首页 > 最新文献

2017 Fourth International Conference on Signal Processing, Communication and Networking (ICSCN)最新文献

英文 中文
Satellite image processing 卫星图像处理
K. Vani
Satellite image processing plays a vital role for research and developments in Astronomy, Remote Sensing, GIS, Agriculture Monitoring, Disaster Management and many other fields of study. Satellite images are recorded in digital forms and then processed by the computers to extract information. Variations in the scene characteristics are represented as variations in brightness on images. A particular part of scene reflecting more energy will appear bright while a different part of the same scene that reflecting less energy will appear black. Digital image consists of discrete picture elements called pixels. Each pixel is a number represented as DN (Digital Number), that depicts the average radiance of relatively small area within a scene.
卫星图像处理在天文学、遥感、地理信息系统、农业监测、灾害管理和许多其他研究领域的研究和发展中起着至关重要的作用。卫星图像以数字形式记录下来,然后由计算机处理以提取信息。场景特征的变化表示为图像上亮度的变化。场景中反射更多能量的特定部分将呈现明亮,而同一场景中反射较少能量的不同部分将呈现黑色。数字图像由称为像素的离散图像元素组成。每个像素是一个数字,表示为DN (Digital number),它描述了一个场景中相对小区域的平均亮度。
{"title":"Satellite image processing","authors":"K. Vani","doi":"10.1109/ICSCN.2017.8085410","DOIUrl":"https://doi.org/10.1109/ICSCN.2017.8085410","url":null,"abstract":"Satellite image processing plays a vital role for research and developments in Astronomy, Remote Sensing, GIS, Agriculture Monitoring, Disaster Management and many other fields of study. Satellite images are recorded in digital forms and then processed by the computers to extract information. Variations in the scene characteristics are represented as variations in brightness on images. A particular part of scene reflecting more energy will appear bright while a different part of the same scene that reflecting less energy will appear black. Digital image consists of discrete picture elements called pixels. Each pixel is a number represented as DN (Digital Number), that depicts the average radiance of relatively small area within a scene.","PeriodicalId":383458,"journal":{"name":"2017 Fourth International Conference on Signal Processing, Communication and Networking (ICSCN)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131701742","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Robust audio watermarking for monitoring and information embedding 鲁棒音频水印的监测和信息嵌入
R. Subhashini, K. B. Bagan
The audio watermarking systems are more challenge due to the lack of publicly available reference algorithms. It includes the robustness against acoustic path transmission is only evaluated. So this systems will gives the chance of digital watermarking to be used in many applications where such as e.g., second screen applications, audience measurement, and so on. In this paper introducing a simple audio watermarking algorithm. And then the watermark embedding and detection process will be takesplace. Then the results will gives the high fidelity robust audio watermarking algorithms. Then these algorithms will gives the high robustness and also achieves high capacity against the common signal manipulation. It also gives the flexibility of utilizing the watermarking techniques with different watermarking audio.
由于缺乏公开可用的参考算法,音频水印系统面临更大的挑战。它包括对声路径传输的鲁棒性仅进行了评估。因此,该系统将为数字水印在许多应用中使用提供机会,例如,第二屏幕应用,观众测量等。本文介绍了一种简单的音频水印算法。然后进行水印的嵌入和检测。然后给出高保真鲁棒音频水印算法。这些算法不仅具有较高的鲁棒性,而且对常见的信号处理也具有较高的处理能力。它还提供了利用不同的水印音频水印技术的灵活性。
{"title":"Robust audio watermarking for monitoring and information embedding","authors":"R. Subhashini, K. B. Bagan","doi":"10.1109/ICSCN.2017.8085650","DOIUrl":"https://doi.org/10.1109/ICSCN.2017.8085650","url":null,"abstract":"The audio watermarking systems are more challenge due to the lack of publicly available reference algorithms. It includes the robustness against acoustic path transmission is only evaluated. So this systems will gives the chance of digital watermarking to be used in many applications where such as e.g., second screen applications, audience measurement, and so on. In this paper introducing a simple audio watermarking algorithm. And then the watermark embedding and detection process will be takesplace. Then the results will gives the high fidelity robust audio watermarking algorithms. Then these algorithms will gives the high robustness and also achieves high capacity against the common signal manipulation. It also gives the flexibility of utilizing the watermarking techniques with different watermarking audio.","PeriodicalId":383458,"journal":{"name":"2017 Fourth International Conference on Signal Processing, Communication and Networking (ICSCN)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123346195","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Automatic segmentation and recognition of iris images: With special reference to twins 虹膜图像的自动分割与识别:以双胞胎为例
C. N. Devi
This paper describes an automatic approach for iris segmentation and recognition with focus on twins. The technique entails localizing and segmenting the iris, followed by iris normalization and obtaining distinctive features. Lastly, iris templates are matched to realize one to one and one to many recognition in twins. Further, effect of various template sizes on the accuracy and memory requirement are studied. To our knowledge, this is the first iris based authentication with special emphasis on twins.
