{"title":"Ship detection and property extraction in radar images using hardware","authors":"Koray Kilinc, F. Gebali, K. F. Li","doi":"10.1109/PACRIM.2015.7334891","DOIUrl":"https://doi.org/10.1109/PACRIM.2015.7334891","url":null,"abstract":"In this work we investigate radar imaging satellites' dependency on ground stations to transfer the image data. Since synthetic aperture radar images are very big, only ground stations are equipped to process that much data in realtime. This is a problem for maritime surveillance as it creates delay between imaging and processing. We propose a hardware algorithm that can be used by a satellite to detect ships and extract information about them in real time, and since this information is smaller it can be relayed with significant reduction in delay. For ship detection, adaptive thresholding algorithm with exponential model is used. This algorithm was selected as it can be applied in real time. For the property calculation, a data accumulating, single-look, connected component labeling algorithm is proposed. This algorithm accumulates data about the connected components which is then used to calculate the properties of ships using image moments. The combined algorithm was then validated on RADARSAT-2 images using Matlab for software and co-simulation for hardware. The algorithm was able to detect ships and calculate the features with less than 5% error.","PeriodicalId":350052,"journal":{"name":"2015 IEEE Pacific Rim Conference on Communications, Computers and Signal Processing (PACRIM)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116106035","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Byeong-uk Lee, Sun-young Im, Seungwoon Lee, Bosung Kim, B. Roh, Young-Bae Ko
{"title":"The beacon identification using low pass filter for Physical Web based IoT services","authors":"Byeong-uk Lee, Sun-young Im, Seungwoon Lee, Bosung Kim, B. Roh, Young-Bae Ko","doi":"10.1109/PACRIM.2015.7334861","DOIUrl":"https://doi.org/10.1109/PACRIM.2015.7334861","url":null,"abstract":"Various Internet of Things (IoT) Platforms are currently announced by major IT companies. Google also announced IoT open-sourced platform project which called as Physical Web. If Physical Web is released to the IoT marketplace, a number of beacons would be in demand because each service requires at least one beacon for connectivity. Small area which set multiple beacons are set up occur interference each other. So it should be considered to identify accurately which beacon broadcasts the signals. The device based on Physical Web identifies priority of beacons through distance using Received Signal Strength Indicator (RSSI). In this paper, we prove the limit of current beacon identification for Physical Web. Also we suggest the improvement of beacon identification using low pass filter in the small area. To verify that proposed idea is applicable in real life, we model the service called ALLFIT which is built with physical web in small area. Therefore, the proposed idea is expected to be a key role in IoT service architecture.","PeriodicalId":350052,"journal":{"name":"2015 IEEE Pacific Rim Conference on Communications, Computers and Signal Processing (PACRIM)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129502782","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Use of DPI technology for server congestion control and reduction of power consumption by servers","authors":"Kohei Yanagisawa, S. Kuribayashi","doi":"10.1109/PACRIM.2015.7334800","DOIUrl":"https://doi.org/10.1109/PACRIM.2015.7334800","url":null,"abstract":"Deep packet inspection (DPI) technology has conventionally been introduced for traffic monitoring, bandwidth control, bandwidth allocation, access control of specific types of traffic, etc. By installing a DPI equipment at any arbitrary point in a network, it is possible to monitor communications of many servers simply and this could simplify dramatically the conventional work load for system management and reduction of power consumption by servers. As a new potential application of DPI technology, this paper explores the possibility of applying DPI technology to server congestion control and reduction of power consumption by servers, and presents implementation examples of these applications. This paper first proposes an example of server congestion control method, in which the DPI equipment estimates the CPU usage of each server by constantly monitoring the number of live TCP connections established by each server, and moves some of virtual machines on the congested server to other servers through remote control timely. Next, this paper proposes an example of reducing power consumption by servers, in which the DPI equipment constantly monitors the traffic sent or received in each area with multiple servers. Finally, the feasibility of the proposed methods is demonstrated by an evaluation system with a real DPI