首页 > 最新文献

2010 IEEE International Conference on Computational Intelligence and Computing Research最新文献

英文 中文
Network security and management 网络安全与管理
B. Singh
In the past few years government and military organizations have widely adopted LAN, WAN and Internet to take advantage of advancement in technology. Computers are integral part of everyday operations. Organizations depend on them. A computer failure will have a critical impact on the organization. The term “Security” brings to mind all shorts of issues that refer to data protection and prevention of unauthorised access. The common motives for computer crimes could be lure for money, revenge, terrorism, fun, recognition or curiosity. Information systems can be attacked by outsiders who may penetrate a computer system or by insiders who are authorised to use the resources but misuse their authorization. An attacker may disrupt the information system of an organization (active attack) or gain access to its sensitive information (passive attack). Although no direct damage is done in a passive attack, any leak in information could have drastic repercussions for the organization. In simple words, security can be defined as: protecting information system from intended access. The goal of network management is to provide users with a quality of service. To meet this goal, network services plan involve strategic and technical planning of engineering, operations and maintenance of the network. The field of network security and management is constantly undergoing changes in technology, applications and hence the need for continually changing skills set on the part of academics. We will try to cover the various points with respect to organizational structure, policies and techniques of network security and management. Impact of various factors including management has been discussed on network security.
在过去几年中,政府和军事组织广泛采用局域网、广域网和互联网,以利用技术的进步。计算机是日常操作中不可缺少的一部分。组织依赖于他们。计算机故障将对组织产生重大影响。“安全”一词让人想起所有涉及数据保护和防止未经授权访问的问题。计算机犯罪的常见动机可能是金钱诱惑、报复、恐怖主义、娱乐、认可或好奇心。信息系统可能受到入侵计算机系统的外部人员或被授权使用资源但滥用授权的内部人员的攻击。攻击者可以破坏组织的信息系统(主动攻击),也可以访问组织的敏感信息(被动攻击)。虽然被动攻击不会造成直接损害,但任何信息泄露都可能对组织造成严重影响。简单地说,安全可以定义为:保护信息系统不被有意的访问。网络管理的目标是为用户提供高质量的服务。为了实现这一目标,网络服务计划涉及网络工程、运营和维护的战略和技术规划。网络安全和管理领域在技术、应用方面不断发生变化,因此需要不断变化的学术技能。我们将尝试涵盖关于网络安全和管理的组织结构、政策和技术的各个方面。讨论了包括管理在内的各种因素对网络安全的影响。
{"title":"Network security and management","authors":"B. Singh","doi":"10.1109/iccic.2010.5705886","DOIUrl":"https://doi.org/10.1109/iccic.2010.5705886","url":null,"abstract":"In the past few years government and military organizations have widely adopted LAN, WAN and Internet to take advantage of advancement in technology. Computers are integral part of everyday operations. Organizations depend on them. A computer failure will have a critical impact on the organization. The term “Security” brings to mind all shorts of issues that refer to data protection and prevention of unauthorised access. The common motives for computer crimes could be lure for money, revenge, terrorism, fun, recognition or curiosity. Information systems can be attacked by outsiders who may penetrate a computer system or by insiders who are authorised to use the resources but misuse their authorization. An attacker may disrupt the information system of an organization (active attack) or gain access to its sensitive information (passive attack). Although no direct damage is done in a passive attack, any leak in information could have drastic repercussions for the organization. In simple words, security can be defined as: protecting information system from intended access. The goal of network management is to provide users with a quality of service. To meet this goal, network services plan involve strategic and technical planning of engineering, operations and maintenance of the network. The field of network security and management is constantly undergoing changes in technology, applications and hence the need for continually changing skills set on the part of academics. We will try to cover the various points with respect to organizational structure, policies and techniques of network security and management. Impact of various factors including management has been discussed on network security.","PeriodicalId":246468,"journal":{"name":"2010 IEEE International Conference on Computational Intelligence and Computing Research","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-01-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122445667","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
Impact of black hole attack on multicast in ad hoc network (IBAMA) 黑洞攻击对自组织网络(IBAMA)组播的影响
V. Palanisamy, P. Annadurai, S. Vijayalakshmi
In wireless and distributed nature of Ad hoc networks, security has become a more sophisticated problem than security in other networks, due to the open nature and the lack of infrastructure of such networks. This paper is based on Blackhole attack. This attack node first needs to invade into the multicast forwarding group. It then absorbs all the data packets in the network and drops fully or partially. So, that the destination node does not get the data packets fully and this will affect the packet delivery ratio (PDR). In this paper, the goal is to measure the impact of Balckhole attack and their node positions which affect the performance metrics of packet delivery with respect to three scenarios: Black hole attack node near sender, blackhole attack node near receiver and anywhere within the network. The performance of PDR with respect to above three scenarios is also compared.
