Lena D. Novovic, V. Ostojic, Đ. Starčević, V. Petrovic
In this paper we analyse the possibility of simple detection of circular radiography markers. To detect the marker, we utilised the Hough transform. Two approaches were analysed: with detecting image edges and without image edge detection where pixel gradient was used in the Hough voting process, i.e. to increase the accumulator values. Approaches were evaluated on 13 clinical radiography images. It was shown that the approach that detects image edges spatially matches the reference circles only 0.22 % less than manual annotation values, whereas the approach that uses just the gradient magnitudes spatially matches the reference circles 3.2 % less than manual annotations.
{"title":"Radiography calibration marker detection using Hough transformation","authors":"Lena D. Novovic, V. Ostojic, Đ. Starčević, V. Petrovic","doi":"10.5937/TELFOR1901030N","DOIUrl":"https://doi.org/10.5937/TELFOR1901030N","url":null,"abstract":"In this paper we analyse the possibility of simple detection of circular radiography markers. To detect the marker, we utilised the Hough transform. Two approaches were analysed: with detecting image edges and without image edge detection where pixel gradient was used in the Hough voting process, i.e. to increase the accumulator values. Approaches were evaluated on 13 clinical radiography images. It was shown that the approach that detects image edges spatially matches the reference circles only 0.22 % less than manual annotation values, whereas the approach that uses just the gradient magnitudes spatially matches the reference circles 3.2 % less than manual annotations.","PeriodicalId":37719,"journal":{"name":"Telfor Journal","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"71139634","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Dušan Đorić, Saša Crnobrnja, Marija Punt, Mile Davidovic
{"title":"Real-time face tracking in video content using Viola-Jones algorithm","authors":"Dušan Đorić, Saša Crnobrnja, Marija Punt, Mile Davidovic","doi":"10.5937/TELFOR1901070Q","DOIUrl":"https://doi.org/10.5937/TELFOR1901070Q","url":null,"abstract":"","PeriodicalId":37719,"journal":{"name":"Telfor Journal","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"71140000","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
E. Pakulova, I. Vatamaniuk, V. Budkov, R. Iakovlev, M. Nosov
Socio-cyber-physical systems are focused on perceptual interaction with users and involve analyzing and translating his or her physiological and psycho-emotional state. An actual scientific problem is to determine the latter basing on the user's speech signal. In particular, it can be solved relying on investigating the jitter of the speech pitch period. In this paper we propose an algorithm that allows one to improve the noise immunity of determining the pitch period of speech signal and a method of jitter determination based on averaging the change of the pitch period relatively to the current value. We also propose an algorithm for separating periodic and random pitch jitter based on using the discrete Fourier transform on the sequence of the pitch periods with the presence of unknown values in the unvoiced speech frames. Simulation shows that the proposed approach of filling the unknown values of pitch period has better results compared to the existing methods based on interpolation of the nearest known values.
{"title":"Using the random components of the jitter of speech pitch period to assess the state of the user of social-cyber-physical system","authors":"E. Pakulova, I. Vatamaniuk, V. Budkov, R. Iakovlev, M. Nosov","doi":"10.5937/telfor1902102p","DOIUrl":"https://doi.org/10.5937/telfor1902102p","url":null,"abstract":"Socio-cyber-physical systems are focused on perceptual interaction with users and involve analyzing and translating his or her physiological and psycho-emotional state. An actual scientific problem is to determine the latter basing on the user's speech signal. In particular, it can be solved relying on investigating the jitter of the speech pitch period. In this paper we propose an algorithm that allows one to improve the noise immunity of determining the pitch period of speech signal and a method of jitter determination based on averaging the change of the pitch period relatively to the current value. We also propose an algorithm for separating periodic and random pitch jitter based on using the discrete Fourier transform on the sequence of the pitch periods with the presence of unknown values in the unvoiced speech frames. Simulation shows that the proposed approach of filling the unknown values of pitch period has better results compared to the existing methods based on interpolation of the nearest known values.","PeriodicalId":37719,"journal":{"name":"Telfor Journal","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"71139783","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Influence of wire-based impedance-matching on Helical antenna radiation and limitations of equivalent model","authors":"S. Savić, M. Ilić, A. Đorđević","doi":"10.5937/TELFOR1901046S","DOIUrl":"https://doi.org/10.5937/TELFOR1901046S","url":null,"abstract":"","PeriodicalId":37719,"journal":{"name":"Telfor Journal","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"71139902","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
I. Stanković, M. Brajović, M. Daković, L. Stanković
Binary compressive sensing (CS) is a relatively new idea in the theory of sparse signal reconstruction. Under this framework, the signal is reconstructed based on the sign of the available measurements. This paper analyzes basic one-bit CS concepts for the case of complex valued random Gaussian measurement matrices. The reconstruction is compared with the B-bit quantized measurements. The concept of binary CS-based reconstruction is generalized by applying a sigmoid function to the measurements. Noise influence is also considered. The reconstruction is performed using a simple iterative thresholding algorithm.
