首页 > 最新文献

2013 IEEE International Conference ON Emerging Trends in Computing, Communication and Nanotechnology (ICECCN)最新文献

英文 中文
Maximum a posteriori adaptation method for video semantic indexing 视频语义索引的最大后验自适应方法
B. A. Priyadharssini, S. Sivagami, K. Muneeswaran
To manage large amount of video data, an effective search mechanism is necessary. The keyword based search system is not efficient for video data due to the lack of metadata; hence for video indexing a method called Maximum-a-posteriori (MAP) method which uses Expectation Maximization algorithm to form a universal background model (UBM) by applying all training data. MAP adaptation uses a prior knowledge of UBM model parameters to estimate parameters of every training and test data. GMM Supervectors can be generated from the adaptive mean vectors. Support Vector Machine (SVM) along with GMM supervectors is used for the classification of video. Experimental evaluation of the proposed method is done in TRECVID 2010 video dataset and the result shows that it is better, since the method uses the fusion of visual and audio features.
为了管理海量的视频数据,需要一种有效的搜索机制。基于关键字的视频数据搜索系统由于缺乏元数据而效率不高;因此,对于视频索引,一种称为MAP (Maximum-a-posteriori)方法,该方法使用期望最大化算法通过应用所有训练数据形成通用背景模型(UBM)。MAP自适应使用先验知识的UBM模型参数来估计每个训练和测试数据的参数。GMM超向量可以由自适应均值向量生成。利用支持向量机(SVM)和GMM超向量对视频进行分类。在TRECVID 2010视频数据集上对该方法进行了实验评估,结果表明该方法利用了视觉和音频特征的融合,取得了较好的效果。
{"title":"Maximum a posteriori adaptation method for video semantic indexing","authors":"B. A. Priyadharssini, S. Sivagami, K. Muneeswaran","doi":"10.1109/ICE-CCN.2013.6528613","DOIUrl":"https://doi.org/10.1109/ICE-CCN.2013.6528613","url":null,"abstract":"To manage large amount of video data, an effective search mechanism is necessary. The keyword based search system is not efficient for video data due to the lack of metadata; hence for video indexing a method called Maximum-a-posteriori (MAP) method which uses Expectation Maximization algorithm to form a universal background model (UBM) by applying all training data. MAP adaptation uses a prior knowledge of UBM model parameters to estimate parameters of every training and test data. GMM Supervectors can be generated from the adaptive mean vectors. Support Vector Machine (SVM) along with GMM supervectors is used for the classification of video. Experimental evaluation of the proposed method is done in TRECVID 2010 video dataset and the result shows that it is better, since the method uses the fusion of visual and audio features.","PeriodicalId":286830,"journal":{"name":"2013 IEEE International Conference ON Emerging Trends in Computing, Communication and Nanotechnology (ICECCN)","volume":"134 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128559741","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Removing snow from an image via image decomposition 通过图像分解从图像中去除雪
D. Rajderkar, P. Mohod
Snowfall removal from an image is a challenging problem. In this paper, we propose a snowfall removal framework via image decomposition based on Morphological component analysis. The proposed methods first decompose an image into low frequency (LF) and high frequency (HF) parts using bilateral filter. The high frequency part is then decomposing into “snow component” and “non snow component” by performing dictionary learning and sparse coding.
从图像中去除降雪是一个具有挑战性的问题。本文提出了一种基于形态成分分析的图像分解降雪图框架。该方法首先利用双边滤波将图像分解为低频部分和高频部分。然后通过字典学习和稀疏编码将高频部分分解为“雪分量”和“非雪分量”。
{"title":"Removing snow from an image via image decomposition","authors":"D. Rajderkar, P. Mohod","doi":"10.1109/ICE-CCN.2013.6528565","DOIUrl":"https://doi.org/10.1109/ICE-CCN.2013.6528565","url":null,"abstract":"Snowfall removal from an image is a challenging problem. In this paper, we propose a snowfall removal framework via image decomposition based on Morphological component analysis. The proposed methods first decompose an image into low frequency (LF) and high frequency (HF) parts using bilateral filter. The high frequency part is then decomposing into “snow component” and “non snow component” by performing dictionary learning and sparse coding.","PeriodicalId":286830,"journal":{"name":"2013 IEEE International Conference ON Emerging Trends in Computing, Communication and Nanotechnology (ICECCN)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125243708","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Sociocentric and egocentric measures for identifying the key players in telecom social network 以社会为中心和以自我为中心的电信社交网络关键参与者识别方法
Pushpa, G. Shobha
Telecom Social Network Analysis (TSNA) is an upcoming and interesting area of concern in telecom industries since it not only helps in exploring the information regarding the social network of subscribers but also helps the operators' to focus on their business analytics. TSNA is being used to give a solution to some of the telecom problems such as to improve churn prediction, overall customer satisfaction and retention. Since the structure of social networks provides the natural way to understand customers' relationships and the behavior of groups of highly connected customers. The typical work on social network analysis includes the construction of both multirelational telecom social networks and ego-networks of telecom customers for discovery of group of customers who share similar properties and classify the customers as churners and non-churners. This paper explores both sociocentric and egocentric methods for identifying key players who plays important roles in decision making in finding the churn rate of telecom social networks.
