首页 > 最新文献

2017 International Conference on Computer, Communications and Electronics (Comptelix)最新文献

英文 中文
Foreground segmentation using GMM combined temporal differencing 基于GMM结合时间差分的前景分割
Pub Date : 2017-07-01 DOI: 10.1109/COMPTELIX.2017.8004007
Vandta Tiwari, Deepak Chaudhary, Varan Tiwari
Various computer vision applications like biometric identification, analysis of traffic, face detection techniques, video analysis, and surveillance require the use of moving object identification as a fundamental step. A lot of efforts have been made in the past to find approaches which can detect motion but most methods are limited to particular situations and are not applicable everywhere. This paper proposes another, more robust approach towards object detection using Gaussian Mixture Model for background subtraction and temporal differencing for foreground segmentation that provides a promising result with the application of morphological operations and filtering. The GMM approach is a multimodal approach that faces the constraint of outlier pixels because of sudden illumination changes and commonage pixels among object and background. Other limitations of GMM include its learning rate and the number of models. This paper includes use of GMM and information about temporal gradient using temporal differencing for object detection. By use of adaptive GMM along with temporal differencing methods and filtering in post processing results in successful and robust object detection. This paper also compares the approach we have taken to other approaches by comparing the results obtained using a standard video dataset.
各种计算机视觉应用,如生物识别、交通分析、人脸检测技术、视频分析和监控,都需要使用移动物体识别作为基本步骤。过去已经做出了很多努力来寻找可以检测运动的方法,但大多数方法仅限于特定情况,并不是适用于任何地方。本文提出了另一种更鲁棒的目标检测方法,使用高斯混合模型进行背景减去和时间差分进行前景分割,通过形态学操作和滤波的应用提供了一个有希望的结果。GMM方法是一种多模态方法,由于光照的突然变化和目标与背景之间的共性像素,该方法面临离群像素的约束。GMM的其他限制包括其学习率和模型数量。本文包括使用GMM和使用时间差分的时间梯度信息进行目标检测。利用自适应GMM结合时间差分方法和后处理滤波,实现了目标检测的成功和鲁棒性。本文还通过比较使用标准视频数据集获得的结果,将我们所采用的方法与其他方法进行了比较。
{"title":"Foreground segmentation using GMM combined temporal differencing","authors":"Vandta Tiwari, Deepak Chaudhary, Varan Tiwari","doi":"10.1109/COMPTELIX.2017.8004007","DOIUrl":"https://doi.org/10.1109/COMPTELIX.2017.8004007","url":null,"abstract":"Various computer vision applications like biometric identification, analysis of traffic, face detection techniques, video analysis, and surveillance require the use of moving object identification as a fundamental step. A lot of efforts have been made in the past to find approaches which can detect motion but most methods are limited to particular situations and are not applicable everywhere. This paper proposes another, more robust approach towards object detection using Gaussian Mixture Model for background subtraction and temporal differencing for foreground segmentation that provides a promising result with the application of morphological operations and filtering. The GMM approach is a multimodal approach that faces the constraint of outlier pixels because of sudden illumination changes and commonage pixels among object and background. Other limitations of GMM include its learning rate and the number of models. This paper includes use of GMM and information about temporal gradient using temporal differencing for object detection. By use of adaptive GMM along with temporal differencing methods and filtering in post processing results in successful and robust object detection. This paper also compares the approach we have taken to other approaches by comparing the results obtained using a standard video dataset.","PeriodicalId":6917,"journal":{"name":"2017 International Conference on Computer, Communications and Electronics (Comptelix)","volume":"11 suppl_2 1","pages":"426-430"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83250726","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Saturating core Magnetic Current Sensor for high Direct Current measurements in space applications 用于空间中高直流测量的饱和铁芯磁流传感器
Pub Date : 2017-07-01 DOI: 10.1109/COMPTELIX.2017.8003937
S. V, S. D., U. Raju, Venkata Pujitha B
With satellite power level increasing, the requirement to measure higher Direct Current (DC) has become critical. This paper gives details of two Magnetic Current Sensor (MCS) approaches for high DC measurements. These current sensors are based on saturating core concept to avoid loss of information at high currents due to magnetic fold-back which occurs in conventional techniques [2]. The two approaches of MCS presented are: unidirectional, for measuring currents in one direction and bidirectional, for measuring currents in both the directions using single core for each method. Both the concepts are explained in detail with block schematic, timing equations, B-H curve and practical waveforms.
