{"title":"Impulsive noise mitigation using an adaptive WMA-MVDR estimator for array based wireless communications","authors":"Xing Guang John Yang, W. Ser, S. G. Razul, C. See","doi":"10.1109/ICICS.2013.6782865","DOIUrl":"https://doi.org/10.1109/ICICS.2013.6782865","url":null,"abstract":"In this paper, we propose an adaptive WMA-MVDR estimator for mitigating impulsive noise in a multiple-access interference (MAI) environment. A time-domain Bernoulli-Gaussian process is used to model the impulsive noise. The estimator comprises two stages of processing: an adaptive window-mean amplitude (WMA) filter and a modified MVDR (Minimum Variance Distortionless Response) estimator. Numerical results show that the bit error rate (BER) performance of the proposed algorithm outperforms some existing estimators under the impulsive noise environment.","PeriodicalId":184544,"journal":{"name":"2013 9th International Conference on Information, Communications & Signal Processing","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124556443","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A simple >100-Gb/s multiband DDO-OFDM receiver for high splitting ratio long reach PON systems","authors":"K. Feng, Jhih-Heng Yan, You-Wei Chen","doi":"10.1109/ICICS.2013.6782795","DOIUrl":"https://doi.org/10.1109/ICICS.2013.6782795","url":null,"abstract":"In this paper, we demonstrate a simple receiving system for decoding a >100-Gb/s double-sided multiband DDO-OFDM system. In a LR-PON system, with this simple receiving design, 120 Gb/s capacity and splitting ratio of 128 have been achieved.","PeriodicalId":184544,"journal":{"name":"2013 9th International Conference on Information, Communications & Signal Processing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129082412","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Provably secure mutual authentication and key agreement scheme with user anonymity","authors":"T. Hwang, P. Gope","doi":"10.1109/ICICS.2013.6782847","DOIUrl":"https://doi.org/10.1109/ICICS.2013.6782847","url":null,"abstract":"With the widespread use of several mobile gadgets, privacy and anonymity of the mobile subscriber becomes a major issue in mobile communication. Through the roaming technology of the global mobility networks, a legitimate subscriber can enjoy the ubiquitous services. Where, the mutual authentication and key agreement between the mobile subscriber and roaming network (VLR/SGSN) is the primary security aspect of many commercial mobile networks. For personal privacy perspective, it is important to develop a mutual authentication and key agreement scheme with several security features including the user anonymity. In this article, we come up with a novel authentication and key agreement scheme, which can assure privacy against eavesdroppers (PAE) with the subscriber anonymity. Simultaneously, here we argue that the proposed scheme can also withstand several other security vulnerabilities like redirection attack, forging-mobile-user attack and location privacy etc. with the less communication cost.","PeriodicalId":184544,"journal":{"name":"2013 9th International Conference on Information, Communications & Signal Processing","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129347223","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The effect of pulse shaping on the performance of physical-layer network coding with time synchronization errors","authors":"Rongkuan Liu, G. Wang, Bo Li","doi":"10.1109/ICICS.2013.6782921","DOIUrl":"https://doi.org/10.1109/ICICS.2013.6782921","url":null,"abstract":"Physical-layer network coding (PNC) is a natural extension of network coding in wireless communication networks. PNC utilizes the addition characteristic of the electromagnetic wave rationally and improves the throughout in wireless networks significantly. This paper focuses on a key issue in PNC: the effect of pulse shaping on the performance of time synchronization errors. Analysis and simulation results show that raised cosine pulse with roll-off coefficient of zero can resist power penalty furthest due to time synchronization errors in PNC when adopting pulse shaping without ISI. Also when adopting Gaussian pulse shaping, we can get the best effect with parameter of one on resisting power penalty due to time synchronization errors in PNC.","PeriodicalId":184544,"journal":{"name":"2013 9th International Conference on Information, Communications & Signal Processing","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115924186","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Adaptive fuzzy ontology for student assessment","authors":"Chang-Shing Lee, Mei-Hui Wang, I-Hsiang Chen, Su-Wei Lin, Pi-Hsia Hung","doi":"10.1109/ICICS.2013.6782880","DOIUrl":"https://doi.org/10.1109/ICICS.2013.6782880","url":null,"abstract":"The traditional test usually uses a score to present the students' learning performance; however, it seems difficult to clearly understand the students' learning performance only by the score. As a result, this paper proposes an adaptive fuzzy ontology for student learning assessment and applies it to mathematics area. First, the domain experts construct the adaptive mathematics fuzzy ontology by referring to the guidelines of mathematics learning area in Grades 1-9 curriculum. The natural language processing mechanism tags each term with its speech and then filters the terms with useless speeches from the response data. Based on the genetic learning mechanism, the fuzzy reasoning mechanism then reasons the similarity strength between the kept terms and the constructed ontology. The semantic summary mechanism next summarizes the students' learning performance based on the inferred results. Finally, the diagnosis report mechanism presents the diagnosed reports to make officers, teachers, and students themselves much understand examinees' learning progress. Experimental results indicate that the proposed method can generate the suitable summarized sentences to allow teachers to quickly understand which mathematical topic is the one that students should be improved in the future.","PeriodicalId":184544,"journal":{"name":"2013 9th International Conference on Information, Communications & Signal Processing","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125824744","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Lifetime maximization of secondary cooperative systems in underlay cognitive radio networks","authors":"Hao Yu, Li-Chung Lo, Wan-Jen