首页 > 最新文献

2007 International Conference on Signal Processing, Communications and Networking最新文献

英文 中文
Hardware Estimation and Synthesis for a Codesign System 协同设计系统的硬件评估与综合
Pub Date : 2007-11-05 DOI: 10.1109/ICSCN.2007.350728
M. Sangeetha, J. RajaPaul Perinbam, Revathy
A software model of hardware estimator is developed. The behavioral description is transformed into an intermediate format called control flow graph (CFG). The graph is partitioned into hardware and software. The unoptimized hardware in intermediate graph is estimated by transforming the graph into matrix format. The partitioned hardware of control flow graph is translated as behavioral network graph. The high level synthesis and logic synthesis are performed using the BNG with simple logical transformation. The final RTL obtained from the conventional synthesis method and BNG method for resource and timing constraint were presented. The cost estimation for the various control construction is being tabulated
建立了硬件估计器的软件模型。行为描述被转换成一种称为控制流图(CFG)的中间格式。图形分为硬件和软件两部分。通过将中间图转换为矩阵格式,估计中间图中未优化的硬件。将控制流图的分割硬件转换为行为网络图。通过简单的逻辑转换,利用BNG实现高级综合和逻辑综合。给出了基于资源约束和时间约束的传统综合方法和BNG方法得到的最终RTL。各种控制结构的成本估算已制成表格
{"title":"Hardware Estimation and Synthesis for a Codesign System","authors":"M. Sangeetha, J. RajaPaul Perinbam, Revathy","doi":"10.1109/ICSCN.2007.350728","DOIUrl":"https://doi.org/10.1109/ICSCN.2007.350728","url":null,"abstract":"A software model of hardware estimator is developed. The behavioral description is transformed into an intermediate format called control flow graph (CFG). The graph is partitioned into hardware and software. The unoptimized hardware in intermediate graph is estimated by transforming the graph into matrix format. The partitioned hardware of control flow graph is translated as behavioral network graph. The high level synthesis and logic synthesis are performed using the BNG with simple logical transformation. The final RTL obtained from the conventional synthesis method and BNG method for resource and timing constraint were presented. The cost estimation for the various control construction is being tabulated","PeriodicalId":257948,"journal":{"name":"2007 International Conference on Signal Processing, Communications and Networking","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133307100","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Improved OFDM Transmission Over Fading Channels 在衰落信道上改进的OFDM传输
Pub Date : 2007-11-05 DOI: 10.1109/ICSCN.2007.350757
J. Jayakumaril, Sakuntala S. Pillai
A spectrally efficient OFDM transmission technique that does not require a cyclic prefix for combating intersymbol interference (ISI) is introduced. For achieving this, partial response coding (PRC) is combined with OFDM transmission scheme. PRC is regarded as one of the best known methods for combating ISI and for achieving the Nyquist signaling rate. In this paper the performance of OFDM system using Class IV PRC is analyzed over fading channels. Simulations show that OFDM system using the proposed PRC scheme perform much better than standard systems in multipath fading channels and such a simple coding technique improves the spectral efficiency also
介绍了一种不需要循环前缀来对抗码间干扰(ISI)的频谱效率高的OFDM传输技术。为此,将部分响应编码(PRC)与OFDM传输方案相结合。PRC被认为是对抗ISI和实现奈奎斯特信号率的最著名的方法之一。本文分析了基于IV类PRC的OFDM系统在衰落信道下的性能。仿真结果表明,采用PRC编码的OFDM系统在多径衰落信道中的性能明显优于标准系统,而且这种简单的编码技术也提高了频谱效率
{"title":"Improved OFDM Transmission Over Fading Channels","authors":"J. Jayakumaril, Sakuntala S. Pillai","doi":"10.1109/ICSCN.2007.350757","DOIUrl":"https://doi.org/10.1109/ICSCN.2007.350757","url":null,"abstract":"A spectrally efficient OFDM transmission technique that does not require a cyclic prefix for combating intersymbol interference (ISI) is introduced. For achieving this, partial response coding (PRC) is combined with OFDM transmission scheme. PRC is regarded as one of the best known methods for combating ISI and for achieving the Nyquist signaling rate. In this paper the performance of OFDM system using Class IV PRC is analyzed over fading channels. Simulations show that OFDM system using the proposed PRC scheme perform much better than standard systems in multipath fading channels and such a simple coding technique improves the spectral efficiency also","PeriodicalId":257948,"journal":{"name":"2007 International Conference on Signal Processing, Communications and Networking","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123787007","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Dynamic Reconfigurable Routing for High throughput in MANET 面向MANET高吞吐量的动态可重构路由
Pub Date : 2007-11-05 DOI: 10.1109/ICSCN.2007.350660
