首页 > 最新文献

2016 World Conference on Futuristic Trends in Research and Innovation for Social Welfare (Startup Conclave)最新文献

英文 中文
Design of advanced encryption standard on soft-core processor 基于软核处理器的高级加密标准设计
Amruta R. Dumane, N. Narole, P. Wanjari
With the rapid progression of data exchange in electronic world, information security is becoming more important in data transmission and storage. Security became an essential thing during the transmission of confidential information. Cryptographic algorithm is used to scramble the text from one form to another form. This Paper represents the design of Advanced Encryption Standard on soft-core processor. AES is a block cipher algorithm that can be used for both encryption and decryption. AES algorithm protects the data from unauthorized access. Design of AES algorithm on Soft-core processor uses both EDK and SDK tool. Simulation results are tested on Field Programmable Gate Array (FPGA).
随着电子世界中数据交换的飞速发展,信息安全在数据传输和存储方面变得越来越重要。在保密信息的传输过程中,安全成为一件至关重要的事情。加密算法用于将文本从一种形式打乱为另一种形式。本文介绍了基于软核处理器的高级加密标准的设计。AES是一种分组密码算法,可用于加密和解密。AES算法保护数据不被非法访问。AES算法在软核处理器上的设计使用了EDK和SDK工具。仿真结果在现场可编程门阵列(FPGA)上进行了测试。
{"title":"Design of advanced encryption standard on soft-core processor","authors":"Amruta R. Dumane, N. Narole, P. Wanjari","doi":"10.1109/STARTUP.2016.7583914","DOIUrl":"https://doi.org/10.1109/STARTUP.2016.7583914","url":null,"abstract":"With the rapid progression of data exchange in electronic world, information security is becoming more important in data transmission and storage. Security became an essential thing during the transmission of confidential information. Cryptographic algorithm is used to scramble the text from one form to another form. This Paper represents the design of Advanced Encryption Standard on soft-core processor. AES is a block cipher algorithm that can be used for both encryption and decryption. AES algorithm protects the data from unauthorized access. Design of AES algorithm on Soft-core processor uses both EDK and SDK tool. Simulation results are tested on Field Programmable Gate Array (FPGA).","PeriodicalId":355852,"journal":{"name":"2016 World Conference on Futuristic Trends in Research and Innovation for Social Welfare (Startup Conclave)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114465291","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Multiple controllable band Notch butterfly shaped Monopole UWB antenna for cognitive radio 用于认知无线电的多可控波段陷波蝶形单极超宽带天线
Anuja V. Golliwar, M. S. Narlawar
A Microstrip patch antenna having an exclusive shape of Butterfly is presented in this paper. Design of an ultra-wide-band (UWB) antenna with reconfigurable band notches are presented. For cognitive radio applications, reconfiguration of Butterfly Shaped band notch antenna is proposed. Butterfly shaped Monopole antenna having dimension 33 mm × 24 mm. The proposed antenna is composed of butterfly shape design with Microstrip fed with UWB performance. In addition, the notched band at 3.5 GHz and 5.6 GHz is identified by etching a pair of circular split ring on patch. Two split-ring resonators (SRR) having different radius are used to notch WIMAX and WLAN application to avoid interference. The proposed antenna design is simulated and results are observed.
