首页 > 最新文献

2013 5th International Conference on Computational Intelligence and Communication Networks最新文献

英文 中文
Analysis of Electromagnetic Fields of 1200kV UHV-AC Transmission Lines 1200kV特高压交流输电线路电磁场分析
M. Unde, B. E. Kushare
This paper presents the rigorous analysis of electric and magnetic field of 1200 KV, AC transmission line, India's most prestigious forthcoming project. The analysis has been carried out using MATLAB software for both proposed single circuit horizontal configuration and double circuit vertical configuration. Electric and Magnetic fields at power frequency are analyzed for various scenarios like varying height of ground clearance of conductors, fields at ground level, four meter and eight meter above ground level. Magnetic fields at different line loadings are analyzed for both the circuits. These results are compared with standard limits of exposure to human beings published by International Commission for Non-ionizing Radiation Protection (ICNIRP) and IEEE to examine the safety. Purpose of this study is to provide factual information on electrical and magnetic characteristics of 1200 KV AC power line and its biological effects on people, animals and plants.
本文介绍了印度最负盛名的即将完工的1200千伏交流输电线路的电场和磁场的严格分析。利用MATLAB软件对所提出的单路水平结构和双路垂直结构进行了分析。分析了不同情况下的工频电场和磁场,如导体离地高度的变化、地面、4米和8米以上的电场。分析了两种电路在不同线路负载下的磁场。这些结果与国际非电离辐射防护委员会(ICNIRP)和IEEE公布的人体暴露标准限值进行了比较,以检查安全性。本研究的目的是提供有关1200千伏交流输电线路的电磁特性及其对人、动物和植物的生物学影响的事实资料。
{"title":"Analysis of Electromagnetic Fields of 1200kV UHV-AC Transmission Lines","authors":"M. Unde, B. E. Kushare","doi":"10.1109/CICN.2013.126","DOIUrl":"https://doi.org/10.1109/CICN.2013.126","url":null,"abstract":"This paper presents the rigorous analysis of electric and magnetic field of 1200 KV, AC transmission line, India's most prestigious forthcoming project. The analysis has been carried out using MATLAB software for both proposed single circuit horizontal configuration and double circuit vertical configuration. Electric and Magnetic fields at power frequency are analyzed for various scenarios like varying height of ground clearance of conductors, fields at ground level, four meter and eight meter above ground level. Magnetic fields at different line loadings are analyzed for both the circuits. These results are compared with standard limits of exposure to human beings published by International Commission for Non-ionizing Radiation Protection (ICNIRP) and IEEE to examine the safety. Purpose of this study is to provide factual information on electrical and magnetic characteristics of 1200 KV AC power line and its biological effects on people, animals and plants.","PeriodicalId":415274,"journal":{"name":"2013 5th International Conference on Computational Intelligence and Communication Networks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128912200","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Multiband E-Shaped Fractal Microstrip Patch Antenna with DGS for Wireless Applications 无线应用的多波段e形分形微带贴片天线
Ajay Nagpal, Sukhwinder Singh Dillon, Anupama Marwaha
In this paper multiband E-Shaped fractal patch antenna with DGS (Defected Ground Structure) has been proposed. By applying the concept of fractal geometry on rectangular patch, self-similar E-Shaped structure has been obtained. Also, by using FR-4 epoxy (Fire Retardant-4) as substrate antenna resonates at 3.7 GHz, 6.7 GHz, 7.9 GHz and 8.7 GHz respectively with bandwidth 120 MHz, 495 MHz, 225 MHz and 315 MHz at corresponding frequencies. By inserting DGS in the proposed antenna the various parameters have been improved such as return loss, bandwidth and gain. Designing and simulation of this antenna has been done by the help of IE3D Software. The application of this antenna is to make it compatible with Satellite, Wi-Fi (Wireless Fidelity), Bluetooth, Cellular Phones and Radar etc.
