Pub Date : 2019-07-01DOI: 10.1109/ICCES45898.2019.9002282
Rajashree Menon, Sultana Najeeb, Swetha N Prabhu, T. George, Anila Kuriakose, S. Diwakaran
This paper presents an improved Vivaldi antenna design for Through Wall Radar Imaging (TWRI). It is one of the most emerging radar technologies that has different applications in real-life situations. Radar uses EM waves to penetrate through the wall, and then detects the objects behind the wall. Antenna plays a very important role in TWRI system. Vivaldi antenna can be used as an ideal candidate for this system. The antenna presented here operates from the frequency 2.5 GHz to 11.3 GHz and shows a constant radiation pattern in the operating bandwidth. The gain obtained is around 6 dBi. The effect of various antenna parameters are also studied in this paper. Furthermore, corrugations and grating elements are added to analyze the effects on gain and bandwidth. With the above enhancements in design, a bandwidth of 8.8 GHz and an improved gain of around 9.6 dBi has been achieved.
{"title":"An Improved Vivaldi Antenna Design for Through- Wall Radar Imaging","authors":"Rajashree Menon, Sultana Najeeb, Swetha N Prabhu, T. George, Anila Kuriakose, S. Diwakaran","doi":"10.1109/ICCES45898.2019.9002282","DOIUrl":"https://doi.org/10.1109/ICCES45898.2019.9002282","url":null,"abstract":"This paper presents an improved Vivaldi antenna design for Through Wall Radar Imaging (TWRI). It is one of the most emerging radar technologies that has different applications in real-life situations. Radar uses EM waves to penetrate through the wall, and then detects the objects behind the wall. Antenna plays a very important role in TWRI system. Vivaldi antenna can be used as an ideal candidate for this system. The antenna presented here operates from the frequency 2.5 GHz to 11.3 GHz and shows a constant radiation pattern in the operating bandwidth. The gain obtained is around 6 dBi. The effect of various antenna parameters are also studied in this paper. Furthermore, corrugations and grating elements are added to analyze the effects on gain and bandwidth. With the above enhancements in design, a bandwidth of 8.8 GHz and an improved gain of around 9.6 dBi has been achieved.","PeriodicalId":348347,"journal":{"name":"2019 International Conference on Communication and Electronics Systems (ICCES)","volume":"92 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121376296","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-07-01DOI: 10.1109/ICCES45898.2019.9002553
Vishwesh Anand Sahasrabudhe, S. Gadgune, V. Savakhande
This article introduces “A high voltage gain non – isolated DC DC converter based on inductors for Microgrid application.” This converter presents high voltage gain without penalty of high duty ratio. The presented converter employs two single inductors, both are charging in parallel and discharging in series. The steady state analysis of proposed converter is shown in section IV. The simulation of proposed converter 17V/182V is developed in MATLAB Simulink to check the feasibility and performance of the converter.
{"title":"Implementation of Non isolated DC DC Boost Converter based on Inductor for DC Microgrid Application","authors":"Vishwesh Anand Sahasrabudhe, S. Gadgune, V. Savakhande","doi":"10.1109/ICCES45898.2019.9002553","DOIUrl":"https://doi.org/10.1109/ICCES45898.2019.9002553","url":null,"abstract":"This article introduces “A high voltage gain non – isolated DC DC converter based on inductors for Microgrid application.” This converter presents high voltage gain without penalty of high duty ratio. The presented converter employs two single inductors, both are charging in parallel and discharging in series. The steady state analysis of proposed converter is shown in section IV. The simulation of proposed converter 17V/182V is developed in MATLAB Simulink to check the feasibility and performance of the converter.","PeriodicalId":348347,"journal":{"name":"2019 International Conference on Communication and Electronics Systems (ICCES)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114349947","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-07-01DOI: 10.1109/ICCES45898.2019.9002565
Raveesh Hegde, R. Muralishankar
There are many features proposed in the literature for voice activity detection (VAD). Shen et al. [20] first used a spectral entropy-based feature to detect regions of speech spurts under noisy conditions. However, VAD employing this feature was unreliable when the noise level greatly exceeds the speech level. To improve the performance of spectral entropy based VAD under low signal-to-noise ratios (SNRs), spectrum of a signal over a frame is divided into sub bands and spectral entropy is computed over these bands. Later, these spectral entropies are weighted and summed to obtain the entropy. Based on the amount of noise in each band, weights were found empirically. This approach was named as banded spectral entropy (BSE) [21]. In [24], deviation threshold computed from approximate ramp line and the sorted spectral coefficients of the band are adopted to decide useful/useless bands. In this paper, we propose a novel Teager Energy Band Spectral Entropy (TE_BSE) feature for VAD. Here, we carryout enhancement of spectral peaks employing Teager energy of each frequency transformed speech frame. This is followed with dividing of spectrum into sub bands and entropy computation over each band. The summing of entropy from each useful band is done to get TE _ BSE feature. We identify useful/useless bands following [24]. Later, we present the performance of our proposed VAD in terms of probability of detection $(pmb{P}_{pmb{D}})$, probability of false alarm $(pmb{P}_{pmb{FA}})$ and probability of error under different noises and SNRs. Finally, from the VAD results on real-world sample, proposed VAD outperforms statistical based VAD by Sohn et. al. [8] with improved $pmb{P}_{pmb{D}}$ not at the cost of increase in $pmb{P}_{pmb{FA}}$.
