首页 > 最新文献

2014 10th International Conference on Communications (COMM)最新文献

英文 中文
MIMO-OFDM: Maximum diversity using maximum likelihood detector MIMO-OFDM:最大分集使用最大似然检测器
Pub Date : 2014-05-29 DOI: 10.1109/ICCOMM.2014.6866759
A. A. Sahrab, I. Marghescu
Multiple-Input Multiple-Output (MIMO) systems offer considerable increase in data throughput and link range without additional bandwidth or transmit power by using several antennas at transmitter and receiver to improve wireless communication system performance. At the same time, Orthogonal Frequency Division Multiplexing (OFDM) has becoming a very popular multi-carrier modulation technique for transmission of signals over wireless channels. OFDM eliminate Inter-Symbol-Interference (ISI) and allows the bandwidth of subcarriers to overlap without Inter Carrier Interference (ICI). A MIMO-OFDM modulation technique can achieve reliable high data rate transmission over broadband wireless channels. This paper deals with the analysis of a MIMO-OFDM system by using a MATLAB program. The performance of the system is evaluated on the basis of Bit Error Rate (BER) and Minimum Mean Square Error (MMSE) level.
多输入多输出(MIMO)系统通过在发射机和接收机上使用多个天线,在不增加带宽或发射功率的情况下,显著提高了数据吞吐量和链路范围,从而提高了无线通信系统的性能。与此同时,正交频分复用(OFDM)已经成为一种非常流行的无线信道信号传输的多载波调制技术。OFDM消除了符号间干扰(ISI),并允许子载波的带宽重叠而没有载波间干扰(ICI)。MIMO-OFDM调制技术可以在宽带无线信道上实现可靠的高数据速率传输。本文利用MATLAB程序对MIMO-OFDM系统进行了分析。基于误码率(BER)和最小均方误差(MMSE)水平对系统性能进行评价。
{"title":"MIMO-OFDM: Maximum diversity using maximum likelihood detector","authors":"A. A. Sahrab, I. Marghescu","doi":"10.1109/ICCOMM.2014.6866759","DOIUrl":"https://doi.org/10.1109/ICCOMM.2014.6866759","url":null,"abstract":"Multiple-Input Multiple-Output (MIMO) systems offer considerable increase in data throughput and link range without additional bandwidth or transmit power by using several antennas at transmitter and receiver to improve wireless communication system performance. At the same time, Orthogonal Frequency Division Multiplexing (OFDM) has becoming a very popular multi-carrier modulation technique for transmission of signals over wireless channels. OFDM eliminate Inter-Symbol-Interference (ISI) and allows the bandwidth of subcarriers to overlap without Inter Carrier Interference (ICI). A MIMO-OFDM modulation technique can achieve reliable high data rate transmission over broadband wireless channels. This paper deals with the analysis of a MIMO-OFDM system by using a MATLAB program. The performance of the system is evaluated on the basis of Bit Error Rate (BER) and Minimum Mean Square Error (MMSE) level.","PeriodicalId":366043,"journal":{"name":"2014 10th International Conference on Communications (COMM)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133928619","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
High-order modes in high permittivity cylindrical dielectric resonator antenna excited by a wide microstrip line 宽微带线激励下高介电常数圆柱形介质谐振器天线的高阶模
Pub Date : 2014-05-29 DOI: 10.1109/ICCOMM.2014.6866688
O. Avadanei, M. Banciu, L. Nedelcu
The aim of the paper is to identify the modes that can be excited by a wide microstrip line, in a cylindrical DRA situated symmetrically above it, to study the radiating performances of these modes and to present their radiating patterns. We managed to identify thirteen high-order modes; among these modes, four of them: HEM112, TMme311, TEme112, and TEme121 have high transmission performances.
