The fundamental voltage, current and phase angle are required for a wide variety of power system applications. The processed signal must be taken from the power source, when the disturbance is occurred in the system it is difficult to access the power system application. In the proposed method white noise is added into the input voltage waveform to get an unbalanced voltage signal from the source in simulation environment. Then, the unbalanced signal is given to an Extended Kalman filter circuits to estimate and remove the noise signal presents in the voltage waveform. The Extended Kalman Filter is used to remove the voltage disturbance from the power source.
{"title":"Estimation of voltage signal analysis using Extended Kalman Filter","authors":"G.Muthupandi, G.Sivakumar, M.Deepak Pious, M.Naveen Kumar","doi":"10.1109/ICCSP.2014.6950131","DOIUrl":"https://doi.org/10.1109/ICCSP.2014.6950131","url":null,"abstract":"The fundamental voltage, current and phase angle are required for a wide variety of power system applications. The processed signal must be taken from the power source, when the disturbance is occurred in the system it is difficult to access the power system application. In the proposed method white noise is added into the input voltage waveform to get an unbalanced voltage signal from the source in simulation environment. Then, the unbalanced signal is given to an Extended Kalman filter circuits to estimate and remove the noise signal presents in the voltage waveform. The Extended Kalman Filter is used to remove the voltage disturbance from the power source.","PeriodicalId":149965,"journal":{"name":"2014 International Conference on Communication and Signal Processing","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132625634","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-04-03DOI: 10.1109/ICCSP.2014.6949950
D. Singh, Shubhanjali Sharma, V. Jain, Jyoti Gajrani
A wireless sensor network is basically a data communication system that consists of from several to thousands of tiny wireless sensor nodes. These battery powered sensor nodes work with each other to accomplish data transmission. Since the lifetime of wireless sensor network depends on such battery powered sensor nodes, hop counts and battery power have been taken as metrics in routing protocols. In wireless sensor network, energy efficiency is most critical issue that should be considered while transmitting information or data packet from source node to sink node. Some techniques can be used by attacker communities through getting the knowledge about efficiency and trust relationship among the nodes and then insert some unwanted packets in the path from source to sink. DRP, MTRP and EENC are some techniques that can be used to provide energy efficient transmission of data packets. EENC is energy efficiency routing with node compromised resistance. This technique is based on the ant colony optimization technique. Three parameters in this technique, energy, trust and hop count are considered here to find out the compromised node among the nodes and remove the path from source to sink containing that node.
{"title":"Probabilistic method for energy efficiency routing with node compromised resistance","authors":"D. Singh, Shubhanjali Sharma, V. Jain, Jyoti Gajrani","doi":"10.1109/ICCSP.2014.6949950","DOIUrl":"https://doi.org/10.1109/ICCSP.2014.6949950","url":null,"abstract":"A wireless sensor network is basically a data communication system that consists of from several to thousands of tiny wireless sensor nodes. These battery powered sensor nodes work with each other to accomplish data transmission. Since the lifetime of wireless sensor network depends on such battery powered sensor nodes, hop counts and battery power have been taken as metrics in routing protocols. In wireless sensor network, energy efficiency is most critical issue that should be considered while transmitting information or data packet from source node to sink node. Some techniques can be used by attacker communities through getting the knowledge about efficiency and trust relationship among the nodes and then insert some unwanted packets in the path from source to sink. DRP, MTRP and EENC are some techniques that can be used to provide energy efficient transmission of data packets. EENC is energy efficiency routing with node compromised resistance. This technique is based on the ant colony optimization technique. Three parameters in this technique, energy, trust and hop count are considered here to find out the compromised node among the nodes and remove the path from source to sink containing that node.","PeriodicalId":149965,"journal":{"name":"2014 International Conference on Communication and Signal Processing","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132726179","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-04-03DOI: 10.1109/ICCSP.2014.6949840
C. Raje, J. Rangole
Leukemia occurs when lot of abnormal white blood cells produced by the bone marrow. Hematologist makes use of microscopic study of human blood, which leads to need of methods, including microscopic color imaging, segmentation, classification and clustering that can allow identification of patients suffering from Leukemia. The microscopic images will be inspected visually by hematologists and the process is time consuming and tiring. The automatic image processing system is urgently needed and can overcome related constraints in visual inspection. The proposed system will be on microscopic images to detect Leukemia. The early and fast identification of Leukemia greatly aids in providing the appropriate treatment. Initial segmentation is done using Statistical parameters such as mean, standard deviation which segregates white blood cells from other blood components i.e. erythrocytes and platelets. Geometrical features such as area, perimeter of the white blood cell nucleusis investigated for diagnostic prediction of Leukemia. The proposed method is successfully applied to a large number of images, showing promising results for varying image quality. Different image processing algorithms such as Image Enhancement, Thresholding, Mathematical morphology and Labelling are implemented using LabVIEW and MATLAB.
