The strength of the GPS signal on the earth's surface averages-160 dBw. While many GPS receivers leave large space for signal dynamics, enough power space is left for the GPS signals to be spoofed. Spoofing is completely different from jamming. The objective of jamming is to simply interrupt the availability of the signal in space at the receiver. The effect is to cause the signal at the receiver to be corrupted so that no valid GPS signal can be decoded by the receiver. The goal of spoofing, on the other hand, is to provide the receiver with a misleading signal, fooling the receiver to use fake signals in space for positioning calculations. The receiver will produce a misleading position solution. While the GPS P-code is heavily encrypted and thus, is hard to spoof. The civilian GPS signal, is easy to spoof because the signal structure, the spread spectrum codes, and modulation methods are open to the public. The stability and predictability of GPS L1 signal are good, because: the frequencies, initial phase and C/A code for each level of modulation are stable, without frequency hopping which is frequently used in military radio communications.
{"title":"Civilian Unmanned Aerial Vehicle Vulnerability to GPS Spoofing Attacks","authors":"Liang He, Wei Li, Chengjun Guo, Ruizhao Niu","doi":"10.1109/ISCID.2014.131","DOIUrl":"https://doi.org/10.1109/ISCID.2014.131","url":null,"abstract":"The strength of the GPS signal on the earth's surface averages-160 dBw. While many GPS receivers leave large space for signal dynamics, enough power space is left for the GPS signals to be spoofed. Spoofing is completely different from jamming. The objective of jamming is to simply interrupt the availability of the signal in space at the receiver. The effect is to cause the signal at the receiver to be corrupted so that no valid GPS signal can be decoded by the receiver. The goal of spoofing, on the other hand, is to provide the receiver with a misleading signal, fooling the receiver to use fake signals in space for positioning calculations. The receiver will produce a misleading position solution. While the GPS P-code is heavily encrypted and thus, is hard to spoof. The civilian GPS signal, is easy to spoof because the signal structure, the spread spectrum codes, and modulation methods are open to the public. The stability and predictability of GPS L1 signal are good, because: the frequencies, initial phase and C/A code for each level of modulation are stable, without frequency hopping which is frequently used in military radio communications.","PeriodicalId":385391,"journal":{"name":"2014 Seventh International Symposium on Computational Intelligence and Design","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134114142","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In order to overcome the imperfection and insufficiency of the conventional fault diagnosis based on fuzzy logic, the concept of relative inferiority degree is introduced to represent the conversion degree from the actual state to failure state. Using the relative inferiority degree as an input to build the membership function of the fuzzy logic, an improved fault diagnosis model based on the fuzzy logic and relative inferiority degree is established. A valid method is presented, and an instance is given to prove this method. It is also implemented by the program, which provides a feasible way for the computer-aided fault diagnosis.
{"title":"An Improved Fault Diagnosis Model Based on Fuzzy Logic and Relative Inferiority Degree","authors":"Chaochao Wang, J. Lu, Yuemei Sun","doi":"10.1109/ISCID.2014.155","DOIUrl":"https://doi.org/10.1109/ISCID.2014.155","url":null,"abstract":"In order to overcome the imperfection and insufficiency of the conventional fault diagnosis based on fuzzy logic, the concept of relative inferiority degree is introduced to represent the conversion degree from the actual state to failure state. Using the relative inferiority degree as an input to build the membership function of the fuzzy logic, an improved fault diagnosis model based on the fuzzy logic and relative inferiority degree is established. A valid method is presented, and an instance is given to prove this method. It is also implemented by the program, which provides a feasible way for the computer-aided fault diagnosis.","PeriodicalId":385391,"journal":{"name":"2014 Seventh International Symposium on Computational Intelligence and Design","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115540679","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper proposes a model adaptation algorithm based on central sub band regression for robust speech recognition, which uses a linear transformation to approximate the relationship between the training and testing conditions for each channel of the Mel filter bank and its adjacent channels. The maximum likelihood estimation of each channel transform is obtained by several different divisions of all the Mel channels and sub-band adaptation. The experimental results show that the proposed algorithm can obtain more accurate testing acoustic models for rapid model adaptation and outperforms the traditional sub-band regression method.
