首页 > 最新文献

2018 Second International Conference on Electronics, Communication and Aerospace Technology (ICECA)最新文献

英文 中文
A 4-READ 2-WRITE Multi-Port Register File Design Using Pulsed-Latches 一种使用脉冲锁存器的4读2写多端口寄存器文件设计
T. Manivannan, M. Srinivasan
Pulsed-latches provide high performance with low power consumption by taking the advantages of both flip-flops and latches and thus, they are targeted in implementing different kinds of memory devices in various applications. One such memory device is the register files, which is traditionally being realized using SRAMs. In this paper, an area efficient and low power consumption design approach is proposed to perform the multi-read and multi-write operations in the pulsed-latches based multiport register files. These register files showed significant decrease in area as well as power consumption when compared to the SRAM based register files. An 8-BIT 4-READ and 2-WRITE (4R2W) pulsed-latches based multiport register file were designed and simulated in 180nm technology and its power-delay product was analyzed.
脉冲锁存器利用触发器和锁存器的优点,以低功耗提供高性能,因此,它们是在各种应用中实现不同类型存储器件的目标。其中一种存储器设备是寄存器文件,传统上是使用sram实现的。本文提出了一种面积高效、功耗低的设计方法,用于实现基于脉冲锁存器的多端口寄存器文件的多读多写操作。与基于SRAM的寄存器文件相比,这些寄存器文件在面积和功耗方面显着降低。设计并仿真了一种基于8位4读2写(4R2W)脉冲锁存器的多端口寄存器文件,并对其功率延迟产品进行了分析。
{"title":"A 4-READ 2-WRITE Multi-Port Register File Design Using Pulsed-Latches","authors":"T. Manivannan, M. Srinivasan","doi":"10.1109/ICECA.2018.8474898","DOIUrl":"https://doi.org/10.1109/ICECA.2018.8474898","url":null,"abstract":"Pulsed-latches provide high performance with low power consumption by taking the advantages of both flip-flops and latches and thus, they are targeted in implementing different kinds of memory devices in various applications. One such memory device is the register files, which is traditionally being realized using SRAMs. In this paper, an area efficient and low power consumption design approach is proposed to perform the multi-read and multi-write operations in the pulsed-latches based multiport register files. These register files showed significant decrease in area as well as power consumption when compared to the SRAM based register files. An 8-BIT 4-READ and 2-WRITE (4R2W) pulsed-latches based multiport register file were designed and simulated in 180nm technology and its power-delay product was analyzed.","PeriodicalId":272623,"journal":{"name":"2018 Second International Conference on Electronics, Communication and Aerospace Technology (ICECA)","volume":"122 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124179914","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Facial Expression Analysis for Distress Detection 面部表情分析用于遇险检测
Priyanka Nair, Subha V
Emotions are an incredibly important aspect of human life and basic research on emotions of the past few decades has produced several discoveries that have led to important real world applications. Facial expressions project our true emotions to others and add the real intent to the words we say. The interpretation of such facial expressions exhibited by the subject in response to a situation is really useful for many applications in fields of medicine, E-learning, entertainment, monitoring, marketing, law and many more. This project focuses on determining the distress level of a person by analyzing his facial expressions. The reaction of a person to a particular communication scenario is recorded using a video or still camera under predefined lighting conditions and this input is taken and processed further to detect his emotion. The face and facial landmarks detection are done using Viola Jones algorithm. Facial patches active during an emotion elicitation are then extracted for texture analysis. The feature extraction method used here is Gray Level Difference Method (GLDM) in which texture features are derived from the GLDM probability density functions. The next step, classification is done using Naïve Bayes Classifier. With reference to the trained information, the emotion of the person is recognized and is used for determining his distress level. The proposed system is tested using Extended Cohn Kanade(CK+) and Japanese female facial expression (JAFFE) datasets.