{"title":"Detection of Leukemia in microscopic images using image processing","authors":"C. Raje, J. Rangole","doi":"10.1109/ICCSP.2014.6949840","DOIUrl":"https://doi.org/10.1109/ICCSP.2014.6949840","url":null,"abstract":"Leukemia occurs when lot of abnormal white blood cells produced by the bone marrow. Hematologist makes use of microscopic study of human blood, which leads to need of methods, including microscopic color imaging, segmentation, classification and clustering that can allow identification of patients suffering from Leukemia. The microscopic images will be inspected visually by hematologists and the process is time consuming and tiring. The automatic image processing system is urgently needed and can overcome related constraints in visual inspection. The proposed system will be on microscopic images to detect Leukemia. The early and fast identification of Leukemia greatly aids in providing the appropriate treatment. Initial segmentation is done using Statistical parameters such as mean, standard deviation which segregates white blood cells from other blood components i.e. erythrocytes and platelets. Geometrical features such as area, perimeter of the white blood cell nucleusis investigated for diagnostic prediction of Leukemia. The proposed method is successfully applied to a large number of images, showing promising results for varying image quality. Different image processing algorithms such as Image Enhancement, Thresholding, Mathematical morphology and Labelling are implemented using LabVIEW and MATLAB.","PeriodicalId":149965,"journal":{"name":"2014 International Conference on Communication and Signal Processing","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134488193","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-04-03DOI: 10.1109/ICCSP.2014.6950051
D. Nagendar Naik, T. Hussain, S. Limbu, G. Patowary
Vehicular Ad-hoc Networks (VANET), is a type of wireless ad-hoc network that aims to provide communication among vehicles. A key characteristic of VANETs is the very high mobility of nodes that result in a frequently changing topology along with the frequent breakage and linkage of the paths among the nodes involved. These characteristics make the Quality of Service (QoS) requirements in VANET a challenging issue. In this paper we characterize the performance available to applications in infrastructureless VANETs in terms of path holding time, path breakage probability and per session throughput as a function of various vehicle densities on road, data traffic rate and number of connections formed among vehicles by making use of table-driven and on-demand routing algorithms. Several QoS constraints in the applications of infrastructureless VANETs are observed in the results obtained.
{"title":"QoS performance analysis of routing protocols in Vehicular Ad-hoc Networks","authors":"D. Nagendar Naik, T. Hussain, S. Limbu, G. Patowary","doi":"10.1109/ICCSP.2014.6950051","DOIUrl":"https://doi.org/10.1109/ICCSP.2014.6950051","url":null,"abstract":"Vehicular Ad-hoc Networks (VANET), is a type of wireless ad-hoc network that aims to provide communication among vehicles. A key characteristic of VANETs is the very high mobility of nodes that result in a frequently changing topology along with the frequent breakage and linkage of the paths among the nodes involved. These characteristics make the Quality of Service (QoS) requirements in VANET a challenging issue. In this paper we characterize the performance available to applications in infrastructureless VANETs in terms of path holding time, path breakage probability and per session throughput as a function of various vehicle densities on road, data traffic rate and number of connections formed among vehicles by making use of table-driven and on-demand routing algorithms. Several QoS constraints in the applications of infrastructureless VANETs are observed in the results obtained.","PeriodicalId":149965,"journal":{"name":"2014 International Conference on Communication and Signal Processing","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127897489","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-04-03DOI: 10.1109/ICCSP.2014.6950121
Shashidhar Virupaksha, G. Sahoo, A. Vasudevan
Organizations have a huge customer base and thus they use data mining tools to study their customers. However there is risk of sensitive information about individuals which can be gained also during this process. Hence data that is used for data mining has to be protected. There are some privacy protection algorithms which ensure privacy and protect data. These algorithms preserve privacy but data mining results significantly. In this paper we propose a clustering based noise addition that not only preserves privacy but also ensures effective data mining. Data characteristics are identified using clustering technique and noise is added within the clusters thus retaining the data characteristics.