本文的目的是在对称地置于其上方的圆柱形DRA中,确定宽微带线可以激发的模式,研究这些模式的辐射性能并给出它们的辐射图。我们设法确定了13种高阶模态;其中,HEM112、TMme311、TEme112和TEme121四种模式具有较高的传输性能。
{"title":"High-order modes in high permittivity cylindrical dielectric resonator antenna excited by a wide microstrip line","authors":"O. Avadanei, M. Banciu, L. Nedelcu","doi":"10.1109/ICCOMM.2014.6866688","DOIUrl":"https://doi.org/10.1109/ICCOMM.2014.6866688","url":null,"abstract":"The aim of the paper is to identify the modes that can be excited by a wide microstrip line, in a cylindrical DRA situated symmetrically above it, to study the radiating performances of these modes and to present their radiating patterns. We managed to identify thirteen high-order modes; among these modes, four of them: HEM112, TMme311, TEme112, and TEme121 have high transmission performances.","PeriodicalId":366043,"journal":{"name":"2014 10th International Conference on Communications (COMM)","volume":"89 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122438655","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Combined use of pattern recognition algorithms for keystroke-based continuous authentication system 结合模式识别算法实现基于击键的连续认证系统
Pub Date : 2014-05-29 DOI: 10.1109/ICCOMM.2014.6866686
E. Popovici, Liviu A. Stancu, Ovidiu G. Guta, Stefan Arseni, O. Fratu
In this paper we propose several solutions to combine the use of two algorithms for patterns recognition and user validation, both intended to be used in the same time to improve the overall performance of the validation process in a continuous authentication system based on keystroke dynamics. The first one is based on a Multi Layer Perceptron (MLP) Neural Network and the second one relies on a trust algorithm that uses the Bhattacharyya coefficient. For both we present some new evaluation result and conclusions.
在本文中,我们提出了几种解决方案来结合使用两种算法进行模式识别和用户验证,这两种算法旨在同时使用,以提高基于击键动力学的连续身份验证系统中验证过程的整体性能。第一个基于多层感知器(MLP)神经网络,第二个依赖于使用Bhattacharyya系数的信任算法。本文给出了一些新的评价结果和结论。
{"title":"Combined use of pattern recognition algorithms for keystroke-based continuous authentication system","authors":"E. Popovici, Liviu A. Stancu, Ovidiu G. Guta, Stefan Arseni, O. Fratu","doi":"10.1109/ICCOMM.2014.6866686","DOIUrl":"https://doi.org/10.1109/ICCOMM.2014.6866686","url":null,"abstract":"In this paper we propose several solutions to combine the use of two algorithms for patterns recognition and user validation, both intended to be used in the same time to improve the overall performance of the validation process in a continuous authentication system based on keystroke dynamics. The first one is based on a Multi Layer Perceptron (MLP) Neural Network and the second one relies on a trust algorithm that uses the Bhattacharyya coefficient. For both we present some new evaluation result and conclusions.","PeriodicalId":366043,"journal":{"name":"2014 10th International Conference on Communications (COMM)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114984831","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Multiclass On-demand routing in heterogeneous ad hoc networks 异构自组织网络中的多类按需路由
Pub Date : 2014-05-29 DOI: 10.1109/ICCOMM.2014.6866717
M. U. Farooq, N. Tapus
In this article, Ad hoc On-demand Distance Vector (AODV) routing protocol is modified to introduce a multiclass on-demand routing mechanism for ad hoc networks. The proposed protocol supports two distinct traffic classes, realtime traffic and non-realtime traffic. The anticipated protocol also takes into account the heterogeneity of the network while making the routing decisions, i.e. the yielded routes may comprise of dissimilar link layers. These modifications are implemented and evaluated on an actual ad hoc network testbed comprising of eight mobile nodes.
