首页 > 最新文献

2016 Second International Conference on Science Technology Engineering and Management (ICONSTEM)最新文献

英文 中文
Renewable energy source selection using analytical hierarchy process and quality function deployment: A case study 基于层次分析法和质量功能部署的可再生能源选择:一个案例研究
Ajitesh Das, Shabbiruddin
Selection of renewable energy sources is an important strategic decision making problem for both private and public sectors. In general varied factors affect the appropriate source selection problem which adheres to uncertain and imprecise data. In this paper the integrated Analytical Hierarchy Process (AHP) - Quality Function Deployment (QFD) model is used to determine the most viable renewable energy source for the state of Maharashtra. The QFD method has been used to determine the most preferred energy source from the customer's point of view considering the technical factors. Six technical factors have been considered for the case study in ranking the sources of renewable energy. The purpose of using the AHP criteria was to have a holistic selection procedure to aid in the justification of selection of renewable energy source. The proposed integrated approach provides more truthful and steadfast results, and facilitates the decision maker to manage multiple opposing decision perspectives through eliminating the limitations of AHP and QFD method.
可再生能源的选择对私营和公共部门来说都是一个重要的战略决策问题。在一般情况下,各种因素影响适当的源选择问题,坚持不确定和不精确的数据。本文采用综合层次分析法(AHP) -质量功能部署(QFD)模型来确定马哈拉施特拉邦最可行的可再生能源。QFD方法已被用于从客户的角度考虑技术因素来确定最优选的能源。在对可再生能源进行排名时,案例研究考虑了六个技术因素。使用层次分析法标准的目的是有一个整体的选择程序,以帮助选择可再生能源的理由。本文提出的综合方法通过消除AHP和QFD方法的局限性,使结果更加真实可靠,便于决策者管理多个对立的决策视角。
{"title":"Renewable energy source selection using analytical hierarchy process and quality function deployment: A case study","authors":"Ajitesh Das, Shabbiruddin","doi":"10.1109/ICONSTEM.2016.7560966","DOIUrl":"https://doi.org/10.1109/ICONSTEM.2016.7560966","url":null,"abstract":"Selection of renewable energy sources is an important strategic decision making problem for both private and public sectors. In general varied factors affect the appropriate source selection problem which adheres to uncertain and imprecise data. In this paper the integrated Analytical Hierarchy Process (AHP) - Quality Function Deployment (QFD) model is used to determine the most viable renewable energy source for the state of Maharashtra. The QFD method has been used to determine the most preferred energy source from the customer's point of view considering the technical factors. Six technical factors have been considered for the case study in ranking the sources of renewable energy. The purpose of using the AHP criteria was to have a holistic selection procedure to aid in the justification of selection of renewable energy source. The proposed integrated approach provides more truthful and steadfast results, and facilitates the decision maker to manage multiple opposing decision perspectives through eliminating the limitations of AHP and QFD method.","PeriodicalId":256750,"journal":{"name":"2016 Second International Conference on Science Technology Engineering and Management (ICONSTEM)","volume":"2009 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129509943","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Relay coordination for distribution system 配电系统继电器协调
K. Anupreyaa, T. C. Sabari Karthiga
In power system protection relay and circuit breakers is the major instrument for large interconnected power system. We need proper protection to isolate the faulted region from healthier network. When two protective apparatus installed in series have certain characteristics, which provide a specified operating sequence, they are said to be coordinated or selective. The objective of protective relay coordination is to achieve selectivity without loosening sensitivity and quick fault clearance time. Relay coordination is an important aspect in the protection system design as coordination schemes must guarantee fast, selective, and reliable relay operation to isolate the power system faulted sections. Thus the relay coordination problem is formulated, for a real time distribution system is simulated using ETAP.