本文提出了一种具有专属蝴蝶形状的微带贴片天线。介绍了一种带可重构带陷波的超宽带天线的设计。在认知无线电应用中,提出了蝴蝶形带陷波天线的重构方法。尺寸为33毫米× 24毫米的蝶形单极天线。该天线采用蝴蝶形设计,微带馈电,具有超宽带性能。此外,通过在贴片上刻蚀一对圆形裂环来识别3.5 GHz和5.6 GHz的缺口带。在WIMAX和WLAN应用中,采用两个不同半径的劈裂环谐振器(SRR)进行陷波以避免干扰。对所提出的天线设计进行了仿真并观察了结果。
{"title":"Multiple controllable band Notch butterfly shaped Monopole UWB antenna for cognitive radio","authors":"Anuja V. Golliwar, M. S. Narlawar","doi":"10.1109/STARTUP.2016.7583944","DOIUrl":"https://doi.org/10.1109/STARTUP.2016.7583944","url":null,"abstract":"A Microstrip patch antenna having an exclusive shape of Butterfly is presented in this paper. Design of an ultra-wide-band (UWB) antenna with reconfigurable band notches are presented. For cognitive radio applications, reconfiguration of Butterfly Shaped band notch antenna is proposed. Butterfly shaped Monopole antenna having dimension 33 mm × 24 mm. The proposed antenna is composed of butterfly shape design with Microstrip fed with UWB performance. In addition, the notched band at 3.5 GHz and 5.6 GHz is identified by etching a pair of circular split ring on patch. Two split-ring resonators (SRR) having different radius are used to notch WIMAX and WLAN application to avoid interference. The proposed antenna design is simulated and results are observed.","PeriodicalId":355852,"journal":{"name":"2016 World Conference on Futuristic Trends in Research and Innovation for Social Welfare (Startup Conclave)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115298420","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Qualitative data analysis using regression method for agricultural data 用回归方法对农业数据进行定性数据分析
Pallavi V. Jirapure, Prarthana A. Deshkar
The apparent of internet has lead to the data explosion which results in the emergence of Data mining. Extraction of useful knowledge based content and recognizing the patterns in the dataset are comprehended in the recent decade. Analyzing meaningful data and applying knowledge to various disciplines for monitoring is the important features in agriculture domain. India's economy is agriculture based, where majority of Indian population have agriculture and farming as main occupation. Analysis of large datasets in effective way requires understanding of appropriate techniques in data mining. The focus of this paper is to provide and build agricultural based information system for Customer and Farmer interaction where scalability, reliability and integrity of information can be access through cloud based technology. This paper aims to analyze and use data mining techniques specially Regression analysis to forecast the crop production. The forecasting of respective crops analyzes patterns in knowledge lie information of certain parameters and historical data.
互联网的出现导致了数据爆炸,数据挖掘技术应运而生。基于知识的有用内容的提取和数据集中模式的识别是近十年来的研究成果。分析有意义的数据并将知识应用于各学科进行监测是农业领域的重要特征。印度的经济是以农业为基础的,大多数印度人口以农业和务农为主要职业。有效地分析大型数据集需要理解数据挖掘中的适当技术。本文的重点是为客户和农民的交互提供和构建基于农业的信息系统,在该系统中,信息的可扩展性、可靠性和完整性可以通过基于云的技术获得。本文旨在分析和利用数据挖掘技术,特别是回归分析来预测作物产量。各作物的预测分析了知识模式、特定参数信息和历史数据。
{"title":"Qualitative data analysis using regression method for agricultural data","authors":"Pallavi V. Jirapure, Prarthana A. Deshkar","doi":"10.1109/STARTUP.2016.7583966","DOIUrl":"https://doi.org/10.1109/STARTUP.2016.7583966","url":null,"abstract":"The apparent of internet has lead to the data explosion which results in the emergence of Data mining. Extraction of useful knowledge based content and recognizing the patterns in the dataset are comprehended in the recent decade. Analyzing meaningful data and applying knowledge to various disciplines for monitoring is the important features in agriculture domain. India's economy is agriculture based, where majority of Indian population have agriculture and farming as main occupation. Analysis of large datasets in effective way requires understanding of appropriate techniques in data mining. The focus of this paper is to provide and build agricultural based information system for Customer and Farmer interaction where scalability, reliability and integrity of information can be access through cloud based technology. This paper aims to analyze and use data mining techniques specially Regression analysis to forecast the crop production. The forecasting of respective crops analyzes patterns in knowledge lie information of certain parameters and historical data.","PeriodicalId":355852,"journal":{"name":"2016 World Conference on Futuristic Trends in Research and Innovation for Social Welfare (Startup Conclave)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115356550","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Histogram based hill climbing optimization for the segmentation of region of interest in satellite images 基于直方图的卫星图像感兴趣区域分割的爬坡优化
P. Ganesan, V. Kalist, B. Sathish
Images received from the satellite contains huge amount of information to process and analyze. So the segmentation is a crucial and important procedure in the analysis of images to gather necessary information from the satellite images. In the proposed approach, the satellite images are segmented using hill climbing local optimization technique and modified k-means clustering algorithm. In this approach, satellite images in RGB color space is converted into CIELAB color space. This color space is intended to approximate vision of human and perceptually uniform. Moreover, the intensity (L) component of this color space exactly matches the human perception of lightness. In the next step, the hill climbing process is applied on the color histogram of CIELAB color space image to obtain the initial cluster centers. In the final step, these cluster centers are given to the k-means clustering algorithm to produce the segmented image as the output. The effectiveness of the proposed approach has been demonstrated by number of experiments. The proposed method is more effective and efficient in the segmentation of satellite images to obtain meaningful clusters as compared to other conventional methods.
