首页 > 最新文献

2017 Fourth International Conference on Signal Processing, Communication and Networking (ICSCN)最新文献

英文 中文
Advanced high speed optical pattern recognition for sur-veillance systems 用于监视系统的先进高速光学模式识别
E. Priya, N. N. Pragash
Today security is the prime factor needed in all civic places such as Airport, Railway station and Bus stations. Due to absence of extremely fast security systems, lots of damage to human life and public properties were seen in last decade. The proposed design able to capture, recognize and detect the unauthorized person at high speed. The aim of this research work is to design a system that recognizes the pattern at high speed. The 4f system is an image focusing system with intensification factor of unity which can be demonstrated using ray tracing. The 4f system is simulated in MATLAB. Further it can be extended to advanced extremely fast pattern recognition surveillance systems. The optical Fourier transform is performed between the cameras captured image and the conjugate of the database image which is multiplied and projected on the Fourier plane. This provides a pattern recognized image at the output plane at extremely fast rate.
今天,安全是机场、火车站、汽车站等所有公共场所需要的首要因素。在过去的十年里,由于缺乏极快的安全系统,对人类生命和公共财产造成了许多损害。该设计能够快速捕获、识别和检测未经授权的人员。本研究工作的目的是设计一个高速识别模式的系统。4f系统是一种具有统一增强因子的图像聚焦系统,可以用光线追踪来证明。在MATLAB中对4f系统进行了仿真。此外,它可以扩展到先进的极快模式识别监视系统。在相机捕获的图像和数据库图像的共轭之间进行光学傅里叶变换,该图像在傅里叶平面上相乘并投影。这提供了一个模式识别图像在输出平面上以极快的速度。
{"title":"Advanced high speed optical pattern recognition for sur-veillance systems","authors":"E. Priya, N. N. Pragash","doi":"10.1109/ICSCN.2017.8085723","DOIUrl":"https://doi.org/10.1109/ICSCN.2017.8085723","url":null,"abstract":"Today security is the prime factor needed in all civic places such as Airport, Railway station and Bus stations. Due to absence of extremely fast security systems, lots of damage to human life and public properties were seen in last decade. The proposed design able to capture, recognize and detect the unauthorized person at high speed. The aim of this research work is to design a system that recognizes the pattern at high speed. The 4f system is an image focusing system with intensification factor of unity which can be demonstrated using ray tracing. The 4f system is simulated in MATLAB. Further it can be extended to advanced extremely fast pattern recognition surveillance systems. The optical Fourier transform is performed between the cameras captured image and the conjugate of the database image which is multiplied and projected on the Fourier plane. This provides a pattern recognized image at the output plane at extremely fast rate.","PeriodicalId":383458,"journal":{"name":"2017 Fourth International Conference on Signal Processing, Communication and Networking (ICSCN)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123500990","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Design and analysis of 5.2 GHz rectangular microstrip patch array antenna using split ring resonator 基于分环谐振器的5.2 GHz矩形微带贴片阵列天线设计与分析
Swagata B. Sarkar
Now a days microstrip patch antennas are heavily used in the field of communication for their compact size, low cost, flexibility and efficiency. Different shapes and sizes of patch antennas are available in the market. In this paper effect of split ring resonator on rectangular patch array antenna of 5.2 GHz is discussed. It is seen that the multiple frequencies with different gain, return loss, VSWR are obtained after introducing array geometry with split ring resonator in the Rectangular Patch Antenna. The gain for rectangular patch antenna at 5.2 GHz is 4.39 dB. The gain is 5 DB for rectangular patch array. Gain improved to 8 dB for Rectangular patch array with Split Ring Resonator. Gain improves by 45.12% and bandwidth improves by 56.25%. The FR4 Epoxy substrate is used to design the antenna with HFSS software.
