Proceedings of the ... IEEE International Symposium on Signal Processing and Information Technology. IEEE International Symposium on Signal Processing and Information Technology最新文献

筛选
英文 中文
Correlated noise estimation and error correction in parallel storage channels 并行存储信道的相关噪声估计与误差校正
M. Varsamou, I. Zacharias, T. Antonakopoulos
{"title":"Correlated noise estimation and error correction in parallel storage channels","authors":"M. Varsamou, I. Zacharias, T. Antonakopoulos","doi":"10.1109/ISSPIT.2013.6781928","DOIUrl":"https://doi.org/10.1109/ISSPIT.2013.6781928","url":null,"abstract":"The evolution of new technologies frequently results to the need of formulating old problems in new way. The design of MEMS-based storage systems that use multiple, simultaneously accessed channels, has to confront, among others, the problem of correlated noise in different channels. This work presents a method that exploits the inherent parallelism found in such communication/storage systems in order to estimate the correlated error vector and to improve the data decoding process. The method uses the parallelism of the multiple channels both to flag symbols as erasures using the error locations revealed by the initial errors-only decoding attempt, and to estimate the introduced channel noise vector and provide soft information to the demodulators of all channels. Numerical results demonstrate the performance improvement that is achieved by the proposed method, thus improving the reliability of such systems/devices.","PeriodicalId":88960,"journal":{"name":"Proceedings of the ... IEEE International Symposium on Signal Processing and Information Technology. IEEE International Symposium on Signal Processing and Information Technology","volume":"10 1","pages":"000484-000489"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90677438","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Early detection of apnea-bradycardia episodes in preterm infants based on coupled hidden Markov model 基于耦合隐马尔可夫模型的早产儿呼吸暂停-心动过缓发作早期检测
S. Masoudi, N. Montazeri, M. Shamsollahi, D. Ge, A. Beuchée, P. Pladys, Alfredo I. Hernández
{"title":"Early detection of apnea-bradycardia episodes in preterm infants based on coupled hidden Markov model","authors":"S. Masoudi, N. Montazeri, M. Shamsollahi, D. Ge, A. Beuchée, P. Pladys, Alfredo I. Hernández","doi":"10.1109/ISSPIT.2013.6781887","DOIUrl":"https://doi.org/10.1109/ISSPIT.2013.6781887","url":null,"abstract":"The incidence of apnea-bradycardia episodes in preterm infants may lead to neurological disorders. Prediction and detection of these episodes are an important task in healthcare systems. In this paper, a coupled hidden Markov model (CHMM) based method is applied to detect apnea-bradycardia episodes. This model is evaluated and compared with two other methods based on hidden Markov model (HMM) and hidden semi-Markov model (HSMM). Evaluation and comparison are performed on a dataset of 233 apnea-bradycardia episodes which have been manually annotated. Observations are composed of RR-interval time series and QRS duration time series. The performance of each method was evaluated in terms of sensitivity, specificity and time detection delay. Results show that CHMM has the sensitivity of 84.92%, specificity of 94.17% and time detection delay of 2.32±4.82 seconds, which are better than the reference methods.","PeriodicalId":88960,"journal":{"name":"Proceedings of the ... IEEE International Symposium on Signal Processing and Information Technology. IEEE International Symposium on Signal Processing and Information Technology","volume":"4 1","pages":"000243-000248"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89804846","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
A non-invasive method for kinematic analysis of knee joints 一种无创的膝关节运动学分析方法
M. Akter, A. Lambert, M. Pickering, J. Scarvell, Paul N. Smith
{"title":"A non-invasive method for kinematic analysis of knee joints","authors":"M. Akter, A. Lambert, M. Pickering, J. Scarvell, Paul N. Smith","doi":"10.1109/ISSPIT.2013.6781912","DOIUrl":"https://doi.org/10.1109/ISSPIT.2013.6781912","url":null,"abstract":"The most popular and accurate kinematic analysis methods for musculoskeletal injuries or diseases, prosthesis planning and design are invasive in nature. The invasive methods are harmful and painful for the patient and not practically feasible to use for pre-operation planning on healthy knees. This paper presents a novel non-invasive, accurate kinematic analysis approach for measuring the relative motion of knee joints. A multi-modal image registration algorithm is used which successfully registers 3D CT to 2D single-plane fluoroscopy data for large initial displacements