2017 11th International Conference on Signal Processing and Communication Systems (ICSPCS)最新文献

筛选
英文 中文
A compact tri band microstrip slotted antenna with defected ground for wireless applications 一种紧凑的三带微带开槽天线,有缺陷地,用于无线应用
Maryam Rasool, Novera Tahir, B. Ijaz, K. Alimgeer, M. S. Khan
{"title":"A compact tri band microstrip slotted antenna with defected ground for wireless applications","authors":"Maryam Rasool, Novera Tahir, B. Ijaz, K. Alimgeer, M. S. Khan","doi":"10.1109/ICSPCS.2017.8270493","DOIUrl":"https://doi.org/10.1109/ICSPCS.2017.8270493","url":null,"abstract":"A compact tri band slot loaded defected ground microstrip patch antenna, operating on three frequencies is presented. The antenna operates effectively at 3, 5.3 and 8 GHz. Simulated return loss at 3 GHz, 5.3 GHz and 8 GHz turns out to be −11.59 dB, −17.52 dB and −16.42 dB, respectively. The proposed antenna is compact in size and has been designed using FR4 epoxy substrate with a relative permittivity of 4.4. The design uses differently spaced rectangular and T-shaped slots in the patch and a defected ground structure with square and U-shaped slots. The proposed antenna can find applications in different wireless systems like WLAN and WiMAX. The implemented design is simulated using High Frequency Structure Simulator (HFSS). The proposed design has also been fabricated and the return loss has been measured and found in agreement with the simulated values.","PeriodicalId":268205,"journal":{"name":"2017 11th International Conference on Signal Processing and Communication Systems (ICSPCS)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131498453","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Concatenated finite geometry and finite field LDPC codes 连接有限几何和有限域LDPC代码
Mona Nasseri, Xin Xiao, Shaoliang Zhang, Ting Wang, Shu Lin
{"title":"Concatenated finite geometry and finite field LDPC codes","authors":"Mona Nasseri, Xin Xiao, Shaoliang Zhang, Ting Wang, Shu Lin","doi":"10.1109/ICSPCS.2017.8270513","DOIUrl":"https://doi.org/10.1109/ICSPCS.2017.8270513","url":null,"abstract":"This paper presents two types of concatenated finite-geometry and finite-field LDPC codes which have the distinct features of both finite geometry and finite field LDPC codes, such as large minimum distances, no small trapping sets, fast decoding convergence, capable of correcting both random errors and bursts of erasures, flexibility in code construction, cyclic and quasi-cyclic structures. It is shown that these concatenated codes are globally coupled LDPC codes and they perform well over the AWGN and binary erasure channels with a two-phase iterative decoding scheme.","PeriodicalId":268205,"journal":{"name":"2017 11th International Conference on Signal Processing and Communication Systems (ICSPCS)","volume":"160 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133212860","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Secrecy outage probability and jamming coverage of UAV-enabled friendly jammer 无人机启用友好型干扰机的保密中断概率和干扰覆盖
Yi Zhou, Phee Lep Yeoh, H. Chen, Yonghui Li, Wibowo Hardjawana, B. Vucetic
{"title":"Secrecy outage probability and jamming coverage of UAV-enabled friendly jammer","authors":"Yi Zhou, Phee Lep Yeoh, H. Chen, Yonghui Li, Wibowo Hardjawana, B. Vucetic","doi":"10.1109/ICSPCS.2017.8270455","DOIUrl":"https://doi.org/10.1109/ICSPCS.2017.8270455","url":null,"abstract":"In this paper, we examine the secrecy performance of an unmanned aerial vehicle (UAV) equipped with an air-to-ground jammer and a ground communications network comprising a legitimate transmitter-receiver pair and an eavesdropper. We consider two scenarios: stationary UAV jammer and mobile UAV jammer. In the first scenario, we derive the secrecy outage probability (SOP) of the legitimate link for fixed distances between the UAV jammer, legitimate nodes and eavesdropper. Based on the SOP, we evaluate the jamming coverage of the UAV jammer and propose a two-step optimization problem to determine the optimal UAV location when the eavesdropper location is unknown. In the mobile UAV scenario, we design a new algorithm to provide jamming coverage to a given target area with minimum number of stopping points. Simulation and analytical results show that a UAV jammer can significantly improve the jamming coverage compared with a ground jammer.","PeriodicalId":268205,"journal":{"name":"2017 11th International Conference on Signal Processing and Communication Systems (ICSPCS)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134331453","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
A novel indoor ranging method using weighted altofrequent RSSI measurements 一种利用加权高频率RSSI测量的新型室内测距方法
Jing Jing Wang, J. Hwang, J. Park
{"title":"A novel indoor ranging method using weighted altofrequent RSSI measurements","authors":"Jing Jing Wang, J. Hwang, J. Park","doi":"10.1109/ICSPCS.2017.8270461","DOIUrl":"https://doi.org/10.1109/ICSPCS.2017.8270461","url":null,"abstract":"The ranging method based on RSSI (Received Signal Strength Indicator) is a distance estimation method with a low cost and low complexity, which is widely used in indoor ranging. The key feature lies in how to overcome an interference of random factors to the signal and make the ranging method more accurate. We have interest in fact that the influences on RSSI measurements from indoor propagation environments can be another ranging error source. In other words, to improve ranging accuracy, influenced factors on RSSI measurements should be minimized or compensated. In this paper, we propose an altofrequent weighting method. Proposed method uses weighted RSSI measurements with occurrence rate in a reference position. Simulation results show that proposed novel approach achieves more accurate performance and no extra equipment required compared with existing method.","PeriodicalId":268205,"journal":{"name":"2017 11th International Conference on Signal Processing and Communication Systems (ICSPCS)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134070462","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Fidelity-preserving coefficient truncation method for wavelet-based compressors for biomedical IoT applications 生物医学物联网应用小波压缩器保真系数截断方法