微带贴片天线以其体积小、成本低、灵活、高效等优点被广泛应用于通信领域。市场上有不同形状和尺寸的贴片天线。本文讨论了裂环谐振器对5.2 GHz矩形贴片阵列天线的影响。可以看出,在矩形贴片天线中引入分环谐振器阵列结构后,可以得到具有不同增益、回波损耗和驻波比的多个频率。矩形贴片天线在5.2 GHz时的增益为4.39 dB。矩形贴片阵列的增益为5 DB。带分裂环谐振器的矩形贴片阵列增益提高到8 dB。增益提高了45.12%,带宽提高了56.25%。采用FR4环氧基板,利用HFSS软件进行天线设计。
{"title":"Design and analysis of 5.2 GHz rectangular microstrip patch array antenna using split ring resonator","authors":"Swagata B. Sarkar","doi":"10.1109/ICSCN.2017.8085654","DOIUrl":"https://doi.org/10.1109/ICSCN.2017.8085654","url":null,"abstract":"Now a days microstrip patch antennas are heavily used in the field of communication for their compact size, low cost, flexibility and efficiency. Different shapes and sizes of patch antennas are available in the market. In this paper effect of split ring resonator on rectangular patch array antenna of 5.2 GHz is discussed. It is seen that the multiple frequencies with different gain, return loss, VSWR are obtained after introducing array geometry with split ring resonator in the Rectangular Patch Antenna. The gain for rectangular patch antenna at 5.2 GHz is 4.39 dB. The gain is 5 DB for rectangular patch array. Gain improved to 8 dB for Rectangular patch array with Split Ring Resonator. Gain improves by 45.12% and bandwidth improves by 56.25%. The FR4 Epoxy substrate is used to design the antenna with HFSS software.","PeriodicalId":383458,"journal":{"name":"2017 Fourth International Conference on Signal Processing, Communication and Networking (ICSCN)","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124841955","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Background subtraction algorithm and image skeletonization based anomaly event detection for low resolution video 基于背景减去算法和图像骨架化的低分辨率视频异常事件检测
V. Murugan, V. Vijaykumar, S. Selvan
Video surveillance system is a major research area of image processing applications. Generally, Low resolution Camera is used for surveillance and thus processing a digital image recorded by such low resolution camera is a challenging task in case of object recognition. A system for low cost, less computation automatic identifying and tracking of objects and events in the low resolution video is presented. The proposed video analyzing system provides best solution by using BGS algorithm, image skeletonization technique and SVM. Experimental results which illustrate this system is optimal for real time applications in video surveillance.
视频监控系统是图像处理应用的一个主要研究领域。低分辨率摄像机通常用于监控,因此在物体识别情况下,处理低分辨率摄像机记录的数字图像是一项具有挑战性的任务。提出了一种低成本、低计算量的低分辨率视频中目标和事件的自动识别与跟踪系统。本文提出的视频分析系统采用BGS算法、图像骨架化技术和支持向量机提供了最佳解决方案。实验结果表明,该系统非常适合视频监控的实时应用。
{"title":"Background subtraction algorithm and image skeletonization based anomaly event detection for low resolution video","authors":"V. Murugan, V. Vijaykumar, S. Selvan","doi":"10.1109/ICSCN.2017.8085708","DOIUrl":"https://doi.org/10.1109/ICSCN.2017.8085708","url":null,"abstract":"Video surveillance system is a major research area of image processing applications. Generally, Low resolution Camera is used for surveillance and thus processing a digital image recorded by such low resolution camera is a challenging task in case of object recognition. A system for low cost, less computation automatic identifying and tracking of objects and events in the low resolution video is presented. The proposed video analyzing system provides best solution by using BGS algorithm, image skeletonization technique and SVM. Experimental results which illustrate this system is optimal for real time applications in video surveillance.","PeriodicalId":383458,"journal":{"name":"2017 Fourth International Conference on Signal Processing, Communication and Networking (ICSCN)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115726630","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Mixed chaotic maps based encryption for high crypto secrecy 基于混合混沌映射的高保密性加密
S. Arivazhagan, W. Jebarani, S. Kalyani, A. Deiva Abinaya
In recent years, the chaos based cryptographic algorithms have enabled some new and efficient ways to develop secure image encryption techniques. In this paper, we propose a new approach for image encryption based on chaotic maps in order to meet the requirements of secure image encryption. The chaos based image encryption technique uses simple chaotic maps which are very sensitive to original conditions. Using mixed chaotic maps which works based on simple substitution and transposition techniques to encrypt the original image yields better performance with less computation complexity which in turn gives high crypto-secrecy. The initial conditions for the chaotic maps are assigned and using that seed only the receiver can decrypt the message. The results of the experimental, statistical analysis and key sensitivity tests show that the proposed image encryption scheme provides an efficient and secure way for image encryption.
