Pub Date : 2019-07-01DOI: 10.1109/tsp.2019.8769069
{"title":"TSP 2019 Organizing Committee Members","authors":"","doi":"10.1109/tsp.2019.8769069","DOIUrl":"https://doi.org/10.1109/tsp.2019.8769069","url":null,"abstract":"","PeriodicalId":399087,"journal":{"name":"2019 42nd International Conference on Telecommunications and Signal Processing (TSP)","volume":"144 33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126145221","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-07-01DOI: 10.1109/TSP.2019.8769115
A. Iula, Monica Micucci
Biometric recognition systems based on ultrasound images have been investigated for several decades, and nowadays ultrasonic fingerprint sensors are fully integrated in portable devices. Main advantage of the Ultrasound over other technologies are the possibility to collect 3D images, allowing to gain information on under-skin features, which improve recognition accuracy and resistance to spoofing. Also, ultrasound images are not sensible to several skin contaminations, humidity and not uniform ambient illumination. An ultrasound system, able to acquire 3D images of the human palm has been recently proposed. In this work, a recognition procedure based on 2D palmprint images collected with this system is proposed and evaluated through verification experiments carried out on a home made database composed of 141 samples collected from 24 users. Perspective of the proposed method by upgrading the recognition procedure to provide a 3D template able to accounts for palm lines’ depth are finally highlighted and discussed.
{"title":"Palmprint recognition based on ultrasound imaging","authors":"A. Iula, Monica Micucci","doi":"10.1109/TSP.2019.8769115","DOIUrl":"https://doi.org/10.1109/TSP.2019.8769115","url":null,"abstract":"Biometric recognition systems based on ultrasound images have been investigated for several decades, and nowadays ultrasonic fingerprint sensors are fully integrated in portable devices. Main advantage of the Ultrasound over other technologies are the possibility to collect 3D images, allowing to gain information on under-skin features, which improve recognition accuracy and resistance to spoofing. Also, ultrasound images are not sensible to several skin contaminations, humidity and not uniform ambient illumination. An ultrasound system, able to acquire 3D images of the human palm has been recently proposed. In this work, a recognition procedure based on 2D palmprint images collected with this system is proposed and evaluated through verification experiments carried out on a home made database composed of 141 samples collected from 24 users. Perspective of the proposed method by upgrading the recognition procedure to provide a 3D template able to accounts for palm lines’ depth are finally highlighted and discussed.","PeriodicalId":399087,"journal":{"name":"2019 42nd International Conference on Telecommunications and Signal Processing (TSP)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129717984","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-07-01DOI: 10.1109/TSP.2019.8768829
M. Kolarík, Radim Burget, V. Uher, Lukas Povoda
This paper proposes an unbalanced end-to-end trained 3D Dense-U-Net network for brain MRI images superresolution. We evaluated capabilites of the proposed architecture on upsampling the MRI brain scans in the factor of 2, 4 and 8 and compared the results with resampled images using lanczos, spline and bilinear interpolation achieving best results. While the network does not exceed superresolution capabilites of state-of-the-art GAN networks, it does not require large dataset, is easy to train and capable of processing 3D images in resolution suitable for medical image processing.
{"title":"Superresolution of MRI brain images using unbalanced 3D Dense-U-Net network","authors":"M. Kolarík, Radim Burget, V. Uher, Lukas Povoda","doi":"10.1109/TSP.2019.8768829","DOIUrl":"https://doi.org/10.1109/TSP.2019.8768829","url":null,"abstract":"This paper proposes an unbalanced end-to-end trained 3D Dense-U-Net network for brain MRI images superresolution. We evaluated capabilites of the proposed architecture on upsampling the MRI brain scans in the factor of 2, 4 and 8 and compared the results with resampled images using lanczos, spline and bilinear interpolation achieving best results. While the network does not exceed superresolution capabilites of state-of-the-art GAN networks, it does not require large dataset, is easy to train and capable of processing 3D images in resolution suitable for medical image processing.","PeriodicalId":399087,"journal":{"name":"2019 42nd International Conference on Telecommunications and Signal Processing (TSP)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130001869","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-07-01DOI: 10.1109/TSP.2019.8769070
L. Polak, Jiří Miloš, J. Blumenstein, S. Rozum, Jan Kufa, M. Slanina, T. Fryza, T. Kratochvil
The increasing demand for high data rate in broadband mobile and wireless networks pushes providers to effectively utilize a wide range of radio frequency (RF) spectrum, especially in the unlicensed bands. The expansion of Long Term Evolution (LTE) telecommunication services in the license-free GHz bands can result in unwanted coexistence scenarios with the Wireless Fidelity (Wi-Fi) networks. This paper deals with the study of such scenarios in the 2.4GHz Industrial, Scientific and Medical band. The robustness of the LTE system against interferences is evaluated at the physical layer level. For this purpose, error vector magnitude (EVM) and carrier-to-interference (C/I) values are measured and calculated, respectively. The results of laboratory measurements show that the robustness of the LTE system is highly depending on the specific IEEE 802.11 technology used in the interfering Wi-Fi network.