{"title":"Voice Activity Detection Using Novel Teager Energy Based Band Spectral Entropy","authors":"Raveesh Hegde, R. Muralishankar","doi":"10.1109/ICCES45898.2019.9002565","DOIUrl":"https://doi.org/10.1109/ICCES45898.2019.9002565","url":null,"abstract":"There are many features proposed in the literature for voice activity detection (VAD). Shen et al. [20] first used a spectral entropy-based feature to detect regions of speech spurts under noisy conditions. However, VAD employing this feature was unreliable when the noise level greatly exceeds the speech level. To improve the performance of spectral entropy based VAD under low signal-to-noise ratios (SNRs), spectrum of a signal over a frame is divided into sub bands and spectral entropy is computed over these bands. Later, these spectral entropies are weighted and summed to obtain the entropy. Based on the amount of noise in each band, weights were found empirically. This approach was named as banded spectral entropy (BSE) [21]. In [24], deviation threshold computed from approximate ramp line and the sorted spectral coefficients of the band are adopted to decide useful/useless bands. In this paper, we propose a novel Teager Energy Band Spectral Entropy (TE_BSE) feature for VAD. Here, we carryout enhancement of spectral peaks employing Teager energy of each frequency transformed speech frame. This is followed with dividing of spectrum into sub bands and entropy computation over each band. The summing of entropy from each useful band is done to get TE _ BSE feature. We identify useful/useless bands following [24]. Later, we present the performance of our proposed VAD in terms of probability of detection $(pmb{P}_{pmb{D}})$, probability of false alarm $(pmb{P}_{pmb{FA}})$ and probability of error under different noises and SNRs. Finally, from the VAD results on real-world sample, proposed VAD outperforms statistical based VAD by Sohn et. al. [8] with improved $pmb{P}_{pmb{D}}$ not at the cost of increase in $pmb{P}_{pmb{FA}}$.","PeriodicalId":348347,"journal":{"name":"2019 International Conference on Communication and Electronics Systems (ICCES)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116297702","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-07-01DOI: 10.1109/ICCES45898.2019.9002157
Newton Rai, M. Nagaraj, Amogh.M. Morey, V. Shantha
Piezoelectric devices are globally considered as the alternative potential source for energy. The main focus of this paper is to maximize the output voltage in different shapes of piezoelectric cantilever beam with the same dimensions. In this paper we compare the power output between conventional structure and modified structure (E-shape) and conclude that modified structure has more possibilities in generating maximum power. The prototype E-shaped structure shows maximum deflection than the conventional one. This energy harvester is able to remove the battery problem in various fields like wireless, biomedical and so on. The various structure of cantilever beam is designed by using COMSOL multi-physics 5.1. The obtained results are compared using MATLAB simulation.
