2009 IEEE Youth Conference on Information, Computing and Telecommunication最新文献

筛选
英文 中文
A TDMA MAC protocol for underwater acoustic sensor networks 一种用于水声传感器网络的TDMA MAC协议
2009 IEEE Youth Conference on Information, Computing and Telecommunication Pub Date : 2009-09-01 DOI: 10.1109/YCICT.2009.5382438
Yongxin Zhong, Jianguo Huang, Jing Han
{"title":"A TDMA MAC protocol for underwater acoustic sensor networks","authors":"Yongxin Zhong, Jianguo Huang, Jing Han","doi":"10.1109/YCICT.2009.5382438","DOIUrl":"https://doi.org/10.1109/YCICT.2009.5382438","url":null,"abstract":"The hostile seawater channel condition poses research challenges of designing reliable and efficient communication protocols for underwater acoustic sensor networks. Especially, long propagation delay of acoustic waves in water makes networks poor performance. Due to low channel utilization of traditional TDMA protocol, in this paper, we present a new medium access control (MAC) protocol called I-TDMA, which interleaves data packets in empty time axis by taking advantage of long propagation delay in underwater channel. The proposed scheme improves channel utilization, and simulation tests on OPNET radio modeler show that I-TDMA has much higher throughput and lower delay than traditional TDMA protocol.","PeriodicalId":138803,"journal":{"name":"2009 IEEE Youth Conference on Information, Computing and Telecommunication","volume":"93 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127412092","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Support vector machine based method for identifying hard exudates in retinal images 基于支持向量机的视网膜图像硬渗出物识别方法
2009 IEEE Youth Conference on Information, Computing and Telecommunication Pub Date : 2009-09-01 DOI: 10.1109/YCICT.2009.5382409
Lili Xu, S. Luo
{"title":"Support vector machine based method for identifying hard exudates in retinal images","authors":"Lili Xu, S. Luo","doi":"10.1109/YCICT.2009.5382409","DOIUrl":"https://doi.org/10.1109/YCICT.2009.5382409","url":null,"abstract":"Hard exudates in retinal images are one of the most prevalent earliest signs of diabetic retinopathy. The accurate identification of hard exudates is of increasing importance in the early detection of diabetic retinopathy. In this paper, we present a novel method to identify hard exudates from digital retinal images. A feature combination based on stationary wavelet transform (SWT) and gray level co-occurrence matrix (GLCM) is used to characterize hard exudates candidates. An optimized support vector machine (SVM) with Gaussian radial basis function is employed as a classifier. A sample dataset consisting of 50 hard exudates candidates is used for identifying hard exudates. With the optimal SVM parameters, the classification accuracy of 84%, sensitivity of 88% and specificity of 80% are obtained.","PeriodicalId":138803,"journal":{"name":"2009 IEEE Youth Conference on Information, Computing and Telecommunication","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129085118","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 52
Fast pedestrain detection with cascade classifiers 用级联分类器快速检测行人
2009 IEEE Youth Conference on Information, Computing and Telecommunication Pub Date : 2009-09-01 DOI: 10.1109/YCICT.2009.5382431
Ning Zhang, Qixiang Ye, Jianbin Jiao
{"title":"Fast pedestrain detection with cascade classifiers","authors":"Ning Zhang, Qixiang Ye, Jianbin Jiao","doi":"10.1109/YCICT.2009.5382431","DOIUrl":"https://doi.org/10.1109/YCICT.2009.5382431","url":null,"abstract":"In this paper, we propose a method for fast pedestrian detection in images/videos. Multi-scale orientated (MSO) features are proposed to represent coarse pedestrian contour, on which Adaboost classifiers are trained for pedestrian coarse location. In the fine detection, histogram of oriented gradient (HOG) features and SVM classifiers are employed to precisely classify pedestrians and non-pedestrians. The coarse-to-fine scheme can bring out not only a higher speed but also the elimination of smooth image regions that are prone to be falsely detection as positives by strong classifiers. The strong classifier SVM in the fine detection make the detection robust to variance of pedestrian pattern. Experiments validates the proposed method.","PeriodicalId":138803,"journal":{"name":"2009 IEEE Youth Conference on Information, Computing and Telecommunication","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132037948","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A novel fast locking PLLs based on mathematical element 一种基于数学原理的新型快速锁相环
2009 IEEE Youth Conference on Information, Computing and Telecommunication Pub Date : 2009-09-01 DOI: 10.1109/YCICT.2009.5382324
Mariam Zabihi, H. M. Naimi, P. Masoumi
