Arxiv:2108.04409V1

Total Page:16

File Type:pdf, Size:1020Kb

Arxiv:2108.04409V1 Preprint manuscript No. (will be inserted by the editor) On Procedural Adversarial Noise Attack And Defense Jun Yan, Xiaoyang Deng, Huilin Yin, Wancheng Ge Received: date / Accepted: date Abstract realize the cross-model and cross-data attack effect. We provide a detailed empirical study to Deep Neural Networks (DNNs) are vulnerable validate the effectiveness of our method. In the to adversarial examples which would inveigle attack experiments, the results of our proposed neural networks to make prediction errors with methods surpass the state-of-the-art methods of small perturbations on the input images. However, procedural adversarial noise attack, black-box most of the proposed attacks depend on specific attack, and universal adversarial perturbation models and data. Researchers have been devoted attack on the ImageNet dataset and the CIFAR-10 to promoting the study on universal adversarial dataset. Moreover, before our work, there is no perturbations (UAPs) which have little prior discussion about the defense on the procedural knowledge on data distributions. Procedural adversarial noise attacks. Therefore, we evaluate adversarial noise attack is a data-independent the denoising-based defense methods and other universal perturbation generation method. Adding state-of-the-art defense methods on ImageNet the texture pattern with the shading based on the and CIFAR-10. The result of the defense ex- rendering technology to the original image achieves periment verifies some theoretical analysis of the deceit on the neural networks without changing robustness in deep learning. Code is available at the visual semantic representations. Similar to https://github.com/momo1986/adversarial_example_simplex_worley. the disturbance of shading on human eyes, the Keywords Adversarial examples universal shading generated by procedural noise can also · fool the neural networks. Previous research on adversarial perturbations black-box attack procedural adversarial noise· robustness · procedural adversarial noise provides a baseline, · however, the performance of attack can be pro- moted with a more aesthetic rendering effect. In this paper, we propose two universal adversarial perturbation (UAP) generation methods based 1 Introduction on procedural noise functions: Simplex noise and Worley noise. The UAPs with such solid textures The last decade is an era of deep learning’s renais- sance. In the field of computer vision, Convolutional Jun Yan Neural Networks (CNNs) (He et al., 2016, Hu et al., Department of Information and Communication Engineer- arXiv:2108.04409v2 [cs.LG] 27 Aug 2021 ing at Tongji University, Shanghai, China 2018, Ioffe and Szegedy, 2015, Krizhevsky et al., E-mail: [email protected] 2012, Lin et al., 2014, Simonyan and Zisserman, 2015, Xiaoyang Deng Szegedy et al., 2015, 2016, 2017) have been widely Department of Control Science and Engineering at Tongji used in real applications related to visual percep- University, Shanghai, China tion and cognition. Using automated machine learn- E-mail: [email protected] ing (AutoML) to replace craft neural network design BHuilin Yin (Corresponding author) is also a popular trend. Zoph and Le (Zoph and Le, Department of Control Science and Engineering at Tongji 2017) proposed a neural architecture search method University, Shanghai, China E-mail: [email protected] based on reinforcement learning which outperforms most of the CNN models on the metrics of the pre- Wancheng Ge Department of Information and Communication Engineer- diction accuracy. ing at Tongji University, Shanghai, China However, deep learning cannot guarantee security. E-mail: [email protected] Despite the high accuracy of the clean testing dataset, 2 Jun Yan, Xiaoyang Deng, Huilin Yin, Wancheng Ge most CNN models are vulnerable to adversarial ex- noise are also commonly used noise function models. amples. White-box attacks (Athalye et al., 2018a,b, In previous work (Co et al., 2019a,b), two adversarial Carlini and Wagner, 2017, Goodfellow et al., 2015, attacks based on procedural noise functions are pro- Kurakin et al., 2017, Madry et al., 2018, Moosavi- posed with the state-of-the-art effect. Nevertheless, Dezfooli et al., 2016, Papernot et al., 2016) are many proposed noise attack methods do not have a gradient-based to update adversarial perturbations superior performance