首页 > 最新文献

2016 IEEE International Symposium on Signal Processing and Information Technology (ISSPIT)最新文献

英文 中文
Informed Split Gradient Non-negative Matrix factorization using Huber cost function for source apportionment 基于Huber代价函数的非负矩阵分解
Robert Chreiky, G. Delmaire, M. Puigt, G. Roussel, A. Abche
Source apportionment is usually tackled with blind Positive/Non-negative Matrix factorization (PMF/NMF) methods. However, the obtained results may be poor due to the dependence between some rows of the second factor. We recently proposed to inform the estimation of this factor using some prior knowledge provided by chemists—some entries are set to some fixed values—and the sum-to-one property of each row. These constraints were recently taken into account by using a parameterization which gathers all of them. In this paper, a novel robust NMF approach able to cope with outliers is proposed. For that purpose, we consider the Huber loss function—a ℓ2-ℓ1 cost function—which is robust to outliers, contrary to the Frobenius norm classically met in NMF. We thus propose new update rules for the informed Huber NMF in the framework of the split gradient techniques. The choice of the adaptive cutoff parameter—which links both single cost functions—is discussed along this paper. The proposed approach is shown to outperform state-of-the-art methods on several source apportionment simulations involving various input SNRs and outliers.
源分配通常采用盲正/非负矩阵分解(PMF/NMF)方法。然而,由于第二因素的某些行之间的依赖性,所得结果可能较差。我们最近建议使用化学家提供的一些先验知识(某些条目被设置为某些固定值)和每行的和为一的性质来通知该因子的估计。最近,通过使用一个参数化来考虑这些约束,该参数化将所有约束集合在一起。本文提出了一种新的鲁棒NMF方法,能够处理异常值。为此,我们考虑Huber损失函数(一个2- 1代价函数),它对异常值具有鲁棒性,与NMF中经典的Frobenius范数相反。因此,我们在分裂梯度技术的框架下提出了新的通知Huber NMF的更新规则。本文讨论了连接两个单代价函数的自适应截止参数的选择。在涉及各种输入信噪比和异常值的几种源分配模拟中,所提出的方法被证明优于最先进的方法。
{"title":"Informed Split Gradient Non-negative Matrix factorization using Huber cost function for source apportionment","authors":"Robert Chreiky, G. Delmaire, M. Puigt, G. Roussel, A. Abche","doi":"10.1109/ISSPIT.2016.7886011","DOIUrl":"https://doi.org/10.1109/ISSPIT.2016.7886011","url":null,"abstract":"Source apportionment is usually tackled with blind Positive/Non-negative Matrix factorization (PMF/NMF) methods. However, the obtained results may be poor due to the dependence between some rows of the second factor. We recently proposed to inform the estimation of this factor using some prior knowledge provided by chemists—some entries are set to some fixed values—and the sum-to-one property of each row. These constraints were recently taken into account by using a parameterization which gathers all of them. In this paper, a novel robust NMF approach able to cope with outliers is proposed. For that purpose, we consider the Huber loss function—a ℓ2-ℓ1 cost function—which is robust to outliers, contrary to the Frobenius norm classically met in NMF. We thus propose new update rules for the informed Huber NMF in the framework of the split gradient techniques. The choice of the adaptive cutoff parameter—which links both single cost functions—is discussed along this paper. The proposed approach is shown to outperform state-of-the-art methods on several source apportionment simulations involving various input SNRs and outliers.","PeriodicalId":371691,"journal":{"name":"2016 IEEE International Symposium on Signal Processing and Information Technology (ISSPIT)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133745372","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Sparse recovery using an iterative Variational Bayes algorithm and application to AoA estimation 稀疏恢复的迭代变分贝叶斯算法及其在AoA估计中的应用
Ahmad Bazzi, D. Slock, Lisa Meilhac
This paper presents an iterative Variational Bayes (VB) algorithm that allows sparse recovery of the desired transmitted vector. The VB algorithm is derived based on the latent variables introduced in the Bayesian model in hand. The proposed algorithm is applied to the Angle-of-Arrival (AoA) estimation problem and simulations demonstrate the potential of the proposed VB algorithm when compared to existing sparse recovery and compressed sensing algorithms, especially in the case of closely spaced sources. Furthermore, the proposed algorithm does not require prior knowledge of the number of sources and operates with only one snapshot.
