首页 > 最新文献

2012 International Conference on Communication, Information & Computing Technology (ICCICT)最新文献

英文 中文
Feature Extraction using DCT fusion based on facial symmetry for enhanced face recognition 基于面部对称性的DCT融合特征提取增强人脸识别
P. Prathik, R. Nafde, K. Manikantan, S. Ramachandran
Feature Extraction plays a very important role in Face Recognition technology. This paper proposes a novel Discrete Cosine Transform (DCT) fusion technique based on facial symmetry. Also proposed are DCT subset matrix selection based on aspect ratio of the image and pre-processing concepts, namely Local Histogram Equalization to remove illumination variation and Scale normalization using skin detection for colored images. The performance of proposed techniques is evaluated by computing the recognition rate and number of features selected for ORL, Extended Yale B and Color FERET databases.
特征提取在人脸识别技术中起着非常重要的作用。提出了一种基于面部对称性的离散余弦变换(DCT)融合技术。此外,还提出了基于图像宽高比的DCT子集矩阵选择和预处理概念,即局部直方图均衡化(Local Histogram Equalization)来去除光照变化和彩色图像的皮肤检测尺度归一化。通过计算ORL、Extended Yale B和Color FERET数据库的识别率和特征数量来评估所提出技术的性能。
{"title":"Feature Extraction using DCT fusion based on facial symmetry for enhanced face recognition","authors":"P. Prathik, R. Nafde, K. Manikantan, S. Ramachandran","doi":"10.1109/ICCICT.2012.6398158","DOIUrl":"https://doi.org/10.1109/ICCICT.2012.6398158","url":null,"abstract":"Feature Extraction plays a very important role in Face Recognition technology. This paper proposes a novel Discrete Cosine Transform (DCT) fusion technique based on facial symmetry. Also proposed are DCT subset matrix selection based on aspect ratio of the image and pre-processing concepts, namely Local Histogram Equalization to remove illumination variation and Scale normalization using skin detection for colored images. The performance of proposed techniques is evaluated by computing the recognition rate and number of features selected for ORL, Extended Yale B and Color FERET databases.","PeriodicalId":319467,"journal":{"name":"2012 International Conference on Communication, Information & Computing Technology (ICCICT)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121080791","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
An effectual method for extraction of ROI of palmprints 提取掌纹 ROI 的有效方法
H. B. Kekre, T. Sarode, R. Vig
Extraction of region of interest (ROI) from a palmprint considerably improves the efficiency of identification systems as ROI extracted palmprint images have more entropy and require less processing and storage. In this paper we have extracted the ROI of palmprints of two sets of databases, Hongkong Polytechnic University low resolution palmprint Database and high resolution indigenous database. The method used here employs image processing techniques including dynamic thresholding for binarization, centroid determination, boundary extraction using morphological operations, Euclidean distance calculations from the centroid, valley points determination after smoothening the Euclidean distance plot, from which finally the ROI is extracted.For the above mentioned datasets, the ROI of size 128 × 128 and 256 × 256 respectively have been extracted using this technique.
