首页 > 最新文献

2013 International Conference on Intelligent Systems and Signal Processing (ISSP)最新文献

英文 中文
Moving object detection from images distorted by atmospheric turbulence 从大气湍流扭曲的图像中检测运动目标
Pub Date : 2013-03-01 DOI: 10.1109/ISSP.2013.6526887
Ajinkya S. Deshmukh, S. Medasani, G. R. Reddy
Atmospheric turbulence degrades image with nonuniform geometric deformations and distortions, due to random fluctuations of refractive index over air media. Typical approaches to turbulence removal do not consider moving objects of interest. We propose a method that combines two independent approaches, non-rigid image registration and background subtraction using Gaussian mixture modeling (GMM), to detect moving objects in turbulent conditions. Nonrigid image registration removes geometric distortions and stabilizes overall scene. Then GMM based background subtraction technique is used to detect moving objects. We demonstrate robustness of our proposed approach under varying turbulence conditions using qualitative and quantitative comparisons with existing methods.
由于空气介质上折射率的随机波动,大气湍流使图像产生不均匀的几何变形和畸变。消除湍流的典型方法不考虑感兴趣的移动物体。我们提出了一种结合非刚性图像配准和背景相减两种独立方法的方法,利用高斯混合建模(GMM)来检测湍流条件下的运动物体。非刚性图像配准消除几何畸变并稳定整个场景。然后利用基于GMM的背景相减技术检测运动目标。我们通过与现有方法的定性和定量比较,证明了我们提出的方法在不同湍流条件下的鲁棒性。
{"title":"Moving object detection from images distorted by atmospheric turbulence","authors":"Ajinkya S. Deshmukh, S. Medasani, G. R. Reddy","doi":"10.1109/ISSP.2013.6526887","DOIUrl":"https://doi.org/10.1109/ISSP.2013.6526887","url":null,"abstract":"Atmospheric turbulence degrades image with nonuniform geometric deformations and distortions, due to random fluctuations of refractive index over air media. Typical approaches to turbulence removal do not consider moving objects of interest. We propose a method that combines two independent approaches, non-rigid image registration and background subtraction using Gaussian mixture modeling (GMM), to detect moving objects in turbulent conditions. Nonrigid image registration removes geometric distortions and stabilizes overall scene. Then GMM based background subtraction technique is used to detect moving objects. We demonstrate robustness of our proposed approach under varying turbulence conditions using qualitative and quantitative comparisons with existing methods.","PeriodicalId":354719,"journal":{"name":"2013 International Conference on Intelligent Systems and Signal Processing (ISSP)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128676741","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Hiding secret image in video 隐藏视频中的秘密图像
Pub Date : 2013-03-01 DOI: 10.1109/ISSP.2013.6526892
V. Thakur, M. Saikia
The Internet is always vulnerable to interception by unauthorized people over the world. The importance of reducing a chance of the information being detected during the transmission is being an issue now days. Some solution to overcome these issues is cryptography, but once it is decrypted the information secrecy will not exits any more. Hiding data for confidentiality, this approach of information hiding can be extended to copyright protection for digital media. The importance as well as the technique used in implementing data hiding is trying to discuss in details here. The traditional LSB modification technique by randomly dispersing the bits of the message in the image and thus making it harder for unauthorized people to extract the original message, is vulnerable to lose of valuable hidden secrete information. Here, we propose a data hiding and extraction procedure for AVI (Audio Video Interleave) videos embedding the secret message bits in DCT higher order coefficients. The secret information taken here is an grayscale image pixel values. The grayscale pixel values are converted to binary values and embedded those values in higher order coefficient value of DCT of AVI video frames. Data Hiding and Extraction procedure a re experimented successfully. Various experiment results are show here. All experiments are done using Matlab 2010a simulation software.
