首页 > 最新文献

2014 International Conference on Communication and Network Technologies最新文献

英文 中文
Enhancement of hand held device captured document images with phase preservation 用相位保存增强手持设备捕获的文档图像
Pub Date : 2014-12-01 DOI: 10.1109/CNT.2014.7062727
S. Saranraj, N. Venkateswaran
Enhancement of text information from the images captured by mobile camera is a very challenging task due to the high variation between the background and the foreground that contains shadows, poor contrast and non uniform illumination. In this paper, denoising along with binarization algorithm that uses phase congruency features is proposed to extract the text information from the document images. In the pre-processing step, the image is de-noised to preserve all features present in the document image. In the next step, the phase congruency map is obtained from the document image and it is combined with the image obtained in the pre-processing step. The post-processing step is to improve the quality of the texts by using morphological operations. Experimental results shows that the proposed method performs well in enhancing the document images captured using hand held devices.
由于背景和前景之间的差异很大,其中包含阴影,对比度差,光照不均匀,因此对移动相机捕获的图像中的文本信息进行增强是一项非常具有挑战性的任务。本文提出了一种基于相位一致性特征的去噪与二值化算法来提取文档图像中的文本信息。在预处理步骤中,对图像进行去噪以保留文档图像中存在的所有特征。下一步,从文档图像中获得相位一致性映射,并将其与预处理步骤中获得的图像结合。后处理步骤是通过形态学操作来提高文本的质量。实验结果表明,该方法对手持设备捕获的文档图像有较好的增强效果。
{"title":"Enhancement of hand held device captured document images with phase preservation","authors":"S. Saranraj, N. Venkateswaran","doi":"10.1109/CNT.2014.7062727","DOIUrl":"https://doi.org/10.1109/CNT.2014.7062727","url":null,"abstract":"Enhancement of text information from the images captured by mobile camera is a very challenging task due to the high variation between the background and the foreground that contains shadows, poor contrast and non uniform illumination. In this paper, denoising along with binarization algorithm that uses phase congruency features is proposed to extract the text information from the document images. In the pre-processing step, the image is de-noised to preserve all features present in the document image. In the next step, the phase congruency map is obtained from the document image and it is combined with the image obtained in the pre-processing step. The post-processing step is to improve the quality of the texts by using morphological operations. Experimental results shows that the proposed method performs well in enhancing the document images captured using hand held devices.","PeriodicalId":347883,"journal":{"name":"2014 International Conference on Communication and Network Technologies","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114385730","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Robust estimation of incorrect data using relative correlation clustering technique in wireless sensor networks 基于相对相关聚类技术的无线传感器网络错误数据鲁棒估计
Pub Date : 2014-12-01 DOI: 10.1109/CNT.2014.7062776
U. Barakkath Nisha, N. Maheswari, R. Venkatesh, R. Yasir Abdullah
Data inaccuracy is an important problem in wireless sensor networks, since the accuracy is affected by harsh environments and malicious nodes. The reason for this data inaccuracy is the improper identification of outliers. To detect exact outliers in the wireless sensor networks, we propose the relative correlation based clustering (RCC) technique with high data accuracy and low computational overhead. Identifying spatial, temporal correlation and attribute correlation is the first phase of the proposed algorithm. The second phase is optimal cluster formation and outlier classification based on two correlation levels. The inference of the proposed idea shows high outlier detection rate with different outlier corruption level. Moreover, our results when compared with previous approach taking the same data into consideration clearly outperform them, identifying high level of detection rate (99.87%) in the top-line with near to the ground false alarm rate.