本文提出了一种迭代变分贝叶斯(VB)算法,该算法允许对期望的传输向量进行稀疏恢复。VB算法是基于贝叶斯模型中引入的潜在变量推导出来的。将该算法应用于到达角(AoA)估计问题,仿真结果表明,与现有的稀疏恢复和压缩感知算法相比,所提出的VB算法具有很大的潜力,特别是在近距离源的情况下。此外,该算法不需要预先知道源的数量,并且仅使用一个快照进行操作。
{"title":"Sparse recovery using an iterative Variational Bayes algorithm and application to AoA estimation","authors":"Ahmad Bazzi, D. Slock, Lisa Meilhac","doi":"10.1109/ISSPIT.2016.7886034","DOIUrl":"https://doi.org/10.1109/ISSPIT.2016.7886034","url":null,"abstract":"This paper presents an iterative Variational Bayes (VB) algorithm that allows sparse recovery of the desired transmitted vector. The VB algorithm is derived based on the latent variables introduced in the Bayesian model in hand. The proposed algorithm is applied to the Angle-of-Arrival (AoA) estimation problem and simulations demonstrate the potential of the proposed VB algorithm when compared to existing sparse recovery and compressed sensing algorithms, especially in the case of closely spaced sources. Furthermore, the proposed algorithm does not require prior knowledge of the number of sources and operates with only one snapshot.","PeriodicalId":371691,"journal":{"name":"2016 IEEE International Symposium on Signal Processing and Information Technology (ISSPIT)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115272342","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Novel active PID controller employing VDTA 采用VDTA的新型有源PID控制器
D. Prasad, M. Srivastava, Laxya, Farah Jabin, Ghania Fatima, S. Khan, Safa Tanzeem
PID is most widely used in industrial process control. Voltage Differencing Transconductance Amplifier (VDTA) which is recently more popular in analog signal processing applications is discussed and integrated a proportional-integral-derivative (PID) controller. The proposed controller needs minimum number of active and passive components and demonstrates independent/electronic tuning of control parameters. In order to verify the suggested controller and controller's effect on second order step response of a VDTA based circuit is analyzed and presented in section II. The theoretical analysis proposed in this paper is tested through Or-CAD SPICE 9.1 simulations with TSMC 180nm CMOS process parameters.
PID在工业过程控制中应用最为广泛。讨论了近年来在模拟信号处理应用中比较流行的电压差分跨导放大器(VDTA),并集成了比例-积分-导数(PID)控制器。所提出的控制器需要最少数量的有源和无源元件,并演示了控制参数的独立/电子调谐。为了验证建议的控制器和控制器对基于VDTA的电路的二阶阶跃响应的影响,在第二节中进行了分析和介绍。本文的理论分析通过Or-CAD SPICE 9.1仿真,采用台积电180nm CMOS工艺参数进行了验证。
{"title":"Novel active PID controller employing VDTA","authors":"D. Prasad, M. Srivastava, Laxya, Farah Jabin, Ghania Fatima, S. Khan, Safa Tanzeem","doi":"10.1109/ISSPIT.2016.7886050","DOIUrl":"https://doi.org/10.1109/ISSPIT.2016.7886050","url":null,"abstract":"PID is most widely used in industrial process control. Voltage Differencing Transconductance Amplifier (VDTA) which is recently more popular in analog signal processing applications is discussed and integrated a proportional-integral-derivative (PID) controller. The proposed controller needs minimum number of active and passive components and demonstrates independent/electronic tuning of control parameters. In order to verify the suggested controller and controller's effect on second order step response of a VDTA based circuit is analyzed and presented in section II. The theoretical analysis proposed in this paper is tested through Or-CAD SPICE 9.1 simulations with TSMC 180nm CMOS process parameters.","PeriodicalId":371691,"journal":{"name":"2016 IEEE International Symposium on Signal Processing and Information Technology (ISSPIT)","volume":"121 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127505079","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
LOS millimeter-wave communication with quadrature spatial modulation 具有正交空间调制的LOS毫米波通信
R. Mesleh, Abdelhamid Younis
Capacity analysis for line-of-sight (LOS) millimeter-wave (mmWave) quadrature spatial modulation (QSM) multiple-input multiple-output (MIMO) system is presented in this paper. QSM is a new MIMO technique proposed to enhance the performance of conventional spatial modulation (SM) while retaining almost all its inherent advantages. Furthermore, mmWave utilizes a license-free wide-bandwidth spectrum and is a very promising candidate for future wireless systems. Detailed and novel analysis of the mutual information and the achievable capacity for mmWave-QSM system are presented in this study. The conditions under which theoretical capacity can be achieved are derived and discussed. Monte Carlo simulation results are provided to corroborate derived formulas. It is shown that significant performance enhancements can be achieved under different system and channel configurations.