电信社交网络分析(TSNA)是电信行业关注的一个新兴领域,因为它不仅有助于探索有关用户社交网络的信息,而且有助于运营商专注于他们的业务分析。TSNA被用来解决一些电信问题,如提高客户流失预测、整体客户满意度和留存率。因为社会网络的结构提供了一种自然的方式来理解客户关系和高度联系的客户群体的行为。社会网络分析的典型工作包括构建多关系电信社会网络和电信客户自我网络,以发现具有相似属性的客户群体,并将客户划分为流失客户和非流失客户。本文探讨了以社会为中心和以自我为中心的方法,以确定在电信社交网络流失率的决策中起重要作用的关键参与者。
{"title":"Sociocentric and egocentric measures for identifying the key players in telecom social network","authors":"Pushpa, G. Shobha","doi":"10.1109/ICE-CCN.2013.6528525","DOIUrl":"https://doi.org/10.1109/ICE-CCN.2013.6528525","url":null,"abstract":"Telecom Social Network Analysis (TSNA) is an upcoming and interesting area of concern in telecom industries since it not only helps in exploring the information regarding the social network of subscribers but also helps the operators' to focus on their business analytics. TSNA is being used to give a solution to some of the telecom problems such as to improve churn prediction, overall customer satisfaction and retention. Since the structure of social networks provides the natural way to understand customers' relationships and the behavior of groups of highly connected customers. The typical work on social network analysis includes the construction of both multirelational telecom social networks and ego-networks of telecom customers for discovery of group of customers who share similar properties and classify the customers as churners and non-churners. This paper explores both sociocentric and egocentric methods for identifying key players who plays important roles in decision making in finding the churn rate of telecom social networks.","PeriodicalId":286830,"journal":{"name":"2013 IEEE International Conference ON Emerging Trends in Computing, Communication and Nanotechnology (ICECCN)","volume":"91 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127117110","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimized DHT-RBF model as replacement of ARMA-RBF model for wind power forecasting 优化DHT-RBF模型替代ARMA-RBF模型用于风电预测
S. Mukhopadhyay, P. K. Panigrahi, A. Mitra, P. Bhattacharya, M. Sarkar, P. Das
ARMA-Neural model is an established useful model for the Wind Power forecasting purpose. In the current work we introduced Discrete Hilbert Transform (DHT)-Neural Model which provides better result than the ARMA-Neural Model. We know that a signal and its' DHT produces the same Energy Spectrum. Based on this concept in this paper DHT is used for Wind Speed forecasting purpose. Thereafter the RBF neural network is used on this to forecast wind power. Taking the data of measured wind speed from Weather Forecasting Bureau Report as example, we validate the method described above.