数据不准确是无线传感器网络中的一个重要问题,其精度受到恶劣环境和恶意节点的影响。这种数据不准确的原因是异常值的识别不当。为了准确检测无线传感器网络中的异常点,本文提出了基于相对相关的聚类技术,该技术具有较高的数据精度和较低的计算开销。识别空间相关性、时间相关性和属性相关性是该算法的第一步。第二阶段是基于两个相关水平的最优聚类形成和离群值分类。结果表明,在不同的异常点腐败程度下,该方法的异常点检出率较高。此外,在考虑相同数据的情况下,与之前的方法相比,我们的结果明显优于它们,在接近地面的虚警率的顶线中识别出高水平的检测率(99.87%)。
{"title":"Robust estimation of incorrect data using relative correlation clustering technique in wireless sensor networks","authors":"U. Barakkath Nisha, N. Maheswari, R. Venkatesh, R. Yasir Abdullah","doi":"10.1109/CNT.2014.7062776","DOIUrl":"https://doi.org/10.1109/CNT.2014.7062776","url":null,"abstract":"Data inaccuracy is an important problem in wireless sensor networks, since the accuracy is affected by harsh environments and malicious nodes. The reason for this data inaccuracy is the improper identification of outliers. To detect exact outliers in the wireless sensor networks, we propose the relative correlation based clustering (RCC) technique with high data accuracy and low computational overhead. Identifying spatial, temporal correlation and attribute correlation is the first phase of the proposed algorithm. The second phase is optimal cluster formation and outlier classification based on two correlation levels. The inference of the proposed idea shows high outlier detection rate with different outlier corruption level. Moreover, our results when compared with previous approach taking the same data into consideration clearly outperform them, identifying high level of detection rate (99.87%) in the top-line with near to the ground false alarm rate.","PeriodicalId":347883,"journal":{"name":"2014 International Conference on Communication and Network Technologies","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129852101","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Determination of stress using Blood Pressure and Galvanic Skin Response 用血压和皮肤电反应测定压力
Pub Date : 2014-12-01 DOI: 10.1109/CNT.2014.7062747
Atlee Fernandes, Rakesh Helawar, R. Lokesh, Tushar Tari, Ashwini Shahapurkar
Stress is a response to mental/emotional or physical aspects that is encountered in daily life. In order to manage stress, it is required to monitor the stress levels on continuous basis. Individual physiological parameters such as Galvanic Skin Response (GSR), Heart Rate (HR), Blood Pressure (BP), ECG (Electrocardiography) and respiration activity can be used as a measure to determine stress. But, the accuracy of determination is limited by using individual parameters. Usage of multiple parameters aids in better determination of stress. A combination of parameters such as GSR and Blood Pressure further increases the accuracy. The paper signifies better detection of stress by using GSR and BP.
压力是对日常生活中遇到的精神/情感或身体方面的反应。为了管理压力,需要在连续的基础上监测压力水平。个体生理参数,如皮肤电反应(GSR)、心率(HR)、血压(BP)、心电图(ECG)和呼吸活动可作为确定应激的措施。但是,由于使用单个参数,测定的准确性受到限制。使用多个参数有助于更好地确定应力。GSR和血压等参数的组合进一步提高了准确性。研究结果表明,地震响应和BP法可以更好地检测应力。
{"title":"Determination of stress using Blood Pressure and Galvanic Skin Response","authors":"Atlee Fernandes, Rakesh Helawar, R. Lokesh, Tushar Tari, Ashwini Shahapurkar","doi":"10.1109/CNT.2014.7062747","DOIUrl":"https://doi.org/10.1109/CNT.2014.7062747","url":null,"abstract":"Stress is a response to mental/emotional or physical aspects that is encountered in daily life. In order to manage stress, it is required to monitor the stress levels on continuous basis. Individual physiological parameters such as Galvanic Skin Response (GSR), Heart Rate (HR), Blood Pressure (BP), ECG (Electrocardiography) and respiration activity can be used as a measure to determine stress. But, the accuracy of determination is limited by using individual parameters. Usage of multiple parameters aids in better determination of stress. A combination of parameters such as GSR and Blood Pressure further increases the accuracy. The paper signifies better detection of stress by using GSR and BP.","PeriodicalId":347883,"journal":{"name":"2014 International Conference on Communication and Network Technologies","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127005563","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 51
Inverted-F antenna with meander line antenna for energy harvesting 带弯曲线天线的倒f天线用于能量收集
Pub Date : 2014-12-01 DOI: 10.1109/CNT.2014.7062717
C. Sridhar, G. Mahadevan, P. Deepthi
A horizontal polarized, tri-band antenna for RF energy harvesting applications is presented. A simple meander inverted-F antenna (MIFA) with size of 34mm×17mm×8mm is proposed in this paper. The radiating patch is folded at one end and etched with three slits to create multiple resonant frequency bands. The antenna covers following frequency bands: Global System for Mobile communication (GSM900MHz, 880-960 MHz)/Digital Communication System (DCS1800MHz, 1710-1880 MHz)/WiFi (2450MHz, 2400-2480 MHz).The proposed antenna has been designed and analyzed by using High Frequency Structure Simulator (HFSS). The antenna shows good measured performance of -0.2dBi at 1.5GHz and -0.4dBi at 1.61GHz and 1.7GHz.