本文提出了一种带有缺陷地面结构的多波段e形分形贴片天线。将分形几何的概念应用于矩形块上,得到了自相似的e形结构。采用FR-4环氧树脂(阻燃剂-4)作为衬底,天线的谐振频率分别为3.7 GHz、6.7 GHz、7.9 GHz和8.7 GHz,相应频率的带宽分别为120 MHz、495 MHz、225 MHz和315 MHz。通过在天线中插入DGS,天线的回波损耗、带宽和增益等参数得到了改善。利用IE3D软件对该天线进行了设计和仿真。该天线的应用是使其与卫星、Wi-Fi(无线保真)、蓝牙、蜂窝电话和雷达等兼容。
{"title":"Multiband E-Shaped Fractal Microstrip Patch Antenna with DGS for Wireless Applications","authors":"Ajay Nagpal, Sukhwinder Singh Dillon, Anupama Marwaha","doi":"10.1109/CICN.2013.14","DOIUrl":"https://doi.org/10.1109/CICN.2013.14","url":null,"abstract":"In this paper multiband E-Shaped fractal patch antenna with DGS (Defected Ground Structure) has been proposed. By applying the concept of fractal geometry on rectangular patch, self-similar E-Shaped structure has been obtained. Also, by using FR-4 epoxy (Fire Retardant-4) as substrate antenna resonates at 3.7 GHz, 6.7 GHz, 7.9 GHz and 8.7 GHz respectively with bandwidth 120 MHz, 495 MHz, 225 MHz and 315 MHz at corresponding frequencies. By inserting DGS in the proposed antenna the various parameters have been improved such as return loss, bandwidth and gain. Designing and simulation of this antenna has been done by the help of IE3D Software. The application of this antenna is to make it compatible with Satellite, Wi-Fi (Wireless Fidelity), Bluetooth, Cellular Phones and Radar etc.","PeriodicalId":415274,"journal":{"name":"2013 5th International Conference on Computational Intelligence and Communication Networks","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128615318","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 31
Research and Application of Communication Gateway of EPA and MODBUS/TCP EPA与MODBUS/TCP通信网关的研究与应用
Li Hui, Zhang Hao, Peng Daogang
Through the research of EPA and MODBUS/TCP Industrial Ethernet technology, ARM embedded system and μC/OS-II real-time operating system, this paper designs and develops a communication gateway of EPA and MODBUS/TCP. The communication gateway can perform bidirectional data transceiving on EPA protocol and MODBUS/TCP protocol, which provides a secure, stable, real-time and flexible solution for process control of industrial field.
本文通过对EPA和MODBUS/TCP工业以太网技术、ARM嵌入式系统和μC/OS-II实时操作系统的研究,设计并开发了EPA和MODBUS/TCP通信网关。该通信网关可实现EPA协议和MODBUS/TCP协议的双向数据收发,为工业现场的过程控制提供了安全、稳定、实时、灵活的解决方案。
{"title":"Research and Application of Communication Gateway of EPA and MODBUS/TCP","authors":"Li Hui, Zhang Hao, Peng Daogang","doi":"10.1109/CICN.2013.44","DOIUrl":"https://doi.org/10.1109/CICN.2013.44","url":null,"abstract":"Through the research of EPA and MODBUS/TCP Industrial Ethernet technology, ARM embedded system and μC/OS-II real-time operating system, this paper designs and develops a communication gateway of EPA and MODBUS/TCP. The communication gateway can perform bidirectional data transceiving on EPA protocol and MODBUS/TCP protocol, which provides a secure, stable, real-time and flexible solution for process control of industrial field.","PeriodicalId":415274,"journal":{"name":"2013 5th International Conference on Computational Intelligence and Communication Networks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128510365","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Identity-Based Cryptography Techniques and Applications (A Review) 基于身份的密码技术及其应用(综述)
D. Anand, V. Khemchandani, R. Sharma
This paper is reviewed the state of research on the important topic in the field of information interchange that is identity based cryptography which more or less extention of the public key cryptography field. The paper starts with analyzing the fundamental concepts of identity based cryptography techniques, which includes encryption and the techniques of digital signature for authentication, which is called as identity based signature. Afterwards the paper continue its analyses on various techniques and applications of identity-based cryptography depends on the methods of bilinear pairing that is a computational ancient widely used to build up various identity based cryptography system in the current literature. Afterwards this paper reviewed the identity based encryption applications in the field of various networks as ad-hoc networks, mobile networks and other wireless networks in the current era. At the end of this paper, we discuss how realistic and under what parameters identity-based cryptography may be used in current and future environment with its benefits and limitations.
