首页 > 最新文献

2015 International Conference on Communications and Signal Processing (ICCSP)最新文献

英文 中文
4G protocol and architecture for BYOD over Cloud Computing 基于云计算的BYOD的4G协议和架构
Pub Date : 2015-04-02 DOI: 10.1109/ICCSP.2015.7322894
Aparna Bhat, Vishwanath Gojanur, Rajeshwari Hegde
The Fourth Generation communication systems have speeds higher than those of 3G and have a more complicated architecture dedicated and defined for handling such voluminous data and to accommodate more users. The architecture also employs a specified protocol stack, software defined network along with their own security issues for wireless applications and remote access. In this paper we are trying to present the protocol stack for the 4G architecture and network, with particular applications directed towards BYOD and Cloud Computing (Virtual Networking).
第四代通信系统的速度比3G更快,并且具有更复杂的体系结构,专门用于处理如此大量的数据并容纳更多的用户。该体系结构还采用了指定的协议栈、软件定义的网络以及它们自己的无线应用程序和远程访问的安全问题。在本文中,我们试图展示4G架构和网络的协议栈,以及针对BYOD和云计算(虚拟网络)的特定应用。
{"title":"4G protocol and architecture for BYOD over Cloud Computing","authors":"Aparna Bhat, Vishwanath Gojanur, Rajeshwari Hegde","doi":"10.1109/ICCSP.2015.7322894","DOIUrl":"https://doi.org/10.1109/ICCSP.2015.7322894","url":null,"abstract":"The Fourth Generation communication systems have speeds higher than those of 3G and have a more complicated architecture dedicated and defined for handling such voluminous data and to accommodate more users. The architecture also employs a specified protocol stack, software defined network along with their own security issues for wireless applications and remote access. In this paper we are trying to present the protocol stack for the 4G architecture and network, with particular applications directed towards BYOD and Cloud Computing (Virtual Networking).","PeriodicalId":174192,"journal":{"name":"2015 International Conference on Communications and Signal Processing (ICCSP)","volume":"104 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122571474","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
To evaluate aggregate interference for underlay cognitive radio network 评估底层认知无线网络的综合干扰
Pub Date : 2015-04-02 DOI: 10.1109/ICCSP.2015.7322873
Anirudh Ranga
In this paper we try to evaluate the aggregate interference on a primary user caused by random number of cognitive radios (secondary users). Some parameters like path loss, Rayleigh fading and shadowing are also studied. The Moment generating function and gamma approximation are in its exact and approximated form, which are calculated for measurement of interference power.
在本文中,我们试图评估随机数量的认知无线电(辅助用户)对主用户造成的总干扰。对路径损失、瑞利衰落和阴影等参数进行了研究。矩产生函数和伽马近似具有精确和近似的形式,用于测量干扰功率。
{"title":"To evaluate aggregate interference for underlay cognitive radio network","authors":"Anirudh Ranga","doi":"10.1109/ICCSP.2015.7322873","DOIUrl":"https://doi.org/10.1109/ICCSP.2015.7322873","url":null,"abstract":"In this paper we try to evaluate the aggregate interference on a primary user caused by random number of cognitive radios (secondary users). Some parameters like path loss, Rayleigh fading and shadowing are also studied. The Moment generating function and gamma approximation are in its exact and approximated form, which are calculated for measurement of interference power.","PeriodicalId":174192,"journal":{"name":"2015 International Conference on Communications and Signal Processing (ICCSP)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122677831","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
OCDMA technique with the switching of code between the users for enhancing the security OCDMA技术通过用户间的码交换来提高安全性
Pub Date : 2015-04-02 DOI: 10.1109/ICCSP.2015.7322692
S. Gupta, Aditya Goel
A new technique is proposed for optical code division multiple accesses for enhancing the security against the eavesdropper. Switching of the pulse spectrum of code is performed between the two users and switching position of the pulse spectrum of code varies from group to group. In this technique every pulse of a code does not have direct information. Code detection probability of individual user decreases against the eavesdropper. The analysis and simulation result compares with the exiting method MQC, RD and MDW code.