在电力系统中,继电保护和断路器是大型互联电力系统的主要保护装置。我们需要适当的保护,将故障区域与健康网络隔离开来。当串联安装的两个保护装置具有一定的特性,并提供了规定的操作顺序时,我们称它们是协调的或选择性的。保护继电器协调的目标是在不松动灵敏度的情况下实现选择性和快速的故障清除时间。继电保护协调是保护系统设计中的一个重要方面,协调方案必须保证继电保护的快速、选择性和可靠运行,以隔离电力系统的故障区段。在此基础上提出了继电器协调问题,并利用ETAP对实时配电系统进行了仿真。
{"title":"Relay coordination for distribution system","authors":"K. Anupreyaa, T. C. Sabari Karthiga","doi":"10.1109/ICONSTEM.2016.7560973","DOIUrl":"https://doi.org/10.1109/ICONSTEM.2016.7560973","url":null,"abstract":"In power system protection relay and circuit breakers is the major instrument for large interconnected power system. We need proper protection to isolate the faulted region from healthier network. When two protective apparatus installed in series have certain characteristics, which provide a specified operating sequence, they are said to be coordinated or selective. The objective of protective relay coordination is to achieve selectivity without loosening sensitivity and quick fault clearance time. Relay coordination is an important aspect in the protection system design as coordination schemes must guarantee fast, selective, and reliable relay operation to isolate the power system faulted sections. Thus the relay coordination problem is formulated, for a real time distribution system is simulated using ETAP.","PeriodicalId":256750,"journal":{"name":"2016 Second International Conference on Science Technology Engineering and Management (ICONSTEM)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130064971","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Palm print recognition using liveness detection technique 基于活体检测技术的掌纹识别
D. Aishwarya, M. Gowri, R. Saranya
Biometric based identification (or biometric authentication) is one of the fields emerging recently, used as a form of identification and access control in various places. Biometric authentication uses many different aspects of human behavior and physiology. History of threats, failures and spoofs have been recorded for biometric authentication, that seems to indicate that their authentication quality has not yet met the expectation. There are various threats known, of which the so called direct or spoofing attacks, have motivated the need to study the vulnerable points against this type of fraudulent actions. Number of systems exist for biometric detection with anti spoofing methods. But due to increase in spoofing techniques these anti spoofing methods become less efficient. This paper presents a system, that is based on palm print recognition. Palm Print is chosen since it is feature rich and less likely to destruction. The system presented detects the bio metric traits using Liveness detection method and after enhancing the trait using weber's local descriptor algorithm. The proposed system is not specific to any spoofing method. It assess the image quality to detect if the trait is real or fake one. And Euclidean distance formula is used for authentication to reduce both false rejection and false acceptance rate.
基于生物特征的身份识别(或生物特征认证)是近年来新兴的领域之一,作为一种身份识别和访问控制的形式在许多地方使用。生物识别认证使用了人类行为和生理的许多不同方面。生物识别认证的威胁、失败和欺骗历史已经被记录下来,这似乎表明他们的认证质量还没有达到预期。已知的各种威胁,其中所谓的直接攻击或欺骗攻击,促使人们有必要研究针对此类欺诈行为的弱点。许多系统存在与反欺骗方法的生物特征检测。但是随着欺骗技术的发展,这些防欺骗方法的效率越来越低。本文提出了一个基于掌纹识别的系统。之所以选择Palm Print,是因为它具有丰富的特征,而且不易被破坏。该系统采用活体检测方法对生物特征特征进行检测,并利用韦伯局部描述子算法对特征特征进行增强。所提出的系统不针对任何欺骗方法。它通过评估图像质量来检测特征是真的还是假的。采用欧几里得距离公式进行认证,降低了误拒率和误接受率。
{"title":"Palm print recognition using liveness detection technique","authors":"D. Aishwarya, M. Gowri, R. Saranya","doi":"10.1109/ICONSTEM.2016.7560933","DOIUrl":"https://doi.org/10.1109/ICONSTEM.2016.7560933","url":null,"abstract":"Biometric based identification (or biometric authentication) is one of the fields emerging recently, used as a form of identification and access control in various places. Biometric authentication uses many different aspects of human behavior and physiology. History of threats, failures and spoofs have been recorded for biometric authentication, that seems to indicate that their authentication quality has not yet met the expectation. There are various threats known, of which the so called direct or spoofing attacks, have motivated the need to study the vulnerable points against this type of fraudulent actions. Number of systems exist for biometric detection with anti spoofing methods. But due to increase in spoofing techniques these anti spoofing methods become less efficient. This paper presents a system, that is based