equipment.","PeriodicalId":350052,"journal":{"name":"2015 IEEE Pacific Rim Conference on Communications, Computers and Signal Processing (PACRIM)","volume":"47 8","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113989153","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Adaptive modulation with variable switching thresholds for amplify-and-forward cooperative systems","authors":"E. Altubaishi","doi":"10.1109/PACRIM.2015.7334880","DOIUrl":"https://doi.org/10.1109/PACRIM.2015.7334880","url":null,"abstract":"In this paper, discrete-rate adaptive modulation using variable switching thresholds for amplify-and-forward cooperative systems is evaluated over Rayleigh fading channels. The aim is to improve spectral efficiency of cooperative transmission by maintaining the error rate at acceptable level. The switching thresholds are adjusted using a simple algorithm which depends only on the detection of error in the received block. Results show that the proposed algorithm used to adjust the switching thresholds outperforms the fixed switching thresholds approach in terms of average spectral efficiency.","PeriodicalId":350052,"journal":{"name":"2015 IEEE Pacific Rim Conference on Communications, Computers and Signal Processing (PACRIM)","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114586865","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Video editing in the gradient domain using a wavelet based 3-D reconstruction algorithm and an iterative Poisson solver","authors":"Ioana S. Sevcenco, P. Agathoklis","doi":"10.1109/PACRIM.2015.7334835","DOIUrl":"https://doi.org/10.1109/PACRIM.2015.7334835","url":null,"abstract":"A new wavelet based algorithm for reconstructing three dimensional (3-D) signals from gradients is proposed. The algorithm is based on obtaining directly from the gradients the Haar wavelet decomposition and from it the 3-D signal using a wavelet synthesis that includes an iterative Poisson solver at each resolution. The approach is an extension of a similar approach for wave-front reconstruction in [1]. Experiments with video sequences demonstrate that the proposed algorithm leads to good quality reconstructions in the presence of noise in the gradients. This makes the proposed algorithm valuable for gradient based video processing applications and a video editing example is included to illustrate this.","PeriodicalId":350052,"journal":{"name":"2015 IEEE Pacific Rim Conference on Communications, Computers and Signal Processing (PACRIM)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121810776","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Fast classification of handwritten digits using 2D-DCT based sparse PCA","authors":"D. Ismailova, Wu-Sheng Lu","doi":"10.1109/PACRIM.2015.7334822","DOIUrl":"https://doi.org/10.1109/PACRIM.2015.7334822","url":null,"abstract":"We propose to address the handwritten digits recognition (HWDR) problem by using a two-dimensional (2-D) discrete cosine transform (DCT) based sparse principal component analysis (PCA) algorithm for fast classification. The gain of processing speed is achieved by utilizing the ability of 2-D DCT for energy compaction and signal decorrelation. The proposed algorithm was applied to the mixed national institute for standards and technology (MNIST) database of handwritten digits to demonstrate that when incorporated into the conventional PCA, the 2-D DCT helped reduce the dimension of the input data by 75%. As a result of the dimensionality reduction, the proposed algorithm is 35.7% faster for HWDR than the conventional PCA without sacrificing recognition accuracy.","PeriodicalId":350052,"journal":{"name":"2015 IEEE Pacific Rim Conference on Communications, Computers and Signal Processing (PACRIM)","volume":"148 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125529378","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Optimal penalties for misbehavior deterrence in communication networks","authors":"M. Awad, B. Zogheib, Hamed M. K. Alazemi","doi":"10.1109/PACRIM.2015.7334866","DOIUrl":"https://doi.org/10.1109/PACRIM.2015.7334866","url":null,"abstract":"The communication among entities in any network is administered by a set of rules and technical specifications detailed in the communication protocol. All communicating entities adhere to the same protocol to successfully exchange data. Most of the rules are expressed in an algorithm format that computes a decision based on a set of inputs provided by communicating entities or collected by a central controller. Due to the increasing number of communicating entities and large bandwidth required to exchange the set of inputs generated at each entity, distributed implementations have been favorable to reduce the control overhead. In such implementations, each entity self-computes crucial protocol decisions; therefore, can alter these decisions to gain unfair share of the resources managed by the protocol. Misbehaving users degrade