首页 > 最新文献

2012 World Congress on Information and Communication Technologies最新文献

英文 中文
Optimization of OFDM systems resources using multi-objective Estimation Distribution Algorithms 基于多目标估计分布算法的OFDM系统资源优化
Pub Date : 2012-10-01 DOI: 10.1109/WICT.2012.6409166
R. Annauth, H. Rughooputh
OFDM has been recognized as a promising technique for providing high spectral efficiency in future wireless system. In this paper, a novel optimization technique, the Estimation Distribution Algorithm (EDA) is proposed for multi-objective optimization of OFDM systems resources. The performance and effectiveness of the optimizer are analyzed and compared with the state of art NSGA II and multi-objective particle swarm optimization algorithm.
在未来的无线系统中,OFDM被认为是一种很有前途的技术,可以提供较高的频谱效率。本文提出了一种新的优化技术——估计分布算法(EDA),用于OFDM系统资源的多目标优化。分析了优化器的性能和有效性,并与NSGA II和多目标粒子群优化算法进行了比较。
{"title":"Optimization of OFDM systems resources using multi-objective Estimation Distribution Algorithms","authors":"R. Annauth, H. Rughooputh","doi":"10.1109/WICT.2012.6409166","DOIUrl":"https://doi.org/10.1109/WICT.2012.6409166","url":null,"abstract":"OFDM has been recognized as a promising technique for providing high spectral efficiency in future wireless system. In this paper, a novel optimization technique, the Estimation Distribution Algorithm (EDA) is proposed for multi-objective optimization of OFDM systems resources. The performance and effectiveness of the optimizer are analyzed and compared with the state of art NSGA II and multi-objective particle swarm optimization algorithm.","PeriodicalId":445333,"journal":{"name":"2012 World Congress on Information and Communication Technologies","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130029731","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A novel approach for malicious nodes detection in ad-hoc networks based on cellular learning automata 基于元胞学习自动机的自组织网络恶意节点检测新方法
Pub Date : 2012-10-01 DOI: 10.1109/WICT.2012.6409055
Amir Bagheri Aghababa, Amirhosein Fathinavid, Abdolreza Salari, Seyedeh Elaheh Haghayegh Zavareh
There are some fields in ad-hoc networks that are more highlighted these days, such as energy consumption, quality of service and security. Among these, security has been predominantly concerned in military, civil and educational applications. In security problem, suspect nodes detection or abnormal behavior nodes is one of the most important parts. We have addressed the malicious nodes detection problem in ad-hoc networks using special type of learning automata in an irregular network. We have used the irregular cellular learning automata to detect anomalies in two levels. We have also rigorously evaluated the performance of our approach by simulating it with MATLAB and Glomosim simulator and have compared our solution with a powerful similar learning automata-based protocol named LAID. The simulation results proofs that our approach is more promising.
在ad-hoc网络中,有一些领域现在更加突出,比如能耗、服务质量和安全性。其中,安全主要涉及军事、民用和教育方面的应用。在安全问题中,可疑节点或异常行为节点的检测是最重要的环节之一。我们在不规则网络中使用特殊类型的学习自动机解决了ad-hoc网络中的恶意节点检测问题。我们使用不规则细胞学习自动机来检测两个层次的异常。我们还通过MATLAB和Glomosim模拟器对我们的方法进行了严格的性能评估,并将我们的解决方案与一个功能强大的类似的基于学习自动机的协议lay进行了比较。仿真结果证明了该方法的可行性。
{"title":"A novel approach for malicious nodes detection in ad-hoc networks based on cellular learning automata","authors":"Amir Bagheri Aghababa, Amirhosein Fathinavid, Abdolreza Salari, Seyedeh Elaheh Haghayegh Zavareh","doi":"10.1109/WICT.2012.6409055","DOIUrl":"https://doi.org/10.1109/WICT.2012.6409055","url":null,"abstract":"There are some fields in ad-hoc networks that are more highlighted these days, such as energy consumption, quality of service and security. Among these, security has been predominantly concerned in military, civil and educational applications. In security problem, suspect nodes detection or abnormal behavior nodes is one of the most important parts. We have addressed the malicious nodes detection problem in ad-hoc networks using special type of learning automata in an irregular network. We have used the irregular cellular learning automata to detect anomalies in two levels. We have also rigorously evaluated the performance of our approach by simulating it with MATLAB and Glomosim simulator and have compared our solution with a powerful similar learning automata-based protocol named LAID. The simulation results proofs that our approach is more promising.","PeriodicalId":445333,"journal":{"name":"2012 World Congress on Information and Communication Technologies","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130102251","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Development of advanced contrast enhancement technique for mammographie images 乳房x线摄影影像先进对比增强技术的发展
Pub Date : 2012-10-01 DOI: 10.1109/WICT.2012.6409072
A. Das, M. Bhattacharya
In the present study, we have applied the process of image enhancement to mammographic images. This study has examined the problem of fuzziness/impreciseness of mammograms such as inhomogeneous background, low contrast, indistinct borders, small and ill-defined shapes, varying intensities of the suspicious regions and low distinguishability from their surroundings. Though fuzzy logic based contrast enhancement technique has good potential to handle the problem of impreciseness in mammograms, more generalized and flexible Vague Set theory is appropriate to capture the vagueness of mammograms.
