首页 > 最新文献

2017 International Conference on Recent Innovations in Signal processing and Embedded Systems (RISE)最新文献

英文 中文
On the performance of DF based mixed triple-hop RF-FSO-RF cooperative system 基于DF的混合三跳RF-FSO-RF协同系统性能研究
Sanya Anees, M. Bhatnagar, Parasa Ram
In this work, we analyze the performance of decode-and-forward (DF) based triple-hop radio frequency-free space optical-radio frequency (RF-FSO-RF) communication system. The mixed RF-FSO-RF system derive application, where the FSO link can be used to provide high speed connectivity between the two RF networks. The RF links are characterized by Nakagami-m fading and the FSO link is characterized by path loss, Gamma-Gamma distributed turbulence and pointing errors. For this asymmetric triple hop communication system, new closed form mathematical expressions are obtained for statistical characteristics of end-to-end signal-to-noise ratio (SNR), i.e., cumulative distribution function and probability density function. Using these expressions, novel closed form expressions are derived for the outage probability and the average bit error rate of various modulation techniques. Numerical results show the effect of fading, turbulence, and pointing errors on the performance of the considered cooperative system.
在这项工作中,我们分析了基于三跳无频率空间光射频(RF-FSO-RF)通信系统的性能。混合RF-FSO-RF系统得到了应用,其中FSO链路可用于在两个RF网络之间提供高速连接。射频链路的特征是中真米衰落,而自由通信链路的特征是路径损耗、Gamma-Gamma分布湍流和指向误差。针对这种非对称三跳通信系统,得到了端到端信噪比统计特性的新的封闭形式数学表达式,即累积分布函数和概率密度函数。利用这些表达式,导出了各种调制技术的中断概率和平均误码率的封闭表达式。数值结果显示了衰落、湍流和指向误差对所考虑的合作系统性能的影响。
{"title":"On the performance of DF based mixed triple-hop RF-FSO-RF cooperative system","authors":"Sanya Anees, M. Bhatnagar, Parasa Ram","doi":"10.1109/RISE.2017.8378124","DOIUrl":"https://doi.org/10.1109/RISE.2017.8378124","url":null,"abstract":"In this work, we analyze the performance of decode-and-forward (DF) based triple-hop radio frequency-free space optical-radio frequency (RF-FSO-RF) communication system. The mixed RF-FSO-RF system derive application, where the FSO link can be used to provide high speed connectivity between the two RF networks. The RF links are characterized by Nakagami-m fading and the FSO link is characterized by path loss, Gamma-Gamma distributed turbulence and pointing errors. For this asymmetric triple hop communication system, new closed form mathematical expressions are obtained for statistical characteristics of end-to-end signal-to-noise ratio (SNR), i.e., cumulative distribution function and probability density function. Using these expressions, novel closed form expressions are derived for the outage probability and the average bit error rate of various modulation techniques. Numerical results show the effect of fading, turbulence, and pointing errors on the performance of the considered cooperative system.","PeriodicalId":166244,"journal":{"name":"2017 International Conference on Recent Innovations in Signal processing and Embedded Systems (RISE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130629971","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A novel method for the extraction of primary visual features from an image through intelligent feature descriptors 一种利用智能特征描述符提取图像主要视觉特征的新方法
A. Deshpande, M. Subashini
As far as the safety of a driver is concerned, more focus should be put on correct interpretation and information which is conveyed by a traffic sign, while driving a vehicle along the road. A sign board can be thought of as an emblem which disseminates important and meaningful information regarding the potential hazards prevailing among road users comprising roadways cladded with snowfall, construction worksites or repairing of roads taking place and telling the people to follow an alternative route. It alerts the person who is passing through the road about the maximum possible extremity that his vehicle is trying to achieve indicating slowing down the speed of vehicle since chances of having collision cannot be ruled out. With constant increasing of the training database size, not only there cognition accuracy, but also the computation complexity should be considered in designing a feasible recognition approach. The traffic sign images were acquired from the image database and were subjected to some pre-processing techniques such as conversion of the original RGB images into HSV Color Space, Adjustment of the Contrast of the Color images as well as applying the Histogram of Oriented Gradients (HOG) algorithm in which the process of extraction and plotting of the HOG features from a given image is performed that is most popular amongst the feature extraction algorithms. In the future, we will concentrate on detecting, recognizing as well as classifying a particular sign board.