互联网总是容易受到世界各地未经授权的人的拦截。如今,减少信息在传输过程中被检测到的机会的重要性正在成为一个问题。克服这些问题的一些解决方案是加密,但一旦解密,信息的保密性将不复存在。为了保护数据的机密性,这种信息隐藏方法可以推广到数字媒体的版权保护中。这里将详细讨论实现数据隐藏的重要性以及所使用的技术。传统的LSB修改技术通过将信息位随机分散到图像中,使未经授权的人难以提取原始信息,容易丢失有价值的隐藏秘密信息。本文提出了一种将秘密信息位嵌入到DCT高阶系数中的AVI (Audio Video Interleave)视频的数据隐藏和提取方法。这里采集的秘密信息是灰度图像的像素值。将灰度像素值转换为二值,并嵌入到AVI视频帧的DCT高阶系数值中。数据隐藏和提取程序的实验成功。这里展示了各种实验结果。所有实验均采用Matlab 2010a仿真软件完成。
{"title":"Hiding secret image in video","authors":"V. Thakur, M. Saikia","doi":"10.1109/ISSP.2013.6526892","DOIUrl":"https://doi.org/10.1109/ISSP.2013.6526892","url":null,"abstract":"The Internet is always vulnerable to interception by unauthorized people over the world. The importance of reducing a chance of the information being detected during the transmission is being an issue now days. Some solution to overcome these issues is cryptography, but once it is decrypted the information secrecy will not exits any more. Hiding data for confidentiality, this approach of information hiding can be extended to copyright protection for digital media. The importance as well as the technique used in implementing data hiding is trying to discuss in details here. The traditional LSB modification technique by randomly dispersing the bits of the message in the image and thus making it harder for unauthorized people to extract the original message, is vulnerable to lose of valuable hidden secrete information. Here, we propose a data hiding and extraction procedure for AVI (Audio Video Interleave) videos embedding the secret message bits in DCT higher order coefficients. The secret information taken here is an grayscale image pixel values. The grayscale pixel values are converted to binary values and embedded those values in higher order coefficient value of DCT of AVI video frames. Data Hiding and Extraction procedure a re experimented successfully. Various experiment results are show here. All experiments are done using Matlab 2010a simulation software.","PeriodicalId":354719,"journal":{"name":"2013 International Conference on Intelligent Systems and Signal Processing (ISSP)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127245751","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 25
Domain ontology based semantic search for efficient information retrieval through automatic query expansion 基于领域本体的语义搜索通过自动查询扩展实现高效的信息检索
Pub Date : 2013-03-01 DOI: 10.1109/ISSP.2013.6526942
Rashmi Chauhan, Rayan Goudar, Robin Sharma, A. Chauhan
To achieve semantic search, a search engine is needed which can interpret the meaning of a user's query and the relations among the concepts that a document contains with respect to a particular domain. We are presenting the skeleton of such a system based on ontology. In this system, a user enters a query from which the meaningful concepts are extracted; using these concepts and domain ontology, query expansion is performed. For all the terms (expanded and initial query terms), SPARQL query is built and then it is fired on the knowledge base that finds appropriate RDF triples in knowledge Base. Web documents relevant to the requested concepts and individuals specified in these triples are then retrieved. Finally, the retrieved documents are ranked according to their relevance to the user's query and then are sent to the user. If a user wants to find specific information; can search with another module of our system that works without query expansion. The approach of query expansion makes use of query concepts as well as synonyms of these concepts and the new terms relate with the original query terms within a threshold.