情感是人类生活中非常重要的一个方面,过去几十年对情感的基础研究产生了一些发现,这些发现导致了重要的现实世界应用。面部表情将我们的真实情绪传达给他人,并为我们所说的话增添了真正的意图。在医学、电子学习、娱乐、监控、市场营销、法律等领域的许多应用中,对受试者在应对某种情况时所表现出的这种面部表情的解释确实很有用。这个项目的重点是通过分析一个人的面部表情来确定他的痛苦程度。在预定的照明条件下,使用视频或静止相机记录一个人对特定通信场景的反应,并进一步处理这些输入以检测他的情绪。使用维奥拉·琼斯算法进行人脸和面部地标检测。然后提取情绪激发过程中活跃的面部斑块用于纹理分析。本文使用的特征提取方法是灰度差分法(GLDM),该方法从GLDM概率密度函数中提取纹理特征。下一步,使用Naïve贝叶斯分类器进行分类。参考训练的信息,人的情绪被识别,并用于确定他的痛苦程度。使用扩展Cohn Kanade(CK+)和日本女性面部表情(JAFFE)数据集对该系统进行了测试。
{"title":"Facial Expression Analysis for Distress Detection","authors":"Priyanka Nair, Subha V","doi":"10.1109/ICECA.2018.8474761","DOIUrl":"https://doi.org/10.1109/ICECA.2018.8474761","url":null,"abstract":"Emotions are an incredibly important aspect of human life and basic research on emotions of the past few decades has produced several discoveries that have led to important real world applications. Facial expressions project our true emotions to others and add the real intent to the words we say. The interpretation of such facial expressions exhibited by the subject in response to a situation is really useful for many applications in fields of medicine, E-learning, entertainment, monitoring, marketing, law and many more. This project focuses on determining the distress level of a person by analyzing his facial expressions. The reaction of a person to a particular communication scenario is recorded using a video or still camera under predefined lighting conditions and this input is taken and processed further to detect his emotion. The face and facial landmarks detection are done using Viola Jones algorithm. Facial patches active during an emotion elicitation are then extracted for texture analysis. The feature extraction method used here is Gray Level Difference Method (GLDM) in which texture features are derived from the GLDM probability density functions. The next step, classification is done using Naïve Bayes Classifier. With reference to the trained information, the emotion of the person is recognized and is used for determining his distress level. The proposed system is tested using Extended Cohn Kanade(CK+) and Japanese female facial expression (JAFFE) datasets.","PeriodicalId":272623,"journal":{"name":"2018 Second International Conference on Electronics, Communication and Aerospace Technology (ICECA)","volume":"95 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127684051","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Attacks on Web Application Caused by Cross Site Scripting 跨站脚本对Web应用程序的攻击
K. Pranathi, S. Kranthi, A. Srisaila, P. Madhavilatha
Cross Site Scripting (XSS) Attacks are as of now the most well known security issues in current web applications. The attacks which we are using will make use of vulnerabilities in the web applications. Cross-Site scripting (XSS) Attacks happen while getting to data in middle of the data transfer. Web proxy is used as one solution on client-side. Cross Site Scripting (XSS) Attacks are anything but difficult to find and detect, yet hard to distinguish and counteract. This paper gives customer side answer for relieve cross site scripting Attacks. The client system performance is decreased which result in poor web surfing background. In this undertaking gives a customer side arrangement that uses a well ordered way to deal with ensure cross website scripting, without corrupting much the client's web perusing knowledge. Attackers accesses and manipulates the control system networks by using cross-site scripting. It exploits Web servers that arrival progressively produced Web pages or enable clients to post distinguishable substance.
