using mobile agents in having low level fault tolerant ad-hoc networks provides fault masking that the users never notice. Mobile agent migration among nodes, choosing an alternative path autonomously and, having high level fault tolerance provides more reliable networks, which have low bandwidth and high failure ratio. In this paper, it is declared that mobile agents fault tolerance peculiarity and existing fault tolerance method based on mobile agents. Also in ad-hoc networks that need security precautions behind fault tolerance, a new model named as "Secure Mobil Agent Based Fault Tolerance Model" is expressed.
{"title":"Secure data dissemination in MANETs by means of mobile agents","authors":"Cansin Turguner","doi":"10.1109/ICCOMM.2014.6866761","DOIUrl":"https://doi.org/10.1109/ICCOMM.2014.6866761","url":null,"abstract":"Mobile ad-hoc Networks are dynamic and wireless self-organized networks that many mobile nodes can connect to each other weakly. To compare with traditional networks, they suffer failures that prevent the system from working properly. Nevertheless, in this paper it is coped with many security issues such as unauthorized attempts, security threats and reliability. Using mobile agents in having low level fault tolerant ad-hoc networks provides fault masking that the users never notice. Mobile agent migration among nodes, choosing an alternative path autonomously and, having high level fault tolerance provides more reliable networks, which have low bandwidth and high failure ratio. In this paper, it is declared that mobile agents fault tolerance peculiarity and existing fault tolerance method based on mobile agents. Also in ad-hoc networks that need security precautions behind fault tolerance, a new model named as \"Secure Mobil Agent Based Fault Tolerance Model\" is expressed.","PeriodicalId":366043,"journal":{"name":"2014 10th International Conference on Communications (COMM)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125238352","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-05-29DOI: 10.1109/ICCOMM.2014.6866699
A. Căilean, B. Cagneau, L. Chassagne, M. Dimian, V. Popa
This paper approaches the issues concerning the usage of the delay modulation as a coding technique used for outdoor Visible Light Communications (VLC) under PHY I layer of the IEEE 802.15.7 standard. We perform a comparative analysis between the Manchester code, as a traditional code, specified by the upper mentioned standard and the Miller code as a possible candidate for outdoor MIMO applications. Simulation and experimental results are provided, offering an overview over the multi-channel, flickering and Bit Error Ratio (BER) performances.
{"title":"Miller code usage in Visible Light Communications under the PHY I layer of the IEEE 802.15.7 standard","authors":"A. Căilean, B. Cagneau, L. Chassagne, M. Dimian, V. Popa","doi":"10.1109/ICCOMM.2014.6866699","DOIUrl":"https://doi.org/10.1109/ICCOMM.2014.6866699","url":null,"abstract":"This paper approaches the issues concerning the usage of the delay modulation as a coding technique used for outdoor Visible Light Communications (VLC) under PHY I layer of the IEEE 802.15.7 standard. We perform a comparative analysis between the Manchester code, as a traditional code, specified by the upper mentioned standard and the Miller code as a possible candidate for outdoor MIMO applications. Simulation and experimental results are provided, offering an overview over the multi-channel, flickering and Bit Error Ratio (BER) performances.","PeriodicalId":366043,"journal":{"name":"2014 10th International Conference on Communications (COMM)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131229477","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}