为了提高防窃听的安全性,提出了一种新的光码分多址技术。代码脉冲频谱的切换在两个用户之间进行,并且代码脉冲频谱的切换位置因组而异。在这种技术中,代码的每个脉冲都没有直接信息。个体用户对窃听者的代码检测概率降低。分析和仿真结果与现有的MQC、RD和MDW代码进行了比较。
{"title":"OCDMA technique with the switching of code between the users for enhancing the security","authors":"S. Gupta, Aditya Goel","doi":"10.1109/ICCSP.2015.7322692","DOIUrl":"https://doi.org/10.1109/ICCSP.2015.7322692","url":null,"abstract":"A new technique is proposed for optical code division multiple accesses for enhancing the security against the eavesdropper. Switching of the pulse spectrum of code is performed between the two users and switching position of the pulse spectrum of code varies from group to group. In this technique every pulse of a code does not have direct information. Code detection probability of individual user decreases against the eavesdropper. The analysis and simulation result compares with the exiting method MQC, RD and MDW code.","PeriodicalId":174192,"journal":{"name":"2015 International Conference on Communications and Signal Processing (ICCSP)","volume":"335 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122750190","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Design of parallel FFT architecture using Cooley Tukey algorithm 基于Cooley Tukey算法的并行FFT架构设计
Pub Date : 2015-04-02 DOI: 10.1109/ICCSP.2015.7322551
Ruchira Shirbhate, T. Panse, Chetan Ralekar
In this paper, a parallel FFT architecture is proposed to give an efficient throughput and less energy consumption with the help of Cooley Tukey algorithm for radix 8. In this algorithm the DFT of N size is divided into smaller sizes of N/2 and repeated until final DFT scalars are found. It divides the DFT in even index and odd index term. The computation time which is calculated by the pre defined formula (Nlog2(N)) is reduced by the use of parallel architecture. Energy is defined as power used per unit time. Parallel architecture helps to perform number of operations simultaneously. As less time is required, the energy is efficiency is increased. The aim of this paper is to check throughput and efficiency using Cooley Tukey algorithm for higher radix. The recent trends of this algorithm is development of FPGA that is Field Programmable Gate Array as it can perform signal processing tasks in parallel, execute pipeline structure as well as speed up the computation of tedious algorithms. The main advantage of Cooley Tukey algorithm is that it reduces arithmetic computations as well as fast processing. As this algorithm divides the DFT into smaller DFTs, it can be combined with any other algorithm simultaneously.
本文提出了一种并行FFT架构,利用基数为8的Cooley Tukey算法提供高效的吞吐量和更低的能耗。在该算法中,N大小的DFT被分成N/2大小的较小的DFT,并重复,直到找到最终的DFT标量。它将DFT分成偶数项和奇数项。通过采用并行结构,减少了按预定义公式(Nlog2(N))计算的计算时间。能量的定义是每单位时间所使用的功率。并行架构有助于同时执行多个操作。由于所需的时间更少,能源效率提高了。本文的目的是检验库利-图基算法在高基数情况下的吞吐量和效率。FPGA即现场可编程门阵列(Field Programmable Gate Array)的发展是该算法的最新发展趋势,因为它可以并行地完成信号处理任务,执行流水线结构,加快繁琐算法的计算速度。Cooley - Tukey算法的主要优点是减少了算法计算量,处理速度快。由于该算法将DFT分解成更小的DFT,因此可以与任何其他算法同时组合。
{"title":"Design of parallel FFT architecture using Cooley Tukey algorithm","authors":"Ruchira Shirbhate, T. Panse, Chetan Ralekar","doi":"10.1109/ICCSP.2015.7322551","DOIUrl":"https://doi.org/10.1109/ICCSP.2015.7322551","url":null,"abstract":"In this paper, a parallel FFT architecture is proposed to give an efficient throughput and less energy consumption with the help of Cooley Tukey algorithm for radix 8. In this algorithm the DFT of N size is divided into smaller sizes of N/2 and repeated until final DFT scalars are found. It divides the DFT in even index and odd index term. The computation time which is calculated by the pre defined formula (Nlog2(N)) is reduced by the use of parallel architecture. Energy is defined as power used per unit time. Parallel architecture helps to perform number of operations simultaneously. As less time is required, the energy is efficiency is increased. The aim of this paper is to check throughput and efficiency using Cooley Tukey algorithm for higher radix. The recent trends of this algorithm is development of FPGA that is Field Programmable Gate Array as it can perform signal processing tasks in parallel, execute pipeline structure as well as speed up the computation of tedious algorithms. The main advantage of Cooley Tukey algorithm is that it reduces arithmetic computations as well as fast processing. As this algorithm divides the DFT into smaller DFTs, it can be combined with any other algorithm simultaneously.","PeriodicalId":174192,"journal":{"name":"2015 International Conference on Communications and Signal Processing (ICCSP)","volume":"340 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122545095","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Design and implementation of complex arithmetic operations using binary logarithmic number system 利用二进制对数数制设计和实现复杂的算术运算