跨站脚本攻击(XSS)是目前web应用程序中最广为人知的安全问题。我们正在使用的攻击将利用web应用程序中的漏洞。跨站点脚本(XSS)攻击发生在数据传输过程中获取数据时。Web代理是客户端的一种解决方案。跨站脚本(XSS)攻击并不难发现和检测,但也很难区分和抵制。本文给出了缓解跨站脚本攻击的客户端解决方案。客户端系统性能下降,导致网页浏览的后台效果不佳。在这项工作中,提供了一个客户端安排,使用一种有序的方式来处理跨网站脚本,而不会破坏客户端的web浏览知识。攻击者通过使用跨站点脚本访问和操纵控制系统网络。它利用Web服务器逐步到达生成的Web页面或使客户端能够发布可区分的内容。
{"title":"Attacks on Web Application Caused by Cross Site Scripting","authors":"K. Pranathi, S. Kranthi, A. Srisaila, P. Madhavilatha","doi":"10.1109/ICECA.2018.8474765","DOIUrl":"https://doi.org/10.1109/ICECA.2018.8474765","url":null,"abstract":"Cross Site Scripting (XSS) Attacks are as of now the most well known security issues in current web applications. The attacks which we are using will make use of vulnerabilities in the web applications. Cross-Site scripting (XSS) Attacks happen while getting to data in middle of the data transfer. Web proxy is used as one solution on client-side. Cross Site Scripting (XSS) Attacks are anything but difficult to find and detect, yet hard to distinguish and counteract. This paper gives customer side answer for relieve cross site scripting Attacks. The client system performance is decreased which result in poor web surfing background. In this undertaking gives a customer side arrangement that uses a well ordered way to deal with ensure cross website scripting, without corrupting much the client's web perusing knowledge. Attackers accesses and manipulates the control system networks by using cross-site scripting. It exploits Web servers that arrival progressively produced Web pages or enable clients to post distinguishable substance.","PeriodicalId":272623,"journal":{"name":"2018 Second International Conference on Electronics, Communication and Aerospace Technology (ICECA)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126339284","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
A Review on Image Segmentation for Brain Tumor Detection 图像分割在脑肿瘤检测中的研究进展
S. M. Kulkarni, Dr. G. Sundari
A brain tumor is the gathering, or mass, of unusual cells in the cerebrum. The skull, which encases the mind, is extremely unbending. Any advancement inside such a confined space can cause issues. Experts refers a tumor based on where the tumor cells started, and whether they are dangerous (malignant) or not (benign). Main aim of the image segmentation is to find the location and size of the tumor present in the brain. In this paper various types of segmentation algorithms are reviewed.
脑肿瘤是大脑中不寻常细胞的聚集或肿块。包裹着思想的头骨是极其坚硬的。在这样一个密闭的空间里,任何进步都可能引起问题。专家们根据肿瘤细胞的起源地、危险程度(恶性)和无害程度(良性)来区分肿瘤。图像分割的主要目的是找到存在于大脑中的肿瘤的位置和大小。本文综述了各种类型的分割算法。
{"title":"A Review on Image Segmentation for Brain Tumor Detection","authors":"S. M. Kulkarni, Dr. G. Sundari","doi":"10.1109/ICECA.2018.8474893","DOIUrl":"https://doi.org/10.1109/ICECA.2018.8474893","url":null,"abstract":"A brain tumor is the gathering, or mass, of unusual cells in the cerebrum. The skull, which encases the mind, is extremely unbending. Any advancement inside such a confined space can cause issues. Experts refers a tumor based on where the tumor cells started, and whether they are dangerous (malignant) or not (benign). Main aim of the image segmentation is to find the location and size of the tumor present in the brain. In this paper various types of segmentation algorithms are reviewed.","PeriodicalId":272623,"journal":{"name":"2018 Second International Conference on Electronics, Communication and Aerospace Technology (ICECA)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120996267","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
LoRa Technology - An Overview LoRa技术-概述
Shilpa Devalal, A. Karthikeyan
IoT is gaining high popularity in today's world. Embedded systems have become a major part of our lives. People are able to control, monitor, and do a lot more from remote distance. This is done by connecting various objects reducing physical distance. IoT is the connectivity of various objects with network connectivity. Many a times these systems are battery operated and need a high battery backup. These systems require a technology that consumes less power and also covers long distances. But many technologies such as Zig-Bee, Wi-Fi, Bluetooth popularly used at present consumes high power and is not suitable for battery operated systems. LoRa is a new found technology that is emerging rapidly. The LoRa technology addresses these needs of a battery operated embedded device. The LoRa technology is a long range low power technology. This paper discuses about the advantages of LoRa over the existing technologies used in IoT. It also discusses the features of LoRa. LoRa WAn(Long Range Wide Area Network) is an open grade secure standard for the IoT connectivity. The LoRa alliance is an open non profitable group that shares their experience to drive LoRa.