本文综述了信息交换领域的重要课题——基于身份的密码学的研究现状,它或多或少是公钥密码学领域的延伸。本文首先分析了基于身份的密码技术的基本概念,包括加密技术和用于身份验证的数字签名技术,即基于身份的签名技术。然后,本文继续分析了基于身份密码的各种技术和应用,其中基于双线性配对的方法是目前文献中广泛使用的一种计算方法,用于构建各种基于身份的密码系统。随后,本文回顾了当前时代基于身份的加密技术在ad-hoc网络、移动网络和其他无线网络等各种网络领域的应用。在本文的最后,我们讨论了基于身份的加密技术在当前和未来环境中使用的现实程度以及在哪些参数下使用,以及它的优点和局限性。
{"title":"Identity-Based Cryptography Techniques and Applications (A Review)","authors":"D. Anand, V. Khemchandani, R. Sharma","doi":"10.1109/CICN.2013.78","DOIUrl":"https://doi.org/10.1109/CICN.2013.78","url":null,"abstract":"This paper is reviewed the state of research on the important topic in the field of information interchange that is identity based cryptography which more or less extention of the public key cryptography field. The paper starts with analyzing the fundamental concepts of identity based cryptography techniques, which includes encryption and the techniques of digital signature for authentication, which is called as identity based signature. Afterwards the paper continue its analyses on various techniques and applications of identity-based cryptography depends on the methods of bilinear pairing that is a computational ancient widely used to build up various identity based cryptography system in the current literature. Afterwards this paper reviewed the identity based encryption applications in the field of various networks as ad-hoc networks, mobile networks and other wireless networks in the current era. At the end of this paper, we discuss how realistic and under what parameters identity-based cryptography may be used in current and future environment with its benefits and limitations.","PeriodicalId":415274,"journal":{"name":"2013 5th International Conference on Computational Intelligence and Communication Networks","volume":"371 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115967780","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 29
Ergonomic Evaluation of Aircraft Cockpit Based on Model-Predictive Control 基于模型预测控制的飞机座舱工效评价
Yin Tangwen, Fu Shan
A brief description about the ergonomic evaluation problems on the research subject of cockpit ergonomic evaluation theories and methods was made followed by the proposal of an aircraft cockpit ergonomic evaluation model based on the framework of model-predictive control. Repetitive decision making and feedback control made the model capable of handling constraints including physical limitations of aircraft dynamics as well as psychological and physiological limitations of flight crew. Active constraints which manifest limitations related to both human factors and cockpit ergonomic considerations can be determined by an optimization solver, in a real-time and quantitative manner. Such a model can be used to study the safety effect of flight due to pilot's human factors, and to guide safety design of aircraft. The model can also be used to locate the root of failure and its possibility caused by pilot's operate lapse in the human machine system, and then to compare the relative merits of various cockpit designs.
简要介绍了座舱工效评价理论与方法研究课题中存在的工效评价问题,提出了基于模型预测控制框架的飞机座舱工效评价模型。重复决策和反馈控制使模型能够处理约束,包括飞机动力学的物理限制以及机组人员的心理和生理限制。通过优化求解器,可以实时定量地确定与人为因素和驾驶舱人机工程学考虑相关的主动约束。该模型可用于研究飞行员人为因素对飞行的安全影响,指导飞机的安全设计。该模型还可用于定位人机系统中由于驾驶员操作失误而导致的故障根源及其可能性,从而比较各种座舱设计的相对优点。
{"title":"Ergonomic Evaluation of Aircraft Cockpit Based on Model-Predictive Control","authors":"Yin Tangwen, Fu Shan","doi":"10.1109/CICN.2013.133","DOIUrl":"https://doi.org/10.1109/CICN.2013.133","url":null,"abstract":"A brief description about the ergonomic evaluation problems on the research subject of cockpit ergonomic evaluation theories and methods was made followed by the proposal of an aircraft cockpit ergonomic evaluation model based on the framework of model-predictive control. Repetitive decision making and feedback control made the model capable of handling constraints including physical limitations of aircraft dynamics as well as psychological and physiological limitations of flight crew. Active constraints which manifest limitations related to both human factors and cockpit ergonomic considerations can be determined by an optimization solver, in a real-time and quantitative manner. Such a model can be used to study the safety effect of flight due to pilot's human factors, and to guide safety design of aircraft. The model can also be used to locate the root of failure and its possibility caused by pilot's operate lapse in the human machine system, and then to compare the relative merits of various cockpit designs.","PeriodicalId":415274,"journal":{"name":"2013 5th International Conference on Computational Intelligence and Communication Networks","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125668875","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Library Automation in Cloud 云中的图书馆自动化
D. G. Chandra, M. Kathing, D. Kumar
By combining the most effective practices of Vitalization, Grid computing, utility computing and network technologies cloud computing is the resultant cost effective computing service delivery mechanism. This survey paper discusses prospect of cloud based Library Management System for cost effective library automation. Another important aspect of this survey work is analytic discussion on various open source library automation software. CYBRARIANTMTM an internet based integrated Library Automation and Management solution developed by CR2 Technologies Ltd is also included for the benefit of implementer.