M. Ramakrishnan, M.A. Baghyaveni, S. Shanmugavel
The area of adhoc networking has been receiving increasing attention among researchers in recent years, as the available wireless networking and mobile computing hardware bases are now capable of supporting the promise of this technology. Over the past few years, a variety of new routing protocols have been proposed, but the performance evaluation of each protocol shows variable results according to network parameters such as throughput, scalability, mobility and topology variation. Hence, it is challenging to find one single universal protocol or any adaptive protocol to meet all the network topology conditions, mobility patterns and scalability requirements. So, if protocols are dynamically allocated to the router nodes then it is possible to obtain an all time high throughput programmable router. Many MANET applications benefit from increased throughput, which is the focus of this work. Therefore, in this paper, a new method of dynamic reconfigurable routing (DRR) using two reactive on demand protocols viz. DSR and AODV is proposed. The DRR router monitors the throughput continuously and when the throughput plunges down below the acceptance value, it adapts to different protocol to maintain the throughput. The change of protocol to the router is done by modifying the config. in file of global mobile simulator (GLOMOSIM)
自组织网络领域近年来受到越来越多的研究人员的关注,因为现有的无线网络和移动计算硬件基础现在能够支持该技术的前景。在过去的几年里,各种新的路由协议被提出,但每个协议的性能评估显示不同的结果,根据网络参数,如吞吐量,可扩展性,移动性和拓扑变化。因此,找到一个单一的通用协议或任何自适应协议来满足所有网络拓扑条件、移动模式和可伸缩性需求是具有挑战性的。因此,如果协议动态分配到路由器节点,那么就有可能获得一个始终高吞吐量的可编程路由器。许多MANET应用受益于吞吐量的提高,这是本工作的重点。为此,本文提出了一种利用DSR和AODV两种按需响应协议实现动态可重构路由(DRR)的方法。DRR路由器持续监控吞吐量,当吞吐量低于接受值时,它会调整不同的协议来维持吞吐量。路由器协议的改变是通过修改配置来完成的。全球移动模拟器(GLOMOSIM)
{"title":"Dynamic Reconfigurable Routing for High throughput in MANET","authors":"M. Ramakrishnan, M.A. Baghyaveni, S. Shanmugavel","doi":"10.1109/ICSCN.2007.350660","DOIUrl":"https://doi.org/10.1109/ICSCN.2007.350660","url":null,"abstract":"The area of adhoc networking has been receiving increasing attention among researchers in recent years, as the available wireless networking and mobile computing hardware bases are now capable of supporting the promise of this technology. Over the past few years, a variety of new routing protocols have been proposed, but the performance evaluation of each protocol shows variable results according to network parameters such as throughput, scalability, mobility and topology variation. Hence, it is challenging to find one single universal protocol or any adaptive protocol to meet all the network topology conditions, mobility patterns and scalability requirements. So, if protocols are dynamically allocated to the router nodes then it is possible to obtain an all time high throughput programmable router. Many MANET applications benefit from increased throughput, which is the focus of this work. Therefore, in this paper, a new method of dynamic reconfigurable routing (DRR) using two reactive on demand protocols viz. DSR and AODV is proposed. The DRR router monitors the throughput continuously and when the throughput plunges down below the acceptance value, it adapts to different protocol to maintain the throughput. The change of protocol to the router is done by modifying the config. in file of global mobile simulator (GLOMOSIM)","PeriodicalId":257948,"journal":{"name":"2007 International Conference on Signal Processing, Communications and Networking","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126275454","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Reduction of False Alarm Rate in Detecting Network Anomaly using Mahalanobis Distance and Similarity Measure 利用马氏距离和相似度量降低网络异常检测中的虚警率
Pub Date : 2007-11-05 DOI: 10.1109/ICSCN.2007.350764
N. Srinivasan, V. Vaidehi
This paper discusses about a network anomaly detection system which is aimed at reduction of the number of false positives and negatives generated by conventional IDSs. A statistical model of the network activities is built using the payload and is trained with the normal behavior of user(s) in the network over a period of time. This model in-turn is used to detect deviations that are high from the expected behavior which indicate a security breach or a possible attack. The payload of the network traffic is analyzed by the system in an unsupervised manner and then classifies as normal traffic during training phase. The value-byte frequency of the application payload is calculated for each normal packet based on payload length and port number. The Mahalanobis distance and