{"title":"On The Coexistence Of LTE And Wi-Fi In The 2.4 Ghz ISM Band","authors":"L. Polak, Jiří Miloš, J. Blumenstein, S. Rozum, Jan Kufa, M. Slanina, T. Fryza, T. Kratochvil","doi":"10.1109/TSP.2019.8769070","DOIUrl":"https://doi.org/10.1109/TSP.2019.8769070","url":null,"abstract":"The increasing demand for high data rate in broadband mobile and wireless networks pushes providers to effectively utilize a wide range of radio frequency (RF) spectrum, especially in the unlicensed bands. The expansion of Long Term Evolution (LTE) telecommunication services in the license-free GHz bands can result in unwanted coexistence scenarios with the Wireless Fidelity (Wi-Fi) networks. This paper deals with the study of such scenarios in the 2.4GHz Industrial, Scientific and Medical band. The robustness of the LTE system against interferences is evaluated at the physical layer level. For this purpose, error vector magnitude (EVM) and carrier-to-interference (C/I) values are measured and calculated, respectively. The results of laboratory measurements show that the robustness of the LTE system is highly depending on the specific IEEE 802.11 technology used in the interfering Wi-Fi network.","PeriodicalId":399087,"journal":{"name":"2019 42nd International Conference on Telecommunications and Signal Processing (TSP)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130104871","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-07-01DOI: 10.1109/TSP.2019.8769059
Ahmed I. Abdulshakoor, M. M. Elmesalawy, Noha A. Elmosilhy, Ahmed M. Abd El-Haleem
The unexpected explosion of mobile data traffic has led to that the cellular networks are overloaded. Long term evolution (LTE) wireless local area networks (WLAN) aggregation (LWA) has recently emerged as a developed solution of mobile data offloading. In this paper, a multi-RAT heterogeneous network (HetNet) is considered, where three mode categories are defined, LTE mode, WiFi mode, and aggregation mode. A non-collocated LWA scenario is considered for the aggregation mode, in which a wireless backhaul link is connecting LTE with WLAN networks. We use the Technique for Order Preference by Similarity to Ideal Solution (TOPSIS) in order to arrange the available modes and their own stations, according to several metrics and based on the user requirements. Thus, helping for optimum mode and network selection that will improve the system performance while satisfying the user requirements. The analytical results show the importance of taking the effect of the backhaul during the mode selection process and how the backhaul link affects the overall performance.
移动数据流量的意外爆炸导致了蜂窝网络的过载。长期演进(LTE)无线局域网(WLAN)聚合(LWA)是近年来发展起来的一种移动数据卸载解决方案。本文考虑了一个多rat异构网络(HetNet),其中定义了三种模式:LTE模式、WiFi模式和聚合模式。聚合模式考虑非并置的LWA场景,其中无线回程链路连接LTE和WLAN网络。我们使用TOPSIS (Order Preference of Order by Similarity to Ideal Solution)技术,根据用户需求,根据几个指标来安排可用的模式和它们自己的站点。因此,有助于在满足用户需求的同时提高系统性能的最佳模式和网络选择。分析结果表明了在模式选择过程中考虑回程影响的重要性,以及回程链路对整体性能的影响。
{"title":"Joint Network and Mode Selection in 5G Multi RAT Heterogeneous Networks","authors":"Ahmed I. Abdulshakoor, M. M. Elmesalawy, Noha A. Elmosilhy, Ahmed M. Abd El-Haleem","doi":"10.1109/TSP.2019.8769059","DOIUrl":"https://doi.org/10.1109/TSP.2019.8769059","url":null,"abstract":"The unexpected explosion of mobile data traffic has led to that the cellular networks are overloaded. Long term evolution (LTE) wireless local area networks (WLAN) aggregation (LWA) has recently emerged as a developed solution of mobile data offloading. In this paper, a multi-RAT heterogeneous network (HetNet) is considered, where three mode categories are defined, LTE mode, WiFi mode, and aggregation mode. A non-collocated LWA scenario is considered for the aggregation mode, in which a wireless backhaul link is connecting LTE with WLAN networks. We use the Technique for Order Preference by Similarity to Ideal Solution (TOPSIS) in order to arrange the available modes and their own stations, according to several metrics and based on the user requirements. Thus, helping for optimum mode and network selection that will improve the system performance while satisfying the user requirements. The analytical results show the importance of taking the effect of the backhaul during the mode selection process and how the backhaul link affects the overall performance.","PeriodicalId":399087,"journal":{"name":"2019 42nd International Conference on Telecommunications and Signal Processing (TSP)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130142462","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-07-01DOI: 10.1109/TSP.2019.8768868
