首页 > 最新文献

2019 42nd International Conference on Telecommunications and Signal Processing (TSP)最新文献

英文 中文
Detecting Cluster Synchronization in Chaotic Dynamic Networks via Information Theoretic Measures 基于信息理论的混沌动态网络簇同步检测
Özge Canlı, Serkan Günel
Sub-systems in a network of chaotic dynamic systems can form clusters of synchronization. In this study, we investigate the problem of detection of cluster synchronization via information theoretic measures. We have shown that, if the existing information measures in the literature, particularly transfer entropy, is estimated from sequential observations of continuous chaotic systems, it is hard to detect cluster synchronization, directly. On the other hand, if the state space is reconstructed from the observed data in the light of Takens’ embedding theorem first, the cluster synchronization can be detected easily.
混沌动态系统网络中的子系统可以形成同步集群。本文研究了利用信息理论方法检测集群同步的问题。我们已经证明,如果文献中现有的信息度量,特别是传递熵,是从连续混沌系统的顺序观测中估计的,那么很难直接检测集群同步。另一方面,如果首先根据Takens嵌入定理从观测数据重构状态空间,则可以很容易地检测到集群同步。
{"title":"Detecting Cluster Synchronization in Chaotic Dynamic Networks via Information Theoretic Measures","authors":"Özge Canlı, Serkan Günel","doi":"10.1109/TSP.2019.8768823","DOIUrl":"https://doi.org/10.1109/TSP.2019.8768823","url":null,"abstract":"Sub-systems in a network of chaotic dynamic systems can form clusters of synchronization. In this study, we investigate the problem of detection of cluster synchronization via information theoretic measures. We have shown that, if the existing information measures in the literature, particularly transfer entropy, is estimated from sequential observations of continuous chaotic systems, it is hard to detect cluster synchronization, directly. On the other hand, if the state space is reconstructed from the observed data in the light of Takens’ embedding theorem first, the cluster synchronization can be detected easily.","PeriodicalId":399087,"journal":{"name":"2019 42nd International Conference on Telecommunications and Signal Processing (TSP)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114225685","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Accuracy of statistical machine learning methods in identifying client behavior patterns at network edge 统计机器学习方法在网络边缘识别客户行为模式中的准确性
Michal Zygmunt, Marek Konieczny, Sławomir Zieliński
This paper is focused on evaluating the applicability of statistical machine learning methods to identifying flows and user behavior patterns at the source (client) network edge. The research was conducted in a mid-size (covering ca 150 geographically scattered locations) network developed for the Malopolska Educational Cloud (MEC) project. Due to the lack of validation sets we focused on unsupervised learning methods. Modules implementing the methods were fed with the headers of the user-generated packets; payloads were not analyzed due to privacy concerns. The presented research proved that in client edge networks even the simple classification methods yield satisfactory results in flows classification.
本文的重点是评估统计机器学习方法在源(客户端)网络边缘识别流量和用户行为模式的适用性。这项研究是在为Malopolska教育云(MEC)项目开发的一个中型(覆盖大约150个地理分散的地点)网络中进行的。由于缺乏验证集,我们专注于无监督学习方法。实现这些方法的模块被输入用户生成的包的头;出于隐私考虑,没有对有效载荷进行分析。研究表明,在客户端网络中,即使是简单的分类方法也能获得令人满意的流量分类结果。
{"title":"Accuracy of statistical machine learning methods in identifying client behavior patterns at network edge","authors":"Michal Zygmunt, Marek Konieczny, Sławomir Zieliński","doi":"10.1109/TSP.2019.8768885","DOIUrl":"https://doi.org/10.1109/TSP.2019.8768885","url":null,"abstract":"This paper is focused on evaluating the applicability of statistical machine learning methods to identifying flows and user behavior patterns at the source (client) network edge. The research was conducted in a mid-size (covering ca 150 geographically scattered locations) network developed for the Malopolska Educational Cloud (MEC) project. Due to the lack of validation sets we focused on unsupervised learning methods. Modules implementing the methods were fed with the headers of the user-generated packets; payloads were not analyzed due to privacy concerns. The presented research proved that in client edge networks even the simple classification methods yield satisfactory results in flows classification.","PeriodicalId":399087,"journal":{"name":"2019 42nd International Conference on Telecommunications and Signal Processing (TSP)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114883224","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Adaptive Resource Scheduling based on Neural Network and Mobile Traffic Prediction 基于神经网络和移动流量预测的自适应资源调度
Plamen T. Semov, P. Koleva, V. Poulkov