就驾驶员的安全而言,在道路上驾驶车辆时,更应该关注交通标志所传达的正确解读和信息。指示牌可以被认为是一种象征,它传播重要和有意义的信息,说明道路使用者普遍存在的潜在危险,包括积雪覆盖的道路、建筑工地或正在进行的道路维修,并告诉人们选择另一条路线。它提醒正在通过道路的人,他的车辆正试图达到的最大可能极限,并指示车辆减速,因为不能排除发生碰撞的可能性。随着训练库规模的不断增大,设计一种可行的识别方法不仅要考虑识别精度,而且要考虑计算复杂度。从图像数据库中获取交通标志图像,并进行一些预处理技术,如将原始RGB图像转换为HSV颜色空间,调整颜色图像的对比度,以及应用定向梯度直方图(HOG)算法,其中从给定图像中提取和绘制HOG特征的过程是最流行的特征提取算法。在未来,我们将专注于检测,识别和分类一个特定的标志板。
{"title":"A novel method for the extraction of primary visual features from an image through intelligent feature descriptors","authors":"A. Deshpande, M. Subashini","doi":"10.1109/RISE.2017.8378153","DOIUrl":"https://doi.org/10.1109/RISE.2017.8378153","url":null,"abstract":"As far as the safety of a driver is concerned, more focus should be put on correct interpretation and information which is conveyed by a traffic sign, while driving a vehicle along the road. A sign board can be thought of as an emblem which disseminates important and meaningful information regarding the potential hazards prevailing among road users comprising roadways cladded with snowfall, construction worksites or repairing of roads taking place and telling the people to follow an alternative route. It alerts the person who is passing through the road about the maximum possible extremity that his vehicle is trying to achieve indicating slowing down the speed of vehicle since chances of having collision cannot be ruled out. With constant increasing of the training database size, not only there cognition accuracy, but also the computation complexity should be considered in designing a feasible recognition approach. The traffic sign images were acquired from the image database and were subjected to some pre-processing techniques such as conversion of the original RGB images into HSV Color Space, Adjustment of the Contrast of the Color images as well as applying the Histogram of Oriented Gradients (HOG) algorithm in which the process of extraction and plotting of the HOG features from a given image is performed that is most popular amongst the feature extraction algorithms. In the future, we will concentrate on detecting, recognizing as well as classifying a particular sign board.","PeriodicalId":166244,"journal":{"name":"2017 International Conference on Recent Innovations in Signal processing and Embedded Systems (RISE)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128940687","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Estimating vital signs through non-contact video-based approaches: A survey 通过非接触视频方法估计生命体征:一项调查
R. Sinhal, Kavita Singh, A. Shankar
The human body exhibits many vital signs, such as heart rate (HR) and respiratory rate (RR) used to assess fitness and health. Vital signs are typically measured by a trained health professional and may be difficult for individuals to accurately measure at home. Clinic visits are therefore needed with associated burdens of cost and time spent waiting in long queues. The widespread use of smart phones with video capability presents an opportunity to create non-invasive applications for assessment of vital signs. Over the past decade, several researchers have worked on assessing vital signs from video, including HR, RR and other parameters such as anemia and blood oxygen saturation (SpO2). This paper reviews the different image and video processing algorithms developed for vital signs assessment through non-contact methods, and outline the key remaining challenges in the field which can be used as potential research topics. The CHROM algorithm produces highest accuracy in detecting the signals from rPPG. There are different challenges of handling large database and motion stabilization which is not provided by any algorithm, this is main area of research in rPPG.
