S. Zoican, Marius Constantin Vochin, R. Zoican, D. Galatchi
{"title":"The Emotion Detection in Internet of Things Using Blackfin Microcomputers Family and Visual Analytics Tools","authors":"S. Zoican, Marius Constantin Vochin, R. Zoican, D. Galatchi","doi":"10.1109/ICCOMM.2018.8430121","DOIUrl":"https://doi.org/10.1109/ICCOMM.2018.8430121","url":null,"abstract":"An emotion detection system based on Blackfin microcomputer architecture and Visual Analytics Tools (VAT) is described. Such systems may be used in Internet of Things. The emotion detection algorithm use an anthropomorphic model of human face to determine optimum searching area for eyes and mouth that are modeled by ellipses with variable axis depend on the mood of the human subject. The ellipses are found using a modified Hough circle transform algorithm which minimizes the computational effort. The whole emotion detection algorithm is implemented using the VAT library functions and emotion detection is achieved in real time.","PeriodicalId":158890,"journal":{"name":"2018 International Conference on Communications (COMM)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126454771","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Internet of Profiling - Traffic, Users and Applications","authors":"B. Ghita, Taimur Bakhshi","doi":"10.1109/iccomm.2018.8484784","DOIUrl":"https://doi.org/10.1109/iccomm.2018.8484784","url":null,"abstract":"Recent years have witnessed a significant increase in monitoring network traffic in order to profile user behaviour and to provide better service. This paper will provide a review of these efforts, highlighting the benefits brought by traffic profiling, particularly in relation to providing a better user experience and higher quality of service. The discussion will focus on three headings: identifying and profiling applications based on statistical analysis of traffic, identifying users and anomaly detection based on network interaction, and providing fairness in a heterogeneous user environment. Profiling applications is a challenging task in the context of encryption and tunnelling, but allows better provision of network resources, in line with the needs of each application, from email to video streaming. Identifying users may raise concerns in terms of privacy, but the primary aim is not to single them out but to cater for their needs at an aggregate level, both in terms of dealing with significant variations as well as potentially acting as a first line of defence when anomalies are detected. Finally, while globally the behaviour of users may appear similar, there is significant variation in terms of the demand, usage, and expectations of each user; ensuring fairness in such a diverse environment requires acknowledging the user requirements and accommodating them against a heterogeneous environment in terms of provision and demand. The presentation will draw from a number of research studies undertaken over the recent years in the above areas, both across the research community as well as at Plymouth University, and discuss how the findings impact on the wider user community.","PeriodicalId":158890,"journal":{"name":"2018 International Conference on Communications (COMM)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128036670","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Forensic Speaker Identification Using Speech Quality Data","authors":"Gheorghe Pop, Serban Mihalache, D. Burileanu","doi":"10.1109/iccomm.2018.8484766","DOIUrl":"https://doi.org/10.1109/iccomm.2018.8484766","url":null,"abstract":"The performance of speaker recognition systems based on Gaussian mixture models is often impaired both by the low quality and by the short duration of test speech samples. In literature, a large number of best material selection criteria were described, suitable for the scoring stage in forensic automatic speaker recognition systems. An application of quality-based speaker features is described in the present paper which outperforms forensic speaker recognition systems that assume uniform quality of speech during model training and scoring.","PeriodicalId":158890,"journal":{"name":"2018 International Conference on Communications (COMM)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128069248","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Hybrid Simplified Kalman Filter for Adaptive Feedback Cancellation","authors":"F. Albu, L. Tran, S. Nordholm","doi":"10.1109/ICCOMM.2018.8430141","DOIUrl":"https://doi.org/10.1109/ICCOMM.2018.8430141","url":null,"abstract":"Numerous adaptive feedback cancellation (AFC) algorithms are used in open-fitting and in-ear hearing aid devices (HADs) in order to avoid the possible annoying howling sounds. Recently, a hybrid AFC (H-AFC) scheme that shortened the recovering time from howling was proposed. It consists of a switched combination adaptive filter controlled by a stability detector that chooses either the standard normalized least mean squares (NLMS) algorithm or the prediction-error method (PEM) NLMS algorithm. In this paper a hybrid simplified Kalman