2014 37th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO)最新文献

筛选
英文 中文
Application of TEM cell in measurement of electromagnetic fields of electronic modules 瞬变电磁箱在电子模块电磁场测量中的应用
Kresimir Ivanus, A. Barić
{"title":"Application of TEM cell in measurement of electromagnetic fields of electronic modules","authors":"Kresimir Ivanus, A. Barić","doi":"10.1109/MIPRO.2014.6859543","DOIUrl":"https://doi.org/10.1109/MIPRO.2014.6859543","url":null,"abstract":"The paper presents measured radiated emissions of an electronic module in the frequency range 150 kHz-200 MHz using the TEM cell method. The TEM cell measurement method is explained and measurement results for different orientations of the electronic module are presented. An explanation for the differences in the measured radiated emissions for different module orientations is given.","PeriodicalId":299409,"journal":{"name":"2014 37th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125119280","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Systematic evaluation methodology for fingerprint-image quality assessment techniques 指纹图像质量评价技术的系统评价方法
Jutta Hämmerle-Uhl, M. Pober, A. Uhl
{"title":"Systematic evaluation methodology for fingerprint-image quality assessment techniques","authors":"Jutta Hämmerle-Uhl, M. Pober, A. Uhl","doi":"10.1109/MIPRO.2014.6859771","DOIUrl":"https://doi.org/10.1109/MIPRO.2014.6859771","url":null,"abstract":"We propose a systematic methodology to assess fingerprintimage quality indices. Our approach is able to identify specific weaknesses or strengths of quality indices with respect to certain types of quality impairments. For that purpose, we suggest to employ a tool able to simulate a wide class of acquisition conditions and qualities, applicable to any given dataset and also of potential interest in forensic analysis. As an example for such a tool, StirMark image manipulations (as being developed in the context of watermarking robustness assessment) are applied to fingerprint data in this work, to generate corresponding test data, thereby interpreting certain image manipulations as being highly related to realistic fingerprint acquisition conditions. Experimental results document the usefulness of the approach and report significant inter-data set and inter-fingerprint matcher variability for the quality indices investigated.","PeriodicalId":299409,"journal":{"name":"2014 37th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO)","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116229381","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Evaluation of different feature sets for gait recognition using skeletal data from Kinect 利用Kinect的骨骼数据评估步态识别的不同特征集
Bojan Dikovski, Gjorgji Madjarov, D. Gjorgjevikj
{"title":"Evaluation of different feature sets for gait recognition using skeletal data from Kinect","authors":"Bojan Dikovski, Gjorgji Madjarov, D. Gjorgjevikj","doi":"10.1109/MIPRO.2014.6859769","DOIUrl":"https://doi.org/10.1109/MIPRO.2014.6859769","url":null,"abstract":"Gait is a persons manner of walking. It is a biometric that can be used for identifying humans. Gait is an unobtrusive metric that can be obtained from distance, and this is its main strength compared to other biometrics. In this paper we construct and evaluate feature sets with the purpose of finding out the role of different types of features and body parts in the recognition process. The feature sets were constructed from skeletal images in three dimensions made with a Kinect sensor. The Kinect is a low-cost device that includes RGB, depth and audio sensors. In our work automated gait cycle extraction algorithm was performed on the Kinect recordings. Metrics like angles and distances between joints were aggregated within a gait cycle, and from those aggregations the different feature datasets were constructed. Multilayer perceptron, support vector machine with sequential minimal optimization and J48 algorithms were used for classification on these datasets. At the end we give conclusions on which groups of features and body parts gave the best recognition rates.","PeriodicalId":299409,"journal":{"name":"2014 37th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116435565","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 59
Spend analysis systems 支出分析系统
Sanjin Marzic, Perino Krneta, M. Pavlic
{"title":"Spend analysis systems","authors":"Sanjin Marzic, Perino Krneta, M. Pavlic","doi":"10.1109/MIPRO.2014.6859803","DOIUrl":"https://doi.org/10.1109/MIPRO.2014.6859803","url":null,"abstract":"This paper introduces spend analysis, spend management and supplier management field. It describes the need for a spend analysis system, its' benefits and savings which such system can help to achieve. We present flowchart of spend analysis process in form of a dataflow diagram. We present main issues in development of a spend analysis software, and give an overview of current spend analysis systems.","PeriodicalId":299409,"journal":{"name":"2014 37th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122495891","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Technique for detection of cooperative black hole attack using true-link in Mobile Ad-hoc Networks 移动自组网中基于真链路的协同黑洞攻击检测技术