通过结合最有效的维新实践、网格计算、效用计算和网络技术,云计算是一种成本有效的计算服务交付机制。本文探讨了基于云的图书馆管理系统的前景,以实现高成本效益的图书馆自动化。这项调查工作的另一个重要方面是对各种开源图书馆自动化软件的分析讨论。由CR2技术有限公司开发的基于互联网的综合图书馆自动化和管理解决方案CYBRARIANTMTM也包括在内,以供实用者使用。
{"title":"Library Automation in Cloud","authors":"D. G. Chandra, M. Kathing, D. Kumar","doi":"10.1109/CICN.2013.104","DOIUrl":"https://doi.org/10.1109/CICN.2013.104","url":null,"abstract":"By combining the most effective practices of Vitalization, Grid computing, utility computing and network technologies cloud computing is the resultant cost effective computing service delivery mechanism. This survey paper discusses prospect of cloud based Library Management System for cost effective library automation. Another important aspect of this survey work is analytic discussion on various open source library automation software. CYBRARIANTMTM an internet based integrated Library Automation and Management solution developed by CR2 Technologies Ltd is also included for the benefit of implementer.","PeriodicalId":415274,"journal":{"name":"2013 5th International Conference on Computational Intelligence and Communication Networks","volume":"112 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126972347","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A New Technique of Data Integrity for Analysis of the Cloud Computing Security 云计算安全分析中的数据完整性新技术
R. Chalse, A. Selokar, A. Katara
Cloud computing is a latest and fast growing technology that offers an innovative, efficient and scalable business model for organizations to adopt various information technology resources i.e. software, hardware, network, storage, bandwidth etc. Cloud Computing is a jargon term without a commonly accepted non-ambiguous scientific or technical definition. At the foundation of cloud computing is the broader concept of converged infrastructure and shared services. It has the capability to incorporate multiple internal and external cloud services together to provide high interoperability there can be multiple accounts associated with a single or multiple service provider (SPs). So, Security in terms of integrity is most important aspects in cloud computing environment. In this paper, a detailed analysis of the cloud security problem is presented. Also the different problem in a cloud computing system and their effect upon the different cloud users are analyzed. It is providing a comparably scalable, position independent. Low cost platform for client's data. Since cloud computing environment is constructed based on open Architecture and interface. Based on this analysis various computing system and their effect upon the system, upon organizations and also upon different cloud users are analyzed. It is providing a comparably scalable, position-independent, low cost platform for client's data. Since cloud computing environment is constructed based on open architecture and interface. Based on this analysis various researches have also presented a view of measures that can be taken to deal with the cloud security problem and prevention that must be taken into account by any organization and cloud users seeking investment in cloud computing.
云计算是一种最新的、快速发展的技术,它为组织采用各种信息技术资源(如软件、硬件、网络、存储、带宽等)提供了一种创新、高效和可扩展的商业模式。云计算是一个行话术语,没有普遍接受的明确的科学或技术定义。云计算的基础是融合基础设施和共享服务的更广泛概念。它具有将多个内部和外部云服务合并在一起以提供高互操作性的能力,可以有多个帐户与单个或多个服务提供商(sp)相关联。因此,在云计算环境中,完整性方面的安全性是最重要的方面。本文对云安全问题进行了详细的分析。分析了云计算系统中存在的各种问题及其对不同云用户的影响。它提供了一个相对可扩展的,独立的位置。客户数据的低成本平台。由于云计算环境是基于开放的体系结构和接口构建的。在此基础上,分析了各种计算系统及其对系统、组织和不同云用户的影响。它为客户的数据提供了一个可扩展的、位置无关的、低成本的平台。由于云计算环境是基于开放的体系结构和接口构建的。基于这一分析,各种研究也提出了应对云安全问题和预防措施的观点,这是任何寻求云计算投资的组织和云用户必须考虑的问题。
{"title":"A New Technique of Data Integrity for Analysis of the Cloud Computing Security","authors":"R. Chalse, A. Selokar, A. Katara","doi":"10.1109/CICN.2013.103","DOIUrl":"https://doi.org/10.1109/CICN.2013.103","url":null,"abstract":"Cloud computing is a latest and fast growing technology that offers an innovative, efficient and scalable business model for organizations to adopt various information technology resources i.e. software, hardware, network, storage, bandwidth etc. Cloud Computing is a jargon term without a commonly accepted non-ambiguous scientific or technical definition. At the foundation of cloud computing is the broader concept of converged infrastructure and shared services. It has the capability to incorporate multiple internal and external cloud services together to provide high interoperability there can be multiple accounts associated with a single or multiple service provider (SPs). So, Security in terms of integrity is most important aspects in cloud computing environment. In this paper, a detailed analysis of the cloud security problem is