{"title":"Privacy preservation algorithm in data mining for CRM systems","authors":"Shashidhar Virupaksha, G. Sahoo, A. Vasudevan","doi":"10.1109/ICCSP.2014.6950121","DOIUrl":"https://doi.org/10.1109/ICCSP.2014.6950121","url":null,"abstract":"Organizations have a huge customer base and thus they use data mining tools to study their customers. However there is risk of sensitive information about individuals which can be gained also during this process. Hence data that is used for data mining has to be protected. There are some privacy protection algorithms which ensure privacy and protect data. These algorithms preserve privacy but data mining results significantly. In this paper we propose a clustering based noise addition that not only preserves privacy but also ensures effective data mining. Data characteristics are identified using clustering technique and noise is added within the clusters thus retaining the data characteristics.","PeriodicalId":149965,"journal":{"name":"2014 International Conference on Communication and Signal Processing","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115346478","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-04-03DOI: 10.1109/ICCSP.2014.6949833
P. Praveenkumar, K. Thenmozhi, J. Alfaaz Zami, Rengarajan Amirtharajan
Role of modern day technology in business world is very imperative and moving. Be it collaboration, telephony, social media etc. in a particular trade, ultimately, information is what being communed. Its importance is more studied and explored in the domain of Business communication. At the same time, emphasis is greatly laid to have secure communication between the parties irrespective of the medium of communication. This is where software and cryptic techniques come into help. Information security plays a crucial role in safeguarding the message or information involved in the communication. Nowadays, right from small vendors to corporate giants, every business organization relies directly or indirectly on cryptic experts for the same. This work is one such blend of technology and security for data protection. This paper deals with the comparative performance analysis of different modulation schemes like BPSK, QPSK, 8QAM, 16QAM, 32QAM and 64 QAM using concatenated Error Control Codes (ECC) in OFDM(Orthogonal Frequency Division Multiplexing). RS(Reed Solomon) codes with Convolutional codes has been used as the concatenated error control code. Then the coded data bits are encrypted to the enhance copy right protection. BER Vs Eb/No graphs are plotted using various modulation schemes adopting AWGN (Additive White Gaussian Noise channel), Rayleigh and Rician Fading Channels. Correlation values are computed for various inner and outer code rates to validate the encryption operation.
现代技术在商业世界中的作用是非常必要和移动的。无论是合作、电话、社交媒体等,在一个特定的行业,最终,信息是被交流的东西。它的重要性在商务交流领域得到了更多的研究和探索。与此同时,无论通信媒介如何,都非常强调各方之间的安全通信。这就是软件和神秘技术发挥作用的地方。信息安全在保护通信中涉及的消息或信息方面起着至关重要的作用。如今,从小型供应商到企业巨头,每个商业组织都直接或间接地依赖于加密专家。这项工作是数据保护技术和安全的结合。本文对正交频分复用技术中BPSK、QPSK、8QAM、16QAM、32QAM和64qam调制方案的性能进行了比较分析。RS(Reed Solomon)码与卷积码被用作串联错误控制码。然后对编码后的数据位进行加密,加强版权保护。利用AWGN(加性高斯白噪声信道)、瑞利和瑞利衰落信道等调制方案绘制了BER Vs Eb/No图。计算各种内部和外部码率的相关值,以验证加密操作。
{"title":"Blend of error control codes in OFDM - effect of channel - a comparative approach","authors":"P. Praveenkumar, K. Thenmozhi, J. Alfaaz Zami, Rengarajan Amirtharajan","doi":"10.1109/ICCSP.2014.6949833","DOIUrl":"https://doi.org/10.1109/ICCSP.2014.6949833","url":null,"abstract":"Role of modern day technology in business world is very imperative and moving. Be it collaboration, telephony, social media etc. in a particular trade, ultimately, information is what being communed. Its importance is more studied and explored in the domain of Business communication. At the same time, emphasis is greatly laid to have secure communication between the parties irrespective of the medium of communication. This is where software and cryptic techniques come into help. Information security plays a crucial role in safeguarding the message or information involved in the communication. Nowadays, right from small vendors to corporate giants, every business organization relies directly or