人体表现出许多生命体征,如心率(HR)和呼吸频率(RR),用于评估健身和健康。生命体征通常由训练有素的健康专业人员测量,个人可能难以在家中准确测量。因此,诊所就诊是必要的,同时也带来了费用负担和排长队等待的时间。具有视频功能的智能手机的广泛使用为创建非侵入性应用程序来评估生命体征提供了机会。在过去的十年里,一些研究人员一直致力于从视频中评估生命体征,包括HR, RR和其他参数,如贫血和血氧饱和度(SpO2)。本文综述了通过非接触方法进行生命体征评估的不同图像和视频处理算法,并概述了该领域仍存在的关键挑战,这些挑战可以作为潜在的研究课题。CHROM算法对rPPG信号的检测精度最高。处理大型数据库和运动稳定存在不同的挑战,这是任何算法都无法提供的,这是rPPG的主要研究领域。
{"title":"Estimating vital signs through non-contact video-based approaches: A survey","authors":"R. Sinhal, Kavita Singh, A. Shankar","doi":"10.1109/RISE.2017.8378141","DOIUrl":"https://doi.org/10.1109/RISE.2017.8378141","url":null,"abstract":"The human body exhibits many vital signs, such as heart rate (HR) and respiratory rate (RR) used to assess fitness and health. Vital signs are typically measured by a trained health professional and may be difficult for individuals to accurately measure at home. Clinic visits are therefore needed with associated burdens of cost and time spent waiting in long queues. The widespread use of smart phones with video capability presents an opportunity to create non-invasive applications for assessment of vital signs. Over the past decade, several researchers have worked on assessing vital signs from video, including HR, RR and other parameters such as anemia and blood oxygen saturation (SpO2). This paper reviews the different image and video processing algorithms developed for vital signs assessment through non-contact methods, and outline the key remaining challenges in the field which can be used as potential research topics. The CHROM algorithm produces highest accuracy in detecting the signals from rPPG. There are different challenges of handling large database and motion stabilization which is not provided by any algorithm, this is main area of research in rPPG.","PeriodicalId":166244,"journal":{"name":"2017 International Conference on Recent Innovations in Signal processing and Embedded Systems (RISE)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114134427","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
A review on intrusion detection system in mobile ad-hoc network 移动自组网中入侵检测系统的研究进展
A. Saxena, S. Sinha, P. Shukla
Mobile ad hoc networks (MANET) is the most useful network in present and it is used in many application. In the MANET prevention concept is not sufficient from the security point of view, so the detection concept is added. Intrusion Detection System (IDS) is another concept to provide security in the network. Basically IDS is used to identify selfish and malevolent node in the network. Generally IDS concept is used in wired networks but incase of wireless network then it can no longer sufficient if we used it directly. Here we present the concept of MANET, IDS and we have discussed various existing IDS in MANET environment along with their pros and cons.
移动自组网(MANET)是目前应用最为广泛的网络。从安全的角度来看,在MANET中预防的概念是不够的,所以增加了检测的概念。入侵检测系统(IDS)是提供网络安全的另一个概念。IDS基本上是用来识别网络中自私和恶意的节点。IDS概念一般用于有线网络,但在无线网络中直接使用已不能满足要求。在这里,我们提出了MANET, IDS的概念,并讨论了MANET环境中现有的各种IDS及其优缺点。
{"title":"A review on intrusion detection system in mobile ad-hoc network","authors":"A. Saxena, S. Sinha, P. Shukla","doi":"10.1109/RISE.2017.8378216","DOIUrl":"https://doi.org/10.1109/RISE.2017.8378216","url":null,"abstract":"Mobile ad hoc networks (MANET) is the most useful network in present and it is used in many application. In the MANET prevention concept is not sufficient from the security point of view, so the detection concept is added. Intrusion Detection System (IDS) is another concept to provide security in the network. Basically IDS is used to identify selfish and malevolent node in the network. Generally IDS concept is used in wired networks but incase of wireless network then it can no longer sufficient if we used it directly. Here we present the concept of MANET, IDS and we have discussed various existing IDS in MANET environment along with their pros and cons.","PeriodicalId":166244,"journal":{"name":"2017 International Conference on Recent Innovations in Signal processing and Embedded Systems (RISE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125829285","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Single bit-line 10T SRAM cell for low power and high SNM 单位线10T SRAM单元,用于低功耗和高SNM
H. Banga, Dheeraj Agarwal
Memories are the integral part of digital circuits thus power consumption of memory should be kept in consideration while designing the circuits. Memories should consume less power to improve system performance, stability, and efficiency. Earlier standard CMOS 6T SRAM cell was used which has two bit lines and a word line for both read and write operation. During the read operation stability decreases as the voltage is divided between access and driver transistors. In this paper new 10T SRAM with dynamic feedback control is proposed, which uses single bit line for both read and write operation. Power consumption reduces as single bit line is used and for both read and write operation and stability increases when compared with standard 6T SRAM. Proposed cell also show high static noise margin (SNM). The proposed 10T SRAM when compared with conventional 6T SRAM in terms of power consumed, delays, and SNM. The proposed 10 SRAM cells consume 83.27 % less power for write ‘0’ operation, 85.9 % less power for write 1 operation and delay increase for proposed 10T SRAM cell when compared with standard 6T SRAM cell. The proposed cell has 4.9 times SNM when compared with 6T SRAM. Using Cadence Virtuoso ADE with 180nm technology is used to draw schematics and simulation is carried out.
