{"title":"The bootstrap Kernel-diffeomorphism filter for satellite image restoration","authors":"Bassel Marhaba, M. Zribi","doi":"10.1109/ISCE.2018.8408924","DOIUrl":"https://doi.org/10.1109/ISCE.2018.8408924","url":null,"abstract":"The satellite imagery is very important in several fields such as security, agriculture and other fields. As like as other images, satellite images are subject to be degraded due to noise effects that occur during the capture and/or transmitting process. These effects will cause altered noise styles such as, speckle noise, Gaussian noise and others. The main purpose of the image restoration process is to eliminate the noise that present in the image. Researchers used linear and nonlinear filters to recover images. The Kalman linear filter is generally used. Non-linear filters like the extended Kalman filter (EKF) was also used. Bootstrap method is based on both Bayesian state estimation and Monte Carlo method, and it is a robust method because it is not constrained by the linearity in linear model presumptions. In this paper, we propose a Bootstrap kernel-diffeomorphism filter (BKDF) to reduce speckle noise in satellite images. We evaluated the performance of the BKDF by comparing it with the EKF according to the numeric values based on the image signal to noise ratio (ISNR) and peak signal to noise ratio (PSNR). Our results declare that BKDF has more efficiency than the EKF in the satellite image restoration.","PeriodicalId":114660,"journal":{"name":"2018 International Symposium on Consumer Technologies (ISCT)","volume":"142 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122943419","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Adaptive edge detection algorithm for multi-focus application","authors":"Trong-An Bui, Pei-Jun Lee","doi":"10.1109/ISCE.2018.8408909","DOIUrl":"https://doi.org/10.1109/ISCE.2018.8408909","url":null,"abstract":"This paper proposes a method of solving the problem of multi-focus through edge detection based on adaptive thresholding. Under conditions such as different light or different regions, the methods of solving the problem of multi-focus based on conventional edge detection methods will not work well because they are based on a global value of thresholding. In this paper, we will focus on processing and be applying the adaptive threshold method in determining the regions in the multi-focus problem. We will combine the clustering method as k-mean in an image to combine with the area defined by edge detection through adaptive thresholding to define the best result. The Fusion algorithm is applied to handle focused regions defined by the above method. The results and deployment environment we apply to mobile devices.","PeriodicalId":114660,"journal":{"name":"2018 International Symposium on Consumer Technologies (ISCT)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122166384","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Optimal operation modes of low cost RF power diode detector on multi-tone signals","authors":"S. Ivanov, A. Lavrov","doi":"10.1109/ISCE.2018.8408917","DOIUrl":"https://doi.org/10.1109/ISCE.2018.8408917","url":null,"abstract":"The results of theoretical and experimental researches on optimizing the RF diode power detector parameters to achieve the maximum dynamic range of quadratic detection of two-tone microwave signals in a wide frequency band are presented. The detector is based on low-barrier Schottky diode with zero bias. Optimum values of the detector load resistance, the diode saturation current, and corresponding to the specified regime the detector dynamic range are determined.","PeriodicalId":114660,"journal":{"name":"2018 International Symposium on Consumer Technologies (ISCT)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124688656","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"ElderSense, an IoT system for the elderly living independently","authors":"Zhong Han Kong, C. Yeo","doi":"10.1109/ISCE.2018.8408920","DOIUrl":"https://doi.org/10.1109/ISCE.2018.8408920","url":null,"abstract":"This paper describes the implementation of an inexpensive ‘do-it-yourself (DIY)’ smart home system which allows for an unobtrusive and non-invasive monitoring system of the elderly's well-being in their own home using motion sensors. The system gathers the data from the sensors to learn and understand the behaviors of elderlies throughout the day. The activities will be presented to family members in a user-friendly manner via Android apps so that they can make better informed decisions with regards to ensuring the elderlies' safety and well-being. Alerts will be sent to both the elderly's mobile as well as that of family member when the system detects anomalies. The implementation involves the use of Passive Infrared (PIR) Sensors, connected to a Raspberry Pi (RPi 3). Data is stored at a backend for processing. The elderly's activities and alerts displayed or sent to a mobile application developed for this purpose.","PeriodicalId":114660,"journal":{"name":"2018 International Symposium on Consumer Technologies (ISCT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129495481","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
N. Gavrilova, I. A. Dailid, S. Molodyakov, E. Boltenkova, I. N. Korolev, P. Popov