为了实现语义搜索,需要一个搜索引擎,它可以解释用户查询的含义以及文档中包含的关于特定领域的概念之间的关系。本文提出了基于本体的系统框架。在这个系统中,用户输入一个查询,从中提取有意义的概念;利用这些概念和领域本体,执行查询扩展。对于所有的术语(扩展的和初始的查询术语),构建SPARQL查询,然后在知识库中找到合适的RDF三元组的知识库上触发它。然后检索与这些三元组中指定的所请求的概念和个人相关的Web文档。最后,根据与用户查询的相关性对检索到的文档进行排序,然后将其发送给用户。如果用户想要找到特定的信息;可以使用我们系统的另一个模块进行搜索,无需查询扩展。查询扩展的方法利用查询概念以及这些概念的同义词,并且新术语与阈值内的原始查询术语相关。
{"title":"Domain ontology based semantic search for efficient information retrieval through automatic query expansion","authors":"Rashmi Chauhan, Rayan Goudar, Robin Sharma, A. Chauhan","doi":"10.1109/ISSP.2013.6526942","DOIUrl":"https://doi.org/10.1109/ISSP.2013.6526942","url":null,"abstract":"To achieve semantic search, a search engine is needed which can interpret the meaning of a user's query and the relations among the concepts that a document contains with respect to a particular domain. We are presenting the skeleton of such a system based on ontology. In this system, a user enters a query from which the meaningful concepts are extracted; using these concepts and domain ontology, query expansion is performed. For all the terms (expanded and initial query terms), SPARQL query is built and then it is fired on the knowledge base that finds appropriate RDF triples in knowledge Base. Web documents relevant to the requested concepts and individuals specified in these triples are then retrieved. Finally, the retrieved documents are ranked according to their relevance to the user's query and then are sent to the user. If a user wants to find specific information; can search with another module of our system that works without query expansion. The approach of query expansion makes use of query concepts as well as synonyms of these concepts and the new terms relate with the original query terms within a threshold.","PeriodicalId":354719,"journal":{"name":"2013 International Conference on Intelligent Systems and Signal Processing (ISSP)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130463612","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 48
Research on power optimization in physical and MAC layer of wireless sensor networks — A survey 无线传感器网络物理层和MAC层的功耗优化研究综述
Pub Date : 2013-03-01 DOI: 10.1109/ISSP.2013.6526915
K. Lakshmisudha, C. Arun
Advances in technology enabled researchers in the field of wireless sensor networks to forecast unprecedented growth of ubiquitous applications. Because of the limited energy storage capability of sensor nodes, energy consumption is one of the most challenging aspects of these networks and different strategies and protocol deals with this area. However, deployment of the Wireless Sensor Networks in difficult to access areas makes it difficult to replace the batteries, the main power supply of a sensor node. It means that the power limitation of the sensor nodes appreciably constraints their functionality and potential applications. All the layers of the Wireless sensor networks protocol stack are responsible for the power consumption. In this paper we have discussed about the research issues in physical layer, MAC layer and the different methods to optimize the power consumption in both the layers of Wireless sensor networks. We have also discussed the Cross Layer designs to improve the energy efficiency.
技术的进步使无线传感器网络领域的研究人员能够预测无处不在的应用的空前增长。由于传感器节点的能量存储能力有限,能量消耗是这些网络中最具挑战性的方面之一,不同的策略和协议处理这一领域。然而,将无线传感器网络部署在难以进入的区域,使得传感器节点的主要电源电池难以更换。这意味着传感器节点的功率限制明显限制了它们的功能和潜在应用。无线传感器网络协议栈的所有层都对功耗负责。本文讨论了无线传感器网络物理层、MAC层的研究问题,以及优化物理层和MAC层功耗的不同方法。我们还讨论了交叉层设计,以提高能源效率。
{"title":"Research on power optimization in physical and MAC layer of wireless sensor networks — A survey","authors":"K. Lakshmisudha, C. Arun","doi":"10.1109/ISSP.2013.6526915","DOIUrl":"https://doi.org/10.1109/ISSP.2013.6526915","url":null,"abstract":"Advances in technology enabled researchers in the field of wireless sensor networks to forecast unprecedented growth of ubiquitous applications. Because of the limited energy storage capability of sensor nodes, energy consumption is one of the most challenging aspects of these networks and different strategies and protocol deals with this area. However, deployment of the Wireless Sensor Networks in difficult to access areas makes it difficult to replace the batteries, the main power supply of a sensor node. It means that the power limitation of the sensor nodes appreciably constraints their functionality and potential applications. All the layers of the Wireless sensor networks protocol stack are responsible for the power consumption. In this paper we have discussed about the research issues in physical layer, MAC layer and the different methods to optimize the power consumption in both the layers of Wireless sensor networks. We have also discussed the Cross Layer designs to improve the energy efficiency.","PeriodicalId":354719,"journal":{"name":"2013 International Conference on Intelligent Systems and Signal Processing (ISSP)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133739405","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
5G technology of mobile communication: A survey 移动通信的5G技术:调查
Pub Date : 2013-03-01 DOI: 10.1109/ISSP.2013.6526920
Asvin Gohil, Hardik Modi, Shobhit K Patel
The objective of this paper is comprehensive study related to 5G technology of mobile communication. Existing research work in mobile communication is related to 5G technology. In 5G, researches are related to the development of World Wide Wireless Web (WWWW), Dynamic Adhoc Wireless Networks (DAWN) and Real Wireless Communication. The most important technologies for 5G technologies are 802.11 Wireless Local Area Networks (WLAN) and 802.16 Wireless Metropolitan Area Networks (WMAN), Ad-hoc Wireless Personal Area Network (WPAN) and Wireless networks for digital communication. 4G technology will include several standards under a common umbrella, similar to 3G, but with IEEE 802.xx wireless mobile networks integrated from the commencement. The major contribution of this paper is the key provisions of 5G (Fifth Generation) technology of mobile communication, which is seen as consumer oriented. In 5G technology, the mobile consumer has given utmost priority compared to others. 5G Technology stands for 5th Generation Mobile Technology. 5G technology is to make use of mobile phones within very high bandwidth. The consumer never experienced the utmost valued technology as 5G. The 5G technologies include all types of advanced features which make 5G technology most dominant technology in near future.
