Pub Date : 2009-11-01DOI: 10.1109/ICSCS.2009.5412608
F. Meskine, Miloud Chikr El Mezouar, N. Taleb
Digital image registration is a process by which the most accurate match is determined between two images which may have been taken at the same or different viewpoints. The registration process determines the optimal transformation which will align the two images. This has applications in many fields as diverse as medical images analysis, pattern matching and computer vision for robotics, as well as remotely sensed data processing. A wide range of registration techniques has been developed for many different types of applications and data. Exhaustive search is computationally expensive and the computational cost increases exponentially with the number of transformation parameters and the size of the data set. Therefore, in this work, we describe an efficient algorithm of image registration that uses genetic algorithms within a multi-resolution framework based on the wavelet and the nonsubsampled contourlet transform (NSCT). We combine local search methods with global ones balancing exploration and exploitation, to speed up the search of the best transformation parameters. Experimental results show that the NSCT is a promising method for registration of satellite images compared to the wavelet transform.
{"title":"Nonsubsampled contourlet transform combined with genetic algorithms for registration of satellite imaging","authors":"F. Meskine, Miloud Chikr El Mezouar, N. Taleb","doi":"10.1109/ICSCS.2009.5412608","DOIUrl":"https://doi.org/10.1109/ICSCS.2009.5412608","url":null,"abstract":"Digital image registration is a process by which the most accurate match is determined between two images which may have been taken at the same or different viewpoints. The registration process determines the optimal transformation which will align the two images. This has applications in many fields as diverse as medical images analysis, pattern matching and computer vision for robotics, as well as remotely sensed data processing. A wide range of registration techniques has been developed for many different types of applications and data. Exhaustive search is computationally expensive and the computational cost increases exponentially with the number of transformation parameters and the size of the data set. Therefore, in this work, we describe an efficient algorithm of image registration that uses genetic algorithms within a multi-resolution framework based on the wavelet and the nonsubsampled contourlet transform (NSCT). We combine local search methods with global ones balancing exploration and exploitation, to speed up the search of the best transformation parameters. Experimental results show that the NSCT is a promising method for registration of satellite images compared to the wavelet transform.","PeriodicalId":126072,"journal":{"name":"2009 3rd International Conference on Signals, Circuits and Systems (SCS)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131279133","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-11-01DOI: 10.1109/ICSCS.2009.5412588
M. Niknazar, B. Vosoughi Vahdat, S. R. Mousavi
This paper presents a method for ECG characteristic points detection based on Wavelet Transform (WT). Wavelet Transform leads to more accurate results in analyzing nonstationary signals such as ECG. The selected wavelet is quadratic spline wavelet. Using quadratic spline mother wavelet, a method for detection of QRS complex and T and P waves is presented and evaluated with the help of MIT-BIH Arrhythmia database. Experimental results show excellent performance of the proposed method.
{"title":"Detection of characteristic points of ECG using quadratic spline wavelet transfrom","authors":"M. Niknazar, B. Vosoughi Vahdat, S. R. Mousavi","doi":"10.1109/ICSCS.2009.5412588","DOIUrl":"https://doi.org/10.1109/ICSCS.2009.5412588","url":null,"abstract":"This paper presents a method for ECG characteristic points detection based on Wavelet Transform (WT). Wavelet Transform leads to more accurate results in analyzing nonstationary signals such as ECG. The selected wavelet is quadratic spline wavelet. Using quadratic spline mother wavelet, a method for detection of QRS complex and T and P waves is presented and evaluated with the help of MIT-BIH Arrhythmia database. Experimental results show excellent performance of the proposed method.","PeriodicalId":126072,"journal":{"name":"2009 3rd International Conference on Signals, Circuits and Systems (SCS)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133184669","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-11-01DOI: 10.1109/ICSCS.2009.5412480
H. Nemmour, Y. Chibani
Tangent vectors are one of the best tools for learning variability in handwritten digits. Many research works indicate that tangent vectors provide a significant improvement of accuracy especially when used with SVM classifiers. However, since they are based on the use of affine transformations they substantially extend the runtime. In addition, the user should adequately select the transformations in order to highlight the variability of data. The present work aims to exploit accuracy improvement of tangent vectors while reducing the runtime. Therefore, we investigate the use of tangent vectors that are a priori extracted from training data. The idea is to substitute each pattern by its Tangent Vector Mahalanobis (TVM) distances with respect to all classes. Then, a SVM is trained over TVM values, which contain a priori knowledge and have a smaller size than digit images. Experiments performed on USPS database showed that the proposed approach improves recognition accuracy and allows a huge reduction in the runtime.
