Adrian Focsa, M. Datcu, Stefan-Adrian Toma, A. Anghel, R. Cacoveanu
{"title":"Opportunistic Bistatic SAR Image Classification Using Sub-aperture Decomposition","authors":"Adrian Focsa, M. Datcu, Stefan-Adrian Toma, A. Anghel, R. Cacoveanu","doi":"10.1109/COMM48946.2020.9141953","DOIUrl":"https://doi.org/10.1109/COMM48946.2020.9141953","url":null,"abstract":"In this article the classification of C -band opportunistic bistatic SAR images is assessed. The acquisition setup assumes Sentinel 1 spaceborne transmitter and the ground-based stationary receiver, COBIS located in an urban area. The synchronization/ echoed data spans many monostatic apertures; thus, an increased angular diversity may be exploited. The proposed framework is based on the use of sub-aperture decomposition of the backscatter in order to create the feature vector. Specifically, the goal of such an approach is to identify different scatterer signatures and associate them to specific semantic labels. Because the data dimension increased as a consequence of feature extraction approach, a technique for dimensionality reduction is suitable. The Doppler decomposition features are further embedded in the three-dimensional space in a semi-supervised manner. This operation is performed by UMAP algorithm. Finally, an unsupervised classification is achieved by DBSCAN. The presented results are obtained using manually labeled pixels from the following classes: forest, dam and water.","PeriodicalId":405841,"journal":{"name":"2020 13th International Conference on Communications (COMM)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120958296","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Impulse Radio UWB blind detection using Cross Recurrence Plot","authors":"Florin Diaconescu","doi":"10.1109/COMM48946.2020.9141986","DOIUrl":"https://doi.org/10.1109/COMM48946.2020.9141986","url":null,"abstract":"Blind detection is of paramount importance when considering wireless radio communication systems, positioning solutions or radar application. In Electronic Warfare, the pulse trains signals affected by noise, jitter and outliers are of great value either for reconnaissance or surveillance purposes. In the current paper we focus on improving the blind signal processing methods used to identify, detect and analyse the time series of samples of an impulse radio UWB (Ultra-Wideband) time-hopping pulse position modulation signal. The attention is directed upon the time series data mining analysis and propose a trade-off between accuracy and computing complexity. Also, the endeavour to identify an estimation algorithm having as little information as possible regarding the received signal continues the study focus of blind detection based on phase space transformation.","PeriodicalId":405841,"journal":{"name":"2020 13th International Conference on Communications (COMM)","volume":"263 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121347697","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Statistical Independence for Words in Printed Romanian Language","authors":"Alexandru Dinu, A. Vlad, Bogdan Hanu, A. Mitrea","doi":"10.1109/COMM48946.2020.9142045","DOIUrl":"https://doi.org/10.1109/COMM48946.2020.9142045","url":null,"abstract":"The paper revisits the notion of statistical independence for printed Romanian when the language is considered as a chain of words. The analysis is carried out on a literary corpus of approx. 6 million words. We aim to improve the perception of the concept of statistical independence for natural texts and to use this concept to evaluate the numerical properties of the printed language. One main objective is to estimate the minimum distance in words that ensures statistical independence.Here, we followed up on an idea previously researched by the authors - the investigation of statistical independence for m-grams (m successive letters). The previous results showed that 100 characters are enough to ensure statistical independence for letter m-grams (m = 1, 2, 3) either for the 32-symbol corpus or when the 47-symbol corpus was analyzed. In the present research, we could notice that 100 words can be considered practically enough for the minimum statistical independence sampling distance. As there is a huge number of distinct words to be considered, detailed investigations have been conducted regarding the creation of one or more Artificial Words consisting of groups of the low probability words (based on previous findings on the type II statistical error in word probability investigation) and the results support the above-mentioned minimum statistical independence distance.","PeriodicalId":405841,"journal":{"name":"2020 13th International Conference on Communications (COMM)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127159656","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Silvia Ovreiu, I. Cristescu, F. Balta, Alina Sultana, E. Ovreiu