提出了一种用于射频能量采集的水平极化三波段天线。本文提出了一种尺寸为34mm×17mm×8mm的简单弯曲反f天线(MIFA)。辐射贴片在一端折叠并蚀刻三个狭缝以产生多个谐振频带。天线覆盖以下频段:全球移动通信系统(GSM900MHz, 880-960 MHz)/数字通信系统(DCS1800MHz, 1710-1880 MHz)/WiFi (2450MHz, 2400-2480 MHz)。利用高频结构模拟器(HFSS)对该天线进行了设计和分析。该天线在1.5GHz和1.61GHz和1.7GHz下的实测性能分别为-0.2dBi和-0.4dBi。
{"title":"Inverted-F antenna with meander line antenna for energy harvesting","authors":"C. Sridhar, G. Mahadevan, P. Deepthi","doi":"10.1109/CNT.2014.7062717","DOIUrl":"https://doi.org/10.1109/CNT.2014.7062717","url":null,"abstract":"A horizontal polarized, tri-band antenna for RF energy harvesting applications is presented. A simple meander inverted-F antenna (MIFA) with size of 34mm×17mm×8mm is proposed in this paper. The radiating patch is folded at one end and etched with three slits to create multiple resonant frequency bands. The antenna covers following frequency bands: Global System for Mobile communication (GSM900MHz, 880-960 MHz)/Digital Communication System (DCS1800MHz, 1710-1880 MHz)/WiFi (2450MHz, 2400-2480 MHz).The proposed antenna has been designed and analyzed by using High Frequency Structure Simulator (HFSS). The antenna shows good measured performance of -0.2dBi at 1.5GHz and -0.4dBi at 1.61GHz and 1.7GHz.","PeriodicalId":347883,"journal":{"name":"2014 International Conference on Communication and Network Technologies","volume":"PP 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126431059","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Modified LEACH: A QoS-aware clustering algorithm for Wireless Sensor Networks 改进LEACH:一种面向qos的无线传感器网络聚类算法
Pub Date : 2014-12-01 DOI: 10.1109/CNT.2014.7062737
V. Subhashree, C. Tharini, M. Swarna Lakshmi
Energy efficient Routing algorithms for wireless sensor network play a vital role among many other algorithms for improving lifetime of sensor network. Low Energy Adaptive Clustering Hierarchy (LEACH) is one of the major hierarchical routing protocols for WSNs, in which cluster heads are randomly elected. In this paper, a Modified LEACH algorithm is proposed to maximize the lifetime of the network. The network is partitioned into clusters using simulated annealing technique. The cluster head and next heads are chosen by the base station based on their residual energy. Unlike LEACH, re-clustering is not done after completion of each round. Re-clustering is done once the energy of the elected heads goes below the threshold. This in turn reduces the node and network failure, thus making the network fault-tolerant. The QoS parameters such as throughput, packet delivery ratio, delay and network lifetime are metrics used to measure the performance of Modified LEACH. Simulation results show that Modified LEACH outperforms the LEACH protocol and the AODV protocol.