{"title":"Integrating class-dependant tangent vectors into SVMs for handwritten digit recognition","authors":"H. Nemmour, Y. Chibani","doi":"10.1109/ICSCS.2009.5412480","DOIUrl":"https://doi.org/10.1109/ICSCS.2009.5412480","url":null,"abstract":"Tangent vectors are one of the best tools for learning variability in handwritten digits. Many research works indicate that tangent vectors provide a significant improvement of accuracy especially when used with SVM classifiers. However, since they are based on the use of affine transformations they substantially extend the runtime. In addition, the user should adequately select the transformations in order to highlight the variability of data. The present work aims to exploit accuracy improvement of tangent vectors while reducing the runtime. Therefore, we investigate the use of tangent vectors that are a priori extracted from training data. The idea is to substitute each pattern by its Tangent Vector Mahalanobis (TVM) distances with respect to all classes. Then, a SVM is trained over TVM values, which contain a priori knowledge and have a smaller size than digit images. Experiments performed on USPS database showed that the proposed approach improves recognition accuracy and allows a huge reduction in the runtime.","PeriodicalId":126072,"journal":{"name":"2009 3rd International Conference on Signals, Circuits and Systems (SCS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131116577","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-11-01DOI: 10.1109/ICSCS.2009.5412226
N. Jouida, C. Rebai, A. Ghazel, D. Dallet
This paper presents an approach of behavioral modeling, simulation, and design of Continuous-time (CT) quadrature bandpass (QBP) ΔΣ modulator using VHDL-AMS language. A set of specific behavioral models taking into account non-idealities effects such excess loop delay and jitter are developed. Numerous behavioral simulation of a fifth-order CT QBP ΔΣM illustrates and quantifies the impact of these non-idealities effects.
{"title":"VHDL-AMS modeling of non-idealites effects in Continuous-time quadrature bandpass ΔΣ modulator","authors":"N. Jouida, C. Rebai, A. Ghazel, D. Dallet","doi":"10.1109/ICSCS.2009.5412226","DOIUrl":"https://doi.org/10.1109/ICSCS.2009.5412226","url":null,"abstract":"This paper presents an approach of behavioral modeling, simulation, and design of Continuous-time (CT) quadrature bandpass (QBP) ΔΣ modulator using VHDL-AMS language. A set of specific behavioral models taking into account non-idealities effects such excess loop delay and jitter are developed. Numerous behavioral simulation of a fifth-order CT QBP ΔΣM illustrates and quantifies the impact of these non-idealities effects.","PeriodicalId":126072,"journal":{"name":"2009 3rd International Conference on Signals, Circuits and Systems (SCS)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114204120","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-11-01DOI: 10.1109/ICSCS.2009.5412227
Harish Balasubramaniam, W. Galjan, W. Krautschneider, H. Neubauer
A successive approximation ADC based on the C2C DAC architecture is introduced. The ADC designed in a 0.18µm CMOS 2 Poly 4 Metal process uses a hybrid capacitive DAC combining the best of the binary weighted capacitive array and the C2C array. C2C ladder based architectures are very attractive for implementation because of its small area, high speed and low power consumption. However a major drawback associated with this DAC is the presence of high parasitic bottom plate capacitances. A concept called the floating voltage shield (FVS) is introduced to reduce the effect of these parasitic capacitances and maximize the effective use of the C2C DAC features. The converter consists of the hybrid DAC, a two stage preamplifier followed by a dynamic latch, switch array and digital circuitry for switching and control. The ADC consumes a maximum power of 630µW at a peak conversion rate of approximately 2MS/s from a 1.8V supply voltage and 40MHz clock. Use of extremely simple and yet robust analog architectures for the comparator make the ADC operation less prone to process variation errors.