从掌纹中提取感兴趣区域(ROI)可大大提高识别系统的效率,因为提取 ROI 的掌纹图像熵值更大,所需的处理和存储也更少。在本文中,我们提取了香港理工大学低分辨率掌纹数据库和高分辨率本地数据库两组数据库中掌纹的 ROI。本文采用的方法运用了图像处理技术,包括动态阈值二值化、确定中心点、使用形态学运算提取边界、计算中心点的欧氏距离、平滑欧氏距离图后确定谷点,最后从中提取 ROI。
{"title":"An effectual method for extraction of ROI of palmprints","authors":"H. B. Kekre, T. Sarode, R. Vig","doi":"10.1109/ICCICT.2012.6398207","DOIUrl":"https://doi.org/10.1109/ICCICT.2012.6398207","url":null,"abstract":"Extraction of region of interest (ROI) from a palmprint considerably improves the efficiency of identification systems as ROI extracted palmprint images have more entropy and require less processing and storage. In this paper we have extracted the ROI of palmprints of two sets of databases, Hongkong Polytechnic University low resolution palmprint Database and high resolution indigenous database. The method used here employs image processing techniques including dynamic thresholding for binarization, centroid determination, boundary extraction using morphological operations, Euclidean distance calculations from the centroid, valley points determination after smoothening the Euclidean distance plot, from which finally the ROI is extracted.For the above mentioned datasets, the ROI of size 128 × 128 and 256 × 256 respectively have been extracted using this technique.","PeriodicalId":319467,"journal":{"name":"2012 International Conference on Communication, Information & Computing Technology (ICCICT)","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125897711","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Detection of multiple points of contact on an imaging touch-screen 在成像触摸屏上检测多个接触点
P. C. Ravoor, S. R. Rupanagudi, B. Ranjani
Touch-screens have emerged as a very popular technology. Touch-screens pervade all electronic devices from laptops to mobile-phones to advanced security systems, up to such a point that any device that does not use touch-screens is deemed outdated. Touch-screens can be broadly classified into three types - capacitive, resistive and imaging. The major advantage of imaging touch screens is its low cost as compared to its counterparts and their upgradation also involves minimal changes to hardware. In areas where there is no necessity of slim touch-screens, image processing touch screens are of a great asset. Essentially, imaging touch-screens are capable of the same functionalities, if not more, as their slimmer counterparts. This includes the latest trend in touch-screen technology, “multi-touch”. This paper discusses a novel algorithm to detect multiple points of contact on an imaging touch surface. The algorithm was implemented using Java programming language and a high level of accuracy was achieved in detecting multiple finger tip blobs for various experiments conducted.
触摸屏已经成为一种非常流行的技术。从笔记本电脑到手机,再到先进的安全系统,触摸屏无处不在,以至于任何不使用触摸屏的设备都被视为过时。触摸屏大致可分为三种类型——电容式、电阻式和成像式。与同类产品相比,成像触摸屏的主要优势是其成本较低,而且其升级也只需要对硬件进行最小的更改。在不需要超薄触摸屏的领域,图像处理触摸屏是一个很好的资产。从本质上讲,成像触摸屏具有与轻薄触摸屏相同的功能,甚至更多。这包括触摸屏技术的最新趋势——“多点触控”。本文讨论了一种检测成像触摸表面上多个接触点的新算法。该算法采用Java编程语言实现,在多种实验中对多个指尖斑点的检测达到了较高的精度。
{"title":"Detection of multiple points of contact on an imaging touch-screen","authors":"P. C. Ravoor, S. R. Rupanagudi, B. Ranjani","doi":"10.1109/ICCICT.2012.6398135","DOIUrl":"https://doi.org/10.1109/ICCICT.2012.6398135","url":null,"abstract":"Touch-screens have emerged as a very popular technology. Touch-screens pervade all electronic devices from laptops to mobile-phones to advanced security systems, up to such a point that any device that does not use touch-screens is deemed outdated. Touch-screens can be broadly classified into three types - capacitive, resistive and imaging. The major advantage of imaging touch screens is its low cost as compared to its counterparts and their upgradation also involves minimal changes to hardware. In areas where there is no necessity of slim touch-screens, image processing touch screens are of a great asset. Essentially, imaging touch-screens are capable of the same functionalities, if not more, as their slimmer counterparts. This includes the latest trend in touch-screen technology, “multi-touch”. This paper discusses a novel algorithm to detect multiple points of contact on an imaging touch surface. The algorithm was implemented using Java programming language and a high level of accuracy was achieved in detecting multiple finger tip blobs for various experiments conducted.","PeriodicalId":319467,"journal":{"name":"2012 International Conference on Communication, Information & Computing Technology (ICCICT)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130896330","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Tumor segmentation by tolerance near set approach in mammography and lesion classification with neural network 乳房x线摄影中耐受近集法的肿瘤分割及神经网络的病变分类
V. Bora, A. G. Kothari, A. Keskar
The mammography is the most effective procedure for an early diagnosis of the breast cancer. In this paper, a new algorithm to detect suspicious lesions in mammograms is developed using tolerance near set approach. Near set theory provides a method to establish resemblance between objects contained in a disjoint set. Objects that have, in some degree, affinities are considered perceptually near each other. The probe functions are defined in terms of digital images such as: gray level, entropy, color, texture, etc. Objects in visual field are always presented with respect to the selected probe functions. Moreover, it is the probe functions that are used to measure characteristics of visual objects and similarities among perceptual objects, making it possible to determine if two objects are associated with the same pattern. The algorithm has been verified on mammograms from the CICRI (Central India Cancer Research Institute, Nagpur, India) and Mias database. Results of segmentation are compared with Otsu method of segmentation.. Once the features are computed for each region of interest (ROI), they are used as inputs to a supervised Back Propagation Neural Network. Results indicate that Tolerance Near sets segmentation method performs better than otsu method in terms of classification accuracy.