物联网在当今世界越来越受欢迎。嵌入式系统已经成为我们生活的重要组成部分。人们可以远程控制、监视和做更多的事情。这是通过连接各种物体来减少物理距离。物联网是通过网络连接各种物体的连接。很多时候,这些系统是电池操作的,需要高容量的备用电池。这些系统需要一种能耗更低、覆盖距离更远的技术。但目前普遍使用的zigbee、Wi-Fi、蓝牙等技术功耗高,不适合电池供电的系统。LoRa是一种新兴的技术。LoRa技术解决了电池供电嵌入式设备的这些需求。LoRa技术是一种远距离低功耗技术。本文讨论了LoRa相对于现有物联网技术的优势。本文还讨论了LoRa的特性。LoRa WAn(Long Range Wide Area Network)是物联网连接的开放级安全标准。LoRa联盟是一个开放的非盈利组织,分享他们的经验来推动LoRa。
{"title":"LoRa Technology - An Overview","authors":"Shilpa Devalal, A. Karthikeyan","doi":"10.1109/ICECA.2018.8474715","DOIUrl":"https://doi.org/10.1109/ICECA.2018.8474715","url":null,"abstract":"IoT is gaining high popularity in today's world. Embedded systems have become a major part of our lives. People are able to control, monitor, and do a lot more from remote distance. This is done by connecting various objects reducing physical distance. IoT is the connectivity of various objects with network connectivity. Many a times these systems are battery operated and need a high battery backup. These systems require a technology that consumes less power and also covers long distances. But many technologies such as Zig-Bee, Wi-Fi, Bluetooth popularly used at present consumes high power and is not suitable for battery operated systems. LoRa is a new found technology that is emerging rapidly. The LoRa technology addresses these needs of a battery operated embedded device. The LoRa technology is a long range low power technology. This paper discuses about the advantages of LoRa over the existing technologies used in IoT. It also discusses the features of LoRa. LoRa WAn(Long Range Wide Area Network) is an open grade secure standard for the IoT connectivity. The LoRa alliance is an open non profitable group that shares their experience to drive LoRa.","PeriodicalId":272623,"journal":{"name":"2018 Second International Conference on Electronics, Communication and Aerospace Technology (ICECA)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117177465","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 88
Visual Cryptography: A Literature Survey 视觉密码学:文献综述
Rajat Bhatnagar, M. Kumar
Visual cryptography(VC) is a cryptographic methodology which permits visual information, for instance, text, pictures, etcetera to be encrypted such that the decryption can be performed by the human visual framework, without the assistance of PCs. The aim of this survey paper is to provide the readers a layout of the first visual cryptography method, along with the various methods developed and proposed from time to time. This paper also gives a survey of the applications that are based upon the concept of Visual Cryptography.
视觉密码学(VC)是一种密码学方法,它允许视觉信息,例如文本,图片等被加密,这样解密可以在没有pc机帮助的情况下由人类视觉框架执行。这篇调查论文的目的是为读者提供第一种视觉密码方法的布局,以及不时开发和提出的各种方法。本文还概述了基于视觉密码学概念的应用。
{"title":"Visual Cryptography: A Literature Survey","authors":"Rajat Bhatnagar, M. Kumar","doi":"10.1109/ICECA.2018.8474649","DOIUrl":"https://doi.org/10.1109/ICECA.2018.8474649","url":null,"abstract":"Visual cryptography(VC) is a cryptographic methodology which permits visual information, for instance, text, pictures, etcetera to be encrypted such that the decryption can be performed by the human visual framework, without the assistance of PCs. The aim of this survey paper is to provide the readers a layout of the first visual cryptography method, along with the various methods developed and proposed from time to time. This paper also gives a survey of the applications that are based upon the concept of Visual Cryptography.","PeriodicalId":272623,"journal":{"name":"2018 Second International Conference on Electronics, Communication and Aerospace Technology (ICECA)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124356231","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
V-Buddy: A Learning Management System V-Buddy:学习管理系统
K. Wadkar, Prathamesh Koshti, Devendra Parab, Santosh Tamboli
The software we are going to build is useful for different users such as students, placement coordinator, academic coordinator, exam coordinator, faculties, etc. for fulfilling their requirements. The user who accesses the system through his unique log in id and password and then gets information according to the access rights established in the system. Students will be able to get information related to placements, holidays, announcements from faculties, events, timetable, etc. through android app and faculties will have access to the system through a web portal from which information will be shared.