本文的目的是对5G移动通信技术进行全面的研究。现有的移动通信研究工作都与5G技术有关。在5G中,研究涉及到万维网(www)、动态自组织无线网络(DAWN)和真实无线通信(Real Wireless Communication)的发展。5G技术中最重要的技术是802.11无线局域网(WLAN)和802.16无线城域网(WMAN)、自组织无线个人局域网(WPAN)和用于数字通信的无线网络。4G技术将在一个共同的保护伞下包括几个标准,类似于3G,但采用IEEE 802。从Xx无线移动网络集成开始。本文的主要贡献是5G(第五代)移动通信技术的关键规定,这被视为面向消费者的。在5G技术中,移动消费者比其他人享有最高优先权。5G技术是指第五代移动技术,5G技术是在非常高的带宽下使用手机。消费者从未体验过像5G这样最有价值的技术。5G技术包括所有类型的先进功能,使5G技术在不久的将来成为主导技术。
{"title":"5G technology of mobile communication: A survey","authors":"Asvin Gohil, Hardik Modi, Shobhit K Patel","doi":"10.1109/ISSP.2013.6526920","DOIUrl":"https://doi.org/10.1109/ISSP.2013.6526920","url":null,"abstract":"The objective of this paper is comprehensive study related to 5G technology of mobile communication. Existing research work in mobile communication is related to 5G technology. In 5G, researches are related to the development of World Wide Wireless Web (WWWW), Dynamic Adhoc Wireless Networks (DAWN) and Real Wireless Communication. The most important technologies for 5G technologies are 802.11 Wireless Local Area Networks (WLAN) and 802.16 Wireless Metropolitan Area Networks (WMAN), Ad-hoc Wireless Personal Area Network (WPAN) and Wireless networks for digital communication. 4G technology will include several standards under a common umbrella, similar to 3G, but with IEEE 802.xx wireless mobile networks integrated from the commencement. The major contribution of this paper is the key provisions of 5G (Fifth Generation) technology of mobile communication, which is seen as consumer oriented. In 5G technology, the mobile consumer has given utmost priority compared to others. 5G Technology stands for 5th Generation Mobile Technology. 5G technology is to make use of mobile phones within very high bandwidth. The consumer never experienced the utmost valued technology as 5G. The 5G technologies include all types of advanced features which make 5G technology most dominant technology in near future.","PeriodicalId":354719,"journal":{"name":"2013 International Conference on Intelligent Systems and Signal Processing (ISSP)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131536437","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 264
Implementation and performance analysis of DCT-DWT-SVD based watermarking algorithms for color images 基于DCT-DWT-SVD的彩色图像水印算法实现及性能分析
Pub Date : 2013-03-01 DOI: 10.1109/ISSP.2013.6526903
Nidhi H. Divecha, Dr. N. N. Jani
Digital image watermarking is one such technology that has been developed to protect digital content (text, images, audio, and video) from illegal manipulations. In this paper we proposed implementation and performance analysis of two different watermarking schemes based on DCT-DWT-SVD. Both are non blind techniques. One is based on SVD of DC coefficients using second level DWT decomposition and other is consider SVD of all DCT values of second level DWT composition of cover image. To check effectiveness of both techniques for Imperceptibility and robustness PSNR and NCC parameters are used.