近年来,基于混沌的加密算法为开发安全的图像加密技术提供了新的有效途径。为了满足安全图像加密的要求,本文提出了一种基于混沌映射的图像加密方法。基于混沌的图像加密技术使用对原始条件非常敏感的简单混沌映射。使用基于简单替换和转置技术的混合混沌映射对原始图像进行加密,可以获得更好的性能和更少的计算复杂度,从而具有较高的加密保密性。分配混沌映射的初始条件,并使用该种子只有接收方可以解密消息。实验、统计分析和密钥灵敏度测试结果表明,所提出的图像加密方案为图像加密提供了一种高效、安全的方法。
{"title":"Mixed chaotic maps based encryption for high crypto secrecy","authors":"S. Arivazhagan, W. Jebarani, S. Kalyani, A. Deiva Abinaya","doi":"10.1109/ICSCN.2017.8085697","DOIUrl":"https://doi.org/10.1109/ICSCN.2017.8085697","url":null,"abstract":"In recent years, the chaos based cryptographic algorithms have enabled some new and efficient ways to develop secure image encryption techniques. In this paper, we propose a new approach for image encryption based on chaotic maps in order to meet the requirements of secure image encryption. The chaos based image encryption technique uses simple chaotic maps which are very sensitive to original conditions. Using mixed chaotic maps which works based on simple substitution and transposition techniques to encrypt the original image yields better performance with less computation complexity which in turn gives high crypto-secrecy. The initial conditions for the chaotic maps are assigned and using that seed only the receiver can decrypt the message. The results of the experimental, statistical analysis and key sensitivity tests show that the proposed image encryption scheme provides an efficient and secure way for image encryption.","PeriodicalId":383458,"journal":{"name":"2017 Fourth International Conference on Signal Processing, Communication and Networking (ICSCN)","volume":"148 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114636293","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Radio frequency anti-jamming capability improvement for cognitive radio networks: An evolutionary game theoretical approach 认知无线电网络射频抗干扰能力提升:一种进化博弈方法
B. Deepak, P. Bharathi, Dhananjay Kumar
A cognitive radio is a smart radio that can be programmed and adjusted dynamically on the fly to suit the contextual environmental needs. Many anti-jamming schemes available to protect the Cognitive Radio Networks from jamming attack uses frequency hopping techniques which are deterministic in nature. The deterministic frequency hopping technique is vulnerable to attack at some stage in the real-world scenario. The proposed anti-jamming system for cognitive radio network with adaptive frequency hopping technique efficiently thwarts the RF jamming attack. In the presences of a reactive jammer, two techniques are used to achieve the adaptive frequency hopping: (i) when channel availability reduces below 75 % the Hidden Markov Model (HMM) based algorithm is used, (ii) when the system is in critical state (i.e. channel availability reduces further below 25 %) the interaction between Cognitive radio node and the jammer is modelled using Evolutionary Game Theory (EGT). The results obtained from both models are improved further to find most suitable channel. The simulation results show that the anti-jamming system significantly decreases the probability of bit error to about 48% in the presences of reactive jammer.