on palm print recognition. Palm Print is chosen since it is feature rich and less likely to destruction. The system presented detects the bio metric traits using Liveness detection method and after enhancing the trait using weber's local descriptor algorithm. The proposed system is not specific to any spoofing method. It assess the image quality to detect if the trait is real or fake one. And Euclidean distance formula is used for authentication to reduce both false rejection and false acceptance rate.","PeriodicalId":256750,"journal":{"name":"2016 Second International Conference on Science Technology Engineering and Management (ICONSTEM)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124997846","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Improved discovery of rating fake for cellular apps 改进了手机应用的虚假评级发现
Navdeep Singh, Prashant Pandey, Srinivasan
Improvising the capability of searching fake rating for mobile applications. Basically the process done is completely based on reviews and rating but while the process is going on each and every review is important so that we can get a good qualitative application. In such a situation a comprehensive view of ranking fake is provided as well as suggests a ranking fake detection for cellular applications. Specifically the initial suggestion would be to appropriately locate the fake ranking by the means of mining of the active intervals, specifically leading classes, of cell apps. The rating of a particular application is basically given by the app user reviews which may be good or bad, post which the bad as well as good reviews are measured and observed in terms of originality post which the positive rating apps will be shown at the top on the leader board. In the meanwhile finding the fake reviews, the near estimation of the reviews and rating percentage is calculated based on a systematic procedure. In such main sessions can be taken as advantage for detecting the near by abnormality rather than international abnormality of App ratings. Furthermore while making an analysis three types of evidences are found which include ranking primarily based authentication, rating based authentication and evaluate primarily based authentication by modelling Applications rating and evaluation behaviour via statistical hypotheses exams. In the same manner endorsement of an optimization based aggregation is done by the method of combining all the evidences for fake detection. Thus in the rating on reviews are calculated by the best reviews given by the user while that same app user used that particular app and they know about the minute details of the working of the app and the structural behaviour of that application. The calculation of the proposed machine with the real time Global App information is collected from the IOS App keeping for a long period. While doing the practical's where ever the user reviews are fake it may cause for a user to select a bad as well as a useful app for reducing the disadvantage could be used in this process.
即兴搜索虚假评级的移动应用程序的能力。基本上,完成的过程完全是基于评论和评级的,但在这个过程中,每一个评论都很重要,这样我们才能得到一个好的定性应用程序。在这种情况下,提供了假排名的综合视图,并建议了用于蜂窝应用的假排名检测。具体来说,最初的建议是通过挖掘手机应用的活动间隔,特别是领先类别,来适当地定位虚假排名。特定应用的评级基本上是由应用用户的评论给出的,这些评论可能是好的或坏的,差评和好评是根据原创性来衡量和观察的,好评的应用将显示在排行榜的顶部。在发现虚假评论的同时,根据系统的程序计算出评论的近似估计和评分百分比。在这样的主要会议中,可以利用这些会议来检测应用评级的近距离异常,而不是国际异常。此外,在进行分析时,发现了三种类型的证据,包括基于排名的认证,基于评级的认证和基于评估的认证,通过统计假设检验建模应用程序评级和评估行为。以同样的方式,对基于优化的聚合的认可是通过将所有证据结合起来进行虚假检测的方法来完成的。因此,在评论评级中,是根据用户给出的最佳评论来计算的,而同一用户使用该特定应用,他们知道该应用的工作细节和该应用的结构行为。建议机器的计算与实时全局应用程序信息是从IOS应用程序长期保存中收集的。当用户评价是虚假的时候,在这个过程中可能会导致用户选择一个坏的和有用的应用来减少缺点。
{"title":"Improved discovery of rating fake for cellular apps","authors":"Navdeep Singh, Prashant Pandey, Srinivasan","doi":"10.1109/ICONSTEM.2016.7560938","DOIUrl":"https://doi.org/10.1109/ICONSTEM.2016.7560938","url":null,"abstract":"Improvising the capability of searching fake rating for mobile applications. Basically the process done is completely based on reviews and rating but while the process is going on each and every review is important so that we can get a good qualitative application. In such a situation a comprehensive view of ranking fake is provided as well as suggests a ranking fake detection for cellular applications. Specifically the initial suggestion would be to appropriately locate the fake ranking by the means of mining of the active intervals, specifically leading classes, of cell apps. The rating of a