在众多提高传感器网络寿命的算法中,高效节能的无线传感器网络路由算法起着至关重要的作用。低能量自适应聚类层次(LEACH)是无线传感器网络中主要的分层路由协议之一,其簇头是随机选择的。本文提出了一种改进的LEACH算法来最大化网络的生存期。利用模拟退火技术对网络进行了簇划分。基站根据簇头和下簇头的剩余能量选择簇头和下簇头。与LEACH不同,重新聚类不是在每轮完成后进行的。一旦选出的头的能量低于阈值,就进行重新聚类。这反过来又减少了节点和网络故障,从而使网络具有容错性。QoS参数如吞吐量、分组传送率、延迟和网络生存期是衡量改进LEACH性能的指标。仿真结果表明,改进的LEACH协议优于LEACH协议和AODV协议。
{"title":"Modified LEACH: A QoS-aware clustering algorithm for Wireless Sensor Networks","authors":"V. Subhashree, C. Tharini, M. Swarna Lakshmi","doi":"10.1109/CNT.2014.7062737","DOIUrl":"https://doi.org/10.1109/CNT.2014.7062737","url":null,"abstract":"Energy efficient Routing algorithms for wireless sensor network play a vital role among many other algorithms for improving lifetime of sensor network. Low Energy Adaptive Clustering Hierarchy (LEACH) is one of the major hierarchical routing protocols for WSNs, in which cluster heads are randomly elected. In this paper, a Modified LEACH algorithm is proposed to maximize the lifetime of the network. The network is partitioned into clusters using simulated annealing technique. The cluster head and next heads are chosen by the base station based on their residual energy. Unlike LEACH, re-clustering is not done after completion of each round. Re-clustering is done once the energy of the elected heads goes below the threshold. This in turn reduces the node and network failure, thus making the network fault-tolerant. The QoS parameters such as throughput, packet delivery ratio, delay and network lifetime are metrics used to measure the performance of Modified LEACH. Simulation results show that Modified LEACH outperforms the LEACH protocol and the AODV protocol.","PeriodicalId":347883,"journal":{"name":"2014 International Conference on Communication and Network Technologies","volume":"88 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128057984","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
An adaptive approach for computer aided screening of mammograms and classification of abnormalities 一种计算机辅助乳房x光检查和异常分类的自适应方法
Pub Date : 2014-12-01 DOI: 10.1109/CNT.2014.7062748
A. Deepa, S. Niyas, M. Sasikumar
This paper aims for the development of a highly efficient computer aided decision system to automatically detect abnormalities in mammograms. Enhancement of the contrast of the intensity image by transforming the values using Contrast Limited Adaptive Histogram Equalization (CLAHE) is done for preprocessing of images after classifying the mammograms into various intensity levels. Then mathematical morphology is used for the extraction of abnormalities which are located on a non uniform background. After performing the thresholding of the image by extended maxima transformation by using adaptive H-domes transformation feature extraction is performed. Transformation constant (h) is based on the breast density of the mammogram considered. The Feature extraction is focused on the extraction of GLCM based statistical features of the objects. Finally the extracted objects are classified using Naive Baye's Classifier and abnormalities are detected. SVM classifier is also employed to classify the mammogram whether it is suspicious or not.
本文旨在开发一种高效的计算机辅助决策系统来自动检测乳房x线照片中的异常。在将乳房x光片划分为不同的强度等级后,对图像进行预处理,利用对比度有限自适应直方图均衡化(CLAHE)对图像进行变换,增强图像的对比度。然后利用数学形态学方法提取位于非均匀背景上的异常。利用自适应h -dome变换对图像进行扩展极大值变换阈值化后,进行特征提取。变换常数(h)基于所考虑的乳房x光片的乳腺密度。特征提取主要是基于GLCM提取目标的统计特征。最后使用朴素贝叶斯分类器对提取的目标进行分类,并检测异常。同时使用SVM分类器对可疑与否的乳房x光片进行分类。
{"title":"An adaptive approach for computer aided screening of mammograms and classification of abnormalities","authors":"A. Deepa, S. Niyas, M. Sasikumar","doi":"10.1109/CNT.2014.7062748","DOIUrl":"https://doi.org/10.1109/CNT.2014.7062748","url":null,"abstract":"This paper aims for the development of a highly efficient computer aided decision system to automatically detect abnormalities in mammograms. Enhancement of the contrast of the intensity image by transforming the values using Contrast Limited Adaptive Histogram Equalization (CLAHE) is done for preprocessing of images after classifying the mammograms into various intensity levels. Then mathematical morphology is used for the extraction of abnormalities which are located on a non uniform background. After performing the thresholding of the image by extended maxima transformation by using adaptive H-domes transformation feature extraction is performed. Transformation