Pub Date : 2013-05-12DOI: 10.1109/WOSSPA.2013.6602387
Christophe Gisler, A. Ridi, Damien Zujferey, Omar Abou Khaled, J. Hennebert
We report on the creation of a database of appliance consumption signatures and two test protocols to be used for appliance recognition tasks. By means of plug-based low-end sensors measuring the electrical consumption at low frequency, typically every 10 seconds, we made two acquisition sessions of one hour on about 100 home appliances divided into 10 categories: mobile phones (via chargers), coffee machines, computer stations (including monitor), fridges and freezers, Hi-Fi systems (CD players), lamp (CFL), laptops (via chargers), microwave oven, printers, and televisions (LCD or LED). We measured their consumption in terms of real power (W), reactive power (var), RMS current (A) and phase of voltage relative to current (φ). We now give free access to this ACS-Fl database. The proposed test protocols will help the scientific community to objectively compare new algorithms.
{"title":"Appliance consumption signature database and recognition test protocols","authors":"Christophe Gisler, A. Ridi, Damien Zujferey, Omar Abou Khaled, J. Hennebert","doi":"10.1109/WOSSPA.2013.6602387","DOIUrl":"https://doi.org/10.1109/WOSSPA.2013.6602387","url":null,"abstract":"We report on the creation of a database of appliance consumption signatures and two test protocols to be used for appliance recognition tasks. By means of plug-based low-end sensors measuring the electrical consumption at low frequency, typically every 10 seconds, we made two acquisition sessions of one hour on about 100 home appliances divided into 10 categories: mobile phones (via chargers), coffee machines, computer stations (including monitor), fridges and freezers, Hi-Fi systems (CD players), lamp (CFL), laptops (via chargers), microwave oven, printers, and televisions (LCD or LED). We measured their consumption in terms of real power (W), reactive power (var), RMS current (A) and phase of voltage relative to current (φ). We now give free access to this ACS-Fl database. The proposed test protocols will help the scientific community to objectively compare new algorithms.","PeriodicalId":417940,"journal":{"name":"2013 8th International Workshop on Systems, Signal Processing and their Applications (WoSSPA)","volume":"151 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-05-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134280857","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-05-12DOI: 10.1109/WOSSPA.2013.6602372
Hichem Betaouaf, A. Bessaid
A biometric system establishes an authenticity of a specific physiological or behavioral trait of an individual. In this paper, we evaluate a retinal identification algorithm based on fundus images mainly on retinal vascular network that is a characteristic of the most reliable biometric identification. In order to extract the features, a segmentation of the vascular network is performed using a powerful morphological technique called watershed. This technique allows extracting, faithfully, the vascular skeleton that will eventually be used for detecting biometric attributes of the network such as bifurcation points and crossing branches. Finally, our algorithm performs model comparison made based on these characteristics. We test our algorithm on a retinal images database ARIA. The experimental results are interpreted and a decision threshold of the correspondence between the images is determined. For evaluating, the resulting classification system is tested on the images; its sensitivity and specificity are then estimated.
{"title":"A biometric identification algorithm based on retinal blood vessels segmentation using watershed transformation","authors":"Hichem Betaouaf, A. Bessaid","doi":"10.1109/WOSSPA.2013.6602372","DOIUrl":"https://doi.org/10.1109/WOSSPA.2013.6602372","url":null,"abstract":"A biometric system establishes an authenticity of a specific physiological or behavioral trait of an individual. In this paper, we evaluate a retinal identification algorithm based on fundus images mainly on retinal vascular network that is a characteristic of the most reliable biometric identification. In order to extract the features, a segmentation of the vascular network is performed using a powerful morphological technique called watershed. This technique allows extracting, faithfully, the vascular skeleton that will eventually be used for detecting biometric attributes of the network such as bifurcation points and crossing branches. Finally, our algorithm performs model comparison made based on these characteristics. We test our algorithm on a retinal images database ARIA. The experimental results are interpreted and a decision threshold of the correspondence between the images is determined. For evaluating, the resulting classification system is tested on the images; its sensitivity and specificity are then estimated.","PeriodicalId":417940,"journal":{"name":"2013 8th International Workshop on Systems, Signal Processing and their Applications (WoSSPA)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-05-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134327977","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-05-12DOI: 10.1109/WOSSPA.2013.6602382
Allan Tart, T. Trump
Mode S or mode “select” is a sort for a data exchange protocol used for air surveillance purposes. In here “select” means that the radar addresses its interrogation to one particular aircraft instead of interrogation with all planes inside the main beam of the radar antenna. Because of high equipage of Mode S transponders, it has become one of the cornerstones of today's air surveillance used for air traffic control purposes. Because of complex environments, such as airports with high number of reflecting surfaces and Mode S capable transponders, state-of-the-art algorithms must be used to overcome problems and to achieve maximum benefit from using enhanced surveillance systems. In this paper we investigate channel equalizer for Mode S receiver based on a combination of two adaptive filters.