Nowadays with the deployment of a large and dense heterogeneous networks more sophisticated algorithms for resource scheduling are needed. Implementing hard coded scheduling algorithms without taking into account the very specific dynamic of the traffic generated by the mobile users can lead to a network performance quite far from the optimal. By using novel machine learning (ML) algorithms we can store not only the raw traffic data and its variations but also build the so-called heat maps, reflecting the changes of the traffic over time, space and per user. Using neural network (NN) architectures, trained by the raw data statistics, we can store the network traffic model at minimum data storage without the need of keeping and looking up at the raw data. Using such NN architecture the network state in next time intervals could be predicted and this prediction used for decision making about how the network resources to be scheduled among the active mobile users. To implement adaptive resource scheduling named “AdaptSch” a neural network architecture with two main blocks is proposed. The simulation results show that by incorporating a neural classifier for adapting the resource scheduler we can utilize the advantages and the effectiveness of multiple scheduler algorithms and improve overall throughput and packet delay.
随着大型、密集异构网络的部署,需要更复杂的资源调度算法。实现硬编码调度算法而不考虑移动用户产生的流量的非常具体的动态,可能导致网络性能与最佳性能相去甚远。通过使用新颖的机器学习(ML)算法,我们不仅可以存储原始流量数据及其变化,还可以构建所谓的热图,反映流量随时间、空间和每个用户的变化。利用经过原始数据统计训练的神经网络(NN)架构,我们可以在不需要保存和查找原始数据的情况下,以最小的数据存储网络流量模型。利用这种神经网络结构,可以预测下一个时间间隔内的网络状态,并将此预测用于如何在活动移动用户之间调度网络资源的决策。为了实现自适应资源调度,提出了一种由两个主要模块组成的神经网络结构。仿真结果表明,通过引入神经分类器来适应资源调度,可以利用多种调度算法的优点和有效性,提高整体吞吐量和数据包延迟。
{"title":"Adaptive Resource Scheduling based on Neural Network and Mobile Traffic Prediction","authors":"Plamen T. Semov, P. Koleva, V. Poulkov","doi":"10.1109/TSP.2019.8769088","DOIUrl":"https://doi.org/10.1109/TSP.2019.8769088","url":null,"abstract":"Nowadays with the deployment of a large and dense heterogeneous networks more sophisticated algorithms for resource scheduling are needed. Implementing hard coded scheduling algorithms without taking into account the very specific dynamic of the traffic generated by the mobile users can lead to a network performance quite far from the optimal. By using novel machine learning (ML) algorithms we can store not only the raw traffic data and its variations but also build the so-called heat maps, reflecting the changes of the traffic over time, space and per user. Using neural network (NN) architectures, trained by the raw data statistics, we can store the network traffic model at minimum data storage without the need of keeping and looking up at the raw data. Using such NN architecture the network state in next time intervals could be predicted and this prediction used for decision making about how the network resources to be scheduled among the active mobile users. To implement adaptive resource scheduling named “AdaptSch” a neural network architecture with two main blocks is proposed. The simulation results show that by incorporating a neural classifier for adapting the resource scheduler we can utilize the advantages and the effectiveness of multiple scheduler algorithms and improve overall throughput and packet delay.","PeriodicalId":399087,"journal":{"name":"2019 42nd International Conference on Telecommunications and Signal Processing (TSP)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122582228","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Segmentation of gliomas in magnetic resonance images using recurrent neural networks 磁共振图像中胶质瘤的递归神经网络分割
Stefan Grivalsky, Martin Tamajka, Wanda Benesova
In our work we focus on automatic segmentation of high-grade gliomas (HGG) from magnetic resonance images (MRI). The results of segmentation have great impact on treatment of patients and consequently on the length of their life. In this paper a new approach of automatic glioma segmentation based on recurrent neural units is proposed. We use the Long Short-Term Memory units (LSTMs) which are able to extract latent features of brain structure by global contextual information. Unlike convolutional neural networks, where global context is gained by combination of local features, LSTMs have the potential to capture the global context at once. We use a region-based classification using the 3D Hilbert space-filling curve. To evaluate this method, the HGG data from the International Multimodal Brain Tumor Segmentation (BraTS-17) Challenge 2017 are being used. Our method achieved a dice score 0.62, 0.77, 0.64, on validation dataset of BraTS-17, for enhancing tumor, whole tumor and tumor core, respectively.
