Songde Hu, Huansheng Ning, Yang Xu, L. Mao, Youzhong Li, Lijun Zhang
Silicon physical unclonable function (PUF) is a special circuit that can reflect the uncontrollable intrinsic variation of integrated circuits (ICs) manufacturing process. These PUFs can be used as hardware security in security fields, such as authentication of devices and key generation in security applications. In order to know how the PUF circuits express the physical characteristics due to manufacturing process variations and provide a reference for researchers in the field of security, we briefly introduce the arbiter-based PUF and analyze the arbiter-based PUF in depth as it is a typical one of the silicon PUFs. Instead of paying attention to the whole PUF circuit which most studies do, we just focus on the stages so we can determine a demand of the arbiter. Monte Carlo simulation has been used to simulate the manufacturing process variations and the simulation is based on 40nm and 65nm technology libraries. Finally, a Monte Carlo-based statistical analysis has demonstrated that advanced technologies can enlarge intrinsic variation.
{"title":"Statistical Analysis of Process Variations on the Delay-Based PUF","authors":"Songde Hu, Huansheng Ning, Yang Xu, L. Mao, Youzhong Li, Lijun Zhang","doi":"10.1109/IIKI.2016.104","DOIUrl":"https://doi.org/10.1109/IIKI.2016.104","url":null,"abstract":"Silicon physical unclonable function (PUF) is a special circuit that can reflect the uncontrollable intrinsic variation of integrated circuits (ICs) manufacturing process. These PUFs can be used as hardware security in security fields, such as authentication of devices and key generation in security applications. In order to know how the PUF circuits express the physical characteristics due to manufacturing process variations and provide a reference for researchers in the field of security, we briefly introduce the arbiter-based PUF and analyze the arbiter-based PUF in depth as it is a typical one of the silicon PUFs. Instead of paying attention to the whole PUF circuit which most studies do, we just focus on the stages so we can determine a demand of the arbiter. Monte Carlo simulation has been used to simulate the manufacturing process variations and the simulation is based on 40nm and 65nm technology libraries. Finally, a Monte Carlo-based statistical analysis has demonstrated that advanced technologies can enlarge intrinsic variation.","PeriodicalId":371106,"journal":{"name":"2016 International Conference on Identification, Information and Knowledge in the Internet of Things (IIKI)","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131189856","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The user evaluation of shopping websites always has huge amounts of data which is a waste of manpower and material resources. Aiming at this problem, this paper puts forward a model based on LSTM and word vectors [1]. LSTM can be a very good solution because of the long distance learning of the neural nodes to forward neural nodes of declining awareness, thus LSTM neural network model can be better to finish the task of user sentiment analysis.
{"title":"LSTM Based on the Classification of Emotion about User Evaluation on Shopping Site","authors":"Rong Xiao, Xiaohui Cui, Peipei Zhou, Wanfeng Ge","doi":"10.1109/IIKI.2016.77","DOIUrl":"https://doi.org/10.1109/IIKI.2016.77","url":null,"abstract":"The user evaluation of shopping websites always has huge amounts of data which is a waste of manpower and material resources. Aiming at this problem, this paper puts forward a model based on LSTM and word vectors [1]. LSTM can be a very good solution because of the long distance learning of the neural nodes to forward neural nodes of declining awareness, thus LSTM neural network model can be better to finish the task of user sentiment analysis.","PeriodicalId":371106,"journal":{"name":"2016 International Conference on Identification, Information and Knowledge in the Internet of Things (IIKI)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128034289","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In a lot of microwave system development process, we often need to test antenna pattern be loaded in the system and provide support to carry out the relevant system design and testing. This article focuses on the issue during the millimeter wave antenna pattern test encountered and the measures taken.