{"title":"A novel fast locking PLLs based on mathematical element","authors":"Mariam Zabihi, H. M. Naimi, P. Masoumi","doi":"10.1109/YCICT.2009.5382324","DOIUrl":"https://doi.org/10.1109/YCICT.2009.5382324","url":null,"abstract":"In this paper, a new structural for Phase Locked Loop based on adding a non linear element is introduced. The proposed PLL, denoted by NPLL, is similar to the standard PLL except that it incorporates a nonlinear element in its loop. The proposed NPLL enhancements speed and stability of system by adjusting direct gain. Assess the performance of the proposed structure, various tests performed and results compared standard phase locked loop . Many tests, results of several of which are reported in this paper, show the superior performance of the NPLL.","PeriodicalId":138803,"journal":{"name":"2009 IEEE Youth Conference on Information, Computing and Telecommunication","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123394851","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Attacks on Translation Based Steganography 基于翻译的隐写攻击
2009 IEEE Youth Conference on Information, Computing and Telecommunication Pub Date : 2009-09-01 DOI: 10.1109/YCICT.2009.5382382
P. Meng, L. Hang, Wei Yang, Zhili Chen
{"title":"Attacks on Translation Based Steganography","authors":"P. Meng, L. Hang, Wei Yang, Zhili Chen","doi":"10.1109/YCICT.2009.5382382","DOIUrl":"https://doi.org/10.1109/YCICT.2009.5382382","url":null,"abstract":"Translation-Based Steganography(TBS) is a kind of famous text steganography. In this paper we examine the robustness of TBS and give an effective detection algorithm for TBS. Our algorithm can not only distinguish between natural language text and stego-text which was generated by TBS, but also can distinguish between machine translated text and stego-text. The detection accuracy increases as the text size increases. When the text size is larger than 60 sentences, the detection accuracy is greater than 92%.","PeriodicalId":138803,"journal":{"name":"2009 IEEE Youth Conference on Information, Computing and Telecommunication","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125149028","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Hilbert-Huang Transform and its application in ultrasonic transducer analysis Hilbert-Huang变换及其在超声换能器分析中的应用
2009 IEEE Youth Conference on Information, Computing and Telecommunication Pub Date : 2009-09-01 DOI: 10.1109/YCICT.2009.5382323
Qing He, Guoqi Li
{"title":"Hilbert-Huang Transform and its application in ultrasonic transducer analysis","authors":"Qing He, Guoqi Li","doi":"10.1109/YCICT.2009.5382323","DOIUrl":"https://doi.org/10.1109/YCICT.2009.5382323","url":null,"abstract":"A method to analyze the properties of ultrasonic transducer is proposed. The method is based on Hilbert-Huang Transform. The signals derived from ultrasonic transducer will be decomposed by empirical mode decomposition, and then the intrinsic mode functions can be obtained. So the marginal spectrum of each intrinsic mode functions will be calculated. The marginal spectrum offers a measure of total amplitude (or energy) contribution from each frequency value. Using those marginal spectrums and intrinsic mode functions, the amplitude and frequency properties of ultrasonic transducer can be analyzed. The proposed method was applied to analyze the properties of two ultrasonic transducers in experiment, and the results show that it is effective.","PeriodicalId":138803,"journal":{"name":"2009 IEEE Youth Conference on Information, Computing and Telecommunication","volume":"122 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131136902","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A comparison of three agent-oriented software development methodologies: MaSE, Gaia, and Tropos 三种面向代理的软件开发方法:MaSE、Gaia和Tropos的比较
2009 IEEE Youth Conference on Information, Computing and Telecommunication Pub Date : 2009-09-01 DOI: 10.1109/YCICT.2009.5382417
Yubo Jia, Chengwei Huang, Hao Cai
{"title":"A comparison of three agent-oriented software development methodologies: MaSE, Gaia, and Tropos","authors":"Yubo Jia, Chengwei Huang, Hao Cai","doi":"10.1109/YCICT.2009.5382417","DOIUrl":"https://doi.org/10.1109/YCICT.2009.5382417","url":null,"abstract":"Agent oriented software development is new research area in the field of software engineering. It is a promising approach for developing applications in complex domain. In recent years, multiple agent-oriented methodologies were introduced. However, it is difficult to select a methodology for a specific project, and their application is still limited due to their lack of maturity and standardization. Comparing some prominent agent-oriented methodologies and evaluating their strengths and weakness plays an important role in improving them. This paper presents a comparison and evaluation of three prominent agent-oriented methodologies: MaSE, Gaia, and Tropos. It is perfomed based upon a framework which addresses four major areas: concepts and properties, modelling techniques, process, and pragmatics. The results are discussed and presented.","PeriodicalId":138803,"journal":{"name":"2009 IEEE Youth Conference on Information, Computing and Telecommunication","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134348685","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