Jose Santos, D. Peng, M. Hempel, H. Sharif
{"title":"Fidelity-preserving coefficient truncation method for wavelet-based compressors for biomedical IoT applications","authors":"Jose Santos, D. Peng, M. Hempel, H. Sharif","doi":"10.1109/ICSPCS.2017.8270509","DOIUrl":"https://doi.org/10.1109/ICSPCS.2017.8270509","url":null,"abstract":"A common approach in the realization of wavelet-based compressors for ECG signals makes use of truncation methods, whereby wavelet coefficients are truncated (i.e., thrown away) if they're deemed insignificant. A popular truncation strategy applied in these compressors is to truncate based on Energy Packing Efficiency or EPE, which tends to favor coefficients at higher scales because their energy contribution (either in squared or absolute-value sense) is itself insignificant. In this paper, we present four rudimentary truncation strategies to analyze and demonstrate how the choice of truncation strategy can affect the signal in terms of compression ratio (CR) and signal fidelity. Of these, a truncation strategy we call ‘ScaleRelativeMAX’ is proposed, which exhibits some useful properties for sensitive biomedical applications. Simulation results are presented using representative select ECG records from PhysioNet's database to show that some truncation methods — in particular, our proposed truncation strategy — allows for fine-grained fidelity and CR control than others and offer nearly linear reconstruction error growth as a function of the truncation threshold in comparison to other strategies that are more aggressive in favoring CR over signal fidelity. Such fidelity-first strategies are useful in biomedical communication architectures for emerging Internet-of-Things (IoT) applications that employ compressors to minimize energy transmission costs in Body Area Sensor Networks (BASNs) and similar wearable devices. Such signals carry diagnostic information that are of clinical significance, and whose reconstruction of clinical features should take priority and is in stark contrast to ordinary multimedia class signals, which generally tend to favor CR over signal fidelity.","PeriodicalId":268205,"journal":{"name":"2017 11th International Conference on Signal Processing and Communication Systems (ICSPCS)","volume":"91 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130303177","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A fractional fourier domain approach for multiple target localization using the time-of-arrival 基于到达时间的分数傅里叶域多目标定位方法
Pei H. Leong, T. Lamahewa, T. Abhayapala
{"title":"A fractional fourier domain approach for multiple target localization using the time-of-arrival","authors":"Pei H. Leong, T. Lamahewa, T. Abhayapala","doi":"10.1109/ICSPCS.2017.8270511","DOIUrl":"https://doi.org/10.1109/ICSPCS.2017.8270511","url":null,"abstract":"In this paper, a parameter estimation method for localizing multiple targets in the three-dimensional region using as few as four sensor elements is presented. It is designed based on the properties of chirp signals in fractional Fourier domains and it provides good separation to closely spaced targets. Besides that, a notable advantage of the proposed method over existing methods is its capability in detecting and localizing more targets than the number of sensors.","PeriodicalId":268205,"journal":{"name":"2017 11th International Conference on Signal Processing and Communication Systems (ICSPCS)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123329123","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A mathematical model of access control to allocate downlink bandwidth in high-density wireless LAN 高密度无线局域网下行带宽分配的访问控制数学模型
Yuto Katayama, D. Umehara, K. Wakasugi
{"title":"A mathematical model of access control to allocate downlink bandwidth in high-density wireless LAN","authors":"Yuto Katayama, D. Umehara, K. Wakasugi","doi":"10.1109/ICSPCS.2017.8270501","DOIUrl":"https://doi.org/10.1109/ICSPCS.2017.8270501","url":null,"abstract":"In the IEEE 802.11 standards used for wireless local area networks (WLANs), an access point (AP) and stations (STAs) have opportunities to transmit the data frame in a basic service set (BSS) by carrier sense multiple access with collision avoidance (CSMA/CA). When there are a large number of STAs with high traffic in the BSS, the throughput from AP to a STA will deteriorate since its transmit opportunities are severely limited. We develop a mathematical model of access control to allocate bandwidth for the downlink from AP to STAs in the saturated traffic. The mathematical model enables us to derive a contention window (CW) size at AP with uniform backoff algorithm such that the downlink bandwidth is guaranteed even in the bidirectional saturated traffic. We show the validity of the CW size obtained from the mathematical model using a network simulator, ns3.","PeriodicalId":268205,"journal":{"name":"2017 11th International Conference on Signal Processing and Communication Systems (ICSPCS)","volume":"102 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121079252","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Enhancing integrity of modbus TCP through covert channels 通过隐蔽通道增强modbus TCP的完整性