本文对视距毫米波正交空间调制多输入多输出(MIMO)系统的容量进行了分析。QSM是一种新的MIMO技术,它在提高传统空间调制(SM)性能的同时,几乎保留了传统空间调制的所有固有优点。此外,毫米波利用免许可的宽带频谱,是未来无线系统的一个非常有前途的候选者。本文对毫米波- qsm系统的互信息和可实现容量进行了详细而新颖的分析。推导并讨论了达到理论容量的条件。给出了蒙特卡罗模拟结果来验证推导公式。结果表明,在不同的系统和信道配置下,可以实现显著的性能增强。
{"title":"LOS millimeter-wave communication with quadrature spatial modulation","authors":"R. Mesleh, Abdelhamid Younis","doi":"10.1109/ISSPIT.2016.7886018","DOIUrl":"https://doi.org/10.1109/ISSPIT.2016.7886018","url":null,"abstract":"Capacity analysis for line-of-sight (LOS) millimeter-wave (mmWave) quadrature spatial modulation (QSM) multiple-input multiple-output (MIMO) system is presented in this paper. QSM is a new MIMO technique proposed to enhance the performance of conventional spatial modulation (SM) while retaining almost all its inherent advantages. Furthermore, mmWave utilizes a license-free wide-bandwidth spectrum and is a very promising candidate for future wireless systems. Detailed and novel analysis of the mutual information and the achievable capacity for mmWave-QSM system are presented in this study. The conditions under which theoretical capacity can be achieved are derived and discussed. Monte Carlo simulation results are provided to corroborate derived formulas. It is shown that significant performance enhancements can be achieved under different system and channel configurations.","PeriodicalId":371691,"journal":{"name":"2016 IEEE International Symposium on Signal Processing and Information Technology (ISSPIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114408605","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Improved dialect recognition for colloquial Arabic speakers 改进了阿拉伯语口语使用者的方言识别
Rania R. Ziedan, Michael N. Micheal, Abdulwahab K. Alsammak, M. Mursi, Adel Said Elmaghraby
This article proposes a gender and geographical origin recognition system for Arabic speakers based on the dialect and accent characteristics. We demonstrate that the speaker gender and nationality can be determined from colloquial Arabic speech and recommend that this system can be integrated to more complex biometric applications. The acoustic features of our proposed dataset used to identify the speaker's dialect and accent, are extracted using Mel Frequency Cepstral Coefficients (MFCC) and Relative Spectral Analysis (RASTA) techniques. We compare results of classification based on Gaussian Mixture Model with Universal Background Model (GMM-UBM) and Identity Vector (I-vector) classifiers implemented using the MSR Identity Toolbox, which is a MATLAB toolbox for speaker-recognition research from Microsoft. The results show a significant decrease of equal error rate (EER) when recognizing dialect or accent based on gender. In addition, feature fusion of RASTA and MFCC is used to enhance the EER. Results show a 9.8% enhancement in EER over using the RASTA features only.