{"title":"12-bit hybrid C2C DAC based SAR ADC with floating voltage shield","authors":"Harish Balasubramaniam, W. Galjan, W. Krautschneider, H. Neubauer","doi":"10.1109/ICSCS.2009.5412227","DOIUrl":"https://doi.org/10.1109/ICSCS.2009.5412227","url":null,"abstract":"A successive approximation ADC based on the C2C DAC architecture is introduced. The ADC designed in a 0.18µm CMOS 2 Poly 4 Metal process uses a hybrid capacitive DAC combining the best of the binary weighted capacitive array and the C2C array. C2C ladder based architectures are very attractive for implementation because of its small area, high speed and low power consumption. However a major drawback associated with this DAC is the presence of high parasitic bottom plate capacitances. A concept called the floating voltage shield (FVS) is introduced to reduce the effect of these parasitic capacitances and maximize the effective use of the C2C DAC features. The converter consists of the hybrid DAC, a two stage preamplifier followed by a dynamic latch, switch array and digital circuitry for switching and control. The ADC consumes a maximum power of 630µW at a peak conversion rate of approximately 2MS/s from a 1.8V supply voltage and 40MHz clock. Use of extremely simple and yet robust analog architectures for the comparator make the ADC operation less prone to process variation errors.","PeriodicalId":126072,"journal":{"name":"2009 3rd International Conference on Signals, Circuits and Systems (SCS)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114382889","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-11-01DOI: 10.1109/ICSCS.2009.5412603
M. Laaraiedh, S. Avrillon, B. Uguen
In this paper, we propose an estimation scheme to overcome singularities which may deteriorate Time Difference of Arrival (TDoA) based localization accuracy when using Least Square (LS) estimator. The solution is based on Total Least Square (TLS) estimator. We provide an algorithm of localization which exploits the rank and the condition number of matrices in order to enhance accuracy. The Monte Carlo simulations show that the proposed algorithm outperforms the typical LS algorithm. It is also more robust to the erroneous TDoAs.
{"title":"Overcoming singularities in TDoA Based location estimation using Total Least Square","authors":"M. Laaraiedh, S. Avrillon, B. Uguen","doi":"10.1109/ICSCS.2009.5412603","DOIUrl":"https://doi.org/10.1109/ICSCS.2009.5412603","url":null,"abstract":"In this paper, we propose an estimation scheme to overcome singularities which may deteriorate Time Difference of Arrival (TDoA) based localization accuracy when using Least Square (LS) estimator. The solution is based on Total Least Square (TLS) estimator. We provide an algorithm of localization which exploits the rank and the condition number of matrices in order to enhance accuracy. The Monte Carlo simulations show that the proposed algorithm outperforms the typical LS algorithm. It is also more robust to the erroneous TDoAs.","PeriodicalId":126072,"journal":{"name":"2009 3rd International Conference on Signals, Circuits and Systems (SCS)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128252502","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-11-01DOI: 10.1109/ICSCS.2009.5412697
Wassim Jouini, D. Ernst, C. Moy, J. Palicot
We suggest in this paper that many problems related to Cognitive Radio's (CR) decision making inside CR equipments can be formalized as Multi-Armed Bandit problems and that solving such problems by using Upper Confidence Bound (UCB) algorithms can lead to high-performance CR devices. An application of these algorithms to an academic Cognitive Radio problem is reported.
{"title":"Multi-armed bandit based policies for cognitive radio's decision making issues","authors":"Wassim Jouini, D. Ernst, C. Moy, J. Palicot","doi":"10.1109/ICSCS.2009.5412697","DOIUrl":"https://doi.org/10.1109/ICSCS.2009.5412697","url":null,"abstract":"We suggest in this paper that many problems related to Cognitive Radio's (CR) decision making inside CR equipments can be formalized as Multi-Armed Bandit problems and that solving such problems by using Upper Confidence Bound (UCB) algorithms can lead to high-performance CR devices. An application of these algorithms to an academic Cognitive Radio problem is reported.","PeriodicalId":126072,"journal":{"name":"2009 3rd International Conference on Signals, Circuits and Systems (SCS)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132880959","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-11-01DOI: 10.1109/ICSCS.2009.5412581
Anissa Imen Amrous, M. Debyeche, A. Amrouche
In this paper, the integration of auxiliary features in Hidden Markov Model (HMM) based Automatic Speech Recognition (ASR) system is presented. In particular, we concentrate on the potential benefits of the combination of auxiliary features with standard acoustic parameters in adverse acoustic environments. The experiments were fulfilled using the HTK Toolkit and ARADIGIT corpus which is a data base of Arabic spoken words. The obtained results show that while the integration of the auxiliary features with the standard parameters by SI (Separate Integration) strategy leads to small improvements in the two test environments (clean and noisy), their integration by DI (Direct Integration) strategy leads to a significant improvement of the recognition system performance in noisy environment.