从卫星接收到的图像包含大量需要处理和分析的信息。因此,分割是图像分析中一个至关重要的步骤,可以从卫星图像中获取必要的信息。该方法采用爬坡局部优化技术和改进的k-means聚类算法对卫星图像进行分割。该方法将RGB色彩空间中的卫星图像转换为CIELAB色彩空间。这种色彩空间旨在近似人类的视觉和感知统一。此外,这个色彩空间的强度(L)分量与人类对亮度的感知完全匹配。下一步,对CIELAB色彩空间图像的颜色直方图进行爬坡处理,得到初始聚类中心。最后一步,将这些聚类中心交给k-means聚类算法,生成分割后的图像作为输出。大量的实验证明了该方法的有效性。与其他传统方法相比,该方法在分割卫星图像以获得有意义的聚类方面更加有效和高效。
{"title":"Histogram based hill climbing optimization for the segmentation of region of interest in satellite images","authors":"P. Ganesan, V. Kalist, B. Sathish","doi":"10.1109/STARTUP.2016.7583961","DOIUrl":"https://doi.org/10.1109/STARTUP.2016.7583961","url":null,"abstract":"Images received from the satellite contains huge amount of information to process and analyze. So the segmentation is a crucial and important procedure in the analysis of images to gather necessary information from the satellite images. In the proposed approach, the satellite images are segmented using hill climbing local optimization technique and modified k-means clustering algorithm. In this approach, satellite images in RGB color space is converted into CIELAB color space. This color space is intended to approximate vision of human and perceptually uniform. Moreover, the intensity (L) component of this color space exactly matches the human perception of lightness. In the next step, the hill climbing process is applied on the color histogram of CIELAB color space image to obtain the initial cluster centers. In the final step, these cluster centers are given to the k-means clustering algorithm to produce the segmented image as the output. The effectiveness of the proposed approach has been demonstrated by number of experiments. The proposed method is more effective and efficient in the segmentation of satellite images to obtain meaningful clusters as compared to other conventional methods.","PeriodicalId":355852,"journal":{"name":"2016 World Conference on Futuristic Trends in Research and Innovation for Social Welfare (Startup Conclave)","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128191323","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A study & review on code obfuscation 代码混淆的研究与回顾
Savio Sebastian, S. Malgaonkar, Paulami Shah, Mudit Kapoor, Tanay Parekhji
This paper presents a technical study review of code obfuscation. To address this, we discuss the need and methods of code obfuscation. We analyze the different techniques which are used to thwart reverse engineers and to protect against malicious code injection and attacks. Obfuscation, in software technology, is the deliberate act of creating an obfuscated code, that is difficult for humans to understand. Code obfuscation is a protective mechanism which is used to reduce the attack activities on a software system. It is a behavior preserving program transformation which aims to make a program unintelligible to automated program comprehension tools. Code obfuscation is convenient in situations where depending on cryptographic techniques is not enough; this is normal in remote execution situations where the software is executed on an unforeseen exposed hostile environment, such as the new computing platforms: cloud-computing paradigm and smart phones.
