2018 IEEE International Conference on the Science of Electrical Engineering in Israel (ICSEE)最新文献

筛选
英文 中文
Multi-Speaker Direction of Arrival Estimation using SRP-PHAT Algorithm with a Weighted Histogram 加权直方图SRP-PHAT算法的多说话人到达方向估计
E. Hadad, S. Gannot
{"title":"Multi-Speaker Direction of Arrival Estimation using SRP-PHAT Algorithm with a Weighted Histogram","authors":"E. Hadad, S. Gannot","doi":"10.1109/ICSEE.2018.8646206","DOIUrl":"https://doi.org/10.1109/ICSEE.2018.8646206","url":null,"abstract":"A direction of arrival (DOA) estimator for concurrent speakers in a reverberant environment is presented. The DOA estimation task is formulated in the short-time Fourier transform (STFT) in two stages. In the first stage, a single narrow-band DOA per time-frequency (T-F) is selected, since the speech sources are assumed to exhibit disjoint activity in the STFT domain. The narrow-band DOA is obtained as the maximum of the narrow-band steered response power phase transform (SRP-PHAT) localization spectrum at that T-F bin. In addition, for each narrow-band DOA, a quality measure is calculated, which provides the confidence in the estimated decision. In the second stage, the wide-band localization spectrum is calculated using a weighted histogram of the narrow-band DOAs with the quality measures as weight. Finally, the wide-band DOA estimation is obtained by selecting the peaks in the wide-band localization spectrum. The results of our experimental study demonstrate the benefit of the proposed algorithm as compared to the wide-band SRP-PHAT algorithm in a reverberant environment.","PeriodicalId":254455,"journal":{"name":"2018 IEEE International Conference on the Science of Electrical Engineering in Israel (ICSEE)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124892111","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Bio-Inspired Micro Drones
Boaz Ben-Moshe, Yael Landau, Revital Marbel, Aviv Mishiner
{"title":"Bio-Inspired Micro Drones","authors":"Boaz Ben-Moshe, Yael Landau, Revital Marbel, Aviv Mishiner","doi":"10.1109/ICSEE.2018.8645997","DOIUrl":"https://doi.org/10.1109/ICSEE.2018.8645997","url":null,"abstract":"This work presents a concept of intelligent micro drones which are motivated by flying insects such as bees. The presented micro drones can perform bio inspired complex tasks autonomously using simple sensors which require very low computing power. In particular, we present a set of algorithms for obstacle avoiding, navigation, swarm formation flight and mapping all based on sub-gram sensors which are applicable for on-board processing by micro drones. Using both simulation and field experiment we conclude that many bio-inspired challenges can be performed without the use of high resolution visual sensors. Moreover autonomous micro drones can take part in a wide range of research fields including: mobile sensor networks and swarm algorithms for search & rescue.","PeriodicalId":254455,"journal":{"name":"2018 IEEE International Conference on the Science of Electrical Engineering in Israel (ICSEE)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125864650","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Analysis of White Light Speckle Imaging 白光散斑成像分析
Moran Davoodi, Y. Buchris, I. Cohen
{"title":"Analysis of White Light Speckle Imaging","authors":"Moran Davoodi, Y. Buchris, I. Cohen","doi":"10.1109/ICSEE.2018.8646158","DOIUrl":"https://doi.org/10.1109/ICSEE.2018.8646158","url":null,"abstract":"In this paper, we present a new approach for analyzing white light speckle patterns. The paper introduces an analytic model and heuristic explanations for the phenomena using the contrast and intensity statistics of the speckles. Relations between the coherence length, central wavelength and surface roughness are examined. It is shown that the speckle intensity is directly related to the autocorrelation function. We show that the new approach is consistent with previous models using simulation results and experimental data.","PeriodicalId":254455,"journal":{"name":"2018 IEEE International Conference on the Science of Electrical Engineering in Israel (ICSEE)","volume":"17 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125918236","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Optimal Time-Sharing for Multiple-Input Single Ended Primary Inductor Converter (SEPIC) 多输入单端初级电感变换器(SEPIC)的最佳分时算法
K. Ibn-Bari, Y. Horen, S. Bronshtein, D. Baimel
{"title":"Optimal Time-Sharing for Multiple-Input Single Ended Primary Inductor Converter (SEPIC)","authors":"K. Ibn-Bari, Y. Horen, S. Bronshtein, D. Baimel","doi":"10.1109/ICSEE.2018.8646173","DOIUrl":"https://doi.org/10.1109/ICSEE.2018.8646173","url":null,"abstract":"This paper analyses an optimal time-sharing design for obtaining the maximum efficiency of a Multiple-Input Single Ended Primary Inductor Converter (MI SEPIC). The analysis approach is based on the average model methodology and considers conduction losses. Theoretical results are supported by simulations.","PeriodicalId":254455,"journal":{"name":"2018 IEEE International Conference on the Science of Electrical Engineering in Israel (ICSEE)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125399896","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
LCD TEMPEST Air-Gap Attack Reloaded LCD风暴气隙攻击重新加载
Mordechai Guri, Matan Monitz