本文对自组织按需距离矢量(AODV)路由协议进行了改进,为自组织网络引入了一种多类按需路由机制。该协议支持两种不同的流量类别:实时流量和非实时流量。预期的协议在做出路由决策时也考虑了网络的异构性,即产生的路由可能由不同的链路层组成。这些改进在一个由8个移动节点组成的实际自组网测试平台上进行了实现和评估。
{"title":"Multiclass On-demand routing in heterogeneous ad hoc networks","authors":"M. U. Farooq, N. Tapus","doi":"10.1109/ICCOMM.2014.6866717","DOIUrl":"https://doi.org/10.1109/ICCOMM.2014.6866717","url":null,"abstract":"In this article, Ad hoc On-demand Distance Vector (AODV) routing protocol is modified to introduce a multiclass on-demand routing mechanism for ad hoc networks. The proposed protocol supports two distinct traffic classes, realtime traffic and non-realtime traffic. The anticipated protocol also takes into account the heterogeneity of the network while making the routing decisions, i.e. the yielded routes may comprise of dissimilar link layers. These modifications are implemented and evaluated on an actual ad hoc network testbed comprising of eight mobile nodes.","PeriodicalId":366043,"journal":{"name":"2014 10th International Conference on Communications (COMM)","volume":"103 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116562324","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Efficient and robust perceptual hashing using log-polar image representation 使用对数极图像表示的高效鲁棒感知哈希
Pub Date : 2014-05-29 DOI: 10.1109/ICCOMM.2014.6866755
Cezar Plesca, Luciana Morogan
Robust image hashing seeks to transform a given input image into a shorter hashed version using a key-dependent non-invertible transform. These hashes find extensive applications in content authentication, image indexing for database search and watermarking. Modern robust hashing algorithms consist of feature extraction, a randomization stage to introduce non-invertibility, followed by quantization and binary encoding to produce a binary hash. This paper describes a novel algorithm for generating an image hash based on Log-Polar transform features. The Log-Polar transform is a part of the Fourier-Mellin transformation, often used in image recognition and registration techniques due to its invariant properties to geometric operations. First, we show that the proposed perceptual hash is resistant to content-preserving operations like compression, noise addition, moderate geometric and filtering. Second, we illustrate the discriminative capability of our hash in order to rapidly distinguish between two perceptually different images. Third, we study the security of our method for image authentication purposes. Finally, we show that the proposed hashing method can provide both excellent security and robustness.
鲁棒图像哈希寻求使用依赖键的不可逆变换将给定的输入图像转换为更短的哈希版本。这些散列在内容认证、数据库搜索的图像索引和水印中有广泛的应用。现代鲁棒哈希算法包括特征提取、引入不可逆性的随机化阶段、量化和二进制编码以产生二进制哈希。本文提出了一种基于对数极坐标变换特征生成图像哈希的新算法。对数极坐标变换是傅里叶-梅林变换的一部分,由于其对几何运算的不变性,常用于图像识别和配准技术。首先,我们证明了所提出的感知哈希可以抵抗内容保留操作,如压缩、噪声添加、适度几何和滤波。其次,我们说明了哈希的判别能力,以便快速区分两个感知不同的图像。第三,我们研究了图像认证方法的安全性。最后,我们证明了所提出的哈希方法可以提供良好的安全性和鲁棒性。
{"title":"Efficient and robust perceptual hashing using log-polar image representation","authors":"Cezar Plesca, Luciana Morogan","doi":"10.1109/ICCOMM.2014.6866755","DOIUrl":"https://doi.org/10.1109/ICCOMM.2014.6866755","url":null,"abstract":"Robust image hashing seeks to transform a given input image into a shorter hashed version using a key-dependent non-invertible transform. These hashes find extensive applications in content authentication, image indexing for database search and watermarking. Modern robust hashing algorithms consist of feature extraction, a randomization stage to introduce non-invertibility, followed by quantization and binary encoding to produce a binary hash. This paper describes a novel algorithm for generating an image hash based on Log-Polar transform features. The Log-Polar transform is a part of the Fourier-Mellin transformation, often used in image recognition and registration techniques due to its invariant properties to geometric operations. First, we show that the proposed perceptual hash is resistant to content-preserving operations like compression, noise addition, moderate geometric and filtering. Second, we illustrate the discriminative capability of our hash in order to rapidly distinguish between two perceptually different images. Third, we study the security of our method for image authentication purposes. Finally, we show that the proposed hashing method can provide both excellent security and robustness.","PeriodicalId":366043,"journal":{"name":"2014 10th International Conference on Communications (COMM)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116712630","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Convergence study of IPv6 tunneling techniques IPv6隧道技术收敛性研究
Pub Date : 2014-05-29 DOI: 10.1109/ICCOMM.2014.6866678
Poussy A. Amr, Nashwa Abdelbaki
IPv4 address exhaustion pushed IETF to create IPv6, the improved substitute of IPv4. The Internet complexity and its enormous size prolong the transition from IPv4 to IPv6 process. This means that both versions will necessarily co-exist. Meanwhile, tunneling appears as a solution trend. The tunneling is a transition technique that is considered temporary till all ISPs would support IPv6. At this paper, we compare the routing convergence of two tunnel types, 6to4 and Manually Configured versus the conventional IPv4 and IPv6 protocols. We analyze the network resources consumed during cold start phase. Bandwidths occupied by routing traffic and convergence duration are measured. Finally we propose tunnel recommendations for different range of network resources.