本文提出了一种基于阿拉伯语方言和口音特征的性别和地理来源识别系统。我们证明了说话者的性别和国籍可以从阿拉伯语口语中确定,并建议该系统可以集成到更复杂的生物识别应用中。我们提出的数据集的声学特征用于识别说话人的方言和口音,使用Mel频率倒谱系数(MFCC)和相对频谱分析(RASTA)技术提取。我们比较了基于高斯混合模型的通用背景模型(GMM-UBM)和使用MSR Identity Toolbox实现的身份向量(I-vector)分类器的分类结果,MSR Identity Toolbox是微软用于说话人识别研究的MATLAB工具箱。结果表明,基于性别的方言或口音识别的等错误率(EER)显著降低。此外,利用RASTA和MFCC的特征融合来增强EER。结果显示,与仅使用RASTA特征相比,EER提高了9.8%。
{"title":"Improved dialect recognition for colloquial Arabic speakers","authors":"Rania R. Ziedan, Michael N. Micheal, Abdulwahab K. Alsammak, M. Mursi, Adel Said Elmaghraby","doi":"10.1109/ISSPIT.2016.7886002","DOIUrl":"https://doi.org/10.1109/ISSPIT.2016.7886002","url":null,"abstract":"This article proposes a gender and geographical origin recognition system for Arabic speakers based on the dialect and accent characteristics. We demonstrate that the speaker gender and nationality can be determined from colloquial Arabic speech and recommend that this system can be integrated to more complex biometric applications. The acoustic features of our proposed dataset used to identify the speaker's dialect and accent, are extracted using Mel Frequency Cepstral Coefficients (MFCC) and Relative Spectral Analysis (RASTA) techniques. We compare results of classification based on Gaussian Mixture Model with Universal Background Model (GMM-UBM) and Identity Vector (I-vector) classifiers implemented using the MSR Identity Toolbox, which is a MATLAB toolbox for speaker-recognition research from Microsoft. The results show a significant decrease of equal error rate (EER) when recognizing dialect or accent based on gender. In addition, feature fusion of RASTA and MFCC is used to enhance the EER. Results show a 9.8% enhancement in EER over using the RASTA features only.","PeriodicalId":371691,"journal":{"name":"2016 IEEE International Symposium on Signal Processing and Information Technology (ISSPIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128755108","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Big time-frequency domain data mining for underdetermined BSS using density component analysis 基于密度分量分析的欠定BSS大时频域数据挖掘
Chengjie Li, Lidong Zhu, Zhongqiang Luo
Today's blind signal separation (BSS) processes are often controlled and supported by information systems. These systems record discrete time-frequency domain information about mixed signal during their executions. So, blind source separation problem (BSS) is transformed into data classification problem. In this paper, a novel Density Clustering algorithm (DC-algorithm) is proposed for frequency hopping signal under-determined blind source separation. Different from traditional methods, we formulate the separation problem as clustering problem, which is motivated by the fact that the mixed signal is sparse and the energy difference is as large as possible to satisfy cluster centers that are surrounded by neighbors with local lower density. In our method, we accomplish the underdetermined blind source separation by firstly computing the Short Time Fourier Transform (STFT) of each observation, secondly, formulating the separation problem as clustering problem. In this process, a new pair of cost functions are designed to improve the clustering. We verify the proposed method on several simulations. The experimental results demonstrate the effectiveness of the proposed method.
目前的盲信号分离(BSS)过程通常由信息系统控制和支持。这些系统在执行过程中记录有关混合信号的离散时频域信息。因此,将盲源分离问题转化为数据分类问题。针对跳频信号欠定盲源分离问题,提出了一种新的密度聚类算法(dc算法)。与传统方法不同,我们将分离问题表述为聚类问题,其动机是混合信号的稀疏性和尽可能大的能量差,以满足被局部密度较低的邻居包围的聚类中心。该方法首先计算每个观测值的短时傅里叶变换(STFT),然后将分离问题表述为聚类问题,从而实现欠定盲源分离。在此过程中,设计了一对新的代价函数来改进聚类。通过仿真验证了该方法的有效性。实验结果证明了该方法的有效性。
{"title":"Big time-frequency domain data mining for underdetermined BSS using density component analysis","authors":"Chengjie Li, Lidong Zhu, Zhongqiang Luo","doi":"10.1109/ISSPIT.2016.7886032","DOIUrl":"https://doi.org/10.1109/ISSPIT.2016.7886032","url":null,"abstract":"Today's blind signal separation (BSS) processes are often controlled and supported by information systems. These systems record discrete time-frequency domain information about mixed signal during their executions. So, blind source separation problem (BSS) is transformed into data classification problem. In this paper, a novel Density Clustering algorithm (DC-algorithm) is proposed for frequency hopping signal under-determined blind source separation. Different from traditional methods, we formulate the separation problem as clustering problem, which is motivated by the fact that the mixed signal is sparse and the energy difference is as large as possible to satisfy cluster centers that are surrounded by neighbors with local lower density. In our method, we accomplish the underdetermined blind source separation by firstly computing the Short Time Fourier Transform (STFT) of each observation, secondly, formulating the separation problem as clustering problem. In this process, a new pair of cost functions are designed to improve the clustering. We verify the proposed method on several simulations. The experimental results demonstrate the effectiveness of the proposed method.","PeriodicalId":371691,"journal":{"name":"2016 IEEE International Symposium on Signal Processing and Information Technology (ISSPIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129535636","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Preprocessing in a reaction-diffusion algorithm designed for image edge detection 一种用于图像边缘检测的反应扩散算法的预处理
A. Nomura, K. Okada, Y. Mizukami
This paper proposes a reaction-diffusion algorithm for image edge detection in the framework of FitzHugh-Nagumo model. FitzHugh-Nagumo model has two variables, activator and inhibitor, which are governed by two timeevolving differential equations, respectively, for simulating a process of biological excitation and inhibition phenomenon observed along a nerve. The proposed algorithm places FitzHugh-Nagumo elements, which contains a pair of activator and inhibitor variables, at the image grids. At first, the algorithm gives initial conditions of the elements according to an inputted gray level image. Then, it performs preprocessing for reducing noise by using only inhibition equation at the elements, and finally performs edge-detection by using both excitation and inhibition equations. The performance of the proposed algorithm is investigated with artificial and real images.