Pub Date : 2015-04-02 DOI: 10.1109/ICCSP.2015.7322734
Pravin S. Kapgate, S. Gugulothu
Now a day's various real time applications and image processing applications requires hardware that can perform various complex arithmetic operations. These operations can be performed by using binary logarithmic number system. This paper includes binary logarithmic circuit based on FPGA. Above architecture uses combinational logic circuit elements and fixed point data path number format. The architecture is able to calculate the logarithm of integer number, fractional number and integer fractional number. This architecture is designed in Xilinx Virtex-5 device. This architecture consumes minimal FPGA resources that are shown by device utilization summary. Finally error analysis is done which shows that architecture has minimal number of errors considering fractional number and fixed point numbers.
现在每天的各种实时应用和图像处理应用都需要硬件能够执行各种复杂的算术运算。这些运算可以用二进制对数数制来完成。本文介绍了基于FPGA的二进制对数电路。上述架构采用组合逻辑电路元件和定点数据路径数格式。该体系结构能够计算整数、小数和整数小数的对数。该架构是在Xilinx Virtex-5设备上设计的。该架构消耗最小的FPGA资源,由设备利用率摘要显示。最后进行了误差分析,表明该结构在考虑分数点数和定点数的情况下误差最小。
{"title":"Design and implementation of complex arithmetic operations using binary logarithmic number system","authors":"Pravin S. Kapgate, S. Gugulothu","doi":"10.1109/ICCSP.2015.7322734","DOIUrl":"https://doi.org/10.1109/ICCSP.2015.7322734","url":null,"abstract":"Now a day's various real time applications and image processing applications requires hardware that can perform various complex arithmetic operations. These operations can be performed by using binary logarithmic number system. This paper includes binary logarithmic circuit based on FPGA. Above architecture uses combinational logic circuit elements and fixed point data path number format. The architecture is able to calculate the logarithm of integer number, fractional number and integer fractional number. This architecture is designed in Xilinx Virtex-5 device. This architecture consumes minimal FPGA resources that are shown by device utilization summary. Finally error analysis is done which shows that architecture has minimal number of errors considering fractional number and fixed point numbers.","PeriodicalId":174192,"journal":{"name":"2015 International Conference on Communications and Signal Processing (ICCSP)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114190179","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Efficient ranking based on web page importance and personalized search 基于网页重要性和个性化搜索的高效排名
Pub Date : 2015-04-02 DOI: 10.1109/ICCSP.2015.7322671
Mercy Paul Selvan, A. Shekar, D. R. Babu, A. Teja
This paper is focused on computing importance of a web page in an efficient way. Web page ranking is an essential factor in web search. Many modules and algorithms have been proposed using different resources with different assumptions. The algorithms proposed include Page Rank, Browse Rank, Browse Rank Plus, HITS and many more. Page Rank focuses on ranking a page based on the number of inlinks and outlinks to a page. Whereas Browse Rank focuses on ranking the page based on the value it provides to the user. Several other algorithms have been proposed since, that focuses only on one or two particular factors. This paper proposes ranking a page based on multiple factors that includes reachability, value and user feedback. The major aim is to rank a web page based on these three crucial factors rather than considering one or two factors taken into account by existing methodologies. Every user has a different and unique background and a particular aim when searching for information on the Web. Web search personalization is mainly aimed at tailoring search results to a specific user based on that user's interests and preferences. Major challenges that effective personalized search is affected with includes accurately identifying the user context and organizing the information in such a way that it matches the particular context. An effective mechanism is employed to personalize the search and also to rank the page based on multiple factors.