particular application is basically given by the app user reviews which may be good or bad, post which the bad as well as good reviews are measured and observed in terms of originality post which the positive rating apps will be shown at the top on the leader board. In the meanwhile finding the fake reviews, the near estimation of the reviews and rating percentage is calculated based on a systematic procedure. In such main sessions can be taken as advantage for detecting the near by abnormality rather than international abnormality of App ratings. Furthermore while making an analysis three types of evidences are found which include ranking primarily based authentication, rating based authentication and evaluate primarily based authentication by modelling Applications rating and evaluation behaviour via statistical hypotheses exams. In the same manner endorsement of an optimization based aggregation is done by the method of combining all the evidences for fake detection. Thus in the rating on reviews are calculated by the best reviews given by the user while that same app user used that particular app and they know about the minute details of the working of the app and the structural behaviour of that application. The calculation of the proposed machine with the real time Global App information is collected from the IOS App keeping for a long period. While doing the practical's where ever the user reviews are fake it may cause for a user to select a bad as well as a useful app for reducing the disadvantage could be used in this process.","PeriodicalId":256750,"journal":{"name":"2016 Second International Conference on Science Technology Engineering and Management (ICONSTEM)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126202591","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Space vector pulse width modulation for DC-AC converter 空间矢量脉宽调制的DC-AC变换器
H. Sathishkumar, S. Parthasarathy
This paper deals about the concept of space vector pulse width modulation for DC-AC converter. Converter used here is nothing but a three phase inverter. Six pulses are generated for triggering switching devices used in the inverter. Based on these pulses inverter is delivering its three phase output voltage in the load terminals. Star connected resistive and capacitive load is used here in the inverter output. Two sinusoidal signals are used as input for this svpwm unit. Svpwm technique is one of the most recent trends in the pulse generation. Compared to conventional pwm and sinusoidal pwm this svpwm generates the precise pulses which is required for the three phase inverters. This svpwm generates the pulses based on the sector formation. Moreover output voltage of this inverter is formed with the reduced value total harmonic distortion.
本文讨论了空间矢量脉宽调制在DC-AC变换器中的应用。这里使用的转换器只不过是一个三相逆变器。产生6个脉冲,用于触发逆变器中使用的开关装置。逆变器根据这些脉冲在负载端输出三相电压。星形连接的电阻和电容负载在逆变器输出中使用。两个正弦信号被用作该svpwm单元的输入。Svpwm技术是脉冲产生的最新发展趋势之一。与传统的pwm和正弦pwm相比,这种svpwm产生三相逆变器所需的精确脉冲。该svpwm基于扇区形成产生脉冲。该逆变器的输出电压由总谐波失真的减小值构成。
{"title":"Space vector pulse width modulation for DC-AC converter","authors":"H. Sathishkumar, S. Parthasarathy","doi":"10.1109/ICONSTEM.2016.7560968","DOIUrl":"https://doi.org/10.1109/ICONSTEM.2016.7560968","url":null,"abstract":"This paper deals about the concept of space vector pulse width modulation for DC-AC converter. Converter used here is nothing but a three phase inverter. Six pulses are generated for triggering switching devices used in the inverter. Based on these pulses inverter is delivering its three phase output voltage in the load terminals. Star connected resistive and capacitive load is used here in the inverter output. Two sinusoidal signals are used as input for this svpwm unit. Svpwm technique is one of the most recent trends in the pulse generation. Compared to conventional pwm and sinusoidal pwm this svpwm generates the precise pulses which is required for the three phase inverters. This svpwm generates the pulses based on the sector formation. Moreover output voltage of this inverter is formed with the reduced value total harmonic distortion.","PeriodicalId":256750,"journal":{"name":"2016 Second International Conference on Science Technology Engineering and Management (ICONSTEM)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121083131","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Detection of flooded areas from multitemporal SAR images 基于多时相SAR图像的洪水区域检测
