2008 International Symposium on Telecommunications最新文献

筛选
英文 中文
A new method for Visual Secret Sharing 一种新的可视化秘密共享方法
2008 International Symposium on Telecommunications Pub Date : 2008-10-14 DOI: 10.1109/ISTEL.2008.4651375
H. Firouzi, M. Ehdaie, M. Aref
{"title":"A new method for Visual Secret Sharing","authors":"H. Firouzi, M. Ehdaie, M. Aref","doi":"10.1109/ISTEL.2008.4651375","DOIUrl":"https://doi.org/10.1109/ISTEL.2008.4651375","url":null,"abstract":"In this paper a new probabilistic view to the visual secret sharing (VSS) is presented and as a result, a new VSS scheme is proposed. The proposed scheme is a threshold scheme with perfect black pixel reconstruction. We present the scheme by introducing two sets C<sub>0</sub> and C<sub>1</sub>. We consider an unknown probability distribution on the elements of C<sub>0</sub> and C<sub>1</sub>. Perfectness provides some linear constraints on the probabilities of C<sub>0</sub> and C<sub>1</sub> elements. By solving the provided system of linear equations, the probability distributions are specified and we achieve a perfect VSS scheme.","PeriodicalId":133602,"journal":{"name":"2008 International Symposium on Telecommunications","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124846610","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Best known PSLs for binary sequences from bit length 71 through 100 最著名的psl是位长从71到100的二进制序列
2008 International Symposium on Telecommunications Pub Date : 2008-10-14 DOI: 10.1109/ISTEL.2008.4651390
M. Amin Nasrabadi, M. Bastani
{"title":"Best known PSLs for binary sequences from bit length 71 through 100","authors":"M. Amin Nasrabadi, M. Bastani","doi":"10.1109/ISTEL.2008.4651390","DOIUrl":"https://doi.org/10.1109/ISTEL.2008.4651390","url":null,"abstract":"This paper develops a new evolutionary algorithm for generating low autocorrelation binary sequences. These sequences are of interest in pulse compression technique. The proposed algorithm is fast enough to yield optimum or near optimum codes. The generated sequences were compared to the best literature and were seen that its results are better than the others. This suggested method could change 11 rows of the previous best known PSLs table, whereas the previous literature could change only one record. These records were combined with the best results reported in the papers to produce a new best minimal-PSL binary sequence table for bit lengths 71 through 100.","PeriodicalId":133602,"journal":{"name":"2008 International Symposium on Telecommunications","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126352545","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Steganalysis of LSB-Matching steganography by removing most significant bit planes 去除最有效位平面的lsb匹配隐写分析
2008 International Symposium on Telecommunications Pub Date : 2008-10-14 DOI: 10.1109/ISTEL.2008.4651396
M. A. Mehrabi, H. Aghaeinia, M. Abolghasemi
{"title":"Steganalysis of LSB-Matching steganography by removing most significant bit planes","authors":"M. A. Mehrabi, H. Aghaeinia, M. Abolghasemi","doi":"10.1109/ISTEL.2008.4651396","DOIUrl":"https://doi.org/10.1109/ISTEL.2008.4651396","url":null,"abstract":"This paper proposed a new steganalysis scheme of LSB-matching steganography based on statistical moments of the DFT of histogram of multi-level wavelet subbands. Before deriving these wavelet subbands a pre-processing apply to images under the test. The pre-processing contains removing some most significant bit planes. Then we decompose the image using three-level Haar discrete wavelet transform (DWT) into 13 subbands (here the image itself is considered as the LL0 subband).The Fourier transform of each subband histogram, is calculated. Then it is divided into low and high frequency bands. The first three statistical moments of each band are selected to form a 78-dimensional feature vector for Steganalysis. Support vector machines (SVM) classifier is then used to discriminate between stego-images and innocent images.","PeriodicalId":133602,"journal":{"name":"2008 International Symposium on Telecommunications","volume":"196 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125392869","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Effects of security solutions on worm propagation 安全解决方案对蠕虫传播的影响
2008 International Symposium on Telecommunications Pub Date : 2008-10-14 DOI: 10.1109/ISTEL.2008.4651266
M. R. Faghani, H. Saidi, M. Ataei