James M. Taylor, H. Sharif
{"title":"Enhancing integrity of modbus TCP through covert channels","authors":"James M. Taylor, H. Sharif","doi":"10.1109/ICSPCS.2017.8270454","DOIUrl":"https://doi.org/10.1109/ICSPCS.2017.8270454","url":null,"abstract":"CPS-enabled systems form the underlying support infrastructure that impact the efficient delivery of critical goods and services in our modern society. Failure to adequately protect the integrity, confidentiality, and availability of our critical infrastructure systems, like transportation, delivery of energy and water, and healthcare, could introduce vulnerabilities that could be exploited by attackers. CPS networks originated from a number of proprietary protocols, built to operate without connections that extended beyond the plant walls. This “security through obscurity” approach did not reveal widespread security risks until these systems were interconnected with other information technology systems, including vulnerable business operations networks. The characteristics of the communications protocols used in operational technology systems, like Modbus, present a number of barriers to adopting security enhancements. When these systems are exploited, which can be easily demonstrated on a Modbus system, the impact of security failures can be severe. Covert channels have the potential to create an out-of-band communication path that would enable some level of integrity checking between devices. The Modbus Covert Channel Integrity Check is a proposed concept that would demonstrate the use of covert channels as a method of secure communication that would prevent a number of attacks, including man-in-the-middle.","PeriodicalId":268205,"journal":{"name":"2017 11th International Conference on Signal Processing and Communication Systems (ICSPCS)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129693989","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Ultrasound imaging using modal domain frequency smoothed MVDR beamforming 模态域频率平滑MVDR波束成形超声成像
Huiyuan Sun, Mengzhuo Lu, T. Abhayapala
{"title":"Ultrasound imaging using modal domain frequency smoothed MVDR beamforming","authors":"Huiyuan Sun, Mengzhuo Lu, T. Abhayapala","doi":"10.1109/ICSPCS.2017.8270476","DOIUrl":"https://doi.org/10.1109/ICSPCS.2017.8270476","url":null,"abstract":"Increasing the reliability of ultrasound images can significantly aid clinical diagnosis. Recently, MVDR beamforming has been applied to medical ultrasound imaging and achieved promising results. In this paper, we propose a new method of MVDR beamforming with frequency smoothing in the modal domain. The proposed method de-correlates the signal correlation matrix and reduces interference. With the modal expansion and radially focusing the frequency domain signal, it removes the influence of frequencies on the original received signal before applying frequency smoothing and beamforming to achieve a better speckle reduction ability than previous methods. As examined by simulation, the method provides a better approach to find the optimal weights for the transducers constructing medical ultrasound images, which effectively decreasing the side effects, resulting in a better image quality.","PeriodicalId":268205,"journal":{"name":"2017 11th International Conference on Signal Processing and Communication Systems (ICSPCS)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130915837","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Wavelet decomposition-based stereoscopic 3-D video watermarking — A comparative study 基于小波分解的立体三维视频水印的比较研究
Omar N. Al Boridi, H. Wu, R. V. Schyndel
{"title":"Wavelet decomposition-based stereoscopic 3-D video watermarking — A comparative study","authors":"Omar N. Al Boridi, H. Wu, R. V. Schyndel","doi":"10.1109/ICSPCS.2017.8270458","DOIUrl":"https://doi.org/10.1109/ICSPCS.2017.8270458","url":null,"abstract":"In this paper, two digital watermark algorithms are compared for stereoscopic three-dimensional (3-D) video protection. Dual-tree complex wavelets transform (DT-CWT) and Haar discrete wavelet transform (Haar DWT) are employed to embed an image watermark to left and right views of a stereoscopic video stream. The digital watermark embedded in the selected coefficients of the CB-channel to avoid visual perception of the embedded image by the human eye, which is compared favorably with the widely used watermark embedding approach in YCBCR domain in terms of picture quality and has higher capacity for watermark payload. Results show that the DT-CWT demonstrates better performance than the Harr DWT in terms of robustness, watermark payload and visual transparency. Objective and subjective assessments were conducted on the watermarked 3-D video sequences for performance evaluation. The methods are benchmarked against the state of the art methods such as QIM-NTSS (quantization index modulation — new three-step search) and IProtect, and have survived various types of watermark attacks.","PeriodicalId":268205,"journal":{"name":"2017 11th International Conference on Signal Processing and Communication Systems (ICSPCS)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127601166","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信