{"title":"LCD TEMPEST Air-Gap Attack Reloaded","authors":"Mordechai Guri, Matan Monitz","doi":"10.1109/ICSEE.2018.8646277","DOIUrl":"https://doi.org/10.1109/ICSEE.2018.8646277","url":null,"abstract":"In 1998, researcher showed how attackers can transmit data from computers through electromagnetic radio waves generated by the computer video card. 20 years later, we examine this type of threat in a context of modern cyber-attacks. In this type of threat, attackers can covertly leak sensitive data from isolated (‘air-gapped’) computers using the electromagnetic emission from the video card. We present related work and give a brief technical background. We tested the TEMPEST attack with modern LCD screens and affordable user-defined-radio hardware available today for only $30. We implement a transmitter malware that can modulate binary data and transmit it over electromagnetic waves emitted from the video cable. We also implement a remote receiver, which demodulate and decode the transmission using GNU Radio. We present an analysis of the frequency range, effective distance and the bandwidth of this covert-channel. We found that malware can covertly leak data (e.g., encryption keys, keylogging data and documents) from air-gapped computers to a nearby RF receiver via the electromagnetic emission. The effective bitrate of this channel is 60 bit/sec to 640 bit/sec.","PeriodicalId":254455,"journal":{"name":"2018 IEEE International Conference on the Science of Electrical Engineering in Israel (ICSEE)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122701646","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Speech Enhancement With Deep Neural Networks Using MoG Based Labels 基于MoG标签的深度神经网络语音增强
Hodaya Hammer, Gilad Rath, Shlomo E. Chazan, J. Goldberger, S. Gannot
{"title":"Speech Enhancement With Deep Neural Networks Using MoG Based Labels","authors":"Hodaya Hammer, Gilad Rath, Shlomo E. Chazan, J. Goldberger, S. Gannot","doi":"10.1109/ICSEE.2018.8646105","DOIUrl":"https://doi.org/10.1109/ICSEE.2018.8646105","url":null,"abstract":"In this paper we present a mixture of Gaussians-deep neural network (MoG-DNN) algorithm for single-microphone speech enhancement. We combine between the generative mixture of Gaussians (MoG) model and the discriminative deep neural network (DNN). The proposed algorithm consists of two phases, the training phase and the test phase. In the training phase, the clean speech power spectral density (PSD) is modeled as a MoG representing an unsupervised assortment of the speech signal. Following, the database is labeled to fit the given MoG. DNN is then trained to classify noisy time-frame features to one of the Gaussians from the already inferred MoG. Given the classification results, a speech presence probability (SPP) is obtained in the test phase. Using the SPP, soft spectral subtraction is then applied, while, simultaneously updating the noise statistics. The generative unsupervised MoG can be applied to any unknown database, in addition to preserving the speech spectral structure. Furthermore, the discriminative DNN maintains the continuity of the speech. Experimental study shows that the proposed algorithm produces higher objective measurements scores compared to other speech enhancement algorithms.","PeriodicalId":254455,"journal":{"name":"2018 IEEE International Conference on the Science of Electrical Engineering in Israel (ICSEE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123385954","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Robust Motion Compensation for Forensic Analysis of Egocentric Video using Joint Stabilization and Tracking 基于关节稳定和跟踪的自中心视频取证分析鲁棒运动补偿
Oren Cohen, Alexander Apartsin, J. Alon, E. Katz
{"title":"Robust Motion Compensation for Forensic Analysis of Egocentric Video using Joint Stabilization and Tracking","authors":"Oren Cohen, Alexander Apartsin, J. Alon, E. Katz","doi":"10.1109/ICSEE.2018.8646211","DOIUrl":"https://doi.org/10.1109/ICSEE.2018.8646211","url":null,"abstract":"Stabilization and tracking of objects in egocentric videos captured by law enforcement body-worn cameras are often much more challenging compared to standard videos captured by regular mobile cameras. That is due to extreme motion caused either by the camera or by objects in the video frames. Therefore, standard stabilization and tracking methods may be less effective on such video clips, and more robust methods are required. The work presented in this paper describes robust methods for video frame stabilization and in-frame object stabilization and tracking for egocentric video analysis. During forensic investigations, sometimes more than one type of analysis is required for egocentric videos, captured in a variety of motion conditions. Hence we first define four types of use-cases that influence the requirements from the stabilization and tracking algorithms. These use-cases are categorized according to the camera motion vector, the type, size and number of objects in the scene, and to the relative motion between the objects. The methods we provide for those four use-cases are specifically adapted for forensic investigation, and have the ability to simultaneously stabilize and track both background as well as foreground regions in the video frames. The proposed methods are robust to the frame content, perform joint estimation and filtering of the camera path, and handle multiple moving objects in the scene, as demonstrated in our experiments.","PeriodicalId":254455,"journal":{"name":"2018 IEEE International Conference on the Science of Electrical Engineering in Israel (ICSEE)","volume":"113 22","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113945555","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Thinning Satellite Communication Antenna Arrays for Dual Band Operation 双频操作的卫星通信天线阵列减薄
R. Gal, R. Shavit