IPv4地址耗尽促使IETF创建IPv6,即IPv4的改进替代品。互联网的复杂性及其巨大的规模延长了从IPv4到IPv6的过渡过程。这意味着两个版本必然共存。同时,隧道掘进也成为一种解决趋势。隧道是一种过渡技术,被认为是暂时的,直到所有的isp都支持IPv6。在本文中,我们比较了两种隧道类型的路由收敛,6to4和手动配置与传统的IPv4和IPv6协议。分析了冷启动阶段所消耗的网络资源。测量路由流量占用的带宽和收敛时间。最后针对不同的网络资源范围提出了隧道建议。
{"title":"Convergence study of IPv6 tunneling techniques","authors":"Poussy A. Amr, Nashwa Abdelbaki","doi":"10.1109/ICCOMM.2014.6866678","DOIUrl":"https://doi.org/10.1109/ICCOMM.2014.6866678","url":null,"abstract":"IPv4 address exhaustion pushed IETF to create IPv6, the improved substitute of IPv4. The Internet complexity and its enormous size prolong the transition from IPv4 to IPv6 process. This means that both versions will necessarily co-exist. Meanwhile, tunneling appears as a solution trend. The tunneling is a transition technique that is considered temporary till all ISPs would support IPv6. At this paper, we compare the routing convergence of two tunnel types, 6to4 and Manually Configured versus the conventional IPv4 and IPv6 protocols. We analyze the network resources consumed during cold start phase. Bandwidths occupied by routing traffic and convergence duration are measured. Finally we propose tunnel recommendations for different range of network resources.","PeriodicalId":366043,"journal":{"name":"2014 10th International Conference on Communications (COMM)","volume":"105 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123525754","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Steganalysis of a chaos-based steganographic method 一种基于混沌的隐写分析方法
Pub Date : 2014-05-29 DOI: 10.1109/ICCOMM.2014.6866665
Dalia Battikh, S. E. Assad, B. Bakhache, O. Déforges, Mohamad Khalil
Hiding information in a cover image can be regarded as introducing some stego-noise. These alterations may produce some form of degradation or some unusual characteristics and can then be exploited for the sake of detecting the hidden message. In this paper, we analyze the security of a chaos-based steganographic method, namely the Chaotic Edge adaptive Least Significant Bit Matching Revisited (Chaotic EA-LSBMR). We focus on the universal image steganalysis method which uses the higher-order statistics as features taken from the wavelet multiresolution approach. A Fisher Linear Discriminant classifier is used to classify cover and stego images.
