2015 World Symposium on Computer Networks and Information Security (WSCNIS)最新文献

筛选
英文 中文
Improving MIMO systems performances by concatenating LDPC decoder to the STBC and MRC receivers 通过将LDPC解码器连接到STBC和MRC接收器来提高MIMO系统的性能
2015 World Symposium on Computer Networks and Information Security (WSCNIS) Pub Date : 2015-09-01 DOI: 10.1109/WSCNIS.2015.7368281
Elies Ghayoula, M. H. Taieb, J. Chouinard, R. Ghayoula, A. Bouallègue
{"title":"Improving MIMO systems performances by concatenating LDPC decoder to the STBC and MRC receivers","authors":"Elies Ghayoula, M. H. Taieb, J. Chouinard, R. Ghayoula, A. Bouallègue","doi":"10.1109/WSCNIS.2015.7368281","DOIUrl":"https://doi.org/10.1109/WSCNIS.2015.7368281","url":null,"abstract":"Multiple-input multiple-output (MIMO) systems are commonly used in wireless communications to ensure high bit-rate and high capacity transmission. Space time block coding (STBC) is a technique used in MIMO to provide transmit diversity in communication over fading channels. Although STBC has full diversity gain, the coding gain need to be improved by using channel coding such as low density parity check (LDPC) codes or Turbo codes. This paper evaluates the performance of MIMO systems and the improvement obtained by concatenating LDPC codes. MIMO are based on spatially separated multiple transmitting and receiving antennas to provide diversity. This helps combatting the effect of multipath fading in wireless channels. For single-input multiple-output (SIMO) schemes, maximum ratio combining (MRC) receiver are used to handle redundantly the same information-bearing signal over two or more fading channel. The output of this receiver consist on soft decision metrics that can be fed to LDPC decoder for error correction. For MIMO and multiple-input single-output (MISO) systems, space time block codes (STBC) are used to generate orthogonal signals to avoid interference between signal streams. These signals are transmitted at slightly different times to benefit from temporal diversity. LDPC codes are used in conjunction with STBC to improve the error capability. This paper investigates diversity coding for MIMO systems combined with LDPC soft decoding. Performances of the proposed scheme in terms of bit error rates are reported.","PeriodicalId":253256,"journal":{"name":"2015 World Symposium on Computer Networks and Information Security (WSCNIS)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124701294","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
MLSCPC: Multi-level security using covert channel to achieve privacy through cloud computing MLSCPC:采用隐蔽通道,通过云计算实现保密的多级安全
2015 World Symposium on Computer Networks and Information Security (WSCNIS) Pub Date : 2015-09-01 DOI: 10.1109/WSCNIS.2015.7368307
T. Fatayer, Karim A. Aziz Timraz
{"title":"MLSCPC: Multi-level security using covert channel to achieve privacy through cloud computing","authors":"T. Fatayer, Karim A. Aziz Timraz","doi":"10.1109/WSCNIS.2015.7368307","DOIUrl":"https://doi.org/10.1109/WSCNIS.2015.7368307","url":null,"abstract":"Cloud provider is central processing with shared resources to serve the vendors on demand over the internet where, Cloud model is divided into deployment and service model. In this paper, we address the service model especially privacy where, the privacy allows customers to ensure that their data in cloud not access by unauthorized persons. We implement a novel approach called multi-level security using covert channel to achieve privacy through cloud computing (which we coin it MLSCPC) that enables cloud provider to protect user information from unauthorized persons. We use covert channel to enable cloud provider and customers to communicate in the existence of unauthorized people (e.g. attackers). We have developed a prototype of approach to evaluate its security, feasibility and performance. Our results show that cloud provider can grant customers resources in acceptable time and low computation overhead. Also, attackers don't affect our approach whereby, the cloud provider can grant resources to customers in existent of attackers.","PeriodicalId":253256,"journal":{"name":"2015 World Symposium on Computer Networks and Information Security (WSCNIS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130977419","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
An superior achievement of brain tumor detection using segmentation based on F-transform 基于f变换的分割脑肿瘤检测取得了优异的成绩
2015 World Symposium on Computer Networks and Information Security (WSCNIS) Pub Date : 2015-09-01 DOI: 10.1109/WSCNIS.2015.7368302
Nemir Al-Azzawi, Mohannad K. Sabir
{"title":"An superior achievement of brain tumor detection using segmentation based on F-transform","authors":"Nemir Al-Azzawi, Mohannad K. Sabir","doi":"10.1109/WSCNIS.2015.7368302","DOIUrl":"https://doi.org/10.1109/WSCNIS.2015.7368302","url":null,"abstract":"The brain tumor segmentation studies based on MRI are attracting more and more attention in recent years due to non-invasive imaging and good soft tissue contrast. This paper describes the proposed approach for detection and extraction brain tumor from MRI scan images of brain. Asymmetry of brain is used for detection of abnormality, after detect of the tumor. The segmentation based on F-transform (Fuzzy-Transform) and morphological operations are performed to delineating brain tumor boundaries and calculate the area of the tumor. The F-transform is a professional intelligent method to handle uncertain information and to extract the salient edges. Accuracy and precision are co-dependent. The accuracy of 96% and precision of 95% were found in detection of brain tumor using the proposed approach. The experimental results showed that the proposed algorithm produces perfectly accurate performance to brain tumor detection for MRI brain images.","PeriodicalId":253256,"journal":{"name":"2015 World Symposium on Computer Networks and Information Security (WSCNIS)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128815269","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信