2013 13th International Symposium on Communications and Information Technologies (ISCIT)最新文献

筛选
英文 中文
Iris surface deformation and normalization 虹膜表面变形和归一化
S. Thainimit, Luís A. Alexandre, Vasco M N de Almeida
{"title":"Iris surface deformation and normalization","authors":"S. Thainimit, Luís A. Alexandre, Vasco M N de Almeida","doi":"10.1109/ISCIT.2013.6645910","DOIUrl":"https://doi.org/10.1109/ISCIT.2013.6645910","url":null,"abstract":"Human iris recognition systems are an attractive form of non-intrusive bio-identification with many potential applications. However, the accuracy of these systems is still limited due to challenges presented by iris surface deformation. This paper provides an introduction to the physiology of the iris, describes the problem of iris deformation, and presents a review of past and current software approaches to iris recognition. The focus is on methods related to the physiology of the iris.","PeriodicalId":356009,"journal":{"name":"2013 13th International Symposium on Communications and Information Technologies (ISCIT)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125252206","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
A new user cooperative protocol based on code-shifted differential chaos shift keying modulation 一种基于码移差分混沌移键控调制的新型用户协作协议
Weikai Xu, Lin Wang, Zhuhan Jiang
{"title":"A new user cooperative protocol based on code-shifted differential chaos shift keying modulation","authors":"Weikai Xu, Lin Wang, Zhuhan Jiang","doi":"10.1109/ISCIT.2013.6645821","DOIUrl":"https://doi.org/10.1109/ISCIT.2013.6645821","url":null,"abstract":"In this paper, a new cooperative protocol based on code-shifted differential chaos shift keying (CS-DCSK) modulation, which is an improved differential chaos shifted keying modulation scheme no requirement delay circuits at autocorrelation receiver (AcR), is proposed. The relay user transmits own data while piggybacks other user's data which are received and decoded at pre-phase utilizing the multiple bit-streams transmission property of generalized CS-DCSK (GCS-DCSK). Moreover, the cooperative user may forward the estimated data only when its data is correctly decoded using cyclic redundancy check (CRC) code, namely selective decode-and-forward (DAF). Simulation results show that the proposed protocol has better performance than that of conventional four phase cooperative protocol in bit error rate (BER) and system throughput.","PeriodicalId":356009,"journal":{"name":"2013 13th International Symposium on Communications and Information Technologies (ISCIT)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125488970","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Channel capacity of M-ary Differential Chaos Shift Keying modulation over AWGN channel AWGN信道上m阶差分混沌移位键控调制的信道容量
Guofa Cai, Lin Wang, Tingting Huang
{"title":"Channel capacity of M-ary Differential Chaos Shift Keying modulation over AWGN channel","authors":"Guofa Cai, Lin Wang, Tingting Huang","doi":"10.1109/ISCIT.2013.6645829","DOIUrl":"https://doi.org/10.1109/ISCIT.2013.6645829","url":null,"abstract":"In this article the capacity expression is derived for M-ary Differential Chaos Shift Keying (M-DCSK) modulation over additive white Gaussian noise (AWGN) channel. Then the capacity bound curves of M-DCSK are provided by Monte Carlo method. Theoretical analysis and simulation results show that the high dimension DCSK modulation has more obvious capacity advantage than the conventional modulations. So they are appropriate for the power-limited communication systems.","PeriodicalId":356009,"journal":{"name":"2013 13th International Symposium on Communications and Information Technologies (ISCIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127598109","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Secure wireless multicasting in presence of multiple eavesdroppers 安全无线广播在多个窃听者的存在
A. P. Shrestha, Jai-Jin Jung, K. Kwak
{"title":"Secure wireless multicasting in presence of multiple eavesdroppers","authors":"A. P. Shrestha, Jai-Jin Jung, K. Kwak","doi":"10.1109/ISCIT.2013.6645929","DOIUrl":"https://doi.org/10.1109/ISCIT.2013.6645929","url":null,"abstract":"Physical layer security schemes for wireless communication can prevent eavesdropping even without use of upper layer cryptographic algorithms. As such, physical layer security based on information theoretic constraint is gaining both theoretical and practical importance in research community. In this paper, we investigate the physical layer security for wireless multicasting scheme consisting of a single antenna transmitter with multiple receivers and eavesdroppers both equipped with multiple antennas under quasi-static Rayleigh fading channel. We develop new closed-form expressions for the analysis of probability of positive secrecy as well as outage probability. We show that the physical layer security can be maintained even in presence of multiple eavesdroppers consisting multiple antennas. Furthermore, we also analyze the effect of number of antennas, users and eavesdroppers in the numerical results.","PeriodicalId":356009,"journal":{"name":"2013 13th International Symposium on Communications and Information Technologies (ISCIT)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124418818","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Effects of time windowing for extraction of expression from Japanese speech: Higuchi's fractal dimension 时间窗对日语语音表达提取的影响:Higuchi分形维数