which needs further improve- with the exploration of the model structures dur- ment. Currently, Perlin noise attack (Co et al., 2019a) ing the optimization process. Other black-box at- is a state-of-the-art procedural adversarial noise at- tacks (Brendel et al., 2018, Guo et al., 2019, Ilyas tack. However, Perlin noise has several shortcomings: et al., 2018, Li et al., 2019, Moon et al., 2019, Uesato visually significant anisotropy, gradient artifacts, and et al., 2018) are built on lots of queries of input in- higher computation cost. The drawbacks of the ren- formation and output information of models, which dering technology existed in Perlin noise may hinder is time-consuming. To make the attack convenient the adversarial attack performance in computer vi- in the deployment, researchers are devoted to find- sion. Therefore, it gives us an inspiration to promote ing image-agnostic adversarial perturbations. Univer- the research on the procedural adversarial noise at- sal adversarial perturbations (UAP) introduced in the tack. Moreover, before our work, there is almost no previous work (Moosavi-Dezfooli et al., 2017) can fool discussion on the defense technologies under the pro- state-of-the-art image classification models with high cedural adversarial noise attacks. possibilities and small perturbations. The proposed In this paper, we propose two universal adversar- UAP methods are quasi-imperceptible and do not re- ial perturbation attack methods based on noise func- quire solving an optimization problem. The univer- tions: Simplex noise attack and Worley noise attack. sal perturbations can transfer between different im- We empirically demonstrate that the neural networks ages and different models. Afterward, a lot of pa- are fragile to the procedural noises that act as the uni- pers (Hayes and Danezis, 2018, Mopuri et al., 2017, versal adversarial perturbations (UAPs). In the at- 2018, 2019) are published. tack experiment, our methods show superior perfor- Generating universal adversarial examples based mance compared with the state-of-the-art noise at- on the procedural noise functions can be a research tack methods, black-box attack methods, and UAP direction. These procedural noise functions are com- methods. In the defense experiment, we evaluate the monly used in computer graphics and designed to denoising methods and the defense methods provided be parametrizable, customizable, and aesthetic (La- by the RealSafe (Dong et al., 2020) benchmark. gae et al., 2010). Adding textures and patterns in Our contributions in this paper are listed as fol- the pictures does not modify the visual semantic lows: representations. The perturbation patterns generated by procedural noise functions have similar struc- – We propose two procedural adversarial noise per- tures with the existing universal adversarial per- turbation attack methods: Simplex noise pertur- turbations (Khrulkov and Oseledets, 2018, Moosavi- bations and Worley noise perturbations. Such ℓ - ∞ Dezfooli et al., 2017). Generally speaking, the human norm attacks surpass state-of-the-art invasion ef- perception system would be disturbed by the shad- fect on the ImageNet dataset (Russakovsky et al., ings. The sensibility is similar on the neural networks 2015) and CIFAR-10 dataset (Krizhevsky and that the deep visual classifiers would be fooled by Hinton, 2009). the procedural adversarial noises with the shadings. – An empirical and comparative study with other Therefore, adversarial learning on such procedural transfer-based black-box attack methods, query- noises can improve the visual classifier’s robustness based black-box attack methods, and other uni- under the untergeted attack. The perception systems versal adversarial perturbation (UAP) methods of autonomous vehicles need a performance guarantee is made to certify the cross-model attack perfor- when faced with the abnormal scenarios of sensors. mance of our procedural adversarial noises. The visual content audit system of Internet enter- – To our best knowledge, we are one of the earliest prises should inference correctly in the case of mali- groups to discuss the defense on the procedural cious image tampering. Therefore, robustness under adversarial noise attacks and analyze the associ- the procedural adversarial noise is an explorable re- ated robustness with the evaluation benchmark. search direction. A viewpoint was put forward (Car- lini et al., 2019) that defending random perturba- This paper is organized as follows. The related tions based on Gaussian noise is a basic requirement. works are introduced in Section II. In Section III, our Rayleigh noise, Gamma noise, and Salt-And-Pepper proposed approach is illustrated. Metrics and experi- On Procedural Adversarial Noise Attack And Defense 3 ment results comparison are presented in Section VI. and Oseledets, 2018). Gabor noise is the convolution Finally, the conclusion is presented in Section V. of a sparse white noise and a Gabor kernel, making it a type of Sparse Convolution Noise (Lagae et al., 2009, 2010). Perlin adversarial noise attack (Co et al., 2 Related Work 2019a) is proposed to generate universal adversarial perturbations based on the lattice gradient noise in-
Recommended publications
  • Seamscape a Procedural Generation System for Accelerated Creation of 3D Landscapes
    SeamScape A procedural generation system for accelerated creation of 3D landscapes Bachelor Thesis in Computer Science and Engineering Link to video demonstration: youtu.be/K5yaTmksIOM Sebastian Ekman Anders Hansson Thomas Högberg Anna Nylander Alma Ottedag Joakim Thorén Chalmers University of Technology University of Gothenburg Department of Computer Science and Engineering Gothenburg, Sweden, June 2016 The Authors grants to Chalmers University of Technology and University of Gothenburg the non-exclusive right to publish the Work electronically and in a non-commercial purpose make it accessible on the Internet. The Author warrants that he/she is the author to the Work, and warrants that the Work does not contain text, pictures or other material that violates copyright law. The Author shall, when transferring the rights of the Work to a third party (for example a publisher or a company), acknowledge the third party about this agreement. If the Author has signed a copyright agreement with a third party regarding the Work, the Author warrants hereby that he/she has obtained any necessary permission from this third party to let Chalmers University of Technology and University of Gothenburg store the Work electronically and make it accessible on the Internet. SeamScape A procedural generation system for accelerated creation of 3D landscapes Sebastian Ekman Anders Hansson Thomas Högberg Anna Nylander Alma Ottedag Joakim Thorén c Sebastian Ekman, 2016. c Anders Hansson, 2016. c Thomas Högberg, 2016. c Anna Nylander, 2016. c Alma Ottedag, 2016.
    [Show full text]
  • Coping with the Bounds: a Neo-Clausewitzean Primer / Thomas J
    About the CCRP The Command and Control Research Program (CCRP) has the mission of improving DoD’s understanding of the national security implications of the Information Age. Focusing upon improving both the state of the art and the state of the practice of command and control, the CCRP helps DoD take full advantage of the opportunities afforded by emerging technologies. The CCRP pursues a broad program of research and analysis in information superiority, information operations, command and control theory, and associated operational concepts that enable us to leverage shared awareness to improve the effectiveness and efficiency of assigned missions. An important aspect of the CCRP program is its ability to serve as a bridge between the operational, technical, analytical, and educational communities. The CCRP provides leadership for the command and control research community by: • articulating critical research issues; • working to strengthen command and control research infrastructure; • sponsoring a series of workshops and symposia; • serving as a clearing house for command and control related research funding; and • disseminating outreach initiatives that include the CCRP Publication Series. This is a continuation in the series of publications produced by the Center for Advanced Concepts and Technology (ACT), which was created as a “skunk works” with funding provided by the CCRP under the auspices of the Assistant Secretary of Defense (NII). This program has demonstrated the importance of having a research program focused on the national security implications of the Information Age. It develops the theoretical foundations to provide DoD with information superiority and highlights the importance of active outreach and dissemination initiatives designed to acquaint senior military personnel and civilians with these emerging issues.