constant (h) is based on the breast density of the mammogram considered. The Feature extraction is focused on the extraction of GLCM based statistical features of the objects. Finally the extracted objects are classified using Naive Baye's Classifier and abnormalities are detected. SVM classifier is also employed to classify the mammogram whether it is suspicious or not.","PeriodicalId":347883,"journal":{"name":"2014 International Conference on Communication and Network Technologies","volume":"13 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134566428","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Performance analysis of enhanced secure socket layer protocol 增强型安全套接字层协议性能分析
Pub Date : 2014-12-01 DOI: 10.1109/CNT.2014.7062777
R. K. Jha, Farida Khurshid
The field of Network Security and the subfield of cryptographic protocols are both vast and continually evolving and expanding fields. The use of cryptographic protocols as a means to provide security to web servers and services at the transport layer, by providing both encryption and authentication to data transfer, has become increasingly popular. Secure socket layer (SSL) protocol establish secure session between client and server after authenticating both of them. The critical factor which decides the performance of the server is the SSL connection. When no. of SSL connection on the server is raised, the throughput will be decreased. According to the standard SSL protocol, an enhanced model of SSL combines Diffie-Hellman algorithm is implemented and its performance are measured on network simulator by considering various parameters like Packet Delivery Ratio (PDR), Throughput, Delay and Node Energy. The performance of SSL combines Diffie-Hellman algorithm is compared with the existing SSL protocol, Adhoc ondemand distance vector (AODV) under Denial of service (DOS) attack. SSL combines Diffie-Hellman algorithm will reduce the delay, node energy and enhance the PDR of the server so that it can handle more no. of client and server when no. of SSL connection is raised. SSL is one of the most common protocols used for secure communication over the internet. Users have grown to trust SSL and are prone to overlook visual clues that could indicate a security breach. But SSL is vulnerable to man in the middle attacks also.
网络安全领域和加密协议的子领域都是广阔的、不断发展和扩展的领域。使用加密协议作为在传输层为web服务器和服务提供安全性的一种手段,通过为数据传输提供加密和身份验证,已经变得越来越流行。SSL (Secure socket layer)协议通过对客户端和服务端进行身份验证后,在客户端和服务端之间建立安全会话。决定服务器性能的关键因素是SSL连接。当没有。如果服务器上SSL连接的数量增加,吞吐量将会降低。根据标准SSL协议,实现了结合Diffie-Hellman算法的SSL增强模型,并在网络模拟器上综合考虑PDR (Packet Delivery Ratio)、吞吐量(Throughput)、时延(Delay)和节点能量(Node Energy)等参数对其性能进行了测试。结合Diffie-Hellman算法的SSL与现有SSL协议、Adhoc随需应变距离矢量(AODV)在DOS攻击下的性能进行了比较。SSL结合了Diffie-Hellman算法,减少了延迟和节点能量,增强了服务器的PDR,使其能够处理更多的no。客户端和服务器的。引发SSL连接的错误。SSL是internet上用于安全通信的最常用协议之一。用户已经逐渐信任SSL,并且容易忽略可能表明安全漏洞的视觉线索。但是SSL也容易受到中间人攻击。
{"title":"Performance analysis of enhanced secure socket layer protocol","authors":"R. K. Jha, Farida Khurshid","doi":"10.1109/CNT.2014.7062777","DOIUrl":"https://doi.org/10.1109/CNT.2014.7062777","url":null,"abstract":"The field of Network Security and the subfield of cryptographic protocols are both vast and continually evolving and expanding fields. The use of cryptographic protocols as a means to provide security to web servers and services at the transport layer, by providing both encryption and authentication to data transfer, has become increasingly popular. Secure socket layer (SSL) protocol establish secure session between client and server after authenticating both of them. The critical factor which decides the performance of the server is the SSL connection. When no. of SSL connection on the server is raised, the throughput will be decreased. According to the standard SSL protocol, an enhanced model of SSL combines Diffie-Hellman algorithm is implemented and its performance are measured on network simulator by considering various parameters like Packet Delivery Ratio (PDR), Throughput, Delay and Node Energy. The performance of SSL combines Diffie-Hellman algorithm is compared with the existing SSL protocol, Adhoc ondemand distance vector (AODV) under Denial of service (DOS) attack. SSL combines Diffie-Hellman algorithm will reduce the delay, node energy and enhance the PDR of the server so that it can handle more