G. Wahane, A. Kanthe, D. Simunic
{"title":"Technique for detection of cooperative black hole attack using true-link in Mobile Ad-hoc Networks","authors":"G. Wahane, A. Kanthe, D. Simunic","doi":"10.1109/MIPRO.2014.6859791","DOIUrl":"https://doi.org/10.1109/MIPRO.2014.6859791","url":null,"abstract":"Mobile Ad-hoc Network (MANET) is a collection of communication devices or nodes that wish to communicate without any fixed infrastructure and predetermined organization of available links. Security is a major challenge for these networks owing to their features of open medium, dynamically changing topologies. A black hole is a malicious node that falsely replies for any route requests without having active route to specified destination and drops all the receiving packets. Sometimes the black hole nodes cooperate with each other with the aim of dropping packets. These are known as cooperative black hole attack. This proposed work suggests the modification of Ad-hoc on Demand Distance Vector (AODV) routing protocol. We used a technique for detecting as well as defending against a cooperative black hole attack using True-link concept. True-link is a timing based countermeasure to the cooperative black hole attack. This paper shows the performance of MANET decreases for end-to-end delay, normalized routing overhead and increases throughput and packet delivery ratio.","PeriodicalId":299409,"journal":{"name":"2014 37th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122078514","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Personalized guiding templates for pedicle screw placement 个性化的椎弓根螺钉放置指导模板
Uros Tominc, M. Vesel, S. Mawed, M. Dobravec, M. Jug, S. Herman, D. Kreuh
{"title":"Personalized guiding templates for pedicle screw placement","authors":"Uros Tominc, M. Vesel, S. Mawed, M. Dobravec, M. Jug, S. Herman, D. Kreuh","doi":"10.1109/MIPRO.2014.6859570","DOIUrl":"https://doi.org/10.1109/MIPRO.2014.6859570","url":null,"abstract":"Introduction: Pedicle screw fixation is a standard procedure of spinal instrumentation. The aim of this work was to evaluate accuracy and safety of using personalized guiding templates for pedicle screw placement on thoracic spine. Methods and Results: We performed a computer tomography (CT) scan of the spine specimen to acquire virtual 3D model of the spine. Computer software (EBSTM, Ekliptik, Slovenija) was used to design drill templates according to pedicle trajectories. Drill templates were then printed out of the biocompatible polymer using 3D printing technology. Templates were placed on the anatomic specimen vertebras anchoring at three sites - on the lamina at the base of the superior articular process on both sides and at the tip of the spinous process. Holes were drilled, and 3,5 mm screws inserted from T1 do T7 (7 pairs) using custom template for each vertebrae. CT scan was obtained after screw placement to evaluate screw positions. 13 screws were inside of pedicle trajectory without violation of pedicle wall with the tip inside of the vertebral body. One screw perforated medial pedicle wall. Conclusion: The potential use of such a navigational template to insert thoracic pedicle screws in spinal instrumentation is promising. This novel method could improve the accuracy of pedicle screw insertion and reduce the operating time and radiation exposure of spinal fixation surgery.","PeriodicalId":299409,"journal":{"name":"2014 37th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116722587","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Applications methods of the objects, and suitability for universal applications in computer graphics context 对象的应用方法,以及在计算机图形环境中通用应用的适用性
Nderim Zeqiri
{"title":"Applications methods of the objects, and suitability for universal applications in computer graphics context","authors":"Nderim Zeqiri","doi":"10.1109/MIPRO.2014.6859621","DOIUrl":"https://doi.org/10.1109/MIPRO.2014.6859621","url":null,"abstract":"The use of the primitive objects, can be modified and adapted for universal applications in computer graphics context. The present paper addresses some access and research in the field of computer graphics. The program code present the basics step to increase the study and to explore differently level by describing each of them by math formulas and graphical representations. Also, here is explained the methods how we can use all these recourses to implement to any system, where can be find the better solution in the context of universal applications and solutions. So, to solve all from above questions, are given some characteristics objects and program code for respective representations. Also is given a direct approach for ADC (analog-digital conversion), by use the fundamental steps followed by this topics: sampling rate, quantization. Also is given statistical results by creating the respective images and respective view in the context of the statistical analyses.","PeriodicalId":299409,"journal":{"name":"2014 37th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116815438","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Emergency communication in IMS network: Challenges in implementation IMS网络中的应急通信:实现中的挑战