在本研究中,我们将图像增强过程应用于乳房x线摄影图像。本研究探讨了乳房x光片的模糊性/不精确性问题,如背景不均匀、对比度低、边界模糊、形状小且不明确、可疑区域的强度变化以及与周围环境的低可辨性。虽然基于模糊逻辑的对比度增强技术在处理乳房x光片的不精确性问题上有很好的潜力,但更广义和灵活的模糊集理论更适合于捕捉乳房x光片的模糊性。
{"title":"Development of advanced contrast enhancement technique for mammographie images","authors":"A. Das, M. Bhattacharya","doi":"10.1109/WICT.2012.6409072","DOIUrl":"https://doi.org/10.1109/WICT.2012.6409072","url":null,"abstract":"In the present study, we have applied the process of image enhancement to mammographic images. This study has examined the problem of fuzziness/impreciseness of mammograms such as inhomogeneous background, low contrast, indistinct borders, small and ill-defined shapes, varying intensities of the suspicious regions and low distinguishability from their surroundings. Though fuzzy logic based contrast enhancement technique has good potential to handle the problem of impreciseness in mammograms, more generalized and flexible Vague Set theory is appropriate to capture the vagueness of mammograms.","PeriodicalId":445333,"journal":{"name":"2012 World Congress on Information and Communication Technologies","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131826384","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
VLDD: Vindictive Link detection in Distance Vector Routine for ad hoc network 自组网中距离矢量例程的报复性链路检测
Pub Date : 2012-10-01 DOI: 10.1109/WICT.2012.6409200
K. Sreenivasulu, E. Prasad, A. Subramanyam
In this paper we present a novel Vindictive Link detection enabled Distance Vector Routing Protocol (VLDD) for mobile ad hoc networks, through which the cost of working out and consumption of resources is bounded. While most of the existing models go for Digital Signature the proposed protocol is based on adept symmetric key cryptography with proactive routing topology called DSDV. This proposed protocol offers an efficient hash chaining technique in which each node in the routing path stores only one arcanum where as the hash chained based protocols obliges high storage memory as it requires to preserve multiple numbers of Aracnums. The other hash chaining protocols like SEAD uses multiple user authentications where as VLDD uses only one authentication tag for giving acknowledgements, and for fault declarations. By the efficient use of hash chain elements the metric values and the sequence numbers on the path can be secured from logical tampering. In contrast with the proactive routing topology called SEAD that cited frequently in literature about secure ad hoc routing provides security that limited to lower bound of the evaluation metrics, VLDD can provide total protection. We evaluated scalability of VLDD by comparing with state-of-the-art algorithms and observed that it is scalable, adaptive over a wide range of divergent situations under different number of assessment measures. In particular, we show that it scales better on networks with dense in node count. In this regard simulation model developed inNS-2 environment.