arma -神经网络模型是一种成熟的风力发电预测模型。本文介绍了离散希尔伯特变换(DHT)-神经模型,该模型比arma -神经模型具有更好的结果。我们知道一个信号和它的DHT产生相同的能谱。基于这一概念,本文将DHT用于风速预报。在此基础上,利用RBF神经网络对风电进行预测。以气象局报告中的实测风速数据为例,对上述方法进行了验证。
{"title":"Optimized DHT-RBF model as replacement of ARMA-RBF model for wind power forecasting","authors":"S. Mukhopadhyay, P. K. Panigrahi, A. Mitra, P. Bhattacharya, M. Sarkar, P. Das","doi":"10.1109/ICE-CCN.2013.6528534","DOIUrl":"https://doi.org/10.1109/ICE-CCN.2013.6528534","url":null,"abstract":"ARMA-Neural model is an established useful model for the Wind Power forecasting purpose. In the current work we introduced Discrete Hilbert Transform (DHT)-Neural Model which provides better result than the ARMA-Neural Model. We know that a signal and its' DHT produces the same Energy Spectrum. Based on this concept in this paper DHT is used for Wind Speed forecasting purpose. Thereafter the RBF neural network is used on this to forecast wind power. Taking the data of measured wind speed from Weather Forecasting Bureau Report as example, we validate the method described above.","PeriodicalId":286830,"journal":{"name":"2013 IEEE International Conference ON Emerging Trends in Computing, Communication and Nanotechnology (ICECCN)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125398552","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Application of ACSA for solving multi-objective optimal power flow problem with load uncertainty ACSA在求解负荷不确定多目标最优潮流问题中的应用
B. Rao, K. Vaisakh
This paper presents a multi-objective adaptive Clonal selection algorithm (MOACSA) for solving optimal power flow (OPF) problem. OPF problem is formulated as a non-linear constrained multi-objective optimization problem in which different objectives and various constraints have been considered. Fast elitist non-dominated sorting and crowding distance techniques have been used to find and manage the Pareto optimal front. Finally, a fuzzy based mechanism has been used to select a best compromise solution from the Pareto set. The proposed MOACS algorithm has been tested on IEEE 30-bus test system with different objectives such as cost, loss and L-index. Simulation studies are carried out under both normal load and load uncertainty conditions for multi-objective optimal power flow problem with different cases. The results obtained with normal load condition are also compared with fast non-dominated sorting genetic algorithm (NSGA-II), multi-objective harmony search algorithm (MOHS) and multi-objective differential evolutionary algorithm (MODE) methods which are available in the literature.
提出了一种求解最优潮流问题的多目标自适应克隆选择算法。将OPF问题表述为考虑不同目标和各种约束的非线性约束多目标优化问题。快速精英非支配排序和拥挤距离技术被用于寻找和管理Pareto最优前沿。最后,利用一种基于模糊的机制从Pareto集合中选择最优妥协解。本文提出的MOACS算法已在IEEE 30总线测试系统上进行了测试,测试目标包括成本、损耗和l指数。针对多目标最优潮流问题,分别在正常负荷和负荷不确定两种情况下进行了仿真研究。并将正常负载条件下的结果与文献中已有的快速非支配排序遗传算法(NSGA-II)、多目标和谐搜索算法(MOHS)和多目标差分进化算法(MODE)方法进行了比较。
{"title":"Application of ACSA for solving multi-objective optimal power flow problem with load uncertainty","authors":"B. Rao, K. Vaisakh","doi":"10.1109/ICE-CCN.2013.6528607","DOIUrl":"https://doi.org/10.1109/ICE-CCN.2013.6528607","url":null,"abstract":"This paper presents a multi-objective adaptive Clonal selection algorithm (MOACSA) for solving optimal power flow (OPF) problem. OPF problem is formulated as a non-linear constrained multi-objective optimization problem in which different objectives and various constraints have been considered. Fast elitist non-dominated sorting and crowding distance techniques have been used to find and manage the Pareto optimal front. Finally, a fuzzy based mechanism has been used to select a best compromise solution from the Pareto set. The proposed MOACS algorithm has been tested on IEEE 30-bus test system with different objectives such as cost, loss and L-index. Simulation studies are carried out under both normal load and load uncertainty conditions for multi-objective optimal power flow problem with different cases. The results obtained with normal load condition are also compared with fast non-dominated sorting genetic algorithm (NSGA-II), multi-objective harmony search algorithm (MOHS) and multi-objective differential evolutionary algorithm (MODE) methods which are available in the literature.","PeriodicalId":286830,"journal":{"name":"2013 IEEE International Conference ON Emerging Trends in Computing, Communication and Nanotechnology (ICECCN)","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122681645","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Hybrid reliability model to enhance the efficiency of composite web services 采用混合可靠性模型,提高复合web服务的效率
C. Prakash, P. Rohini, R. Ganesh, V. Maheswari
In this paper, a service-oriented reliability model that calculates the reliability of composite web services is designed. This model is based on the real-time reliabilities of the atomic web services of the composition. This manuscript contradicts the fact that the reliability of system is based on the exponential function of error arrival rate. The Reliability rate of composite web services is inversely proportional to the workload of the servers. After obtaining the server workload, we dispatch the services into Idle and Active State using doubly stochastic model. This model assumes a Single Composite Service and the atomicity of the services are dispatched in both serial and parallel configurations. A Broker Architecture based on Bounded set technique is designed to deduce the error in the active state by calculating accessibility, availability and error rate. These factors are represented in terms of MTTE, MTBF, MEAR which in turn used to dispatch the services into the server which provides high reliability.