{"title":"Problems and Solutions Encountered in the Measurement of Millimeter Wave Antenna Pattern","authors":"Yonglei Li, Hongmei Tang, Xin Liu, Tiexing Wang","doi":"10.1109/IIKI.2016.32","DOIUrl":"https://doi.org/10.1109/IIKI.2016.32","url":null,"abstract":"In a lot of microwave system development process, we often need to test antenna pattern be loaded in the system and provide support to carry out the relevant system design and testing. This article focuses on the issue during the millimeter wave antenna pattern test encountered and the measures taken.","PeriodicalId":371106,"journal":{"name":"2016 International Conference on Identification, Information and Knowledge in the Internet of Things (IIKI)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133652474","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
C. Duanmu, Di Zhao, Dingde Jiang, Houbing Song, Jiping Xiong
In the applications of the internet of things (IOT), the nodes in the network usually has power limits and storage space limits. Thus, the images over the IOT are usually low-resolution images. However, the customer usually want high-resolution images. To satisfy these needs, the solution of super-resolution methods comes. In this paper, a new algorithm for super-resolution is proposed, where the three dimensional discrete cosine transform (3D-DCT) is employed to extract the features of the image blocks. Then, the low frequency coefficients in the 3D-DCT are set with large weight values, and the high frequency coefficients are set with relatively small weight values. The 3D-DCT coefficients are then multiplied with the corresponding weights, and a reverse 3D-DCT is carried out. A bi-cubic transform is employed to get a high resolution block. The difference between that block and the actual high resolution block is saved in the training set with the 3D-DCT blocks. A new difference measure is proposed in the online phase to obtain the similarity between a candidate block and the blocks in the training set. After this, several training blocks are selected and the neighbor embedding method is employed to reconstruct the high resolution blocks. To reduce the computational complexity of the algorithm, the revised K-means algorithm is employed. The experimental results show that the proposed algorithm performs much better than the traditional neighbor embedding algorithm and the bi-cubic interpolation algorithm.
{"title":"A Three Dimension Super-Resolution Algorithm through Neighbor Embedding Based on Weighted Coefficient Values for Internet of Things","authors":"C. Duanmu, Di Zhao, Dingde Jiang, Houbing Song, Jiping Xiong","doi":"10.1109/IIKI.2016.52","DOIUrl":"https://doi.org/10.1109/IIKI.2016.52","url":null,"abstract":"In the applications of the internet of things (IOT), the nodes in the network usually has power limits and storage space limits. Thus, the images over the IOT are usually low-resolution images. However, the customer usually want high-resolution images. To satisfy these needs, the solution of super-resolution methods comes. In this paper, a new algorithm for super-resolution is proposed, where the three dimensional discrete cosine transform (3D-DCT) is employed to extract the features of the image blocks. Then, the low frequency coefficients in the 3D-DCT are set with large weight values, and the high frequency coefficients are set with relatively small weight values. The 3D-DCT coefficients are then multiplied with the corresponding weights, and a reverse 3D-DCT is carried out. A bi-cubic transform is employed to get a high resolution block. The difference between that block and the actual high resolution block is saved in the training set with the 3D-DCT blocks. A new difference measure is proposed in the online phase to obtain the similarity between a candidate block and the blocks in the training set. After this, several training blocks are selected and the neighbor embedding method is employed to reconstruct the high resolution blocks. To reduce the computational complexity of the algorithm, the revised K-means algorithm is employed. The experimental results show that the proposed algorithm performs much better than the traditional neighbor embedding algorithm and the bi-cubic interpolation algorithm.","PeriodicalId":371106,"journal":{"name":"2016 International Conference on Identification, Information and Knowledge in the Internet of Things (IIKI)","volume":"174 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114471344","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Smart sport equipment is being increasingly used in highly competitive (professional) sport. By definition, smart equipment employs various sensors for detecting its state and actions. The correct choice of the most appropriate sensor(s) is of paramount importance. When integrated into the equipment, ideal sensors are unobstructive, and do not change the functionality of the equipment. The article focuses on identification and selection of sensors suitable for the integration into a golf club. We used two orthogonally affixed strain gage sensors, a 3-axis accelerometer, and a 3-axis gyroscope. The responses of strain gage sensors are used for measuring golf club flex. They are calibrated and validated in the laboratory environment by the highly accurate optical tracking system Qualisys Track Manager (QTM). Accelerometer and gyroscope are used to measure golf club acceleration and angular speed. Field tests are performed without QTM, only with the sensors affixed to the golf club. The first set of results show that the strain gage sensors complement the inertial sensors. For some golf swing tracking and error detection applications strain gage sensors could be the only type of sensors needed. Our final goal is to be able to acquire and analyze as many parameters of a golf club in real time during the entire swing. Such information would make the identification and selection of the most appropriate sensors to be applicable for a defined task easier.