    [Show full text]
  • Procedural Generation of a 3D Terrain Model Based on a Predefined
    Procedural Generation of a 3D Terrain Model Based on a Predefined Road Mesh Bachelor of Science Thesis in Applied Information Technology Matilda Andersson Kim Berger Fredrik Burhöi Bengtsson Bjarne Gelotte Jonas Graul Sagdahl Sebastian Kvarnström Department of Applied Information Technology Chalmers University of Technology University of Gothenburg Gothenburg, Sweden 2017 Bachelor of Science Thesis Procedural Generation of a 3D Terrain Model Based on a Predefined Road Mesh Matilda Andersson Kim Berger Fredrik Burhöi Bengtsson Bjarne Gelotte Jonas Graul Sagdahl Sebastian Kvarnström Department of Applied Information Technology Chalmers University of Technology University of Gothenburg Gothenburg, Sweden 2017 The Authors grants to Chalmers University of Technology and University of Gothenburg the non-exclusive right to publish the Work electronically and in a non-commercial purpose make it accessible on the Internet. The Author warrants that he/she is the author to the Work, and warrants that the Work does not contain text, pictures or other material that violates copyright law. The Author shall, when transferring the rights of the Work to a third party (for example a publisher or a company), acknowledge the third party about this agreement. If the Author has signed a copyright agreement with a third party regarding the Work, the Author warrants hereby that he/she has obtained any necessary permission from this third party to let Chalmers University of Technology and University of Gothenburg store the Work electronically and make it accessible on the Internet. Procedural Generation of a 3D Terrain Model Based on a Predefined Road Mesh Matilda Andersson Kim Berger Fredrik Burhöi Bengtsson Bjarne Gelotte Jonas Graul Sagdahl Sebastian Kvarnström © Matilda Andersson, 2017.
    [Show full text]
  • Annual Report 2018
    2018 Annual Report 4 A Message from the Chair 5 A Message from the Director & President 6 Remembering Keith L. Sachs 10 Collecting 16 Exhibiting & Conserving 22 Learning & Interpreting 26 Connecting & Collaborating 30 Building 34 Supporting 38 Volunteering & Staffing 42 Report of the Chief Financial Officer Front cover: The Philadelphia Assembled exhibition joined art and civic engagement. Initiated by artist Jeanne van Heeswijk and shaped by hundreds of collaborators, it told a story of radical community building and active resistance; this spread, clockwise from top left: 6 Keith L. Sachs (photograph by Elizabeth Leitzell); Blocks, Strips, Strings, and Half Squares, 2005, by Mary Lee Bendolph (Purchased with the Phoebe W. Haas fund for Costume and Textiles, and gift of the Souls Grown Deep Foundation from the William S. Arnett Collection, 2017-229-23); Delphi Art Club students at Traction Company; Rubens Peale’s From Nature in the Garden (1856) was among the works displayed at the 2018 Philadelphia Antiques and Art Show; the North Vaulted Walkway will open in spring 2019 (architectural rendering by Gehry Partners, LLP and KXL); back cover: Schleissheim (detail), 1881, by J. Frank Currier (Purchased with funds contributed by Dr. Salvatore 10 22 M. Valenti, 2017-151-1) 30 34 A Message from the Chair A Message from the As I observe the progress of our Core Project, I am keenly aware of the enormity of the undertaking and its importance to the Museum’s future. Director & President It will be transformative. It will not only expand our exhibition space, but also enhance our opportunities for community outreach.