在FitzHugh-Nagumo模型框架下,提出了一种用于图像边缘检测的反应扩散算法。FitzHugh-Nagumo模型具有激活因子和抑制因子两个变量,分别由两个时间演化微分方程控制,用于模拟沿神经观察到的生物兴奋和抑制现象的过程。该算法将包含一对激活变量和抑制变量的FitzHugh-Nagumo元素放置在图像网格上。该算法首先根据输入的灰度图像给出元素的初始条件。然后,仅利用抑制方程对元素进行降噪预处理,最后利用激励方程和抑制方程进行边缘检测。用人工图像和真实图像研究了该算法的性能。
{"title":"Preprocessing in a reaction-diffusion algorithm designed for image edge detection","authors":"A. Nomura, K. Okada, Y. Mizukami","doi":"10.1109/ISSPIT.2016.7886028","DOIUrl":"https://doi.org/10.1109/ISSPIT.2016.7886028","url":null,"abstract":"This paper proposes a reaction-diffusion algorithm for image edge detection in the framework of FitzHugh-Nagumo model. FitzHugh-Nagumo model has two variables, activator and inhibitor, which are governed by two timeevolving differential equations, respectively, for simulating a process of biological excitation and inhibition phenomenon observed along a nerve. The proposed algorithm places FitzHugh-Nagumo elements, which contains a pair of activator and inhibitor variables, at the image grids. At first, the algorithm gives initial conditions of the elements according to an inputted gray level image. Then, it performs preprocessing for reducing noise by using only inhibition equation at the elements, and finally performs edge-detection by using both excitation and inhibition equations. The performance of the proposed algorithm is investigated with artificial and real images.","PeriodicalId":371691,"journal":{"name":"2016 IEEE International Symposium on Signal Processing and Information Technology (ISSPIT)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133946738","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Controlled Airspace infringements and warning system 管制空域违例及警告系统
Yousra Almathami, R. Ammar
A major concern for Air traffic controllers (ATC) are facing on a daily basis are controlled Airspace (CAS) infringements. An infringement is when aircraft penetrates CASs without an advanced clearance from the ATC. These infringement may cause a conflict or a midair collision with a commercial aircraft flying within CAS. As a result, a ground based safety net called Controlled Airspace infringement Tool (CAIT) is used by ATCs which warns them if any aircraft within uncontrolled airspace (UCAS) has penetrated (CAS). In our previous paper, we developed a probabilistic CAS infringement tool (PCAIT) that predicts future aircraft locations using the Kalman filter and calculate their probability of infringement. In this paper, we review the factors behind CAS infringements and build a classifier based on them to enhance our decision about future infringements. This model “warning system” could provide ATCs with more time to resolve any possible future conflicts.