本文介绍了代码混淆的技术研究综述。为了解决这个问题,我们讨论了代码混淆的需要和方法。我们分析了用于阻止逆向工程和防止恶意代码注入和攻击的不同技术。在软件技术中,混淆是故意创建混淆代码的行为,使人类难以理解。代码混淆是一种保护机制,用于减少对软件系统的攻击活动。它是一种保持行为的程序转换,目的是使程序无法被自动化的程序理解工具所理解。在依赖加密技术还不够的情况下,代码混淆很方便;这在远程执行情况下是正常的,在这种情况下,软件在不可预见的暴露的敌对环境中执行,例如新的计算平台:云计算范式和智能手机。
{"title":"A study & review on code obfuscation","authors":"Savio Sebastian, S. Malgaonkar, Paulami Shah, Mudit Kapoor, Tanay Parekhji","doi":"10.1109/STARTUP.2016.7583913","DOIUrl":"https://doi.org/10.1109/STARTUP.2016.7583913","url":null,"abstract":"This paper presents a technical study review of code obfuscation. To address this, we discuss the need and methods of code obfuscation. We analyze the different techniques which are used to thwart reverse engineers and to protect against malicious code injection and attacks. Obfuscation, in software technology, is the deliberate act of creating an obfuscated code, that is difficult for humans to understand. Code obfuscation is a protective mechanism which is used to reduce the attack activities on a software system. It is a behavior preserving program transformation which aims to make a program unintelligible to automated program comprehension tools. Code obfuscation is convenient in situations where depending on cryptographic techniques is not enough; this is normal in remote execution situations where the software is executed on an unforeseen exposed hostile environment, such as the new computing platforms: cloud-computing paradigm and smart phones.","PeriodicalId":355852,"journal":{"name":"2016 World Conference on Futuristic Trends in Research and Innovation for Social Welfare (Startup Conclave)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126427530","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
A novel IDS technique to detect DDoS and sniffers in smart grid 智能电网中DDoS和嗅探器检测的一种新型IDS技术
S. Shitharth, D. Winston
Smart grid doesn't have a single standard definition to define it. Commonly, Smart Grid is an incorporation of advanced technologies over the normal electrical grid. Smart grid provides some novel features that mainly includes two way communication and automatic self-healing capability. Like the Internet, the Smart Grid consists of many new technologies and equipment that are bind together. These technologies works with the electrical grid to respond digitally accordingly to our quickly changing electric demand. Even though it is stuffed with pros, it suffers a lot due to its fragile data security. Smart grid usually have a centralized control system called SCADA to monitor and maintain all the data sources. Attackers would always tend to sneak through this centralized system through numerous types of attacks. Since SCADA system has no definite protocol, it can be fixed into any kind of protocol that is required by the utility. In this paper, the proposed method provides two techniques one to detect and remove sniffers from the network. Another one is to safeguard the SCADA system from the DDoS attack. Promiscuous mode detection and MD-5 algorithm is used to find the sniffers and by analyzing the TTL values, DDoS attack is been identified and isolated. The proposed technique is also compared with a real time existing IDS tool to show its better bandwidth consumption.
智能电网没有一个单一的标准定义来定义它。通常,智能电网是在普通电网之上的先进技术的结合。智能电网提供了一些新的特性,主要包括双向通信和自动自愈能力。与互联网一样,智能电网由许多新技术和新设备结合在一起。这些技术与电网合作,根据我们快速变化的电力需求做出数字化响应。尽管它有很多优点,但由于其脆弱的数据安全性,它遭受了很多损失。智能电网通常有一个称为SCADA的集中控制系统来监控和维护所有的数据源。攻击者总是倾向于通过多种类型的攻击偷偷地通过这个集中式系统。由于SCADA系统没有明确的协议,它可以被固定为公用事业需要的任何一种协议。本文提出的方法提供了两种技术,一种是检测和去除网络中的嗅探器。另一个是保护SCADA系统免受DDoS攻击。使用混杂模式检测和MD-5算法查找嗅探器,通过分析TTL值,对DDoS攻击进行识别和隔离。本文还将所提出的技术与现有的实时IDS工具进行了比较,以显示其更好的带宽消耗。