在无线和分布式的Ad hoc网络中,由于这种网络的开放性和缺乏基础设施,安全性已经成为一个比其他网络更复杂的问题。本文是基于黑洞攻击的。该攻击节点首先需要入侵到组播转发组中。然后,它吸收网络中的所有数据包,并全部或部分丢弃。因此,目的节点不能完全获得数据包,这将影响数据包传递率(PDR)。在本文中,目标是测量黑洞攻击的影响及其节点位置对三种情况下数据包传输性能指标的影响:黑洞攻击节点靠近发送方,黑洞攻击节点靠近接收方和网络中的任何地方。还比较了PDR在上述三种情况下的性能。
{"title":"Impact of black hole attack on multicast in ad hoc network (IBAMA)","authors":"V. Palanisamy, P. Annadurai, S. Vijayalakshmi","doi":"10.1109/iccic.2010.5705762","DOIUrl":"https://doi.org/10.1109/iccic.2010.5705762","url":null,"abstract":"In wireless and distributed nature of Ad hoc networks, security has become a more sophisticated problem than security in other networks, due to the open nature and the lack of infrastructure of such networks. This paper is based on Blackhole attack. This attack node first needs to invade into the multicast forwarding group. It then absorbs all the data packets in the network and drops fully or partially. So, that the destination node does not get the data packets fully and this will affect the packet delivery ratio (PDR). In this paper, the goal is to measure the impact of Balckhole attack and their node positions which affect the performance metrics of packet delivery with respect to three scenarios: Black hole attack node near sender, blackhole attack node near receiver and anywhere within the network. The performance of PDR with respect to above three scenarios is also compared.","PeriodicalId":246468,"journal":{"name":"2010 IEEE International Conference on Computational Intelligence and Computing Research","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122723338","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
An enhanced algorithm for Character Segmentation in document image processing 文档图像处理中字符分割的改进算法
V. Manikandan, V. Venkatachalam, M. Kirthiga, K. Harini, N. Devarajan
Optical Character Recognition consists of various steps like skew detection, segmentation of columns, lines, words, and characters before feeding the isolated character to an optical character recognition system. Several methodologies are followed to perform these steps using conventional Hough Transformation. In this paper, a new algorithm is proposed to perform all those steps involved in document image processing. The algorithm is implemented for skew detection, column and line segmentation and Character Segmentation. This can be extended to all other steps like character recognition. The novelty of this approach lies in “the consideration of any image, as one formed by several black and white lines of various lengths and at various angles”. The pixel values of the binary image are stored in an array. All the pixel values in the array are compared with their horizontally adjacent pixel values, row by row, for the presence of collinear points (i.e., a line). It is done by detecting the continuity of either the white or black pixels accordingly. Once the continuity is detected, the starting and end coordinates are displayed as an intermediate result. A new image will be generated as a result, which indicates the pixel area of line, identified from the input image. The algorithm is applied for English and other regional languages.