{"title":"Adaptive equalizer for Mode S receiver","authors":"Allan Tart, T. Trump","doi":"10.1109/WOSSPA.2013.6602382","DOIUrl":"https://doi.org/10.1109/WOSSPA.2013.6602382","url":null,"abstract":"Mode S or mode “select” is a sort for a data exchange protocol used for air surveillance purposes. In here “select” means that the radar addresses its interrogation to one particular aircraft instead of interrogation with all planes inside the main beam of the radar antenna. Because of high equipage of Mode S transponders, it has become one of the cornerstones of today's air surveillance used for air traffic control purposes. Because of complex environments, such as airports with high number of reflecting surfaces and Mode S capable transponders, state-of-the-art algorithms must be used to overcome problems and to achieve maximum benefit from using enhanced surveillance systems. In this paper we investigate channel equalizer for Mode S receiver based on a combination of two adaptive filters.","PeriodicalId":417940,"journal":{"name":"2013 8th International Workshop on Systems, Signal Processing and their Applications (WoSSPA)","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-05-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121448354","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-05-12DOI: 10.1109/WOSSPA.2013.6602343
Melouah Ahlem
The objective of segmentation operation is to separate the mass from the rest of the breast by trying to delimit its borders correctly. This article presents a semi-automatic mass extraction method by application of an adaptive region growing segmentation technique. The region growing process is guided by regional feature analysis; consequently, the result will be a robust algorithm able of respecting various image characteristics.
{"title":"Toward an adaptive extraction method of masses in digitized mammograms","authors":"Melouah Ahlem","doi":"10.1109/WOSSPA.2013.6602343","DOIUrl":"https://doi.org/10.1109/WOSSPA.2013.6602343","url":null,"abstract":"The objective of segmentation operation is to separate the mass from the rest of the breast by trying to delimit its borders correctly. This article presents a semi-automatic mass extraction method by application of an adaptive region growing segmentation technique. The region growing process is guided by regional feature analysis; consequently, the result will be a robust algorithm able of respecting various image characteristics.","PeriodicalId":417940,"journal":{"name":"2013 8th International Workshop on Systems, Signal Processing and their Applications (WoSSPA)","volume":"169 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-05-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116666298","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-05-12DOI: 10.1109/WOSSPA.2013.6602418
M. Zaaimia, R. Touhami, A. Hamza, M. Yagoub
IEEE 802.11ad is the new Wi-Fi standard operating at 60 GHz. This paper investigate the performance of specified modulation and coding schemes in additive white Gaussian noise channel and realistic 60 GHz band multipath fading channel. Three 802.11 ad physical layers, namely orthogonal frequency division multiplex physical layer, Single Carrier and Low Power Single carrier physical layer, are designed and evaluated in terms of bit error rate and packet error rate performances. Simulation results show that single carrier modes in most cases outperforms OFDM modes in LOS and NLOS scenarios. QAM based modulation schemes are sensitive to marginal channel conditions and provide poor performance in NLOS case, while BPSK and QPSK modulation schemes with low density parity coding are relatively more robust, and present a good choice at the cost of data rate reduction.
{"title":"Design and performance evaluation of 802.11ad phys in 60 GHz multipath fading channel","authors":"M. Zaaimia, R. Touhami, A. Hamza, M. Yagoub","doi":"10.1109/WOSSPA.2013.6602418","DOIUrl":"https://doi.org/10.1109/WOSSPA.2013.6602418","url":null,"abstract":"IEEE 802.11ad is the new Wi-Fi standard operating at 60 GHz. This paper investigate the performance of specified modulation and coding schemes in additive white Gaussian noise channel and realistic 60 GHz band multipath fading channel. Three 802.11 ad physical layers, namely orthogonal frequency division multiplex physical layer, Single Carrier and Low Power Single carrier physical layer, are designed and evaluated in terms of bit error rate and packet error rate performances. Simulation results show that single carrier modes in most cases outperforms OFDM modes in LOS and NLOS scenarios. QAM based modulation schemes are sensitive to marginal channel conditions and provide poor performance in NLOS case, while BPSK and QPSK modulation schemes with low density parity coding are relatively more robust, and present a good choice at the cost of data rate reduction.","PeriodicalId":417940,"journal":{"name":"2013 8th International Workshop on Systems, Signal Processing and their Applications (WoSSPA)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-05-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116800451","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-05-12DOI: 10.1109/WOSSPA.2013.6602410
L. Kassa-Baghdouche, L. M. Simohamed
The performance limitations due to interferometer phase error (IPE) and Chromatic Dispersion (CD) in a 40 Gbit/s optical Differential Phase-Shift-Keying (DPSK) transmission system are investigated through simulations. Two different optical filters (Fabry-Perot filter (FP) or Fiber Bragg Grating filter (FBG)) and both return-to-zero (RZ) and non-return-to-zero (NRZ) codings were assumed to find out whether these different configurations showed better performances. By means of numerical simulations, we optimize the bandwidths of the optical and electrical receiver's filters. Then, the impact of the IPE on the Bit Error Rate (BER) performance is analyzed when the received signal is filtered by two types of optical filter. The optical power penalties caused by the IPE impact at BER of 10-9 in the presence of CD are evaluated. Simulation results show that, without CD the system suffer a significant amount of power penalties due to the IPE, and the optical filter has an influence on the power penalties, i.e. the system with FBG filter has the better performances than the one with FP filter, while NRZ-DPSK modulation format exhibit almost the same power penalty that RZ-DPSK. However, it is found that with CD, the system which uses FP filter performs better than the one which uses FBG filter, i.e. owing to the presence of CD, the better performances switch from FBG filter to FP filter, whereas RZ-DPSK modulation format is more robust to IPE than NRZ-DPSK while FP optical filter is employed. This provides the basis for a tradeoff between FP & FBG Filters and NRZ-DPSK & RZ-DPSK modulations format through a careful selection of a suitable optical filter and an appropriate modulation format.
