2014 10th International Conference on Communications (COMM)最新文献

筛选
英文 中文
Time-frequency domain radar cross-section analysis of some simple objects and shapes 一些简单物体和形状的时频域雷达截面分析
2014 10th International Conference on Communications (COMM) Pub Date : 2014-05-29 DOI: 10.1109/ICCOMM.2014.6866731
L. Tuta, R. Lexutan, Catalin Moraru
{"title":"Time-frequency domain radar cross-section analysis of some simple objects and shapes","authors":"L. Tuta, R. Lexutan, Catalin Moraru","doi":"10.1109/ICCOMM.2014.6866731","DOIUrl":"https://doi.org/10.1109/ICCOMM.2014.6866731","url":null,"abstract":"The purpose of this paper is to study and compare the radar cross-section (RCS) values for different targets (sphere, cylinder, cone and rectangular plane surface), using results obtained in simulations and experimental measurements performed using a vectorial network analyzer (VNA), in the 2-6GHz domain. These results are processed in both frequency and time (space) domain.","PeriodicalId":366043,"journal":{"name":"2014 10th International Conference on Communications (COMM)","volume":"1 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116798133","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Analytical imaging of bacteria in foodstuff 食品中细菌的分析成像
2014 10th International Conference on Communications (COMM) Pub Date : 2014-05-29 DOI: 10.1109/ICCOMM.2014.6866672
A. Saenko, S. Lerm, V. Musalimov
{"title":"Analytical imaging of bacteria in foodstuff","authors":"A. Saenko, S. Lerm, V. Musalimov","doi":"10.1109/ICCOMM.2014.6866672","DOIUrl":"https://doi.org/10.1109/ICCOMM.2014.6866672","url":null,"abstract":"The paper is dedicated to the problem of the quality assurance of foodstuff and particularly bacteria detection in liquid exudes. It demonstates disadvantages of the existing methods and suggests a new method based on the image processing and machine learning techniques. The principal component analysis shows that this problem is quite hard for existing algorithms. Also the usage of a few classifiers is considered and the evaluation of their effectiveness is shown.","PeriodicalId":366043,"journal":{"name":"2014 10th International Conference on Communications (COMM)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121118199","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Securing an alerting subsystem for a keystroke-based user identification system 保护基于按键的用户识别系统的报警子系统
2014 10th International Conference on Communications (COMM) Pub Date : 2014-05-29 DOI: 10.1109/ICCOMM.2014.6866685
Stefan Arseni, E. Popovici, Liviu A. Stancu, Ovidiu G. Guta, S. Halunga
{"title":"Securing an alerting subsystem for a keystroke-based user identification system","authors":"Stefan Arseni, E. Popovici, Liviu A. Stancu, Ovidiu G. Guta, S. Halunga","doi":"10.1109/ICCOMM.2014.6866685","DOIUrl":"https://doi.org/10.1109/ICCOMM.2014.6866685","url":null,"abstract":"Our keystroke-based user identification system represents a minimal implementation of a software system that can be used for continuous authentication of users, based on their keystroke dynamics. This paper brings into evidence the role of an alerting subsystem as a part of the software system mentioned above. Also, the paper presents a basic implementation of such a subsystem, based on the existing Syslog protocol, and a combined method for securing the protocol.","PeriodicalId":366043,"journal":{"name":"2014 10th International Conference on Communications (COMM)","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115216406","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
An overview of W-BAN antennas designed at LEMA LEMA设计的W-BAN天线概述
2014 10th International Conference on Communications (COMM) Pub Date : 2014-05-29 DOI: 10.1109/ICCOMM.2014.6866727
A. Skrivervik
{"title":"An overview of W-BAN antennas designed at LEMA","authors":"A. Skrivervik","doi":"10.1109/ICCOMM.2014.6866727","DOIUrl":"https://doi.org/10.1109/ICCOMM.2014.6866727","url":null,"abstract":"W-BAN applications have been around since a long time, but have been experiencing a tremendous growth during the last decades. This results in the need of dedicated antennas, which are designed and optimized taking into account their lossy surroundings. Design considerations and several examples will be presented in this paper.","PeriodicalId":366043,"journal":{"name":"2014 10th International Conference on Communications (COMM)","volume":"346 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116115280","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Advanced signal processing techniques for detection and localization of electrical arcs 用于电弧检测和定位的先进信号处理技术