本文介绍了一种针对双胞胎的虹膜自动分割与识别方法。该技术需要对虹膜进行定位和分割,然后对虹膜进行归一化并获得显著特征。最后,对虹膜模板进行匹配,实现对双胞胎的一对一和一对多识别。此外,还研究了不同模板尺寸对模板精度和内存要求的影响。据我们所知,这是第一个特别强调双胞胎的基于虹膜的身份验证。
{"title":"Automatic segmentation and recognition of iris images: With special reference to twins","authors":"C. N. Devi","doi":"10.1109/ICSCN.2017.8085415","DOIUrl":"https://doi.org/10.1109/ICSCN.2017.8085415","url":null,"abstract":"This paper describes an automatic approach for iris segmentation and recognition with focus on twins. The technique entails localizing and segmenting the iris, followed by iris normalization and obtaining distinctive features. Lastly, iris templates are matched to realize one to one and one to many recognition in twins. Further, effect of various template sizes on the accuracy and memory requirement are studied. To our knowledge, this is the first iris based authentication with special emphasis on twins.","PeriodicalId":383458,"journal":{"name":"2017 Fourth International Conference on Signal Processing, Communication and Networking (ICSCN)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127100684","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Literature survey on traffic-based server load balancing using SDN and open flow 基于SDN和开放流的基于流量的服务器负载均衡研究综述
S. Raghul, T. Subashri, K. Vimal
At large data centers, server load balancing is used to balance the incoming requests among the servers to avoid excessive overloading of any individual server. However the present methods are static and suffer from many drawbacks. Static methods do not offer an even balance of data among servers and require dedicated hardware for load balancing. Hence, dynamic methods are required to enhance the load balance of server. Dynamic method provides load balancing of server inclusion of the dynamic state of traffic on the network. In this paper, the need for dynamic load balancing methods of SDN is discussed and provided with the literature survey of the existing static load balancing schemes.
在大型数据中心,服务器负载平衡用于平衡服务器之间的传入请求,以避免任何单个服务器的过度过载。然而,目前的方法是静态的,并且存在许多缺陷。静态方法不能在服务器之间提供均匀的数据平衡,并且需要专用硬件来实现负载平衡。因此,需要使用动态方法来增强服务器的负载平衡。动态方法提供服务器负载均衡,包含网络上流量的动态状态。本文讨论了SDN动态负载均衡方法的必要性,并对现有静态负载均衡方案进行了文献综述。
{"title":"Literature survey on traffic-based server load balancing using SDN and open flow","authors":"S. Raghul, T. Subashri, K. Vimal","doi":"10.1109/ICSCN.2017.8085416","DOIUrl":"https://doi.org/10.1109/ICSCN.2017.8085416","url":null,"abstract":"At large data centers, server load balancing is used to balance the incoming requests among the servers to avoid excessive overloading of any individual server. However the present methods are static and suffer from many drawbacks. Static methods do not offer an even balance of data among servers and require dedicated hardware for load balancing. Hence, dynamic methods are required to enhance the load balance of server. Dynamic method provides load balancing of server inclusion of the dynamic state of traffic on the network. In this paper, the need for dynamic load balancing methods of SDN is discussed and provided with the literature survey of the existing static load balancing schemes.","PeriodicalId":383458,"journal":{"name":"2017 Fourth International Conference on Signal Processing, Communication and Networking (ICSCN)","volume":"103 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122418784","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Flower species recognition system using convolution neural networks and transfer learning 花卉种类识别系统采用卷积神经网络和迁移学习
I. Gogul, V. S. Kumar
Automatic identification and recognition of medicinal plant species in environments such as forests, mountains and dense regions is necessary to know about their existence. In recent years, plant species recognition is carried out based on the shape, geometry and texture of various plant parts such as leaves, stem, flowers etc. Flower based plant species identification systems are widely used. While modern search engines provide methods to visually search for a query image that contains a flower, it lacks in robustness because of the intra-class variation among millions of flower species around the world. Hence in this proposed research work, a Deep learning approach using Convolutional Neural Networks (CNN) is used to recognize flower species with high accuracy. Images of the plant species are acquired using the built-in camera module of a mobile phone. Feature extraction of flower images is performed using a Transfer Learning approach (i.e. extraction of complex features from a pre-trained network). A