{"title":"A novel IDS technique to detect DDoS and sniffers in smart grid","authors":"S. Shitharth, D. Winston","doi":"10.7753/IJSEA0508.1005","DOIUrl":"https://doi.org/10.7753/IJSEA0508.1005","url":null,"abstract":"Smart grid doesn't have a single standard definition to define it. Commonly, Smart Grid is an incorporation of advanced technologies over the normal electrical grid. Smart grid provides some novel features that mainly includes two way communication and automatic self-healing capability. Like the Internet, the Smart Grid consists of many new technologies and equipment that are bind together. These technologies works with the electrical grid to respond digitally accordingly to our quickly changing electric demand. Even though it is stuffed with pros, it suffers a lot due to its fragile data security. Smart grid usually have a centralized control system called SCADA to monitor and maintain all the data sources. Attackers would always tend to sneak through this centralized system through numerous types of attacks. Since SCADA system has no definite protocol, it can be fixed into any kind of protocol that is required by the utility. In this paper, the proposed method provides two techniques one to detect and remove sniffers from the network. Another one is to safeguard the SCADA system from the DDoS attack. Promiscuous mode detection and MD-5 algorithm is used to find the sniffers and by analyzing the TTL values, DDoS attack is been identified and isolated. The proposed technique is also compared with a real time existing IDS tool to show its better bandwidth consumption.","PeriodicalId":355852,"journal":{"name":"2016 World Conference on Futuristic Trends in Research and Innovation for Social Welfare (Startup Conclave)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131469853","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Adaptive privacy policy prediction for email spam filtering 用于垃圾邮件过滤的自适应隐私策略预测
P. Rajendran, M. Janaki, S. Hemalatha, B. Durkananthini
Internet being an expansive network of computers is unprotected against malicious attacks. Email that travels along this unprotected Internet is eternally exposed to electronic dangers. Businesses are increasingly relying on electronic mail to correspond with clients and colleagues. As more sensitive information is transferred online, the need for email privacy becomes more pressing. Spam mails eat up huge amounts of bandwidths and annoy the receivers. Unsolicited messages are often used to compel the users to reveal their personal information. Spam mails are commonly used to ask for information that can be used by the attackers. Email is a private medium of communication, and the inherent privacy constraints form a major obstacle in developing efficient spam filtering methods which require access to a large amount of email data belonging to multiple users. To alleviate this problem, we foresee a privacy preserving spam filtering system that is adaptive in nature and help the user to compose privacy settings for their emails. We propose a two level framework which filters spam and also determines the best available privacy policy. Spam detection is done by similarity matching scheme using HTML content and the adaptive privacy framework enables the automatic settings for email that are filtered as spam.
互联网是一个庞大的计算机网络,对恶意攻击是没有保护的。在这个不受保护的互联网上传播的电子邮件永远暴露在电子危险之中。企业越来越依赖电子邮件与客户和同事通信。随着越来越多的敏感信息在网上传输,对电子邮件隐私的需求变得更加迫切。垃圾邮件占用了大量的带宽,并惹恼了接收者。未经请求的信息经常被用来迫使用户透露他们的个人信息。垃圾邮件通常被用来索取攻击者可以利用的信息。电子邮件是一种私人的通信媒介,其固有的隐私约束是开发有效的垃圾邮件过滤方法的主要障碍,这些方法需要访问属于多个用户的大量电子邮件数据。为了缓解这个问题,我们预见了一个保护隐私的垃圾邮件过滤系统,它是自适应的,并帮助用户为他们的电子邮件撰写隐私设置。我们提出了一个两级框架来过滤垃圾邮件,并确定最佳可用的隐私策略。垃圾邮件检测是通过使用HTML内容的相似性匹配方案完成的,自适应隐私框架可以对被过滤为垃圾邮件的电子邮件进行自动设置。
{"title":"Adaptive privacy policy prediction for email spam filtering","authors":"P. Rajendran, M. Janaki, S. Hemalatha, B. Durkananthini","doi":"10.1109/STARTUP.2016.7583948","DOIUrl":"https://doi.org/10.1109/STARTUP.2016.7583948","url":null,"abstract":"Internet being an expansive network of computers is unprotected against malicious attacks. Email that travels along this unprotected Internet is eternally exposed to electronic dangers. Businesses are increasingly relying on electronic mail to correspond with clients and colleagues. As more sensitive information is transferred online, the need for email privacy becomes more pressing. Spam mails eat up huge amounts of bandwidths and annoy the receivers. Unsolicited messages are often used to compel the users to reveal their personal information. Spam mails are commonly used to ask for information that can be used by the attackers. Email is a private medium