{"title":"Analysis of noise in complex-valued binary and bipolar sigmoid compressive sensing","authors":"I. Stanković, M. Brajović, M. Daković, L. Stanković","doi":"10.5937/TELFOR1901035S","DOIUrl":"https://doi.org/10.5937/TELFOR1901035S","url":null,"abstract":"Binary compressive sensing (CS) is a relatively new idea in the theory of sparse signal reconstruction. Under this framework, the signal is reconstructed based on the sign of the available measurements. This paper analyzes basic one-bit CS concepts for the case of complex valued random Gaussian measurement matrices. The reconstruction is compared with the B-bit quantized measurements. The concept of binary CS-based reconstruction is generalized by applying a sigmoid function to the measurements. Noise influence is also considered. The reconstruction is performed using a simple iterative thresholding algorithm.","PeriodicalId":37719,"journal":{"name":"Telfor Journal","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"71139826","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A solution of concurrent queue on local and distributed Python STM","authors":"M. Popovic, B. Kordic, M. Popovic, I. Basicevic","doi":"10.5937/TELFOR1901064P","DOIUrl":"https://doi.org/10.5937/TELFOR1901064P","url":null,"abstract":"","PeriodicalId":37719,"journal":{"name":"Telfor Journal","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"71140033","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Mileusnic, P. Petrovic, B. Pavić, V. Marinković-Nedelicki, V. Matic, A. Lebl
This paper presents a new method for jamming of GSM communications. The aim is to decrease voice connection quality, thus disabling users to understand each other, while keeping established connections. The jamming method parameters depend on the algorithm characteristics implemented in SACCH frame. It is proved for three mobile telephony codecs that it is possible to reach unsatisfactory voice connection quality MOS<2 due to jamming of a GSM communications channel. Errors in data transmission during the periods without jamming also cause voice connection quality impairment and this influence is analyzed. The method performances are compared to other solutions.
{"title":"An investigation of a new GSM systems jamming technique without existing connections disruption","authors":"M. Mileusnic, P. Petrovic, B. Pavić, V. Marinković-Nedelicki, V. Matic, A. Lebl","doi":"10.5937/telfor1902084m","DOIUrl":"https://doi.org/10.5937/telfor1902084m","url":null,"abstract":"This paper presents a new method for jamming of GSM communications. The aim is to decrease voice connection quality, thus disabling users to understand each other, while keeping established connections. The jamming method parameters depend on the algorithm characteristics implemented in SACCH frame. It is proved for three mobile telephony codecs that it is possible to reach unsatisfactory voice connection quality MOS<2 due to jamming of a GSM communications channel. Errors in data transmission during the periods without jamming also cause voice connection quality impairment and this influence is analyzed. The method performances are compared to other solutions.","PeriodicalId":37719,"journal":{"name":"Telfor Journal","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"71139652","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Emergence of IoT as one of the key data contributors in a big data application has presented new data quality challenges and has necessitated for an IoT inclusive data validation ecosystem. Standardized data quality approaches and frameworks are available for data obtained for a variety of sources like data warehouses, webblogs, social media, etc. in a big data application. Since IoT data differs significantly from other data, challenges in ensuring the quality of this data are also different and thus a specially designed IoT data testing layer paves its way in. In this paper, we present a detailed review of existing data quality assurance practices used in big data applications. We highlight the requirement for IoT data quality assurance in the existing framework and propose an additional data testing layer for IoT. The data quality aspects and possible implementation models for quality assurance contained in the proposed layer can be used to construct a concrete set of guidelines for IoT data quality assurance.