no. of client and server when no. of SSL connection is raised. SSL is one of the most common protocols used for secure communication over the internet. Users have grown to trust SSL and are prone to overlook visual clues that could indicate a security breach. But SSL is vulnerable to man in the middle attacks also.","PeriodicalId":347883,"journal":{"name":"2014 International Conference on Communication and Network Technologies","volume":"102 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123527356","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Efficient Image Segmentation Method Based on Probabilistic Markov Random Field Model 基于概率马尔可夫随机场模型的高效图像分割方法
Pub Date : 2014-12-01 DOI: 10.1109/CNT.2014.7062732
P. Sophia, N. Venkateswaran
In this paper, we present a new approach to image segmentation that is based on Markov random fields and Maximum a posteriori rule. Segmentation of an image is a challenging task especially in low contrast images, blurred images and noisy images. Most of the segmentation techniques are based only on the gray scale intensity of the image and yield poor results when applied to images with sophisticated background and high degree fuzziness. The MRF based segmentation method gives a priori information of the local structure contained in the image to get better segmentation accuracy. This proposed algorithm gives a promising solution to image segmentation and it is also robust to noise and blur.
本文提出了一种基于马尔可夫随机场和极大后验规则的图像分割方法。图像分割是一项具有挑战性的任务,特别是在低对比度图像、模糊图像和噪声图像中。大多数分割技术仅基于图像的灰度强度,对于背景复杂、模糊程度高的图像,分割效果较差。基于MRF的分割方法给出了图像中包含的局部结构的先验信息,以获得更好的分割精度。该算法对图像分割具有较好的鲁棒性,对噪声和模糊具有较强的鲁棒性。
{"title":"Efficient Image Segmentation Method Based on Probabilistic Markov Random Field Model","authors":"P. Sophia, N. Venkateswaran","doi":"10.1109/CNT.2014.7062732","DOIUrl":"https://doi.org/10.1109/CNT.2014.7062732","url":null,"abstract":"In this paper, we present a new approach to image segmentation that is based on Markov random fields and Maximum a posteriori rule. Segmentation of an image is a challenging task especially in low contrast images, blurred images and noisy images. Most of the segmentation techniques are based only on the gray scale intensity of the image and yield poor results when applied to images with sophisticated background and high degree fuzziness. The MRF based segmentation method gives a priori information of the local structure contained in the image to get better segmentation accuracy. This proposed algorithm gives a promising solution to image segmentation and it is also robust to noise and blur.","PeriodicalId":347883,"journal":{"name":"2014 International Conference on Communication and Network Technologies","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122027029","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Contemporary speech/speaker recognition with speech from impaired vocal apparatus 当代言语/说话人识别与受损发声器官的言语
Pub Date : 2014-12-01 DOI: 10.1109/CNT.2014.7062754
S. Selva Nidhyananthan, R. Shantha Selvakumari, V. Shenbagalakshmi
Speech is the effective form of communication between human and its environment. Speech also has potential of being important mode of interaction with computer. This review paper deals with both speech and speaker recognition of persons with speech motor disorders. Normally speaker recognition consists of speaker verification and speaker identification. Speaker identification is the process of determining which registered speaker provides a given input sample. Speaker verification is the process of accepting or rejecting the identity claim of a speaker. On the other hand, the speech recognition system deals with the following challenges such as speech representation, feature extraction techniques, speech classifiers, databases and performance evaluation. Motor speech disorders are a class of speech disorder that disturbs the body's natural ability to speak. These disturbances vary in their etiology based on the integrity and integration of cognitive, neuromuscular, and musculoskeletal activities. There are various types of speech disorders like Apraxia, Cluttering (similar to stuttering), Dyspraxia, Dysarthria, Dysprosody and so on. The main objective of this review paper is to summarize and compare the well known methods used in various stages of speech and speaker recognition system.