光学字符识别包括各种步骤,如倾斜检测,分割列、行、词和字符,然后将孤立的字符输入光学字符识别系统。要使用传统的霍夫变换执行这些步骤,需要遵循几种方法。本文提出了一种新的算法来完成文档图像处理中涉及的所有步骤。该算法实现了倾斜检测、列线分割和字符分割。这可以扩展到所有其他步骤,如字符识别。这种方法的新颖之处在于“将任何图像视为由几条不同长度和不同角度的黑白线组成的图像”。二值图像的像素值存储在一个数组中。数组中的所有像素值与其水平相邻的像素值逐行比较,以确定是否存在共线点(即一条线)。它是通过检测相应的白色或黑色像素的连续性来完成的。一旦检测到连续性,开始和结束坐标将作为中间结果显示。结果将生成一个新的图像,该图像表示从输入图像中识别出的线的像素区域。该算法适用于英语和其他区域语言。
{"title":"An enhanced algorithm for Character Segmentation in document image processing","authors":"V. Manikandan, V. Venkatachalam, M. Kirthiga, K. Harini, N. Devarajan","doi":"10.1109/ICCIC.2010.5705728","DOIUrl":"https://doi.org/10.1109/ICCIC.2010.5705728","url":null,"abstract":"Optical Character Recognition consists of various steps like skew detection, segmentation of columns, lines, words, and characters before feeding the isolated character to an optical character recognition system. Several methodologies are followed to perform these steps using conventional Hough Transformation. In this paper, a new algorithm is proposed to perform all those steps involved in document image processing. The algorithm is implemented for skew detection, column and line segmentation and Character Segmentation. This can be extended to all other steps like character recognition. The novelty of this approach lies in “the consideration of any image, as one formed by several black and white lines of various lengths and at various angles”. The pixel values of the binary image are stored in an array. All the pixel values in the array are compared with their horizontally adjacent pixel values, row by row, for the presence of collinear points (i.e., a line). It is done by detecting the continuity of either the white or black pixels accordingly. Once the continuity is detected, the starting and end coordinates are displayed as an intermediate result. A new image will be generated as a result, which indicates the pixel area of line, identified from the input image. The algorithm is applied for English and other regional languages.","PeriodicalId":246468,"journal":{"name":"2010 IEEE International Conference on Computational Intelligence and Computing Research","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115680753","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Performance evaluation of GMSK modulated signal under Rician channel model 专家信道模型下GMSK调制信号的性能评价
Darshankumar C. Dalwadi, H. Soni
In this paper we have presented an effect of Rician channel model which is used to model the wireless channels. We have evaluated its channel effect on Minimum Shift keying modulation technique. We have also considered the Gaussian Minimum Shift keying modulation (GMSK) and carried out simulation with Rayleigh channel for comparison purpose. We have carried out simulation with MATLAB.
本文提出了一种用于对无线信道进行建模的无线信道模型。对其在最小移位键控调制技术中的信道效应进行了评价。我们还考虑了高斯最小移位键控调制(GMSK),并进行了模拟与瑞利信道进行比较。我们用MATLAB进行了仿真。
{"title":"Performance evaluation of GMSK modulated signal under Rician channel model","authors":"Darshankumar C. Dalwadi, H. Soni","doi":"10.1109/ICCIC.2010.5705875","DOIUrl":"https://doi.org/10.1109/ICCIC.2010.5705875","url":null,"abstract":"In this paper we have presented an effect of Rician channel model which is used to model the wireless channels. We have evaluated its channel effect on Minimum Shift keying modulation technique. We have also considered the Gaussian Minimum Shift keying modulation (GMSK) and carried out simulation with Rayleigh channel for comparison purpose. We have carried out simulation with MATLAB.","PeriodicalId":246468,"journal":{"name":"2010 IEEE International Conference on Computational Intelligence and Computing Research","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116952412","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A combined approach for degraded historical documents denoising using Curvelet and mathematical morphology 一种结合曲波和数学形态学的退化历史文献去噪方法
B. Gangamma, K. S. Murthy, G. C. P. Chandra, Shishir Kaushik, Saurabh Kumar
India is praised for its rich past and the culture. The rich heritage of the country has been carried over generations through the manuscripts and historic writings. A great deal of effort is being made to prevent their further degradation. A lot of research is also done in finding methods to digitize these documents so that they can be immortalized. But in order to achieve this, the noise in the documents (result of exposure to environmental factors and age) has to be eliminated. This paper deals with one such method aimed at denoising a degraded image. We describe a method to denoise an image using Curvelet and mathematical morphology. Proposed implementation offers reconstruction of the image from the degraded document and edge enhancement by eliminating background.