Ilya Makarov, Nikolay Veldyaykin, M. Chertkov, Aleksei Pokoev
In this paper, we compare several real-time sign language dactyl recognition systems and present a new model based on deep convolutional neural networks. These systems are able to recognize Russian alphabet letters presented as static signs in Russian Sign language used by people from deaf community. In such an approach, we recognize words from Russian natural language presented by consequent hand gestures of each letter. We evaluate our approach on Russian (RSL) sign language, for which we collect our own dataset and evaluate dactyl recognition.
{"title":"Russian Sign Language Dactyl Recognition","authors":"Ilya Makarov, Nikolay Veldyaykin, M. Chertkov, Aleksei Pokoev","doi":"10.1109/TSP.2019.8768868","DOIUrl":"https://doi.org/10.1109/TSP.2019.8768868","url":null,"abstract":"In this paper, we compare several real-time sign language dactyl recognition systems and present a new model based on deep convolutional neural networks. These systems are able to recognize Russian alphabet letters presented as static signs in Russian Sign language used by people from deaf community. In such an approach, we recognize words from Russian natural language presented by consequent hand gestures of each letter. We evaluate our approach on Russian (RSL) sign language, for which we collect our own dataset and evaluate dactyl recognition.","PeriodicalId":399087,"journal":{"name":"2019 42nd International Conference on Telecommunications and Signal Processing (TSP)","volume":"129 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130733593","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-07-01DOI: 10.1109/TSP.2019.8769091
S. Vlassis, Giannis Gialenios, G. Souliotis, F. Plessas
This paper presents a novel power detector using a voltage squaring circuit as power sensing element. The proposed solution features low power capabilities, extendable input range and low distortion. The circuit is designed for 1.8V supply voltage and 50A current consumption. The maximum input voltage range is designed to be 250mV and non-linearity is less than 1% for 14dB dynamic range. The circuit is tested using 65nm CMOS triple well process and simulation results verify the theoretical analysis.
{"title":"Power Detector Based On Voltage Squaring","authors":"S. Vlassis, Giannis Gialenios, G. Souliotis, F. Plessas","doi":"10.1109/TSP.2019.8769091","DOIUrl":"https://doi.org/10.1109/TSP.2019.8769091","url":null,"abstract":"This paper presents a novel power detector using a voltage squaring circuit as power sensing element. The proposed solution features low power capabilities, extendable input range and low distortion. The circuit is designed for 1.8V supply voltage and 50A current consumption. The maximum input voltage range is designed to be 250mV and non-linearity is less than 1% for 14dB dynamic range. The circuit is tested using 65nm CMOS triple well process and simulation results verify the theoretical analysis.","PeriodicalId":399087,"journal":{"name":"2019 42nd International Conference on Telecommunications and Signal Processing (TSP)","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130759124","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-07-01DOI: 10.1109/TSP.2019.8769064
Tomáš Jakubík, Jiri Jenícek
This article describes implementation of a special software defined receiver for a frequency hopping sensor network. The receiver is implemented on LPC4370 Cortex-M MCU with R820T2 RF demodulator. The resulting prototype can receive frequency modulated packet on any of 51 frequency channels. That enables star topology frequency hopping network to have unsynchronized sleeping sensors with fast reaction times. The principles explained in this article are valuable not only for this network, but as well for implementation of any software defined receiver with low cost and reasonable power consumption.