本文提出了一种新的基于报报性链路检测的移动自组织网络距离矢量路由协议(VLDD),通过该协议,计算和消耗的资源成本是有限的。虽然大多数现有模型都采用数字签名,但提议的协议是基于灵活的对称密钥加密技术,具有称为DSDV的主动路由拓扑。该提议的协议提供了一种高效的哈希链技术,其中路由路径中的每个节点仅存储一个奥秘,而基于哈希链的协议要求高存储内存,因为它需要保存多个奥秘。其他散列链协议(如SEAD)使用多个用户身份验证,而VLDD仅使用一个身份验证标记来给出确认和错误声明。通过有效地利用哈希链元素,可以保护路径上的度量值和序列号不受逻辑篡改。与被称为SEAD的主动路由拓扑(在有关安全自组织路由的文献中经常被引用)相比,它提供的安全性仅限于评估指标的下界,而VLDD可以提供全面的保护。我们通过比较最先进的算法来评估VLDD的可扩展性,并观察到它在不同数量的评估措施下在广泛的不同情况下具有可扩展性和自适应性。特别是,我们证明了它在节点数密集的网络上可以更好地扩展。为此开发了inNS-2环境仿真模型。
{"title":"VLDD: Vindictive Link detection in Distance Vector Routine for ad hoc network","authors":"K. Sreenivasulu, E. Prasad, A. Subramanyam","doi":"10.1109/WICT.2012.6409200","DOIUrl":"https://doi.org/10.1109/WICT.2012.6409200","url":null,"abstract":"In this paper we present a novel Vindictive Link detection enabled Distance Vector Routing Protocol (VLDD) for mobile ad hoc networks, through which the cost of working out and consumption of resources is bounded. While most of the existing models go for Digital Signature the proposed protocol is based on adept symmetric key cryptography with proactive routing topology called DSDV. This proposed protocol offers an efficient hash chaining technique in which each node in the routing path stores only one arcanum where as the hash chained based protocols obliges high storage memory as it requires to preserve multiple numbers of Aracnums. The other hash chaining protocols like SEAD uses multiple user authentications where as VLDD uses only one authentication tag for giving acknowledgements, and for fault declarations. By the efficient use of hash chain elements the metric values and the sequence numbers on the path can be secured from logical tampering. In contrast with the proactive routing topology called SEAD that cited frequently in literature about secure ad hoc routing provides security that limited to lower bound of the evaluation metrics, VLDD can provide total protection. We evaluated scalability of VLDD by comparing with state-of-the-art algorithms and observed that it is scalable, adaptive over a wide range of divergent situations under different number of assessment measures. In particular, we show that it scales better on networks with dense in node count. In this regard simulation model developed inNS-2 environment.","PeriodicalId":445333,"journal":{"name":"2012 World Congress on Information and Communication Technologies","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133640953","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Rough sets and genetic algorithms: A hybrid approach to breast cancer classification 粗糙集和遗传算法:乳腺癌分类的混合方法
Pub Date : 2012-10-01 DOI: 10.1109/WICT.2012.6409085
Hanaa Ismail Elshazly, N. Ghali, Abir M. El Korany, A. Hassanien
The use of computational intelligence systems such as rough sets, neural networks, fuzzy set, genetic algorithms, etc., for predictions and classification has been widely established. This paper presents a generic classification model based on a rough set approach and decision rules. To increase the efficiency of the classification process, boolean reasoning discretization algorithm is used to discretize the data sets. The approach is tested by a comparative study of three different classifiers (decision rules, naive bayes and k-nearest neighbor) over three distinct discretization techniques (equal bigning, entropy and boolean reasoning). The rough set reduction technique is applied to find all the reducts of the data which contains the minimal subset of attributes that are associated with a class label for prediction. In this paper we adopt the genetic algorithms approach to reach reducts. Finally, decision rules were used as a classifier to evaluate the performance of the predicted reducts and classes. To evaluate the performance of our approach, we present tests on breast cancer data set. The experimental results obtained, show that the overall classification accuracy offered by the employed rough set approach and decision rules is high compared with other classification techniques including Bayes and k-nearest neighbor.