印度因其丰富的历史和文化而受到称赞。这个国家丰富的遗产通过手稿和历史著作代代相传。为防止其进一步退化,正在作出大量努力。人们还做了大量的研究,以寻找将这些文件数字化的方法,使它们能够永垂不朽。但为了实现这一点,必须消除文件中的噪声(暴露于环境因素和年龄的结果)。本文讨论了一种针对退化图像去噪的方法。本文描述了一种利用曲波和数学形态学对图像进行去噪的方法。提出了一种实现方法,从退化的文档中重建图像,并通过消除背景来增强边缘。
{"title":"A combined approach for degraded historical documents denoising using Curvelet and mathematical morphology","authors":"B. Gangamma, K. S. Murthy, G. C. P. Chandra, Shishir Kaushik, Saurabh Kumar","doi":"10.1109/ICCIC.2010.5705862","DOIUrl":"https://doi.org/10.1109/ICCIC.2010.5705862","url":null,"abstract":"India is praised for its rich past and the culture. The rich heritage of the country has been carried over generations through the manuscripts and historic writings. A great deal of effort is being made to prevent their further degradation. A lot of research is also done in finding methods to digitize these documents so that they can be immortalized. But in order to achieve this, the noise in the documents (result of exposure to environmental factors and age) has to be eliminated. This paper deals with one such method aimed at denoising a degraded image. We describe a method to denoise an image using Curvelet and mathematical morphology. Proposed implementation offers reconstruction of the image from the degraded document and edge enhancement by eliminating background.","PeriodicalId":246468,"journal":{"name":"2010 IEEE International Conference on Computational Intelligence and Computing Research","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125067434","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Speech enhancement in noisy environment using voice activity detection and wavelet thresholding 基于语音活动检测和小波阈值的噪声环境下语音增强
K. Borisagar, D. Kamdar, B. Sedani, G. R. Kulkarni
Voice activity detection (VAD) is an outstanding problem for speech transmission, enhancement and recognition. The variety and the varying nature of speech and background noise make it especially challenging. In the past years, many features emphasizing the differences between speech and noise have been proposed for their robustness. However an important problem in many areas of speech processing is the determination of presence of speech periods in a given signal. This task can be identified as a statistical hypothesis problem and its purpose is the determination to which category or class a given signal belongs. Also the classification task is often not as trivial as it appears since the increasing level of background noise leading to numerous detection errors. The selection of an adequate feature vector for signal detection and a robust decision rule is a challenging problem that affects the performance of VADs. Most algorithms are effective in numerous applications but often cause detection errors mainly due to the loss of discriminating power of the decision rule at lower SNRs. In this paper, it has been tried to extract the characteristics of noise by the VAD algorithm which can be used to smooth out the signal in silence part from the noisy environment. For further noise reduction signal then filtered in the wavelet domain using thresholding.
语音活动检测(VAD)是语音传输、增强和识别领域亟待解决的问题。语音和背景噪音的多样性和不同性质使其特别具有挑战性。在过去的几年里,许多强调语音和噪声之间差异的特征已经被提出,因为它们具有鲁棒性。然而,在语音处理的许多领域中,一个重要的问题是确定给定信号中是否存在语音周期。这个任务可以被确定为一个统计假设问题,其目的是确定给定信号属于哪个类别或类别。此外,分类任务往往不像它看起来那么微不足道,因为背景噪声水平的增加导致了许多检测错误。选择合适的信号检测特征向量和鲁棒决策规则是影响vad性能的一个具有挑战性的问题。大多数算法在许多应用中都是有效的,但在较低信噪比下,由于决策规则的鉴别能力的丧失,往往会导致检测错误。本文尝试用VAD算法提取噪声的特征,利用VAD算法从噪声环境中平滑出沉默部分的信号。为了进一步降低噪声,然后在小波域使用阈值滤波信号。
{"title":"Speech enhancement in noisy environment using voice activity detection and wavelet thresholding","authors":"K. Borisagar, D. Kamdar, B. Sedani, G. R. Kulkarni","doi":"10.1109/ICCIC.2010.5705834","DOIUrl":"https://doi.org/10.1109/ICCIC.2010.5705834","url":null,"abstract":"Voice activity detection (VAD) is an outstanding problem for speech transmission, enhancement and recognition. The variety and the varying nature of speech and background noise make it especially challenging. In the past years, many features emphasizing the differences between speech and noise have been proposed for their robustness. However an important problem in many areas of speech processing is the determination of presence of speech periods in a given signal. This task can be identified as a statistical hypothesis problem and its purpose is the determination to which category or class a given signal belongs. Also the classification task is often not as trivial as it appears since the increasing level of background noise leading to numerous detection errors. The selection of an adequate feature vector for signal detection and a robust decision rule is a challenging problem that affects the performance of VADs. Most algorithms are effective in numerous applications but often cause detection errors mainly due to the loss of discriminating power of the decision rule at lower SNRs. In this paper, it has been tried to extract the characteristics of noise by the VAD algorithm which can be used to smooth out the signal in silence part from the noisy environment. For further noise reduction signal then filtered in the wavelet domain using thresholding.","PeriodicalId":246468,"journal":{"name":"2010 IEEE International Conference on Computational Intelligence and Computing Research","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123324882","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Feature extraction for evaluation of Muscular Atrophy 肌萎缩症评估的特征提取
P. Pal, N. Mohanty, A. Kushwaha, B. Singh, B. Mazumdar, T. Gandhi
Electromyography (EMG) signal is electrical manifestation of neuromuscular activation by which physiological processes are accessible. The bio-mechanical phenomenon induces the muscle to generate force and produce movement and help to interact with the world. Classification of EMGs is a big challenge due to its non stationary nature. Various features like root mean square, spectrogram, kurtosis, entropy and power are extracted from EMG signals of isometric contraction of two different abnormalities namely ALS (Amyotrophic Lateral Sclerosis) which is coming under Neuropathy and Myopathy. The classification accuracy is found to be satisfactory to design EMG signal classifier for various applications like knowledge-based expert system design and disease diagnosis.