乳房x光检查是早期诊断乳腺癌最有效的方法。本文提出了一种利用容忍度近集方法检测乳房x光片可疑病灶的新算法。近集理论提供了一种建立不相交集合中包含的对象之间相似性的方法。在某种程度上具有亲和力的物体被认为在感知上彼此接近。探针函数是根据数字图像定义的,如:灰度、熵、颜色、纹理等。视场中的物体总是相对于所选的探测函数来表示的。此外,探测函数用于测量视觉对象的特征和感知对象之间的相似性,从而可以确定两个对象是否与相同的模式相关联。该算法已在来自印度那格浦尔中央印度癌症研究所(CICRI)和Mias数据库的乳房x光照片上得到验证。将分割结果与Otsu方法进行了比较。一旦计算出每个感兴趣区域(ROI)的特征,它们就被用作有监督的反向传播神经网络的输入。结果表明,容忍近集分割方法在分类精度上优于otsu方法。
{"title":"Tumor segmentation by tolerance near set approach in mammography and lesion classification with neural network","authors":"V. Bora, A. G. Kothari, A. Keskar","doi":"10.1109/ICCICT.2012.6398193","DOIUrl":"https://doi.org/10.1109/ICCICT.2012.6398193","url":null,"abstract":"The mammography is the most effective procedure for an early diagnosis of the breast cancer. In this paper, a new algorithm to detect suspicious lesions in mammograms is developed using tolerance near set approach. Near set theory provides a method to establish resemblance between objects contained in a disjoint set. Objects that have, in some degree, affinities are considered perceptually near each other. The probe functions are defined in terms of digital images such as: gray level, entropy, color, texture, etc. Objects in visual field are always presented with respect to the selected probe functions. Moreover, it is the probe functions that are used to measure characteristics of visual objects and similarities among perceptual objects, making it possible to determine if two objects are associated with the same pattern. The algorithm has been verified on mammograms from the CICRI (Central India Cancer Research Institute, Nagpur, India) and Mias database. Results of segmentation are compared with Otsu method of segmentation.. Once the features are computed for each region of interest (ROI), they are used as inputs to a supervised Back Propagation Neural Network. Results indicate that Tolerance Near sets segmentation method performs better than otsu method in terms of classification accuracy.","PeriodicalId":319467,"journal":{"name":"2012 International Conference on Communication, Information & Computing Technology (ICCICT)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121934759","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Graph based forecasting for Social networking site 基于图的社交网站预测
S. Kadge, G. Bhatia
The Social networking site play an important role in today's world thereby attracting lots of researchers to take advantage of the user's information available in these sites. Mining the database using different algorithms like association rule mining require multiple database scan. In this research forecasting is based on the directed weighted social graph. It deals with visualization of a dataset and prediction of some occurrences based upon this data. The methodology proposed is to generate a social graph of user's actions and predict the future social activities using graph mining. A dataset from the social networking site is considered and converted to a directed, weighted social graph. This graph is updated dynamically based on the changes in the database of social networking site. By creating some mathematical rules applied on the graph, we could project the future activities of users in terms of community memberships, the strength of a relationship between two users without knowing the content of the discussion. We can also find the most popular community. To find the efficiency of this method, the result interpreted by this experiment will be compared to other methods used for prediction like Apriori etc.