在我们的工作中,我们专注于从磁共振图像(MRI)中自动分割高级别胶质瘤(HGG)。分割的结果对患者的治疗有很大的影响,从而影响患者的生命长度。提出了一种基于递归神经单元的神经胶质瘤自动分割方法。我们使用长短期记忆单元(LSTMs),它能够通过全局上下文信息提取大脑结构的潜在特征。与卷积神经网络不同,卷积神经网络通过结合局部特征获得全局上下文,lstm具有立即捕获全局上下文的潜力。我们使用基于区域的分类,使用3D希尔伯特空间填充曲线。为了评估这种方法,正在使用2017年国际多模式脑肿瘤分割(BraTS-17)挑战的HGG数据。我们的方法在BraTS-17验证数据集上对肿瘤、整个肿瘤和肿瘤核心的增强分别获得了0.62、0.77和0.64的骰子得分。
{"title":"Segmentation of gliomas in magnetic resonance images using recurrent neural networks","authors":"Stefan Grivalsky, Martin Tamajka, Wanda Benesova","doi":"10.1109/TSP.2019.8769056","DOIUrl":"https://doi.org/10.1109/TSP.2019.8769056","url":null,"abstract":"In our work we focus on automatic segmentation of high-grade gliomas (HGG) from magnetic resonance images (MRI). The results of segmentation have great impact on treatment of patients and consequently on the length of their life. In this paper a new approach of automatic glioma segmentation based on recurrent neural units is proposed. We use the Long Short-Term Memory units (LSTMs) which are able to extract latent features of brain structure by global contextual information. Unlike convolutional neural networks, where global context is gained by combination of local features, LSTMs have the potential to capture the global context at once. We use a region-based classification using the 3D Hilbert space-filling curve. To evaluate this method, the HGG data from the International Multimodal Brain Tumor Segmentation (BraTS-17) Challenge 2017 are being used. Our method achieved a dice score 0.62, 0.77, 0.64, on validation dataset of BraTS-17, for enhancing tumor, whole tumor and tumor core, respectively.","PeriodicalId":399087,"journal":{"name":"2019 42nd International Conference on Telecommunications and Signal Processing (TSP)","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122602106","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
IoT System for Forest Monitoring 森林监测物联网系统
Alina Elena Marcu, G. Suciu, E. Olteanu, Delia Miu, Alexandru Drosu, I. Marcu
Several important issues are affecting the forest environment due to deforestation and natural disasters (for example forest fires, or increased gas emissions). This paper proposes an intelligent forest environment monitoring solution based on the Raspberry Pi Model 3, analogical and digital sensors and signals analysis algorithms. Parameters such as temperature, gas concentrations, soil humidity etc. are monitored with sensors while background sounds are analyzed with a classification algorithm on the basis of which the generated event can be classified into one of the following categories: Chainsaw, Vehicle, or Forest background noise. The user’s accessibility to the collected data is ensured via Internet and a mobile applications that allows the user to receive notifications, whenever fire, pollution sources, or illegal deforestation are detected. The SeaForest environment monitoring solution is an IoT project, addressed to public and private forest owners as well as to national environmental and disaster response authorities.