machine learning classifier such as Logistic Regression or Random Forest is used on top of it to yield a higher accuracy rate. This approach helps in minimizing the hardware requirement needed to perform the computationally intensive task of training a CNN. It is observed that, CNN combined with Transfer Learning approach as feature extractor outperforms all the handcrafted feature extraction methods such as Local Binary Pattern (LBP), Color Channel Statistics, Color Histograms, Haralick Texture, Hu Moments and Zernike Moments. CNN combined with Transfer Learning approach yields impressive Rank-1 accuracies of 73.05%, 93.41% and 90.60% using OverFeat, Inception-v3 and Xception architectures, respectively as Feature Extractors on FLOWERS102 dataset.
对森林、山地、稠密地区等环境中的药用植物物种进行自动识别和识别,是了解其存在的必要条件。近年来,植物物种识别主要是根据植物的叶、茎、花等各个部位的形状、几何形状和纹理进行的。基于花的植物物种识别系统应用广泛。虽然现代搜索引擎提供了对包含花的查询图像进行视觉搜索的方法,但由于世界上数百万种花卉的类内差异,它缺乏鲁棒性。因此,在本研究中,采用卷积神经网络(CNN)的深度学习方法对花卉进行了高精度的识别。利用手机内置的摄像模块获取植物物种的图像。花朵图像的特征提取使用迁移学习方法(即从预训练的网络中提取复杂特征)进行。在其上使用逻辑回归或随机森林等机器学习分类器来产生更高的准确率。这种方法有助于最小化执行训练CNN的计算密集型任务所需的硬件需求。我们观察到,CNN结合迁移学习方法作为特征提取器,其性能优于所有手工特征提取方法,如Local Binary Pattern (LBP)、colour Channel Statistics、Color Histograms、Haralick Texture、Hu Moments和Zernike Moments。CNN结合迁移学习方法在FLOWERS102数据集上使用OverFeat、Inception-v3和Xception架构分别获得了令人印象深刻的73.05%、93.41%和90.60%的Rank-1准确率。
{"title":"Flower species recognition system using convolution neural networks and transfer learning","authors":"I. Gogul, V. S. Kumar","doi":"10.1109/ICSCN.2017.8085675","DOIUrl":"https://doi.org/10.1109/ICSCN.2017.8085675","url":null,"abstract":"Automatic identification and recognition of medicinal plant species in environments such as forests, mountains and dense regions is necessary to know about their existence. In recent years, plant species recognition is carried out based on the shape, geometry and texture of various plant parts such as leaves, stem, flowers etc. Flower based plant species identification systems are widely used. While modern search engines provide methods to visually search for a query image that contains a flower, it lacks in robustness because of the intra-class variation among millions of flower species around the world. Hence in this proposed research work, a Deep learning approach using Convolutional Neural Networks (CNN) is used to recognize flower species with high accuracy. Images of the plant species are acquired using the built-in camera module of a mobile phone. Feature extraction of flower images is performed using a Transfer Learning approach (i.e. extraction of complex features from a pre-trained network). A machine learning classifier such as Logistic Regression or Random Forest is used on top of it to yield a higher accuracy rate. This approach helps in minimizing the hardware requirement needed to perform the computationally intensive task of training a CNN. It is observed that, CNN combined with Transfer Learning approach as feature extractor outperforms all the handcrafted feature extraction methods such as Local Binary Pattern (LBP), Color Channel Statistics, Color Histograms, Haralick Texture, Hu Moments and Zernike Moments. CNN combined with Transfer Learning approach yields impressive Rank-1 accuracies of 73.05%, 93.41% and 90.60% using OverFeat, Inception-v3 and Xception architectures, respectively as Feature Extractors on FLOWERS102 dataset.","PeriodicalId":383458,"journal":{"name":"2017 Fourth International Conference on Signal Processing, Communication and Networking (ICSCN)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124595520","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 104
An integrator circuit using differential difference current conveyor transconductance amplifier 一种采用差动差电流输送跨导放大器的积分器电路
Ravipati Linita, V. V. Reddy, Avireni Srinivasulu
An integrator circuit is presented in this paper that has used Differntial Difference Current Conveyor Transconductance Amplifier (DDCCTA). It has one DDCCTA and one passive component. It has been realized only with first order low pass response. The operation of the circuit has been observed and enforced at a supply voltage of ± 1.8V (bias current 50pA) using cadence and the model parameters of gpdk 180nm CMOS technology. The worthy of the proposed circuit has been test checked using DDCCTA and further tested for its efficiency on a laboratory breadboard. In this commercially available AD844AN and LM13600 ICs are used. Further, the circuit presented in this paper is impermeable to noise, possessing low voltage and insensitive to temperature.