{"title":"Quality assurance in big data analytics: An IoT perspective","authors":"Fernandes Ann Nicole, R. Wagh","doi":"10.5937/telfor1902114a","DOIUrl":"https://doi.org/10.5937/telfor1902114a","url":null,"abstract":"Emergence of IoT as one of the key data contributors in a big data application has presented new data quality challenges and has necessitated for an IoT inclusive data validation ecosystem. Standardized data quality approaches and frameworks are available for data obtained for a variety of sources like data warehouses, webblogs, social media, etc. in a big data application. Since IoT data differs significantly from other data, challenges in ensuring the quality of this data are also different and thus a specially designed IoT data testing layer paves its way in. In this paper, we present a detailed review of existing data quality assurance practices used in big data applications. We highlight the requirement for IoT data quality assurance in the existing framework and propose an additional data testing layer for IoT. The data quality aspects and possible implementation models for quality assurance contained in the proposed layer can be used to construct a concrete set of guidelines for IoT data quality assurance.","PeriodicalId":37719,"journal":{"name":"Telfor Journal","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"71139800","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The paper presents the improved design of the novel circularly polarized patch antenna array operating at ISM band 24.05-24.25 GHz. The antenna array consists of 24 identical truncated patches which are serially fed through the microstrip line. The antenna is a travelling-wave array with exponential power distribution which provides very good side lobe suppression of 30 dB in the entire operating band making it suitable for automotive radar applications. Simulated axial ratio is below 3dB in the range (24.06-24.26) GHz, the antenna gain is greater than 17.2 dBi, cross polarization is better than 15 dB and return loss is greater than 15 dB in the entire ISM band.
{"title":"Improved model of the circularly polarized patch antenna array at 24 GHz for radar applications","authors":"I. Radnović, B. Jokanović, A. Boryssenko","doi":"10.5937/telfor1902096r","DOIUrl":"https://doi.org/10.5937/telfor1902096r","url":null,"abstract":"The paper presents the improved design of the novel circularly polarized patch antenna array operating at ISM band 24.05-24.25 GHz. The antenna array consists of 24 identical truncated patches which are serially fed through the microstrip line. The antenna is a travelling-wave array with exponential power distribution which provides very good side lobe suppression of 30 dB in the entire operating band making it suitable for automotive radar applications. Simulated axial ratio is below 3dB in the range (24.06-24.26) GHz, the antenna gain is greater than 17.2 dBi, cross polarization is better than 15 dB and return loss is greater than 15 dB in the entire ISM band.","PeriodicalId":37719,"journal":{"name":"Telfor Journal","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"71139713","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Feasibility for improving the efficiency of the tag identification phase in OSK (Ohkubo, Suzuki i Kinoshita) RFID protocol is analyzed in this paper. First, the basic identification technique is presented in general. Then, a procedure for speeding up the identification by employment of TMTO (Time Memory Trade Off) approach is explained. Balancing between memory and time requirements is achieved with the chaining technique and introduction of an off-line, preparatory phase. As an additional effort, a second TMTObased level is proposed. It relies on a special look-up table which consists of the equidistant states generated during preparatory phase. The complexity of the proposed technique is discussed along with some numerical evaluation results obtained through experiments.
本文分析了提高OSK (Ohkubo, Suzuki i Kinoshita) RFID协议中标签识别阶段效率的可行性。首先,概述了基本的识别技术。然后,介绍了一种利用时间记忆权衡法加快识别速度的方法。内存和时间需求之间的平衡是通过链技术和离线准备阶段的引入来实现的。作为额外的工作,提出了第二个基于tmto的级别。它依赖于一个特殊的查找表,该表由准备阶段生成的等距状态组成。讨论了该方法的复杂性,并通过实验得到了一些数值评价结果。
{"title":"Analysis and evaluation of three methods for tag identification in OSK RFID protocol","authors":"V. Tomasevic, M. Tomasevic","doi":"10.5937/TELFOR1901058T","DOIUrl":"https://doi.org/10.5937/TELFOR1901058T","url":null,"abstract":"Feasibility for improving the efficiency of the tag identification phase in OSK (Ohkubo, Suzuki i Kinoshita) RFID protocol is analyzed in this paper. First, the basic identification technique is presented in general. Then, a procedure for speeding up the identification by employment of TMTO (Time Memory Trade Off) approach is explained. Balancing between memory and time requirements is achieved with the chaining technique and introduction of an off-line, preparatory phase. As an additional effort, a second TMTObased level is proposed. It relies on a special look-up table which consists of the equidistant states generated during preparatory phase. The complexity of the proposed technique is discussed along with some numerical evaluation results obtained through experiments.","PeriodicalId":37719,"journal":{"name":"Telfor Journal","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"71140018","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}