M. Phothisonothai, Yasunori Arita, Katsumi Watanabe
{"title":"Effects of time windowing for extraction of expression from Japanese speech: Higuchi's fractal dimension","authors":"M. Phothisonothai, Yasunori Arita, Katsumi Watanabe","doi":"10.1109/ISCIT.2013.6645938","DOIUrl":"https://doi.org/10.1109/ISCIT.2013.6645938","url":null,"abstract":"Measures of irregularity and complexity in time-series data can be quantified by using fractal dimension (FD) which may convey useful information and showing a strong correlation with the physiological data, e.g., speech. The time-dependent FD (TDFD) has been proven to be effective method in various physiological studies. However, the TDFD result depends on the time windowing, i.e., length and type which could provide different features. Therefore, in this paper, the effects of time windowing of TDFD by spanning 28 to 212-point length and four window functions were investigated. The FD was computed by using Higuchi's method. In experiment, speech data recorded from 15 Japanese utterances, 4 different ways of expression (accosting, wholehearted, normal, and uninterested). The obtained results were useful in selecting time windowing based on TDFD method in which could extract different intonations effectively.","PeriodicalId":356009,"journal":{"name":"2013 13th International Symposium on Communications and Information Technologies (ISCIT)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133745149","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A test automation framework in POCT system using TDD techniques 一个使用TDD技术的POCT系统测试自动化框架
Ratchanok Chaipraserth, A. Leelasantitham, S. Kiattisin
{"title":"A test automation framework in POCT system using TDD techniques","authors":"Ratchanok Chaipraserth, A. Leelasantitham, S. Kiattisin","doi":"10.1109/ISCIT.2013.6645931","DOIUrl":"https://doi.org/10.1109/ISCIT.2013.6645931","url":null,"abstract":"Nowadays, the growth of IT business are highly competitive both of development process and functionality of software to meet mostly customer requirements. Normally, software performance should develop to increase the high quality whilst it should reduce both of the cost and the time. The IT business is to start the attention with satisfaction of the customer for expanding opportunities of grown business. The problem of former software development is an operation under the pressure conditions affecting to see more bugs of the software in a period of testing system and delivering the program to the required customer. This paper presents an implementation of approach which is an agile development (If what we do that able to modify the code to meet the requirement in the future, that's call agile.) using Test Driven Development (TDD) in automation testing framework for software development process. It helps optimization of software testing as it can found early bug, flexible for requirement changes in the future, either to increase or change requirement without any effect on coding behavior. It also helps to reduce cost of software development as a human resource, time and rapid feedback of test result. We apply this approach with prototype in software development processes using the Point of care testing (POCT) system which is as an example to create test case with black-box and white-box testing techniques based on the requirements specification to improve more product quality.","PeriodicalId":356009,"journal":{"name":"2013 13th International Symposium on Communications and Information Technologies (ISCIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132314237","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Face recognition improvement by converting expression faces to neutral faces 通过将表情脸转换为中性脸来改进人脸识别
Chayanut Petpairote, S. Madarasmi
{"title":"Face recognition improvement by converting expression faces to neutral faces","authors":"Chayanut Petpairote, S. Madarasmi","doi":"10.1109/ISCIT.2013.6645898","DOIUrl":"https://doi.org/10.1109/ISCIT.2013.6645898","url":null,"abstract":"A face recognition database generally consists of expressionless, frontal face images often referred to as neutral faces. However, we often obtain a facial image from a non-frontal view that may even contain expressions such as anger, joy, surprise, smile, sorrow, and etc. Faces with expressions often cause the underlying face recognition algorithm to fail. In this paper, we present an approach to improve face recognition by warping an image with facial expression to create a neutral, expression-invariant face. We use a modified version of the thin plate splines warping to remove the expression from a probe image with expressions to improve the correctness in face recognition using a gallery of neutral faces. We evaluate our proposed method using 2 well-known facial expression databases; namely, the AR-Face and MUG-FED databases. The experimental results for both databases show that our proposed method significantly improves the accuracy of face recognition under expression variations for the 3 commonly used approaches to face recognition including principal component analysis (PCA), linear discriminant analysis (LDA), and feature-based local binary pattern (LBP).","PeriodicalId":356009,"journal":{"name":"2013 13th International Symposium on Communications and Information Technologies (ISCIT)","volume":"462 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124186749","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Human body transfer function model for ultra wideband body area network 超宽带体域网络人体传递函数模型