言语是人与环境之间有效的交流形式。语音也有可能成为与计算机交互的重要模式。本文综述了言语运动障碍患者的言语和说话人识别。说话人识别通常包括说话人验证和说话人识别。说话人识别是确定哪个已注册说话人提供给定输入样本的过程。说话人验证是对说话人的身份主张进行接受或拒绝的过程。另一方面,语音识别系统面临着语音表示、特征提取技术、语音分类器、数据库和性能评估等方面的挑战。运动语言障碍是一类语言障碍,它扰乱了身体的自然说话能力。基于认知、神经肌肉和肌肉骨骼活动的完整性和整合,这些紊乱的病因各不相同。语言障碍有多种类型,如失用症、杂乱(类似于口吃)、运动障碍、构音障碍、韵律障碍等。本文的主要目的是总结和比较在语音和说话人识别系统的各个阶段使用的已知方法。
{"title":"Contemporary speech/speaker recognition with speech from impaired vocal apparatus","authors":"S. Selva Nidhyananthan, R. Shantha Selvakumari, V. Shenbagalakshmi","doi":"10.1109/CNT.2014.7062754","DOIUrl":"https://doi.org/10.1109/CNT.2014.7062754","url":null,"abstract":"Speech is the effective form of communication between human and its environment. Speech also has potential of being important mode of interaction with computer. This review paper deals with both speech and speaker recognition of persons with speech motor disorders. Normally speaker recognition consists of speaker verification and speaker identification. Speaker identification is the process of determining which registered speaker provides a given input sample. Speaker verification is the process of accepting or rejecting the identity claim of a speaker. On the other hand, the speech recognition system deals with the following challenges such as speech representation, feature extraction techniques, speech classifiers, databases and performance evaluation. Motor speech disorders are a class of speech disorder that disturbs the body's natural ability to speak. These disturbances vary in their etiology based on the integrity and integration of cognitive, neuromuscular, and musculoskeletal activities. There are various types of speech disorders like Apraxia, Cluttering (similar to stuttering), Dyspraxia, Dysarthria, Dysprosody and so on. The main objective of this review paper is to summarize and compare the well known methods used in various stages of speech and speaker recognition system.","PeriodicalId":347883,"journal":{"name":"2014 International Conference on Communication and Network Technologies","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130719661","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A survey on game theoretic approach in wireless networks 无线网络中的博弈论方法综述
Pub Date : 2014-12-01 DOI: 10.1109/CNT.2014.7062775
Arthi Balasundaram, L. Rajesh
Game theory is a multi-agent decision theory, modelling rational, utility-maximizing agents whose actions affect one another's utilities. Its techniques have been widely applied to various engineering design problems in which the action of one component has impact on that of any other component. A brief survey on game theory for beginners is presented in this paper. The applications of game theory in wireless networking is collected and described them in a layered perspective, emphasizing on which fields game theory could be effectively applied. To this end, an extensive game model is simulated and their key features are exposed.
博弈论是一种多智能体决策理论,它对理性的、效用最大化的智能体进行建模,这些智能体的行为会影响彼此的效用。它的技术已被广泛应用于各种工程设计问题,其中一个部件的作用对任何其他部件的作用都有影响。本文对博弈论的初学者进行了简要的概述。从多层次的角度对博弈论在无线网络中的应用进行了收集和描述,重点介绍了博弈论在哪些领域可以有效地应用。为此,模拟了一个广泛的博弈模型,揭示了它们的主要特征。
{"title":"A survey on game theoretic approach in wireless networks","authors":"Arthi Balasundaram, L. Rajesh","doi":"10.1109/CNT.2014.7062775","DOIUrl":"https://doi.org/10.1109/CNT.2014.7062775","url":null,"abstract":"Game theory is a multi-agent decision theory, modelling rational, utility-maximizing agents whose actions affect one another's utilities. Its techniques have been widely applied to various engineering design problems in which the action of one component has impact on that of any other component. A brief survey on game theory for beginners is presented in this paper. The applications of game theory in wireless networking is collected and described them in a layered perspective, emphasizing on which fields game theory could be effectively applied. To this end, an extensive game model is simulated and their key features are exposed.","PeriodicalId":347883,"journal":{"name":"2014 International Conference on Communication and Network Technologies","volume":"93 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131727722","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2014 International Conference on Communication and Network Technologies
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1