of communication, and the inherent privacy constraints form a major obstacle in developing efficient spam filtering methods which require access to a large amount of email data belonging to multiple users. To alleviate this problem, we foresee a privacy preserving spam filtering system that is adaptive in nature and help the user to compose privacy settings for their emails. We propose a two level framework which filters spam and also determines the best available privacy policy. Spam detection is done by similarity matching scheme using HTML content and the adaptive privacy framework enables the automatic settings for email that are filtered as spam.","PeriodicalId":355852,"journal":{"name":"2016 World Conference on Futuristic Trends in Research and Innovation for Social Welfare (Startup Conclave)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131273819","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Depth based super-resolution for multiview images 基于深度的多视图图像超分辨率
Pallavi D. Chavanke, Supriya S. Thombre
Increasing sharpness and visual quality of a low resolution image is an important task in a multiview image processing domain. By using super-resolution approach for multiview images in a mixed resolution setup, quality of a low resolution view will be improved. Firstly, registration of an image is done, to find correspondence between the pixels in different view images. High frequency content generated from high resolution reference images is used to refine the target image with the help of depth map. Depth map calculated by stereo matching algorithm. Finally, Super resolution algorithm is used for multiview images with the help of depth map of a reference images.
提高低分辨率图像的清晰度和视觉质量是多视点图像处理领域的一项重要任务。通过在混合分辨率设置下对多视图图像进行超分辨率处理,可以提高低分辨率图像的质量。首先,对图像进行配准,找出不同视图图像中像素之间的对应关系。利用高分辨率参考图像生成的高频内容,借助深度图对目标图像进行细化。采用立体匹配算法计算深度图。最后,借助参考图像的深度图,将超分辨率算法应用于多视图图像。
{"title":"Depth based super-resolution for multiview images","authors":"Pallavi D. Chavanke, Supriya S. Thombre","doi":"10.1109/STARTUP.2016.7583973","DOIUrl":"https://doi.org/10.1109/STARTUP.2016.7583973","url":null,"abstract":"Increasing sharpness and visual quality of a low resolution image is an important task in a multiview image processing domain. By using super-resolution approach for multiview images in a mixed resolution setup, quality of a low resolution view will be improved. Firstly, registration of an image is done, to find correspondence between the pixels in different view images. High frequency content generated from high resolution reference images is used to refine the target image with the help of depth map. Depth map calculated by stereo matching algorithm. Finally, Super resolution algorithm is used for multiview images with the help of depth map of a reference images.","PeriodicalId":355852,"journal":{"name":"2016 World Conference on Futuristic Trends in Research and Innovation for Social Welfare (Startup Conclave)","volume":"109 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123114317","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Circle based path planning algorithm for localization using mobile anchor in WSN 基于圆的无线传感器网络移动锚定位路径规划算法
D. Poovaradevi, S. Priyadharsini
Many applications require high degree of sensor node to identify their locations in wireless sensor network. Location information is gathered from manual setting or GPS device. Since manual setting requires huge cost of human time, and GPS requires expensive device cost. Both approaches are not applicable for large scale WSN. The mobile anchor node is used to finding the position of unknown location node. The optimal path planning mechanism is evaluated to minimize the time for determining the localization and should increase the accuracy. In proposed system the circle based path planning mechanism can be implemented, because it covers four corners of the sensing field by increasing the diameter of the concentric circles. The sensor node is located at the center of this circle, a single mobile anchor node moves randomly through the sensing field to determine the localization and also detecting the hacker node in WSN.