N. Kalpana, A. Sivasankar
Multi temporal synthetic aperture radar images are available, precise calibration and perfect spatial register are required to get a useful image for displaying changes that contain occurred. SAR calibration is a extremely complex and sensitive problem; a few errors may persist after calibration that interferes with subsequent steps in the data fusion and visualization process. Because of the non-Gaussian model of radar backscattering, traditional image pre processing procedures cannot be used here. To solve this problem “cross-calibration/normalization,” method can be used. In image enhancement and the numerical comparison of many image takes together with data fusion and visualization processes. The proposed processing which contain filtering, histogram truncation, and equalization steps and region growing and merging algorithm applied in an adaptive way to the images. RGB composition is used to combining an pre & post flood image or identify an flooded areas.
多时相合成孔径雷达图像是可用的,需要精确的标定和完美的空间配准,才能得到有用的图像来显示所发生的变化。SAR标定是一个极其复杂和敏感的问题;校准后可能会存在一些错误,干扰数据融合和可视化过程的后续步骤。由于雷达后向散射的非高斯模型,传统的图像预处理方法无法在此应用。为了解决这个问题,可以使用“交叉校准/归一化”方法。在图像增强和多幅图像的数值比较中结合了数据融合和可视化处理。该算法包括滤波、直方图截断、均衡化等步骤,并采用自适应的区域增长和融合算法对图像进行处理。RGB合成用于组合洪水前后的图像或识别洪水区域。
{"title":"Detection of flooded areas from multitemporal SAR images","authors":"N. Kalpana, A. Sivasankar","doi":"10.1109/ICONSTEM.2016.7560951","DOIUrl":"https://doi.org/10.1109/ICONSTEM.2016.7560951","url":null,"abstract":"Multi temporal synthetic aperture radar images are available, precise calibration and perfect spatial register are required to get a useful image for displaying changes that contain occurred. SAR calibration is a extremely complex and sensitive problem; a few errors may persist after calibration that interferes with subsequent steps in the data fusion and visualization process. Because of the non-Gaussian model of radar backscattering, traditional image pre processing procedures cannot be used here. To solve this problem “cross-calibration/normalization,” method can be used. In image enhancement and the numerical comparison of many image takes together with data fusion and visualization processes. The proposed processing which contain filtering, histogram truncation, and equalization steps and region growing and merging algorithm applied in an adaptive way to the images. RGB composition is used to combining an pre & post flood image or identify an flooded areas.","PeriodicalId":256750,"journal":{"name":"2016 Second International Conference on Science Technology Engineering and Management (ICONSTEM)","volume":"16 6","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131957119","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
FPGA based filters for EEG pre-processing 基于FPGA的脑电信号预处理滤波器
K. Sundaram, Marichamy, Pradeepa
The EEG pre-processing steps involve removing noise and artifacts from EEG. The noise from the main source like electro-oculogram, electrocardiogram, electromyogram and other sources should be eliminated to increase accuracy in classification. As these artifacts may be misinterpreted as originating from the brain, there is a need to minimize or remove them from recorded EEG signals. The artifacts are undesirable potentials of non-cerebral origin and eye blinking that contaminate the EEG signal. EEG artifacts originate from two sources namely, physiological and technical. Technical artifacts are mainly due to equipment malfunction; result from poor electrode contact or line interference. Offset, filter settings, or incorrect gain of the amplifier will cause distortion clipping or saturation of the recorded signals. Technical artifacts can be avoided through consistent monitoring, meticulous inspection of equipment and proper apparatus setup. Physiological artifacts arise from a variety of body activities that are either due to movements, skin resistance fluctuations or other bioelectrical potentials. Proper filters need to be designed to filter these artifacts. Moving average filter and Median filters are easy to implement and these filters acts as best pre-processing stage for noise removal. In this paper filters such as Moving average and Median filter are implemented in FPGA (Virtex-5) and compared in terms of area, power and delay. Though Moving average is fast when compared to Median filter. Median filter is the best for pre-processing since it occupies less area and power.