数字图像水印就是这样一种技术,它是为了保护数字内容(文本、图像、音频和视频)免受非法操纵而开发的。本文提出了基于DCT-DWT-SVD的两种不同的水印方案的实现和性能分析。两者都是非盲技术。一种是基于二级DWT分解的DC系数SVD,另一种是考虑覆盖图像的二级DWT组成的所有DCT值的SVD。为了检验这两种技术在不可感知性和鲁棒性方面的有效性,使用了PSNR和NCC参数。
{"title":"Implementation and performance analysis of DCT-DWT-SVD based watermarking algorithms for color images","authors":"Nidhi H. Divecha, Dr. N. N. Jani","doi":"10.1109/ISSP.2013.6526903","DOIUrl":"https://doi.org/10.1109/ISSP.2013.6526903","url":null,"abstract":"Digital image watermarking is one such technology that has been developed to protect digital content (text, images, audio, and video) from illegal manipulations. In this paper we proposed implementation and performance analysis of two different watermarking schemes based on DCT-DWT-SVD. Both are non blind techniques. One is based on SVD of DC coefficients using second level DWT decomposition and other is consider SVD of all DCT values of second level DWT composition of cover image. To check effectiveness of both techniques for Imperceptibility and robustness PSNR and NCC parameters are used.","PeriodicalId":354719,"journal":{"name":"2013 International Conference on Intelligent Systems and Signal Processing (ISSP)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131867286","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 50
Enhancing security features & performance of AODV protocol under attack for MANET 增强攻击下面向MANET的AODV协议的安全特性和性能
Pub Date : 2013-03-01 DOI: 10.1109/ISSP.2013.6526928
S. Soni, S. D. Nayak
In this paper, a novel security mechanism is presented to enhance security & performance of AODV (Adhoc On-demand Distance Vector) routing protocol under the attack for MANET (Mobile Ad-hoc Networks). The AODV routing protocol was initially developed without considering security in mind. So it is not able to defend against any kind of security attack. But there are many security mechanisms available that make AODV secure. However, by doing more research in this area, one major flaw in any of the existing secure routing protocols was discovered. That is security mechanisms that are available consume more processing power and required complex key-management system. Here, we present a novel security mechanism that integrates digital signature and hash chain to protect the AODV routing protocol that is capable of defending itself against both malicious and unauthenticated nodes with marginal performance difference. The proposed security mechanism was also simulated in the Network Simulator 2 (NS2) to show marginal performance difference under attack.
针对移动自组织网络(MANET)的攻击,提出了一种新的安全机制来提高AODV (Adhoc按需距离矢量)路由协议的安全性和性能。AODV路由协议最初在开发时没有考虑安全性。因此,它无法抵御任何类型的安全攻击。但是有许多安全机制可以保证AODV的安全性。然而,通过对这一领域进行更多的研究,我们发现了现有安全路由协议中的一个主要缺陷。这是可用的安全机制,需要消耗更多的处理能力和复杂的密钥管理系统。本文提出了一种集成数字签名和哈希链的新型安全机制来保护AODV路由协议,该协议能够在性能差异很小的情况下抵御恶意和未经身份验证的节点。并在网络模拟器2 (NS2)中对所提出的安全机制进行了仿真,以显示攻击下的边际性能差异。
{"title":"Enhancing security features & performance of AODV protocol under attack for MANET","authors":"S. Soni, S. D. Nayak","doi":"10.1109/ISSP.2013.6526928","DOIUrl":"https://doi.org/10.1109/ISSP.2013.6526928","url":null,"abstract":"In this paper, a novel security mechanism is presented to enhance security & performance of AODV (Adhoc On-demand Distance Vector) routing protocol under the attack for MANET (Mobile Ad-hoc Networks). The AODV routing protocol was initially developed without considering security in mind. So it is not able to defend against any kind of security attack. But there are many security mechanisms available that make AODV secure. However, by doing more research in this area, one major flaw in any of the existing secure routing protocols was discovered. That is security mechanisms that are available consume more processing power and required complex key-management system. Here, we present a novel security mechanism that integrates digital signature and hash chain to protect the AODV routing protocol that is capable of defending itself against both malicious and unauthenticated nodes with marginal performance difference. The proposed security mechanism was also simulated in the Network Simulator 2 (NS2) to show marginal performance difference under attack.","PeriodicalId":354719,"journal":{"name":"2013 International Conference on Intelligent Systems and Signal Processing (ISSP)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122393845","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 30