本文设计了一个面向服务的可靠性模型,用于计算组合web服务的可靠性。该模型基于组合的原子web服务的实时可靠性。本文反驳了系统可靠性是以错误到达率的指数函数为基础的事实。复合web服务的可靠性与服务器的工作负载成反比。在获得服务器工作负载后,采用双随机模型将服务分配到空闲和活动状态。该模型假设单个组合服务,并且服务的原子性以串行和并行配置的方式进行分派。设计了一种基于边界集技术的代理体系结构,通过计算可访问性、可用性和错误率来推断活动状态下的错误。这些因素用MTTE、MTBF、MEAR来表示,它们依次用于将服务分派到提供高可靠性的服务器中。
{"title":"Hybrid reliability model to enhance the efficiency of composite web services","authors":"C. Prakash, P. Rohini, R. Ganesh, V. Maheswari","doi":"10.1109/ICE-CCN.2013.6528468","DOIUrl":"https://doi.org/10.1109/ICE-CCN.2013.6528468","url":null,"abstract":"In this paper, a service-oriented reliability model that calculates the reliability of composite web services is designed. This model is based on the real-time reliabilities of the atomic web services of the composition. This manuscript contradicts the fact that the reliability of system is based on the exponential function of error arrival rate. The Reliability rate of composite web services is inversely proportional to the workload of the servers. After obtaining the server workload, we dispatch the services into Idle and Active State using doubly stochastic model. This model assumes a Single Composite Service and the atomicity of the services are dispatched in both serial and parallel configurations. A Broker Architecture based on Bounded set technique is designed to deduce the error in the active state by calculating accessibility, availability and error rate. These factors are represented in terms of MTTE, MTBF, MEAR which in turn used to dispatch the services into the server which provides high reliability.","PeriodicalId":286830,"journal":{"name":"2013 IEEE International Conference ON Emerging Trends in Computing, Communication and Nanotechnology (ICECCN)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114543408","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Design and simulation of hybrid SET-MOS pass transistor logic based universal logic gates 基于通用逻辑门的混合SET-MOS通管逻辑的设计与仿真
A. Jain, A. Ghosh, S. Sarkar
In order to improve density of integration in VLSI chips and to ensure ultra low power dissipation Co-design of MOS transistor along with Single electron transistor is considered as one of the best option to work with. In the present work we have designed universal logic gates using hybrid SET-MOS based pass transistor logic. The logic gates are consists of one Single electron transistor and one NMOS transistor, both are working as pass transistors. In this paper we have designed NAND and NOR logic gates by providing inputs in their original and complemented form to the different nodes of the pass transistors depending upon the realization of that particular logic gate.
为了提高VLSI芯片的集成密度和保证超低功耗,MOS晶体管与单电子晶体管的协同设计被认为是最佳的选择之一。在本工作中,我们采用基于混合SET-MOS的通管逻辑设计了通用逻辑门。逻辑门由一个单电子晶体管和一个NMOS晶体管组成,两者都作为通路晶体管工作。在本文中,我们通过根据特定逻辑门的实现向通路晶体管的不同节点提供原始和补充形式的输入来设计NAND和NOR逻辑门。
{"title":"Design and simulation of hybrid SET-MOS pass transistor logic based universal logic gates","authors":"A. Jain, A. Ghosh, S. Sarkar","doi":"10.1109/ICE-CCN.2013.6528558","DOIUrl":"https://doi.org/10.1109/ICE-CCN.2013.6528558","url":null,"abstract":"In order to improve density of integration in VLSI chips and to ensure ultra low power dissipation Co-design of MOS transistor along with Single electron transistor is considered as one of the best option to work with. In the present work we have designed universal logic gates using hybrid SET-MOS based pass transistor logic. The logic gates are consists of one Single electron transistor and one NMOS transistor, both are working as pass transistors. In this paper we have designed NAND and NOR logic gates by providing inputs in their original and complemented form to the different nodes of the pass transistors depending upon the realization of that particular logic gate.","PeriodicalId":286830,"journal":{"name":"2013 IEEE International Conference ON Emerging Trends in Computing, Communication and Nanotechnology (ICECCN)","volume":"83 1 Pt 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121923966","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Data recovery with energy efficient task allocation in Wireless Sensor Networks 无线传感器网络中节能任务分配的数据恢复
S. Sharma, M. Wazid, N. Gupta, D. P. Singh, R. Goudar
In Wireless Sensor Networks (WSNs) there has been an extensive research going on to extend the life time of the network. Energy efficiency is one of the major concern in WSN's that impacts the network lifetime. There is a compulsive need to find out new and improved ways to reduce the energy consumption associated with different aspects in WSN due to the fact that energy is a critical and important resource in the design of WSN. In this paper, we focus on an important distribution aspect of WSN, task allocation with energy efficiency that helps in improving the utility of the network. Most previous sensor network lifetime enhancement techniques focused on balancing power distribution, based on assumption of uniform battery capacity allocation among homogenous nodes. This work aims to provide solution to the task assignment problem in heterogeneous WSN that also incorporates the log for data recovery in the event of failure. It has been calculated that the proposed method increases the throughput by 9.14%.