肌电图(EMG)信号是神经肌肉活动的电表现,通过它可以获得生理过程。生物机械现象诱导肌肉产生力量和运动,并帮助与世界互动。由于肌电信号的非平稳性,对其进行分类是一个很大的挑战。从肌萎缩性侧索硬化症(肌萎缩性侧索硬化症,肌萎缩性侧索硬化症,神经病变和肌病)两种不同异常的肌电信号中提取了等距收缩的均方根、谱图、峰度、熵和功率等特征。结果表明,所设计的肌电信号分类器具有较好的分类精度,可用于基于知识的专家系统设计和疾病诊断。
{"title":"Feature extraction for evaluation of Muscular Atrophy","authors":"P. Pal, N. Mohanty, A. Kushwaha, B. Singh, B. Mazumdar, T. Gandhi","doi":"10.1109/ICCIC.2010.5705757","DOIUrl":"https://doi.org/10.1109/ICCIC.2010.5705757","url":null,"abstract":"Electromyography (EMG) signal is electrical manifestation of neuromuscular activation by which physiological processes are accessible. The bio-mechanical phenomenon induces the muscle to generate force and produce movement and help to interact with the world. Classification of EMGs is a big challenge due to its non stationary nature. Various features like root mean square, spectrogram, kurtosis, entropy and power are extracted from EMG signals of isometric contraction of two different abnormalities namely ALS (Amyotrophic Lateral Sclerosis) which is coming under Neuropathy and Myopathy. The classification accuracy is found to be satisfactory to design EMG signal classifier for various applications like knowledge-based expert system design and disease diagnosis.","PeriodicalId":246468,"journal":{"name":"2010 IEEE International Conference on Computational Intelligence and Computing Research","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125541087","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
A feature based approach for license plate-recognition of Indian number plates 基于特征的印度车牌识别方法
C. Babu, T. Subramanian, Parasuraman Kumar
In this paper a method for vehicle license plate identification is implemented and analyzed, on the basis of a novel adaptive image segmentation technique conjunction with character recognition. A novel method for license plate localization based on texture and edge information is proposed. The whole process is divided into two parts: candidate extraction and candidate verification. In the first part, the license plate being extracted from complex environment, several candidate areas instead of one with the max texture information are extracted. In the second part, autocorrelation based binary image and projection algorithm are used to verify the plate candidates. Adaptive median filter is applied to remove the noise from the image. Image processing technique such as edge detection, thresholding, resampling and filtering have been used to locate and isolate the license plate and the characters. The system can recognize single line number plates under widely varying illumination conditions with a success rate of about 80%.