between the images. The proposed algorithm utilizes a log-polar transforms (LPT) mapping for in-pane translations, rotation and out-of-plane translation, a conjugate directional search (CDS) for out-of-plane rotation, and a fast digitally reconstructed radiograph (DRR) generation method using partial volume interpolation. Experimental results show that the achieved accuracy for kinematic analysis is similar to the invasive Roentgen stereophotogrammetric analysis (RSA) method.","PeriodicalId":88960,"journal":{"name":"Proceedings of the ... IEEE International Symposium on Signal Processing and Information Technology. IEEE International Symposium on Signal Processing and Information Technology","volume":"145 1","pages":"000386-000391"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78686823","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Detecting keywords in Persian conversational telephony speech using a discriminative English keyword spotter 波斯语会话电话语音中的关键字检测方法
A. Shokri, Mohammad Hossein Davarpour, A. Akbari, B. Nasersharif
{"title":"Detecting keywords in Persian conversational telephony speech using a discriminative English keyword spotter","authors":"A. Shokri, Mohammad Hossein Davarpour, A. Akbari, B. Nasersharif","doi":"10.1109/ISSPIT.2013.6781892","DOIUrl":"https://doi.org/10.1109/ISSPIT.2013.6781892","url":null,"abstract":"In this paper, we present the results of evaluating the robustness to language change of a previously proposed keyword spotting system. We assessed the robustness of this system when trained on clean English dataset and tested on telephony Persian speech. To have better recognition rate on telephony data, we used Cepstral mean and variance normalization (CMVN) and Cepstral gain normalization (CGN) methods for normalizing features along with RASTA and auto regressive moving average (ARMA) filters. The keyword spotting results on Persian telephony dataset are reported and a maximum detection of 0.6 AUC (area under ROC curve) is obtained when using CMVN or CGN normalization of features, followed by ARMA filter. The evaluated keyword spotting method was shown to be robust to noise in a previous paper, and as the result of this study clarifies, it is considerably robust to language change too. This study reveals the potential of the evaluated method to be the foundation of a keyword spotter which can support a wide range of languages.","PeriodicalId":88960,"journal":{"name":"Proceedings of the ... IEEE International Symposium on Signal Processing and Information Technology. IEEE International Symposium on Signal Processing and Information Technology","volume":"9 1","pages":"000272-000276"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84812956","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A comparative image auto-annotation 一个比较图像自动注释
Mahdia Bakalem, N. Benblidia, S. Ait-Aoudia
{"title":"A comparative image auto-annotation","authors":"Mahdia Bakalem, N. Benblidia, S. Ait-Aoudia","doi":"10.1109/ISSPIT.2013.6781859","DOIUrl":"https://doi.org/10.1109/ISSPIT.2013.6781859","url":null,"abstract":"The image annotation is an effective technology for improving the Web image retrieval. Many works have been proposed to increase the image auto-annotation performance. The annotation quality depends on many factors: segmentation, choice of visual features...etc.. An image contains several visuals information (color, texture, shape....) but the best choice of these parameters is a difficult problem. The main focus of this paper is two-fold. First, we compare between image annotations in latent space and textual space. Second, we survey influence of visual features choice on image annotation. For that, we developed two image auto-annotation systems (AIA-LSA, AIA-WLSA). For each one, we propose three prototypes based on different visual descriptors; such as: texture, color and fusion of both parameters. Corel data set is used to experiment our prototypes, the results show that the annotation by latent space is more efficient than the annotation by textual space and the best choice of visual features is a persistent problem in general images.","PeriodicalId":88960,"journal":{"name":"Proceedings of the ... IEEE International Symposium on Signal Processing and Information Technology. IEEE International Symposium on Signal Processing and Information Technology","volume":"35 1","pages":"000086-000091"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81634432","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Performance analysis of mobile communication networks in the presence of composite fading, noise and interference 存在复合衰落、噪声和干扰的移动通信网络性能分析
P. Bithas, A. Rontogiannis