{"title":"Construction and Simulation of Various Structures of Unimorph Piezoelectric Cantilever for Energy Harvest","authors":"Newton Rai, M. Nagaraj, Amogh.M. Morey, V. Shantha","doi":"10.1109/ICCES45898.2019.9002157","DOIUrl":"https://doi.org/10.1109/ICCES45898.2019.9002157","url":null,"abstract":"Piezoelectric devices are globally considered as the alternative potential source for energy. The main focus of this paper is to maximize the output voltage in different shapes of piezoelectric cantilever beam with the same dimensions. In this paper we compare the power output between conventional structure and modified structure (E-shape) and conclude that modified structure has more possibilities in generating maximum power. The prototype E-shaped structure shows maximum deflection than the conventional one. This energy harvester is able to remove the battery problem in various fields like wireless, biomedical and so on. The various structure of cantilever beam is designed by using COMSOL multi-physics 5.1. The obtained results are compared using MATLAB simulation.","PeriodicalId":348347,"journal":{"name":"2019 International Conference on Communication and Electronics Systems (ICCES)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121729131","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-07-01DOI: 10.1109/ICCES45898.2019.9002238
V. Prerana, S. Tejaswini, Jasmine Manandhar, T. Santhosh, S. Pushpa, T. N. Manjunath
The main objective of this paper was to develop a software application for smart phones to help the visually impaired in assisting their daily activities. The approach focused on helping the visually impaired to navigate from a source to destination without any hassle and to avoid multiple rerouting. The above approach was used to ensure that the users no more faced the issues of re-routing and also provides a voice-based feedback system giving information about their surroundings. Furthermore, the proposed approach was carried out with a single voice assisted application where different features such as calling, messaging, emergency help, landmark and bus stop detection along with the main navigation without rerouting. Hence this helped to provide a single interface voice-based system for the visually impaired to perform basic functionalities on a Smart phone efficiently without depending on another human being for constant assistance.
{"title":"STAVI : Smart Travelling Application for the Visually Impaired","authors":"V. Prerana, S. Tejaswini, Jasmine Manandhar, T. Santhosh, S. Pushpa, T. N. Manjunath","doi":"10.1109/ICCES45898.2019.9002238","DOIUrl":"https://doi.org/10.1109/ICCES45898.2019.9002238","url":null,"abstract":"The main objective of this paper was to develop a software application for smart phones to help the visually impaired in assisting their daily activities. The approach focused on helping the visually impaired to navigate from a source to destination without any hassle and to avoid multiple rerouting. The above approach was used to ensure that the users no more faced the issues of re-routing and also provides a voice-based feedback system giving information about their surroundings. Furthermore, the proposed approach was carried out with a single voice assisted application where different features such as calling, messaging, emergency help, landmark and bus stop detection along with the main navigation without rerouting. Hence this helped to provide a single interface voice-based system for the visually impaired to perform basic functionalities on a Smart phone efficiently without depending on another human being for constant assistance.","PeriodicalId":348347,"journal":{"name":"2019 International Conference on Communication and Electronics Systems (ICCES)","volume":"362 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115962117","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-07-01DOI: 10.1109/ICCES45898.2019.9002527
Rohit B. Chilwant, Taral S. Sarvagod, Kunal R. Kumbhar, Prathmesh N. Gunjgur, A. Vidhate
Security defies one of the galactic barrier when pondering the use of cloud services. Data outsourcing in the cloud (DOC) is conventionally based on data encryption, which imparts impregnable security, but deteriorating the efficiency and rimming the functionalities of cloud. In this proposal we aim to possess them by proposing a secret sharing scheme that depends on partitioning the data and distributed storage over multi-clouds. The scheme used in the proposal uses a combination of symmetric (AES) and asymmetric (RSA) encryption techniques to share the data among the peers in the cloud environment. The proficiency of the suggested scheme has been demonstrated by the empirical results.