a similarity measure is then used to measure the similarity of the incoming data with the already computed values in the detection phase. This distance is then compared against a threshold value and generates an alert if it exceeds the value. In the clustering phase we provide a method to reduce the resource consumption which can easily update the stored profile using an incremental algorithm and the model is continuously updated so that it is accurate. The modeling method that is being followed is completely unsupervised and also tolerant to noise in the training data. The method proposed is also resistant to mimicry-attack. This system is designed to be integrated into other detectors in order to mitigate false positive rates so that this enriches the chances of detecting zero-day worms and new attack exploits
本文讨论了一种网络异常检测系统,该系统旨在减少传统入侵检测系统产生的误报和误报数量。使用有效负载构建网络活动的统计模型,并使用一段时间内网络中用户的正常行为进行训练。此模型反过来用于检测与预期行为的偏差,这些偏差表明存在安全漏洞或可能的攻击。在训练阶段,系统以无监督的方式对网络流量的有效载荷进行分析,然后将其分类为正常流量。根据有效负载长度和端口号计算每个正常数据包的应用程序有效负载的值字节频率。然后使用马氏距离和相似度度量来度量输入数据与检测阶段已计算值的相似度。然后将此距离与阈值进行比较,并在超过该值时生成警报。在聚类阶段,我们提供了一种减少资源消耗的方法,该方法可以使用增量算法轻松地更新存储的配置文件,并且模型可以持续更新,从而保证模型的准确性。所采用的建模方法是完全无监督的,并且可以容忍训练数据中的噪声。该方法还能抵抗模仿攻击。该系统旨在集成到其他检测器中,以减少误报率,从而增加检测零日蠕虫和新攻击利用的机会
{"title":"Reduction of False Alarm Rate in Detecting Network Anomaly using Mahalanobis Distance and Similarity Measure","authors":"N. Srinivasan, V. Vaidehi","doi":"10.1109/ICSCN.2007.350764","DOIUrl":"https://doi.org/10.1109/ICSCN.2007.350764","url":null,"abstract":"This paper discusses about a network anomaly detection system which is aimed at reduction of the number of false positives and negatives generated by conventional IDSs. A statistical model of the network activities is built using the payload and is trained with the normal behavior of user(s) in the network over a period of time. This model in-turn is used to detect deviations that are high from the expected behavior which indicate a security breach or a possible attack. The payload of the network traffic is analyzed by the system in an unsupervised manner and then classifies as normal traffic during training phase. The value-byte frequency of the application payload is calculated for each normal packet based on payload length and port number. The Mahalanobis distance and a similarity measure is then used to measure the similarity of the incoming data with the already computed values in the detection phase. This distance is then compared against a threshold value and generates an alert if it exceeds the value. In the clustering phase we provide a method to reduce the resource consumption which can easily update the stored profile using an incremental algorithm and the model is continuously updated so that it is accurate. The modeling method that is being followed is completely unsupervised and also tolerant to noise in the training data. The method proposed is also resistant to mimicry-attack. This system is designed to be integrated into other detectors in order to mitigate false positive rates so that this enriches the chances of detecting zero-day worms and new attack exploits","PeriodicalId":257948,"journal":{"name":"2007 International Conference on Signal Processing, Communications and Networking","volume":"92 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125857985","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
A Low Complexity EDGE Demodulator Based on FDE and Impulse Response Shortening 基于FDE和脉冲响应缩短的低复杂度边缘解调器
Pub Date : 2007-11-05 DOI: 10.1109/ICSCN.2007.350701
P. Dinakar, R. David Koilpillai
In this paper, a new low-complexity frequency-domain based technique is proposed for channel equalization and symbol detection of an enhanced data rate for global evolution (EDGE) cellular system, which uses 8-PSK modulation. The proposed method exploits the present of tail symbols in the EDGE slot structure and uses them as partial cyclic prefix in the frequency domain equalizer. For channels with longer memory than the tail length, the receiver computes a channel shortening filter such that, when the filter is cascaded with receive chain, results in a shorter effective impulse response. The parameters of the channel shortening are set such that the effective impulse response memory length is equal to the tail length. The performance of the proposed system is demonstrated by computer simulations
本文提出了一种新的低复杂度频域技术,用于全球进化(EDGE)蜂窝系统的信道均衡和符号检测,该技术采用8-PSK调制。该方法利用EDGE槽结构中存在的尾符号作为频域均衡器的部分循环前缀。对于记忆长度大于尾长度的信道,接收机计算信道缩短滤波器,当该滤波器与接收链级联时,产生更短的有效脉冲响应。信道缩短的参数设置使有效脉冲响应记忆长度等于尾部长度。计算机仿真验证了该系统的性能