社交网站在当今世界中扮演着重要的角色,因此吸引了许多研究人员利用这些网站上提供的用户信息。使用不同的算法(如关联规则挖掘)挖掘数据库需要多次数据库扫描。在本研究中,预测是基于有向加权社会图。它处理数据集的可视化和基于该数据的某些事件的预测。提出的方法是生成用户行为的社交图,并使用图挖掘预测未来的社交活动。考虑来自社交网站的数据集并将其转换为有向加权社交图。此图是根据社交网站数据库的变化动态更新的。通过创建一些应用于图表的数学规则,我们可以在不知道讨论内容的情况下,根据社区成员关系、两个用户之间的关系强度来预测用户的未来活动。我们还可以找到最受欢迎的社区。为了发现该方法的效率,将本实验解释的结果与Apriori等用于预测的其他方法进行比较。
{"title":"Graph based forecasting for Social networking site","authors":"S. Kadge, G. Bhatia","doi":"10.1109/ICCICT.2012.6398167","DOIUrl":"https://doi.org/10.1109/ICCICT.2012.6398167","url":null,"abstract":"The Social networking site play an important role in today's world thereby attracting lots of researchers to take advantage of the user's information available in these sites. Mining the database using different algorithms like association rule mining require multiple database scan. In this research forecasting is based on the directed weighted social graph. It deals with visualization of a dataset and prediction of some occurrences based upon this data. The methodology proposed is to generate a social graph of user's actions and predict the future social activities using graph mining. A dataset from the social networking site is considered and converted to a directed, weighted social graph. This graph is updated dynamically based on the changes in the database of social networking site. By creating some mathematical rules applied on the graph, we could project the future activities of users in terms of community memberships, the strength of a relationship between two users without knowing the content of the discussion. We can also find the most popular community. To find the efficiency of this method, the result interpreted by this experiment will be compared to other methods used for prediction like Apriori etc.","PeriodicalId":319467,"journal":{"name":"2012 International Conference on Communication, Information & Computing Technology (ICCICT)","volume":"94 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122560082","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Pitch detection in time and frequency domain 时域和频域的基音检测
S. Upadhya
The beauty of human speech lies in the complexity of the different sounds that can be produced by a few tubes and muscles. This intricacy, however, makes speech processing a challenging task. One defining characteristic of speech is its pitch. Detecting this Pitch or equivalently, fundamental frequency detection of a speech signal is important in many speech applications. Pitch detectors are used in vocoders, speaker identification and verification systems and also as aids to the handicapped. Because of its importance many solutions to detect pitch has been proposed both in time and frequency domains. One such solution is pitch detection is by using Autocorrelation method and Average Magnitude Difference Function (AMDF), method which are analyses done in the time domain and the other is detecting the harmonic nature in the frequency domain. This paper gives the implementation results of the pitch period estimated in the time and frequency domains for vowel and fricative speech sounds, both for male and female speakers.