在无线传感器网络(WSNs)中,如何延长网络的寿命一直是一个广泛的研究课题。无线传感器网络的能源效率是影响网络寿命的主要问题之一。由于能源是WSN设计中至关重要的资源,因此迫切需要寻找新的和改进的方法来降低与WSN相关的各个方面的能耗。在本文中,我们重点研究了无线传感器网络的一个重要分布方面,即具有能量效率的任务分配,这有助于提高网络的利用率。以往的传感器网络寿命增强技术大多基于均匀节点电池容量均匀分配的假设,侧重于均衡功率分配。本工作旨在为异构WSN中的任务分配问题提供解决方案,并在故障事件中包含用于数据恢复的日志。计算表明,该方法可使吞吐量提高9.14%。
{"title":"Data recovery with energy efficient task allocation in Wireless Sensor Networks","authors":"S. Sharma, M. Wazid, N. Gupta, D. P. Singh, R. Goudar","doi":"10.1109/ICE-CCN.2013.6528512","DOIUrl":"https://doi.org/10.1109/ICE-CCN.2013.6528512","url":null,"abstract":"In Wireless Sensor Networks (WSNs) there has been an extensive research going on to extend the life time of the network. Energy efficiency is one of the major concern in WSN's that impacts the network lifetime. There is a compulsive need to find out new and improved ways to reduce the energy consumption associated with different aspects in WSN due to the fact that energy is a critical and important resource in the design of WSN. In this paper, we focus on an important distribution aspect of WSN, task allocation with energy efficiency that helps in improving the utility of the network. Most previous sensor network lifetime enhancement techniques focused on balancing power distribution, based on assumption of uniform battery capacity allocation among homogenous nodes. This work aims to provide solution to the task assignment problem in heterogeneous WSN that also incorporates the log for data recovery in the event of failure. It has been calculated that the proposed method increases the throughput by 9.14%.","PeriodicalId":286830,"journal":{"name":"2013 IEEE International Conference ON Emerging Trends in Computing, Communication and Nanotechnology (ICECCN)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129663078","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A forensic method for detecting image forgery 一种检测图像伪造的法医方法
S. Mahalakshmi, Dr. K. Vijayalakshmi, E. Agnes
An Extensive growth in software technologies available on Internet results in tampering of images. The main problem in the real world is to determine whether an image is real or forged. In this paper we propose a new method that makes use of the codebook which is generated from the set of image features to determine the geometric manipulations that are occurred in the received image. In the proposed method, an image hash based on bag of visual words attached as signature to the image before transmission. At the destination the forensic hash is compared to detect the geometric manipulations that are applied to the received image. The spatial distribution of image features is encoded to deal with highly textured and contrasted tampering patterns. The proposed method detects all types of tampering.