认知收音机是一种智能收音机,可以动态编程和调整,以适应上下文环境的需要。认知无线网络的许多抗干扰方案都采用了确定性的跳频技术。确定性跳频技术在现实场景中容易受到攻击。提出了一种基于自适应跳频技术的认知无线网络抗干扰系统,有效地挫败了射频干扰攻击。在存在被动干扰机的情况下,采用两种技术实现自适应跳频:(i)当信道可用性降低到75%以下时,使用基于隐马尔可夫模型(HMM)的算法;(ii)当系统处于临界状态(即信道可用性进一步降低到25%以下)时,使用进化博弈论(EGT)对认知无线电节点和干扰机之间的交互进行建模。对两种模型的结果进行进一步改进,以找到最合适的通道。仿真结果表明,在无功干扰存在的情况下,该抗干扰系统将误码概率显著降低至48%左右。
{"title":"Radio frequency anti-jamming capability improvement for cognitive radio networks: An evolutionary game theoretical approach","authors":"B. Deepak, P. Bharathi, Dhananjay Kumar","doi":"10.1109/ICSCN.2017.8085719","DOIUrl":"https://doi.org/10.1109/ICSCN.2017.8085719","url":null,"abstract":"A cognitive radio is a smart radio that can be programmed and adjusted dynamically on the fly to suit the contextual environmental needs. Many anti-jamming schemes available to protect the Cognitive Radio Networks from jamming attack uses frequency hopping techniques which are deterministic in nature. The deterministic frequency hopping technique is vulnerable to attack at some stage in the real-world scenario. The proposed anti-jamming system for cognitive radio network with adaptive frequency hopping technique efficiently thwarts the RF jamming attack. In the presences of a reactive jammer, two techniques are used to achieve the adaptive frequency hopping: (i) when channel availability reduces below 75 % the Hidden Markov Model (HMM) based algorithm is used, (ii) when the system is in critical state (i.e. channel availability reduces further below 25 %) the interaction between Cognitive radio node and the jammer is modelled using Evolutionary Game Theory (EGT). The results obtained from both models are improved further to find most suitable channel. The simulation results show that the anti-jamming system significantly decreases the probability of bit error to about 48% in the presences of reactive jammer.","PeriodicalId":383458,"journal":{"name":"2017 Fourth International Conference on Signal Processing, Communication and Networking (ICSCN)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130340696","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Low leakage circuit design using bootstrap technique 采用自举技术设计低漏电电路
V. Sharma
Leakage power dissipation is drastically increasing with the scaling of the each new technology node. The number of gates per chip has increased for improving the performance of the circuits, rise in operating frequency and many more has resulted in greater leakage power dissipation. That demands low power integrated circuits (ICs). In this paper, bootstrapping technique has been used so as to overcome the leakage power dissipation. 4:1 multiplexer is designed by using bootstrapping technique at 32nm technology node and the results are obtained using Silvaco's tools. The leakage power result obtained had been taken at different voltages (1V, 0.8V, 0.6V, 0.4V) for checking the effect of voltage scaling.
随着每个新技术节点的扩展,泄漏功耗急剧增加。为了提高电路的性能,每个芯片的门的数量增加了,工作频率的上升和更多的导致了更大的泄漏功耗。这就需要低功耗集成电路(ic)。本文采用自举技术来克服泄漏功率损耗。在32nm技术节点上采用自启动技术设计了4:1多路复用器,并使用Silvaco的工具获得了结果。在不同电压(1V、0.8V、0.6V、0.4V)下取漏功率结果,检验电压刻度的效果。
{"title":"Low leakage circuit design using bootstrap technique","authors":"V. Sharma","doi":"10.1109/ICSCN.2017.8085677","DOIUrl":"https://doi.org/10.1109/ICSCN.2017.8085677","url":null,"abstract":"Leakage power dissipation is drastically increasing with the scaling of the each new technology node. The number of gates per chip has increased for improving the performance of the circuits, rise in operating frequency and many more has resulted in greater leakage power dissipation. That demands low power integrated circuits (ICs). In this paper, bootstrapping technique has been used so as to overcome the leakage power dissipation. 4:1 multiplexer is designed by using bootstrapping technique at 32nm technology node and the results are obtained using Silvaco's tools. The leakage power result obtained had been taken at different voltages (1V, 0.8V, 0.6V, 0.4V) for checking the effect of voltage scaling.","PeriodicalId":383458,"journal":{"name":"2017 Fourth International Conference on Signal Processing, Communication and Networking (ICSCN)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130988959","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Ensuring fishermen safety through a range based system by trizonal localization using low power RSSI 使用低功率RSSI进行区域定位,通过基于范围的系统确保渔民的安全
N. Reddy, G. Ramakrishnan, K. Rajeshwari
In the proposed system a solution is given to the problem of “Fishermen Tracking their location in the sea”. For this the sea area is divided into three zones namely; safe, intermediate and danger. The boat is allowed to roam anywhere within the safety zone. If the boat reaches the intermediate zone, a buzzer alert is given to the fisherman. If the boat reaches the danger zone, an intimation is given to the fisherman where he is supposed to reach the intermediate zone within the specified time. Else the engine gets stopped automatically and the control of the boat goes to the control room The boat will be released only after inspection by the coast guard or after the emergency help is given. The different Ranges are identified using Received Signal Strength Indicator(RSSI).