{"title":"Model Adaptation Algorithm Based on Central Subband Regression for Robust Speech Recognition","authors":"Yong Lu, Lin Zhou","doi":"10.1109/ISCID.2014.173","DOIUrl":"https://doi.org/10.1109/ISCID.2014.173","url":null,"abstract":"This paper proposes a model adaptation algorithm based on central sub band regression for robust speech recognition, which uses a linear transformation to approximate the relationship between the training and testing conditions for each channel of the Mel filter bank and its adjacent channels. The maximum likelihood estimation of each channel transform is obtained by several different divisions of all the Mel channels and sub-band adaptation. The experimental results show that the proposed algorithm can obtain more accurate testing acoustic models for rapid model adaptation and outperforms the traditional sub-band regression method.","PeriodicalId":385391,"journal":{"name":"2014 Seventh International Symposium on Computational Intelligence and Design","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115598770","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In order to enhance the moving target detection performance of airborne SAR, a virtual tri-channel displaced phase center antenna (DPCA) approach based on increasing radar echoes' channel using equivalent phase center approach is proposed in this paper. The echoes' characteristic of actual aperture and virtual aperture is analyzed firstly. Then, the compensation to virtual aperture channel in order to realize virtual tri-channel DPCA, the compensation is given and analyzed and the processing frame of moving target detection of airborne SAR based on virtual tri-channel DPCA approach is established. The theoretical analysis and simulation results show the new algorithm is effective and the detection performance is superior to the traditional DPCA algorithm.
{"title":"Moving Target Detection of Airborne SAR Based on Virtual Tri-channel Displaced Phase Center Antenna Approach","authors":"Yibin Wang, Zhulin Zong","doi":"10.1109/ISCID.2014.182","DOIUrl":"https://doi.org/10.1109/ISCID.2014.182","url":null,"abstract":"In order to enhance the moving target detection performance of airborne SAR, a virtual tri-channel displaced phase center antenna (DPCA) approach based on increasing radar echoes' channel using equivalent phase center approach is proposed in this paper. The echoes' characteristic of actual aperture and virtual aperture is analyzed firstly. Then, the compensation to virtual aperture channel in order to realize virtual tri-channel DPCA, the compensation is given and analyzed and the processing frame of moving target detection of airborne SAR based on virtual tri-channel DPCA approach is established. The theoretical analysis and simulation results show the new algorithm is effective and the detection performance is superior to the traditional DPCA algorithm.","PeriodicalId":385391,"journal":{"name":"2014 Seventh International Symposium on Computational Intelligence and Design","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114477674","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The weakness of Global Positioning System (GPS) is easy to be jammed, so the study of GPS anti-jamming of has drawn widely attention. The space-domain GPS anti-jamming based on antennas can effectively suppress the interference, however, when GPS and jamming signals come from the same direction, the traditional anti-jamming ability decline sharply. A novel anti-jamming method based on BSS is proposed in this paper to solve this problem. In this paper, Wavelet De-noising is used to eliminate the effect of noise on signals, and BSS is applied to separate GPS from jamming signals. According to separation principle, the cost function is constructed, Newton iterative algorithm is utilized to gain separated signals which contain GPS. Simulation results show that our method is practically feasible for GPS anti-jamming.
{"title":"A Novel Method for GPS Anti-jamming Based on Blind Source Separation","authors":"Xiaobo Liao, Wei Zhang","doi":"10.1109/ISCID.2014.130","DOIUrl":"https://doi.org/10.1109/ISCID.2014.130","url":null,"abstract":"The weakness of Global Positioning System (GPS) is easy to be jammed, so the study of GPS anti-jamming of has drawn widely attention. The space-domain GPS anti-jamming based on antennas can effectively suppress the interference, however, when GPS and jamming signals come from the same direction, the traditional anti-jamming ability decline sharply. A novel anti-jamming method based on BSS is proposed in this paper to solve this problem. In this paper, Wavelet De-noising is used to eliminate the effect of noise on signals, and BSS is applied to separate GPS from jamming signals. According to separation principle, the cost function is constructed, Newton iterative algorithm is utilized to gain separated signals which contain GPS. Simulation results show that our method is practically feasible for GPS anti-jamming.","PeriodicalId":385391,"journal":{"name":"2014 Seventh International Symposium on Computational Intelligence and Design","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116254118","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In order to improve the computing speed of ocean acoustic field using the Beam-Displacement Ray-Mode (BDRM) theory, a BDRM parallel computing model based on Compute Unified Device Architecture (CUDA) is designed by virtue of the powerful parallel computing ability of GPU and the character of BDRM theory. The emphasis is how to implement parallel computing of eigen value and eigen function in CUDA programming model. The results of simulation experiment show that the CPU elapsed time increases fast but the GPU elapsed time increases slow with the frequency of the sound source reaching higher. The speedup in blue-water is bigger than that in shallow-water under the same frequency of the sound source. The speedups are 7.84× and 33.36× respectively in shallow-water and blue-water when the frequency of the sound source is 1000Hz. The BDRM parallel computing model based on CUDA has higher computing efficiency than the BDRM serial computing model based on CPU under large scale operations. It could achieve the requirement of fast forecast of ocean acoustic field and engineering application.