空中交通管制员(ATC)每天面临的主要问题是管制空域(CAS)侵权。违章是指飞机未经空中交通管制中心事先许可就进入卡斯。这些侵权行为可能导致与在CAS内飞行的商用飞机发生冲突或空中碰撞。因此,空中交通管制中心使用了一种称为管制空域侵犯工具(CAIT)的地面安全网,如果有任何飞机在管制空域(UCAS)内侵入(CAS),就会发出警告。在我们之前的论文中,我们开发了一个概率CAS侵权工具(PCAIT),该工具使用卡尔曼滤波器预测未来飞机的位置并计算它们的侵权概率。在本文中,我们回顾了CAS侵权背后的因素,并基于这些因素构建了一个分类器,以增强我们对未来侵权行为的决策能力。这种模式的“预警系统”可以为空中交通管制中心提供更多的时间来解决未来可能发生的冲突。
{"title":"Controlled Airspace infringements and warning system","authors":"Yousra Almathami, R. Ammar","doi":"10.1109/ISSPIT.2016.7886007","DOIUrl":"https://doi.org/10.1109/ISSPIT.2016.7886007","url":null,"abstract":"A major concern for Air traffic controllers (ATC) are facing on a daily basis are controlled Airspace (CAS) infringements. An infringement is when aircraft penetrates CASs without an advanced clearance from the ATC. These infringement may cause a conflict or a midair collision with a commercial aircraft flying within CAS. As a result, a ground based safety net called Controlled Airspace infringement Tool (CAIT) is used by ATCs which warns them if any aircraft within uncontrolled airspace (UCAS) has penetrated (CAS). In our previous paper, we developed a probabilistic CAS infringement tool (PCAIT) that predicts future aircraft locations using the Kalman filter and calculate their probability of infringement. In this paper, we review the factors behind CAS infringements and build a classifier based on them to enhance our decision about future infringements. This model “warning system” could provide ATCs with more time to resolve any possible future conflicts.","PeriodicalId":371691,"journal":{"name":"2016 IEEE International Symposium on Signal Processing and Information Technology (ISSPIT)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133600498","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
MobiX: A software proposal based authentication service for mobile devices MobiX:基于软件提案的移动设备认证服务
Ali Alsaadi, Anup Kumar, Bin Xie, Adel Said Elmaghraby
In this paper, MobiX technology provides security for online services using mobile devices with a wide range of customers including governments, military, business enterprises, and scientific organization, and individuals have been proposed. MobiX is a software security solution technology to enhance the networked mobile device trustworthiness, application integrity, preventing users from malware attacks. MobiX provides two authentication layers and two additional security layers in addition to the conventional username-password for mobile devices in a unique system design. MobiX is fully implemented by software; therefore, it can be quickly deployed into different legacy mobile devices. More importantly, the novel device authenticity is based on the one-way a keyless cryptographic hash function and on the Generalized Concatenated Code Physically Unclonable Function (GCCPUF) to effectively protect the users from different attack vectors such as insiders, spoofing attack, or identity theft attacks. On the other hand, the app authenticity prevents malware and app-tempering cybersecurity attacks via an efficient and secure remote attestation protocol. The comprehensive protection architecture of MobiX would enable M-commerce with superior security capabilities compared with the existing solutions.
本文提出了MobiX技术为使用移动设备的在线服务提供安全保障,客户范围广泛,包括政府、军队、商业企业、科学组织和个人。MobiX是一种软件安全解决方案技术,旨在增强网络移动设备的可信度、应用程序的完整性,防止用户受到恶意软件的攻击。在独特的系统设计中,MobiX除了为移动设备提供传统的用户名-密码之外,还提供了两个身份验证层和两个额外的安全层。MobiX完全由软件实现;因此,它可以快速部署到不同的传统移动设备中。更重要的是,新型设备真实性基于单向无密钥加密哈希函数和广义连接码物理不可克隆函数(GCCPUF),有效保护用户免受不同攻击向量的攻击,如内部人员攻击、欺骗攻击或身份盗窃攻击。另一方面,通过高效安全的远程认证协议,app真实性可以防止恶意软件和app调剂网络安全攻击。与现有的解决方案相比,MobiX全面的保护架构将使移动商务具有更高的安全能力。
{"title":"MobiX: A software proposal based authentication service for mobile devices","authors":"Ali Alsaadi, Anup Kumar, Bin Xie, Adel Said Elmaghraby","doi":"10.1109/ISSPIT.2016.7886041","DOIUrl":"https://doi.org/10.1109/ISSPIT.2016.7886041","url":null,"abstract":"In this paper, MobiX technology provides security for online services using mobile devices with a wide range of customers including governments, military, business enterprises, and scientific organization, and individuals have been proposed. MobiX is a software security solution technology to enhance the networked mobile device trustworthiness, application integrity, preventing users from malware attacks. MobiX provides two authentication layers and two additional security layers in addition to the conventional