期刊文献+
共找到9篇文章
< 1 >
每页显示 20 50 100
Text Independent Automatic Speaker Recognition System Using Mel-Frequency Cepstrum Coefficient and Gaussian Mixture Models 被引量:1
1
作者 Alfredo Maesa fabio garzia +1 位作者 Michele Scarpiniti Roberto Cusani 《Journal of Information Security》 2012年第4期335-340,共6页
The aim of this paper is to show the accuracy and time results of a text independent automatic speaker recognition (ASR) system, based on Mel-Frequency Cepstrum Coefficients (MFCC) and Gaussian Mixture Models (GMM), i... The aim of this paper is to show the accuracy and time results of a text independent automatic speaker recognition (ASR) system, based on Mel-Frequency Cepstrum Coefficients (MFCC) and Gaussian Mixture Models (GMM), in order to develop a security control access gate. 450 speakers were randomly extracted from the Voxforge.org audio database, their utterances have been improved using spectral subtraction, then MFCC were extracted and these coefficients were statistically analyzed by GMM in order to build each profile. For each speaker two different speech files were used: the first one to build the profile database, the second one to test the system performance. The accuracy achieved by the proposed approach is greater than 96% and the time spent for a single test run, implemented in Matlab language, is about 2 seconds on a common PC. 展开更多
关键词 AUTOMATIC SPEAKER RECOGNITION Access Control VOICE RECOGNITION BIOMETRICS
下载PDF
All-Optical Cryptographic Device for Secure Communication
2
作者 fabio garzia Roberto Cusani 《Communications and Network》 2010年第4期235-245,共11页
An all-optical cryptographic device for secure communication, based on the properties of soliton beams, is presented. It can encode a given bit stream of optical pulses, changing their phase and their amplitude as a f... An all-optical cryptographic device for secure communication, based on the properties of soliton beams, is presented. It can encode a given bit stream of optical pulses, changing their phase and their amplitude as a function of an encryption serial key that merge with the data stream, generating a ciphered stream. The greatest advantage of the device is real-time encrypting – data can be transmitted at the original speed without slowing down. 展开更多
关键词 CRYPTOGRAPHIC DEVICE Security DEVICE SOLITON Interaction ALL-OPTICAL SWITCHING SPATIAL SOLITON ALL-OPTICAL Device.
下载PDF
Optimization of Security Communication Wired Network by Means of Genetic Algorithms
3
作者 fabio garzia Natale Tirocchi +1 位作者 Michele Scarpiniti Roberto Cusani 《Communications and Network》 2012年第3期196-204,共9页
The realization of security wired network is very critical when the network itself must be installed in an environment full of restrictions and constrains such as historical palaces, characterized by unique architectu... The realization of security wired network is very critical when the network itself must be installed in an environment full of restrictions and constrains such as historical palaces, characterized by unique architectural features. The purpose of this paper is to illustrate an advanced installation design technique of security wired network based on genetic algorithm optimisation that is capable of ensuring high performances of the network itself and significant reduction of the costs. The same technique can be extended to safety system such as fire signalling. 展开更多
关键词 SECURITY System GENETIC INSTALLATION Design Optimisation COMMUNICATION NETWORK
下载PDF
Optimization of UMTS Network Planning Using Genetic Algorithms
4
作者 fabio garzia Cristina Perna Roberto Cusani 《Communications and Network》 2010年第3期193-199,共7页
The continuously growing of cellular networks complexity, which followed the introduction of UMTS technology, has reduced the usefulness of traditional design tools, making them quite unworthy. The purpose of this pap... The continuously growing of cellular networks complexity, which followed the introduction of UMTS technology, has reduced the usefulness of traditional design tools, making them quite unworthy. The purpose of this paper is to illustrate a design tool for UMTS optimized net planning based on genetic algorithms. In particular, some utilities for 3G net designers, useful to respect important aspects (such as the environmental one) of the cellular network, are shown. 展开更多
关键词 UMTS NETWORK PLANNING GENETIC ALGORITHMS
下载PDF
Comparison of 4 Multi-User Passive Network Topologies for 3 Different Quantum Key Distribution
5
作者 fabio garzia Roberto Cusani 《Communications and Network》 2010年第3期166-182,共17页