{"title":"A Low Complexity EDGE Demodulator Based on FDE and Impulse Response Shortening","authors":"P. Dinakar, R. David Koilpillai","doi":"10.1109/ICSCN.2007.350701","DOIUrl":"https://doi.org/10.1109/ICSCN.2007.350701","url":null,"abstract":"In this paper, a new low-complexity frequency-domain based technique is proposed for channel equalization and symbol detection of an enhanced data rate for global evolution (EDGE) cellular system, which uses 8-PSK modulation. The proposed method exploits the present of tail symbols in the EDGE slot structure and uses them as partial cyclic prefix in the frequency domain equalizer. For channels with longer memory than the tail length, the receiver computes a channel shortening filter such that, when the filter is cascaded with receive chain, results in a shorter effective impulse response. The parameters of the channel shortening are set such that the effective impulse response memory length is equal to the tail length. The performance of the proposed system is demonstrated by computer simulations","PeriodicalId":257948,"journal":{"name":"2007 International Conference on Signal Processing, Communications and Networking","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131189867","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Semantics Based Application Level Intrusion Detection System 基于语义的应用层入侵检测系统
Pub Date : 2007-11-05 DOI: 10.1109/ICSCN.2007.350759
V. Vaidehi, N. Srinivasan, P. Anand, A. Balaji, V. Prashanth, S. Sangeetha
The increasing cyber threat with the expansion of Web applications demands a constant need for safeguarding our own network resources from vulnerability exploits. Attacks can occur at the network and application level. The existent solutions like firewalls perform well at the network level. The application level detection is based on raw content matching and hence is prone to errors. This paper proposes a design, implementation and performance of an intelligent IDS which looks into the semantics of the application header and also the Web presentation language. The model presented is compatible to work with semantic processors like the XAMBALA semantic processor (XSP), that can look at the structure and content of the traffic
随着Web应用程序的扩展,日益增加的网络威胁要求不断需要保护我们自己的网络资源免受漏洞利用。攻击可能发生在网络和应用程序级别。现有的解决方案(如防火墙)在网络级别上表现良好。应用程序级别的检测基于原始内容匹配,因此容易出错。本文提出了一种智能入侵检测系统的设计、实现和性能,该系统既关注应用程序头的语义,又关注Web表示语言。所提出的模型兼容于语义处理器,如XAMBALA语义处理器(XSP),它可以查看流量的结构和内容
{"title":"A Semantics Based Application Level Intrusion Detection System","authors":"V. Vaidehi, N. Srinivasan, P. Anand, A. Balaji, V. Prashanth, S. Sangeetha","doi":"10.1109/ICSCN.2007.350759","DOIUrl":"https://doi.org/10.1109/ICSCN.2007.350759","url":null,"abstract":"The increasing cyber threat with the expansion of Web applications demands a constant need for safeguarding our own network resources from vulnerability exploits. Attacks can occur at the network and application level. The existent solutions like firewalls perform well at the network level. The application level detection is based on raw content matching and hence is prone to errors. This paper proposes a design, implementation and performance of an intelligent IDS which looks into the semantics of the application header and also the Web presentation language. The model presented is compatible to work with semantic processors like the XAMBALA semantic processor (XSP), that can look at the structure and content of the traffic","PeriodicalId":257948,"journal":{"name":"2007 International Conference on Signal Processing, Communications and Networking","volume":"52 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130710330","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Comparative Study of Filter-Bank Mean-Energy Distance for Automated Segmentation of Speech Signals 语音信号自动分割中滤波器组平均能量距离的比较研究
Pub Date : 2007-11-05 DOI: 10.1109/ICSCN.2007.350670
G. Ananthakrishna, H. G. Ranjani, A. Ramakrishnan
This paper describes a method of automated segmentation of speech assuming the signal is continuously time varying rather than the traditional short time stationary model. It has been shown that this representation gives comparable if not marginally better results than the other techniques for automated segmentation. A formulation of the 'Bach' (music semitonal) frequency scale filter-bank is proposed. A comparative study has been made of the performances using Mel, Bark and Bach scale filter banks considering this model. The preliminary results show up to 80 % matches within 20 ms of the manually segmented data, without any information of the content of the text and without any language dependence. 'Bach' filters are seen to marginally outperform the other filters