    [Show full text]
  • Nuke Survival Toolkit Documentation
    Nuke Survival Toolkit Documentation Release v1.0.0 Tony Lyons | 2020 1 About The Nuke Survival Toolkit is a portable tool menu for the Foundry’s Nuke with a hand-picked selection of nuke gizmos collected from all over the web, organized into 1 easy-to-install toolbar. Installation Here’s how to install and use the Nuke Survival Toolkit: 1.) Download the .zip folder from the Nuke Survival Toolkit github website. https://github.com/CreativeLyons/NukeSurvivalToolkit_publicRelease This github will have all of the up to date changes, bug fixes, tweaks, additions, etc. So feel free to watch or star the github, and check back regularly if you’d like to stay up to date. 2.) Copy or move the NukeSurvivalToolkit Folder either in your User/.nuke/ folder for personal use, or for use in a pipeline or to share with multiple artists, place the folder in any shared and accessible network folder. 3.) Open your init.py file in your /.nuke/ folder into any text editor (or create a new init.py in your User/.nuke/ directory if one doesn’t already exist) 4.) Copy the following code into your init.py file: nuke.pluginAddPath( "Your/NukeSurvivalToolkit/FolderPath/Here") 5.) Copy the file path location of where you placed your NukeSurvivalToolkit. Replace the Your/NukeSurvivalToolkit/FolderPath/Here text with your NukeSurvivalToolkit filepath location, making sure to keep quotation marks around the filepath. 6.) Save your init.py file, and restart your Nuke session 7.) That’s it! Congrats, you will now see a little red multi-tool in your nuke toolbar.
    [Show full text]
  • Fast, High Quality Noise
    The Importance of Being Noisy: Fast, High Quality Noise Natalya Tatarchuk 3D Application Research Group AMD Graphics Products Group Outline Introduction: procedural techniques and noise Properties of ideal noise primitive Lattice Noise Types Noise Summation Techniques Reducing artifacts General strategies Antialiasing Snow accumulation and terrain generation Conclusion Outline Introduction: procedural techniques and noise Properties of ideal noise primitive Noise in real-time using Direct3D API Lattice Noise Types Noise Summation Techniques Reducing artifacts General strategies Antialiasing Snow accumulation and terrain generation Conclusion The Importance of Being Noisy Almost all procedural generation uses some form of noise If image is food, then noise is salt – adds distinct “flavor” Break the monotony of patterns!! Natural scenes and textures Terrain / Clouds / fire / marble / wood / fluids Noise is often used for not-so-obvious textures to vary the resulting image Even for such structured textures as bricks, we often add noise to make the patterns less distinguishable Ех: ToyShop brick walls and cobblestones Why Do We Care About Procedural Generation? Recent and upcoming games display giant, rich, complex worlds Varied art assets (images and geometry) are difficult and time-consuming to generate Procedural generation allows creation of many such assets with subtle tweaks of parameters Memory-limited systems can benefit greatly from procedural texturing Smaller distribution size Lots of variation
    [Show full text]
  • IWCE 2015 PTIG-P25 Foundations Part 2
    Sponsored by: Project 25 College of Technology Security Services Update & Vocoder & Range Improvements Bill Janky Director, System Design IWCE 2015, Las Vegas, Nevada March 16, 2015 Presented by: PTIG - The Project 25 Technology Interest Group www.project25.org – Booth 1853 © 2015 PTIG Agenda • Overview of P25 Security Services - Confidentiality - Integrity - Key Management • Current status of P25 security standards - Updates to existing services - New services 2 © 2015 PTIG PTIG - Project 25 Technology Interest Group IWCE 2015 I tell Fearless Leader we broke code. Moose and Squirrel are finished! 3 © 2015 PTIG PTIG - Project 25 Technology Interest Group IWCE 2015 Why do we need security? • Protecting information from security threats has become a vital function within LMR systems • What’s a threat? Threats are actions that a hypothetical adversary might take to affect some aspect of your system. Examples: – Message interception – Message replay – Spoofing – Misdirection – Jamming / Denial of Service – Traffic analysis – Subscriber duplication – Theft of service 4 © 2015 PTIG PTIG - Project 25 Technology Interest Group IWCE 2015 What P25 has for you… • The TIA-102 standard provides several standardized security services that have been adopted for implementation in P25 systems. • These security services may be used to provide security of information transferred across FDMA or TDMA P25 radio systems. Note: Most of the security services are optional and users must consider that when making procurements 5 © 2015 PTIG PTIG - Project 25 Technology
    [Show full text]
  • Hardware-Accelerated Gradient Noise for Graphics