随着卫星功率水平的提高,对高直流电的测量要求日益迫切。本文详细介绍了两种用于高直流测量的磁电流传感器(MCS)方法。这些电流传感器基于饱和核心概念,以避免在大电流下由于传统技术中发生的磁折回而导致的信息丢失[2]。MCS的两种方法是:单向,用于测量一个方向的电流和双向,用于测量两个方向的电流,每种方法使用单个磁芯。用框图、时序方程、B-H曲线和实际波形对这两个概念进行了详细的说明。
{"title":"Saturating core Magnetic Current Sensor for high Direct Current measurements in space applications","authors":"S. V, S. D., U. Raju, Venkata Pujitha B","doi":"10.1109/COMPTELIX.2017.8003937","DOIUrl":"https://doi.org/10.1109/COMPTELIX.2017.8003937","url":null,"abstract":"With satellite power level increasing, the requirement to measure higher Direct Current (DC) has become critical. This paper gives details of two Magnetic Current Sensor (MCS) approaches for high DC measurements. These current sensors are based on saturating core concept to avoid loss of information at high currents due to magnetic fold-back which occurs in conventional techniques [2]. The two approaches of MCS presented are: unidirectional, for measuring currents in one direction and bidirectional, for measuring currents in both the directions using single core for each method. Both the concepts are explained in detail with block schematic, timing equations, B-H curve and practical waveforms.","PeriodicalId":6917,"journal":{"name":"2017 International Conference on Computer, Communications and Electronics (Comptelix)","volume":"2010 3","pages":"53-58"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91429417","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Secure and efficient key delivery in VANET using cloud and fog computing 在VANET中使用云和雾计算安全高效的密钥交付
Pub Date : 2017-07-01 DOI: 10.1109/COMPTELIX.2017.8003932
Sanya Chaba, Rahul Kumar, Rohan Pant, M. Dave
The article proposes the design of the framework for vehicular ad hoc networks (VANET) for delivery of the authentication keys with minimum delay amongst vehicles having high mobility using fog and cloud computing. We propose to introduce fog computing to extend cloud computing by introducing an intermediate fog layer between mobile devices and cloud thus producing a number of advantages. Since the keys are provided directly from an intermediate layer, the latency is considerably reduced. In addition, the number of messages exchanged between vehicle and other elements of the VANET reduces in comparison to the existing approaches. Consequently, the resultant system is highly efficient. The design is implemented and validated using Omnetpp for single and multi vehicle system.
本文提出了车辆自组织网络(VANET)框架的设计,以便使用雾和云计算在具有高移动性的车辆之间以最小延迟交付身份验证密钥。我们建议引入雾计算,通过在移动设备和云之间引入中间雾层来扩展云计算,从而产生许多优势。由于密钥是直接从中间层提供的,因此延迟大大减少。此外,与现有方法相比,车辆与VANET的其他元素之间交换的信息数量减少了。因此,所得到的系统是高效率的。该设计在单车和多车系统中使用Omnetpp进行了实现和验证。
{"title":"Secure and efficient key delivery in VANET using cloud and fog computing","authors":"Sanya Chaba, Rahul Kumar, Rohan Pant, M. Dave","doi":"10.1109/COMPTELIX.2017.8003932","DOIUrl":"https://doi.org/10.1109/COMPTELIX.2017.8003932","url":null,"abstract":"The article proposes the design of the framework for vehicular ad hoc networks (VANET) for delivery of the authentication keys with minimum delay amongst vehicles having high mobility using fog and cloud computing. We propose to introduce fog computing to extend cloud computing by introducing an intermediate fog layer between mobile devices and cloud thus producing a number of advantages. Since the keys are provided directly from an intermediate layer, the latency is considerably reduced. In addition, the number of messages exchanged between vehicle and other elements of the VANET reduces in comparison to the existing approaches. Consequently, the resultant system is highly efficient. The design is implemented and validated using Omnetpp for single and multi vehicle system.","PeriodicalId":6917,"journal":{"name":"2017 International Conference on Computer, Communications and Electronics (Comptelix)","volume":"264 1","pages":"27-31"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83953034","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Design and implementation of a Brain Computer Interface for stress management using LabVIEW 基于LabVIEW的压力管理脑机接口的设计与实现
Pub Date : 2017-07-01 DOI: 10.1109/COMPTELIX.2017.8003955
Ankita Tiwari, R. Tiwari
In this paper a system design is introduced which contain a LabVIEW model which checks the status of brain with the help of analyzing the EOG is the method for measurement of cornea retinal potentials at standard time, it is existing between the front and back portion of eye. Electroencephalography (EEG) is also being analyzed at the time of detection where the Alpha and Theta waves are considered. Here we are elaborating our work for maintaining the system more precise because in old system the model was based on the only analysis of EEG waves. A microcontroller is also connected with it to respond on the required time and a GSM modem is interfaced here to send the information of stress in the form of SMS or call alert of the predefined subject. The development of this type of system is not only convenient but also it is portable and affordable.