在封面图像中隐藏信息可以看作是引入了一些隐写噪声。这些改变可能会产生某种形式的退化或一些不寻常的特征,然后可以利用它们来检测隐藏的信息。本文分析了一种基于混沌的隐写方法——混沌边缘自适应最小有效位匹配重访(Chaotic - lsbmr)的安全性。本文重点研究了一种通用的图像隐写分析方法,该方法利用小波多分辨率方法中的高阶统计量作为特征。采用Fisher线性判别分类器对覆盖图像和隐写图像进行分类。
{"title":"Steganalysis of a chaos-based steganographic method","authors":"Dalia Battikh, S. E. Assad, B. Bakhache, O. Déforges, Mohamad Khalil","doi":"10.1109/ICCOMM.2014.6866665","DOIUrl":"https://doi.org/10.1109/ICCOMM.2014.6866665","url":null,"abstract":"Hiding information in a cover image can be regarded as introducing some stego-noise. These alterations may produce some form of degradation or some unusual characteristics and can then be exploited for the sake of detecting the hidden message. In this paper, we analyze the security of a chaos-based steganographic method, namely the Chaotic Edge adaptive Least Significant Bit Matching Revisited (Chaotic EA-LSBMR). We focus on the universal image steganalysis method which uses the higher-order statistics as features taken from the wavelet multiresolution approach. A Fisher Linear Discriminant classifier is used to classify cover and stego images.","PeriodicalId":366043,"journal":{"name":"2014 10th International Conference on Communications (COMM)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123682199","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
RASSH - Reinforced adaptive SSH honeypot RASSH -增强自适应SSH蜜罐
Pub Date : 2014-05-29 DOI: 10.1109/ICCOMM.2014.6866707
Adrian Pauna, I. Bica
The wide spread of cyber-attacks made the need of gathering as much information as possible about them, a real demand in nowadays global context. The honeypot systems have become a powerful tool on the way to accomplish that. Researchers have already focused on the development of various honeypot systems but the fact that their administration is time consuming made clear the need of self-adaptive honeypot system capable of learning from their interaction with attackers. This paper presents a self-adaptive honeypot system we are developing that tries to overlap some of the disadvantaged that existing systems have. The proposed honeypot is a medium interaction system developed using Python and it emulates a SSH (Secure Shell) server. The system is capable of interacting with the attackers by means of reinforcement learning algorithms.
网络攻击的广泛传播使得人们需要尽可能多地收集有关它们的信息,这在当今全球背景下是一种真正的需求。蜜罐系统已经成为实现这一目标的有力工具。研究人员已经专注于各种蜜罐系统的开发,但它们的管理耗时的事实表明,需要能够从与攻击者的交互中学习的自适应蜜罐系统。本文提出了一种我们正在开发的自适应蜜罐系统,它试图弥补现有系统的一些缺点。提出的蜜罐是一个使用Python开发的介质交互系统,它模拟了SSH (Secure Shell)服务器。该系统能够通过强化学习算法与攻击者进行交互。
{"title":"RASSH - Reinforced adaptive SSH honeypot","authors":"Adrian Pauna, I. Bica","doi":"10.1109/ICCOMM.2014.6866707","DOIUrl":"https://doi.org/10.1109/ICCOMM.2014.6866707","url":null,"abstract":"The wide spread of cyber-attacks made the need of gathering as much information as possible about them, a real demand in nowadays global context. The honeypot systems have become a powerful tool on the way to accomplish that. Researchers have already focused on the development of various honeypot systems but the fact that their administration is time consuming made clear the need of self-adaptive honeypot system capable of learning from their interaction with attackers. This paper presents a self-adaptive honeypot system we are developing that tries to overlap some of the disadvantaged that existing systems have. The proposed honeypot is a medium interaction system developed using Python and it emulates a SSH (Secure Shell) server. The system is capable of interacting with the attackers by means of reinforcement learning algorithms.","PeriodicalId":366043,"journal":{"name":"2014 10th International Conference on Communications (COMM)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125456434","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 33
Business integration of industrial communications with Cloud computing 工业通信与云计算的业务集成
Pub Date : 2014-05-29 DOI: 10.1109/ICCOMM.2014.6866764
C. Costache, F. Sandu, T. Balan, A. Nedelcu, A. Covei
Industrial communications are influenced by the emerging Cloud trend, being more and more service-oriented. The access model to on-demand provisioned infrastructure is generic considered hereby as driven by VISA (Virtual Instrumentation Software Architecture) and being an extension of the “Measurement-as-a-Service”. Aggregation of the industrial instrumentation into the Cloud is based on the business execution logic. This paper describes a method for exposing as web services the VISA instruments, and proposes an architecture, based on BPEL (Business Process Execution Language) and ESB (Enterprise Service Bus), to integrate, at business level, the Cloud provisioned elements based on the models of virtual instrumentation extended as IaaS (Infrastructure-as-a-Service).