{"title":"Thinning Satellite Communication Antenna Arrays for Dual Band Operation","authors":"R. Gal, R. Shavit","doi":"10.1109/ICSEE.2018.8646194","DOIUrl":"https://doi.org/10.1109/ICSEE.2018.8646194","url":null,"abstract":"In this paper a design method is proposed to construct a dual-band operation antenna array, interleaving two arrays, operating at Ku and Ka-band frequencies, on the same real estate. Sharing the same antenna aperture is required to utilize a limited real estate for multiple tasks. First, each array configuration is examined, to achieve optimal initial guess to the thinning algorithms. Triangular lattice is applied for both arrays and overlapping elements are shifted along major axes to allow interleaving of both arrays. Circular aperture is used for the larger Ku array. To analyze the configuration performance, reference arrays are constructed, with rectangular aperture and rectangular lattice. Moreover, genetic algorithm is used to further thinning the Ku array and maintaining a required property of the application. All the analysis is taken considering a scan range of $35^{mathrm {o}} bullet 65^{mathrm {o}}$, to achieve a design that is applicable for satellite communication purposes. The optimal Ku array directivity after thinning at scan angle $theta =50^{mathrm {o}}$ is 32.53 dBi (1 dB decrease relative to reference array), using only 74% of the reference arrays elements (rectangular aperture and rectangular lattice). Side lobes level (SLL) remained at -22.19 dB (SLL requirement is -22 dB). The results for the requested scan range shows no grating-lobes in radiation patterns, and satisfactory results comparing to the reference arrays.","PeriodicalId":254455,"journal":{"name":"2018 IEEE International Conference on the Science of Electrical Engineering in Israel (ICSEE)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125639393","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Face anti-spoofing based on projective invariants 基于投影不变量的人脸防欺骗
Alexander Naitsat, Y. Zeevi
{"title":"Face anti-spoofing based on projective invariants","authors":"Alexander Naitsat, Y. Zeevi","doi":"10.1109/ICSEE.2018.8646223","DOIUrl":"https://doi.org/10.1109/ICSEE.2018.8646223","url":null,"abstract":"The most common security authentication systems rely on automatic face recognition, which is particularly vulnerable to various spoofing attacks. Often these attacks include attempts to deceive a system by using a photo or video recording of a legitimate user. Recent approaches to this problem are based on pure machine learning techniques that require large training datasets and generalize or scale, poorly.By contrast, we present a geometric approach for detecting spoofing attacks in face recognition based authentication systems. By locating planar regions around racial landmarks, our method distinguishes between genuine user recordings and recordings of spoofed images such as printed photos and video replays.The proposed algorithm is based on projective invariant relationships that are independent of the camera parameters and lighting conditions. Unlike previous geometric approaches, the input to our system is a stream of two RGB cameras. Comparing with methods implemented by a single RGB camera, our approach is significantly more accurate and is completely automatic, since we do not require head movements and other user interactions. While, on the other hand, our method does not employ expensive devices, such as depth or thermal cameras, and it operates both in indoor and outdoor settings.","PeriodicalId":254455,"journal":{"name":"2018 IEEE International Conference on the Science of Electrical Engineering in Israel (ICSEE)","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134446885","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Effect of Load Composition on the Frequency Response of the Cyprus Power System 负荷构成对塞浦路斯电力系统频率响应的影响
Elena Polykarpou, M. Asprou, E. Kyriakides, Christos Hadjilaou, A. Petoussis, Z. Achillides
{"title":"Effect of Load Composition on the Frequency Response of the Cyprus Power System","authors":"Elena Polykarpou, M. Asprou, E. Kyriakides, Christos Hadjilaou, A. Petoussis, Z. Achillides","doi":"10.1109/ICSEE.2018.8646268","DOIUrl":"https://doi.org/10.1109/ICSEE.2018.8646268","url":null,"abstract":"The Cyprus power system is undergoing vast changes due to the increasing penetration of renewable energy sources. The isolated nature of the system makes it more vulnerable to large frequency deviations. As a consequence, frequency control becomes challenging especially in the case of large disturbances. To keep the system in admissible frequency limits and avoid brownouts or even system blackout, it is important to have a detailed and accurate model of the system to improve monitoring and control, and enhance the situational awareness of the system operators. One important component of the system to be modelled is the system load. Although this is not a straightforward task, the significance of load modelling can be underlined by the fact that the system response is affected by the type of the system loads. In this sense, the type of the load in combination with the increased penetration of dispersed renewable energy sources can significantly affect the system frequency response to generation loss events. In this paper, the importance of accurate load modelling and the associated effect to the response of the Cyprus power system is examined. The system frequency response to generation loss events for multiple scenarios is investigated. Various load compositions are examined, while PV generation is also considered in order to simulate realistic system conditions. Furthermore, two cases of different plant mix are also examined.","PeriodicalId":254455,"journal":{"name":"2018 IEEE International Conference on the Science of Electrical Engineering in Israel (ICSEE)","volume":"158 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132767417","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信