2014 10th International Conference on Communications (COMM) Pub Date : 2014-05-29 DOI: 10.1109/ICCOMM.2014.6866749
A. Digulescu, Teodor Petrut, Cindy Bernard, I. Candel, C. Ioana, A. Serbanescu
{"title":"Advanced signal processing techniques for detection and localization of electrical arcs","authors":"A. Digulescu, Teodor Petrut, Cindy Bernard, I. Candel, C. Ioana, A. Serbanescu","doi":"10.1109/ICCOMM.2014.6866749","DOIUrl":"https://doi.org/10.1109/ICCOMM.2014.6866749","url":null,"abstract":"This paper presents several methods applied for the detection and localization of electrical arcs measured while survelling photovoltaic power systems. Firstly, we proposed the use of energy detectors for transients (spectrogram and wavelet) and compared them with statistical methods (Maximum Likelihood Estimation (MLE)), classical signal processing methods (Matched Filter, Zero Crossing), but not lastly with a more recent method, Recurrence Plot Analysis (RPA), which has already proved its efficiency. Afterward, we studied the precision of these methods in the localization problem. We used a four sensor detector and estimated the position of the electrical arc based on the time of arrival (TOA) obtained from the each technique.","PeriodicalId":366043,"journal":{"name":"2014 10th International Conference on Communications (COMM)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130561447","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Cramer-Rao bound for a sparse complex model 稀疏复模型的Cramer-Rao界
2014 10th International Conference on Communications (COMM) Pub Date : 2014-05-29 DOI: 10.1109/ICCOMM.2014.6866673
A. Florescu, É. Chouzenoux, J. Pesquet, S. Ciochină
{"title":"Cramer-Rao bound for a sparse complex model","authors":"A. Florescu, É. Chouzenoux, J. Pesquet, S. Ciochină","doi":"10.1109/ICCOMM.2014.6866673","DOIUrl":"https://doi.org/10.1109/ICCOMM.2014.6866673","url":null,"abstract":"Complex-valued data play a prominent role in a number of signal and image processing applications. The aim of this paper is to establish some theoretical results concerning the Cramer-Rao bound for estimating a sparse complex-valued vector. Instead of considering a countable dictionary of vectors, we address the more challenging case of an uncountable set of vectors parameterized by a real variable. We also present a proximal forward-backward algorithm to minimize an ℓ0 penalized cost, which allows us to approach the derived bounds. These results are illustrated on a spectrum analysis problem in the case of irregularly sampled observations.","PeriodicalId":366043,"journal":{"name":"2014 10th International Conference on Communications (COMM)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126796494","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Greening of IP-based video distribution networks: Developments and challenges 基于ip的视频分发网络的绿色化:发展与挑战
2014 10th International Conference on Communications (COMM) Pub Date : 2014-05-29 DOI: 10.1109/ICCOMM.2014.6866657
Adrian Popescu
{"title":"Greening of IP-based video distribution networks: Developments and challenges","authors":"Adrian Popescu","doi":"10.1109/ICCOMM.2014.6866657","DOIUrl":"https://doi.org/10.1109/ICCOMM.2014.6866657","url":null,"abstract":"The creation and the distribution of video content is a multi-stage process that refers to the aquisition of video source, content production and packaging, and distribution to customers. The major components are the access networks, metro/edge networks, core networks, data centers and storage networks.The creation and the distribution of video content is a multi-stage process that refers to the aquisition of video source, content production and packaging, and distribution to customers. The major components are the access networks, metro/edge networks, core networks, data centers and storage networks.","PeriodicalId":366043,"journal":{"name":"2014 10th International Conference on Communications (COMM)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121685491","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Aspects regarding the characterization of in-orbit satellites using radio observations 使用无线电观测的在轨卫星特性方面
