Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- posterNovember 2024
Poster Cooperative UAV Sensor Fusion for Precision Localization and Navigation in Load Transport
SenSys '24: Proceedings of the 22nd ACM Conference on Embedded Networked Sensor SystemsPages 895–896https://doi.org/10.1145/3666025.3699425Cooperative UAV transport operations in GPS-denied environments pose significant challenges in localization, coordination, and payload stability. This paper introduces a vision-based Leader-Follower drone system using MAVROS and depth cameras for real-...
- research-articleMay 2022
Payload Drones and ACI: Drone Navigation System Prototype
ACI '21: Proceedings of the Eight International Conference on Animal-Computer InteractionArticle No.: 10, Pages 1–8https://doi.org/10.1145/3493842.3493895With aerial systems becoming more accessible, animal-drone interaction opportunities for improving wellness are expanding. Payload drones may provide new ways to encourage space utilization in zoo contexts, as well as minimize human interaction in ...
- research-articleOctober 2021
Optimizing number of spots and cluster size of a high‐throughput communication satellite payload
International Journal of Satellite Communications and Networking (WSAT), Volume 39, Issue 6Pages 661–685https://doi.org/10.1002/sat.1414SummaryIn this paper, the number of spots and cluster size of a high‐throughput satellite (HTS) is optimized by minimizing the satellite mass in the conceptual design phase. An innovative procedure for deriving the total mass of the payload and relevant ...
In this paper, the number of spots and cluster size of a high‐throughput satellite is optimized by minimizing the satellite mass in the conceptual design phase. A procedure for deriving total mass of the payload and relevant power supply subsystem as a ...
- research-articleDecember 2020
A methodology to benchmark flexible payload architectures in a megaconstellation use case
International Journal of Satellite Communications and Networking (WSAT), Volume 39, Issue 1Pages 29–46https://doi.org/10.1002/sat.1344SummaryThis paper proposes a methodology to benchmark satellite payload architectures and find the optimal trade‐offs between high flexibility and low complexity. High flexibility would enable the satellite to adapt to various distributions of user ...
This paper proposes a methodology to benchmark satellite payload architectures and find the optimal trade‐offs between flexibility and complexity. High flexibility would enable the satellite to adapt to various distributions of user terminals on the ...
- research-articleAugust 2020
Exploring data leakage in encrypted payload using supervised machine learning
ARES '20: Proceedings of the 15th International Conference on Availability, Reliability and SecurityArticle No.: 74, Pages 1–10https://doi.org/10.1145/3407023.3409216Data security includes but not limited to, data encryption and key management practices that protect data across all applications and platforms. In this paper, we aim to explore whether any data leakage takes place in data encryption when encrypted data ...
-
- research-articleJanuary 2020
Efficient and secured information transfer for congestion avoidance and collision detection in vehicular ad hoc networks (V2V) methodology
International Journal of Internet Technology and Secured Transactions (IJITST), Volume 10, Issue 6Pages 721–739https://doi.org/10.1504/ijitst.2020.110577Vehicular ad hoc networks (VANET) connects the vehicle and the infrastructure in solving various issues on the travel path. In this paper, a multi-hop routing protocol is established to transfer the information among vehicles when the infrastructure is ...
- research-articleJanuary 2020
Reversible data hiding methods in integer wavelet transform
International Journal of Information and Computer Security (IJICS), Volume 12, Issue 1Pages 70–89https://doi.org/10.1504/ijics.2020.104001Reversible data hiding is art of concealing secret information such that cover media and secret information are both recovered without any information loss. In this paper high frequency sub-bands of integer wavelet transform are used for data embedding. ...
- research-articleSeptember 2019
Lightweight energy‐efficient framework for sensor real‐time communications
IET Communications (CMU2), Volume 13, Issue 15Pages 2362–2368https://doi.org/10.1049/iet-com.2019.0083Sensor node communications are usually the most energy consuming among its activities. Therefore, reducing those communications necessarily preserves the node limited energy. One successful approach to this end is to reduce both the number of ...
- short-paperDecember 2015
Integration of a robust watermark scheme in a high efficiency codec H.265/HEVC with capacity-quality-bitrate trade-off
MoMM 2015: Proceedings of the 13th International Conference on Advances in Mobile Computing and MultimediaPages 375–379https://doi.org/10.1145/2837126.2837174Recently, new challenges are imposed to secure video broadcasting and sharing, and to guarantee confidentiality, integrity, copyright and traceability. In addition, due to the social media development, several new problems have emerged in users' privacy ...