本文主要研究网页重要性的有效计算方法。网页排名是网页搜索的一个重要因素。许多模块和算法被提出使用不同的资源和不同的假设。提出的算法包括页面排名,浏览排名,浏览排名加上,HITS等等。页面排名侧重于根据页面的链接和外链数量对页面进行排名。而浏览排名则侧重于根据页面提供给用户的价值对页面进行排名。自那以后,人们又提出了其他几种算法,它们只关注一两个特定的因素。本文提出基于可达性、价值和用户反馈等多种因素对页面进行排名。主要目的是基于这三个关键因素对网页进行排名,而不是考虑现有方法中考虑的一两个因素。每个用户在网络上搜索信息时都有不同的、独特的背景和特定的目的。Web搜索个性化的主要目的是根据用户的兴趣和偏好为特定用户定制搜索结果。有效的个性化搜索所面临的主要挑战包括准确地识别用户上下文,并以与特定上下文相匹配的方式组织信息。采用了一种有效的机制来个性化搜索,并根据多个因素对页面进行排名。
{"title":"Efficient ranking based on web page importance and personalized search","authors":"Mercy Paul Selvan, A. Shekar, D. R. Babu, A. Teja","doi":"10.1109/ICCSP.2015.7322671","DOIUrl":"https://doi.org/10.1109/ICCSP.2015.7322671","url":null,"abstract":"This paper is focused on computing importance of a web page in an efficient way. Web page ranking is an essential factor in web search. Many modules and algorithms have been proposed using different resources with different assumptions. The algorithms proposed include Page Rank, Browse Rank, Browse Rank Plus, HITS and many more. Page Rank focuses on ranking a page based on the number of inlinks and outlinks to a page. Whereas Browse Rank focuses on ranking the page based on the value it provides to the user. Several other algorithms have been proposed since, that focuses only on one or two particular factors. This paper proposes ranking a page based on multiple factors that includes reachability, value and user feedback. The major aim is to rank a web page based on these three crucial factors rather than considering one or two factors taken into account by existing methodologies. Every user has a different and unique background and a particular aim when searching for information on the Web. Web search personalization is mainly aimed at tailoring search results to a specific user based on that user's interests and preferences. Major challenges that effective personalized search is affected with includes accurately identifying the user context and organizing the information in such a way that it matches the particular context. An effective mechanism is employed to personalize the search and also to rank the page based on multiple factors.","PeriodicalId":174192,"journal":{"name":"2015 International Conference on Communications and Signal Processing (ICCSP)","volume":"92 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114482718","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Verification of memory transactions in AXI protocol using system verilog approach 使用系统verilog方法验证AXI协议中的内存事务
Pub Date : 2015-04-02 DOI: 10.1109/ICCSP.2015.7322617
G. Mahesh, S. Sakthivel
This paper mainly focuses on verifying the important features of advanced extensible interface (AXI). Verifying the memory transactions of AXI includes the verification of all the five channels write address, write data, write response, read address and read data. In this work a Verification Intellectual Property cores (VIP) based methodology is used to carry out the verification Process. In the VIP design the entire test environment is modeled using system verilog and the read, write transactions from the same and different memory locations has been verified with the quantitative values of Busy Count, Valid Count and its Bus Utilization. Verifying the System connectivity during write and read cycles is also one of the fundamental features verified in this paper.