使用计算智能系统,如粗糙集、神经网络、模糊集、遗传算法等,进行预测和分类已被广泛建立。提出了一种基于粗糙集方法和决策规则的通用分类模型。为了提高分类过程的效率,采用布尔推理离散化算法对数据集进行离散化处理。通过比较研究三种不同的分类器(决策规则、朴素贝叶斯和k近邻)和三种不同的离散化技术(相等大码、熵和布尔推理),对该方法进行了测试。应用粗糙集约简技术找到包含与类标签相关的最小属性子集的数据的所有约简,用于预测。在本文中,我们采用遗传算法的方法来达到约简。最后,使用决策规则作为分类器来评估预测约简和分类的性能。为了评估我们的方法的性能,我们对乳腺癌数据集进行了测试。实验结果表明,与贝叶斯和k近邻等其他分类技术相比,所采用的粗糙集方法和决策规则提供的总体分类精度较高。
{"title":"Rough sets and genetic algorithms: A hybrid approach to breast cancer classification","authors":"Hanaa Ismail Elshazly, N. Ghali, Abir M. El Korany, A. Hassanien","doi":"10.1109/WICT.2012.6409085","DOIUrl":"https://doi.org/10.1109/WICT.2012.6409085","url":null,"abstract":"The use of computational intelligence systems such as rough sets, neural networks, fuzzy set, genetic algorithms, etc., for predictions and classification has been widely established. This paper presents a generic classification model based on a rough set approach and decision rules. To increase the efficiency of the classification process, boolean reasoning discretization algorithm is used to discretize the data sets. The approach is tested by a comparative study of three different classifiers (decision rules, naive bayes and k-nearest neighbor) over three distinct discretization techniques (equal bigning, entropy and boolean reasoning). The rough set reduction technique is applied to find all the reducts of the data which contains the minimal subset of attributes that are associated with a class label for prediction. In this paper we adopt the genetic algorithms approach to reach reducts. Finally, decision rules were used as a classifier to evaluate the performance of the predicted reducts and classes. To evaluate the performance of our approach, we present tests on breast cancer data set. The experimental results obtained, show that the overall classification accuracy offered by the employed rough set approach and decision rules is high compared with other classification techniques including Bayes and k-nearest neighbor.","PeriodicalId":445333,"journal":{"name":"2012 World Congress on Information and Communication Technologies","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133674390","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
On modeling the multirate sensor array 多速率传感器阵列的建模
Pub Date : 2012-10-01 DOI: 10.1109/WICT.2012.6409150
P. Neenu, S. Kumari, R. Dhuli
In this paper we derive a model for a sensor. Such a model can form the basis of characterising the multirate sensor array in terms of a nonuniform filter bank structure. The capabilities and limitations of the model are also highlighted. Two approaches for obtaining the modeling error are presented. The model is extended for the case when the sensor sampling rate is a rational factor of the observation signal Nyquist rate. The additional error that results in this scenario is analysed.
本文推导了一种传感器的模型。该模型可以构成以非均匀滤波器组结构表征多速率传感器阵列的基础。还强调了该模型的功能和局限性。给出了两种获取建模误差的方法。将该模型扩展到传感器采样率是观测信号奈奎斯特率的一个合理因子的情况。分析了在此场景中导致的附加错误。
{"title":"On modeling the multirate sensor array","authors":"P. Neenu, S. Kumari, R. Dhuli","doi":"10.1109/WICT.2012.6409150","DOIUrl":"https://doi.org/10.1109/WICT.2012.6409150","url":null,"abstract":"In this paper we derive a model for a sensor. Such a model can form the basis of characterising the multirate sensor array in terms of a nonuniform filter bank structure. The capabilities and limitations of the model are also highlighted. Two approaches for obtaining the modeling error are presented. The model is extended for the case when the sensor sampling rate is a rational factor of the observation signal Nyquist rate. The additional error that results in this scenario is analysed.","PeriodicalId":445333,"journal":{"name":"2012 World Congress on Information and Communication Technologies","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131871302","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design of a transaction recovery instance based on bi-directional ring election algorithm for crashed coordinator in distributed database systems 基于双向环选举算法的分布式数据库系统崩溃协调器事务恢复实例设计
Pub Date : 2012-10-01 DOI: 10.1109/WICT.2012.6409169
D. Ramesh, K. Kumar, B. Ramji
In a distributed database environment, when the coordinator site (root node or process) is not working, the environment needs to choose or elect a new one in order to perform the transactional tasks. The elected coordinator takes the lead to perform the activities as well and continues the functioning. If the previous (crashed) site is recovered from the failures then again it leads the system by taking the responsibility. In this paper, a recovery instance based on bi-directional ring election algorithm for the crashed coordinator was brought up. The new algorithm for the recovered site quickly brings the state back by sending messages in parallel instances. This work shows that how the algorithm makes the recovered site faster and takes less time to make the system quickly to handle transactions normally.