人类语言的美妙之处在于不同声音的复杂性,这些声音可以由一些管子和肌肉发出。然而,这种复杂性使得语音处理成为一项具有挑战性的任务。语音的一个决定性特征是音高。在许多语音应用中,检测该基音或等效的语音信号的基频检测非常重要。音高检测器用于声码器、说话人识别和验证系统,也可作为残疾人的辅助工具。由于基音检测的重要性,人们从时域和频域两方面提出了许多基音检测方法。其中一种方法是利用自相关法和平均幅值差函数(AMDF)在时域进行分析,另一种方法是在频域进行谐波检测。本文给出了在时间域和频率域估计元音和摩擦音的音高周期的实现结果,包括男性和女性说话者。
{"title":"Pitch detection in time and frequency domain","authors":"S. Upadhya","doi":"10.1109/ICCICT.2012.6398150","DOIUrl":"https://doi.org/10.1109/ICCICT.2012.6398150","url":null,"abstract":"The beauty of human speech lies in the complexity of the different sounds that can be produced by a few tubes and muscles. This intricacy, however, makes speech processing a challenging task. One defining characteristic of speech is its pitch. Detecting this Pitch or equivalently, fundamental frequency detection of a speech signal is important in many speech applications. Pitch detectors are used in vocoders, speaker identification and verification systems and also as aids to the handicapped. Because of its importance many solutions to detect pitch has been proposed both in time and frequency domains. One such solution is pitch detection is by using Autocorrelation method and Average Magnitude Difference Function (AMDF), method which are analyses done in the time domain and the other is detecting the harmonic nature in the frequency domain. This paper gives the implementation results of the pitch period estimated in the time and frequency domains for vowel and fricative speech sounds, both for male and female speakers.","PeriodicalId":319467,"journal":{"name":"2012 International Conference on Communication, Information & Computing Technology (ICCICT)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126556651","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Energy-efficient switching transmission scheme for a cooperative WSN 协同无线传感器网络的节能交换传输方案
Lalitha Kumari, Subaashini
In this paper, a novel technique is proposed for energy efficient switching transmission scheme in a wireless sensor network (WSN). Distributed sensors can cooperate with the neighborhood and transmit their data to the data collector by choosing a proper transmission mode adaptively based on the channel conditions and distance among the sensors. The analytic performances of two MIMO transmission modes and SIMO can be accessed by investigating the statistical properties of a correlated virtual multiple-input multiple-output (MIMO) channel between the sensors and data collector. The energy efficiencies of two MIMO transmission modes namely spatial multiplexing, transmit diversity are also evaluated. Based on these result, a new energy efficient mode switching criterion between spatial multiplexing, transmit diversity and SIMO suitable to a WSN is derived.
提出了一种新型的无线传感器网络节能交换传输方案。分布式传感器可以根据信道条件和传感器之间的距离自适应选择合适的传输方式,与邻域协作,将数据传输到数据采集器。通过研究传感器和数据采集器之间的相关虚拟多输入多输出(MIMO)通道的统计特性,可以获得两种MIMO传输模式和SIMO的分析性能。对空间复用和发射分集这两种MIMO传输方式的能量效率进行了评价。在此基础上,提出了一种适用于无线传感器网络的空间复用、传输分集和SIMO之间的节能模式切换准则。
{"title":"Energy-efficient switching transmission scheme for a cooperative WSN","authors":"Lalitha Kumari, Subaashini","doi":"10.1109/ICCICT.2012.6398092","DOIUrl":"https://doi.org/10.1109/ICCICT.2012.6398092","url":null,"abstract":"In this paper, a novel technique is proposed for energy efficient switching transmission scheme in a wireless sensor network (WSN). Distributed sensors can cooperate with the neighborhood and transmit their data to the data collector by choosing a proper transmission mode adaptively based on the channel conditions and distance among the sensors. The analytic performances of two MIMO transmission modes and SIMO can be accessed by investigating the statistical properties of a correlated virtual multiple-input multiple-output (MIMO) channel between the sensors and data collector. The energy efficiencies of two MIMO transmission modes namely spatial multiplexing, transmit diversity are also evaluated. Based on these result, a new energy efficient mode switching criterion between spatial multiplexing, transmit diversity and SIMO suitable to a WSN is derived.","PeriodicalId":319467,"journal":{"name":"2012 International Conference on Communication, Information & Computing Technology (ICCICT)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127224255","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
CVPD: A tool based on a social network analysis to combating viruses propagation CVPD:一种基于社会网络分析来对抗病毒传播的工具
S. Mishra, U. Agrawal, G. Nandi
It has been seen that Social network analysis is gaining its applicability in several areas like business, marketing, biology, disease modeling, and anti-terrorism. In this paper, we have discussed its practical application in the domain of computer network to identify distribution of computer viruses flowing through the network. To the best of our knowledge this is a novel idea and is based on the gSpan (Graph based substructure Pattern Mining) algorithm for identifying frequent pattern of viruses flowing in a particular region of connected nodes. This crusades make analysist enabled to deal with the problems and deploy more efficient antivirus in that region of nodes.