脑电信号预处理包括去除脑电信号中的噪声和伪影。应消除眼电、心电图、肌电等主要噪声源的噪声,以提高分类的准确性。由于这些伪影可能被误解为来自大脑,因此有必要将它们从记录的脑电图信号中最小化或删除。伪影是一种非脑源性和眨眼性的不良电位,会污染脑电图信号。脑电图伪影有两个来源,即生理和技术。技术性工件主要是由于设备故障造成的;由于电极接触不良或线路干扰。偏置、滤波器设置或放大器的不正确增益将导致记录信号的失真、削波或饱和。通过持续的监控,对设备的细致检查和适当的设备设置,可以避免技术上的人工制品。生理伪影产生于各种身体活动,这些活动是由于运动、皮肤阻力波动或其他生物电电位引起的。需要设计合适的过滤器来过滤这些工件。移动平均滤波器和中值滤波器易于实现,它们是去除噪声的最佳预处理阶段。本文在FPGA (Virtex-5)上实现了移动平均滤波器和中值滤波器,并在面积、功耗和延迟方面进行了比较。虽然移动平均比中值过滤器快。中值滤波是最适合预处理的,因为它占用的面积和功率较小。
{"title":"FPGA based filters for EEG pre-processing","authors":"K. Sundaram, Marichamy, Pradeepa","doi":"10.1109/ICONSTEM.2016.7560958","DOIUrl":"https://doi.org/10.1109/ICONSTEM.2016.7560958","url":null,"abstract":"The EEG pre-processing steps involve removing noise and artifacts from EEG. The noise from the main source like electro-oculogram, electrocardiogram, electromyogram and other sources should be eliminated to increase accuracy in classification. As these artifacts may be misinterpreted as originating from the brain, there is a need to minimize or remove them from recorded EEG signals. The artifacts are undesirable potentials of non-cerebral origin and eye blinking that contaminate the EEG signal. EEG artifacts originate from two sources namely, physiological and technical. Technical artifacts are mainly due to equipment malfunction; result from poor electrode contact or line interference. Offset, filter settings, or incorrect gain of the amplifier will cause distortion clipping or saturation of the recorded signals. Technical artifacts can be avoided through consistent monitoring, meticulous inspection of equipment and proper apparatus setup. Physiological artifacts arise from a variety of body activities that are either due to movements, skin resistance fluctuations or other bioelectrical potentials. Proper filters need to be designed to filter these artifacts. Moving average filter and Median filters are easy to implement and these filters acts as best pre-processing stage for noise removal. In this paper filters such as Moving average and Median filter are implemented in FPGA (Virtex-5) and compared in terms of area, power and delay. Though Moving average is fast when compared to Median filter. Median filter is the best for pre-processing since it occupies less area and power.","PeriodicalId":256750,"journal":{"name":"2016 Second International Conference on Science Technology Engineering and Management (ICONSTEM)","volume":"92 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126325072","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Voice based application as medicine spotter for visually impaired 基于语音的应用程序作为视障人士的药物观测者
D. Jayashree, K. Farhath, R. Amruthavarshini, S. Pavithra
This paper proffers an application in order to expedite easy and innate way to find the medicine for the visually impaired people and to take it according to their Doctor's prescription. Visually impaired people need not be dependent and seek others help to find the medicine to be taken. This android application is used to overcome the difficulties they face in this scenario. In this application, a reminder is set which tells the user when to take the medicines, as voice output. The pictures of the medicine strip held in the hand are captured by the inbuilt camera of the mobile. The image is processed and consequently text localization and extraction is done by which the name of the medicine is identified. A spotter section is also consolidated with this application which checks the prescription which has been already uploaded in the user's mobile, compares with the name of the medicine identified and if the medicine has to be taken at that time, then it tells the quantity of medicine to be taken to the user as voice output. On receiving the voice output from the mobile, the user intakes their medicines according to their prescription. It can also be useful for uneducated people who suffer to find which medicine must be taken. Especially elder people who are not educated usually suffer to read their medicine names on their own. This idea would achieve good results in practice.