由于森林砍伐和自然灾害(例如森林火灾或气体排放增加),一些重要问题正在影响森林环境。本文提出了一种基于树莓派Model 3、模拟和数字传感器以及信号分析算法的森林环境智能监测方案。传感器监测温度、气体浓度、土壤湿度等参数,同时使用分类算法分析背景声音,在此基础上,生成的事件可以分为以下类别之一:电锯、车辆或森林背景噪音。用户可以通过互联网和移动应用程序访问收集到的数据,一旦发现火灾、污染源或非法砍伐森林,用户就可以收到通知。海洋森林环境监测解决方案是一个物联网项目,面向公共和私人森林所有者以及国家环境和灾害应对部门。
{"title":"IoT System for Forest Monitoring","authors":"Alina Elena Marcu, G. Suciu, E. Olteanu, Delia Miu, Alexandru Drosu, I. Marcu","doi":"10.1109/TSP.2019.8768835","DOIUrl":"https://doi.org/10.1109/TSP.2019.8768835","url":null,"abstract":"Several important issues are affecting the forest environment due to deforestation and natural disasters (for example forest fires, or increased gas emissions). This paper proposes an intelligent forest environment monitoring solution based on the Raspberry Pi Model 3, analogical and digital sensors and signals analysis algorithms. Parameters such as temperature, gas concentrations, soil humidity etc. are monitored with sensors while background sounds are analyzed with a classification algorithm on the basis of which the generated event can be classified into one of the following categories: Chainsaw, Vehicle, or Forest background noise. The user’s accessibility to the collected data is ensured via Internet and a mobile applications that allows the user to receive notifications, whenever fire, pollution sources, or illegal deforestation are detected. The SeaForest environment monitoring solution is an IoT project, addressed to public and private forest owners as well as to national environmental and disaster response authorities.","PeriodicalId":399087,"journal":{"name":"2019 42nd International Conference on Telecommunications and Signal Processing (TSP)","volume":"339 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124772375","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Biometric authentication using evoked potentials stimulated by personal ultrasound 利用个人超声刺激的诱发电位进行生物识别认证
I. Nakanishi, Takehiro Maruoka
In recent years, biometrics such as fingerprints and iris scans has been used in authentication. However, conventional biometrics is vulnerable to identity theft, especially in user management systems. As a new biometric without this vulnerability, we focused on brain waves. In this paper, we show that individuals can be authenticated using evoked potentials when they are subjected to ultrasound. We measured the electroencephalograms (EEGs) of 10 experimental subjects. Individual features were extracted from the power spectra of the EEGs using the principle component analysis and verification was achieved using the support vector machine. We found that for the proposed authentication method, the equal error rate for a single electrode was about 22-32 %. For a multi-electrode, the equal error rate was 4.4 % using the majority decision rule.
近年来,指纹和虹膜扫描等生物识别技术已被用于身份验证。然而,传统的生物识别技术容易受到身份盗窃的影响,特别是在用户管理系统中。作为一种没有这种脆弱性的新生物识别技术,我们专注于脑电波。在本文中,我们表明,当个体受到超声波时,可以使用诱发电位进行身份验证。我们测量了10名实验对象的脑电图(eeg)。利用主成分分析方法从脑电信号的功率谱中提取个体特征,并利用支持向量机进行验证。我们发现,对于所提出的认证方法,单个电极的等错误率约为22- 32%。对于多电极,使用多数决定规则的相等错误率为4.4%。
{"title":"Biometric authentication using evoked potentials stimulated by personal ultrasound","authors":"I. Nakanishi, Takehiro Maruoka","doi":"10.1109/TSP.2019.8769090","DOIUrl":"https://doi.org/10.1109/TSP.2019.8769090","url":null,"abstract":"In recent years, biometrics such as fingerprints and iris scans has been used in authentication. However, conventional biometrics is vulnerable to identity theft, especially in user management systems. As a new biometric without this vulnerability, we focused on brain waves. In this paper, we show that individuals can be authenticated using evoked potentials when they are subjected to ultrasound. We measured the electroencephalograms (EEGs) of 10 experimental subjects. Individual features were extracted from the power spectra of the EEGs using the principle component analysis and verification was achieved using the support vector machine. We found that for the proposed authentication method, the equal error rate for a single electrode was about 22-32 %. For a multi-electrode, the equal error rate was 4.4 % using the majority decision rule.","PeriodicalId":399087,"journal":{"name":"2019 42nd International Conference on Telecommunications and Signal Processing (TSP)","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126421204","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Application for Determining whether IP Addresses belong to a Map by Coordinates 根据坐标判断IP地址是否属于Map的应用
V. Oujezský, T. Horváth, P. Munster
This article presents a part of our project focused on developing a measuring device for Gigabit-capable Passive Optical Networks. A part of the device is a Python application used to detect whether captured IP addresses belong to a map by their coordinates. Two methods are tested and compared. First, a clustering method to calculate if given IP lies inside a created map based on latitude and longitude positions, and the other, an intersection method for the same purpose. It is our idea to verify that either this method can be used for localization purposes. With this article, a basic schema and functionality of the application and tests results of the methods are described.