username-password for mobile devices in a unique system design. MobiX is fully implemented by software; therefore, it can be quickly deployed into different legacy mobile devices. More importantly, the novel device authenticity is based on the one-way a keyless cryptographic hash function and on the Generalized Concatenated Code Physically Unclonable Function (GCCPUF) to effectively protect the users from different attack vectors such as insiders, spoofing attack, or identity theft attacks. On the other hand, the app authenticity prevents malware and app-tempering cybersecurity attacks via an efficient and secure remote attestation protocol. The comprehensive protection architecture of MobiX would enable M-commerce with superior security capabilities compared with the existing solutions.","PeriodicalId":371691,"journal":{"name":"2016 IEEE International Symposium on Signal Processing and Information Technology (ISSPIT)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115876742","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
JADED-RIP: Joint Angle and Delay Estimator and Detector via Rotational Invariance Properties jared - rip:基于旋转不变性的联合角度和延迟估计器和检测器
Ahmad Bazzi, D. Slock, Lisa Meilhac
A novel approach entitled “Joint Angle and Delay Estimator and Detector”, or simply JADED, is presented. This approach allows simultaneous estimation of number of coherent/non-coherent sources and joint estimation of the angles and times of arrival of each source. The system is composed of a Uniform Linear Array (ULA) receiving known OFDM symbols from a user in an indoor environment, which is rich in multipath. Therefore, the objective is to apply the JADED approach to this scenario, which allows extraction of the Line-of-Sight component based on the first arriving path. The first method, called JADED-RIP, makes use of the Rotational Invariance Properties (RIP) of ULAs and OFDM symbols, detects the number of multipath components, and estimates the angles and times of arrival of each path by performing a 2D search. The second method is a Computationally Efficient Single Snapshot (CESS) version of the JADED-RIP, i.e. it requires a 1D search followed by a least squares fit, and can only be used when a single OFDM symbol is available. Future insights are given in the Conclusions section.
提出了一种新的方法,称为“联合角度和延迟估计器和检测器”,或简称JADED。这种方法可以同时估计相干/非相干源的数量,并联合估计每个源的到达角度和时间。该系统采用均匀线性阵列(ULA),在室内环境下接收用户发送的已知OFDM符号,具有丰富的多径特性。因此,目标是将JADED方法应用于此场景,它允许基于第一个到达路径提取视线组件。第一种方法称为jded -RIP,它利用ULAs和OFDM符号的旋转不变性属性(RIP),检测多路径组件的数量,并通过执行2D搜索来估计每个路径到达的角度和时间。第二种方法是jded - rip的计算效率单快照(CESS)版本,即它需要一维搜索,然后进行最小二乘拟合,并且只能在单个OFDM符号可用时使用。结论部分给出了未来的见解。
{"title":"JADED-RIP: Joint Angle and Delay Estimator and Detector via Rotational Invariance Properties","authors":"Ahmad Bazzi, D. Slock, Lisa Meilhac","doi":"10.1109/ISSPIT.2016.7886027","DOIUrl":"https://doi.org/10.1109/ISSPIT.2016.7886027","url":null,"abstract":"A novel approach entitled “Joint Angle and Delay Estimator and Detector”, or simply JADED, is presented. This approach allows simultaneous estimation of number of coherent/non-coherent sources and joint estimation of the angles and times of arrival of each source. The system is composed of a Uniform Linear Array (ULA) receiving known OFDM symbols from a user in an indoor environment, which is rich in multipath. Therefore, the objective is to apply the JADED approach to this scenario, which allows extraction of the Line-of-Sight component based on the first arriving path. The first method, called JADED-RIP, makes use of the Rotational Invariance Properties (RIP) of ULAs and OFDM symbols, detects the number of multipath components, and estimates the angles and times of arrival of each path by performing a 2D search. The second method is a Computationally Efficient Single Snapshot (CESS) version of the JADED-RIP, i.e. it requires a 1D search followed by a least squares fit, and can only be used when a single OFDM symbol is available. Future insights are given in the Conclusions section.","PeriodicalId":371691,"journal":{"name":"2016 IEEE International Symposium on Signal Processing and Information Technology (ISSPIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116970463","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2016 IEEE International Symposium on Signal Processing and Information Technology (ISSPIT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1