filter (H -SKF) that uses a modified stability detector and a switch between NLMS and (PEM) SKF algorithms is proposed. It is shown that the proposed approach improves the convergence properties and shortens the howling periods for both speech and music signals compared with the hybrid NLMS (H-NLMS) algorithm.","PeriodicalId":158890,"journal":{"name":"2018 International Conference on Communications (COMM)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132761809","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On a Game Theoretic Approach to Detect the Low-Rate Denial of Service Attacks","authors":"P. Cotae, Rashed Rabie","doi":"10.1109/ICCOMM.2018.8429980","DOIUrl":"https://doi.org/10.1109/ICCOMM.2018.8429980","url":null,"abstract":"The Low-Rate DoS attacks such as “Shrew” and “New Shrew” attacks, unlike the high rate attacks, are hard for the router to detect. Attackers choose a malicious low-rate bandwidth to exploit the TCP's congestion control window algorithm and the transition time-out mechanism. By using a game theoretic approach, we focus on the best strategy and solution for a computer network to detect the Low-Rate Denial of Service attacks. In our experiments we simulated the network congestion attacks and we proposed a practical solution by using a sigmoid filter. The proposed solution is to create a threshold bandwidth filter at the router that allows a specific bandwidth, so when traffic exceeds the threshold it will be dropped, or if the traffic is below the threshold, it will be redirected to a honeypot server. In our game theory approach, we considered the game players in a static simultaneous game. The defender's strategy is to determine an optimal firewall option to detect the attacker traffic, and the attacker's strategy is to find the low rate to exploit the retransmission time-out mechanism and elude the detector. We calculated the payoff for the each player and for each strategy. We solved the game by finding the Nash Equilibrium where players do not have any profit in using any other strategy. Our experiments and calculations lead to the conclusion that a mixed strategy will the best response for an organization which will be using the proposed approach.","PeriodicalId":158890,"journal":{"name":"2018 International Conference on Communications (COMM)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127841341","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Semantic Segmentation of RGB-NIR Images with Error-Correcting Output Codes","authors":"A. Radoi","doi":"10.1109/iccomm.2018.8484811","DOIUrl":"https://doi.org/10.1109/iccomm.2018.8484811","url":null,"abstract":"Scene understanding is strictly linked to image semantic segmentation, which is the process of associating each pixel of an image with a label, such as sky, clouds, road, building. This paper proposes a new semantic segmentation framework, in which Error-Correcting Output Codes (ECOC) are used to decompose the multiway classification problem into multiple binary classification subtasks. The binary output results are then converted into final class labels following a decoding table established at the beginning of the classification procedure. As part of the recognition framework, color descriptors and high-level visual features are extracted to represent the appearance of the patch surrounding each pixel of interest. The proposed method is validated on an image database containing RGB and Near-Infrared (NIR) imaaes.","PeriodicalId":158890,"journal":{"name":"2018 International Conference on Communications (COMM)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115675449","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
N. Ugrelidze, S. Shavgulidze, Mariam Sordia, David Akobia
{"title":"Generalized Multistream Spatial Modulation for Wireless Systems with Nakagami-M Fading","authors":"N. Ugrelidze, S. Shavgulidze, Mariam Sordia, David Akobia","doi":"10.1109/iccomm.2018.8484820","DOIUrl":"https://doi.org/10.1109/iccomm.2018.8484820","url":null,"abstract":"This paper deals with the symbol error rate (SER) characteristics for generalized multistream spatial modulation systems (GMSM) which operate in Nakagami-m fading channels with additive white Gaussian noise (AWGN). In particular, GMSM system is considered, where single individual antenna or combinations of antennas can be used for information transmission. The special case when no antenna is active is also included in transmission system. The constellation of the phase-shift-keying (PSK) is utilized as the signal system. The computer simulation results are given for the following values of fading parameter m: 0.5, 0.6, 0.75, 1, 1.5 and 3. The case when fading does not present is also considered. The number of transmit antennas is equal to 4 and number of receive antennas can be 4, 6 or 8.","PeriodicalId":158890,"journal":{"name":"2018 International Conference on Communications (COMM)","volume":"139 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124387309","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"SGX-Based Cloud Security Module