在分布式数据库环境中,当协调器站点(根节点或进程)不工作时,环境需要选择或选择一个新的协调器来执行事务性任务。当选的协调员也带头执行活动并继续发挥作用。如果以前的(崩溃的)站点从故障中恢复,那么它将再次承担责任,从而领导系统。提出了一种基于双向环选举算法的崩溃协调器恢复实例。用于恢复站点的新算法通过在并行实例中发送消息来快速恢复状态。这项工作表明,该算法如何使恢复的站点更快,花费更少的时间,使系统快速正常处理事务。
{"title":"Design of a transaction recovery instance based on bi-directional ring election algorithm for crashed coordinator in distributed database systems","authors":"D. Ramesh, K. Kumar, B. Ramji","doi":"10.1109/WICT.2012.6409169","DOIUrl":"https://doi.org/10.1109/WICT.2012.6409169","url":null,"abstract":"In a distributed database environment, when the coordinator site (root node or process) is not working, the environment needs to choose or elect a new one in order to perform the transactional tasks. The elected coordinator takes the lead to perform the activities as well and continues the functioning. If the previous (crashed) site is recovered from the failures then again it leads the system by taking the responsibility. In this paper, a recovery instance based on bi-directional ring election algorithm for the crashed coordinator was brought up. The new algorithm for the recovered site quickly brings the state back by sending messages in parallel instances. This work shows that how the algorithm makes the recovered site faster and takes less time to make the system quickly to handle transactions normally.","PeriodicalId":445333,"journal":{"name":"2012 World Congress on Information and Communication Technologies","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116861914","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Tumor demarcation by VQ based clustering and augmentation with KMCG and KFCG codebook generation algorithms 基于VQ的聚类和KMCG和KFCG码本生成算法增强的肿瘤划分
Pub Date : 2012-10-01 DOI: 10.1109/WICT.2012.6409219
H. B. Kekre, P. Shrinath
Ultrasound (US) imaging is important modality to examine the clinical problems and also used as complimentary to the mammogram images to understand nature and shape of the breast tumor. Accurate and efficient segmentation method helps radiologists to understand and observe the volume of a tumor (growth or shrinkage). Inherent artifact present in US images, such as speckle, attenuation and shadows are major hurdles in achieving proper segmentation. Along with the accuracy, computational efficiency is also major concern in the segmentation process. Here, in this paper, VQ based clustering technique is proposed for US image segmentation with KMCG and KFCG as codebook generation algorithms. A novel technique of sequential cluster clubbing is used on clusters obtained from codebook generation algorithms and appropriate cluster has been selected as segmentation result. Besides original KMCG and KFCG, augmented KMCG and KFCG are also proposed for clustering with different block sizes. The results of all proposed methods are compared with each other and best result is selected based on two criteria's, one is computational efficiency and other is accuracy. Finally, best results amongst our methods are compared with results of original watershed and improved watershed transforms.
超声(US)成像是检查临床问题的重要方式,也用于补充乳房x光检查图像,以了解乳腺肿瘤的性质和形状。准确有效的分割方法有助于放射科医生了解和观察肿瘤的体积(生长或缩小)。美国图像中存在的固有伪影,如斑点、衰减和阴影是实现正确分割的主要障碍。在分割过程中,除了精度之外,计算效率也是一个重要的问题。本文以KMCG和KFCG作为码本生成算法,提出了基于VQ的聚类技术用于美国图像分割。对码本生成算法得到的聚类采用了一种新颖的序列聚类棒化技术,选取了合适的聚类作为分割结果。除了原始KMCG和KFCG外,还提出了增强KMCG和KFCG用于不同块大小的聚类。将所有方法的结果进行比较,并根据计算效率和精度两个标准选出最佳结果。最后,将各方法的最佳结果与原始流域变换和改进流域变换的结果进行了比较。
{"title":"Tumor demarcation by VQ based clustering and augmentation with KMCG and KFCG codebook generation algorithms","authors":"H. B. Kekre, P. Shrinath","doi":"10.1109/WICT.2012.6409219","DOIUrl":"https://doi.org/10.1109/WICT.2012.6409219","url":null,"abstract":"Ultrasound (US) imaging is important modality to examine the clinical problems and also used as complimentary to the mammogram images to understand nature and shape of the breast tumor. Accurate and efficient segmentation method helps radiologists to understand and observe the volume of a tumor (growth or shrinkage). Inherent artifact present in US images, such as speckle, attenuation and shadows