{"title":"Early Detection of Glaucoma Using Residual Networks","authors":"Silvia Ovreiu, I. Cristescu, F. Balta, Alina Sultana, E. Ovreiu","doi":"10.1109/COMM48946.2020.9141990","DOIUrl":"https://doi.org/10.1109/COMM48946.2020.9141990","url":null,"abstract":"Glaucoma is one of the leading causes of irreversible blindness around the world and remains asymptomatic until its later stages. Therefore, early diagnosis is of crucial importance. The detection of glaucoma in early stages (from color fundus images) is a challenging task, since the clinical signs in the retinal images are very subtle and go undetected most of the time by the human eye. Convolutional neural networks have proven to provide good results for automatic detection of subtle features from images. In this work we explore the possibility of using residual networks to detect early stages of glaucoma. We introduce a proprietary early-stage glaucoma fundus color images dataset. We used a ResNet50 network which initially was trained on the ImageNet dataset. The level of accuracy on the validation set was 96.95%. The results indicate that using deep learning algorithms a cost-effective screening tool could be built for early and costeffective detection of glaucoma.","PeriodicalId":405841,"journal":{"name":"2020 13th International Conference on Communications (COMM)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129551493","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"UWB Antenna for a Radar Sensor","authors":"I. Nicolaescu, L. Buzincu, L. Anton","doi":"10.1109/COMM48946.2020.9141985","DOIUrl":"https://doi.org/10.1109/COMM48946.2020.9141985","url":null,"abstract":"In the last years ultra wide band (UWB) signals have more and more applications, including radar sensors. These systems need an antenna as an interface with the propagation media. The paper refers to an UWB antenna employed for a radar sensor used for subsurface searching, describes the method used to measure the parameters of the antenna and presents experimental results in time and frequency domain.","PeriodicalId":405841,"journal":{"name":"2020 13th International Conference on Communications (COMM)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125964523","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Review of Counter-UAV Solutions Based on the Detection of Remote Control Communication","authors":"P. Stoica, S. Basak, C. Molder, B. Scheers","doi":"10.1109/COMM48946.2020.9142017","DOIUrl":"https://doi.org/10.1109/COMM48946.2020.9142017","url":null,"abstract":"One of the problems that we face today is the illegal use of drones. Monitoring the RF transmissions has proved to be a reliable technique for detecting and identifying such devices. Although there are some solutions on the market for detection and jamming, they are not always successful. The aim of this paper is to analyze the typical communications used by drone manufacturers, which usually implement their own algorithms, and to propose a more robust solution that would consider the range of characteristics that these protocols have. A wide-band energy detection with adaptive threshold is used for extracting specifications of some remote control communications that use spread spectrum modulation.","PeriodicalId":405841,"journal":{"name":"2020 13th International Conference on Communications (COMM)","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127601094","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Architecture of a Cloud-based Fault-Tolerant Control Platform for improving the QoS of Social Multimedia Applications on SD-WAN","authors":"Kashinath Basu, Aws Hamdullah, F. Ball","doi":"10.1109/COMM48946.2020.9142038","DOIUrl":"https://doi.org/10.1109/COMM48946.2020.9142038","url":null,"abstract":"Social media application are becoming multimedia centric with live and stored video, audio, augmented reality, haptic, etc. emerging as the main categories of traffic. Their QoS requirements are more stringent than their legacy counterparts. At the carrier level, Software Defined – Wide Area Network (SD-WAN) is one of the promising technologies for transporting these multimedia traffic. A SD-WAN will typically have a mesh of centralized controllers managing the networking infrastructure. Reliable operations of these controllers are a key requirement for the successful operation of the WAN. Controller failure will prevent the forwarding switches from communicating with the controller. This will prevent the switches from forwarding any new traffic, as well as flow entries from existing traffic will also time out after a period bringing the network to a standstill. Rebooting a controller or starting a new one will introduce delays degrading the QoS. This research presents an architecture for handling controller failure via transparent migration of the controller load in a semi-meshed controller environment. The architecture includes a real time cloud-based centralized storage of the flow states north of the controllers and a virtualized connection management unit at the south. The results demonstrate that the proposed model can transparently handle controller