indirectly on cryptic experts for the same. This work is one such blend of technology and security for data protection. This paper deals with the comparative performance analysis of different modulation schemes like BPSK, QPSK, 8QAM, 16QAM, 32QAM and 64 QAM using concatenated Error Control Codes (ECC) in OFDM(Orthogonal Frequency Division Multiplexing). RS(Reed Solomon) codes with Convolutional codes has been used as the concatenated error control code. Then the coded data bits are encrypted to the enhance copy right protection. BER Vs Eb/No graphs are plotted using various modulation schemes adopting AWGN (Additive White Gaussian Noise channel), Rayleigh and Rician Fading Channels. Correlation values are computed for various inner and outer code rates to validate the encryption operation.","PeriodicalId":149965,"journal":{"name":"2014 International Conference on Communication and Signal Processing","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115602710","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-04-03DOI: 10.1109/ICCSP.2014.6950123
K. Suriya, G. Durga
This paper presents the design of V-band low power down-conversion mixer operating in weak inversion biasing region using 90-nm CMOS technology. The mixer exhibits a double-balanced Gilbert cell structure in source-driven topology with RF signal applied at the gate and local oscillator (LO) signal at the source. It achieves high conversion gain of 7.297 dB at RF signal of 60 GHz at standard supply voltage of 1.2 V. Other performance parameters measured are LO-to-RF port isolation as more than 40 dB, the third-order input intercept point (IIP3) as -1.692 dBm, OP1dB as -7.382 dBm and DC power consumption of 548 μW at LO power of -6 dBm indicates that this mixer is suitable for low power millimeter-wave (MMW) radio applications. The mixer is designed and simulated using Agilent's Advanced Design System (ADS).
{"title":"Design of 50–75 GHz V-band low power and high gain down-conversion mixer","authors":"K. Suriya, G. Durga","doi":"10.1109/ICCSP.2014.6950123","DOIUrl":"https://doi.org/10.1109/ICCSP.2014.6950123","url":null,"abstract":"This paper presents the design of V-band low power down-conversion mixer operating in weak inversion biasing region using 90-nm CMOS technology. The mixer exhibits a double-balanced Gilbert cell structure in source-driven topology with RF signal applied at the gate and local oscillator (LO) signal at the source. It achieves high conversion gain of 7.297 dB at RF signal of 60 GHz at standard supply voltage of 1.2 V. Other performance parameters measured are LO-to-RF port isolation as more than 40 dB, the third-order input intercept point (IIP3) as -1.692 dBm, OP1dB as -7.382 dBm and DC power consumption of 548 μW at LO power of -6 dBm indicates that this mixer is suitable for low power millimeter-wave (MMW) radio applications. The mixer is designed and simulated using Agilent's Advanced Design System (ADS).","PeriodicalId":149965,"journal":{"name":"2014 International Conference on Communication and Signal Processing","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115738055","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-04-03DOI: 10.1109/ICCSP.2014.6949971
K. Vijayakumar, R. A. Kumar, A. Govindasamy, S. Kannan
The purpose of this paper is to develop the Sinusoidal Pulse Width Modulation (SPWM) for toggling the switches of Matrix Converter for its operation as several Power Electronics Converters. The SPWM generation is developed with the help of Quartus based Field Programmable Gate Array (FPGA). Quartus II is a software tool produced by Altera for analysis and synthesis of HDL design which enables the developer to compile their designs. Quartus II software includes all the design files, software source files and other related files necessary for the eventual implementation of a design in Programmable Logic Devices. SPWM provides a way to reduce the Total Harmonic Distortion (THD) of load current. The VHDL programming is used to generate the SPWM for switches. Simulation waveforms are obtained and the output of SPWM generation is developed with the help of the FPGA and the output is displayed in the CRO.