存储器是数字电路的组成部分,因此在设计电路时要考虑存储器的功耗。内存应该消耗更少的能量,以提高系统性能、稳定性和效率。早期标准的CMOS 6T SRAM单元被使用,它有两个位线和一个字线用于读写操作。在读取操作期间,由于电压在访问和驱动晶体管之间被分割,稳定性下降。本文提出了一种采用单比特线进行读写操作的动态反馈控制的新型10T SRAM。与标准6T SRAM相比,功耗降低,使用单位线,读写操作和稳定性增加。该单元具有较高的静态噪声裕度(SNM)。在功耗、延迟和SNM方面,与传统的6T SRAM相比,提出的10T SRAM。与标准6T SRAM单元相比,所提出的10T SRAM单元的写' 0 '操作功耗降低83.27%,写1操作功耗降低85.9%,延迟增加。与6T SRAM相比,该单元具有4.9倍的SNM。采用180nm技术的Cadence Virtuoso ADE绘制原理图并进行仿真。
{"title":"Single bit-line 10T SRAM cell for low power and high SNM","authors":"H. Banga, Dheeraj Agarwal","doi":"10.1109/RISE.2017.8378194","DOIUrl":"https://doi.org/10.1109/RISE.2017.8378194","url":null,"abstract":"Memories are the integral part of digital circuits thus power consumption of memory should be kept in consideration while designing the circuits. Memories should consume less power to improve system performance, stability, and efficiency. Earlier standard CMOS 6T SRAM cell was used which has two bit lines and a word line for both read and write operation. During the read operation stability decreases as the voltage is divided between access and driver transistors. In this paper new 10T SRAM with dynamic feedback control is proposed, which uses single bit line for both read and write operation. Power consumption reduces as single bit line is used and for both read and write operation and stability increases when compared with standard 6T SRAM. Proposed cell also show high static noise margin (SNM). The proposed 10T SRAM when compared with conventional 6T SRAM in terms of power consumed, delays, and SNM. The proposed 10 SRAM cells consume 83.27 % less power for write ‘0’ operation, 85.9 % less power for write 1 operation and delay increase for proposed 10T SRAM cell when compared with standard 6T SRAM cell. The proposed cell has 4.9 times SNM when compared with 6T SRAM. Using Cadence Virtuoso ADE with 180nm technology is used to draw schematics and simulation is carried out.","PeriodicalId":166244,"journal":{"name":"2017 International Conference on Recent Innovations in Signal processing and Embedded Systems (RISE)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116314209","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
A copy-move forgery detection system using approximation image local binary pattern 基于近似图像局部二值模式的复制-移动伪造检测系统
Daljeet Kaur Kalsi, P. Rai
During the past few years, digital image forgery detection system has been received a significant attention in the field of analyzing and understanding digital images. A copy-move forgery is introduced in images by copying a part of an image and put it in the same image or in the other image. In this paper, we proposed a system that detects a copy-move forgery in the images. The method involves feature extraction, feature matching, and duplicate block identification. In this paper, AILBP (Approximation image local binary pattern) method is being applied for feature extraction. The number of experiments is initiated on a standard standalone image. The experimental results indicate that the proposed system is effective enough to give high performance in terms of speed and accuracy.