工业通信受到新兴的云趋势的影响,越来越面向服务。按需提供的基础设施的访问模型通常被认为是由VISA(虚拟仪器软件体系结构)驱动的,并且是“测量即服务”的扩展。工业仪器到云的聚合是基于业务执行逻辑的。本文描述了一种将VISA工具作为web服务公开的方法,并提出了一种基于BPEL(业务流程执行语言)和ESB(企业服务总线)的体系结构,以在业务级别集成基于扩展为IaaS(基础设施即服务)的虚拟工具模型的云提供元素。
{"title":"Business integration of industrial communications with Cloud computing","authors":"C. Costache, F. Sandu, T. Balan, A. Nedelcu, A. Covei","doi":"10.1109/ICCOMM.2014.6866764","DOIUrl":"https://doi.org/10.1109/ICCOMM.2014.6866764","url":null,"abstract":"Industrial communications are influenced by the emerging Cloud trend, being more and more service-oriented. The access model to on-demand provisioned infrastructure is generic considered hereby as driven by VISA (Virtual Instrumentation Software Architecture) and being an extension of the “Measurement-as-a-Service”. Aggregation of the industrial instrumentation into the Cloud is based on the business execution logic. This paper describes a method for exposing as web services the VISA instruments, and proposes an architecture, based on BPEL (Business Process Execution Language) and ESB (Enterprise Service Bus), to integrate, at business level, the Cloud provisioned elements based on the models of virtual instrumentation extended as IaaS (Infrastructure-as-a-Service).","PeriodicalId":366043,"journal":{"name":"2014 10th International Conference on Communications (COMM)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130504950","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multitemporal Satellite Image Time Series analysis of urban development in Bucharest and Ilfov areas 布加勒斯特和伊尔福夫地区城市发展的多时相卫星图像时间序列分析
Pub Date : 2014-05-29 DOI: 10.1109/ICCOMM.2014.6866702
T. Costachioiu, R. Constantinescu, M. Datcu
In this paper we focus on the extraction and analysis of long-term satellite image time series, and on applications in urban development monitoring. A Satellite Image Time Series (SITS) comprised of more than 100 data sets, covering a time span of over 25 years is extracted from the current Landsat data archives, Then we create stacks of intra-annual images, which are analyzed by applying a series of direct multidate classifications in order to extract the annual built-up surface. The evolution of the built-up areas is then compared against population dynamics for the studied area.
本文主要研究了长期卫星影像时间序列的提取与分析,以及在城市发展监测中的应用。从目前的Landsat数据档案中提取了超过25年的100多个数据集的卫星图像时间序列(sit),然后我们创建了年度内图像堆栈,通过应用一系列直接多日期分类对其进行分析,以提取年度建筑表面。然后将建成区的演变与研究区域的人口动态进行比较。
{"title":"Multitemporal Satellite Image Time Series analysis of urban development in Bucharest and Ilfov areas","authors":"T. Costachioiu, R. Constantinescu, M. Datcu","doi":"10.1109/ICCOMM.2014.6866702","DOIUrl":"https://doi.org/10.1109/ICCOMM.2014.6866702","url":null,"abstract":"In this paper we focus on the extraction and analysis of long-term satellite image time series, and on applications in urban development monitoring. A Satellite Image Time Series (SITS) comprised of more than 100 data sets, covering a time span of over 25 years is extracted from the current Landsat data archives, Then we create stacks of intra-annual images, which are analyzed by applying a series of direct multidate classifications in order to extract the annual built-up surface. The evolution of the built-up areas is then compared against population dynamics for the studied area.","PeriodicalId":366043,"journal":{"name":"2014 10th International Conference on Communications (COMM)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124807725","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
期刊
2014 10th International Conference on Communications (COMM)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1