{"title":"Identification and Selection of Sensors Suitable for Integration into Sport Equipment: Smart Golf Club","authors":"A. Kos, A. Umek, S. Tomažič","doi":"10.1109/IIKI.2016.71","DOIUrl":"https://doi.org/10.1109/IIKI.2016.71","url":null,"abstract":"Smart sport equipment is being increasingly used in highly competitive (professional) sport. By definition, smart equipment employs various sensors for detecting its state and actions. The correct choice of the most appropriate sensor(s) is of paramount importance. When integrated into the equipment, ideal sensors are unobstructive, and do not change the functionality of the equipment. The article focuses on identification and selection of sensors suitable for the integration into a golf club. We used two orthogonally affixed strain gage sensors, a 3-axis accelerometer, and a 3-axis gyroscope. The responses of strain gage sensors are used for measuring golf club flex. They are calibrated and validated in the laboratory environment by the highly accurate optical tracking system Qualisys Track Manager (QTM). Accelerometer and gyroscope are used to measure golf club acceleration and angular speed. Field tests are performed without QTM, only with the sensors affixed to the golf club. The first set of results show that the strain gage sensors complement the inertial sensors. For some golf swing tracking and error detection applications strain gage sensors could be the only type of sensors needed. Our final goal is to be able to acquire and analyze as many parameters of a golf club in real time during the entire swing. Such information would make the identification and selection of the most appropriate sensors to be applicable for a defined task easier.","PeriodicalId":371106,"journal":{"name":"2016 International Conference on Identification, Information and Knowledge in the Internet of Things (IIKI)","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124693852","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Underwater environments may vary gradually even when the occurrence of events is detected. Sensory data may follow a certain trend and are predictable during certain time durations. Taken these into concerns, a prediction mechanism can be adopted for estimate, and data are synchronized by underwater sensor nodes only when variation is beyond pre-specified thresholds. Leveraging predicted data, the coverage and sources of potential events are identified by the sink node, and the evolution of these events is determined accordingly. Evaluation results show the applicability and energy-efficiency of this approach, especially when the variation of network environments follows certain and simple patterns.
{"title":"Prediction-Based Event Determination in Underwater Wireless Sensor Networks","authors":"Wei Fang, Zhangbing Zhou, Lei Shu, Xiaolei Wang, Dengbiao Tu, Yongping Xiong","doi":"10.1109/IIKI.2016.86","DOIUrl":"https://doi.org/10.1109/IIKI.2016.86","url":null,"abstract":"Underwater environments may vary gradually even when the occurrence of events is detected. Sensory data may follow a certain trend and are predictable during certain time durations. Taken these into concerns, a prediction mechanism can be adopted for estimate, and data are synchronized by underwater sensor nodes only when variation is beyond pre-specified thresholds. Leveraging predicted data, the coverage and sources of potential events are identified by the sink node, and the evolution of these events is determined accordingly. Evaluation results show the applicability and energy-efficiency of this approach, especially when the variation of network environments follows certain and simple patterns.","PeriodicalId":371106,"journal":{"name":"2016 International Conference on Identification, Information and Knowledge in the Internet of Things (IIKI)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134238607","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Unit and Ubiquitous IoT (U2IoT) is a typical IoT architecture for achieving comprehensive interactions of ubiquitous things. In U2IoT, security becomes a challenging issue due to objects' complicated interactive phases. The object in different phases of being mapped from the physical space to the cyber space has different security requirements. In this work, a concept of Object Life Cycle (OLC) is first proposed to describe the security requirements for the objects' physical access, cyberentity, and physical extinction phase in U2IoT. Meanwhile, considering the variety of objects and related diversity resources, Physical Unclonable Function (PUF) is introduced to design a lightweight mutual authentication protocol for a smart home scenario. The design correctness and formal security are proved based on the BAN-logic. It indicates that the proposed protocol satisfies the main security requirements for the object during the physical access phase.