该系统解决了“渔民在海上定位”的问题。为此,海域分为三个区:安全、中间、危险。这艘船可以在安全区内的任何地方航行。如果渔船到达中间区域,就会向渔民发出蜂鸣器警报。如果渔船到达危险区域,则通知渔民在规定时间内到达中间区域的地点。否则发动机自动停机,船舶控制权交由控制室控制,经海警检查或紧急救助后放行。使用接收信号强度指示器(RSSI)识别不同的范围。
{"title":"Ensuring fishermen safety through a range based system by trizonal localization using low power RSSI","authors":"N. Reddy, G. Ramakrishnan, K. Rajeshwari","doi":"10.1109/ICSCN.2017.8085707","DOIUrl":"https://doi.org/10.1109/ICSCN.2017.8085707","url":null,"abstract":"In the proposed system a solution is given to the problem of “Fishermen Tracking their location in the sea”. For this the sea area is divided into three zones namely; safe, intermediate and danger. The boat is allowed to roam anywhere within the safety zone. If the boat reaches the intermediate zone, a buzzer alert is given to the fisherman. If the boat reaches the danger zone, an intimation is given to the fisherman where he is supposed to reach the intermediate zone within the specified time. Else the engine gets stopped automatically and the control of the boat goes to the control room The boat will be released only after inspection by the coast guard or after the emergency help is given. The different Ranges are identified using Received Signal Strength Indicator(RSSI).","PeriodicalId":383458,"journal":{"name":"2017 Fourth International Conference on Signal Processing, Communication and Networking (ICSCN)","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125275160","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
SLAMHHA: A supervised learning approach to mitigate host location hijacking attack on SDN controllers SLAMHHA:一种减轻SDN控制器主机位置劫持攻击的监督学习方法
R. Nagarathna, S. Shalinie
Current era of networking world witnesses an increase in the number of devices that have intelligent component embedded in them, which leads to an unmanageable state. This has lead to a steady shift towards using Open Software Defined Networks to reduce operational expenditure. The whole of the intelligence lies in the central controller which obviously is the single point of failure. The attackers find it easy to bring down the whole network by saturating the control plane of the SDN which eventually leads to denial-of-service (DoS) to the data plane, through host location hijacking attack. The various strategies proposed to defend the SDN controller from host location hijack attack includes authentication of host which incurs overhead. In this paper we propose SLAMHHA, a Supervised Learning Approach to Mitigate Host location Hijacking Attack. SLAMHHA is implemented in the SDN controller which monitors the legitimacy of the hosts and identifies the clandestine users impersonating the hosts in the data plane. The SLAMHHA algorithm can be implemented in either of the two SDN controller setup (i.e.) in both centralized and decentralized controller setup, been used to set the flow rules and monitor the underlying network. MININET has been used to test the efficiency of the SLAMHHA algorithm. SLAMHHA algorithm was implemented in the POX controller. Numerical results show that SLAMHHA incurs less overhead in terms of CPU and memory consumption when compared to the authentication method. This algorithm blocks the attack within 3 seconds when 100 hosts are impersonated to perform DoS attack. Thus our proposed SLAMHHA algorithm mitigates the host location hijacking attack with less overhead.