本文提出了一种采用差分差分电流传输跨导放大器(DDCCTA)的积分器电路。它有一个DDCCTA和一个无源元件。它只在一阶低通响应下实现。利用gpdk 180nm CMOS技术的模型参数,在±1.8V(偏置电流50pA)电压下观察并执行了电路的工作。所提出的电路的价值已经用DDCCTA进行了测试,并进一步测试了其在实验室面包板上的效率。在这种情况下,使用市售的AD844AN和LM13600集成电路。此外,本文所提出的电路具有抗噪声、低电压和对温度不敏感的特点。
{"title":"An integrator circuit using differential difference current conveyor transconductance amplifier","authors":"Ravipati Linita, V. V. Reddy, Avireni Srinivasulu","doi":"10.1109/ICSCN.2017.8085420","DOIUrl":"https://doi.org/10.1109/ICSCN.2017.8085420","url":null,"abstract":"An integrator circuit is presented in this paper that has used Differntial Difference Current Conveyor Transconductance Amplifier (DDCCTA). It has one DDCCTA and one passive component. It has been realized only with first order low pass response. The operation of the circuit has been observed and enforced at a supply voltage of ± 1.8V (bias current 50pA) using cadence and the model parameters of gpdk 180nm CMOS technology. The worthy of the proposed circuit has been test checked using DDCCTA and further tested for its efficiency on a laboratory breadboard. In this commercially available AD844AN and LM13600 ICs are used. Further, the circuit presented in this paper is impermeable to noise, possessing low voltage and insensitive to temperature.","PeriodicalId":383458,"journal":{"name":"2017 Fourth International Conference on Signal Processing, Communication and Networking (ICSCN)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134071992","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Machine condition monitoring using audio signature analysis 利用音频特征分析进行机器状态监测
B. Rubhini, P. Ranjan
Continuous Condition Monitoring of the machine is importan to improve efficiency of the machine, to avoid unexpected accidents and financial losses. Condition monitoring using audio signal processing is focused in this paper. The sound of the machine carries information about the machine condition. The change in features of audio signal are observed using the Peak Variation Response (PVR) of the Fast Fourier Transform (FFT) of signal. In this paper, the conventional FFT method has been used to prove that, it is sufficient for the detection of abnormalities due to different loading condition of the machine using audio signature. And a study on PVR of Intrinsic Mode Function (IMF) has been carried out to present the cause of variation in the energy and frequency of the oscillations of audio frequency (AF) modulated signals.