{"title":"Study of BDRM Asynchronous Parallel Computing Model Based on Multiple CUDA Streams","authors":"Xuehai Sun, Lianglong Da, Yuyang Li","doi":"10.1109/ISCID.2014.104","DOIUrl":"https://doi.org/10.1109/ISCID.2014.104","url":null,"abstract":"In order to improve the computing speed of ocean acoustic field using the Beam-Displacement Ray-Mode (BDRM) theory, a BDRM parallel computing model based on Compute Unified Device Architecture (CUDA) is designed by virtue of the powerful parallel computing ability of GPU and the character of BDRM theory. The emphasis is how to implement parallel computing of eigen value and eigen function in CUDA programming model. The results of simulation experiment show that the CPU elapsed time increases fast but the GPU elapsed time increases slow with the frequency of the sound source reaching higher. The speedup in blue-water is bigger than that in shallow-water under the same frequency of the sound source. The speedups are 7.84× and 33.36× respectively in shallow-water and blue-water when the frequency of the sound source is 1000Hz. The BDRM parallel computing model based on CUDA has higher computing efficiency than the BDRM serial computing model based on CPU under large scale operations. It could achieve the requirement of fast forecast of ocean acoustic field and engineering application.","PeriodicalId":385391,"journal":{"name":"2014 Seventh International Symposium on Computational Intelligence and Design","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114980032","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper presents a novel type of tree-climbing robot. The main parts of the robot are 2 vehicles, which are attached on the trunk of a tree and were stick tightly on the tree because of a holding device. A kind of spine array is distributed on the wheels, and the friction is enhanced. Static stress analysis shows that the robot can overcome gravity and can be attached reliably to the tree trunk. Experiments show that the new type vehicle tree-climbing robot can climb trees in a steady speed, and can be adapted the different diameter of the tree trunk.
{"title":"Study on a Novel Wheel Type Tree-Climbing Robot","authors":"Daqi Ren, Shixi Yang, Gongbiao Yan, Yao Zhang","doi":"10.1109/ISCID.2014.69","DOIUrl":"https://doi.org/10.1109/ISCID.2014.69","url":null,"abstract":"This paper presents a novel type of tree-climbing robot. The main parts of the robot are 2 vehicles, which are attached on the trunk of a tree and were stick tightly on the tree because of a holding device. A kind of spine array is distributed on the wheels, and the friction is enhanced. Static stress analysis shows that the robot can overcome gravity and can be attached reliably to the tree trunk. Experiments show that the new type vehicle tree-climbing robot can climb trees in a steady speed, and can be adapted the different diameter of the tree trunk.","PeriodicalId":385391,"journal":{"name":"2014 Seventh International Symposium on Computational Intelligence and Design","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123653898","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this paper, it is presented that a new color image watermarking algorithm based on compressed sensing theory and chaos theory in discrete cosine transform (DCT) and singular value decomposition (SVD) domain. Initially, a color watermarking image is preprocessed by four steps i.e. Being divided into red, green and blue channels, being sparse by wavelet transform, scrambling by 1-D chaos sequence and measurement through Gaussian random matrix. Here, the chaos sequence is produced by 1-D Logistic mapping. Then the red, green and blue channel images of a color host image are divided into 8×8 blocks and then transformed by DCT. Next the first DCT coefficient of each block is selected to compose a new matrix, and the new matrix is decomposed by SVD. The singular values are the regions of watermarking embedment. Thirdly, three sets of measured coefficients as new watermarking are embedded into the corresponding singular values. Finally, the Iterative Hard Threshold (IHT) algorithm is used to reconstruct the watermarking image. The method proposed can not only enlarge the information capacity of watermarking embedment but also strengthen the security of watermarking in the condition of the good imperceptibility. The experiments show that the scheme is feasible and has good anti-attack ability for JPEG compression, Gaussian white noise, rotating and median filtering.