{"title":"Implementation of Sinusoidal Pulse Width Modulation for Matrix Converter using FPGA","authors":"K. Vijayakumar, R. A. Kumar, A. Govindasamy, S. Kannan","doi":"10.1109/ICCSP.2014.6949971","DOIUrl":"https://doi.org/10.1109/ICCSP.2014.6949971","url":null,"abstract":"The purpose of this paper is to develop the Sinusoidal Pulse Width Modulation (SPWM) for toggling the switches of Matrix Converter for its operation as several Power Electronics Converters. The SPWM generation is developed with the help of Quartus based Field Programmable Gate Array (FPGA). Quartus II is a software tool produced by Altera for analysis and synthesis of HDL design which enables the developer to compile their designs. Quartus II software includes all the design files, software source files and other related files necessary for the eventual implementation of a design in Programmable Logic Devices. SPWM provides a way to reduce the Total Harmonic Distortion (THD) of load current. The VHDL programming is used to generate the SPWM for switches. Simulation waveforms are obtained and the output of SPWM generation is developed with the help of the FPGA and the output is displayed in the CRO.","PeriodicalId":149965,"journal":{"name":"2014 International Conference on Communication and Signal Processing","volume":"214 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124206093","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-04-03DOI: 10.1109/ICCSP.2014.6950031
P. Sisodia, A. Verma, K. Juneja, S. Goel
Human emotion detection plays an important role in the human-computer interaction. In this paper, the emotions are detected on segmented image using low dimension weighted Gabor filter bank. The segmentation reduces the space domain and only those facial features are focused that reflects expressions accurately. The classification of selected features values classifies through a RBF network. The experimental results show that by the selection of optimal features, the computational complexity reduces significantly.
{"title":"An improved method for emotion detection using weighted Gabor filter and radial basis Function kernel","authors":"P. Sisodia, A. Verma, K. Juneja, S. Goel","doi":"10.1109/ICCSP.2014.6950031","DOIUrl":"https://doi.org/10.1109/ICCSP.2014.6950031","url":null,"abstract":"Human emotion detection plays an important role in the human-computer interaction. In this paper, the emotions are detected on segmented image using low dimension weighted Gabor filter bank. The segmentation reduces the space domain and only those facial features are focused that reflects expressions accurately. The classification of selected features values classifies through a RBF network. The experimental results show that by the selection of optimal features, the computational complexity reduces significantly.","PeriodicalId":149965,"journal":{"name":"2014 International Conference on Communication and Signal Processing","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124416315","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-04-03DOI: 10.1109/ICCSP.2014.6950172
Suresh Babu Changalasetty, Ahmed S. Badawy, Wade Ghribi, Lalitha Saroja Thota
In recent years, video monitoring and surveillance systems have been widely used in traffic management. The image sequences for traffic scenes are recorded by a stationary camera. The video clip is sent to LabVIEW program to convert into image frames. NI LabVIEW vision assistant module is used to detect the moving vehicle. The method is based on the establishment of correspondences between regions and vehicles, as the vehicles move through the image sequence. Background subtraction is used which improves the adaptive background mixture model and makes the system learn faster and more accurately, as well as adapt effectively to changing environments. The resulting system robustly identifies vehicles, rejecting background and tracks vehicles over a specific period of time. Once the (object) vehicle is tracked, the attributes of the vehicle like width, length, perimeter, area etc are extracted by image process feature extraction techniques. In proposed system we use LabVIEW and Vision assistant module for image processing and feature extraction. The project will benefit to reduce cost of traffic monitoring system and complete automation of traffic monitoring system.
{"title":"Identification and feature extraction of moving vehicles in LabVIEW","authors":"Suresh Babu Changalasetty, Ahmed S. Badawy, Wade Ghribi, Lalitha Saroja Thota","doi":"10.1109/ICCSP.2014.6950172","DOIUrl":"https://doi.org/10.1109/ICCSP.2014.6950172","url":null,"abstract":"In recent years, video monitoring and surveillance systems have been widely used in traffic management. The image sequences for traffic scenes are recorded by a stationary camera. The video clip is sent to LabVIEW program to convert into image frames. NI LabVIEW vision assistant module is used to detect the moving vehicle. The method is based on the establishment of correspondences between regions and vehicles, as the vehicles move through the image sequence. Background subtraction is used which improves the adaptive background mixture model and makes the system learn faster and more accurately, as well as adapt effectively to changing environments. The resulting system robustly identifies vehicles, rejecting background and tracks vehicles over a specific period of time. Once the (object) vehicle is tracked, the attributes of the vehicle like width, length, perimeter, area etc are extracted by image process feature extraction techniques. In proposed system we use LabVIEW and Vision assistant module for image processing and feature extraction. The project will benefit to reduce cost of traffic monitoring system and complete automation of traffic monitoring system.","PeriodicalId":149965,"journal":{"name":"2014 International Conference on Communication and Signal Processing","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115035971","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}