{"title":"Effects of security solutions on worm propagation","authors":"M. R. Faghani, H. Saidi, M. Ataei","doi":"10.1109/ISTEL.2008.4651266","DOIUrl":"https://doi.org/10.1109/ISTEL.2008.4651266","url":null,"abstract":"Automated propagating malwares such as worms have drawn significant attention due to their adverse impact on Internet and network security. According to latest advisories, malware creation has reached epidemic proportions. While much research attention has been paid in developing stochastic models of worm propagation, the real world prevention mechanisms have not been deployed in simulations. Describing the worm propagation cycle in real world and identifying the ways that worms exploit to spread themselves, this article will step through common practices to prevent worm propagation and also examines these results in the analytical worm propagation model.","PeriodicalId":133602,"journal":{"name":"2008 International Symposium on Telecommunications","volume":"8 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114136295","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A fuzzy approach for multi-feature pedestrian tracking with particle filter 基于粒子滤波的多特征行人模糊跟踪方法
2008 International Symposium on Telecommunications Pub Date : 2008-10-14 DOI: 10.1109/ISTEL.2008.4651366
M. Komeili, N. Armanfard, E. Kabir
{"title":"A fuzzy approach for multi-feature pedestrian tracking with particle filter","authors":"M. Komeili, N. Armanfard, E. Kabir","doi":"10.1109/ISTEL.2008.4651366","DOIUrl":"https://doi.org/10.1109/ISTEL.2008.4651366","url":null,"abstract":"Particle filter is one of the best methods of object tracking in video sequences. Particle filter usually is used with only one feature. In this paper, we propose a novel method for multi-feature object tracking in a particle filter framework. A fuzzy inference system by which reliability of features can be measured has been designed. This is done based on observations diversity and spatial scattering of particles. The features are combined in proportion to their reliabilities. Efficiency of our algorithm is demonstrated using color, edge and texture features. Experimental results over a set of real-world sequences show that our methodpsilas performance is better than some other solutions proposed for feature weighting.","PeriodicalId":133602,"journal":{"name":"2008 International Symposium on Telecommunications","volume":"08 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128943343","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A novel primary user detection method for multiple-antenna cognitive radio 一种新的多天线认知无线电主用户检测方法
2008 International Symposium on Telecommunications Pub Date : 2008-10-14 DOI: 10.1109/ISTEL.2008.4651297
H. Sadeghi, P. Azmi
{"title":"A novel primary user detection method for multiple-antenna cognitive radio","authors":"H. Sadeghi, P. Azmi","doi":"10.1109/ISTEL.2008.4651297","DOIUrl":"https://doi.org/10.1109/ISTEL.2008.4651297","url":null,"abstract":"As we know, cognitive radios should not interfere with the primary users and so, should detect them and vacate the frequency bands when required. In this paper, we propose a novel multiple-antenna receiver diversity scheme based on cyclostationary detection, in order to improve the reliability of primary user detection. We derive closed-form expressions for the probabilities of detection and false alarm in the proposed scheme. The performance is probed by computer simulations and compared to the conventional spectrum sensing methods. The results show the performance enhancement of the proposed spectrum sensing method over the conventional ones.","PeriodicalId":133602,"journal":{"name":"2008 International Symposium on Telecommunications","volume":"32 8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124534612","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Comparison of telecommunication service providers’ pricing strategies for packet based services 电信服务供应商基于分组服务的定价策略比较
2008 International Symposium on Telecommunications Pub Date : 2008-10-14 DOI: 10.1109/ISTEL.2008.4651267
Seyed Mohammad Reza Mirsarraf, Ali Reza Mansoori
{"title":"Comparison of telecommunication service providers’ pricing strategies for packet based services","authors":"Seyed Mohammad Reza Mirsarraf, Ali Reza Mansoori","doi":"10.1109/ISTEL.2008.4651267","DOIUrl":"https://doi.org/10.1109/ISTEL.2008.4651267","url":null,"abstract":"To remain competitive in the turbulent and rapidly evolving telecommunication market, service providers (SPs) should use proper pricing strategy to retain subscribers and even attract more subscribers. The SPpsilas pricing strategy should modify the prices continually regarding to the market to maximize its revenue. In this paper two novel pricing strategies are introduced, one based on game theory and the other based on Infinite Impulse Response (IIR) filtering. A simple strategy entitled fixed price strategy which calculates the price according to the cost is also used and compared with the other two pricing strategies. To show effectiveness of the strategies a telecommunication market is modeled in which some SPs operate and each SP uses one of the three pricing strategies. Simulation results show that the game theory-based strategy is the most effective strategy among the three strategies. An analytical model to compute average key parameters of SP in equilibrium market is also reported in the paper. This model is used to check analytical and simulative coincidence.","PeriodicalId":133602,"journal":{"name":"2008 International Symposium on Telecommunications","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127802670","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Design flow for hardware implementation of digital filters 数字滤波器硬件实现的设计流程