我们要构建的软件对不同的用户都很有用,比如学生、安置协调器、学术协调器、考试协调器、院系等,可以满足他们的需求。用户通过其唯一的登录id和密码访问系统,然后根据系统中建立的访问权限获取信息。学生将能够通过android应用程序获得与实习、假期、院系公告、活动、时间表等相关的信息,院系将通过门户网站访问该系统,并从中共享信息。
{"title":"V-Buddy: A Learning Management System","authors":"K. Wadkar, Prathamesh Koshti, Devendra Parab, Santosh Tamboli","doi":"10.1109/ICECA.2018.8474743","DOIUrl":"https://doi.org/10.1109/ICECA.2018.8474743","url":null,"abstract":"The software we are going to build is useful for different users such as students, placement coordinator, academic coordinator, exam coordinator, faculties, etc. for fulfilling their requirements. The user who accesses the system through his unique log in id and password and then gets information according to the access rights established in the system. Students will be able to get information related to placements, holidays, announcements from faculties, events, timetable, etc. through android app and faculties will have access to the system through a web portal from which information will be shared.","PeriodicalId":272623,"journal":{"name":"2018 Second International Conference on Electronics, Communication and Aerospace Technology (ICECA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129138841","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Chaos Based Image Encryption Using Tinkerbell Map Functions 利用小叮当映射函数的混沌图像加密
Patteti Krishna, Ch Yamini Surya Teja, S. Renuga Devi, V. Thanikaiselvan
From the past few decades new image encryption methods are being developed so as to increase the secrecy rate. Eavesdropping is the main concern for any type of cryptographic methods. Eavesdropping include various methods like cipher text attack. In order to overcome these problems, we have proposed a compelling chaos-based encryption algorithm particularly for pictures. In this we use a secret hexadecimal key which is used to generates initial conditions for Tinkerbell maps. These are further used to generate initial seeds. The main advantage of the proposed algorithm is that it produces different initial seeds for different rounds which increases the encryption security. Using these we have compared the performances of two different chaotic maps using NPCR, UACI and Correlation analysis.
在过去的几十年里,人们不断开发新的图像加密方法,以提高图像的保密率。窃听是任何类型的加密方法的主要关注点。窃听包括密文攻击等多种方式。为了克服这些问题,我们提出了一种引人注目的基于混沌的图像加密算法。在这里,我们使用一个秘密的十六进制密钥,用于生成Tinkerbell映射的初始条件。这些将进一步用于生成初始种子。该算法的主要优点是对不同的轮产生不同的初始种子,提高了加密的安全性。利用这些,我们使用NPCR, UACI和相关分析比较了两种不同混沌映射的性能。
{"title":"A Chaos Based Image Encryption Using Tinkerbell Map Functions","authors":"Patteti Krishna, Ch Yamini Surya Teja, S. Renuga Devi, V. Thanikaiselvan","doi":"10.1109/ICECA.2018.8474891","DOIUrl":"https://doi.org/10.1109/ICECA.2018.8474891","url":null,"abstract":"From the past few decades new image encryption methods are being developed so as to increase the secrecy rate. Eavesdropping is the main concern for any type of cryptographic methods. Eavesdropping include various methods like cipher text attack. In order to overcome these problems, we have proposed a compelling chaos-based encryption algorithm particularly for pictures. In this we use a secret hexadecimal key which is used to generates initial conditions for Tinkerbell maps. These are further used to generate initial seeds. The main advantage of the proposed algorithm is that it produces different initial seeds for different rounds which increases the encryption security. Using these we have compared the performances of two different chaotic maps using NPCR, UACI and Correlation analysis.","PeriodicalId":272623,"journal":{"name":"2018 Second International Conference on Electronics, Communication and Aerospace Technology (ICECA)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129151087","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Evaluation of Image Processing Techniques on a Single Chip Digital Signal Processor 单片数字信号处理器图像处理技术的评价
Dheerajkumar Solanki, M. Wagh, Kailas Yedle, Y. S. Rao
Ahstract- The importance of embedded applications in image and video processing have been taking a large space in current research scenario. Image processing techniques like Histogram equalization, Filtering, Bit plane slicing, Sampling, Quantization, Edge detection, Contrast stretching, Thresholding, Gray scale conversion etc. are the basic building blocks in several fields such as satellite imaging, medical imaging, face recognition, video surveillance etc. The present paper aims at mathematical analysis of these basic building blocks and further examines their implementation on a floating point Digital Signal Processor (DSP) TMS320F28335. It also verifies the reliability of the implemented techniques using a performance parameter. The processed images have been displayed using Python for various image processing techniques to verify the theory.