本文提供了一种应用程序,以便方便快捷地找到适合视障人士的药物,并根据医生的处方服用。视力受损的人不需要依赖他人,也不需要寻求他人的帮助来找到需要服用的药物。这个android应用程序被用来克服他们在这个场景中面临的困难。在这个应用程序中,设置了一个提醒,以语音输出的形式告诉用户何时服药。手持药品条的图片由手机内置摄像头拍摄。对图像进行处理,从而进行文本定位和提取,从而确定药物名称。该应用程序还整合了一个观察员部分,该应用程序检查已经上传到用户手机中的处方,与识别的药物名称进行比较,如果当时必须服用该药物,那么它将以语音输出的形式告诉用户要服用的药物数量。在接收到手机的语音输出后,用户就会根据处方服用药物。它也可以帮助没有受过教育的人找到必须服用的药物。尤其是没有受过教育的老年人,通常要自己读药名。这个想法在实践中会取得很好的效果。
{"title":"Voice based application as medicine spotter for visually impaired","authors":"D. Jayashree, K. Farhath, R. Amruthavarshini, S. Pavithra","doi":"10.1109/ICONSTEM.2016.7560923","DOIUrl":"https://doi.org/10.1109/ICONSTEM.2016.7560923","url":null,"abstract":"This paper proffers an application in order to expedite easy and innate way to find the medicine for the visually impaired people and to take it according to their Doctor's prescription. Visually impaired people need not be dependent and seek others help to find the medicine to be taken. This android application is used to overcome the difficulties they face in this scenario. In this application, a reminder is set which tells the user when to take the medicines, as voice output. The pictures of the medicine strip held in the hand are captured by the inbuilt camera of the mobile. The image is processed and consequently text localization and extraction is done by which the name of the medicine is identified. A spotter section is also consolidated with this application which checks the prescription which has been already uploaded in the user's mobile, compares with the name of the medicine identified and if the medicine has to be taken at that time, then it tells the quantity of medicine to be taken to the user as voice output. On receiving the voice output from the mobile, the user intakes their medicines according to their prescription. It can also be useful for uneducated people who suffer to find which medicine must be taken. Especially elder people who are not educated usually suffer to read their medicine names on their own. This idea would achieve good results in practice.","PeriodicalId":256750,"journal":{"name":"2016 Second International Conference on Science Technology Engineering and Management (ICONSTEM)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127670053","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Fake biometric detection using image quality assessment: Application to iris, fingerprint recognition 利用图像质量评估的假生物特征检测:应用于虹膜、指纹识别
S. Saranya, S. V. Sherline, M. Maheswari
Image Quality Assessment (IQA) is one of the statistical techniques used in image processing to determine whether the biometric sample is real or fake. The objective of the system is to enrich the biometric recognition security. This paper deals with two distinct measures of IQA. The first measure is Full-Reference(FR) IQA consists of a 2D image extracting different image quality features using a reference image which is filtered by a technique called Gaussian filtering. The second measure is No-Reference (NR) IQA used to estimate the quality level of an image. Eventually, 26 image quality features are exacted to minimize the degree of complexity. Quality of test sample implies to results of the following process of classification based on IQA. Presented paper briefly introduces the IQA theory and its measures. Results are documented for the selected real and fake pictures.