本文介绍了一个系统的设计,其中包含一个LabVIEW模型,通过分析眼电信号来检查大脑的状态,这是标准时间角膜视网膜电位的测量方法,它存在于眼睛的前部和后部之间。脑电图(EEG)也在检测时进行分析,其中考虑了α波和θ波。在这里,我们正在详细阐述我们的工作,以保持系统更精确,因为在旧的系统中,模型是基于对脑电波的唯一分析。它还与微控制器连接,在需要的时间响应,并在这里接口GSM调制解调器,以短信或呼叫警报的形式发送预定主题的压力信息。这类系统的开发不仅方便,而且便携、经济实惠。
{"title":"Design and implementation of a Brain Computer Interface for stress management using LabVIEW","authors":"Ankita Tiwari, R. Tiwari","doi":"10.1109/COMPTELIX.2017.8003955","DOIUrl":"https://doi.org/10.1109/COMPTELIX.2017.8003955","url":null,"abstract":"In this paper a system design is introduced which contain a LabVIEW model which checks the status of brain with the help of analyzing the EOG is the method for measurement of cornea retinal potentials at standard time, it is existing between the front and back portion of eye. Electroencephalography (EEG) is also being analyzed at the time of detection where the Alpha and Theta waves are considered. Here we are elaborating our work for maintaining the system more precise because in old system the model was based on the only analysis of EEG waves. A microcontroller is also connected with it to respond on the required time and a GSM modem is interfaced here to send the information of stress in the form of SMS or call alert of the predefined subject. The development of this type of system is not only convenient but also it is portable and affordable.","PeriodicalId":6917,"journal":{"name":"2017 International Conference on Computer, Communications and Electronics (Comptelix)","volume":"42 1","pages":"152-157"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86984092","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Design of low complexity Universal Bi-quadratic Filters using Current Feedback Amplifier 基于电流反馈放大器的低复杂度通用双二次型滤波器设计
Pub Date : 2017-07-01 DOI: 10.1109/COMPTELIX.2017.8004016
K. Kumar, S. Nanda
Universal Bi-quadratic Filters (UBF) are popular because of its versatility in realizing any type of filter desired by the user. This manuscript deals with designing low complexity voltage mode UBF using Current Feedback Amplifier (CFA). Three new circuits are reported. The attractive features of these circuits include: employment of grounded capacitors, orthogonal adjustment of frequency response parameters and absence of constraints related to the input signals. The proposed circuits implement the design of high-pass, low-pass filters of resonance frequency 100kHz with Q-factor 1. It also implements band-pass filter of resonance frequency 100kHz with bandwidth 10kHz and Q-factor 1. Notch filter of rejection frequency 100kHz and Q-factor 1 is also implemented. Comparative results achieved with theoretical computation of the resonance frequency and quality factor matches with that achieved with implementation of the circuits on LTSPICE.