with User's Sole Control","authors":"Alexandru Lupascu, Mihai Togan, Cristian Lupascu","doi":"10.1109/ICCOMM.2018.8484262","DOIUrl":"https://doi.org/10.1109/ICCOMM.2018.8484262","url":null,"abstract":"With the evolution of information technologies there is also a significant growth of threats in the digital realm, therefore more and more applications are using cryptographic primitives to ensure the authenticity, integrity and confidentiality of their data. It is absolutely necessary that these cryptographic operations are performed in dedicated security modules which can provide a strong level of security assurance, depending on certification. This paper describes a software security module architecture which uses Intel Software Guard Extensions (SGX) enclaves to protect the cryptographic material. The proposed security module can be used as a service in cloud environment, while still assuring a reasonable level of user's sole control.","PeriodicalId":158890,"journal":{"name":"2018 International Conference on Communications (COMM)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114310832","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance Evaluation of a Tracking Algorithm for Galileo E1 Signals","authors":"Alexandru Rusu Casandra, A. Paun","doi":"10.1109/ICCOMM.2018.8430106","DOIUrl":"https://doi.org/10.1109/ICCOMM.2018.8430106","url":null,"abstract":"Global Navigation Satellite System (GNSS) receivers are currently the standard equipment for precision positioning, navigation and timing, but their use in challenging environments, such as urban and natural canyons, is made difficult due to reduced Line of Sight visibility, multipath propagation conditions or RF interference from nearby sources. In the next years, given the announced plans of GNSS operators, the number of satellites will increase to more than 120 - with even more signals and frequencies. Today there are more than 70 operational GNSS satellites in orbit from several GNSS systems, transmitting a variety of signals on multiple frequencies. A multi-constellation receiver could benefit from the large envisioned number of visible satellites, especially in urban canyons and industrial areas with very tall obstacles, where only satellites at high elevations are in line of sight with the receiver, but this assumption is valid only if the receiver can actually acquire and track the respective satellite signals. This is hard to attain in difficult signal conditions with single-constellation receivers: if one or more signals are lost because of obstacles or interferences, the receiver might not be able to determine the position, in case less than four valid pseudoranges are available. This paper describes a tracking algorithm implemented in Mathworks Matlab for Galileo El Open Service. After an overview of the state of the art, the work evaluates the performance obtained through Matlab simulations, such as the variation of the correlator replicas and of the local carrier frequency. Conclusion are drawn about the capability of the loop to track the Galileo El signal at different SNR values that may be encountered in real-life situations.","PeriodicalId":158890,"journal":{"name":"2018 International Conference on Communications (COMM)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115094841","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
I. Santos, P. Vieira, R. Borralho, M. Queluz, A. Rodrigues
{"title":"Emulating a Software Defined LTE Radio Access Network Towards 5G","authors":"I. Santos, P. Vieira, R. Borralho, M. Queluz, A. Rodrigues","doi":"10.1109/ICCOMM.2018.8484764","DOIUrl":"https://doi.org/10.1109/ICCOMM.2018.8484764","url":null,"abstract":"This paper evaluates the performance of a Software Defined Network (SDN) and the respective OpenFlow (OF) protocol, when supporting a Long Term Evolution (LTE) Radio Access Network (RAN). The main objective is to understand the impact of the new Centralized Radio Access Network (C-RAN) architecture, using a SDN based LTE network (when compared to conventional LTE networks), in a solution towards Fifth Generation (5G) implementation. Several simulations were performed using the SDN emulator Mininet-Wifi platform, which was adapted to produce use cases regarding a SDN based LTE topology. This platform uses WiFi as radio technology. However, and since this is an open source platform, changes were introduced in order to include a LTE RAN parametrization based on LTE technology standards. The latency and throughput are the used Quality of Service (QoS) performance metrics. The throughput results led to spectral efficiency values close to each considered modulation maximum. The obtained average values of latency, 15.72, 16.17 and 16.50 ms for packets of 32, 1000 and 1500 bytes respectively, revealed to be lower than 20 ms, which is the LTE requirement established by 3GPP.","PeriodicalId":158890,"journal":{"name":"2018 International Conference on Communications (COMM)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123431584","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}