对机器进行连续的状态监测对于提高机器的工作效率,避免意外事故和经济损失是非常重要的。本文主要研究了利用音频信号处理技术进行状态监测。机器的声音携带有关机器状况的信息。利用快速傅里叶变换(FFT)的峰值变化响应(PVR)来观察音频信号特征的变化。本文利用传统的FFT方法证明,利用音频签名足以检测出机器不同加载条件下的异常情况。并对内禀模态函数(IMF)的PVR进行了研究,给出了音频(AF)调制信号振荡能量和频率变化的原因。
{"title":"Machine condition monitoring using audio signature analysis","authors":"B. Rubhini, P. Ranjan","doi":"10.1109/ICSCN.2017.8085717","DOIUrl":"https://doi.org/10.1109/ICSCN.2017.8085717","url":null,"abstract":"Continuous Condition Monitoring of the machine is importan to improve efficiency of the machine, to avoid unexpected accidents and financial losses. Condition monitoring using audio signal processing is focused in this paper. The sound of the machine carries information about the machine condition. The change in features of audio signal are observed using the Peak Variation Response (PVR) of the Fast Fourier Transform (FFT) of signal. In this paper, the conventional FFT method has been used to prove that, it is sufficient for the detection of abnormalities due to different loading condition of the machine using audio signature. And a study on PVR of Intrinsic Mode Function (IMF) has been carried out to present the cause of variation in the energy and frequency of the oscillations of audio frequency (AF) modulated signals.","PeriodicalId":383458,"journal":{"name":"2017 Fourth International Conference on Signal Processing, Communication and Networking (ICSCN)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122631757","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Design and implementation of programmable read only memory using reversible decoder on FPGA 基于FPGA可逆解码器的可编程只读存储器的设计与实现
Gopi Chand Naguboina, K. Anusudha
Reversible logic is the emerging field for research in present era. The aim of this paper is to design and synthesize a Programmable Read Only Memory (PROM) using a reversible decoder which is designed using reversible logic with minimum quantum cost. The PROM is a Programmable Logic device which consists of fixed AND Gates and programmable OR gates array. Fixed AND gates can be termed as a decoder. PROM finds its applications in cell phones, RFID tags, video game consoles, medical devices, computers and other electronic devices. An n input and k output Boolean function f (a1, a2, a3, ….an) (referred as (n, k)) is said to be logically reversible if and only if, the number of inputs are equal to the number of outputs i.e., ‘n’ equals ‘k’ and the input pattern uniquely maps the output pattern. The reversible logic must run both forward and backward as well such that the inputs can also be retrieved from outputs. There are many reversible logic gates in literature like NOT gate, Feynman Gate (CNOT gate), Double Feynman Gate, Peres Gate, TR gate, Seynman Gate and many more. Fan-out and Feed-back are not allowed in Logical Reversibility. To overcome the Fan out limitation, the signals from required output lines are duplicated to desired lines using additional reversible combinational circuits. Reversible Logic owns its applications in various fields which include Quantum Computing, Optical Computing, Nano-technology, Computer Graphics, low power VLSI etc., Reversible logic is gaining its own importance in recent years largely due to its property of low power consumption and low heat dissipation. In this paper, the Programmable Read Only Memory (PROM) using reversible decoder which has less heat dissipation and low power consumption is proposed. The designed circuit is analyzed in terms of quantum cost, garbage outputs and number of gates. The Circuit has been designed and simulated using Xilinx software and implemented on FPGA SPARTAN — 3E.