2014 10th International Conference on Communications (COMM) Pub Date : 2014-05-29 DOI: 10.1109/ICCOMM.2014.6866698
P. Dascal, T. Palade, P. Dolea, O. Cristea
{"title":"Aspects regarding the characterization of in-orbit satellites using radio observations","authors":"P. Dascal, T. Palade, P. Dolea, O. Cristea","doi":"10.1109/ICCOMM.2014.6866698","DOIUrl":"https://doi.org/10.1109/ICCOMM.2014.6866698","url":null,"abstract":"This paper focuses on characterizing the behavior of in-orbit small satellites using ground-based radio observations. The monitoring focused on low-Earth orbit (LEO) university Cubesats which operate in the UHF amateur radio band. The orbital behavior may be estimated by characterizing and analyzing the received signal transmitted by the satellite during multiple passes. The correlated data obtained from several ground observations of a selected Cubesat indicate that periodic deep fluctuations in the received signal are caused most likely by the tumbling of the satellite.","PeriodicalId":366043,"journal":{"name":"2014 10th International Conference on Communications (COMM)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115921933","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Secure data dissemination in MANETs by means of mobile agents 利用移动代理实现manet中数据的安全传播
2014 10th International Conference on Communications (COMM) Pub Date : 2014-05-29 DOI: 10.1109/ICCOMM.2014.6866761
Cansin Turguner
{"title":"Secure data dissemination in MANETs by means of mobile agents","authors":"Cansin Turguner","doi":"10.1109/ICCOMM.2014.6866761","DOIUrl":"https://doi.org/10.1109/ICCOMM.2014.6866761","url":null,"abstract":"Mobile ad-hoc Networks are dynamic and wireless self-organized networks that many mobile nodes can connect to each other weakly. To compare with traditional networks, they suffer failures that prevent the system from working properly. Nevertheless, in this paper it is coped with many security issues such as unauthorized attempts, security threats and reliability. Using mobile agents in having low level fault tolerant ad-hoc networks provides fault masking that the users never notice. Mobile agent migration among nodes, choosing an alternative path autonomously and, having high level fault tolerance provides more reliable networks, which have low bandwidth and high failure ratio. In this paper, it is declared that mobile agents fault tolerance peculiarity and existing fault tolerance method based on mobile agents. Also in ad-hoc networks that need security precautions behind fault tolerance, a new model named as \"Secure Mobil Agent Based Fault Tolerance Model\" is expressed.","PeriodicalId":366043,"journal":{"name":"2014 10th International Conference on Communications (COMM)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125238352","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Miller code usage in Visible Light Communications under the PHY I layer of the IEEE 802.15.7 standard 在IEEE 802.15.7标准的PHY I层下的可见光通信中米勒码的使用
2014 10th International Conference on Communications (COMM) Pub Date : 2014-05-29 DOI: 10.1109/ICCOMM.2014.6866699
A. Căilean, B. Cagneau, L. Chassagne, M. Dimian, V. Popa
{"title":"Miller code usage in Visible Light Communications under the PHY I layer of the IEEE 802.15.7 standard","authors":"A. Căilean, B. Cagneau, L. Chassagne, M. Dimian, V. Popa","doi":"10.1109/ICCOMM.2014.6866699","DOIUrl":"https://doi.org/10.1109/ICCOMM.2014.6866699","url":null,"abstract":"This paper approaches the issues concerning the usage of the delay modulation as a coding technique used for outdoor Visible Light Communications (VLC) under PHY I layer of the IEEE 802.15.7 standard. We perform a comparative analysis between the Manchester code, as a traditional code, specified by the upper mentioned standard and the Miller code as a possible candidate for outdoor MIMO applications. Simulation and experimental results are provided, offering an overview over the multi-channel, flickering and Bit Error Ratio (BER) performances.","PeriodicalId":366043,"journal":{"name":"2014 10th International Conference on Communications (COMM)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131229477","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信