{"title":"Interferometer phase error and chromatic dispersion effects on the performances of 40 Gbit/s optical DPSK transmission systems","authors":"L. Kassa-Baghdouche, L. M. Simohamed","doi":"10.1109/WOSSPA.2013.6602410","DOIUrl":"https://doi.org/10.1109/WOSSPA.2013.6602410","url":null,"abstract":"The performance limitations due to interferometer phase error (IPE) and Chromatic Dispersion (CD) in a 40 Gbit/s optical Differential Phase-Shift-Keying (DPSK) transmission system are investigated through simulations. Two different optical filters (Fabry-Perot filter (FP) or Fiber Bragg Grating filter (FBG)) and both return-to-zero (RZ) and non-return-to-zero (NRZ) codings were assumed to find out whether these different configurations showed better performances. By means of numerical simulations, we optimize the bandwidths of the optical and electrical receiver's filters. Then, the impact of the IPE on the Bit Error Rate (BER) performance is analyzed when the received signal is filtered by two types of optical filter. The optical power penalties caused by the IPE impact at BER of 10-9 in the presence of CD are evaluated. Simulation results show that, without CD the system suffer a significant amount of power penalties due to the IPE, and the optical filter has an influence on the power penalties, i.e. the system with FBG filter has the better performances than the one with FP filter, while NRZ-DPSK modulation format exhibit almost the same power penalty that RZ-DPSK. However, it is found that with CD, the system which uses FP filter performs better than the one which uses FBG filter, i.e. owing to the presence of CD, the better performances switch from FBG filter to FP filter, whereas RZ-DPSK modulation format is more robust to IPE than NRZ-DPSK while FP optical filter is employed. This provides the basis for a tradeoff between FP & FBG Filters and NRZ-DPSK & RZ-DPSK modulations format through a careful selection of a suitable optical filter and an appropriate modulation format.","PeriodicalId":417940,"journal":{"name":"2013 8th International Workshop on Systems, Signal Processing and their Applications (WoSSPA)","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-05-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127134836","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-05-12DOI: 10.1109/WOSSPA.2013.6602351
Djamal E. Goumidi, F. Hachouf
Due to their fundamental features, chaotic maps are very suitable for various image encryption schemes. Most of the proposed discrete chaotic cryptographic approaches are based on stream or block cipher schemes. If these two schemes are combined the security level is improved by enhancing the encryption process complexity, the key space and the robustness of the cryptosystem. In the beginning, the image is divided into two sub-images. Next, these two sub-images are encrypted using respectively stream and block cipher schemes. After that, the two sub-images are merged to create enciphered image. Simulation results have shown the effectiveness and the robustness of the proposed scheme.
{"title":"Hybrid chaos-based image encryption approach using block and stream ciphers","authors":"Djamal E. Goumidi, F. Hachouf","doi":"10.1109/WOSSPA.2013.6602351","DOIUrl":"https://doi.org/10.1109/WOSSPA.2013.6602351","url":null,"abstract":"Due to their fundamental features, chaotic maps are very suitable for various image encryption schemes. Most of the proposed discrete chaotic cryptographic approaches are based on stream or block cipher schemes. If these two schemes are combined the security level is improved by enhancing the encryption process complexity, the key space and the robustness of the cryptosystem. In the beginning, the image is divided into two sub-images. Next, these two sub-images are encrypted using respectively stream and block cipher schemes. After that, the two sub-images are merged to create enciphered image. Simulation results have shown the effectiveness and the robustness of the proposed scheme.","PeriodicalId":417940,"journal":{"name":"2013 8th International Workshop on Systems, Signal Processing and their Applications (WoSSPA)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-05-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125961823","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-05-12DOI: 10.1109/WOSSPA.2013.6602391
Ei Mouatassim Benzitounl, L. Falek, H. Teffahi, A. Djeradi
This study aims to identify the compensatory strategies that speaker develops in speech production in noisy environment. We have developed a method which allows studying the effect of noise on acoustic parameters that characterize the speech signal (F0 duration, formants, cepstral and LPC parameters). The results reflect the speakers' attitudes towards noise and allowed a classification of acoustic parameters used in order of the sensitivity to noise. These results can then be decisive in the choice of acoustic parameters in communication systems.