本文介绍了我们项目的一部分,重点是开发千兆无源光网络的测量设备。该设备的一部分是一个Python应用程序,用于检测捕获的IP地址是否属于地图的坐标。对两种方法进行了测试和比较。首先,一种聚类方法计算给定的IP是否位于基于纬度和经度位置创建的地图内,另一种是用于相同目的的交集方法。我们的想法是验证这两种方法中的任何一种都可以用于定位目的。本文描述了应用程序的基本模式和功能,以及方法的测试结果。
{"title":"Application for Determining whether IP Addresses belong to a Map by Coordinates","authors":"V. Oujezský, T. Horváth, P. Munster","doi":"10.1109/TSP.2019.8769100","DOIUrl":"https://doi.org/10.1109/TSP.2019.8769100","url":null,"abstract":"This article presents a part of our project focused on developing a measuring device for Gigabit-capable Passive Optical Networks. A part of the device is a Python application used to detect whether captured IP addresses belong to a map by their coordinates. Two methods are tested and compared. First, a clustering method to calculate if given IP lies inside a created map based on latitude and longitude positions, and the other, an intersection method for the same purpose. It is our idea to verify that either this method can be used for localization purposes. With this article, a basic schema and functionality of the application and tests results of the methods are described.","PeriodicalId":399087,"journal":{"name":"2019 42nd International Conference on Telecommunications and Signal Processing (TSP)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129580094","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Joint Encryption and Compression of Audio Based on Compressive Sensing 基于压缩感知的音频联合加密与压缩
R. Moreno-Alvarado, Eduardo Rivera-Jaramillo, M. Nakano-Miyatake, H. Meana
The increasing amount of sensible information transmitted through insecure communications channels requires, the development of algorithms with the capacity of simultaneously compress and encrypt digital information. To solve this problem, this paper proposes an algorithm based on compressing sensing, which simultaneously compress and encrypt audio signals. In the proposed scheme the audio signal is segmented in frames of1000 samples which are then transformed in sparse frames using the DCT. Next each sparse frame is compressed using a different sensing matrix in each frame, to assure that the proposed system satisfies the Extended Wyner Secrecy (EWS) criterion. Evaluation results show that the proposed scheme allows the secure communication of audio signals.
通过不安全通信信道传输的敏感信息越来越多,要求开发能够同时压缩和加密数字信息的算法。为了解决这一问题,本文提出了一种基于压缩感知的音频信号压缩加密算法。在该方案中,音频信号被分割成1000个样本的帧,然后使用DCT在稀疏帧中进行变换。然后在每个稀疏帧中使用不同的感知矩阵进行压缩,以确保所提出的系统满足扩展怀纳保密(EWS)准则。评估结果表明,该方案能够实现音频信号的安全通信。
{"title":"Joint Encryption and Compression of Audio Based on Compressive Sensing","authors":"R. Moreno-Alvarado, Eduardo Rivera-Jaramillo, M. Nakano-Miyatake, H. Meana","doi":"10.1109/TSP.2019.8769030","DOIUrl":"https://doi.org/10.1109/TSP.2019.8769030","url":null,"abstract":"The increasing amount of sensible information transmitted through insecure communications channels requires, the development of algorithms with the capacity of simultaneously compress and encrypt digital information. To solve this problem, this paper proposes an algorithm based on compressing sensing, which simultaneously compress and encrypt audio signals. In the proposed scheme the audio signal is segmented in frames of1000 samples which are then transformed in sparse frames using the DCT. Next each sparse frame is compressed using a different sensing matrix in each frame, to assure that the proposed system satisfies the Extended Wyner Secrecy (EWS) criterion. Evaluation results show that the proposed scheme allows the secure communication of audio signals.","PeriodicalId":399087,"journal":{"name":"2019 42nd International Conference on Telecommunications and Signal Processing (TSP)","volume":"60 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131155611","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
An Image Processing based Identification of Fish Exposed to Polluted Water 基于图像处理的水体污染鱼类识别
Ritesh Maurya, M. Dutta, K. Říha, Petr Kritz
Water bodies are getting polluted day by day due to discharge of industrial waste, agricultural waste, waste water and other effluents which in turn causing harm to health status to living organism including fish. The proposed work used an image processing based framework to identify the fish exposed to polluted water. The proposed work segments fish gills and contributes in identification of texture features that can be used to distinguish normal fish from fish exposed to pollution. It was evident from the statistical analysis of these features that there occured changes in the texture properties of fish gill which were exposed to such pollutants.