互联网上可用的软件技术的广泛发展导致图像被篡改。现实世界中的主要问题是确定图像是真实的还是伪造的。在本文中,我们提出了一种利用从图像特征集生成的码本来确定接收图像中发生的几何操作的新方法。在该方法中,基于视觉词包的图像哈希在传输前作为签名附加在图像上。在目的地比较取证哈希值,以检测应用于接收图像的几何操作。对图像特征的空间分布进行编码,以处理高度纹理化和对比篡改模式。提出的方法检测所有类型的篡改。
{"title":"A forensic method for detecting image forgery","authors":"S. Mahalakshmi, Dr. K. Vijayalakshmi, E. Agnes","doi":"10.1109/ICE-CCN.2013.6528568","DOIUrl":"https://doi.org/10.1109/ICE-CCN.2013.6528568","url":null,"abstract":"An Extensive growth in software technologies available on Internet results in tampering of images. The main problem in the real world is to determine whether an image is real or forged. In this paper we propose a new method that makes use of the codebook which is generated from the set of image features to determine the geometric manipulations that are occurred in the received image. In the proposed method, an image hash based on bag of visual words attached as signature to the image before transmission. At the destination the forensic hash is compared to detect the geometric manipulations that are applied to the received image. The spatial distribution of image features is encoded to deal with highly textured and contrasted tampering patterns. The proposed method detects all types of tampering.","PeriodicalId":286830,"journal":{"name":"2013 IEEE International Conference ON Emerging Trends in Computing, Communication and Nanotechnology (ICECCN)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134188986","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
STBC codes for generalized spatial modulation in MIMO systems MIMO系统中广义空间调制的STBC码
K. Sundaravadivu, S. Bharathi
We propose and analyze a generalized spatial modulation scheme. In this GSM multiple antenna will be active during the transmission. A spatial modulation (SM) scheme with multiple active transmit antennas, named as multiple active spatial modulation (MA-SM). In MIMO multiple transmitting antennas are allowed in the SM system to transmit different symbols at the same time instant. Here the Space Time Block Codes are used instead of Spatial Modulator. Compare to SM in STBC the bit error probability is good and signals to noise ratio will be increased. When we will increase the number of transmit and receive antennas using spatial modulator to encode the transmitted datas the bit error rate is high and signal to noise ratio is good for 2×2 MIMO. For 4×4 MIMO the bit error rate is reduced and signal to noise ratio is poor. So to get a Good BER Vs SNR and FER Vs SNR the STBC is used instead of spatial modulator. And for better result the inter symbol distance will be increased in the data transmission and for each symbol the rotation angle will be applied. In GSM 16-QAM modulation is used. So here BPSK, QPSK, 16-QAM modulator and 8 PSK are compared. When Compare to all modulation techniques BPSK modulation is better for good BER Vs SNR and FER Vs SNR.
我们提出并分析了一种广义的空间调制方案。在这种情况下,GSM多天线将在传输过程中被激活。一种具有多个有源发射天线的空间调制方案,称为多有源空间调制(MA-SM)。在MIMO中,SM系统允许多个发射天线在同一时刻发射不同的信号。这里使用空时块码代替空间调制器。与STBC中的SM相比,误码率高,信噪比提高。当我们使用空间调制器对传输数据进行编码时,增加发射和接收天线的数量,对于2×2 MIMO来说,误码率高,信噪比好。对于4×4 MIMO,误码率降低,信噪比较差。因此,为了获得良好的BER / SNR和FER / SNR,采用STBC代替空间调制器。为了获得更好的传输效果,在数据传输中增加符号间距离,并对每个符号应用旋转角度。在GSM中使用16-QAM调制。所以这里比较了BPSK、QPSK、16-QAM调制器和8 PSK。与所有调制技术相比,BPSK调制具有较好的BER / SNR和FER / SNR。
{"title":"STBC codes for generalized spatial modulation in MIMO systems","authors":"K. Sundaravadivu, S. Bharathi","doi":"10.1109/ICE-CCN.2013.6528548","DOIUrl":"https://doi.org/10.1109/ICE-CCN.2013.6528548","url":null,"abstract":"We propose and analyze a generalized spatial modulation scheme. In this GSM multiple antenna will be active during the transmission. A spatial modulation (SM) scheme with multiple active transmit antennas, named as multiple active spatial modulation (MA-SM). In MIMO multiple transmitting antennas are allowed in the SM system to transmit different symbols at the same time instant. Here the Space Time Block Codes are used instead of Spatial Modulator. Compare to SM in STBC the bit error probability is good and signals to noise ratio will be increased. When we will increase the number of transmit and receive antennas using spatial modulator to encode the transmitted datas the bit error rate is high and signal to noise ratio is good for 2×2 MIMO. For 4×4 MIMO the bit error rate is reduced and signal to noise ratio is poor. So to get a Good BER Vs SNR and FER Vs SNR the STBC is used instead of spatial modulator. And for better result the inter symbol distance will be increased in the data transmission and for each symbol the rotation angle will be applied. In GSM 16-QAM modulation is used. So here BPSK, QPSK, 16-QAM modulator and 8 PSK are compared. When Compare to all modulation techniques BPSK modulation is better for good BER Vs SNR and FER Vs SNR.","PeriodicalId":286830,"journal":{"name":"2013 IEEE International Conference ON Emerging Trends in Computing, Communication and Nanotechnology (ICECCN)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131867338","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
期刊
2013 IEEE International Conference ON Emerging Trends in Computing, Communication and Nanotechnology (ICECCN)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1