Ivan Krevatin, I. Visković
{"title":"Emergency communication in IMS network: Challenges in implementation","authors":"Ivan Krevatin, I. Visković","doi":"10.1109/MIPRO.2014.6859607","DOIUrl":"https://doi.org/10.1109/MIPRO.2014.6859607","url":null,"abstract":"Emergency communication is an important part of communication for the telecoms not only due to regulation but primary due to their responsibilities to the customers and the role they have in society. This paper describes the challenges which we are facing when implementing emergency communication in IMS network regarding the architecture and special requirements demanded by the Regulator and emergency service centers. In focus are: the architecture for customers accessing the service over fixed access and the possible implementations for customers that are accessing the service over LTE (Long Term Evolution) network.","PeriodicalId":299409,"journal":{"name":"2014 37th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO)","volume":"120 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117296424","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
UNDERSTANDER Business Intelligence Seeker — User agent 商业智能搜索器-用户代理
V. Damjanovic, W. Behrendt
{"title":"UNDERSTANDER Business Intelligence Seeker — User agent","authors":"V. Damjanovic, W. Behrendt","doi":"10.1109/MIPRO.2014.6859802","DOIUrl":"https://doi.org/10.1109/MIPRO.2014.6859802","url":null,"abstract":"UNDERSTANDER is an exploratory R&D project investigating Business Intelligence (BI) as a knowledge-gathering tool for supporting innovation processes in specific industrial domains. We develop a knowledge-based model that is grounded on the following three concepts: (i) Business Intelligence Model (BIM) developed by a Canadian project for BI technologies, (ii) taxonomy of Competitive Intelligence (CI) developed by CI practitioners, and (iii) Conceptual Dependency (CD) theory dealing with verb-oriented organization of knowledge. We also investigate whether knowledge-based models can be made adequate for the problem of gathering BI from web resources. Such a knowledge model can be used to “prime” a software agent and the agent can then search autonomously for relevant information on the Web. To express the interaction between agents, we consider “mechanism design”, which is a framework for designing interaction between self-interested agents to achieve specific outcomes. A BI Seeker is a multi-agent application developed in WADE. (Workflows and Agents Development Environment). WADE is an extension of JADE, a popular Open Source framework that brings workflow mechanisms to agents. We present the design of the BI Seeker as an application in the field of Industrial Internet.","PeriodicalId":299409,"journal":{"name":"2014 37th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO)","volume":"117 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117325148","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Mjolnirr: Private PaaS as distributed computing evolution Mjolnirr:私有PaaS是分布式计算的演变
Dmitry I. Savchenko, G. Radchenko
{"title":"Mjolnirr: Private PaaS as distributed computing evolution","authors":"Dmitry I. Savchenko, G. Radchenko","doi":"10.1109/MIPRO.2014.6859596","DOIUrl":"https://doi.org/10.1109/MIPRO.2014.6859596","url":null,"abstract":"Cloud computing became very popular during the last few decades. It provides convenient access to remote computing resources for individual users and organizations. However, there are still security issues arise if the private data is transmitted to the public cloud for processing. This issue can be resolved with private cloud systems. In this paper, we propose the design and implementation of a Mjolnirr private cloud platform for development of the private PaaS cloud systems. It provides infrastructure for cloud applications development, including software developer kit and message brokering system. Proposed cloud platform can be deployed on resources of a distributed computing system, including idling resources of personal computers. For a developer, a Mjolnirr application is represented as a collection of independent components communicating by a message exchange communication protocol.","PeriodicalId":299409,"journal":{"name":"2014 37th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129947061","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信