在无线传感器网络中,许多应用需要高度的传感器节点来识别其位置。位置信息是通过手动设置或GPS设备收集的。由于手动设置需要巨大的人力时间成本,而GPS需要昂贵的设备成本。这两种方法都不适用于大规模WSN。移动锚节点用于寻找未知位置节点的位置。评估了最优路径规划机制,以最小化确定定位的时间,并应提高精度。该系统通过增加同心圆的直径覆盖传感场的四个角,从而实现基于圆的路径规划机制。传感器节点位于这个圆圈的中心,单个移动锚节点在传感场中随机移动以确定定位并检测WSN中的黑客节点。
{"title":"Circle based path planning algorithm for localization using mobile anchor in WSN","authors":"D. Poovaradevi, S. Priyadharsini","doi":"10.1109/STARTUP.2016.7583950","DOIUrl":"https://doi.org/10.1109/STARTUP.2016.7583950","url":null,"abstract":"Many applications require high degree of sensor node to identify their locations in wireless sensor network. Location information is gathered from manual setting or GPS device. Since manual setting requires huge cost of human time, and GPS requires expensive device cost. Both approaches are not applicable for large scale WSN. The mobile anchor node is used to finding the position of unknown location node. The optimal path planning mechanism is evaluated to minimize the time for determining the localization and should increase the accuracy. In proposed system the circle based path planning mechanism can be implemented, because it covers four corners of the sensing field by increasing the diameter of the concentric circles. The sensor node is located at the center of this circle, a single mobile anchor node moves randomly through the sensing field to determine the localization and also detecting the hacker node in WSN.","PeriodicalId":355852,"journal":{"name":"2016 World Conference on Futuristic Trends in Research and Innovation for Social Welfare (Startup Conclave)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131050545","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
New improved image registration based tracking system 新改进的图像配准跟踪系统
Divesh Agrawal, S. Bodkhe
This paper gives the information about object matching and tracking has found important and wide applications. An object matching and tracking algorithm based on SURF (Speeded-Up Robust Feature) method is presented in this project. In existing system the SIFT (Scale-Invariant Feature Transform) method is used which have some problems like time complexity, feature extraction, occlusion problem. To overcome these problems SURF method will be used in this project. Firstly, feature points are extracted respectively from base image using SURF method. Then, a coarse-to-fine matching method is used to realize the match of SURF feature points. It shows that, compared with the frequently-used normal cross correlation method, the presented algorithm can process more complicated geometric deformations existed between images and gives high matching accuracy as compare to the matching algorithm based on SIFT feature, in the presented algorithm the processing speed is faster than other algorithm and also lower computational burden, which can meet the real-time requirements for object matching and tracking.
本文给出的信息在目标匹配和跟踪方面得到了重要而广泛的应用。本课题提出了一种基于加速鲁棒特征(SURF)的目标匹配与跟踪算法。现有系统采用尺度不变特征变换(SIFT)方法,存在时间复杂度、特征提取、遮挡等问题。为了克服这些问题,本项目将采用SURF方法。首先,利用SURF方法从基图中分别提取特征点;然后,采用粗精匹配方法实现SURF特征点的匹配;结果表明,与常用的正态相互关联方法相比,本文算法可以处理更复杂的图像间几何变形,与基于SIFT特征的匹配算法相比,具有较高的匹配精度,处理速度快于其他算法,计算量小,能够满足目标匹配和跟踪的实时性要求。
{"title":"New improved image registration based tracking system","authors":"Divesh Agrawal, S. Bodkhe","doi":"10.1109/STARTUP.2016.7583908","DOIUrl":"https://doi.org/10.1109/STARTUP.2016.7583908","url":null,"abstract":"This paper gives the information about object matching and tracking has found important and wide applications. An object matching and tracking algorithm based on SURF (Speeded-Up Robust Feature) method is presented in this project. In existing system the SIFT (Scale-Invariant Feature Transform) method is used which have some problems like time complexity, feature extraction, occlusion problem. To overcome these problems SURF method will be used in this project. Firstly, feature points are extracted respectively from base image using SURF method. Then, a coarse-to-fine matching method is used to realize the match of SURF feature points. It shows that, compared with the frequently-used normal cross correlation method, the presented algorithm can process more complicated geometric deformations existed between images and gives high matching accuracy as compare to the matching algorithm based on SIFT feature, in the presented algorithm the processing speed is faster than other algorithm and also lower computational burden, which can meet the real-time requirements for object matching and tracking.","PeriodicalId":355852,"journal":{"name":"2016 World Conference on Futuristic Trends in Research and Innovation for Social Welfare (Startup Conclave)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132510775","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2016 World Conference on Futuristic Trends in Research and Innovation for Social Welfare (Startup Conclave)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1