Huang","doi":"10.1109/ICICS.2013.6782945","DOIUrl":"https://doi.org/10.1109/ICICS.2013.6782945","url":null,"abstract":"In this work, we consider relay selection strategy in an amplify-and-forward cooperative cognitive ratio system in order to prolong lifetime of the energy-constrained relay network. The network lifetime considered in this work is based on the outage probability of the secondary cooperative system. Not only the channel condition of each relay, selection of best relay has to satisfy the interference constraint for primary user as well as the residual power of each relay. Here, we proposed four strategies to select the relay for prolonging the lifetime depending on the channel state information (CSI) and residual energy information (REI). From the simulation results, the minimum outage probability strategy (MOP) performs the best among four strategies.","PeriodicalId":184544,"journal":{"name":"2013 9th International Conference on Information, Communications & Signal Processing","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125866893","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Image denoising via sparse representations over Sequential Generalization of K-means (SGK)","authors":"S. K. Sahoo, A. Makur","doi":"10.1109/ICICS.2013.6782831","DOIUrl":"https://doi.org/10.1109/ICICS.2013.6782831","url":null,"abstract":"We have recently proposed a Sequential Generalization of K-means (SGK) to train dictionary for sparse representation. SGK's training performance is as effective as the standard dictionary training algorithm K-SVD, alongside it has a simpler implementation to its advantage. In this piece of work, through the problem of image denoising, we are making a fair comparison between the usability of SGK and K-SVD. The obtained results suggest that we can successfully replace K-SVD with SGK, due to its quicker execution and comparable outcomes. Similarly, it is possible to extend the use of SGK to other applications of sparse representation.","PeriodicalId":184544,"journal":{"name":"2013 9th International Conference on Information, Communications & Signal Processing","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126697649","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Martina Lindorfer, Bernhard Miller, M. Neugschwandtner, Christian Platzer
{"title":"Take a bite - Finding the worm in the Apple","authors":"Martina Lindorfer, Bernhard Miller, M. Neugschwandtner, Christian Platzer","doi":"10.1109/ICICS.2013.6782846","DOIUrl":"https://doi.org/10.1109/ICICS.2013.6782846","url":null,"abstract":"When it comes to security risks, especially malware, Mac OS X has the questionable reputation of being inherently safe. While there is a substantial body of research and implementations dealing with malware on Windows and, more recently, Android systems, Mac OS X has received little attention so far. To amend this shortcoming, we built a Mac OS X based high-interaction honeypot and used it to evaluate over 6,000 blacklisted URLs to estimate how widespread malware for Mac OS X is today. We further built a dynamic analysis environment and analyzed 148 malicious samples to gain insight into the current state of Mac OS X malware. To the best of our knowledge, we are the first to tackle this task.","PeriodicalId":184544,"journal":{"name":"2013 9th International Conference on Information, Communications & Signal Processing","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131562733","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Statistical modeling of the Gabor filter magnitude using Gamma distribution for effectively vehicle verification","authors":"Jing-Ming Guo, Heri Prasetyo","doi":"10.1109/ICICS.2013.6782965","DOIUrl":"https://doi.org/10.1109/ICICS.2013.6782965","url":null,"abstract":"Vehicle verification based on still image feature can be considered as supervised classification problem. An image descriptor is directly derived from the Gabor filtered output statistics of a given image. In general, the magnitude of the Gabor filtered output is modeled as the Gaussian distribution. So that the image descriptor is composed from mean, standard deviation, and skewness value of the Gabor filter magnitude [5, 6, 8]. However, Arrospide et. al. [9] argued that the skewness parameter is not meaningful for the class separation. Then, the feature descriptor is well defined only using mean and standard deviation of Gabor output distribution which leads to lower feature dimensionality. Based on our observation, the magnitude of the Gabor filter has strong tendency to follow the Gamma distribution. We propose a new texture descriptor derived from the maximum likelihood estimation of the Gamma distribution for effectively vehicle verification task. Experimental result shows that the proposed method is superior to the former approach under several classifier techniques.","PeriodicalId":184544,"journal":{"name":"2013 9th International Conference on Information, Communications & Signal Processing","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129520608","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"One-vs-all for class imbalance learning","authors":"Bilal Mirza, Zhiping Lin","doi":"10.1109/ICICS.2013.6782785","DOIUrl":"https://doi.org/10.1109/ICICS.2013.6782785","url":null,"abstract":"The performance of support vector machines (SVMs) can deteriorate when the number of samples in one class is much greater than that in the other. Existing methods tackle this problem by modifying the learning algorithms or resampling the datasets. In this paper, we propose a new method called one-vs-all for class imbalance learning (OVACIL) which neither modifies the SVM learning algorithms nor resamples the datasets. In the OVACIL method, we re-group a given imbalanced dataset into a number of new datasets comprising of all the original samples and train standard SVM classifiers using each of the datasets. The output scores of these classifiers on a testing sample are then compared and a final decision is made without a fixed decision threshold. This comparison is not biased toward any particular class, resulting in high accuracies of both classes. The Gmean and Fmeasure values obtained by OVACIL on 18 real-world imbalanced datasets surpass the previous best values reported by other state-of-the-art CIL methods on most of these datasets.","PeriodicalId":184544,"journal":{"name":"2013 9th International Conference on Information, Communications & Signal Processing","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132848476","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}