Proceedings of the ... IEEE International Symposium on Signal Processing and Information Technology. IEEE International Symposium on Signal Processing and Information Technology最新文献

筛选
英文 中文
Performance of complex orthogonal M-ary transmission with Amicable Hadamard matrices over diversity Rayleigh fading channels 分集瑞利衰落信道上具有友好Hadamard矩阵的复正交m - 1传输性能
A. Iossifides, G. Papadopoulos, N. Deligiannis
{"title":"Performance of complex orthogonal M-ary transmission with Amicable Hadamard matrices over diversity Rayleigh fading channels","authors":"A. Iossifides, G. Papadopoulos, N. Deligiannis","doi":"10.1109/ISSPIT.2013.6781916","DOIUrl":"https://doi.org/10.1109/ISSPIT.2013.6781916","url":null,"abstract":"This paper proposes and analyzes a complex orthogonal multiplexing scheme based on the use of Amicable Hadamard matrices for non-selective Rayleigh fading channels. A thorough analysis provides exact closed-form mathematical formulas or upper and lower bounds together with simulation results for the estimation of the system bit error probability (BEP) with maximum likelihood vector detection. The proposed system is evaluated for various order configurations and M-ary information input with or without external diversity, assuming perfect channel state information at the receiver and interleaving. The results show great performance enhancement, in terms of BEP compared to regular MPAM modulation schemes. Furthermore, the proposed scheme presents similar or better performance in comparison to conventional MPAM with maximum ratio combining diversity or Alamouti 2×1 space-time block coding. This is achieved by the inherent time diversity gain without altering the original information rate and mean transmission power and leads to hardware antenna implementation complexity reduction.","PeriodicalId":88960,"journal":{"name":"Proceedings of the ... IEEE International Symposium on Signal Processing and Information Technology. IEEE International Symposium on Signal Processing and Information Technology","volume":"485 1","pages":"000410-000415"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75920041","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
2-D block Kalman filter with colored driving source for image restoration using adaptive image modeling 带彩色驱动源的二维块卡尔曼滤波器,用于自适应图像建模的图像恢复
Ryu Nagayasu, N. Tanabe, T. Furukawa
{"title":"2-D block Kalman filter with colored driving source for image restoration using adaptive image modeling","authors":"Ryu Nagayasu, N. Tanabe, T. Furukawa","doi":"10.1109/ISSPIT.2013.6781893","DOIUrl":"https://doi.org/10.1109/ISSPIT.2013.6781893","url":null,"abstract":"This paper presents a fast image restoration method using the 2-D block Kalman filter with colored driving source. The remarkable feature of the proposed method is reduced computational complexity using the high correlation pixels of current region and reference region, while the conventional 2-D block Kalman filter methods performed image restoration without considering the relationship between the reference region and the current region. We have shown the effectiveness of the proposed method by numerical results and subjective evaluation results.","PeriodicalId":88960,"journal":{"name":"Proceedings of the ... IEEE International Symposium on Signal Processing and Information Technology. IEEE International Symposium on Signal Processing and Information Technology","volume":"41 1","pages":"000277-000282"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77531965","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A non-invasive method for kinematic analysis of knee joints 一种无创的膝关节运动学分析方法
M. Akter, A. Lambert, M. Pickering, J. Scarvell, Paul N. Smith
{"title":"A non-invasive method for kinematic analysis of knee joints","authors":"M. Akter, A. Lambert, M. Pickering, J. Scarvell, Paul N. Smith","doi":"10.1109/ISSPIT.2013.6781912","DOIUrl":"https://doi.org/10.1109/ISSPIT.2013.6781912","url":null,"abstract":"The most popular and accurate kinematic analysis methods for musculoskeletal injuries or diseases, prosthesis planning and design are invasive in nature. The invasive methods are harmful and painful for the patient and not practically feasible to use for pre-operation planning on healthy knees. This paper presents a novel non-invasive, accurate kinematic analysis approach for measuring the relative motion of knee joints. A multi-modal image registration algorithm is used which successfully registers 3D CT to 2D single-plane fluoroscopy data for large initial displacements between the images. The proposed algorithm utilizes a log-polar transforms (LPT) mapping for in-pane translations, rotation and out-of-plane translation, a conjugate directional search (CDS) for out-of-plane rotation, and a fast digitally reconstructed radiograph (DRR) generation method using partial volume interpolation. Experimental results show that the achieved accuracy for kinematic analysis is similar to the invasive Roentgen stereophotogrammetric analysis (RSA) method.","PeriodicalId":88960,"journal":{"name":"Proceedings of the ... IEEE International Symposium on Signal Processing and Information Technology. IEEE International Symposium on Signal Processing and Information Technology","volume":"145 1","pages":"000386-000391"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78686823","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Detecting keywords in Persian conversational telephony speech using a discriminative English keyword spotter 波斯语会话电话语音中的关键字检测方法
A. Shokri, Mohammad Hossein Davarpour, A. Akbari, B. Nasersharif
{"title":"Detecting keywords in Persian conversational telephony speech using a discriminative English keyword spotter","authors":"A. Shokri, Mohammad Hossein Davarpour, A. Akbari, B. Nasersharif","doi":"10.1109/ISSPIT.2013.6781892","DOIUrl":"https://doi.org/10.1109/ISSPIT.2013.6781892","url":null,"abstract":"In this paper, we present the results of evaluating the robustness to language change of a previously proposed keyword spotting system. We assessed the robustness of this system when trained on clean English dataset and tested on telephony Persian speech. To have better recognition rate on telephony data, we used Cepstral mean and variance normalization (CMVN) and Cepstral gain normalization (CGN) methods for normalizing features along with RASTA and auto regressive moving average (ARMA) filters. The keyword spotting results on Persian telephony dataset are reported and a maximum detection of 0.6 AUC (area under ROC curve) is obtained when using CMVN or CGN normalization of features, followed by ARMA filter. The evaluated keyword spotting method was shown to be robust to noise in a previous paper, and as the result of this study clarifies, it is considerably robust to language change too. This study reveals the potential of the evaluated method to be the foundation of a keyword spotter which can support a wide range of languages.","PeriodicalId":88960,"journal":{"name":"Proceedings of the ... IEEE International Symposium on Signal Processing and Information Technology. IEEE International Symposium on Signal Processing and Information Technology","volume":"9 1","pages":"000272-000276"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84812956","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A comparative image auto-annotation 一个比较图像自动注释
Mahdia Bakalem, N. Benblidia, S. Ait-Aoudia
{"title":"A comparative image auto-annotation","authors":"Mahdia Bakalem, N. Benblidia, S. Ait-Aoudia","doi":"10.1109/ISSPIT.2013.6781859","DOIUrl":"https://doi.org/10.1109/ISSPIT.2013.6781859","url":null,"abstract":"The image annotation is an effective technology for improving the Web image retrieval. Many works have been proposed to increase the image auto-annotation performance. The annotation quality depends on many factors: segmentation, choice of visual features...etc.. An image contains several visuals information (color, texture, shape....) but the best choice of these parameters is a difficult problem. The main focus of this paper is two-fold. First, we compare between image annotations in latent space and textual space. Second, we survey influence of visual features choice on image annotation. For that, we developed two image auto-annotation systems (AIA-LSA, AIA-WLSA). For each one, we propose three prototypes based on different visual descriptors; such as: texture, color and fusion of both parameters. Corel data set is used to experiment our prototypes, the results show that the annotation by latent space is more efficient than the annotation by textual space and the best choice of visual features is a persistent problem in general images.","PeriodicalId":88960,"journal":{"name":"Proceedings of the ... IEEE International Symposium on Signal Processing and Information Technology. IEEE International Symposium on Signal Processing and Information Technology","volume":"35 1","pages":"000086-000091"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81634432","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Performance analysis of mobile communication networks in the presence of composite fading, noise and interference 存在复合衰落、噪声和干扰的移动通信网络性能分析
P. Bithas, A. Rontogiannis
{"title":"Performance analysis of mobile communication networks in the presence of composite fading, noise and interference","authors":"P. Bithas, A. Rontogiannis","doi":"10.1109/ISSPIT.2013.6781853","DOIUrl":"https://doi.org/10.1109/ISSPIT.2013.6781853","url":null,"abstract":"In this paper, the effects of interference on composite fading environments, where multipath fading coexists with shadowing, are investigated. More specifically, important statistical metrics of a single receiver output signal to interference and noise ratio (SINR) are studied, including the probability density function and the cumulative distribution function. Our analysis is also extended to multi-channel receivers and in particular to selection diversity (SD) receivers. For all scenarios, simplified expressions are also provided for the interference limited cases, where the influence of thermal noise is ignored. The derived expressions are used to analyze the performance, in terms of the average bit error probability and the outage probability. The analysis is accompanied by numerical evaluated results, clearly demonstrating the usefulness of the proposed theoretical framework.","PeriodicalId":88960,"journal":{"name":"Proceedings of the ... IEEE International Symposium on Signal Processing and Information Technology. IEEE International Symposium on Signal Processing and Information Technology","volume":"8 1","pages":"000052-000057"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81498302","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Geo-location-assisted real time in-band spectrum sensing for cognitive radio networks 认知无线电网络的地理位置辅助实时带内频谱感知
Bingxuan Zhao, S. Sasaki
{"title":"Geo-location-assisted real time in-band spectrum sensing for cognitive radio networks","authors":"Bingxuan Zhao, S. Sasaki","doi":"10.1109/ISSPIT.2013.6781880","DOIUrl":"https://doi.org/10.1109/ISSPIT.2013.6781880","url":null,"abstract":"A geo-location assisted real-time in-band spectrum sensing scheme is proposed to carry out the spectrum sensing and secondary transmissions in parallel. It is able to avoid the widely used “quiet periods,” which have at least the following two disadvantages. First, periodical interruption of the secondary transmissions will degrade the QoS of secondary networks (e.g., decreased system capacity, increased packet delay, etc.). Second, tight synchronization becomes necessary but very difficult to implement in the distributed networks. With the assistance of geolocations of the primary transmitters and the secondary users, the proposed method is able to differentiate the target primary signal power from the co-channel and adjacent-channel interference produced by the simultaneous data transmissions in the secondary networks. Then, the interference can be cancelled when constructing the test statistic for the energy detectors. Both analyzing and simulation results show that the proposed method is able to successfully cancel the interference and can achieve a good performance.","PeriodicalId":88960,"journal":{"name":"Proceedings of the ... IEEE International Symposium on Signal Processing and Information Technology. IEEE International Symposium on Signal Processing and Information Technology","volume":"78 1","pages":"000204-000209"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86588192","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Rotation invariant features of wavelet transform for texture retrieval 小波变换旋转不变性特征的纹理检索
Fatih Çaglar, B. Cavusoglu
{"title":"Rotation invariant features of wavelet transform for texture retrieval","authors":"Fatih Çaglar, B. Cavusoglu","doi":"10.1109/ISSPIT.2013.6781909","DOIUrl":"https://doi.org/10.1109/ISSPIT.2013.6781909","url":null,"abstract":"Wavelet transform is both sensitive to translation and rotation. This feature of the transform diminishes the discriminative power of wavelet coefficients among different classes where rotated versions of textures are present. We analyze statistical behavior of wavelet coefficients and show that some features of wavelets are more robust than others against translation and rotation. We also show that using higher order moments increase the overall performance. A new parameter is also proposed to determine the discriminative features out of a possible feature set. This new parameter is derived based on statistics of wavelet transform and called as effective discriminative power (EP). Based on EP, reduced subband feature set is proposed and applied on the modified Brodatz database for texture retrieval and shown that the reduced feature set have superior performance compared to the one which just includes mean and standard deviations of all the subbands. The reduced feature set is also computationally less expensive since it eliminates rotation-variant features and results in less number of features with better performance.","PeriodicalId":88960,"journal":{"name":"Proceedings of the ... IEEE International Symposium on Signal Processing and Information Technology. IEEE International Symposium on Signal Processing and Information Technology","volume":"8 1","pages":"000368-000373"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79279127","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
On-line signature recognition via fusion of dynamic features into dissimilarity space 在线签名识别通过将动态特征融合到不同空间
Ilias Theodorakopoulos, G. Economou, S. Fotopoulos, A. Ifantis
{"title":"On-line signature recognition via fusion of dynamic features into dissimilarity space","authors":"Ilias Theodorakopoulos, G. Economou, S. Fotopoulos, A. Ifantis","doi":"10.1109/ISSPIT.2013.6781921","DOIUrl":"https://doi.org/10.1109/ISSPIT.2013.6781921","url":null,"abstract":"In this paper a method for on-line signature recognition that combines dynamic features, fused into dissimilarity space, with a powerful collaborative sparse representation-based classification scheme is proposed. Dissimilarity vectors are formed in two stages. Initially, a number of informative dynamic features are extracted and stored in sequences. Afterwards, pairwise dissimilarities among feature sequences, computed using the DTW algorithm, are used to construct the new representation. Based on collaborative sparse representation principles, a new embedding space is defined where classification can be implemented efficiently. According to this scheme, signatures are represented in terms of their position inside the data structure, resulting in high-level performance without utilizing optimal feature selection procedures. The proposed framework has been evaluated using the SUSIG and the SVC2004 on-line signature databases.","PeriodicalId":88960,"journal":{"name":"Proceedings of the ... IEEE International Symposium on Signal Processing and Information Technology. IEEE International Symposium on Signal Processing and Information Technology","volume":"50 1","pages":"000440-000445"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79312127","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The weakest link on the network: Exploiting ADSL routers to perform cyber-attacks 网络上最薄弱的环节:利用ADSL路由器进行网络攻击
Anastasios Stasinopoulos, Christoforos Ntantogian, C. Xenakis
{"title":"The weakest link on the network: Exploiting ADSL routers to perform cyber-attacks","authors":"Anastasios Stasinopoulos, Christoforos Ntantogian, C. Xenakis","doi":"10.1109/ISSPIT.2013.6781868","DOIUrl":"https://doi.org/10.1109/ISSPIT.2013.6781868","url":null,"abstract":"ADSL routers are an integral part of today's home and small office networks. Typically, these devices are provided by a user's ISP and are, usually, managed by people who do not have any special technical knowledge. Often poorly configured and vulnerable, such devices are an easy target for network-based attacks, allowing cyber-criminals to quickly and easily gain control over a network. In this paper, we systematically evaluate the security of ADSL routers and identify the potential of attacks, which attempt to compromise the vulnerabilities of their web interface. More specifically, we present common vulnerabilities and attacks that occur in websites on the Internet, and project them on the special characteristics of the web management interface of ADSL routers. To put this analysis into a practical context, we investigate the security of a popular ADSL router provided by a Greek ISP. In this security assessment, we have discovered two 0-day vulnerabilities in the web management interface of the tested router. In particular, we discovered an operating system (OS) command injection and stored Cross-Site Scripting (XSS) attack. A malicious may exploit these vulnerabilities to perform several large-scale attacks. Specifically, he/she can perform DNS hijacking attack and redirect the users to fake web sites for phishing; mount a Distributed Denial of Service (DDoS) attack using the compromised routers as zombie machines; or even spread a malware. Finally, we discuss some well-known security practices that should be followed from developers and users to enhance the security of ADSL routers.","PeriodicalId":88960,"journal":{"name":"Proceedings of the ... IEEE International Symposium on Signal Processing and Information Technology. IEEE International Symposium on Signal Processing and Information Technology","volume":"1 1","pages":"000135-000139"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79893321","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信