presented. Also the different problem in a cloud computing system and their effect upon the different cloud users are analyzed. It is providing a comparably scalable, position independent. Low cost platform for client's data. Since cloud computing environment is constructed based on open Architecture and interface. Based on this analysis various computing system and their effect upon the system, upon organizations and also upon different cloud users are analyzed. It is providing a comparably scalable, position-independent, low cost platform for client's data. Since cloud computing environment is constructed based on open architecture and interface. Based on this analysis various researches have also presented a view of measures that can be taken to deal with the cloud security problem and prevention that must be taken into account by any organization and cloud users seeking investment in cloud computing.","PeriodicalId":415274,"journal":{"name":"2013 5th International Conference on Computational Intelligence and Communication Networks","volume":"189 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128188290","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 32
Effectiveness of Soft Computing Techniques for Medical Imaging 医学影像软计算技术的有效性
Anamika Ahirwar, R. S. Jadon
Segmentation of anatomical regions of the medical imaging is a critical problem. In this paper, we propose effectiveness of soft computing techniques for segmenting medical imaging. This paper explores the possibility of applying techniques for segmenting the regions of medical image. We them compute the effectiveness of the applied techniques on medical imaging and compare their results from the database given on the web. We tested the results to calculate the effectiveness of the techniques used for segmenting the tumor region in brain images and digital mammogram images.
医学图像的解剖区域分割是一个关键问题。本文提出了软计算技术在医学图像分割中的有效性。本文探讨了医学图像区域分割技术应用的可能性。我们计算了应用技术在医学成像上的有效性,并从网上提供的数据库中比较了它们的结果。我们对结果进行了测试,以计算用于分割脑图像和数字乳房x光图像中肿瘤区域的技术的有效性。
{"title":"Effectiveness of Soft Computing Techniques for Medical Imaging","authors":"Anamika Ahirwar, R. S. Jadon","doi":"10.1109/CICN.2013.76","DOIUrl":"https://doi.org/10.1109/CICN.2013.76","url":null,"abstract":"Segmentation of anatomical regions of the medical imaging is a critical problem. In this paper, we propose effectiveness of soft computing techniques for segmenting medical imaging. This paper explores the possibility of applying techniques for segmenting the regions of medical image. We them compute the effectiveness of the applied techniques on medical imaging and compare their results from the database given on the web. We tested the results to calculate the effectiveness of the techniques used for segmenting the tumor region in brain images and digital mammogram images.","PeriodicalId":415274,"journal":{"name":"2013 5th International Conference on Computational Intelligence and Communication Networks","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122458913","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Design and Comparison of Digital Filters for Removal of Baseline Wandering from ECG Signal 去除心电信号基线漂移的数字滤波器的设计与比较
R. Lakhwani, S. Ayub, J. Saini
Heart diseases, which are one of the death reasons, are among the several serious problems in this century and as per the latest survey, 60% of the patients die due to Heart problems. These diseases can be diagnosed by ECG (Electrocardiogram) signals. ECG measures electrical potentials on the body surface via contact electrodes thus it is very important signal in cardiology. Different artifacts affect the ECG signals which can thus cause problems in analyzing the ECG Thus signal processing schemes are applied to remove those interferences. The work proposed in this paper is removal of low frequency interference i.e. baseline wandering in ECG signal and digital filters are designed to remove it. The digital filters designed are FIR with different windowing methods as of Rectangular, Gaussian, Hamming, and Kaiser. The results obtained are at a low order of 56. The signals are taken from the MIT-BIH database which includes the normal and abnormal waveforms. The work has been done in MAT LAB environment where filters are designed in FDA Tool. The parameters are selected such that the noise is removed permanently. Also the best results are obtained at an order of 56 which makes hardware implementation easier. The result obtained for all FIR filters with different windows are compared by comparing the waveforms and power spectrums of the original and filtered ECG signals. The filters which gives the best results is the one using Kaiser Window.