{"title":"Integration of auxiliary features in Hidden Markov Models for Arabic speech recognition","authors":"Anissa Imen Amrous, M. Debyeche, A. Amrouche","doi":"10.1109/ICSCS.2009.5412581","DOIUrl":"https://doi.org/10.1109/ICSCS.2009.5412581","url":null,"abstract":"In this paper, the integration of auxiliary features in Hidden Markov Model (HMM) based Automatic Speech Recognition (ASR) system is presented. In particular, we concentrate on the potential benefits of the combination of auxiliary features with standard acoustic parameters in adverse acoustic environments. The experiments were fulfilled using the HTK Toolkit and ARADIGIT corpus which is a data base of Arabic spoken words. The obtained results show that while the integration of the auxiliary features with the standard parameters by SI (Separate Integration) strategy leads to small improvements in the two test environments (clean and noisy), their integration by DI (Direct Integration) strategy leads to a significant improvement of the recognition system performance in noisy environment.","PeriodicalId":126072,"journal":{"name":"2009 3rd International Conference on Signals, Circuits and Systems (SCS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129334608","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-11-01DOI: 10.1109/ICSCS.2009.5412255
Fares Tounsi, L. Rufer, B. Mezghani, M. Masmoudi, S. Mir
This paper presents a mechanical modeling of membrane systems applicable to micromachined microphones requiring a low stiffness constant. We have recently developed a single-chip electrodynamic microphone in a CMOS MEMS technology. The microphone consists of a suspended square membrane of 1.4mm side, 3µm thick and 10µg, and two concentric inductors. This suspended moving membrane is fixed to the substrate with 4 attachments arms. In order to achieve a desired flat frequency response characteristic, covering the entire acoustic band, several attachment designs are presented, studied and compared. These designs include crab-leg, meander, U-spring and serpentine forms. We have found that for comparable dimensions, the U-spring form presents the highest compliance and the meander type is the stiffest.
{"title":"Highly flexible membrane systems for micromachined microphones - modeling and simulation","authors":"Fares Tounsi, L. Rufer, B. Mezghani, M. Masmoudi, S. Mir","doi":"10.1109/ICSCS.2009.5412255","DOIUrl":"https://doi.org/10.1109/ICSCS.2009.5412255","url":null,"abstract":"This paper presents a mechanical modeling of membrane systems applicable to micromachined microphones requiring a low stiffness constant. We have recently developed a single-chip electrodynamic microphone in a CMOS MEMS technology. The microphone consists of a suspended square membrane of 1.4mm side, 3µm thick and 10µg, and two concentric inductors. This suspended moving membrane is fixed to the substrate with 4 attachments arms. In order to achieve a desired flat frequency response characteristic, covering the entire acoustic band, several attachment designs are presented, studied and compared. These designs include crab-leg, meander, U-spring and serpentine forms. We have found that for comparable dimensions, the U-spring form presents the highest compliance and the meander type is the stiffest.","PeriodicalId":126072,"journal":{"name":"2009 3rd International Conference on Signals, Circuits and Systems (SCS)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121954336","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-11-01DOI: 10.1109/ICSCS.2009.5412599
J. Danger, S. Guilley, S. Bhasin, Maxime Nassar
The security of cryptographic implementations relies not only on the algorithm quality but also on the countermeasures to thwart attacks aiming at disclosing the secrecy. These attacks can take advantage of leakages of the secret appearing through the power consumption or the electromagnetic radiations also called “Side Channels”. This is for instance the case of the Differential Power Analysis (DPA) or the Correlation Power Analysis (CPA). Fault injections is another threatening attack type targeting specific nets in a view to change their value. The major principle to fight the side-channel attack consists in making the power consumption constant. The masking method allows the designer to get a power consumption which has a constant mean and a variance given by a random variable. Another manner is the Hiding method which consists in generating a constant power consumption by using a Dual-rail with Precharge phase Logic (DPL). This paper presents an overview of the various logic styles that have been promoted in the last six years, with an emphasis on their relative advantages and drawbacks.
{"title":"Overview of Dual rail with Precharge logic styles to thwart implementation-level attacks on hardware cryptoprocessors","authors":"J. Danger, S. Guilley, S. Bhasin, Maxime Nassar","doi":"10.1109/ICSCS.2009.5412599","DOIUrl":"https://doi.org/10.1109/ICSCS.2009.5412599","url":null,"abstract":"The security of cryptographic implementations relies not only on the algorithm quality but also on the countermeasures to thwart attacks aiming at disclosing the secrecy. These attacks can take advantage of leakages of the secret appearing through the power consumption or the electromagnetic radiations also called “Side Channels”. This is for instance the case of the Differential Power Analysis (DPA) or the Correlation Power Analysis (CPA). Fault injections is another threatening attack type targeting specific nets in a view to change their value. The major principle to fight the side-channel attack consists in making the power consumption constant. The masking method allows the designer to get a power consumption which has a constant mean and a variance given by a random variable. Another manner is the Hiding method which consists in generating a constant power consumption by using a Dual-rail with Precharge phase Logic (DPL). This paper presents an overview of the various logic styles that have been promoted in the last six years, with an emphasis on their relative advantages and drawbacks.","PeriodicalId":126072,"journal":{"name":"2009 3rd International Conference on Signals, Circuits and Systems (SCS)","volume":"236 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126043393","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}