{"title":"Performance analysis of mobile communication networks in the presence of composite fading, noise and interference","authors":"P. Bithas, A. Rontogiannis","doi":"10.1109/ISSPIT.2013.6781853","DOIUrl":"https://doi.org/10.1109/ISSPIT.2013.6781853","url":null,"abstract":"In this paper, the effects of interference on composite fading environments, where multipath fading coexists with shadowing, are investigated. More specifically, important statistical metrics of a single receiver output signal to interference and noise ratio (SINR) are studied, including the probability density function and the cumulative distribution function. Our analysis is also extended to multi-channel receivers and in particular to selection diversity (SD) receivers. For all scenarios, simplified expressions are also provided for the interference limited cases, where the influence of thermal noise is ignored. The derived expressions are used to analyze the performance, in terms of the average bit error probability and the outage probability. The analysis is accompanied by numerical evaluated results, clearly demonstrating the usefulness of the proposed theoretical framework.","PeriodicalId":88960,"journal":{"name":"Proceedings of the ... IEEE International Symposium on Signal Processing and Information Technology. IEEE International Symposium on Signal Processing and Information Technology","volume":"8 1","pages":"000052-000057"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81498302","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Geo-location-assisted real time in-band spectrum sensing for cognitive radio networks 认知无线电网络的地理位置辅助实时带内频谱感知
Bingxuan Zhao, S. Sasaki
{"title":"Geo-location-assisted real time in-band spectrum sensing for cognitive radio networks","authors":"Bingxuan Zhao, S. Sasaki","doi":"10.1109/ISSPIT.2013.6781880","DOIUrl":"https://doi.org/10.1109/ISSPIT.2013.6781880","url":null,"abstract":"A geo-location assisted real-time in-band spectrum sensing scheme is proposed to carry out the spectrum sensing and secondary transmissions in parallel. It is able to avoid the widely used “quiet periods,” which have at least the following two disadvantages. First, periodical interruption of the secondary transmissions will degrade the QoS of secondary networks (e.g., decreased system capacity, increased packet delay, etc.). Second, tight synchronization becomes necessary but very difficult to implement in the distributed networks. With the assistance of geolocations of the primary transmitters and the secondary users, the proposed method is able to differentiate the target primary signal power from the co-channel and adjacent-channel interference produced by the simultaneous data transmissions in the secondary networks. Then, the interference can be cancelled when constructing the test statistic for the energy detectors. Both analyzing and simulation results show that the proposed method is able to successfully cancel the interference and can achieve a good performance.","PeriodicalId":88960,"journal":{"name":"Proceedings of the ... IEEE International Symposium on Signal Processing and Information Technology. IEEE International Symposium on Signal Processing and Information Technology","volume":"78 1","pages":"000204-000209"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86588192","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Rotation invariant features of wavelet transform for texture retrieval 小波变换旋转不变性特征的纹理检索
Fatih Çaglar, B. Cavusoglu
{"title":"Rotation invariant features of wavelet transform for texture retrieval","authors":"Fatih Çaglar, B. Cavusoglu","doi":"10.1109/ISSPIT.2013.6781909","DOIUrl":"https://doi.org/10.1109/ISSPIT.2013.6781909","url":null,"abstract":"Wavelet transform is both sensitive to translation and rotation. This feature of the transform diminishes the discriminative power of wavelet coefficients among different classes where rotated versions of textures are present. We analyze statistical behavior of wavelet coefficients and show that some features of wavelets are more robust than others against translation and rotation. We also show that using higher order moments increase the overall performance. A new parameter is also proposed to determine the discriminative features out of a possible feature set. This new parameter is derived based on statistics of wavelet transform and called as effective discriminative power (EP). Based on EP, reduced subband feature set is proposed and applied on the modified Brodatz database for texture retrieval and shown that the reduced feature set have superior performance compared to the one which just includes mean and standard deviations of all the subbands. The reduced feature set is also computationally less expensive since it eliminates rotation-variant features and results in less number of features with better performance.","PeriodicalId":88960,"journal":{"name":"Proceedings of the ... IEEE International Symposium on Signal Processing and Information Technology. IEEE International Symposium on Signal Processing and Information Technology","volume":"8 1","pages":"000368-000373"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79279127","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