近年来,数字图像伪造检测系统在分析和理解数字图像领域受到了广泛的关注。复制-移动伪造是通过复制图像的一部分并将其放在同一图像或另一图像中来引入图像的。本文提出了一种检测图像复制-移动伪造的系统。该方法包括特征提取、特征匹配和重复块识别。本文采用近似图像局部二值模式(AILBP)方法进行特征提取。在一个标准的独立映像上启动实验的数量。实验结果表明,该系统在速度和精度方面都具有较高的性能。
{"title":"A copy-move forgery detection system using approximation image local binary pattern","authors":"Daljeet Kaur Kalsi, P. Rai","doi":"10.1109/RISE.2017.8378168","DOIUrl":"https://doi.org/10.1109/RISE.2017.8378168","url":null,"abstract":"During the past few years, digital image forgery detection system has been received a significant attention in the field of analyzing and understanding digital images. A copy-move forgery is introduced in images by copying a part of an image and put it in the same image or in the other image. In this paper, we proposed a system that detects a copy-move forgery in the images. The method involves feature extraction, feature matching, and duplicate block identification. In this paper, AILBP (Approximation image local binary pattern) method is being applied for feature extraction. The number of experiments is initiated on a standard standalone image. The experimental results indicate that the proposed system is effective enough to give high performance in terms of speed and accuracy.","PeriodicalId":166244,"journal":{"name":"2017 International Conference on Recent Innovations in Signal processing and Embedded Systems (RISE)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115474895","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Unique-ID based channel hopping rendezvous algorithm for cognitive radio ad hoc networks 认知无线电自组网中基于唯一id的信道跳变交会算法
A. Ukey, M. Chawla
Rendezvous of cognitive radios on commonly available channels is fundamental and crucial phenomena in the formation of cognitive radio networks (CRNs). Rendezvous enables secondary users (SUs) to detect the presence of each other and establish communication links between them. The diversity in free available channels sensed by the SUs and non-awareness of the presence of SUs before rendezvous make the rendezvous process a non-trivial task. Assigning a channel as a common control channel (CCC) for all SUs is not feasible in the dynamic environment of CRNs since SUs may have diverse available channels that change with time and location. Hence, channel hopping (CH) technique often referred as blind rendezvous is more preferred in CRNs. In this paper, we present a unique identity based channel hopping (UID-CH) rendezvous algorithm that dynamically manipulate the unique identity of SUs and constructs the CH sequence on the top of available channels rather than the total potential licensed channels. The gist of the algorithm lies on hopping and waiting phenomena of SUs in a circular manner such that if one SU hops on available channels and the other SU waits on a particular channel then rendezvous can be guaranteed by the time first SU completes a round. Theoretical analysis and simulation experiments show that the UID-CH algorithm provides rendezvous guarantee in finite time without explicit requirement of time synchronization and performs well in distributed dynamic environment of CRNs.