本文将一种新的自适应图像分割技术与字符识别相结合,实现并分析了一种车牌识别方法。提出了一种基于纹理和边缘信息的车牌定位方法。整个过程分为两个部分:候选项提取和候选项验证。在第一部分中,从复杂环境中提取车牌,提取多个候选区域而不是一个纹理信息最多的候选区域;第二部分采用基于自相关的二值图像和投影算法对候选车牌进行验证。采用自适应中值滤波去除图像中的噪声。利用边缘检测、阈值分割、重采样和滤波等图像处理技术对车牌和字符进行定位和分离。该系统可以在光照条件变化很大的情况下识别单行车牌,成功率约为80%。
{"title":"A feature based approach for license plate-recognition of Indian number plates","authors":"C. Babu, T. Subramanian, Parasuraman Kumar","doi":"10.1109/ICCIC.2010.5705907","DOIUrl":"https://doi.org/10.1109/ICCIC.2010.5705907","url":null,"abstract":"In this paper a method for vehicle license plate identification is implemented and analyzed, on the basis of a novel adaptive image segmentation technique conjunction with character recognition. A novel method for license plate localization based on texture and edge information is proposed. The whole process is divided into two parts: candidate extraction and candidate verification. In the first part, the license plate being extracted from complex environment, several candidate areas instead of one with the max texture information are extracted. In the second part, autocorrelation based binary image and projection algorithm are used to verify the plate candidates. Adaptive median filter is applied to remove the noise from the image. Image processing technique such as edge detection, thresholding, resampling and filtering have been used to locate and isolate the license plate and the characters. The system can recognize single line number plates under widely varying illumination conditions with a success rate of about 80%.","PeriodicalId":246468,"journal":{"name":"2010 IEEE International Conference on Computational Intelligence and Computing Research","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116463642","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 27
Mammogram image enhancement and segmentation 乳房x光图像增强与分割
K. Gandhi, M. Karnan
This paper proposes a image enhancement and segmentation method for mammographic images, which is based on the pixel intensity transformation, spatial filtering, edge detection, and region growing techniques. This method consists of two approaches. The first approach is applying intensity transformation, logarithmic transformation, contrast stretching, histogram equalization and spatial filtering techniques separately to enhance the mammogram images. In the second approach is applying edge detection operators, local and global thresholding techniques used to extract the suspicious regions from back ground tissue.
本文提出了一种基于像素强度变换、空间滤波、边缘检测和区域生长技术的乳腺x线图像增强与分割方法。这种方法包括两种方法。第一种方法是分别应用强度变换、对数变换、对比度拉伸、直方图均衡化和空间滤波技术对乳房x线图像进行增强。第二种方法是应用边缘检测算子、局部和全局阈值技术从背景组织中提取可疑区域。
{"title":"Mammogram image enhancement and segmentation","authors":"K. Gandhi, M. Karnan","doi":"10.1109/ICCIC.2010.5705895","DOIUrl":"https://doi.org/10.1109/ICCIC.2010.5705895","url":null,"abstract":"This paper proposes a image enhancement and segmentation method for mammographic images, which is based on the pixel intensity transformation, spatial filtering, edge detection, and region growing techniques. This method consists of two approaches. The first approach is applying intensity transformation, logarithmic transformation, contrast stretching, histogram equalization and spatial filtering techniques separately to enhance the mammogram images. In the second approach is applying edge detection operators, local and global thresholding techniques used to extract the suspicious regions from back ground tissue.","PeriodicalId":246468,"journal":{"name":"2010 IEEE International Conference on Computational Intelligence and Computing Research","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122500750","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Business intelligence: Identify valued customer from the data warehouse in financial institutions 商业智能:从金融机构的数据仓库中识别有价值的客户
A. Mahesh, Dr. S. N. Sivanandam
Business intelligence may be defined as a set of mathematical models and analysis methodologies that systematically exploit the available data to retrieve information and knowledge useful in supporting complex decision-making processes. A business intelligence environment offers decision makers information and knowledge derived from data processing, through the application of mathematical models and algorithms. In some instances, these may merely consist of the calculation of totals and percentages, while more fully developed analyses make use of advanced models for optimization, inductive learning and prediction.
商业智能可以被定义为一组数学模型和分析方法,它们系统地利用可用数据检索信息和知识,以支持复杂的决策过程。商业智能环境通过应用数学模型和算法,为决策者提供来自数据处理的信息和知识。在某些情况下,这些可能仅仅包括计算总数和百分比,而更充分发展的分析利用先进的模型进行优化、归纳学习和预测。
{"title":"Business intelligence: Identify valued customer from the data warehouse in financial institutions","authors":"A. Mahesh, Dr. S. N. Sivanandam","doi":"10.1109/ICCIC.2010.5705904","DOIUrl":"https://doi.org/10.1109/ICCIC.2010.5705904","url":null,"abstract":"Business intelligence may be defined as a set of mathematical models and analysis methodologies that systematically exploit the available data to retrieve information and knowledge useful in supporting complex decision-making processes. A business intelligence environment offers decision makers information and knowledge derived from data processing, through the application of mathematical models and algorithms. In some instances, these may merely consist of the calculation of totals and percentages, while more fully developed analyses make use of advanced models for optimization, inductive learning and prediction.","PeriodicalId":246468,"journal":{"name":"2010 IEEE International Conference on Computational Intelligence and Computing Research","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128978587","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2010 IEEE International Conference on Computational Intelligence and Computing Research
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1