{"title":"SISA: A secret-sharing scheme application for cloud environment","authors":"Rohit B. Chilwant, Taral S. Sarvagod, Kunal R. Kumbhar, Prathmesh N. Gunjgur, A. Vidhate","doi":"10.1109/ICCES45898.2019.9002527","DOIUrl":"https://doi.org/10.1109/ICCES45898.2019.9002527","url":null,"abstract":"Security defies one of the galactic barrier when pondering the use of cloud services. Data outsourcing in the cloud (DOC) is conventionally based on data encryption, which imparts impregnable security, but deteriorating the efficiency and rimming the functionalities of cloud. In this proposal we aim to possess them by proposing a secret sharing scheme that depends on partitioning the data and distributed storage over multi-clouds. The scheme used in the proposal uses a combination of symmetric (AES) and asymmetric (RSA) encryption techniques to share the data among the peers in the cloud environment. The proficiency of the suggested scheme has been demonstrated by the empirical results.","PeriodicalId":348347,"journal":{"name":"2019 International Conference on Communication and Electronics Systems (ICCES)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131969282","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-07-01DOI: 10.1109/ICCES45898.2019.9002029
K. Manjula Shenoy, S. Shaikh
In this paper, an approach to transfer data securely is proposed. First, from the sender side, the data is encrypted using Rivest-Shamir-Adleman (RSA) algorithm and then this encrypted data is hidden using Least Significant Bit image steganography concept in a image of the web page and its url is sent to the receiver. Then, at the receiving end, the encrypted data is obtained that is hidden in the image of the web page whose url is sent. This encrypted data is decrypted using the same RSA algorithm. When the sender sends the data to the receiver and incase this data is obtained by the third person or an intruder he will see a URL being sent. Then he will open the URL and he will find a webpage, and he would not find any data being hidden. Then he will try to view the source code of the webpage, and then also he would not find any data being hidden. Thus, the intruder will be assured that no data is been hidden in this and chances are more that he would not go to decode it further. Hence, the chances of doubt an intruder can get that some confidential or private data is hidden in the data being sent is reduced. And hence, the data sent by the sender to the receiver is secured.
{"title":"An Approach to Secure Data Transmission Through the Use of Cryptography and Steganography","authors":"K. Manjula Shenoy, S. Shaikh","doi":"10.1109/ICCES45898.2019.9002029","DOIUrl":"https://doi.org/10.1109/ICCES45898.2019.9002029","url":null,"abstract":"In this paper, an approach to transfer data securely is proposed. First, from the sender side, the data is encrypted using Rivest-Shamir-Adleman (RSA) algorithm and then this encrypted data is hidden using Least Significant Bit image steganography concept in a image of the web page and its url is sent to the receiver. Then, at the receiving end, the encrypted data is obtained that is hidden in the image of the web page whose url is sent. This encrypted data is decrypted using the same RSA algorithm. When the sender sends the data to the receiver and incase this data is obtained by the third person or an intruder he will see a URL being sent. Then he will open the URL and he will find a webpage, and he would not find any data being hidden. Then he will try to view the source code of the webpage, and then also he would not find any data being hidden. Thus, the intruder will be assured that no data is been hidden in this and chances are more that he would not go to decode it further. Hence, the chances of doubt an intruder can get that some confidential or private data is hidden in the data being sent is reduced. And hence, the data sent by the sender to the receiver is secured.","PeriodicalId":348347,"journal":{"name":"2019 International Conference on Communication and Electronics Systems (ICCES)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132328887","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-07-01DOI: 10.1109/ICCES45898.2019.9002383
D. R, Dr.Chinnaiyan R
The application that are envisioned with IoT has a vital role played by the security. we make use of reliable Constrained Application protocol to sense the threat for the security purpose for any applications associated to IoT devices in a wireless sensor network environment. The task of Sensors sensing and the devices associated to it is, included with the end to end support systern for the interior and exterior communication systems, which are always prone to all threats and attacks. Thus, we here propose a novel framework to sense and avoid the attacks in the framework of Internet-incorporated CoAP communication atmosphere. We here try to consequently estimate efficiency of reliable CoAP to sense and avoid attacks with respect to the DOS attacks in the communication protocol for IoT devices.
{"title":"Reliable Constrained Application Protocol to Sense and Avoid attacks in WSN for IoT Devices","authors":"D. R, Dr.Chinnaiyan R","doi":"10.1109/ICCES45898.2019.9002383","DOIUrl":"https://doi.org/10.1109/ICCES45898.2019.9002383","url":null,"abstract":"The application that are envisioned with IoT has a vital role played by the security. we make use of reliable Constrained Application protocol to sense the threat for the security purpose for any applications associated to IoT devices in a wireless sensor network environment. The task of Sensors sensing and the devices associated to it is, included with the end to end support systern for the interior and exterior communication systems, which are always prone to all threats and attacks. Thus, we here propose a novel framework to sense and avoid the attacks in the framework of Internet-incorporated CoAP communication atmosphere. We here try to consequently estimate efficiency of reliable CoAP to sense and avoid attacks with respect to the DOS attacks in the communication protocol for IoT devices.","PeriodicalId":348347,"journal":{"name":"2019 International Conference on Communication and Electronics Systems (ICCES)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130437931","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-07-01DOI: 10.1109/ICCES45898.2019.9002279
T. Vadivu, B. Sumathi
Software defined Networking addresses the growth of traffic with static architectures. SDN is a standard which separates the network structures. Quality of Service is used with network traffic to transfer high bandwidth and multimedia information. Fractional Order Darwinian optimization (FODPSO) is used with Particle Swarm Optimization algorithm to enhance the detection accuracy. In this research paper, comparison of different Classification algorithms are used to achieve better performance.