在当今网络时代,嵌入智能组件的设备越来越多,这导致了一种难以管理的状态。这导致了向使用开放软件定义网络的稳步转变,以减少运营支出。整个智能都在中央控制器上,而这显然是单点故障。攻击者发现,通过主机位置劫持攻击,使SDN的控制平面饱和,最终导致数据平面的拒绝服务(DoS),很容易使整个网络瘫痪。针对SDN控制器的主机位置劫持攻击,提出了多种防御策略,其中包括对主机进行身份验证,这会产生开销。在本文中,我们提出了SLAMHHA,一种有监督的学习方法来减轻主机位置劫持攻击。SLAMHHA在SDN控制器中实现,该控制器监控主机的合法性并识别数据平面中冒充主机的秘密用户。SLAMHHA算法可以在两种SDN控制器设置(即集中式和分散式控制器设置)中的任何一种中实现,用于设置流规则和监视底层网络。MININET已经被用来测试SLAMHHA算法的效率。在POX控制器中实现了SLAMHHA算法。数值结果表明,与认证方法相比,SLAMHHA在CPU和内存消耗方面的开销更小。当模拟100台主机进行DoS攻击时,该算法会在3秒内阻断攻击。因此,我们提出的SLAMHHA算法以较少的开销减轻了主机位置劫持攻击。
{"title":"SLAMHHA: A supervised learning approach to mitigate host location hijacking attack on SDN controllers","authors":"R. Nagarathna, S. Shalinie","doi":"10.1109/ICSCN.2017.8085680","DOIUrl":"https://doi.org/10.1109/ICSCN.2017.8085680","url":null,"abstract":"Current era of networking world witnesses an increase in the number of devices that have intelligent component embedded in them, which leads to an unmanageable state. This has lead to a steady shift towards using Open Software Defined Networks to reduce operational expenditure. The whole of the intelligence lies in the central controller which obviously is the single point of failure. The attackers find it easy to bring down the whole network by saturating the control plane of the SDN which eventually leads to denial-of-service (DoS) to the data plane, through host location hijacking attack. The various strategies proposed to defend the SDN controller from host location hijack attack includes authentication of host which incurs overhead. In this paper we propose SLAMHHA, a Supervised Learning Approach to Mitigate Host location Hijacking Attack. SLAMHHA is implemented in the SDN controller which monitors the legitimacy of the hosts and identifies the clandestine users impersonating the hosts in the data plane. The SLAMHHA algorithm can be implemented in either of the two SDN controller setup (i.e.) in both centralized and decentralized controller setup, been used to set the flow rules and monitor the underlying network. MININET has been used to test the efficiency of the SLAMHHA algorithm. SLAMHHA algorithm was implemented in the POX controller. Numerical results show that SLAMHHA incurs less overhead in terms of CPU and memory consumption when compared to the authentication method. This algorithm blocks the attack within 3 seconds when 100 hosts are impersonated to perform DoS attack. Thus our proposed SLAMHHA algorithm mitigates the host location hijacking attack with less overhead.","PeriodicalId":383458,"journal":{"name":"2017 Fourth International Conference on Signal Processing, Communication and Networking (ICSCN)","volume":"110 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132357361","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Analysis of structural connectivity on progression of Alzheimer's disease using diffusion tensor imaging 利用弥散张量成像分析阿尔茨海默病进展中的结构连通性
R. Chitra, K. Bairavi, V. Vinisha, A. Kavitha
The occurrence of Alzheimer's disease (AD) in the elderly individuals has been increasing at an alarming rate throughout the world over the past decade. Diffusion Tensor Imaging (DTI) has been widely used to study the white matter tracts in the human brain and for the estimation of structural connectivity parameters through the progression of the disease. Previous studies using fMRI focus on functional decline and adding on to this, DTI helps in analyzing the topological and structural integrity. Histopathological studies of the disease have revealed that major cortical neuronal loss occurred in Corpus Callosum and Cingulate Gyrus regions of the brain. In this work, DTI images of four AD patients for three progressive years have been obtained and the structural connectivity parameters namely: Fractional Anisotropy (FA), Axial Diffusivity, Radial Diffusivity and Mean Diffusivity have been estimated at the onset of the disease and for the three progressive years. Results show that the FA values decreased in the progressive years for all patients whereas the diffusivity parameters increased every year showing abnormalities in the connectivity parameters.