认知无线电在共同可用信道上的交会是认知无线电网络形成过程中的基本和关键现象。会合使次要用户(su)能够检测彼此的存在并在它们之间建立通信链接。单元感知的空闲可用信道的多样性以及在集合前对单元存在的不感知使得集合过程成为一项不平凡的任务。在crn的动态环境中,分配一个通道作为所有su的公共控制通道(common control channel, CCC)是不可实现的,因为su可能有不同的可用通道,这些通道会随着时间和位置的变化而变化。因此,在crn中,信道跳变(CH)技术通常被称为盲交会技术。本文提出了一种基于唯一身份的信道跳(UID-CH)集合算法,该算法动态地操纵SUs的唯一身份,并在可用信道而不是总潜在许可信道的顶部构造CH序列。该算法的要点在于以循环的方式利用节点间的跳变和等待现象,如果一个节点在可用的信道上跳变,而另一个节点在特定的信道上等待,那么在第一个节点完成一轮的时候就可以保证会合。理论分析和仿真实验表明,该算法在没有明确时间同步要求的情况下,提供了有限时间内的交会保证,在crn的分布式动态环境下具有良好的性能。
{"title":"Unique-ID based channel hopping rendezvous algorithm for cognitive radio ad hoc networks","authors":"A. Ukey, M. Chawla","doi":"10.1109/RISE.2017.8378213","DOIUrl":"https://doi.org/10.1109/RISE.2017.8378213","url":null,"abstract":"Rendezvous of cognitive radios on commonly available channels is fundamental and crucial phenomena in the formation of cognitive radio networks (CRNs). Rendezvous enables secondary users (SUs) to detect the presence of each other and establish communication links between them. The diversity in free available channels sensed by the SUs and non-awareness of the presence of SUs before rendezvous make the rendezvous process a non-trivial task. Assigning a channel as a common control channel (CCC) for all SUs is not feasible in the dynamic environment of CRNs since SUs may have diverse available channels that change with time and location. Hence, channel hopping (CH) technique often referred as blind rendezvous is more preferred in CRNs. In this paper, we present a unique identity based channel hopping (UID-CH) rendezvous algorithm that dynamically manipulate the unique identity of SUs and constructs the CH sequence on the top of available channels rather than the total potential licensed channels. The gist of the algorithm lies on hopping and waiting phenomena of SUs in a circular manner such that if one SU hops on available channels and the other SU waits on a particular channel then rendezvous can be guaranteed by the time first SU completes a round. Theoretical analysis and simulation experiments show that the UID-CH algorithm provides rendezvous guarantee in finite time without explicit requirement of time synchronization and performs well in distributed dynamic environment of CRNs.","PeriodicalId":166244,"journal":{"name":"2017 International Conference on Recent Innovations in Signal processing and Embedded Systems (RISE)","volume":"93 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126203164","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Melody extraction in noisy Musicof different genre 不同流派嘈杂音乐中的旋律提取
Vivekanand, B. Kumar
In this paper, we have studied and analyzed the performance of melody extraction algorithm for different genre of music especially in noisy environment. The algorithm based salience function and pitch contour characteristics is used for extracting the melody. The parameter Frequency Estimation Error (FEE) is taken for evaluating the performance of melody extraction algorithm. Also, their performance is evaluated for various musical genres such as JAZZ, MIDI, POP and OPERA MALE for comparison purpose. We have also shown how final melodicline in polyphonic mixture for different SNR values will look like in case of different musical genre.
本文研究并分析了不同音乐类型的旋律提取算法在噪声环境下的表现。采用基于显著性函数和音高轮廓特征的算法提取旋律。采用频率估计误差(Frequency Estimation Error, FEE)参数来评价旋律提取算法的性能。此外,他们的表演也会根据爵士乐、MIDI、流行音乐和OPERA MALE等各种音乐类型进行评估,以进行比较。我们还展示了不同信噪比值的复调混合中的最终旋律线在不同音乐类型的情况下是如何呈现的。
{"title":"Melody extraction in noisy Musicof different genre","authors":"Vivekanand, B. Kumar","doi":"10.1109/RISE.2017.8378229","DOIUrl":"https://doi.org/10.1109/RISE.2017.8378229","url":null,"abstract":"In this paper, we have studied and analyzed the performance of melody extraction algorithm for different genre of music especially in noisy environment. The algorithm based salience function and pitch contour characteristics is used for extracting the melody. The parameter Frequency Estimation Error (FEE) is taken for evaluating the performance of melody extraction algorithm. Also, their performance is evaluated for various musical genres such as JAZZ, MIDI, POP and OPERA MALE for comparison purpose. We have also shown how final melodicline in polyphonic mixture for different SNR values will look like in case of different musical genre.","PeriodicalId":166244,"journal":{"name":"2017 International Conference on Recent Innovations in Signal processing and Embedded Systems (RISE)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126004130","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Improved BEMD data hiding scheme: Data hiding binary exploitation modification direction scheme using image steganography 改进的BEMD数据隐藏方案:利用图像隐写技术的数据隐藏二进制利用修改方向方案
Shuchi Agarwal, J. Bisht
Improved Binary exploitation modification direction steganographic technique to hide data behind digital images is proposed to increase security of data in communication system. Modification is made in binary power data hiding scheme which results in major improvements in values of PSNR and MSE which increases the stego image quality.