{"title":"Application of computer vision algorithms in the problem of coupling of the locomotive with railcars","authors":"N. Gavrilova, I. A. Dailid, S. Molodyakov, E. Boltenkova, I. N. Korolev, P. Popov","doi":"10.1109/ISCE.2018.8408904","DOIUrl":"https://doi.org/10.1109/ISCE.2018.8408904","url":null,"abstract":"Problem of determining the distance between locomotive and railcar from a video image is considered. The camera is located on an unmanned locomotive. Several algorithms of computer vision have been analyzed and tested. The search for a track to the railcar or safe distance detection methods were developed using Canny edge detector and Hough transformation. The difficulty in applying the algorithm for track detection is found, determined by the presence of turns and railway switches. A scheme for computing the Inverse Perspective Mapping of an image is considered. Neural network algorithms and Haar cascades are used to search for images of railcars. A conclusion is made about the need to apply hybrid algorithms to this problem.","PeriodicalId":114660,"journal":{"name":"2018 International Symposium on Consumer Technologies (ISCT)","volume":"2 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113974011","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"End-to-end performance metrics analysis in IMS networks with different message types","authors":"Nikolai Kulikov","doi":"10.1109/ISCE.2018.8408923","DOIUrl":"https://doi.org/10.1109/ISCE.2018.8408923","url":null,"abstract":"A network built according to IMS architecture, consists of various nodes that consequentially process signaling messages transmitted during services providing. While IMS-network nodes process signaling messages, delays occur; this determines the quality of service. The duration of the delay has a probabilistic nature. In this paper, the author suggests an approximation of an IMS-node mathematical model that permits to evaluate characteristics of the network core. This research provides practical information about signaling traffic and sojourn time in a real IMS network, that could be used during current VoIP networks modernization and new networks design.","PeriodicalId":114660,"journal":{"name":"2018 International Symposium on Consumer Technologies (ISCT)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116709730","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Makarov, A. Ovsyannikova, I. Lavrenyuk, S. Zavjalov, S. Volvenko
{"title":"Distributions of probability of power values for random sequences of optimal FTN signals","authors":"S. Makarov, A. Ovsyannikova, I. Lavrenyuk, S. Zavjalov, S. Volvenko","doi":"10.1109/ISCE.2018.8408919","DOIUrl":"https://doi.org/10.1109/ISCE.2018.8408919","url":null,"abstract":"The approach to the selection of the amplitude limitation mode for decreasing the peak-to-average power ratio (PAPR) of the Faster-Than-Nyquist (FTN) signals is presented. This approach is based on the analysis of statistical characteristics of random sequences of optimal FTN signals, which allow to realize a larger symbol rate without loss of biterror rate (BER) performance. It is shown that the distribution of the amplitudes of random sequences of optimal FTN signals approximate the normal type at symbol rates above the Nyquist limit by approximately 10 times.","PeriodicalId":114660,"journal":{"name":"2018 International Symposium on Consumer Technologies (ISCT)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126471494","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Heals of inhabitants is the base of the concept for the future intelligent hause","authors":"M. B. Ignatiev","doi":"10.1109/ISCE.2018.8408912","DOIUrl":"https://doi.org/10.1109/ISCE.2018.8408912","url":null,"abstract":"The concept of the modern intelligent home includes many services. It is appears that the most important function shall be the health carry of home inhabitants, people and pets. It is important to monitor the state of each particular inhabitant and invoke a relevant action up to calling the emergency. The paper suggests using the linguo-combinatorical models of the family and its members to automated taking medical related solutions.","PeriodicalId":114660,"journal":{"name":"2018 International Symposium on Consumer Technologies (ISCT)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130063978","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Online binary visualization for Pdf documents","authors":"Soon Heng Tan Mavric, C. Yeo","doi":"10.1109/ISCE.2018.8408906","DOIUrl":"https://doi.org/10.1109/ISCE.2018.8408906","url":null,"abstract":"In this paper, we develop a visualization tool which will facilitate malware reverse engineering to understand characteristics of Portable Document Format (PDF) malware. This tool is useful as it is an online tool which renders it fully accessible regardless of user devices (eg. desktops, tablets, smartphones, etc.). Malware authors typically embed malicious codes into PDF documents which execute JavaScript exploiting a vulnerability within the Adobe Reader JavaScript parser. This then can allow shellcode to be placed into the memory of a computer to run arbitrary codes. By translating PDF binary information into higher level diagrams and images, potential visual signs which differentiate between malicious and legitimate PDF documents can be observed. The proposed online binary visualization tool maps bytes in a file to pixels of assorted colors that somewhat resemble a 2D pixelated heat map. By mapping different schemes of assorted colors, we can identify JavaScript and shellcodes in a PDF document which can then raise a red flag for the human analyst.","PeriodicalId":114660,"journal":{"name":"2018 International Symposium on Consumer Technologies (ISCT)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124854095","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
B. Medvedev, S. Molodyakov, S. M. Ustinov, S. Fyodorov
{"title":"Embedded systems software: Trends in industry and education","authors":"B. Medvedev, S. Molodyakov, S. M. Ustinov, S. Fyodorov","doi":"10.1109/ISCE.2018.8408921","DOIUrl":"https://doi.org/10.1109/ISCE.2018.8408921","url":null,"abstract":"Specialists in embedded systems software are leading force of almost every consumer electronics project. Universities all over the world offer different teaching programs of embedded software engineering to satisfy huge demand in software developers. The article presents the model of a specialist in embedded systems, university graduates competence requirements, a set of disciplines and teaching methods. New “Software Engineering” curriculum project is proposed (“Embedded Software” profile), which is based on achievements of the world leading universities, ACM Curricula Recommendations and analysis of embedded systems market surveys.","PeriodicalId":114660,"journal":{"name":"2018 International Symposium on Consumer Technologies (ISCT)","volume":"32 5","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114029324","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}