are major hurdles in achieving proper segmentation. Along with the accuracy, computational efficiency is also major concern in the segmentation process. Here, in this paper, VQ based clustering technique is proposed for US image segmentation with KMCG and KFCG as codebook generation algorithms. A novel technique of sequential cluster clubbing is used on clusters obtained from codebook generation algorithms and appropriate cluster has been selected as segmentation result. Besides original KMCG and KFCG, augmented KMCG and KFCG are also proposed for clustering with different block sizes. The results of all proposed methods are compared with each other and best result is selected based on two criteria's, one is computational efficiency and other is accuracy. Finally, best results amongst our methods are compared with results of original watershed and improved watershed transforms.","PeriodicalId":445333,"journal":{"name":"2012 World Congress on Information and Communication Technologies","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122108984","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
DWT-DCT-SVD based intravascular ultrasound video watermarking 基于DWT-DCT-SVD的血管内超声视频水印
Pub Date : 2012-10-01 DOI: 10.1109/WICT.2012.6409079
N. Dey, P. Das, A. B. Roy, A. Das, S. S. Chaudhuri
Intravascular ultrasound (IVUS) is a medical imaging system, which uses a specially designed catheter equipped with a small ultrasound probing device at its distal end. This system allows the ultrasound signal to visualize the blood vessels from the inside and is capable of imaging the diseased vessels, measuring the dimension and composition of the plaque. IVUS is an efficient method for detecting various ischemie heart diseases. Presently considerable amount of work has been done in telemonitoring which involves the transmission of biomedicai signals through wireless media. Exchange of biomedicai signals amongst hospitals needs efficient and reliable transmission. Watermark is added "ownership" information in multimedia contents to prove authenticity, verify signal integrity, and achieve control over copy process. This paper proposes a novel session based blind watermarking method with secret key by embedding binary watermark images into IVUS video. The IVUS video is a sensitive diagnostic tool that is used to detect various cardio-vascular diseases by measuring and recording the anatomy of the heart and adjoined blood vessels in exquisite detail. The various anatomical minutiae of the heart and blood vessels are important characteristics which correspond to many severe human cardiac diseases. In this present work the entire video of IVUS is split into frames and application of Discrete Wavelet Transformation (DWT), Discrete Cosine Transformation (DCT) followed by Singular Value Decomposition (SVD) composes the watermark embedding technique. Watermark extraction is achieved by applying inverse DWT, inverse DCT and SVD. In this approach the generated peak signal to noise ratio (PSNR) of the original IVUS video signal vs. watermarked signal and the correlation value of the original watermark image and the extracted watermark image have a high acceptable level of imperceptibility and distortion.
血管内超声(IVUS)是一种医学成像系统,它使用一种特殊设计的导管,在其远端装有小型超声探测装置。该系统允许超声信号从内部可视化血管,并能够成像病变血管,测量斑块的尺寸和组成。IVUS是检测各种缺血性心脏疾病的有效方法。目前在远程监测方面已经做了相当多的工作,其中涉及到通过无线媒体传输生物医学信号。医院间的生物医学信号交换需要高效、可靠的传输。水印是在多媒体内容中加入“所有权”信息来证明真实性,验证信号的完整性,实现对拷贝过程的控制。通过在IVUS视频中嵌入二值水印图像,提出了一种基于会话的密钥盲水印方法。IVUS视频是一种灵敏的诊断工具,用于检测各种心血管疾病,通过测量和记录心脏和邻近血管的解剖结构的精细细节。心脏和血管的各种解剖细节是与许多严重的人类心脏病相对应的重要特征。在本研究中,将整个IVUS视频分割成帧,应用离散小波变换(DWT)、离散余弦变换(DCT)和奇异值分解(SVD)构成水印嵌入技术。水印提取是通过逆DWT、逆DCT和奇异值分解来实现的。该方法生成的原始IVUS视频信号与水印信号的峰值信噪比(PSNR)以及原始水印图像与提取的水印图像的相关值具有较高的可接受的不可感知性和失真程度。