    Hardware-Accelerated Gradient Noise for Graphics Josef B. Spjut Andrew E. Kensler Erik L. Brunvand School of Computing SCI Institute School of Computing University of Utah University of Utah University of Utah [email protected] [email protected] [email protected] ABSTRACT techniques trade computation for memory. This is impor- A synthetic noise function is a key component of most com- tant since as process technology scales, compute resources puter graphics rendering systems. This pseudo-random noise will increasingly outstrip memory speeds. For texturing sur- function is used to create a wide variety of natural looking faces, the memory reduction can be two-fold: first there textures that are applied to objects in the scene. To be is the simple reduction in texture memory itself. Second, useful, the generated noise should be repeatable while ex- 3D or \solid" procedural textures can eliminate the need for hibiting no discernible periodicity, anisotropy, or aliasing. explicit texture coordinates to be stored with the models. However, noise with these qualities is computationally ex- However, in order to avoid uniformity and produce visual pensive and results in a significant fraction of the run time richness, a simple, repeatable, pseudo-random function is for scenes with rich visual complexity. We propose modifi- required. Noise functions meet this need. Simply described, a noise function in computer graphics is cations to the standard algorithm for computing synthetic N noise that improve the visual quality of the noise, and a par- an R ! R mapping used to introduce irregularity into an allel hardware implementation of this improved noise func- otherwise regular pattern.
    [Show full text]
  • Prime Gradient Noise
    Computational Visual Media https://doi.org/10.1007/s41095-021-0206-z Research Article Prime gradient noise Sheldon Taylor1,∗, Owen Sharpe1,∗, and Jiju Peethambaran1 ( ) c The Author(s) 2021. Abstract Procedural noise functions are fundamental 1 Introduction tools in computer graphics used for synthesizing virtual geometry and texture patterns. Ideally, a Visually pleasing 3D content is one of the core procedural noise function should be compact, aperiodic, ingredients of successful movies, video games, and parameterized, and randomly accessible. Traditional virtual reality applications. Unfortunately, creation lattice noise functions such as Perlin noise, however, of high quality virtual 3D content and textures exhibit periodicity due to the axial correlation induced is a labour-intensive task, often requiring several while hashing the lattice vertices to the gradients. months to years of skilled manual labour. A In this paper, we introduce a parameterized lattice relatively cheap yet powerful alternative to manual noise called prime gradient noise (PGN) that minimizes modeling is procedural content generation using a discernible periodicity in the noise while enhancing the set of rules, such as L-systems [1] or procedural algorithmic efficiency. PGN utilizes prime gradients, a noise [2]. Procedural noise has proven highly set of random unit vectors constructed from subsets of successful in creating computer generated imagery prime numbers plotted in polar coordinate system. To (CGI) consisting of 3D models exhibiting fine detail map axial indices of lattice vertices to prime gradients, at multiple scales. Furthermore, procedural noise PGN employs Szudzik pairing, a bijection F : N2 → N. is a compact, flexible, and low cost computational Compositions of Szudzik pairing functions are used in technique to synthesize a range of patterns that may higher dimensions.
    [Show full text]
  • Fast High-Quality Noise
    Downloaded from orbit.dtu.dk on: Oct 05, 2021 Fast High-Quality Noise Frisvad, Jeppe Revall; Wyvill, Geoff Published in: Proceedings of GRAPHITE 2007 Link to article, DOI: 10.1145/1321261.1321305 Publication date: 2007 Link back to DTU Orbit Citation (APA): Frisvad, J. R., & Wyvill, G. (2007). Fast High-Quality Noise. In Proceedings of GRAPHITE 2007: 5th International Conference on Computer Graphics and Interactive Techniques in Australasia and Southeast Asia ACM. https://doi.org/10.1145/1321261.1321305 General rights Copyright and moral rights for the publications made accessible in the public portal are retained by the authors and/or other copyright owners and it is a condition of accessing publications that users recognise and abide by the legal requirements associated with these rights. Users may download and print one copy of any publication from the public portal for the purpose of private study or research. You may not further distribute the material or use it for any profit-making activity or commercial gain You may freely distribute the URL identifying the publication in the public portal If you believe that this document breaches copyright please contact us providing details, and we will remove access to the work immediately and investigate your claim. Fast High-Quality Noise Jeppe Revall Frisvad Geoff Wyvill Technical University of Denmark University of Otago Abstract At the moment the noise functions available in a graphics program- mer’s toolbox are either slow to compute or they involve grid-line artifacts making them of lower quality. In this paper we present a real-time noise computation with no grid-line artifacts or other regularity problems.