S. Promwong, Jiraphan Sahakit, S. Teawehim, B. Ruckveratham
{"title":"Human body transfer function model for ultra wideband body area network","authors":"S. Promwong, Jiraphan Sahakit, S. Teawehim, B. Ruckveratham","doi":"10.1109/ISCIT.2013.6645942","DOIUrl":"https://doi.org/10.1109/ISCIT.2013.6645942","url":null,"abstract":"A waveform distortion on human body of an ultra wideband body area network (UWB-BAN) system can be extremely distorted through a channel even for free-space transmission because of antenna dispersion. Therefore, the understand of antenna characteristics, which effects on waveform distortion, is necessary. This paper presents the waveform distortion due to human body for wireless meadical applications based on measurement data. The template waveform is considered at the receiver side to maximize the SNR for evaluation. In this results are evaluate based on the extended Friis' transmission formula. This technique gives very accurate results and is very useful for the design and evaluation of UWB-BAN transmission waveform for wireless medical applications, especially focusing on the effect of template waveform.","PeriodicalId":356009,"journal":{"name":"2013 13th International Symposium on Communications and Information Technologies (ISCIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127875363","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Safe level graph for synthetic minority over-sampling techniques 合成少数派过采样技术的安全水平图
C. Bunkhumpornpat, Sitthichoke Subpaiboonkit
{"title":"Safe level graph for synthetic minority over-sampling techniques","authors":"C. Bunkhumpornpat, Sitthichoke Subpaiboonkit","doi":"10.1109/ISCIT.2013.6645923","DOIUrl":"https://doi.org/10.1109/ISCIT.2013.6645923","url":null,"abstract":"In the class imbalance problem, most existent classifiers which are designed by the distribution of balance datasets fail to recognize minority classes since a large number of negative instances can dominate a few positive instances. Borderline-SMOTE and Safe-Level-SMOTE are over-sampling techniques which are applied to handle this situation by generating synthetic instances in different regions. The former operates on the border of a minority class while the latter works inside the class far from the border. Unfortunately, a data miner is unable to conveniently justify a suitable SMOTE for each dataset. In this paper, a safe level graph is proposed as a guideline tool for selecting an appropriate SMOTE and describes the characteristic of a minority class in an imbalance dataset. Relying on advice of a safe level graph, the experimental success rate is shown to reach 73% when an F-measure is used as the performance measure and 78% for satisfactory AUCs.","PeriodicalId":356009,"journal":{"name":"2013 13th International Symposium on Communications and Information Technologies (ISCIT)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129208666","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Improving identity privacy and authentication in SIP transactions 改进SIP事务中的身份隐私和身份验证
S. Kungpisdan, Atipat Thongyon
{"title":"Improving identity privacy and authentication in SIP transactions","authors":"S. Kungpisdan, Atipat Thongyon","doi":"10.1109/ISCIT.2013.6645854","DOIUrl":"https://doi.org/10.1109/ISCIT.2013.6645854","url":null,"abstract":"Session Initiation Protocol (SIP) has gained more acceptability as the number of Voice Over Internet Protocol (VoIP) applications grows significantly. However, SIP itself lacks user privacy, necessary security properties, and has poor performance due to chosen cryptographic operations. A number of security techniques were proposed to address user privacy issues, but they still have limitations in terms of security and performance. In this paper, SIPPEN, a SIP Privacy Enhancement with Nicknames, is introduced. SIPPEN can preserve privacy of SIP users while they communicate. Moreover, a new authentication technique between a user agent and a proxy server is introduced. The results given from our analysis show that the proposed protocol not only has higher security level, but it also has better performance comparing to existing techniques.","PeriodicalId":356009,"journal":{"name":"2013 13th International Symposium on Communications and Information Technologies (ISCIT)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129283345","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信