A ROM-less direct digital frequency synthesizer based on fifth-degree Bezier curve approximation 基于五次Bezier曲线近似的无rom直接数字频率合成器
Pub Date : 2013-03-01 DOI: 10.1109/ISSP.2013.6526866
Ravinder Singh, K. Roy, B. R. Kapuriya, C. Bhattacharya
We report here fifth-degree Bezier curve approximations by genetic algorithm for sine amplitudes that computes the amplitudes from phase values ranging from 0 to π/2. The full period of a sine wave is generated by exploiting the quarter wave symmetry. Sine waves generated by this technique are spectrally very pure, and are produced without ROM in a direct digital frequency synthesizer (DDS). It produces sine waves with a maximum error in amplitude of order 7.6×10-06 that is lesser than errors introduced in any typical DDS based sine wave output. DDS circuitry is designed in the Simulink environment. Spectral analysis shows that worst case spurious free dynamic range (SFDR) for a sinusoid is -132 dBc.
我们在这里报告了用遗传算法计算正弦振幅的五度贝塞尔曲线近似,该算法计算从0到π/2的相位值的振幅。正弦波的整个周期是利用四分之一波对称性产生的。由该技术产生的正弦波频谱非常纯净,并且在直接数字频率合成器(DDS)中没有ROM产生。它产生的正弦波的最大振幅误差为7.6×10-06阶,小于任何典型的基于DDS的正弦波输出中引入的误差。DDS电路是在Simulink环境下设计的。频谱分析表明,在最坏情况下,正弦信号的无杂散动态范围(SFDR)为-132 dBc。
{"title":"A ROM-less direct digital frequency synthesizer based on fifth-degree Bezier curve approximation","authors":"Ravinder Singh, K. Roy, B. R. Kapuriya, C. Bhattacharya","doi":"10.1109/ISSP.2013.6526866","DOIUrl":"https://doi.org/10.1109/ISSP.2013.6526866","url":null,"abstract":"We report here fifth-degree Bezier curve approximations by genetic algorithm for sine amplitudes that computes the amplitudes from phase values ranging from 0 to π/2. The full period of a sine wave is generated by exploiting the quarter wave symmetry. Sine waves generated by this technique are spectrally very pure, and are produced without ROM in a direct digital frequency synthesizer (DDS). It produces sine waves with a maximum error in amplitude of order 7.6×10-06 that is lesser than errors introduced in any typical DDS based sine wave output. DDS circuitry is designed in the Simulink environment. Spectral analysis shows that worst case spurious free dynamic range (SFDR) for a sinusoid is -132 dBc.","PeriodicalId":354719,"journal":{"name":"2013 International Conference on Intelligent Systems and Signal Processing (ISSP)","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127267737","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A simple and novel adaptive binarization approach for handwritten documents 一种简单新颖的手写文档自适应二值化方法
Pub Date : 2013-03-01 DOI: 10.1109/ISSP.2013.6526884
S. Panwar, N. Nain
Handwritten text recognition needs some preprocessing steps for better recognition. One of the preprocessing task is handwritten text document binarization. Several binarization approaches are proposed previously and several are widely used in handwritten text binarization but the choice of most appropriate binarization approach for handwritten document is a very difficult itself. In this paper, we propose an adaptive binarization approach which can handle both continuous and abrupt intensity variations across the lines as well as words for handwritten or printed document. Experiments found that, the proposed approach is very simple as it uses only addition operations with constant complexity, and it also gives competitive results for handwritten (printed) documents compared to standard binarization approaches.