本文提出了一种基于连续时变信号的语音自动分割方法,取代了传统的短时平稳模型。它已经表明,这种表示给出了相当的,如果不是稍微更好的结果比其他技术的自动分割。提出了“巴赫”(音乐半音阶)频率标度滤波器组的一种公式。在此模型下,对Mel、Bark和Bach三种尺度滤波器组的性能进行了比较研究。初步结果表明,在人工分割数据的20毫秒内,匹配率高达80%,不需要任何文本内容信息,也不需要任何语言依赖。“巴赫”滤波器被认为略微优于其他滤波器
{"title":"Comparative Study of Filter-Bank Mean-Energy Distance for Automated Segmentation of Speech Signals","authors":"G. Ananthakrishna, H. G. Ranjani, A. Ramakrishnan","doi":"10.1109/ICSCN.2007.350670","DOIUrl":"https://doi.org/10.1109/ICSCN.2007.350670","url":null,"abstract":"This paper describes a method of automated segmentation of speech assuming the signal is continuously time varying rather than the traditional short time stationary model. It has been shown that this representation gives comparable if not marginally better results than the other techniques for automated segmentation. A formulation of the 'Bach' (music semitonal) frequency scale filter-bank is proposed. A comparative study has been made of the performances using Mel, Bark and Bach scale filter banks considering this model. The preliminary results show up to 80 % matches within 20 ms of the manually segmented data, without any information of the content of the text and without any language dependence. 'Bach' filters are seen to marginally outperform the other filters","PeriodicalId":257948,"journal":{"name":"2007 International Conference on Signal Processing, Communications and Networking","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129580944","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Data Compression using Non - Uniform Sampling 使用非均匀采样的数据压缩
Pub Date : 2007-11-05 DOI: 10.1109/ICSCN.2007.350680
Vibhutesh Kumar Singh, N. Rajpal
This paper is concerned with the problem of non-uniform sampling and reconstruction of data. A fast and robust method for approximation of contour from a set of non-uniformly distributed sample points is described here. Data is represented by irregular samples distributed in space. The samples are chosen along the contour with spacing determined by the error between the original contour and the contour reconstructed by uniform set of sample points. Lagrange's interpolation is used to reconstruct the contour back from non-uniform set of samples. The algorithm iteratively finds the minimum number of samples along the contour. The error analysis between original and reconstructed contour reveals that iterative algorithm of selecting irregular samples is satisfactory
本文研究了数据的非均匀采样和重构问题。本文描述了一种快速且鲁棒的从非均匀分布的样本点逼近轮廓的方法。数据由分布在空间中的不规则样本表示。沿等高线选取样本,样本间距由原始等高线与均匀采样点重构等高线之间的误差决定。采用拉格朗日插值法从非均匀的样本集中重建轮廓。该算法沿轮廓迭代地寻找最小样本数。对原始轮廓和重构轮廓的误差分析表明,迭代算法对不规则样本的选择是令人满意的
{"title":"Data Compression using Non - Uniform Sampling","authors":"Vibhutesh Kumar Singh, N. Rajpal","doi":"10.1109/ICSCN.2007.350680","DOIUrl":"https://doi.org/10.1109/ICSCN.2007.350680","url":null,"abstract":"This paper is concerned with the problem of non-uniform sampling and reconstruction of data. A fast and robust method for approximation of contour from a set of non-uniformly distributed sample points is described here. Data is represented by irregular samples distributed in space. The samples are chosen along the contour with spacing determined by the error between the original contour and the contour reconstructed by uniform set of sample points. Lagrange's interpolation is used to reconstruct the contour back from non-uniform set of samples. The algorithm iteratively finds the minimum number of samples along the contour. The error analysis between original and reconstructed contour reveals that iterative algorithm of selecting irregular samples is satisfactory","PeriodicalId":257948,"journal":{"name":"2007 International Conference on Signal Processing, Communications and Networking","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124527338","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
A Back Propagation Based Face Recognition Model, using 2D Symmetrical Gabor Features 基于反向传播的二维对称Gabor特征人脸识别模型
Pub Date : 2007-11-05 DOI: 10.1109/ICSCN.2007.350776
B. Vinay Kumar, B. Shreyas, C.N.S. Ganesh Murthy
We present a system for recognizing human faces from a database consisting of multiple images per test subject, which spans the normal variations in a human face. The faces are represented based on a Gabor wavelet transform. The features are extracted as a vector of values using a carefully chosen symmetrical Gabor wavelet matrix. This feature extraction is biologically motivated and models systems based on human vision. The extracted features are fed into an artificial neural network, in dual phases. The training and testing phases of the neural network work on the features extracted by the same method. Excellent pattern-recognition-specific neural network like a multilayer perceptron with back propagation provides the necessary classification once the feature extraction is complete