{"title":"Analysis of speech production in a noisy environment","authors":"Ei Mouatassim Benzitounl, L. Falek, H. Teffahi, A. Djeradi","doi":"10.1109/WOSSPA.2013.6602391","DOIUrl":"https://doi.org/10.1109/WOSSPA.2013.6602391","url":null,"abstract":"This study aims to identify the compensatory strategies that speaker develops in speech production in noisy environment. We have developed a method which allows studying the effect of noise on acoustic parameters that characterize the speech signal (F0 duration, formants, cepstral and LPC parameters). The results reflect the speakers' attitudes towards noise and allowed a classification of acoustic parameters used in order of the sensitivity to noise. These results can then be decisive in the choice of acoustic parameters in communication systems.","PeriodicalId":417940,"journal":{"name":"2013 8th International Workshop on Systems, Signal Processing and their Applications (WoSSPA)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-05-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125173471","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-05-12DOI: 10.1109/WOSSPA.2013.6602402
Graeme A. Jones, P. Weber, T. Nohara
This paper explores the means by which 3D radar processing and target tracking can be achieved using conventional 2D marine radar hardware. A typical low-cost marine radar transceiver is coupled with a custom-developed antenna and sophisticated adjunct radar signal/data processor for this task. We look at how a 3D volume may be sampled for a number of different applications, and show how the data can be processed, analysed and visualized as a result. Finally, we provide some example results that have been collected and processed by this radar system.
{"title":"3D radar using augmented 2D hardware — Sampling and processing concepts","authors":"Graeme A. Jones, P. Weber, T. Nohara","doi":"10.1109/WOSSPA.2013.6602402","DOIUrl":"https://doi.org/10.1109/WOSSPA.2013.6602402","url":null,"abstract":"This paper explores the means by which 3D radar processing and target tracking can be achieved using conventional 2D marine radar hardware. A typical low-cost marine radar transceiver is coupled with a custom-developed antenna and sophisticated adjunct radar signal/data processor for this task. We look at how a 3D volume may be sampled for a number of different applications, and show how the data can be processed, analysed and visualized as a result. Finally, we provide some example results that have been collected and processed by this radar system.","PeriodicalId":417940,"journal":{"name":"2013 8th International Workshop on Systems, Signal Processing and their Applications (WoSSPA)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-05-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121856649","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-05-12DOI: 10.1109/WOSSPA.2013.6602376
Abdallah Bengueddoudj, S. Akrouf, Foudil Belhadj, D. Nada
This paper focus on the use of local and global structures for fingerprint minutiae matching, we propose a set of modifications and improvements that increase the speed and accuracy. Reducing the number of minutiae pairs and descriptors are the principal amelioration in the local matching step, in the global matching step, we add more minutiae pairs to align the input fingerprint with the template fingerprint for more accuracy. A series of experiments conducted over the four databases of FVC2004 using a fingerprint verification framework, the results show that our improvements makes the novel algorithm more efficient compared to the original algorithm and other algorithms proposed in the literature.
{"title":"Improving fingerprint minutiae matching using local and global structures","authors":"Abdallah Bengueddoudj, S. Akrouf, Foudil Belhadj, D. Nada","doi":"10.1109/WOSSPA.2013.6602376","DOIUrl":"https://doi.org/10.1109/WOSSPA.2013.6602376","url":null,"abstract":"This paper focus on the use of local and global structures for fingerprint minutiae matching, we propose a set of modifications and improvements that increase the speed and accuracy. Reducing the number of minutiae pairs and descriptors are the principal amelioration in the local matching step, in the global matching step, we add more minutiae pairs to align the input fingerprint with the template fingerprint for more accuracy. A series of experiments conducted over the four databases of FVC2004 using a fingerprint verification framework, the results show that our improvements makes the novel algorithm more efficient compared to the original algorithm and other algorithms proposed in the literature.","PeriodicalId":417940,"journal":{"name":"2013 8th International Workshop on Systems, Signal Processing and their Applications (WoSSPA)","volume":"117 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-05-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123574440","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}