{"title":"Swarm Optimization techniques using Attribute assortment and Clustering for Machine Learning Classifiers","authors":"T. Vadivu, B. Sumathi","doi":"10.1109/ICCES45898.2019.9002279","DOIUrl":"https://doi.org/10.1109/ICCES45898.2019.9002279","url":null,"abstract":"Software defined Networking addresses the growth of traffic with static architectures. SDN is a standard which separates the network structures. Quality of Service is used with network traffic to transfer high bandwidth and multimedia information. Fractional Order Darwinian optimization (FODPSO) is used with Particle Swarm Optimization algorithm to enhance the detection accuracy. In this research paper, comparison of different Classification algorithms are used to achieve better performance.","PeriodicalId":348347,"journal":{"name":"2019 International Conference on Communication and Electronics Systems (ICCES)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126587654","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-07-01DOI: 10.1109/ICCES45898.2019.9002042
Sheetal Shivagunde, M. Biswas
Super resolution algorithms always used as a tradeoff between the cost of the high definition (HD) cameras and the quality and/or clarity of the image obtained. There are various predefined algorithms that obtain Super Resolved images from Low Resolution (LR) images, some (such as, Convolutional Neural Network (CNN), Deep learning, Sparse Representation based algorithms) gives better results for e.g. deburring of zoomed part, removal of noise, color enhancement and so on but are computationally complex or hard to implement in real-time environment whereas some are very simple to use (such as, interpolation based, wavelet based algorithms) but lack quality for e.g. ringing artifacts, edge blurs, poor image quality etc. In this paper, we proposed a method that combines advantages of some of the above mentioned methods. Our proposed method obtains High Resolution (HR) image using saliency model for detection of visually dominant regions, Discrete Wavelet Transform (DWT) for extraction of high frequency details, finally Multi-layer Perceptron (MLP) and Particle Swarm Optimization (PSO) for interpolation. Experimental results visually and quantitatively show that for considered test images our proposed super resolution method appears to be most promising compared to bi-cubic, Chopade et al., Yu et al. and Man et al. methods.
{"title":"Saliency Guided Image Super-Resolution using PSO and MLP based Interpolation in Wavelet Domain","authors":"Sheetal Shivagunde, M. Biswas","doi":"10.1109/ICCES45898.2019.9002042","DOIUrl":"https://doi.org/10.1109/ICCES45898.2019.9002042","url":null,"abstract":"Super resolution algorithms always used as a tradeoff between the cost of the high definition (HD) cameras and the quality and/or clarity of the image obtained. There are various predefined algorithms that obtain Super Resolved images from Low Resolution (LR) images, some (such as, Convolutional Neural Network (CNN), Deep learning, Sparse Representation based algorithms) gives better results for e.g. deburring of zoomed part, removal of noise, color enhancement and so on but are computationally complex or hard to implement in real-time environment whereas some are very simple to use (such as, interpolation based, wavelet based algorithms) but lack quality for e.g. ringing artifacts, edge blurs, poor image quality etc. In this paper, we proposed a method that combines advantages of some of the above mentioned methods. Our proposed method obtains High Resolution (HR) image using saliency model for detection of visually dominant regions, Discrete Wavelet Transform (DWT) for extraction of high frequency details, finally Multi-layer Perceptron (MLP) and Particle Swarm Optimization (PSO) for interpolation. Experimental results visually and quantitatively show that for considered test images our proposed super resolution method appears to be most promising compared to bi-cubic, Chopade et al., Yu et al. and Man et al. methods.","PeriodicalId":348347,"journal":{"name":"2019 International Conference on Communication and Electronics Systems (ICCES)","volume":"289-292 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130788019","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}