- ArticleAugust 2010
Preliminary Design of Payload Subsystem in the VX-SAT Communication Satellite
ICIIC '10: Proceedings of the 2010 First International Conference on Integrated Intelligent ComputingPages 270–276https://doi.org/10.1109/ICIIC.2010.59Modern communications is an indispensable tool for modern social economy and modern social life. The payload of a communication satellite provides radio relay for links between earth stations. With most commercial communication satellites the payload ...
- research-articleJune 2010
Intrusion detection using GSAD model for HTTP traffic on web services
IWCMC '10: Proceedings of the 6th International Wireless Communications and Mobile Computing ConferencePages 1193–1197https://doi.org/10.1145/1815396.1815669Intrusion detection systems are widely used security tools to detect cyber-attacks and malicious activities in computer systems and networks. Hypertext Transport Protocol (HTTP) is used for new applications without much interference. In this paper, we ...
- articleJune 2010
Some new methodologies for secured data coding and transmission
International Journal of Electronic Security and Digital Forensics (IJESDF), Volume 3, Issue 2Pages 120–137https://doi.org/10.1504/IJESDF.2010.033781In this fast growing digital world, the dramatic rise and progress of the internet have opened a path to connect a computer in the world to any other computer, no matter how far the two are located form each other. This is undoubtedly a great advantage ...
- research-articleFebruary 2010
Watermarking for JPEG2000 compression standard on FPGA
ICWET '10: Proceedings of the International Conference and Workshop on Emerging Trends in TechnologyPages 309–314https://doi.org/10.1145/1741906.1741975With the result of advancement in today's technology, digital content can be easily copied, modified, or distributed. Digital watermarking provides the solution to this problem. Most of the digital watermarking methods are divided into two categories: ...
- research-articleNovember 2009
A new robust forensic marking using peak position modulation for video
ICIS '09: Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, Culture and HumanPages 784–789https://doi.org/10.1145/1655925.1656068In this paper, we proposed a new video forensic marking algorithm to hide special information of the content user in order to prevent the illegal distribution of the video content. The information which is hid to trace the illegal distribution of the ...
- ArticleJuly 2009
Resource Planning and Scheduling of Payload for Satellite with a Discrete Binary Version of Differential Evolution
CASE '09: Proceedings of the 2009 IITA International Conference on Control, Automation and Systems Engineering (case 2009)Pages 62–65https://doi.org/10.1109/CASE.2009.54The resource planning and scheduling technology of payload is to arrange the works states of various payloads to carry out missions by optimizing the scheme of the resources. Based on the analysis of the satellite’s functions and the payload’s resource ...
- research-articleNovember 2008
Service-independent payload analysis to improve intrusion detection in network traffic
The popularity of computer networks broadens the scope for network attackers and increases the damage these attacks can cause. In this context, Intrusion Detection Systems (IDS) are included as part of any complete security package. This work focuses on ...
- articleAugust 2008
An Efficient Reversible Image Authentication Method
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences (FECCS), Volume E91-A, Issue 8Pages 1907–1914https://doi.org/10.1093/ietfec/e91-a.8.1907This paper proposes an image authentication method that detects tamper and localizes tampered areas efficiently. The efficiency of the proposed method is summarized as the following three points. 1) This method offers coarse-to-fine tamper localization ...
- research-articleSeptember 2007
Reversible Data-Hiding Scheme for 2-D Vector Maps Based on Difference Expansion
IEEE Transactions on Information Forensics and Security (TIFS), Volume 2, Issue 3Pages 311–320https://doi.org/10.1109/TIFS.2007.902677Reversible watermarking is suitable for hiding data in 2-D vector maps because the distortions induced by data embedding can be removed after extracting the hidden bits. In this paper, two reversible data-hiding schemes are explored based on the idea of ...
- articleApril 2007
Lossless Data Hiding in the Spatial Domain for High Quality Images
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences (FECCS), Volume E90-A, Issue 4Pages 771–777https://doi.org/10.1093/ietfec/e90-a.4.771A lossless data embedding method that inserts data in images in the spatial domain is proposed in this paper. Though a lossless data embedding method once distorts an original image to embed data into the image, the method restores the original image as ...
- chapterApril 2007
Knowledge Structure on Virus for User Education
Computational Intelligence and SecurityApril 2007, Pages 817–823https://doi.org/10.1007/978-3-540-74377-4_85There are many factors contribute to the virus spread and infection. One of the big challenges in confronting computer viruses is to educate user. It needs a lot of effort to educate user about computer virus. The researchers have produced ECOVP which ...