通用双二次型滤波器(UBF)是受欢迎的,因为它的通用性,以实现任何类型的过滤器所需的用户。本文讨论了利用电流反馈放大器(CFA)设计低复杂度电压模式UBF。报道了三种新的电路。这些电路的吸引人的特点包括:使用接地电容器,频率响应参数的正交调整和没有与输入信号有关的约束。该电路实现了谐振频率为100kHz、q因子为1的高通、低通滤波器的设计。实现了共振频率为100kHz,带宽为10kHz, q因子为1的带通滤波器。还实现了抑制频率为100kHz、q因子为1的陷波滤波器。理论计算得到的谐振频率和品质因数的比较结果与在LTSPICE上实现的电路的结果相吻合。
{"title":"Design of low complexity Universal Bi-quadratic Filters using Current Feedback Amplifier","authors":"K. Kumar, S. Nanda","doi":"10.1109/COMPTELIX.2017.8004016","DOIUrl":"https://doi.org/10.1109/COMPTELIX.2017.8004016","url":null,"abstract":"Universal Bi-quadratic Filters (UBF) are popular because of its versatility in realizing any type of filter desired by the user. This manuscript deals with designing low complexity voltage mode UBF using Current Feedback Amplifier (CFA). Three new circuits are reported. The attractive features of these circuits include: employment of grounded capacitors, orthogonal adjustment of frequency response parameters and absence of constraints related to the input signals. The proposed circuits implement the design of high-pass, low-pass filters of resonance frequency 100kHz with Q-factor 1. It also implements band-pass filter of resonance frequency 100kHz with bandwidth 10kHz and Q-factor 1. Notch filter of rejection frequency 100kHz and Q-factor 1 is also implemented. Comparative results achieved with theoretical computation of the resonance frequency and quality factor matches with that achieved with implementation of the circuits on LTSPICE.","PeriodicalId":6917,"journal":{"name":"2017 International Conference on Computer, Communications and Electronics (Comptelix)","volume":"8 1","pages":"472-477"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88238934","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design and development of an I-slot antenna for dual-band applications 用于双频应用的i -槽天线的设计与开发
Pub Date : 2017-07-01 DOI: 10.1109/COMPTELIX.2017.8004029
Purnima K. Sharma, P. Bhattacharya
In the present work, a dual band Microstrip patch antenna is designed, fabricated and tested. The proposed antenna consists of an I-slot in a rectangular patch over a partial ground which operates at higher order TM02 mode. The presented design is suitable for 3G and WLAN applications as it produces dual beams at 1.9GHz and 5.7GHz respectively. Return loss, VSWR and radiation pattern are obtained and analyzed using HFSS. Antenna is tested and measured results are also analyzed.
本文设计、制作并测试了一种双频微带贴片天线。所提出的天线由在部分地上的矩形贴片中的i型槽组成,该贴片以高阶TM02模式工作。本设计分别产生1.9GHz和5.7GHz的双波束,适用于3G和WLAN应用。利用HFSS获得并分析了回波损耗、驻波比和辐射方向图。对天线进行了测试,并对测量结果进行了分析。
{"title":"Design and development of an I-slot antenna for dual-band applications","authors":"Purnima K. Sharma, P. Bhattacharya","doi":"10.1109/COMPTELIX.2017.8004029","DOIUrl":"https://doi.org/10.1109/COMPTELIX.2017.8004029","url":null,"abstract":"In the present work, a dual band Microstrip patch antenna is designed, fabricated and tested. The proposed antenna consists of an I-slot in a rectangular patch over a partial ground which operates at higher order TM02 mode. The presented design is suitable for 3G and WLAN applications as it produces dual beams at 1.9GHz and 5.7GHz respectively. Return loss, VSWR and radiation pattern are obtained and analyzed using HFSS. Antenna is tested and measured results are also analyzed.","PeriodicalId":6917,"journal":{"name":"2017 International Conference on Computer, Communications and Electronics (Comptelix)","volume":"57 1","pages":"541-544"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89984725","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design and analysis of L-slots with rectangular slot multiband microstrip rectangular patch antenna l槽矩形槽多带微带矩形贴片天线的设计与分析
Pub Date : 2017-07-01 DOI: 10.1109/COMPTELIX.2017.8004031
K. Mehra, Anuj Jain
In this paper, performance of a rectangular microstrip patch antenna fed by microstrip line has been designed to operate for multiband applications. It consists of a rectangular patch with four L-slots at the corners and one rectangular-slot in the center. The antenna has designed using FR-4 lossy substrate material with relative permittivity εr is 4.3 and thickness of 1.6mm. Simulation has realized by using CST microwave studio software and the results shows that the antenna resonates at the frequencies of 2.4GHz, 3.8GHz, 4.9GHz, 6.5GHz, 7.2GHz and 8.1GHz.