{"title":"DWT-DCT-SVD based intravascular ultrasound video watermarking","authors":"N. Dey, P. Das, A. B. Roy, A. Das, S. S. Chaudhuri","doi":"10.1109/WICT.2012.6409079","DOIUrl":"https://doi.org/10.1109/WICT.2012.6409079","url":null,"abstract":"Intravascular ultrasound (IVUS) is a medical imaging system, which uses a specially designed catheter equipped with a small ultrasound probing device at its distal end. This system allows the ultrasound signal to visualize the blood vessels from the inside and is capable of imaging the diseased vessels, measuring the dimension and composition of the plaque. IVUS is an efficient method for detecting various ischemie heart diseases. Presently considerable amount of work has been done in telemonitoring which involves the transmission of biomedicai signals through wireless media. Exchange of biomedicai signals amongst hospitals needs efficient and reliable transmission. Watermark is added \"ownership\" information in multimedia contents to prove authenticity, verify signal integrity, and achieve control over copy process. This paper proposes a novel session based blind watermarking method with secret key by embedding binary watermark images into IVUS video. The IVUS video is a sensitive diagnostic tool that is used to detect various cardio-vascular diseases by measuring and recording the anatomy of the heart and adjoined blood vessels in exquisite detail. The various anatomical minutiae of the heart and blood vessels are important characteristics which correspond to many severe human cardiac diseases. In this present work the entire video of IVUS is split into frames and application of Discrete Wavelet Transformation (DWT), Discrete Cosine Transformation (DCT) followed by Singular Value Decomposition (SVD) composes the watermark embedding technique. Watermark extraction is achieved by applying inverse DWT, inverse DCT and SVD. In this approach the generated peak signal to noise ratio (PSNR) of the original IVUS video signal vs. watermarked signal and the correlation value of the original watermark image and the extracted watermark image have a high acceptable level of imperceptibility and distortion.","PeriodicalId":445333,"journal":{"name":"2012 World Congress on Information and Communication Technologies","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128689552","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 59
Chakra: A new approach for symmetric key encryption 查克拉:对称密钥加密的新方法
Pub Date : 2012-10-01 DOI: 10.1109/WICT.2012.6409170
P. R. Kumar, S. S. Dhenakaran, K. Sailaja, P. Saikishore
Encryption is an art of protecting data that win wars, protect properties and personal information if performed properly. It ensures that the appropriate data is exchanged between the intended persons only; even if the eavesdroppers get the content of the data they should not be able to understand it. Chakra Algorithm is a symmetric key encryption technique. It is a process of encrypting the data with the concepts of Cartesian Co-ordinate Geometry andcircle generation. The process considers the translation and rotation of axis when the data is grouped into circles each circle holds the portion of data. The Cartesian axis will be migrated to the respective centerscircles and rotated by certain angle. The collection of angle with which each individual circle is rotated; the co-ordinates to which it is swapped, the size of the square grid the radius of the circle hold the symmetric key. Unlike the other current algorithms, in Chakra Algorithm we will not directly change the data instead location of data.
加密是一种保护数据的艺术,如果执行得当,可以赢得战争,保护财产和个人信息。确保只在预期的人员之间交换适当的数据;即使窃听者得到了数据的内容,他们也不应该能够理解它。脉轮算法是一种对称密钥加密技术。它是用笛卡尔坐标几何和圆生成的概念对数据进行加密的过程。当数据分组成圆时,该过程考虑轴的平移和旋转,每个圆保存部分数据。笛卡尔轴将被迁移到各自的圆心上并旋转一定角度。旋转角度:每个圆旋转时的角度集合;交换到的坐标,正方形网格的大小圆的半径都是对称密钥。与其他当前的算法不同,在脉轮算法中,我们不会直接改变数据,而是改变数据的位置。
{"title":"Chakra: A new approach for symmetric key encryption","authors":"P. R. Kumar, S. S. Dhenakaran, K. Sailaja, P. Saikishore","doi":"10.1109/WICT.2012.6409170","DOIUrl":"https://doi.org/10.1109/WICT.2012.6409170","url":null,"abstract":"Encryption is an art of protecting data that win wars, protect properties and personal information if performed properly. It ensures that the appropriate data is exchanged between the intended persons only; even if the eavesdroppers get the content of the data they should not be able to understand it. