19 research outputs found

    On Ability of Troubleshooting by Observing Some Physical Layer Parameters of xDSL Transceivers

    Get PDF
    This article presents a review of the investigation of the possibility of increasing the efficiency of existing line test solutions for troubleshooting testing for IPTV over xDSL, by the results of experimental research on real system under commercial exploitation. At the beginning of this article the main weaknesses of the existing troubleshooting testing are described. In the continuation of the article the physical layer parameters of xDSL transceiver are listed. In the reset this article provides a few specific examples of xDSL lines with their physical layer parameters of xDSL transceivers followed by analysis how they can be used for the purposes of more efficient measurement of parameters of copper pairs

    Evaluation of Blur and Gaussian Noise Degradation in Images Using Statistical Model of Natural Scene and Perceptual Image Quality Measure

    Get PDF
    In this paper we present new method for classification of image degradation type based on Riesz transform coefficients and Blind/Referenceless Image Spatial Quality Evaluator (BRISQUE) that employs spatial coefficients. In our method we use additional statistical parameters that gives us statistically better results for blur and all tested degradations together in comparison with previous method. A new method to determine level of blur and Gaussian noise degradation in images using statistical model of natural scene is presented. We defined parameters for evaluation of level of Gaussian noise and blur degradation in images. In real world applications reference image is usually not available therefore proposed method enables classification of image degradation by type and estimation of Gaussian noise and blur levels for any degraded image

    Review on local binary patterns variants as texture descriptors for copy-move forgery detection

    Get PDF
    Past decades had seen the concerned by researchers in authenticating the originality of an image as the result of advancement in computer technology. Many methods have been developed to detect image forgeries such as copy-move, splicing, resampling and et cetera. The most common type of image forgery is copy-move where the copied region is pasted on the same image. The existence of high similarity in colour and textures of both copied and pasted images caused the detection of the tampered region to be very difficult. Additionally, the existence of post-processing methods makes it more challenging. In this paper, Local Binary Pattern (LBP) variants as texture descriptors for copy-move forgery detection have been reviewed. These methods are discussed in terms of introduction and methodology in copy-move forgery detection. These methods are also compared in the discussion section. Finally, their strengths and weaknesses are summarised, and some future research directions were pointed out

    Activity Report: Automatic Control 2012

    Get PDF

    A Survey on Biometrics and Cancelable Biometrics Systems

    Get PDF
    Now-a-days, biometric systems have replaced the password or token based authentication system in many fields to improve the security level. However, biometric system is also vulnerable to security threats. Unlike password based system, biometric templates cannot be replaced if lost or compromised. To deal with the issue of the compromised biometric template, template protection schemes evolved to make it possible to replace the biometric template. Cancelable biometric is such a template protection scheme that replaces a biometric template when the stored template is stolen or lost. It is a feature domain transformation where a distorted version of a biometric template is generated and matched in the transformed domain. This paper presents a review on the state-of-the-art and analysis of different existing methods of biometric based authentication system and cancelable biometric systems along with an elaborate focus on cancelable biometrics in order to show its advantages over the standard biometric systems through some generalized standards and guidelines acquired from the literature. We also proposed a highly secure method for cancelable biometrics using a non-invertible function based on Discrete Cosine Transformation (DCT) and Huffman encoding. We tested and evaluated the proposed novel method for 50 users and achieved good results

    Performance comparison of intrusion detection systems and application of machine learning to Snort system

    Get PDF
    This study investigates the performance of two open source intrusion detection systems (IDSs) namely Snort and Suricata for accurately detecting the malicious traffic on computer networks. Snort and Suricata were installed on two different but identical computers and the performance was evaluated at 10 Gbps network speed. It was noted that Suricata could process a higher speed of network traffic than Snort with lower packet drop rate but it consumed higher computational resources. Snort had higher detection accuracy and was thus selected for further experiments. It was observed that the Snort triggered a high rate of false positive alarms. To solve this problem a Snort adaptive plug-in was developed. To select the best performing algorithm for Snort adaptive plug-in, an empirical study was carried out with different learning algorithms and Support Vector Machine (SVM) was selected. A hybrid version of SVM and Fuzzy logic produced a better detection accuracy. But the best result was achieved using an optimised SVM with firefly algorithm with FPR (false positive rate) as 8.6% and FNR (false negative rate) as 2.2%, which is a good result. The novelty of this work is the performance comparison of two IDSs at 10 Gbps and the application of hybrid and optimised machine learning algorithms to Snort

    A Survey on Wireless Network Applications in Automated Public Utilities Control and Management, Journal of Telecommunications and Information Technology, 2015, nr 3

    Get PDF
    Public utilities such as water, electricity and gas are essential services that play a vital role in economic and social development. Automation of public utility services addresses the huge losses faced by the utility services today, due to non-accounting of distributed utility resources. Automation improves government revenues. The different type of architectures are proposed and designed for automated metering, control and management of public utilities like water, gas, and electricity for effective management and control of resources. The various network topologies, hardware and software architectures to automation and management of public utilities are proposed by researchers. In this paper, the different technologies proposed by various researchers across the globe are surveyed and list of issues and challenges for automated meter reading and control of public utilities is identified

    5G Multi-access Edge Computing: Security, Dependability, and Performance

    Full text link
    The main innovation of the Fifth Generation (5G) of mobile networks is the ability to provide novel services with new and stricter requirements. One of the technologies that enable the new 5G services is the Multi-access Edge Computing (MEC). MEC is a system composed of multiple devices with computing and storage capabilities that are deployed at the edge of the network, i.e., close to the end users. MEC reduces latency and enables contextual information and real-time awareness of the local environment. MEC also allows cloud offloading and the reduction of traffic congestion. Performance is not the only requirement that the new 5G services have. New mission-critical applications also require high security and dependability. These three aspects (security, dependability, and performance) are rarely addressed together. This survey fills this gap and presents 5G MEC by addressing all these three aspects. First, we overview the background knowledge on MEC by referring to the current standardization efforts. Second, we individually present each aspect by introducing the related taxonomy (important for the not expert on the aspect), the state of the art, and the challenges on 5G MEC. Finally, we discuss the challenges of jointly addressing the three aspects.Comment: 33 pages, 11 figures, 15 tables. This paper is under review at IEEE Communications Surveys & Tutorials. Copyright IEEE 202
    corecore