{"title":"SDR All-channels Receiver for FHSS Sensor Network in Cortex-M","authors":"Tomáš Jakubík, Jiri Jenícek","doi":"10.1109/TSP.2019.8769064","DOIUrl":"https://doi.org/10.1109/TSP.2019.8769064","url":null,"abstract":"This article describes implementation of a special software defined receiver for a frequency hopping sensor network. The receiver is implemented on LPC4370 Cortex-M MCU with R820T2 RF demodulator. The resulting prototype can receive frequency modulated packet on any of 51 frequency channels. That enables star topology frequency hopping network to have unsynchronized sleeping sensors with fast reaction times. The principles explained in this article are valuable not only for this network, but as well for implementation of any software defined receiver with low cost and reasonable power consumption.","PeriodicalId":399087,"journal":{"name":"2019 42nd International Conference on Telecommunications and Signal Processing (TSP)","volume":"103 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123363757","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-07-01DOI: 10.1109/TSP.2019.8768881
Ankita Dwivedi, Ankit Kumar, M. Dutta, Radim Burget, Vojtech Myska
Protection of data is becoming a crucial task in digital world. This paper proposes a concept for securing biometric data using zero watermarking. Biometric data like a fingerprint, iris, etc. in which unique characters reside, but it may lead to an undesired situation if an attacker tries to copy it from a distributed database. The paper introduces a zero-bit watermarking scheme in iris image. Unlike in conventional watermarking, the watermarked image gets tempered due to distortion of pixels of an image. This paper proposes a robust zero-bit watermarking scheme in which a digital pattern is generated using a unique features from the iris image without tampering the host image. This method uses SVD and DWT for performing zero-bit watermarking and making it stable against several image processing attacks. The features of iris are unique, so the developed algorithm prevents data from duplicity or piracy issues.
{"title":"An Efficient and Robust Zero-Bit Watermarking Technique for Biometric Image Protection","authors":"Ankita Dwivedi, Ankit Kumar, M. Dutta, Radim Burget, Vojtech Myska","doi":"10.1109/TSP.2019.8768881","DOIUrl":"https://doi.org/10.1109/TSP.2019.8768881","url":null,"abstract":"Protection of data is becoming a crucial task in digital world. This paper proposes a concept for securing biometric data using zero watermarking. Biometric data like a fingerprint, iris, etc. in which unique characters reside, but it may lead to an undesired situation if an attacker tries to copy it from a distributed database. The paper introduces a zero-bit watermarking scheme in iris image. Unlike in conventional watermarking, the watermarked image gets tempered due to distortion of pixels of an image. This paper proposes a robust zero-bit watermarking scheme in which a digital pattern is generated using a unique features from the iris image without tampering the host image. This method uses SVD and DWT for performing zero-bit watermarking and making it stable against several image processing attacks. The features of iris are unique, so the developed algorithm prevents data from duplicity or piracy issues.","PeriodicalId":399087,"journal":{"name":"2019 42nd International Conference on Telecommunications and Signal Processing (TSP)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131281609","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-07-01DOI: 10.1109/TSP.2019.8768844
J. Pullmann, Dominik Macko
This paper is focused on increasing communication efficiency of IoT devices by minimizing collisions. We have analysed the existing collision-resolution techniques and used the acquired knowledge to specify a new collision-resolution technique. The proposal consists of a communication protocol for low speed, long range IoT networks with a large number of IoT sensors. The Access Point enables planning of periodically repeated communication into timeslots, which are organized in the transmission timetable. For each timeslot, only one IoT device is assigned to send data. This approach results in collision reduction, which leads to lower power consumption of IoT End Devices.
{"title":"Increasing Energy Efficiency by Minimizing Collisions in Long-Range IoT Networks","authors":"J. Pullmann, Dominik Macko","doi":"10.1109/TSP.2019.8768844","DOIUrl":"https://doi.org/10.1109/TSP.2019.8768844","url":null,"abstract":"This paper is focused on increasing communication efficiency of IoT devices by minimizing collisions. We have analysed the existing collision-resolution techniques and used the acquired knowledge to specify a new collision-resolution technique. The proposal consists of a communication protocol for low speed, long range IoT networks with a large number of IoT sensors. The Access Point enables planning of periodically repeated communication into timeslots, which are organized in the transmission timetable. For each timeslot, only one IoT device is assigned to send data. This approach results in collision reduction, which leads to lower power consumption of IoT End Devices.","PeriodicalId":399087,"journal":{"name":"2019 42nd International Conference on Telecommunications and Signal Processing (TSP)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133015776","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}