心脏病是导致死亡的原因之一,是本世纪的几个严重问题之一,根据最近的调查,60%的病人死于心脏问题。这些疾病可通过心电图信号诊断。心电图通过接触电极测量体表电位,是心脏病学中非常重要的信号。不同的伪影会影响心电信号,从而给心电分析带来问题,因此采用信号处理方案来消除这些干扰。本文提出的工作是去除低频干扰,即心电信号中的基线漂移,并设计数字滤波器来去除它。所设计的FIR数字滤波器采用矩形、高斯、汉明和凯撒等不同的加窗方式。得到的结果是56的低阶。信号取自MIT-BIH数据库,包括正常波形和异常波形。该工作已在MAT LAB环境中完成,其中过滤器是在FDA工具中设计的。所选择的参数使噪声被永久地去除。并且在56阶时获得了最好的结果,这使得硬件实现更加容易。通过对原始心电信号和滤波后的心电信号的波形和功率谱进行比较,比较了采用不同窗口的FIR滤波器得到的结果。使用Kaiser Window的过滤器效果最好。
{"title":"Design and Comparison of Digital Filters for Removal of Baseline Wandering from ECG Signal","authors":"R. Lakhwani, S. Ayub, J. Saini","doi":"10.1109/CICN.2013.48","DOIUrl":"https://doi.org/10.1109/CICN.2013.48","url":null,"abstract":"Heart diseases, which are one of the death reasons, are among the several serious problems in this century and as per the latest survey, 60% of the patients die due to Heart problems. These diseases can be diagnosed by ECG (Electrocardiogram) signals. ECG measures electrical potentials on the body surface via contact electrodes thus it is very important signal in cardiology. Different artifacts affect the ECG signals which can thus cause problems in analyzing the ECG Thus signal processing schemes are applied to remove those interferences. The work proposed in this paper is removal of low frequency interference i.e. baseline wandering in ECG signal and digital filters are designed to remove it. The digital filters designed are FIR with different windowing methods as of Rectangular, Gaussian, Hamming, and Kaiser. The results obtained are at a low order of 56. The signals are taken from the MIT-BIH database which includes the normal and abnormal waveforms. The work has been done in MAT LAB environment where filters are designed in FDA Tool. The parameters are selected such that the noise is removed permanently. Also the best results are obtained at an order of 56 which makes hardware implementation easier. The result obtained for all FIR filters with different windows are compared by comparing the waveforms and power spectrums of the original and filtered ECG signals. The filters which gives the best results is the one using Kaiser Window.","PeriodicalId":415274,"journal":{"name":"2013 5th International Conference on Computational Intelligence and Communication Networks","volume":"163 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123291063","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
Improved Iris Recognition System Using Wavelet Transform and Ant Colony Optimization 基于小波变换和蚁群优化的虹膜识别系统
V. Sharma, Sadhna K. Mishra, Deepika Dubey
Feature selection and feature optimization play an important role in iris recognition system. Iris recognition system provide the great security flexibility for authentication and identification of genuine and imposters users. In this paper we proposed an optimized feature selection process for iris image template creation. The feature extraction process is performed by wavelet transform function and also modified the matching technique for iris recognition using multi-class SVM and ant colony optimization. Our empirical result evaluation shows that better performance of our proposed method in compression of hough tranform recognition technique.
特征选择和特征优化在虹膜识别系统中起着重要的作用。虹膜识别系统为鉴别真假用户提供了极大的安全灵活性。本文提出了一种优化的虹膜图像模板特征选择方法。利用小波变换函数进行特征提取,并利用多类支持向量机和蚁群优化改进虹膜识别的匹配技术。实验结果表明,该方法在压缩霍夫变换识别技术中具有较好的性能。
{"title":"Improved Iris Recognition System Using Wavelet Transform and Ant Colony Optimization","authors":"V. Sharma, Sadhna K. Mishra, Deepika Dubey","doi":"10.1109/CICN.2013.58","DOIUrl":"https://doi.org/10.1109/CICN.2013.58","url":null,"abstract":"Feature selection and feature optimization play an important role in iris recognition system. Iris recognition system provide the great security flexibility for authentication and identification of genuine and imposters users. In this paper we proposed an optimized feature selection process for iris image template creation. The feature extraction process is performed by wavelet transform function and also modified the matching technique for iris recognition using multi-class SVM and ant colony optimization. Our empirical result evaluation shows that better performance of our proposed method in compression of hough tranform recognition technique.","PeriodicalId":415274,"journal":{"name":"2013 5th International Conference on Computational Intelligence and Communication Networks","volume":"2000 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123549473","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
期刊
2013 5th International Conference on Computational Intelligence and Communication Networks
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1