手写文本识别需要一些预处理步骤才能更好地识别。预处理任务之一是手写体文本文档二值化。目前已经提出了几种二值化方法,并广泛应用于手写文本二值化中,但选择最合适的二值化方法本身就是一个非常困难的问题。在本文中,我们提出了一种自适应二值化方法,该方法可以处理连续和突然的强度变化,以及手写或打印文档中的单词。实验发现,所提出的方法非常简单,因为它只使用恒定复杂度的加法运算,并且与标准二值化方法相比,它对手写(打印)文档的结果也具有竞争力。
{"title":"A simple and novel adaptive binarization approach for handwritten documents","authors":"S. Panwar, N. Nain","doi":"10.1109/ISSP.2013.6526884","DOIUrl":"https://doi.org/10.1109/ISSP.2013.6526884","url":null,"abstract":"Handwritten text recognition needs some preprocessing steps for better recognition. One of the preprocessing task is handwritten text document binarization. Several binarization approaches are proposed previously and several are widely used in handwritten text binarization but the choice of most appropriate binarization approach for handwritten document is a very difficult itself. In this paper, we propose an adaptive binarization approach which can handle both continuous and abrupt intensity variations across the lines as well as words for handwritten or printed document. Experiments found that, the proposed approach is very simple as it uses only addition operations with constant complexity, and it also gives competitive results for handwritten (printed) documents compared to standard binarization approaches.","PeriodicalId":354719,"journal":{"name":"2013 International Conference on Intelligent Systems and Signal Processing (ISSP)","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116781151","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fuzzy clustering with Gaussian-type member ship function 高斯型隶属函数的模糊聚类
Pub Date : 2013-03-01 DOI: 10.1109/ISSP.2013.6526941
C. Ramesh, G. Jena, K. R. Rao, C. V. Sastry
A Characteristic of the crisp clustering technique is that the boundary between clusters is fully defined. However, in many real-time situations, the boundaries between clusters cannot be clearly identified. Some patterns may belong to more than one cluster. In such cases, the fuzzy clustering method provides a better and more useful method to classify these patterns. Fuzzy c-means (FCM) FCM method is applicable to a wide variety of geostatistical data-analysis problems. This method generates fuzzy partitions and prototypes for any set of numerical data. These partitions are useful for corroborating known substructures or suggesting substructures in unexplored data. The clustering criterion used to aggregate subsets is a generalized least-squares objective function. We have implemented FCM algorithm with Gaussian membership values. Features of this method include a choice of an adjustable weighting factor that essentially controls sensitivity to the number of clusters.
清晰聚类技术的一个特点是聚类之间的边界是完全明确的。然而,在许多实时情况下,集群之间的边界不能被清楚地识别。有些模式可能属于多个集群。在这种情况下,模糊聚类方法提供了一种更好、更有用的方法来对这些模式进行分类。模糊c均值(FCM) FCM方法适用于各种地质统计数据分析问题。该方法对任意一组数值数据生成模糊分区和原型。这些划分对于证实已知的子结构或在未探索的数据中提示子结构是有用的。用于集合的聚类准则是广义最小二乘目标函数。我们实现了具有高斯隶属值的FCM算法。该方法的特点包括选择一个可调节的加权因子,该因子本质上控制对聚类数量的敏感性。
{"title":"Fuzzy clustering with Gaussian-type member ship function","authors":"C. Ramesh, G. Jena, K. R. Rao, C. V. Sastry","doi":"10.1109/ISSP.2013.6526941","DOIUrl":"https://doi.org/10.1109/ISSP.2013.6526941","url":null,"abstract":"A Characteristic of the crisp clustering technique is that the boundary between clusters is fully defined. However, in many real-time situations, the boundaries between clusters cannot be clearly identified. Some patterns may belong to more than one cluster. In such cases, the fuzzy clustering method provides a better and more useful method to classify these patterns. Fuzzy c-means (FCM) FCM method is applicable to a wide variety of geostatistical data-analysis problems. This method generates fuzzy partitions and prototypes for any set of numerical data. These partitions are useful for corroborating known substructures or suggesting substructures in unexplored data. The clustering criterion used to aggregate subsets is a generalized least-squares objective function. We have implemented FCM algorithm with Gaussian membership values. Features of this method include a choice of an adjustable weighting factor that essentially controls sensitivity to the number of clusters.","PeriodicalId":354719,"journal":{"name":"2013 International Conference on Intelligent Systems and Signal Processing (ISSP)","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124144251","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2013 International Conference on Intelligent Systems and Signal Processing (ISSP)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1