{"title":"A DCT-SVD Domain Watermarking for Color Digital Image Based on Compressed Sensing Theory and Chaos Theory","authors":"Meng Li, Chao Han","doi":"10.1109/ISCID.2014.280","DOIUrl":"https://doi.org/10.1109/ISCID.2014.280","url":null,"abstract":"In this paper, it is presented that a new color image watermarking algorithm based on compressed sensing theory and chaos theory in discrete cosine transform (DCT) and singular value decomposition (SVD) domain. Initially, a color watermarking image is preprocessed by four steps i.e. Being divided into red, green and blue channels, being sparse by wavelet transform, scrambling by 1-D chaos sequence and measurement through Gaussian random matrix. Here, the chaos sequence is produced by 1-D Logistic mapping. Then the red, green and blue channel images of a color host image are divided into 8×8 blocks and then transformed by DCT. Next the first DCT coefficient of each block is selected to compose a new matrix, and the new matrix is decomposed by SVD. The singular values are the regions of watermarking embedment. Thirdly, three sets of measured coefficients as new watermarking are embedded into the corresponding singular values. Finally, the Iterative Hard Threshold (IHT) algorithm is used to reconstruct the watermarking image. The method proposed can not only enlarge the information capacity of watermarking embedment but also strengthen the security of watermarking in the condition of the good imperceptibility. The experiments show that the scheme is feasible and has good anti-attack ability for JPEG compression, Gaussian white noise, rotating and median filtering.","PeriodicalId":385391,"journal":{"name":"2014 Seventh International Symposium on Computational Intelligence and Design","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121945844","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Lip-reading technology was introduced in this paper, including the development course, technical methods and application direction. Lip-reading technology mainly includes the lip detection and localization, feature extraction and recognition method and fusion method, the classification of the mouth and the corpus. This paper do a detailed comparative analysis for traditional methods and new technology, emphatically introduces the lip feature extraction.
{"title":"Review of Lip-Reading Recognition","authors":"Guo-li Zheng, Mei-li Zhu, LiuQi Feng","doi":"10.1109/ISCID.2014.110","DOIUrl":"https://doi.org/10.1109/ISCID.2014.110","url":null,"abstract":"Lip-reading technology was introduced in this paper, including the development course, technical methods and application direction. Lip-reading technology mainly includes the lip detection and localization, feature extraction and recognition method and fusion method, the classification of the mouth and the corpus. This paper do a detailed comparative analysis for traditional methods and new technology, emphatically introduces the lip feature extraction.","PeriodicalId":385391,"journal":{"name":"2014 Seventh International Symposium on Computational Intelligence and Design","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123877741","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Aiming at the problem of low accuracy in intrusion detection system, this paper established a genetic support vector machine (SVM) model according to the features of genetic algorithm and support vector machine algorithm. The model firstly optimizes the support vector parameters according to genetic algorithm, then we build the intrusion detection model with support vector machine optimized and use the model to detect. The experiments choose the proper parameters (c, s) through discussing the influence of support vector machines parameters to the detection accuracy. The results show that putting genetic support vector machine model into intrusion detection improved detection accuracy.
{"title":"Optimization Algorithm Based on Genetic Support Vector Machine Model","authors":"Lanying Li, Shaobin Ma, Yun Zhang","doi":"10.1109/ISCID.2014.99","DOIUrl":"https://doi.org/10.1109/ISCID.2014.99","url":null,"abstract":"Aiming at the problem of low accuracy in intrusion detection system, this paper established a genetic support vector machine (SVM) model according to the features of genetic algorithm and support vector machine algorithm. The model firstly optimizes the support vector parameters according to genetic algorithm, then we build the intrusion detection model with support vector machine optimized and use the model to detect. The experiments choose the proper parameters (c, s) through discussing the influence of support vector machines parameters to the detection accuracy. The results show that putting genetic support vector machine model into intrusion detection improved detection accuracy.","PeriodicalId":385391,"journal":{"name":"2014 Seventh International Symposium on Computational Intelligence and Design","volume":"72 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126134597","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}