嵌入式应用在图像和视频处理中的重要性在当前的研究场景中占有很大的空间。直方图均衡、滤波、位平面切片、采样、量化、边缘检测、对比度拉伸、阈值分割、灰度转换等图像处理技术是卫星成像、医学成像、人脸识别、视频监控等领域的基本组成部分。本文旨在对这些基本构建模块进行数学分析,并进一步研究它们在浮点数字信号处理器(DSP) TMS320F28335上的实现。它还使用性能参数验证所实现技术的可靠性。处理后的图像已经显示使用Python的各种图像处理技术来验证理论。
{"title":"Evaluation of Image Processing Techniques on a Single Chip Digital Signal Processor","authors":"Dheerajkumar Solanki, M. Wagh, Kailas Yedle, Y. S. Rao","doi":"10.1109/ICECA.2018.8474682","DOIUrl":"https://doi.org/10.1109/ICECA.2018.8474682","url":null,"abstract":"Ahstract- The importance of embedded applications in image and video processing have been taking a large space in current research scenario. Image processing techniques like Histogram equalization, Filtering, Bit plane slicing, Sampling, Quantization, Edge detection, Contrast stretching, Thresholding, Gray scale conversion etc. are the basic building blocks in several fields such as satellite imaging, medical imaging, face recognition, video surveillance etc. The present paper aims at mathematical analysis of these basic building blocks and further examines their implementation on a floating point Digital Signal Processor (DSP) TMS320F28335. It also verifies the reliability of the implemented techniques using a performance parameter. The processed images have been displayed using Python for various image processing techniques to verify the theory.","PeriodicalId":272623,"journal":{"name":"2018 Second International Conference on Electronics, Communication and Aerospace Technology (ICECA)","volume":"22 8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117084174","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Working model of Self-driving car using Convolutional Neural Network, Raspberry Pi and Arduino 基于卷积神经网络、树莓派和Arduino的自动驾驶汽车工作模型
A. Jain
The evolution of Artificial Intelligence has served as the catalyst in the field of technology. We can now develop things which was once just an imagination. One of such creation is the birth of self-driving car. Days have come where one can do their work or even sleep in the car and without even touching the steering wheel, accelerator you will still be able to reach your target destination safely. This paper proposes a working model of self-driving car which is capable of driving from one location to the other or to say on different types of tracks such as curved tracks, straight tracks and straight followed by curved tracks. A camera module is mounted over the top of the car along with Raspberry Pi sends the images from real world to the Convolutional Neural Network which then predicts one of the following directions. i.e. right, left, forward or stop which is then followed by sending a signal from the Arduino to the controller of the remote controlled car and as a result of it the car moves in the desired direction without any human intervention.
人工智能的发展在技术领域起到了催化剂的作用。我们现在可以开发曾经只是想象的东西。其中一个发明就是自动驾驶汽车的诞生。人们可以在车里工作甚至睡觉的日子已经到来,甚至不用碰方向盘、油门,你仍然能够安全到达目的地。本文提出了一种自动驾驶汽车的工作模型,该模型能够从一个位置行驶到另一个位置,或者说在不同类型的轨道上行驶,例如曲线轨道,直线轨道和直线后曲线轨道。与树莓派一起安装在汽车顶部的摄像头模块将来自现实世界的图像发送到卷积神经网络,然后预测以下方向之一。即右,左,前进或停止,然后通过Arduino向遥控汽车的控制器发送信号,从而使汽车在没有任何人为干预的情况下朝着所需的方向移动。
{"title":"Working model of Self-driving car using Convolutional Neural Network, Raspberry Pi and Arduino","authors":"A. Jain","doi":"10.1109/ICECA.2018.8474620","DOIUrl":"https://doi.org/10.1109/ICECA.2018.8474620","url":null,"abstract":"The evolution of Artificial Intelligence has served as the catalyst in the field of technology. We can now develop things which was once just an imagination. One of such creation is the birth of self-driving car. Days have come where one can do their work or even sleep in the car and without even touching the steering wheel, accelerator you will still be able to reach your target destination safely. This paper proposes a working model of self-driving car which is capable of driving from one location to the other or to say on different types of tracks such as curved tracks, straight tracks and straight followed by curved tracks. A camera module is mounted over the top of the car along with Raspberry Pi sends the images from real world to the Convolutional Neural Network which then predicts one of the following directions. i.e. right, left, forward or stop which is then followed by sending a signal from the Arduino to the controller of the remote controlled car and as a result of it the car moves in the desired direction without any human intervention.","PeriodicalId":272623,"journal":{"name":"2018 Second International Conference on Electronics, Communication and Aerospace Technology (ICECA)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133922423","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 49
期刊
2018 Second International Conference on Electronics, Communication and Aerospace Technology (ICECA)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1