本文设计了一种采用微带线馈电的矩形微带贴片天线的性能,以适应多波段应用。它由一个矩形补丁组成,四个角有l形槽,中心有一个矩形槽。天线采用相对介电常数εr为4.3、厚度为1.6mm的FR-4损耗衬底材料设计。利用CST microwave studio软件实现了仿真,结果表明该天线的谐振频率为2.4GHz、3.8GHz、4.9GHz、6.5GHz、7.2GHz和8.1GHz。
{"title":"Design and analysis of L-slots with rectangular slot multiband microstrip rectangular patch antenna","authors":"K. Mehra, Anuj Jain","doi":"10.1109/COMPTELIX.2017.8004031","DOIUrl":"https://doi.org/10.1109/COMPTELIX.2017.8004031","url":null,"abstract":"In this paper, performance of a rectangular microstrip patch antenna fed by microstrip line has been designed to operate for multiband applications. It consists of a rectangular patch with four L-slots at the corners and one rectangular-slot in the center. The antenna has designed using FR-4 lossy substrate material with relative permittivity εr is 4.3 and thickness of 1.6mm. Simulation has realized by using CST microwave studio software and the results shows that the antenna resonates at the frequencies of 2.4GHz, 3.8GHz, 4.9GHz, 6.5GHz, 7.2GHz and 8.1GHz.","PeriodicalId":6917,"journal":{"name":"2017 International Conference on Computer, Communications and Electronics (Comptelix)","volume":"374 1","pages":"549-552"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80535854","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Shadow removal for umbrageous information recovery in aerial images 航拍图像中模糊信息恢复的阴影去除
Pub Date : 2017-07-01 DOI: 10.1109/COMPTELIX.2017.8004028
Vertika Jain, A. Khunteta
The undesirable local change in the illumination intensity observed in a captured image often due to some opaque object hindering the light path is termed as shadow. Apart from resisting the image to deliver the high quality content, it also reduces the efficiency of various next level image processing applications such as object detection, feature extraction etc. This paper proposes a method to recoup a shadow recovered image. The method involves the detection of shadow which also includes morphological filtering to rule out the ambiguities and then eliminating the detected shadow. This paper adopts Gamma correction technique for shadow removal. The experimental results verify the efficiency of this method by comparing it with two other methods. The parameter Structural Similarity Index Metric is also used to gauge the accuracy of the three methods.
在捕获的图像中观察到的不希望的局部照明强度变化通常是由于一些不透明的物体阻碍了光路,这被称为阴影。除了抵抗图像提供高质量的内容外,它还降低了各种下一级图像处理应用程序的效率,例如对象检测,特征提取等。提出了一种阴影恢复图像的复原方法。该方法涉及到阴影的检测,其中还包括形态学滤波以排除歧义,然后消除检测到的阴影。本文采用伽玛校正技术进行阴影去除。实验结果与其他两种方法进行了比较,验证了该方法的有效性。结构相似度指标(Structural Similarity Index Metric)也被用来衡量三种方法的准确性。
{"title":"Shadow removal for umbrageous information recovery in aerial images","authors":"Vertika Jain, A. Khunteta","doi":"10.1109/COMPTELIX.2017.8004028","DOIUrl":"https://doi.org/10.1109/COMPTELIX.2017.8004028","url":null,"abstract":"The undesirable local change in the illumination intensity observed in a captured image often due to some opaque object hindering the light path is termed as shadow. Apart from resisting the image to deliver the high quality content, it also reduces the efficiency of various next level image processing applications such as object detection, feature extraction etc. This paper proposes a method to recoup a shadow recovered image. The method involves the detection of shadow which also includes morphological filtering to rule out the ambiguities and then eliminating the detected shadow. This paper adopts Gamma correction technique for shadow removal. The experimental results verify the efficiency of this method by comparing it with two other methods. The parameter Structural Similarity Index Metric is also used to gauge the accuracy of the three methods.","PeriodicalId":6917,"journal":{"name":"2017 International Conference on Computer, Communications and Electronics (Comptelix)","volume":"1 1","pages":"536-540"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89688216","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A resilient and seamless rekeying scheme based on random key distribution for WSN 基于随机密钥分配的无线传感器网络弹性无缝密钥更新方案
Pub Date : 2017-07-01 DOI: 10.1109/COMPTELIX.2017.8003987
Priyanka Ahlawat, M. Dave
Wireless sensor networks are often placed in hostile and unattended areas, making the nodes exposed to many attacks. Node capture is one of the prominent attack in such networks. Whenever, a node is captured, its keys have to be revoked from the network by means of rekeying. We aim to optimize the problem of key revocation and rekeying by reducing the communication and computation overhead. An attack algorithm is presented from an adversarial view point, compromising of capturing cost and traveling cost. It is used to compute the destructive rank of each node which ultimately finds the set of vulnerable nodes of the network. Each communicating node determine a backup key for future node revocation and automatically switches to it, to avoid the reconfiguration of the shared key. The keys of vulnerable nodes are bypassed during the generation of the backup link keys. It is shown that proposed scheme has high level of security as well as reduced communication overhead during rekeying process. The proposed attack is also compared with random attack and found that it is improved in terms of route compromise ratio and energy cost.