The purpose of this paper is to compare the performance of four passive optical network topologies in implementing multi-user quantum key distribution, using 3 protocols proposed by quantum cryptography (B92, EPR, and... The purpose of this paper is to compare the performance of four passive optical network topologies in implementing multi-user quantum key distribution, using 3 protocols proposed by quantum cryptography (B92, EPR, and SSP). The considered networks are the passive-star network, the optical-ring network based on the Signac interferometer, the wavelength-routed network, and the wavelength-addressed bus network. The quantum bit-error rate and sifted key rate for each of these topologies are analysed to determine their suitability for providing quantum key distribution-service to networks of various sizes. The efficiency of the three considered protocols is also determined. 展开更多
关键词 QUANTUM CRYPTOGRAPHY QUANTUM KEY Distribution
下载PDF
Optimal Territorial Resources Placement for Multipurpose Wireless Services Using Genetic Algorithms
6
作者 Daniele Cacciani fabio garzia +1 位作者 Alessandro Neri Roberto Cusani 《Wireless Engineering and Technology》 2011年第3期184-195,共12页
This paper presents a study for finding a solution to the placement of territorial resources for multipurpose wireless services considering also the restrictions imposed by the orography of the territory itself. To so... This paper presents a study for finding a solution to the placement of territorial resources for multipurpose wireless services considering also the restrictions imposed by the orography of the territory itself. To solve this problem genetic algorithms are used to identify sites where to place the resources for the optimal coverage of a given area. The used algorithm has demonstrated to be able to find optimal solutions in a variety of considered situations. 展开更多
关键词 Genetic Algorithm WIRELESS Optimization Digital TERRAIN ELEVATION Data (Dted) WIRELESS RESOURCES PLACEMENT
下载PDF
Ad Hoc Network Hybrid Management Protocol Based on Genetic Classifiers
7
作者 fabio garzia Cristina Perna Roberto Cusani 《Wireless Engineering and Technology》 2010年第2期69-80,共12页
The purpose of this paper is to solve the problem of Ad Hoc network routing protocol using a Genetic Algorithm based approach. In particular, the greater reliability and efficiency, in term of duration of communicatio... The purpose of this paper is to solve the problem of Ad Hoc network routing protocol using a Genetic Algorithm based approach. In particular, the greater reliability and efficiency, in term of duration of communication paths, due to the introduction of Genetic Classifier is demonstrated. 展开更多
关键词 Ad HOC Networks GENETIC Algorithms GENETIC CLASSIFIER Systems Routing Protocols RULE-BASED Processing
下载PDF
All-Optical EXOR for Cryptographic Application Based on Spatial Solitons
8
作者 Mario Marco Corbelli fabio garzia Roberto Cusani 《Journal of Information Security》 2013年第3期180-192,共13页
The purpose of this paper is to present an all-optical EXOR for cryptographic application based on spatial soliton beams. The device is based on the propagation and interactions properties of spatial soliton in a Kerr... The purpose of this paper is to present an all-optical EXOR for cryptographic application based on spatial soliton beams. The device is based on the propagation and interactions properties of spatial soliton in a Kerr nonlinear material. The interaction force between parallel soliton beam is analyzed from the analytical point of view and an exact solution is presented. 展开更多
关键词 ALL-OPTICAL EXOR CRYPTOGRAPHY SPATIAL SOLITONS ALL-OPTICAL DEVICE
下载PDF
Peak-Shaped-Based Steganographic Technique for MP3 Audio
9
作者 Raffaele Pinardi fabio garzia Roberto Cusani 《Journal of Information Security》 2013年第1期12-18,共7页
The aim of this work is the development of a steganographic technique for the MP3 audio format, which is based on the Peak Shaped Model algorithm used for JPEG images. The proposed method relies on the statistical pro... The aim of this work is the development of a steganographic technique for the MP3 audio format, which is based on the Peak Shaped Model algorithm used for JPEG images. The proposed method relies on the statistical properties of MP3 samples, which are compressed by a Modified Discrete Cosine Transform (MDCT). After the conversion of MP3, it’s possible to hide some secret information by replacing the least significant bit of the MDCT coefficients. Those coefficients are chosen according to the statistical relevance of each coefficient within the distribution. The performance analysis has been made by calculating three steganographic parameters: the Embedding Capacity, the Embedding Efficiency and the PSNR. It has been also simulated an attack with the Chi-Square test and the results have been used to plot the ROC curve, in order to calculate the error probability. Performances have been compared with performances of other existing techniques, showing interesting results. 展开更多
关键词 Peak-Shaped STEGANOGRAPHY MP3 STEGANOGRAPHY
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部