人们已经看到,社会网络分析在商业、市场营销、生物学、疾病建模和反恐等多个领域获得了适用性。在本文中,我们讨论了它在计算机网络领域的实际应用,以识别计算机病毒在网络中的分布。据我们所知,这是一个新颖的想法,它基于gSpan(基于图的子结构模式挖掘)算法,用于识别在连接节点的特定区域中流动的病毒的频繁模式。这使得分析人员能够处理问题,并在该节点区域部署更有效的反病毒。
{"title":"CVPD: A tool based on a social network analysis to combating viruses propagation","authors":"S. Mishra, U. Agrawal, G. Nandi","doi":"10.1109/ICCICT.2012.6398191","DOIUrl":"https://doi.org/10.1109/ICCICT.2012.6398191","url":null,"abstract":"It has been seen that Social network analysis is gaining its applicability in several areas like business, marketing, biology, disease modeling, and anti-terrorism. In this paper, we have discussed its practical application in the domain of computer network to identify distribution of computer viruses flowing through the network. To the best of our knowledge this is a novel idea and is based on the gSpan (Graph based substructure Pattern Mining) algorithm for identifying frequent pattern of viruses flowing in a particular region of connected nodes. This crusades make analysist enabled to deal with the problems and deploy more efficient antivirus in that region of nodes.","PeriodicalId":319467,"journal":{"name":"2012 International Conference on Communication, Information & Computing Technology (ICCICT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127397615","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Performance analysis of Free Space Optical links encoded using Luby Transform codes 使用Luby变换编码的自由空间光链路的性能分析
G. Prakash, M. Kulkarni, U. Sripati, M. N. Kalyanpur
Free Space Optical (FSO) communication is an emerging transmission technique to transmit high data rates without using cables. This technology is expected to revolutionize the present communication system architectures both in the terrestrial and the in -space architecture. Atmospheric effects can significantly degrade the performance of FSO systems. This reduces the SNR and leads to impaired performance. FSO channels can be modeled using Gamma-Gamma, Weibull, Log-Normal, K distribution functions. Error control codes can help to mitigate atmospheric turbulence induced signal fading in free space optical communication links. Luby Transform codes belong to a class of error control codes called Fountain codes and are meant for erasure channels. In this paper, we propose encoding FSO links with Luby Transform (LT) codes for error channels. Decoding is done using belief propagation with Log Likelihood Ratio and results are obtained for different modulation schemes under different channel distributions.