无线传感器网络经常被放置在敌对和无人值守的区域,使节点暴露在许多攻击中。节点捕获是此类网络中最主要的攻击之一。无论何时捕获一个节点,都必须通过重设密钥的方式从网络中撤销其密钥。我们的目标是通过减少通信和计算开销来优化密钥撤销和密钥更新问题。从对抗的角度提出了一种攻击算法,折衷了捕获代价和移动代价。它用于计算每个节点的破坏秩,最终找到网络中脆弱节点的集合。每个通信节点为将来的节点撤销确定一个备份密钥,并自动切换到它,以避免重新配置共享密钥。在生成备份链路密钥时,绕过脆弱节点的密钥。结果表明,该方案具有较高的安全性和较低的密钥重置过程通信开销。并与随机攻击进行了比较,发现该方法在路由妥协率和能量消耗方面都有改进。
{"title":"A resilient and seamless rekeying scheme based on random key distribution for WSN","authors":"Priyanka Ahlawat, M. Dave","doi":"10.1109/COMPTELIX.2017.8003987","DOIUrl":"https://doi.org/10.1109/COMPTELIX.2017.8003987","url":null,"abstract":"Wireless sensor networks are often placed in hostile and unattended areas, making the nodes exposed to many attacks. Node capture is one of the prominent attack in such networks. Whenever, a node is captured, its keys have to be revoked from the network by means of rekeying. We aim to optimize the problem of key revocation and rekeying by reducing the communication and computation overhead. An attack algorithm is presented from an adversarial view point, compromising of capturing cost and traveling cost. It is used to compute the destructive rank of each node which ultimately finds the set of vulnerable nodes of the network. Each communicating node determine a backup key for future node revocation and automatically switches to it, to avoid the reconfiguration of the shared key. The keys of vulnerable nodes are bypassed during the generation of the backup link keys. It is shown that proposed scheme has high level of security as well as reduced communication overhead during rekeying process. The proposed attack is also compared with random attack and found that it is improved in terms of route compromise ratio and energy cost.","PeriodicalId":6917,"journal":{"name":"2017 International Conference on Computer, Communications and Electronics (Comptelix)","volume":"35 1","pages":"321-327"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89913111","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Medical images texture analysis: A review 医学图像纹理分析综述
Pub Date : 2017-07-01 DOI: 10.1109/COMPTELIX.2017.8004009
Shahabaz, D. Somwanshi, A. Yadav, R. Roy
The abstract texture analysis is a popular compression test for finding texture properties of images. Above 35 IEEE research papers were reviewed related to texture analysis; papers were published in between 1992 to 2016. From those papers analyzed in depth and extracted common findings, strengths, weaknesses, gaps and also a comparison between suggested techniques. These suggested methods were used to compute a variety of texture features (parameters) based on image histogram, co-occurrence, and run-length matrices. In this paper, the problems of texture analysis such as segmentation, and classification were discussed. From this paper, the researcher will get an idea for their future work in texture analysis.
抽象纹理分析是一种常用的压缩测试方法,用于发现图像的纹理特性。回顾了35篇以上与织构分析相关的IEEE研究论文;论文发表于1992年至2016年之间。从这些论文中深入分析并提取共同的发现,优势,劣势,差距以及建议的技术之间的比较。这些建议的方法被用来计算各种纹理特征(参数)基于图像直方图,共现和游程矩阵。本文讨论了纹理分析中的分割、分类等问题。本文将为今后的织构分析工作提供思路。
{"title":"Medical images texture analysis: A review","authors":"Shahabaz, D. Somwanshi, A. Yadav, R. Roy","doi":"10.1109/COMPTELIX.2017.8004009","DOIUrl":"https://doi.org/10.1109/COMPTELIX.2017.8004009","url":null,"abstract":"The abstract texture analysis is a popular compression test for finding texture properties of images. Above 35 IEEE research papers were reviewed related to texture analysis; papers were published in between 1992 to 2016. From those papers analyzed in depth and extracted common findings, strengths, weaknesses, gaps and also a comparison between suggested techniques. These suggested methods were used to compute a variety of texture features (parameters) based on image histogram, co-occurrence, and run-length matrices. In this paper, the problems of texture analysis such as segmentation, and classification were discussed. From this paper, the researcher will get an idea for their future work in texture analysis.","PeriodicalId":6917,"journal":{"name":"2017 International Conference on Computer, Communications and Electronics (Comptelix)","volume":"112 1","pages":"436-441"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79295526","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
期刊
2017 International Conference on Computer, Communications and Electronics (Comptelix)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1