    [Show full text]
  • A Generalized Framework for Agglomerative Clustering of Signed Graphs Applied to Instance Segmentation
    A Generalized Framework for Agglomerative Clustering of Signed Graphs applied to Instance Segmentation Alberto Bailoni1, Constantin Pape1,2, Steffen Wolf1, Thorsten Beier2, Anna Kreshuk2, Fred A. Hamprecht1 1HCI/IWR, Heidelberg University, Germany 2EMBL, Heidelberg, Germany {alberto.bailoni, steffen.wolf, fred.hamprecht}@iwr.uni-heidelberg.de {constantin.pape, thorsten.beier, anna.kreshuk}@embl.de Abstract We propose a novel theoretical framework that generalizes algorithms for hierarchi- cal agglomerative clustering to weighted graphs with both attractive and repulsive interactions between the nodes. This framework defines GASP, a Generalized Algorithm for Signed graph Partitioning, and allows us to explore many combi- nations of different linkage criteria and cannot-link constraints. We prove the equivalence of existing clustering methods to some of those combinations, and introduce new algorithms for combinations which have not been studied. An exten- sive comparison is performed to evaluate properties of the clustering algorithms in the context of instance segmentation in images, including robustness to noise and efficiency. We show how one of the new algorithms proposed in our frame- work outperforms all previously known agglomerative methods for signed graphs, both on the competitive CREMI 2016 EM segmentation benchmark and on the CityScapes dataset. 1 Introduction In computer vision, the partitioning of weighted graphs has been successfully applied to such tasks as image segmentation, object tracking and pose estimation. Most graph clustering methods work with positive edge weights only, which can be interpreted as similarities or distances between the nodes. arXiv:1906.11713v1 [cs.CV] 27 Jun 2019 These methods are parameter-based and require users to specify the desired numbers of clusters or a termination criterion (e.g.
    [Show full text]
  • Frequency and Distance Separations
    Rec. ITU-R SM.337-6 1 RECOMMENDATION ITU-R SM.337-6* Frequency and distance separations (1948-1951-1953-1963-1970-1974-1990-1992-1997-2007-2008) Scope This Recommendation provides the procedures for calculating distance and frequency separations for an acceptable interference level. Keywords Interference level, receiver selectivity, channel, frequency separation, protection ratio The ITU Radiocommunication Assembly, considering a) that, in the more usual cases, the primary factors which determine appropriate frequency or distance separation criteria include: – the signal power and spectral distribution required by the receiver; – the power and spectral distribution of the interfering signals and noise intercepted by the receiver; – the distance dependence of the transmission losses of the radio equipments; b) that transmitters, in general, emit radiations outside the frequency bandwidth necessarily occupied by the emission; c) that many factors are involved, among which are the properties of the transmission medium (which are variable in character and difficult to determine), the characteristics of the receiver and, for aural reception, the discriminating properties of the human ear; d) that trade-offs in either frequency or distance separations of the radio equipment are possible, recommends 1 that the frequency-distance (FD) separations of radio equipment should be calculated by the following method: 1.1 determine the power and spectral distribution of the signal intercepted by the receiver; 1.2 determine the power and spectral distribution
    [Show full text]