由于工业废物、农业废物、废水和其他污水的排放,水体日益受到污染,进而对包括鱼类在内的生物的健康状况造成危害。提出的工作使用基于图像处理的框架来识别暴露在污染水中的鱼。提出的工作片段鱼鳃,并有助于识别纹理特征,可用于区分正常的鱼和鱼暴露于污染。从这些特征的统计分析可以看出,暴露于这些污染物的鱼鳃的结构特性发生了变化。
{"title":"An Image Processing based Identification of Fish Exposed to Polluted Water","authors":"Ritesh Maurya, M. Dutta, K. Říha, Petr Kritz","doi":"10.1109/TSP.2019.8768856","DOIUrl":"https://doi.org/10.1109/TSP.2019.8768856","url":null,"abstract":"Water bodies are getting polluted day by day due to discharge of industrial waste, agricultural waste, waste water and other effluents which in turn causing harm to health status to living organism including fish. The proposed work used an image processing based framework to identify the fish exposed to polluted water. The proposed work segments fish gills and contributes in identification of texture features that can be used to distinguish normal fish from fish exposed to pollution. It was evident from the statistical analysis of these features that there occured changes in the texture properties of fish gill which were exposed to such pollutants.","PeriodicalId":399087,"journal":{"name":"2019 42nd International Conference on Telecommunications and Signal Processing (TSP)","volume":"89 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134377227","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A prototype of Audio-Visual Broadcast Transcription System 视听广播转录系统的原型
J. Chaloupka
This paper focuses on the use of methods and algorithms from the area of speech processing and recognition and from the area of machine vision for designing of system for automatic audio-visual broadcast transcription. The resulting audio-visual system has been designed and created mainly for transcription of huge video databases with TV recordings in this work. The visual signal processing and recognition is usually several times computationally more demanding than audio signal processing and recognition. Therefore, all applied machine vision methods and algorithms were considered with respect to low computing time as well as the highest possible recognition rate. Our proposed broadcast transcription system was extended by several modules for visual signal segmentation, for TV channel identification, for face detection and identification and for Optical Character Recognition (OCR).
本文主要研究了利用语音处理与识别和机器视觉领域的方法和算法来设计音像广播自动抄录系统。由此产生的视听系统的设计和创建主要是为了转录庞大的电视录像视频数据库。视觉信号处理和识别的计算量通常是音频信号处理和识别的数倍。因此,所有应用的机器视觉方法和算法都考虑到计算时间短以及尽可能高的识别率。我们提出的广播转录系统扩展了几个模块,用于视觉信号分割,电视频道识别,人脸检测和识别以及光学字符识别(OCR)。
{"title":"A prototype of Audio-Visual Broadcast Transcription System","authors":"J. Chaloupka","doi":"10.1109/TSP.2019.8769103","DOIUrl":"https://doi.org/10.1109/TSP.2019.8769103","url":null,"abstract":"This paper focuses on the use of methods and algorithms from the area of speech processing and recognition and from the area of machine vision for designing of system for automatic audio-visual broadcast transcription. The resulting audio-visual system has been designed and created mainly for transcription of huge video databases with TV recordings in this work. The visual signal processing and recognition is usually several times computationally more demanding than audio signal processing and recognition. Therefore, all applied machine vision methods and algorithms were considered with respect to low computing time as well as the highest possible recognition rate. Our proposed broadcast transcription system was extended by several modules for visual signal segmentation, for TV channel identification, for face detection and identification and for Optical Character Recognition (OCR).","PeriodicalId":399087,"journal":{"name":"2019 42nd International Conference on Telecommunications and Signal Processing (TSP)","volume":"138 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133663313","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
2019 42nd International Conference on Telecommunications and Signal Processing (TSP)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1