在过去的十年里,全世界老年人阿尔茨海默病(AD)的发病率以惊人的速度增长。弥散张量成像(Diffusion Tensor Imaging, DTI)已被广泛应用于研究人脑白质束,并通过疾病的进展来估计结构连接参数。先前使用fMRI的研究侧重于功能衰退,除此之外,DTI有助于分析拓扑和结构完整性。该疾病的组织病理学研究表明,主要的皮质神经元丢失发生在大脑的胼胝体和扣带回区域。在这项工作中,我们获得了4例AD患者连续3年的DTI图像,并对其结构连通性参数即:分数各向异性(FA)、轴向扩散率、径向扩散率和平均扩散率进行了估计。结果显示,所有患者的FA值均随着病程的进展而下降,而弥漫性参数则逐年增加,显示出连接参数的异常。
{"title":"Analysis of structural connectivity on progression of Alzheimer's disease using diffusion tensor imaging","authors":"R. Chitra, K. Bairavi, V. Vinisha, A. Kavitha","doi":"10.1109/ICSCN.2017.8085686","DOIUrl":"https://doi.org/10.1109/ICSCN.2017.8085686","url":null,"abstract":"The occurrence of Alzheimer's disease (AD) in the elderly individuals has been increasing at an alarming rate throughout the world over the past decade. Diffusion Tensor Imaging (DTI) has been widely used to study the white matter tracts in the human brain and for the estimation of structural connectivity parameters through the progression of the disease. Previous studies using fMRI focus on functional decline and adding on to this, DTI helps in analyzing the topological and structural integrity. Histopathological studies of the disease have revealed that major cortical neuronal loss occurred in Corpus Callosum and Cingulate Gyrus regions of the brain. In this work, DTI images of four AD patients for three progressive years have been obtained and the structural connectivity parameters namely: Fractional Anisotropy (FA), Axial Diffusivity, Radial Diffusivity and Mean Diffusivity have been estimated at the onset of the disease and for the three progressive years. Results show that the FA values decreased in the progressive years for all patients whereas the diffusivity parameters increased every year showing abnormalities in the connectivity parameters.","PeriodicalId":383458,"journal":{"name":"2017 Fourth International Conference on Signal Processing, Communication and Networking (ICSCN)","volume":"108 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133476970","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Image contrast enhancement by automatic multi-histogram equalization for satellite images 基于自动多直方图均衡化的卫星图像对比度增强
A. Pugazhenthi, L. S. Kumar
In this paper, a new automatic histogram equalization algorithm which is based on Bi-Histogram Equalization (BHE) is proposed. The proposed method preserves the brightness and also improves the contrast. Mean value of the intensity is used for selecting the thresholds to avoid over enhancement also improving contrast of the image. The calculated mean limits the valley points to divide the histogram into small parts which guarantee equal input and output mean brightness. In addition, normalization of image brightness is applied to assure less Absolute Mean Brightness Error (AMBE). The performances of proposed algorithm, Global Histogram equalization algorithm and Bi-Histogram equalization algorithm are measured by calculating another validity parameter called Peak Signal to Noise Ratio (PSNR). The proposed method confirms the improvement in qualitative parameters as compared with the other two algorithms considered.
本文提出了一种新的基于双直方图均衡化(BHE)的自动直方图均衡化算法。该方法在保持图像亮度的同时,提高了图像对比度。利用图像强度的平均值选择阈值,避免了图像的过度增强,提高了图像的对比度。计算出的平均值限制了谷点将直方图分割成小的部分,保证了输入和输出的平均亮度相等。此外,对图像亮度进行归一化处理,保证了图像的绝对平均亮度误差(AMBE)较小。通过计算另一个有效性参数峰值信噪比(PSNR)来衡量本文算法、全局直方图均衡算法和双直方图均衡算法的性能。与考虑的其他两种算法相比,所提出的方法在定性参数方面得到了改进。
{"title":"Image contrast enhancement by automatic multi-histogram equalization for satellite images","authors":"A. Pugazhenthi, L. S. Kumar","doi":"10.1109/ICSCN.2017.8085722","DOIUrl":"https://doi.org/10.1109/ICSCN.2017.8085722","url":null,"abstract":"In this paper, a new automatic histogram equalization algorithm which is based on Bi-Histogram Equalization (BHE) is proposed. The proposed method preserves the brightness and also improves the contrast. Mean value of the intensity is used for selecting the thresholds to avoid over enhancement also improving contrast of the image. The calculated mean limits the valley points to divide the histogram into small parts which guarantee equal input and output mean brightness. In addition, normalization of image brightness is applied to assure less Absolute Mean Brightness Error (AMBE). The performances of proposed algorithm, Global Histogram equalization algorithm and Bi-Histogram equalization algorithm are measured by calculating another validity parameter called Peak Signal to Noise Ratio (PSNR). The proposed method confirms the improvement in qualitative parameters as compared with the other two algorithms considered.","PeriodicalId":383458,"journal":{"name":"2017 Fourth International Conference on Signal Processing, Communication and Networking (ICSCN)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131293852","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
期刊
2017 Fourth International Conference on Signal Processing, Communication and Networking (ICSCN)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1