我们提出了一个从数据库中识别人脸的系统,该数据库由每个测试对象的多个图像组成,这些图像跨越了人脸的正常变化。人脸是基于Gabor小波变换表示的。使用精心选择的对称Gabor小波矩阵将特征提取为值的向量。这种特征提取是生物驱动的,并基于人类视觉对系统进行建模。提取的特征分两阶段输入到人工神经网络中。神经网络的训练和测试阶段对用相同方法提取的特征进行处理。优秀的模式识别专用神经网络,如具有反向传播的多层感知器,在特征提取完成后提供必要的分类
{"title":"A Back Propagation Based Face Recognition Model, using 2D Symmetrical Gabor Features","authors":"B. Vinay Kumar, B. Shreyas, C.N.S. Ganesh Murthy","doi":"10.1109/ICSCN.2007.350776","DOIUrl":"https://doi.org/10.1109/ICSCN.2007.350776","url":null,"abstract":"We present a system for recognizing human faces from a database consisting of multiple images per test subject, which spans the normal variations in a human face. The faces are represented based on a Gabor wavelet transform. The features are extracted as a vector of values using a carefully chosen symmetrical Gabor wavelet matrix. This feature extraction is biologically motivated and models systems based on human vision. The extracted features are fed into an artificial neural network, in dual phases. The training and testing phases of the neural network work on the features extracted by the same method. Excellent pattern-recognition-specific neural network like a multilayer perceptron with back propagation provides the necessary classification once the feature extraction is complete","PeriodicalId":257948,"journal":{"name":"2007 International Conference on Signal Processing, Communications and Networking","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133595041","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Robust Unconstrained Handwritten Digit Recognition using Radon Transform 基于Radon变换的鲁棒无约束手写数字识别
Pub Date : 2007-11-05 DOI: 10.1109/ICSCN.2007.350685
V. N. Manjunath Aradhya, G. Hemantha Kumar, S. Noushath
The performance of a character recognition system depends heavily on what features are being used. Though many kinds of features have been developed and their test performances on standard database have been reported, there is still room to improve the recognition rate by developing improved features. In this paper, we propose a novel system based on radon transform for handwritten digit recognition. We have used radon function which represents an image as a collection of projections along various directions. The resultant feature vector by applying this method is the input for the classification stage. A nearest neighbor classifier is used for the subsequent recognition purpose. A test performed on the MNIST handwritten numeral database and on Kannada handwritten numerals demonstrate the effectiveness and feasibility of the proposed method
字符识别系统的性能在很大程度上取决于所使用的特征。虽然已经开发了多种特征,并报道了它们在标准数据库上的测试性能,但通过开发改进的特征来提高识别率仍有很大的空间。本文提出了一种基于radon变换的手写数字识别系统。我们使用radon函数,它将图像表示为沿各个方向的投影集合。应用该方法得到的特征向量是分类阶段的输入。最近邻分类器用于后续识别目的。在MNIST手写数字数据库和卡纳达语手写数字上进行了测试,验证了该方法的有效性和可行性
{"title":"Robust Unconstrained Handwritten Digit Recognition using Radon Transform","authors":"V. N. Manjunath Aradhya, G. Hemantha Kumar, S. Noushath","doi":"10.1109/ICSCN.2007.350685","DOIUrl":"https://doi.org/10.1109/ICSCN.2007.350685","url":null,"abstract":"The performance of a character recognition system depends heavily on what features are being used. Though many kinds of features have been developed and their test performances on standard database have been reported, there is still room to improve the recognition rate by developing improved features. In this paper, we propose a novel system based on radon transform for handwritten digit recognition. We have used radon function which represents an image as a collection of projections along various directions. The resultant feature vector by applying this method is the input for the classification stage. A nearest neighbor classifier is used for the subsequent recognition purpose. A test performed on the MNIST handwritten numeral database and on Kannada handwritten numerals demonstrate the effectiveness and feasibility of the proposed method","PeriodicalId":257948,"journal":{"name":"2007 International Conference on Signal Processing, Communications and Networking","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131397648","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 42
期刊
2007 International Conference on Signal Processing, Communications and Networking
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1