本文主要对高级可扩展接口(AXI)的重要特性进行了验证。验证AXI的内存事务包括验证所有五个通道的写地址、写数据、写响应、读地址和读数据。本文采用一种基于验证知识产权核心(VIP)的方法来进行验证过程。在VIP设计中,使用系统verilog对整个测试环境进行了建模,并使用Busy Count, Valid Count及其Bus Utilization的定量值验证了来自相同和不同内存位置的读、写事务。验证系统在读写周期中的连通性也是本文验证的基本特性之一。
{"title":"Verification of memory transactions in AXI protocol using system verilog approach","authors":"G. Mahesh, S. Sakthivel","doi":"10.1109/ICCSP.2015.7322617","DOIUrl":"https://doi.org/10.1109/ICCSP.2015.7322617","url":null,"abstract":"This paper mainly focuses on verifying the important features of advanced extensible interface (AXI). Verifying the memory transactions of AXI includes the verification of all the five channels write address, write data, write response, read address and read data. In this work a Verification Intellectual Property cores (VIP) based methodology is used to carry out the verification Process. In the VIP design the entire test environment is modeled using system verilog and the read, write transactions from the same and different memory locations has been verified with the quantitative values of Busy Count, Valid Count and its Bus Utilization. Verifying the System connectivity during write and read cycles is also one of the fundamental features verified in this paper.","PeriodicalId":174192,"journal":{"name":"2015 International Conference on Communications and Signal Processing (ICCSP)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116743687","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Transformer winding deformation diagnostics techniques with statistical approach 变压器绕组变形的统计诊断技术
Pub Date : 2015-04-02 DOI: 10.1109/ICCSP.2015.7322847
P. Jadhav
Monitoring the health of power transformer is important for the reliability of electrical power supply. Conventional tests carried out on power transformers can only detect damage of permanent nature. Frequency Response Analysis (FRA) is found to be a useful tool for reliable detection of incipient mechanical fault in a transformer. There are various methods of evaluating the frequency spectrum to confirm the presence of an incipient fault. In this paper two different mechanical fault are simulated i.e. axial displacements and radial deformations of winding. The lumped parameter model is used to simulate these mechanical faults and detected using TF. Since the TF method is a comparative method and the measured results should be compared with the reference results. A comparison shows that resonance frequency of TF curve depends upon type of fault and location of fault. Quantitative analysis of TFs is done using statistical method correlation coefficient as a complementary method. Therefore it is believed that this finding could be helpful in fault diagnosis in actual power transformer windings.
电力变压器的健康监测对供电的可靠性具有重要意义。对电力变压器进行的常规测试只能检测永久性损坏。频率响应分析(FRA)是一种可靠地检测变压器早期机械故障的有效工具。有各种评估频谱的方法来确认早期故障的存在。本文模拟了两种不同的机械故障,即绕组的轴向位移和径向变形。采用集总参数模型对这些机械故障进行模拟,并用TF进行检测。由于TF法是一种比较法,测量结果应与参考结果进行比较。对比表明,TF曲线的共振频率与故障类型和故障位置有关。利用统计学方法、相关系数作为辅助方法对TFs进行定量分析。因此,相信这一发现对实际电力变压器绕组的故障诊断有一定的帮助。
{"title":"Transformer winding deformation diagnostics techniques with statistical approach","authors":"P. Jadhav","doi":"10.1109/ICCSP.2015.7322847","DOIUrl":"https://doi.org/10.1109/ICCSP.2015.7322847","url":null,"abstract":"Monitoring the health of power transformer is important for the reliability of electrical power supply. Conventional tests carried out on power transformers can only detect damage of permanent nature. Frequency Response Analysis (FRA) is found to be a useful tool for reliable detection of incipient mechanical fault in a transformer. There are various methods of evaluating the frequency spectrum to confirm the presence of an incipient fault. In this paper two different mechanical fault are simulated i.e. axial displacements and radial deformations of winding. The lumped parameter model is used to simulate these mechanical faults and detected using TF. Since the TF method is a comparative method and the measured results should be compared with the reference results. A comparison shows that resonance frequency of TF curve depends upon type of fault and location of fault. Quantitative analysis of TFs is done using statistical method correlation coefficient as a complementary method. Therefore it is believed that this finding could be helpful in fault diagnosis in actual power transformer windings.","PeriodicalId":174192,"journal":{"name":"2015 International Conference on Communications and Signal Processing (ICCSP)","volume":"90 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116836492","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Efficient method of increase in isolation between patch antennas using metamaterial 利用超材料提高贴片天线间隔离度的有效方法
Pub Date : 2015-04-02 DOI: 10.1109/ICCSP.2015.7322869
A. Chauhan, R. Ramesh, Usha Kiran K
A broadband electrical metamaterial is proposed in this paper to improve the performance of microstrip antenna. With the help of metamaterial we can improve bandwidth of microstrip antenna as well as miniaturize it. The properties and applications of metamaterial, three half split ring resonator metamaterial and the performance of a system contributing two patch antennas separated by means of a metamaterial based surface at 9.6 GHz for multiple input and multiple output (MIMO) application is explained in this paper. The functioning of two air spaced patch antennas is studied for comparison with that of metamaterial spaced antennas.