为了提高通信系统中数据的安全性,提出了一种改进的二进制利用修改方向隐写技术,将数据隐藏在数字图像后面。对二进制功率数据隐藏方案进行了改进,使PSNR和MSE的值有了较大的提高,从而提高了隐写图像的质量。
{"title":"Improved BEMD data hiding scheme: Data hiding binary exploitation modification direction scheme using image steganography","authors":"Shuchi Agarwal, J. Bisht","doi":"10.1109/RISE.2017.8378155","DOIUrl":"https://doi.org/10.1109/RISE.2017.8378155","url":null,"abstract":"Improved Binary exploitation modification direction steganographic technique to hide data behind digital images is proposed to increase security of data in communication system. Modification is made in binary power data hiding scheme which results in major improvements in values of PSNR and MSE which increases the stego image quality.","PeriodicalId":166244,"journal":{"name":"2017 International Conference on Recent Innovations in Signal processing and Embedded Systems (RISE)","volume":"119 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122830908","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Failure detection on wireless sensor network based on comparative study 基于比较研究的无线传感器网络故障检测
Ali Al-Dahoud, Rayene Doghmane, M. Fezari, Karima Boukari
In this paper, we present a comparative study on the main faults in a Wireless Sensor Networks (WSN) system. The applications using this new technology have recently been increased due to its huge capacity to connect both the physical and the virtual worlds. WSNs allow assessing locations, which are technically hard to reach by robots or human. With Cloud computing added to the WSN, we expect to see a world covered with trillions of connected devices that sense and share data information with each other. However, many parts of the deployments experience high rates of failure due to node's damage, sensor's damage, RF communication and usually power failure. In this paper, we mentioned existing research works that deal with failure detection in the WSN. Eventually, we presented a comparative case-study of model-based approaches used for failure detection. We also mentioned popular simulation environments used for WSNs. And finally, we showed a case-based simulation using NS-2. This work can be a good survey on Wireless Sensor Network main failures.
本文对无线传感器网络(WSN)系统中的主要故障进行了比较研究。使用这项新技术的应用最近有所增加,因为它具有连接物理世界和虚拟世界的巨大能力。无线传感器网络可以评估机器人或人类在技术上难以到达的位置。随着云计算加入到WSN中,我们期望看到一个被数万亿连接设备覆盖的世界,这些设备相互感知和共享数据信息。然而,由于节点损坏、传感器损坏、射频通信以及通常的电源故障,部署的许多部分都经历了高故障率。本文介绍了WSN故障检测方面的研究成果。最后,我们提出了一个基于模型的故障检测方法的比较案例研究。我们还提到了用于wsn的流行模拟环境。最后,我们展示了一个使用NS-2的基于案例的模拟。这项工作可以很好地调查无线传感器网络的主要故障。
{"title":"Failure detection on wireless sensor network based on comparative study","authors":"Ali Al-Dahoud, Rayene Doghmane, M. Fezari, Karima Boukari","doi":"10.1109/RISE.2017.8378140","DOIUrl":"https://doi.org/10.1109/RISE.2017.8378140","url":null,"abstract":"In this paper, we present a comparative study on the main faults in a Wireless Sensor Networks (WSN) system. The applications using this new technology have recently been increased due to its huge capacity to connect both the physical and the virtual worlds. WSNs allow assessing locations, which are technically hard to reach by robots or human. With Cloud computing added to the WSN, we expect to see a world covered with trillions of connected devices that sense and share data information with each other. However, many parts of the deployments experience high rates of failure due to node's damage, sensor's damage, RF communication and usually power failure. In this paper, we mentioned existing research works that deal with failure detection in the WSN. Eventually, we presented a comparative case-study of model-based approaches used for failure detection. We also mentioned popular simulation environments used for WSNs. And finally, we showed a case-based simulation using NS-2. This work can be a good survey on Wireless Sensor Network main failures.","PeriodicalId":166244,"journal":{"name":"2017 International Conference on Recent Innovations in Signal processing and Embedded Systems (RISE)","volume":"92 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125668497","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2017 International Conference on Recent Innovations in Signal processing and Embedded Systems (RISE)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1