2008 International Symposium on Telecommunications Pub Date : 2008-10-14 DOI: 10.1109/ISTEL.2008.4651369
R. Yousefi, A. Ahmadi, S. M. Fakhraie
{"title":"Design flow for hardware implementation of digital filters","authors":"R. Yousefi, A. Ahmadi, S. M. Fakhraie","doi":"10.1109/ISTEL.2008.4651369","DOIUrl":"https://doi.org/10.1109/ISTEL.2008.4651369","url":null,"abstract":"Digital filters are the basic component of telecommunication, multimedia and radar systems. In this paper, we demonstrate a design flow for hardware implementation of digital filters. In this methodology, we start with high level modeling of filters. Then based on the specification of the problem, we extract a golden model for it. To extract golden model, we analyze peak value estimation, coefficients quantization, word-length optimization and parasitic oscillations. After extracting the golden model, three approaches for hardware implementation are investigated. Area and frequency constraints are important issue for method of implementation. In real-time applications that frequency is an important issue, a fully combinational method should be used. In applications with low sample rates area is more important so we recommend using bit serial- implementation method.","PeriodicalId":133602,"journal":{"name":"2008 International Symposium on Telecommunications","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133459198","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Design, simulation, and fabrication of tapered microstrip filters by applying the method of small reflections 应用小反射法的锥形微带滤波器的设计、模拟和制造
2008 International Symposium on Telecommunications Pub Date : 2008-10-14 DOI: 10.1109/ISTEL.2008.4651287
N. Hendijani, M. Khalaj-AmirHoseini, V.K. Sharghi, H. Hadidian-Moghadam
{"title":"Design, simulation, and fabrication of tapered microstrip filters by applying the method of small reflections","authors":"N. Hendijani, M. Khalaj-AmirHoseini, V.K. Sharghi, H. Hadidian-Moghadam","doi":"10.1109/ISTEL.2008.4651287","DOIUrl":"https://doi.org/10.1109/ISTEL.2008.4651287","url":null,"abstract":"In this paper we will introduce a novel method to design tapered transmission line microstrip filters. The proposed approach is based on the theory of partial reflections. Presuming a desired frequency response characteristic, we obtain the tapered line width variation. In order to validate this method a wide-band band stop tapered microstrip filter was designed, simulated, and fabricated.","PeriodicalId":133602,"journal":{"name":"2008 International Symposium on Telecommunications","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130115777","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Noise reduction from speech signal based on wavelet transform and Kullback-Leibler divergence 基于小波变换和Kullback-Leibler散度的语音信号降噪
2008 International Symposium on Telecommunications Pub Date : 2008-10-14 DOI: 10.1109/ISTEL.2008.4651407
S. Tabibian, A. Akbari
{"title":"Noise reduction from speech signal based on wavelet transform and Kullback-Leibler divergence","authors":"S. Tabibian, A. Akbari","doi":"10.1109/ISTEL.2008.4651407","DOIUrl":"https://doi.org/10.1109/ISTEL.2008.4651407","url":null,"abstract":"A new method for noise reduction from speech signals based on the Kullback-Leibler (KL) divergence has been presented in this paper. First, the algorithm performs the wavelet packet transform to the noisy speech and decomposes it into subbands; then we apply a threshold on the noisy speech coefficients, in each subband, to obtain the enhanced speech. To determine the threshold, first the distributions of the noisy speech, estimated noise and estimated clean speech subbands are calculated; then a symmetric KL distance is calculated between the noisy speech and noise distributions. Finally a speech/noise decision is made based on the calculated distance. We conducted some tests using the TIMIT database in order to assess the performance of the proposed method and to compare it to the previous speech enhancement methods. The algorithm is evaluated using the perceptual evaluation of speech quality measure (PESQ) and the gain on input SNR. We obtain an improvement of 2db on SNR and 0.5 on PESQ-MOS score for the proposed method in comparison to the results of the previous wavelet based techniques for tested noises.","PeriodicalId":133602,"journal":{"name":"2008 International Symposium on Telecommunications","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131788702","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信