图像质量评估(IQA)是一种用于图像处理的统计技术,用于判断生物特征样本的真假。该系统的目的是丰富生物特征识别的安全性。本文讨论了IQA的两种不同度量。第一种方法是全参考(FR) IQA,它由2D图像组成,使用高斯滤波技术过滤的参考图像提取不同的图像质量特征。第二个度量是无参考(NR) IQA,用于估计图像的质量水平。最终,需要26个图像质量特征来最小化复杂性。测试样本的质量意味着基于IQA的以下分类过程的结果。本文简要介绍了IQA理论及其实施措施。记录了所选真假图片的结果。
{"title":"Fake biometric detection using image quality assessment: Application to iris, fingerprint recognition","authors":"S. Saranya, S. V. Sherline, M. Maheswari","doi":"10.1109/ICONSTEM.2016.7560931","DOIUrl":"https://doi.org/10.1109/ICONSTEM.2016.7560931","url":null,"abstract":"Image Quality Assessment (IQA) is one of the statistical techniques used in image processing to determine whether the biometric sample is real or fake. The objective of the system is to enrich the biometric recognition security. This paper deals with two distinct measures of IQA. The first measure is Full-Reference(FR) IQA consists of a 2D image extracting different image quality features using a reference image which is filtered by a technique called Gaussian filtering. The second measure is No-Reference (NR) IQA used to estimate the quality level of an image. Eventually, 26 image quality features are exacted to minimize the degree of complexity. Quality of test sample implies to results of the following process of classification based on IQA. Presented paper briefly introduces the IQA theory and its measures. Results are documented for the selected real and fake pictures.","PeriodicalId":256750,"journal":{"name":"2016 Second International Conference on Science Technology Engineering and Management (ICONSTEM)","volume":"421 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116243879","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Multimodal biometrics security system for authentication 多模态生物识别安全认证系统
A. Maheshwari, M. A. Dorairangaswamy
Recently biometrics based authentication system provides security from attacks. This paper presents to implement the biometric system based on the combination of graphical image and palm print with steganographic technique for authentication purpose. Here before the concealing of the voice data, the palm print is processed using Weber Local Descriptor. Here the voice data hiding approach involves concealing of individual voice data within their biometric to enhance the privacy protection. The voice data is being converted into text data using voice to text convertor. Before the data is hidden it is being encrypted using Chaos encryption. The data is being hidden inside the palm print using bits wrap algorithm. The features of the Graphical Image are extracted using Lifting Wavelet Transform.
近年来,基于生物特征的身份认证系统提供了防范攻击的安全性。本文提出了一种基于图形图像和掌纹相结合的生物识别系统,并结合隐写技术实现身份认证。在隐藏语音数据之前,掌纹是用韦伯局部描述符处理的。这里的语音数据隐藏方法涉及将个人语音数据隐藏在其生物特征中,以增强隐私保护。使用语音到文本转换器将语音数据转换为文本数据。在数据被隐藏之前,使用混沌加密对其进行加密。数据被隐藏在掌纹中使用比特包裹算法。利用提升小波变换提取图像特征。
{"title":"Multimodal biometrics security system for authentication","authors":"A. Maheshwari, M. A. Dorairangaswamy","doi":"10.1109/ICONSTEM.2016.7560940","DOIUrl":"https://doi.org/10.1109/ICONSTEM.2016.7560940","url":null,"abstract":"Recently biometrics based authentication system provides security from attacks. This paper presents to implement the biometric system based on the combination of graphical image and palm print with steganographic technique for authentication purpose. Here before the concealing of the voice data, the palm print is processed using Weber Local Descriptor. Here the voice data hiding approach involves concealing of individual voice data within their biometric to enhance the privacy protection. The voice data is being converted into text data using voice to text convertor. Before the data is hidden it is being encrypted using Chaos encryption. The data is being hidden inside the palm print using bits wrap algorithm. The features of the Graphical Image are extracted using Lifting Wavelet Transform.","PeriodicalId":256750,"journal":{"name":"2016 Second International Conference on Science Technology Engineering and Management (ICONSTEM)","volume":"100 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128147075","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
期刊
2016 Second International Conference on Science Technology Engineering and Management (ICONSTEM)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1