{"title":"Physical Unclonable Function Based Authentication Protocol for Unit IoT and Ubiquitous IoT","authors":"Min Zhao, Xuanxia Yao, Hong Liu, Huansheng Ning","doi":"10.1109/IIKI.2016.85","DOIUrl":"https://doi.org/10.1109/IIKI.2016.85","url":null,"abstract":"Unit and Ubiquitous IoT (U2IoT) is a typical IoT architecture for achieving comprehensive interactions of ubiquitous things. In U2IoT, security becomes a challenging issue due to objects' complicated interactive phases. The object in different phases of being mapped from the physical space to the cyber space has different security requirements. In this work, a concept of Object Life Cycle (OLC) is first proposed to describe the security requirements for the objects' physical access, cyberentity, and physical extinction phase in U2IoT. Meanwhile, considering the variety of objects and related diversity resources, Physical Unclonable Function (PUF) is introduced to design a lightweight mutual authentication protocol for a smart home scenario. The design correctness and formal security are proved based on the BAN-logic. It indicates that the proposed protocol satisfies the main security requirements for the object during the physical access phase.","PeriodicalId":371106,"journal":{"name":"2016 International Conference on Identification, Information and Knowledge in the Internet of Things (IIKI)","volume":"15 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134412971","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Xiaosheng Wu, Shengling Wang, Chun-Chi Liu, Weiman Sun, Chenyu Wang
Crowdsourcing is a new paradigm emerged in recentyears. It can deal with the tasks posted by the requestor, who wants the worker to accept the task and finish it. Incrowdsourcing, it is a common case that using the reputationmechanism estimates worker's ability to avoid that the workercontributes low-quality work. Therefore, the reputation mechanismis integrated into the crowdsourcing for the tasks assignmentand the biding price in this paper. However, it is undesirable forsome requestors that the evaluation for workers, as requestors'private information, is exposed. The challenge is to finish the tasksmentioned above with keeping the requestors' private informationfrom exposing. Another important challenge with insufficientattention resides in finding the communication channels and getthe necessary information, which can obtain optimal benefit inincentive mechanism, as most of researchers focus on competitiverelationship between the worker and requestor. In this paper, wepropose the novel framework using the reputation mechanismbased on the Stackelberg game model to focus on the cooperationbetween workers and requestors. There are two stages whereworkers and requestors observe each others' strategies or sharetheir information to each other to maximize their own benefit. Firstly, we formulate the framework based on the Stackelberggame model and discuss its advantage. Subsequently, we study theoptimal strategies of each, give the process that how to calculateit, and analyse the unique Stackelberg Equilibrium. Finally, wesimulate our the framework and use different numerical valueparameters to test the effect on the performance of the games.
{"title":"Stackelberg Game Based Tasks Assignment Mechanism Using Reputation in Crowdsourcing","authors":"Xiaosheng Wu, Shengling Wang, Chun-Chi Liu, Weiman Sun, Chenyu Wang","doi":"10.1109/IIKI.2016.36","DOIUrl":"https://doi.org/10.1109/IIKI.2016.36","url":null,"abstract":"Crowdsourcing is a new paradigm emerged in recentyears. It can deal with the tasks posted by the requestor, who wants the worker to accept the task and finish it. Incrowdsourcing, it is a common case that using the reputationmechanism estimates worker's ability to avoid that the workercontributes low-quality work. Therefore, the reputation mechanismis integrated into the crowdsourcing for the tasks assignmentand the biding price in this paper. However, it is undesirable forsome requestors that the evaluation for workers, as requestors'private information, is exposed. The challenge is to finish the tasksmentioned above with keeping the requestors' private informationfrom exposing. Another important challenge with insufficientattention resides in finding the communication channels and getthe necessary information, which can obtain optimal benefit inincentive mechanism, as most of researchers focus on competitiverelationship between the worker and requestor. In this paper, wepropose the novel framework using the reputation mechanismbased on the Stackelberg game model to focus on the cooperationbetween workers and requestors. There are two stages whereworkers and requestors observe each others' strategies or sharetheir information to each other to maximize their own benefit. Firstly, we formulate the framework based on the Stackelberggame model and discuss its advantage. Subsequently, we study theoptimal strategies of each, give the process that how to calculateit, and analyse the unique Stackelberg Equilibrium. Finally, wesimulate our the framework and use different numerical valueparameters to test the effect on the performance of the games.","PeriodicalId":371106,"journal":{"name":"2016 International Conference on Identification, Information and Knowledge in the Internet of Things (IIKI)","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133950841","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In the traditional Chinese medicine (TCM) wrist pulse diagnosis plays a major role in detecting the health status of an individual. It depends strongly on the doctors' long-term experience as well as on their different inferences. Being subjective and based on long-term experience, pulse detection methods are difficult to standardize. Kim pulse diagnosis (KPD), established by Wei Jin, is an efficient method validated by both traditional Chinese medicine and in recent years also by western medicine. The key step to automatic implementation of KPD, using signal processing and analysis, is the developed KPD signal acquisition device. However, the raw wrist pulse signal acquired from KPD device includes a significant amount of noise. This paper proposes several preprocessing algorithms for pulse diagnosis, that includes wavelet transform and Gaussian filter to remove noise and the iterative sliding window (ISW) algorithm to remove the baseline wander and split the continuous signal into single periods. Experimental results show, that the algorithm for baseline wander removal is efficient and that the segmented signal matches the signal described in KPD.