the performance of the whole network in-addition to starving well-behaving users. In this work we develop a framework to derive the optimal penalty strategy for penalizing misbehaving users. The proposed framework considers users learning of the detection mechanism techniques and the detection mechanism tracking of the users behavior and history of protocol offenses. Analysis indicate that escalating penalties are optimal for deterring repeat protocol offenses.","PeriodicalId":350052,"journal":{"name":"2015 IEEE Pacific Rim Conference on Communications, Computers and Signal Processing (PACRIM)","volume":"160 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129259300","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"System investigation of a gateway implementing subflow control policies using a multipath TCP proxy","authors":"Yuichi Okada, M. Shimamura, K. Iida","doi":"10.1109/PACRIM.2015.7334850","DOIUrl":"https://doi.org/10.1109/PACRIM.2015.7334850","url":null,"abstract":"To provide better performance for different applications, multiple ISP subscriptions will be helpful. However, the existing gateways for multiple ISP connections do not meet performance requirements for both UDP and TCP applications. In this paper, we explain how we have designed and implemented a gateway to meet such requirements. Our gateway provides subflow control policies which solve conflicts between UDP and TCP flows. Through experimental evaluations, we have confirmed its effectiveness.","PeriodicalId":350052,"journal":{"name":"2015 IEEE Pacific Rim Conference on Communications, Computers and Signal Processing (PACRIM)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117279298","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Pilot symbol assisted channel estimation for 4×4 space time block coded spatial modulation systems","authors":"Yusuf Acar, H. Dogan, E. Panayirci","doi":"10.1109/PACRIM.2015.7334803","DOIUrl":"https://doi.org/10.1109/PACRIM.2015.7334803","url":null,"abstract":"Recently, spatial modulation (SM) and space-time block coding (STBC) are combined to take advantage of the benefits of both while avoiding their drawbacks for multiple-input and multiple-output (MIMO) systems. The pioneering works on STBC-SM assume that perfect knowledge of the channel fading coefficients is available at the receiver. This work1 addresses the challenging and timely problem of channel estimation for 4×4 STBC-SM systems in the presence of time-varying channels. In this paper, the estimation of channel at pilot durations is done by least square (LS) method and then the channel interpolation is performed by linear interpolation or nearest neighbor inter-polation algorithms. Simulation results have demonstrated that the proposed channel estimation based on the linear interpolation offer substantial performance gains over the channel estimation based on the nearest neighbor interpolation. In particular, a savings of about 5dB is obtained at BER = 10-5, as compared with the nearest interpolation based receiver at 120km/h for 4×4 STBC-SM systems with the binary phase shift keying (BPSK) modulation.","PeriodicalId":350052,"journal":{"name":"2015 IEEE Pacific Rim Conference on Communications, Computers and Signal Processing (PACRIM)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122054643","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An effect of delay reduced MAC protocol for WBAN based medical signal monitoring","authors":"R. Kim, P. Kim, J. Kim","doi":"10.1109/PACRIM.2015.7334876","DOIUrl":"https://doi.org/10.1109/PACRIM.2015.7334876","url":null,"abstract":"Due to the recent development of medical and wireless communication technology, the WBSN application is gradually increased to personal healthcare monitoring. WBSN is a network e where various kinds of bio signals of the body are measured and then are processed and transmitted to neighboring monitoring and personal portable devices. WBAN is a kind of network standard for supporting various connection around human body within 2 ~ 3 m which consists of medical and non-medical devices. The MAC Protocol proposed in this paper applies the delay limitation to MAC Protocol in medical signal monitoring to reduce the time delay and packet loss in TDMA based CSMA/CA environment. The proposed MAC protocol consider the priorities of several bio signals with different characteristics and sets up minimum packet delay time in order to guarantee the data effectiveness. Simulation results show that the proposed MAC protocol attains the reduced time delay and less packet loss over conventional Bio MAC protocol in WBAN based some medical signal monitoring network environment.","PeriodicalId":350052,"journal":{"name":"2015 IEEE Pacific Rim Conference on Communications, Computers and Signal Processing (PACRIM)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129757756","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}