为了提高微带天线的性能,本文提出了一种宽带电超材料。利用超材料可以提高微带天线的带宽,实现微带天线的小型化。本文阐述了超材料、三半分环谐振器超材料的特性和应用,以及9.6 GHz多输入多输出(MIMO)应用中使用基于超材料表面的两个贴片天线的系统性能。研究了两种空气间隔贴片天线的性能,并与超材料间隔贴片天线的性能进行了比较。
{"title":"Efficient method of increase in isolation between patch antennas using metamaterial","authors":"A. Chauhan, R. Ramesh, Usha Kiran K","doi":"10.1109/ICCSP.2015.7322869","DOIUrl":"https://doi.org/10.1109/ICCSP.2015.7322869","url":null,"abstract":"A broadband electrical metamaterial is proposed in this paper to improve the performance of microstrip antenna. With the help of metamaterial we can improve bandwidth of microstrip antenna as well as miniaturize it. The properties and applications of metamaterial, three half split ring resonator metamaterial and the performance of a system contributing two patch antennas separated by means of a metamaterial based surface at 9.6 GHz for multiple input and multiple output (MIMO) application is explained in this paper. The functioning of two air spaced patch antennas is studied for comparison with that of metamaterial spaced antennas.","PeriodicalId":174192,"journal":{"name":"2015 International Conference on Communications and Signal Processing (ICCSP)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129713073","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Face detection using data mining approach 基于数据挖掘的人脸检测方法
Pub Date : 2015-04-02 DOI: 10.1109/ICCSP.2015.7322542
Amol S. Jumde, S. Sonavane, R. Behera
Face detection has become a fundamental task in computer vision and pattern recognition applications. This paper describes a system for face detection using data mining approach. The proposed face detection method is a two phase process comprising of training and detection phase. In the training phase, training image is transformed into an edge and non-edge image. Maximal Frequent Itemset Algorithm (MAFIA) is used to mine positive and negative feature patterns from edge and non-edge images respectively. Based on the feature patterns mined, a face detector is constructed to prune non-face candidates. In the detection phase, sliding window approach is applied to the test image in different scales. Experimental results on FEI face database show good performance even across different orientations, pose and expression variations to a certain extent.
人脸检测已经成为计算机视觉和模式识别应用中的一项基本任务。本文介绍了一种基于数据挖掘的人脸检测系统。所提出的人脸检测方法分为训练和检测两个阶段。在训练阶段,将训练图像变换为边缘图像和非边缘图像。利用最大频繁项集算法(maximum frequency Itemset Algorithm, MAFIA)分别从边缘和非边缘图像中挖掘正、负特征模式。基于所挖掘的特征模式,构造一个人脸检测器来修剪非人脸候选图像。在检测阶段,对不同尺度的测试图像采用滑动窗口方法。在FEI人脸数据库上的实验结果表明,即使在不同的方向、姿态和表情变化下,也有一定程度的良好性能。
{"title":"Face detection using data mining approach","authors":"Amol S. Jumde, S. Sonavane, R. Behera","doi":"10.1109/ICCSP.2015.7322542","DOIUrl":"https://doi.org/10.1109/ICCSP.2015.7322542","url":null,"abstract":"Face detection has become a fundamental task in computer vision and pattern recognition applications. This paper describes a system for face detection using data mining approach. The proposed face detection method is a two phase process comprising of training and detection phase. In the training phase, training image is transformed into an edge and non-edge image. Maximal Frequent Itemset Algorithm (MAFIA) is used to mine positive and negative feature patterns from edge and non-edge images respectively. Based on the feature patterns mined, a face detector is constructed to prune non-face candidates. In the detection phase, sliding window approach is applied to the test image in different scales. Experimental results on FEI face database show good performance even across different orientations, pose and expression variations to a certain extent.","PeriodicalId":174192,"journal":{"name":"2015 International Conference on Communications and Signal Processing (ICCSP)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129024942","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2015 International Conference on Communications and Signal Processing (ICCSP)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1