自由空间光通信(FSO)是一种新兴的传输技术,可以在不使用电缆的情况下传输高速率的数据。该技术有望彻底改变现有的地面和空间通信系统体系结构。大气效应会显著降低FSO系统的性能。这降低了信噪比,导致性能受损。FSO信道可以使用Gamma-Gamma、Weibull、Log-Normal、K分布函数进行建模。错误控制码可以帮助减轻大气湍流引起的信号衰落在自由空间光通信链路。Luby变换码属于一类错误控制码,称为喷泉码,用于擦除通道。在本文中,我们提出了用Luby变换(LT)编码错误信道的FSO链路。利用对数似然比的信念传播进行解码,得到了不同信道分布下不同调制方案的解码结果。
{"title":"Performance analysis of Free Space Optical links encoded using Luby Transform codes","authors":"G. Prakash, M. Kulkarni, U. Sripati, M. N. Kalyanpur","doi":"10.1109/ICCICT.2012.6398133","DOIUrl":"https://doi.org/10.1109/ICCICT.2012.6398133","url":null,"abstract":"Free Space Optical (FSO) communication is an emerging transmission technique to transmit high data rates without using cables. This technology is expected to revolutionize the present communication system architectures both in the terrestrial and the in -space architecture. Atmospheric effects can significantly degrade the performance of FSO systems. This reduces the SNR and leads to impaired performance. FSO channels can be modeled using Gamma-Gamma, Weibull, Log-Normal, K distribution functions. Error control codes can help to mitigate atmospheric turbulence induced signal fading in free space optical communication links. Luby Transform codes belong to a class of error control codes called Fountain codes and are meant for erasure channels. In this paper, we propose encoding FSO links with Luby Transform (LT) codes for error channels. Decoding is done using belief propagation with Log Likelihood Ratio and results are obtained for different modulation schemes under different channel distributions.","PeriodicalId":319467,"journal":{"name":"2012 International Conference on Communication, Information & Computing Technology (ICCICT)","volume":"XL 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131199421","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Multiscale wavelet based edge detection and Independent Component Analysis (ICA) for Face Recognition 基于多尺度小波边缘检测和独立分量分析的人脸识别
K. Karande
In this paper we have proposed wavelet based edge detection algorithm that combines the coefficients of wavelet transforms on a series of scales. The outcome of this algorithm is edginess like information further used to obtain Independent Components using ICA algorithms. The combination of Multiscale wavelet based edge detection and Independent Component Analysis (ICA) is used for Face Recognition becomes a novel approach. The independent components obtained by ICA algorithms are used as feature vectors for classification. The Euclidean distance (L2) classifier is used for testing of images. The algorithm is tested on two different databases i.e Asian face database and Indian face database of face images for variation in illumination, facial expressions and facial poses up to 1800rotation angle. Encouraging results of this unique approach of face recognition has given future direction for research work in this area.
本文提出了一种基于小波变换的边缘检测算法,该算法结合了一系列尺度上小波变换的系数。该算法得到的结果是棱角信息,进一步利用ICA算法获得独立分量。基于多尺度小波的边缘检测与独立分量分析(ICA)相结合成为人脸识别的一种新方法。将ICA算法得到的独立分量作为特征向量进行分类。欧几里得距离(L2)分类器用于图像的测试。该算法在两个不同的数据库上进行了测试,即亚洲人脸数据库和印度人脸数据库,用于检测光照、面部表情和面部姿势的变化,旋转角度可达1800个。这种独特的人脸识别方法取得了令人鼓舞的成果,为该领域的研究工作指明了未来的方向。
{"title":"Multiscale wavelet based edge detection and Independent Component Analysis (ICA) for Face Recognition","authors":"K. Karande","doi":"10.1109/ICCICT.2012.6398140","DOIUrl":"https://doi.org/10.1109/ICCICT.2012.6398140","url":null,"abstract":"In this paper we have proposed wavelet based edge detection algorithm that combines the coefficients of wavelet transforms on a series of scales. The outcome of this algorithm is edginess like information further used to obtain Independent Components using ICA algorithms. The combination of Multiscale wavelet based edge detection and Independent Component Analysis (ICA) is used for Face Recognition becomes a novel approach. The independent components obtained by ICA algorithms are used as feature vectors for classification. The Euclidean distance (L2) classifier is used for testing of images. The algorithm is tested on two different databases i.e Asian face database and Indian face database of face images for variation in illumination, facial expressions and facial poses up to 1800rotation angle. Encouraging results of this unique approach of face recognition has given future direction for research work in this area.","PeriodicalId":319467,"journal":{"name":"2012 International Conference on Communication, Information & Computing Technology (ICCICT)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131903645","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
期刊
2012 International Conference on Communication, Information & Computing Technology (ICCICT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1