failure without affecting the QoS.","PeriodicalId":405841,"journal":{"name":"2020 13th International Conference on Communications (COMM)","volume":"24 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132500872","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Real-time temporal audio watermarking for mobile communication","authors":"V. A. Nita, D. Stanomir","doi":"10.1109/COMM48946.2020.9141976","DOIUrl":"https://doi.org/10.1109/COMM48946.2020.9141976","url":null,"abstract":"The world around us changes and digital is entering in all aspects of our lives. One aspect that is on the verge of changing is the ‘analog’ signed paper contracts. A lot of contracts are made over telephone nowadays and the audio recording of the discussion about the agreement it can be seen as a ‘digital’ contract. One problem arises, the authenticity of the recording. One side of the contract may rule later that the recording has been tampered and a ‘no’ or a ‘yes’ has been deleted or replaced. In this paper a watermarking algorithm is proposed for obtaining audio recordings which can be 100% proven as authentic or fake. This way no side of an over phone agreement can argue that the recording is altered. A simple check will prove 100% the authenticity of the recording. This way, cut and paste edits of more than 5 ms are easily detected.","PeriodicalId":405841,"journal":{"name":"2020 13th International Conference on Communications (COMM)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134634895","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Experiments to Assess the Implementation of A 4 GHZ Proximity Detector for Smart Crosswalk","authors":"C. Andriesei","doi":"10.1109/COMM48946.2020.9141951","DOIUrl":"https://doi.org/10.1109/COMM48946.2020.9141951","url":null,"abstract":"A microwave line-of-sight propagation scenario is tested experimentally to assess the implementation of a proximity detector for smart crosswalks. Preliminary results conducted with one human subject indicated that the particular frequency of 4 GHz could be used to monitor the presence of people, the received power decreasing sufficiently enough to make a trustful decision, able to trigger the traffic lights. Despite some expectations, further experiments conducted with more human subjects (males, females and children) demonstrated that gender and age were not relevant, the microwave link being altered in the same way. Microstrip patch array antennas were used to increase the radiative efficiency and a reference distance of 2 meters was chosen.","PeriodicalId":405841,"journal":{"name":"2020 13th International Conference on Communications (COMM)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132849026","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Model and Algorithms for Optimizing a Human Computing System Oriented to Knowledge Extraction by Use of Crowdsourcing","authors":"F. Enache, V. Greu, Petrica Ciotirnae, F. Popescu","doi":"10.1109/COMM48946.2020.9141972","DOIUrl":"https://doi.org/10.1109/COMM48946.2020.9141972","url":null,"abstract":"The paper is addressing the actual context of Data Deluge, where the need and also premises to extract more knowledge are increasing, along with the increase of our expectations about performances. Besides, improving artificial intelligence (AI), by machine learning (ML), deep learning (DL) or cognitive learning (CL) performance/potential, when adding human contributions where necessary, is an important and promising research area. Consequently, our model, algorithms (ALG1; ALG2) and soft programs provide useful new instruments for implementing and optimizing the workflow based on crowdsourcing, when using human potential in a human computing system. We aim to increase AI quality adding multiple human outputs for every AI task and leveraging learning rules to be then extended to larger sets of tasks. This way, such hybrid system could be oriented to more knowledge extraction, by the generalization of images/ captions/labels toward more complex tasks, like providing content essential or question answering. Our instruments include features of ranking workers and tasks profiles, which will support the main original process of knowledge extraction, but also the inference elements, by small amounts of learning data (regarding the workers skills and tasks efficiency) to be transferred to AI/ML/DL/CL, which then could be used for processing larger volumes of similar data. Among the results conclusions is that using progressive optimization, structuring the data/tasks in variable (progressive) sets and potential (skill/number) of workers, is both efficacious and efficient, allowing a flexible control of the system and workflow for matching a diversity of tasks complexity/ difficulty/volume and leveraging knowledge extraction.","PeriodicalId":405841,"journal":{"name":"2020 13th International Conference on Communications (COMM)","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130994490","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}