The design and realization of a monitoring platform for SFP optical transceiver module 设计并实现了一个SFP光模块监控平台
2009 IEEE Youth Conference on Information, Computing and Telecommunication Pub Date : 2009-09-01 DOI: 10.1109/YCICT.2009.5382340
Jin-lin Zhou, Yang-an Zhang, Minglun Zhang, Yong-Qing Huang, Liming Zhou, Xiao-ping Long, Ling Li
{"title":"The design and realization of a monitoring platform for SFP optical transceiver module","authors":"Jin-lin Zhou, Yang-an Zhang, Minglun Zhang, Yong-Qing Huang, Liming Zhou, Xiao-ping Long, Ling Li","doi":"10.1109/YCICT.2009.5382340","DOIUrl":"https://doi.org/10.1109/YCICT.2009.5382340","url":null,"abstract":"This paper proposes a design and realization of a monitoring platform for SFP optical transceiver module. With the adoption of this platform, the real-time temperature, power supply, bias current, transmit power and receiver power of optical transceiver module's monitoring can be realized. The measurement of these parameters will help to forecast the fault and find the fault position of optical link. With the forecast of the fault, the unit that may be faulted can be displaced early and the cost will be reduced. By malfunction orientation, the technical staff can find the fault position of optical link in a short time, the time of repairing becomes shorter. The use of this platform simplifies the maintenance work and enhances the reliability of communication system.","PeriodicalId":138803,"journal":{"name":"2009 IEEE Youth Conference on Information, Computing and Telecommunication","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125345327","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
NGCN: A P2P-based distributed next generation core network towards 4G NGCN:面向4G,基于p2p的分布式下一代核心网
2009 IEEE Youth Conference on Information, Computing and Telecommunication Pub Date : 2009-09-01 DOI: 10.1109/YCICT.2009.5382441
Zhou Naibao, Peng Jin, Wei Bing
{"title":"NGCN: A P2P-based distributed next generation core network towards 4G","authors":"Zhou Naibao, Peng Jin, Wei Bing","doi":"10.1109/YCICT.2009.5382441","DOIUrl":"https://doi.org/10.1109/YCICT.2009.5382441","url":null,"abstract":"With the development of mobile Internet and distributed technologies, the traditional telecommunications network is subject to many challenges. Skype, a popular peer-to-peer VoIP (Voice over IP) application, shows the gigantic advantage of distributed communication. Therefore, we are trying to design a Next Generation Core Network (NGCN), which utilizes distributed technologies such as P2P, cloud computing, virtualization, etc. It can not only provide traditional telecom services, but also better support the high-bandwidth consumption services in 4G, such as Streaming, file-sharing and so on. This paper first introduces the NGCN architecture, layered architecture model and the P2P overlay design, and then analyzes the future network capabilities demands. The NGCN we provide is distributed, self-organization and scalable.","PeriodicalId":138803,"journal":{"name":"2009 IEEE Youth Conference on Information, Computing and Telecommunication","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125293476","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A fast sphere decoding algorithm fully exploiting the orthogonality of STBC 一种充分利用STBC正交性的快速球解码算法
2009 IEEE Youth Conference on Information, Computing and Telecommunication Pub Date : 2009-09-01 DOI: 10.1109/YCICT.2009.5382348
Li Wang, Hua Jiang, Lan Shao, Yicheng Lin, Wenbo Wang
{"title":"A fast sphere decoding algorithm fully exploiting the orthogonality of STBC","authors":"Li Wang, Hua Jiang, Lan Shao, Yicheng Lin, Wenbo Wang","doi":"10.1109/YCICT.2009.5382348","DOIUrl":"https://doi.org/10.1109/YCICT.2009.5382348","url":null,"abstract":"In this paper, we propose a fast sphere decoding (SD) algorithms for the STBCs whose symbols can be decoupled into several orthogonal groups. The orthogonality of the front levels and the last levels are both utilized, while all the former improved SD algorithms only consider the orthogonality of the last levels. By the proposed algorithm, weights calculation of the front and the last levels are respectively performed independently, thus the computational complexity is significantly reduced. As for the bit error ratio performance, it is not influenced at all. The simulation results show the advantage of our proposed fast SD in complexity economization over a former improved SD algorithm.","PeriodicalId":138803,"journal":{"name":"2009 IEEE Youth Conference on Information, Computing and Telecommunication","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134250686","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信