On-line signature recognition via fusion of dynamic features into dissimilarity space 在线签名识别通过将动态特征融合到不同空间
Ilias Theodorakopoulos, G. Economou, S. Fotopoulos, A. Ifantis
{"title":"On-line signature recognition via fusion of dynamic features into dissimilarity space","authors":"Ilias Theodorakopoulos, G. Economou, S. Fotopoulos, A. Ifantis","doi":"10.1109/ISSPIT.2013.6781921","DOIUrl":"https://doi.org/10.1109/ISSPIT.2013.6781921","url":null,"abstract":"In this paper a method for on-line signature recognition that combines dynamic features, fused into dissimilarity space, with a powerful collaborative sparse representation-based classification scheme is proposed. Dissimilarity vectors are formed in two stages. Initially, a number of informative dynamic features are extracted and stored in sequences. Afterwards, pairwise dissimilarities among feature sequences, computed using the DTW algorithm, are used to construct the new representation. Based on collaborative sparse representation principles, a new embedding space is defined where classification can be implemented efficiently. According to this scheme, signatures are represented in terms of their position inside the data structure, resulting in high-level performance without utilizing optimal feature selection procedures. The proposed framework has been evaluated using the SUSIG and the SVC2004 on-line signature databases.","PeriodicalId":88960,"journal":{"name":"Proceedings of the ... IEEE International Symposium on Signal Processing and Information Technology. IEEE International Symposium on Signal Processing and Information Technology","volume":"50 1","pages":"000440-000445"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79312127","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The weakest link on the network: Exploiting ADSL routers to perform cyber-attacks 网络上最薄弱的环节:利用ADSL路由器进行网络攻击
Anastasios Stasinopoulos, Christoforos Ntantogian, C. Xenakis
{"title":"The weakest link on the network: Exploiting ADSL routers to perform cyber-attacks","authors":"Anastasios Stasinopoulos, Christoforos Ntantogian, C. Xenakis","doi":"10.1109/ISSPIT.2013.6781868","DOIUrl":"https://doi.org/10.1109/ISSPIT.2013.6781868","url":null,"abstract":"ADSL routers are an integral part of today's home and small office networks. Typically, these devices are provided by a user's ISP and are, usually, managed by people who do not have any special technical knowledge. Often poorly configured and vulnerable, such devices are an easy target for network-based attacks, allowing cyber-criminals to quickly and easily gain control over a network. In this paper, we systematically evaluate the security of ADSL routers and identify the potential of attacks, which attempt to compromise the vulnerabilities of their web interface. More specifically, we present common vulnerabilities and attacks that occur in websites on the Internet, and project them on the special characteristics of the web management interface of ADSL routers. To put this analysis into a practical context, we investigate the security of a popular ADSL router provided by a Greek ISP. In this security assessment, we have discovered two 0-day vulnerabilities in the web management interface of the tested router. In particular, we discovered an operating system (OS) command injection and stored Cross-Site Scripting (XSS) attack. A malicious may exploit these vulnerabilities to perform several large-scale attacks. Specifically, he/she can perform DNS hijacking attack and redirect the users to fake web sites for phishing; mount a Distributed Denial of Service (DDoS) attack using the compromised routers as zombie machines; or even spread a malware. Finally, we discuss some well-known security practices that should be followed from developers and users to enhance the security of ADSL routers.","PeriodicalId":88960,"journal":{"name":"Proceedings of the ... IEEE International Symposium on Signal Processing and Information Technology. IEEE International Symposium on Signal Processing and Information Technology","volume":"1 1","pages":"000135-000139"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79893321","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信