可逆逻辑是当前新兴的研究领域。本文的目的是设计和合成一种可编程只读存储器(PROM),该可编程只读存储器采用可逆逻辑设计,具有最小的量子成本。PROM是一种可编程逻辑器件,由固定与门和可编程或门阵列组成。固定与门可以称为解码器。PROM在手机、RFID标签、视频游戏机、医疗设备、计算机和其他电子设备中都有应用。一个n个输入和k个输出的布尔函数f (a1, a2, a3, .... An)(称为(n, k))被认为是逻辑可逆的,当且仅当,输入的数量等于输出的数量,即' n '等于' k ',并且输入模式唯一地映射到输出模式。可逆逻辑必须同时向前和向后运行,以便也可以从输出中检索输入。文献中有许多可逆逻辑门,如非门,费曼门(CNOT门),双费曼门,佩雷斯门,TR门,塞恩曼门等等。在逻辑可逆性中不允许扇出和反馈。为了克服扇出限制,使用额外的可逆组合电路将来自所需输出线的信号复制到所需线路。可逆逻辑在量子计算、光学计算、纳米技术、计算机图形学、低功耗VLSI等各个领域都有广泛的应用,近年来,由于其低功耗、低散热的特性,可逆逻辑得到了越来越多的重视。本文提出了一种采用可逆解码器的可编程只读存储器(Programmable Read Only Memory, PROM),具有散热小、功耗低的特点。从量子成本、垃圾输出和门数三个方面对所设计的电路进行了分析。利用Xilinx软件对该电路进行了设计和仿真,并在FPGA SPARTAN - 3E上实现。
{"title":"Design and implementation of programmable read only memory using reversible decoder on FPGA","authors":"Gopi Chand Naguboina, K. Anusudha","doi":"10.1109/ICSCN.2017.8085645","DOIUrl":"https://doi.org/10.1109/ICSCN.2017.8085645","url":null,"abstract":"Reversible logic is the emerging field for research in present era. The aim of this paper is to design and synthesize a Programmable Read Only Memory (PROM) using a reversible decoder which is designed using reversible logic with minimum quantum cost. The PROM is a Programmable Logic device which consists of fixed AND Gates and programmable OR gates array. Fixed AND gates can be termed as a decoder. PROM finds its applications in cell phones, RFID tags, video game consoles, medical devices, computers and other electronic devices. An n input and k output Boolean function f (a1, a2, a3, ….an) (referred as (n, k)) is said to be logically reversible if and only if, the number of inputs are equal to the number of outputs i.e., ‘n’ equals ‘k’ and the input pattern uniquely maps the output pattern. The reversible logic must run both forward and backward as well such that the inputs can also be retrieved from outputs. There are many reversible logic gates in literature like NOT gate, Feynman Gate (CNOT gate), Double Feynman Gate, Peres Gate, TR gate, Seynman Gate and many more. Fan-out and Feed-back are not allowed in Logical Reversibility. To overcome the Fan out limitation, the signals from required output lines are duplicated to desired lines using additional reversible combinational circuits. Reversible Logic owns its applications in various fields which include Quantum Computing, Optical Computing, Nano-technology, Computer Graphics, low power VLSI etc., Reversible logic is gaining its own importance in recent years largely due to its property of low power consumption and low heat dissipation. In this paper, the Programmable Read Only Memory (PROM) using reversible decoder which has less heat dissipation and low power consumption is proposed. The designed circuit is analyzed in terms of quantum cost, garbage outputs and number of gates. The Circuit has been designed and simulated using Xilinx software and implemented on FPGA SPARTAN — 3E.","PeriodicalId":383458,"journal":{"name":"2017 Fourth International Conference on Signal Processing, Communication and Networking (ICSCN)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115406454","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A survey on ARP cache poisoning and techniques for detection and mitigation ARP缓存中毒及其检测和缓解技术综述
Jitta Sai Meghana, T. Subashri, K. Vimal
Network security has become a major concern in any industry. Address resolution protocol (ARP) is a basic protocol used by all hosts in a network. When ARP is compromised, it leads to several security attacks. In this survey, we present a deep investigation of existing ARP cache poisoning or ARP spoofing solutions. We first introduce Address resolution protocol and its operation. We then dwell on ARP spoofing, with an emphasis on its impact on network security. Then we provide an overview on existing solutions to detect and mitigate ARP spoofing in both traditional networking and software-defined networking (SDN) platforms. Finally, we compare the techniques discussed and conclude that SDN based solutions are more effective in detecting and eliminating any kind of ARP spoofing attack.