{"title":"KPD Based Signal Preprocessing Algorithm for Pulse Diagnosis","authors":"Zhichao Zhang, Yuan Zhang, W. Jin, A. Kos","doi":"10.1109/IIKI.2016.75","DOIUrl":"https://doi.org/10.1109/IIKI.2016.75","url":null,"abstract":"In the traditional Chinese medicine (TCM) wrist pulse diagnosis plays a major role in detecting the health status of an individual. It depends strongly on the doctors' long-term experience as well as on their different inferences. Being subjective and based on long-term experience, pulse detection methods are difficult to standardize. Kim pulse diagnosis (KPD), established by Wei Jin, is an efficient method validated by both traditional Chinese medicine and in recent years also by western medicine. The key step to automatic implementation of KPD, using signal processing and analysis, is the developed KPD signal acquisition device. However, the raw wrist pulse signal acquired from KPD device includes a significant amount of noise. This paper proposes several preprocessing algorithms for pulse diagnosis, that includes wavelet transform and Gaussian filter to remove noise and the iterative sliding window (ISW) algorithm to remove the baseline wander and split the continuous signal into single periods. Experimental results show, that the algorithm for baseline wander removal is efficient and that the segmented signal matches the signal described in KPD.","PeriodicalId":371106,"journal":{"name":"2016 International Conference on Identification, Information and Knowledge in the Internet of Things (IIKI)","volume":"293 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116095856","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The echo of target with micro-motion contains the electromagnetic scattering characteristics and movement characteristics, which plays important roles in the target identification. Precession period is one of the important characteristics on the analysis of the micro-motion characteristics. Aimed at the phenomenon of extracting the cycle of no precession target, in the thesis a method is proposed by combing period extraction with eigenvalue entropy. The original echo is constructed by establishing autocorrelation matrix and the eigenvalues are obtained through eigenvalue decomposition. Then the period is extracted after calculating the eigenvalue entropy. The method can eliminates some targets with no obvious precession and minishes the error of period extraction, which lays the foundation for the recognition of the final target class.
{"title":"Research on the Micro-Motion Patterns Recognition Method Based on Characteristic Value Entropy","authors":"Chuanzi Tang, Hongmei Ren, Wenjing Chen","doi":"10.1109/IIKI.2016.96","DOIUrl":"https://doi.org/10.1109/IIKI.2016.96","url":null,"abstract":"The echo of target with micro-motion contains the electromagnetic scattering characteristics and movement characteristics, which plays important roles in the target identification. Precession period is one of the important characteristics on the analysis of the micro-motion characteristics. Aimed at the phenomenon of extracting the cycle of no precession target, in the thesis a method is proposed by combing period extraction with eigenvalue entropy. The original echo is constructed by establishing autocorrelation matrix and the eigenvalues are obtained through eigenvalue decomposition. Then the period is extracted after calculating the eigenvalue entropy. The method can eliminates some targets with no obvious precession and minishes the error of period extraction, which lays the foundation for the recognition of the final target class.","PeriodicalId":371106,"journal":{"name":"2016 International Conference on Identification, Information and Knowledge in the Internet of Things (IIKI)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116992948","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}