网络安全已成为任何行业关注的主要问题。ARP (Address resolution protocol)是网络中所有主机共同使用的基本协议。ARP被攻破后,会引发多种安全攻击。在这项调查中,我们提出了一个深入调查现有的ARP缓存中毒或ARP欺骗解决方案。首先介绍了地址解析协议及其操作。然后我们详细讨论ARP欺骗,重点讨论其对网络安全的影响。然后,我们概述了在传统网络和软件定义网络(SDN)平台中检测和减轻ARP欺骗的现有解决方案。最后,我们比较了所讨论的技术并得出结论,基于SDN的解决方案在检测和消除任何类型的ARP欺骗攻击方面更有效。
{"title":"A survey on ARP cache poisoning and techniques for detection and mitigation","authors":"Jitta Sai Meghana, T. Subashri, K. Vimal","doi":"10.1109/ICSCN.2017.8085417","DOIUrl":"https://doi.org/10.1109/ICSCN.2017.8085417","url":null,"abstract":"Network security has become a major concern in any industry. Address resolution protocol (ARP) is a basic protocol used by all hosts in a network. When ARP is compromised, it leads to several security attacks. In this survey, we present a deep investigation of existing ARP cache poisoning or ARP spoofing solutions. We first introduce Address resolution protocol and its operation. We then dwell on ARP spoofing, with an emphasis on its impact on network security. Then we provide an overview on existing solutions to detect and mitigate ARP spoofing in both traditional networking and software-defined networking (SDN) platforms. Finally, we compare the techniques discussed and conclude that SDN based solutions are more effective in detecting and eliminating any kind of ARP spoofing attack.","PeriodicalId":383458,"journal":{"name":"2017 Fourth International Conference on Signal Processing, Communication and Networking (ICSCN)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122478200","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Perceptual video hashing using 3D-radial projection technique 基于三维径向投影技术的感知视频散列
R. Sandeep, Saksham Sharma, P. Bora
A function that outputs a feature vector from the perceptual contents of the input video is called a perceptual video hashing function and the output feature vector that characterizes the perceptual contents of the input video is called the perceptual video hash. This hash must be robust to the manipulations that preserves the perceptual contents of the video and fragile to the modifications that vary the perceptual contents of the video. The wide scale applications of perceptual hash in the world of multimedia, such as video authentication, video copyright protection, and video retrieval, emphasize the importance of this area of research. This work generates a perceptual hash from the video using the 3D-radial projection of the pixels and assesses the differentiating capabilities and the perceptual robustness of the hash generated. This method is the 3D extension of the 2D radial projection based image hashing. In this work, the variance of the luminance values of the projected pixels is calculated for each randomly generated sub-tensor. The variance of all the sub-tensors are averaged along the second dimension and projected onto the discrete cosine transform (DCT) basis. The performance measure of the proposed work is assessed using the receiver operating characteristic (ROC) curves. Simulation results indicate that the performance of the proposed method is satisfactory for both the content-preserving and the content changing attacks.
从输入视频的感知内容输出特征向量的函数称为感知视频哈希函数,表征输入视频的感知内容的输出特征向量称为感知视频哈希。该哈希必须对保留视频感知内容的操作具有鲁棒性,并且对改变视频感知内容的修改具有脆弱性。感知哈希在多媒体领域的广泛应用,如视频认证、视频版权保护和视频检索,强调了这一研究领域的重要性。这项工作使用像素的3d径向投影从视频中生成感知哈希,并评估所生成哈希的区分能力和感知鲁棒性。该方法是基于二维径向投影的图像哈希的三维扩展。在这项工作中,计算每个随机生成的子张量的投影像素的亮度值的方差。所有子张量的方差沿第二维平均,并投影到离散余弦变换(DCT)基上。使用受试者工作特征(ROC)曲线评估拟议工作的绩效指标。仿真结果表明,该方法对内容保留攻击和内容更改攻击都具有良好的性能。
{"title":"Perceptual video hashing using 3D-radial projection technique","authors":"R. Sandeep, Saksham Sharma, P. Bora","doi":"10.1109/ICSCN.2017.8085727","DOIUrl":"https://doi.org/10.1109/ICSCN.2017.8085727","url":null,"abstract":"A function that outputs a feature vector from the perceptual contents of the input video is called a perceptual video hashing function and the output feature vector that characterizes the perceptual contents of the input video is called the perceptual video hash. This hash must be robust to the manipulations that preserves the perceptual contents of the video and fragile to the modifications that vary the perceptual contents of the video. The wide scale applications of perceptual hash in the world of multimedia, such as video authentication, video copyright protection, and video retrieval, emphasize the importance of this area of research. This work generates a perceptual hash from the video using the 3D-radial projection of the pixels and assesses the differentiating capabilities and the perceptual robustness of the hash generated. This method is the 3D extension of the 2D radial projection based image hashing. In this work, the variance of the luminance values of the projected pixels is calculated for each randomly generated sub-tensor. The variance of all the sub-tensors are averaged along the second dimension and projected onto the discrete cosine transform (DCT) basis. The performance measure of the proposed work is assessed using the receiver operating characteristic (ROC) curves. Simulation results indicate that the performance of the proposed method is satisfactory for both the content-preserving and the content changing attacks.","PeriodicalId":383458,"journal":{"name":"2017 Fourth International Conference on Signal Processing, Communication and Networking (ICSCN)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125855680","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
期刊
2017 Fourth International Conference on Signal Processing, Communication and Networking (ICSCN)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1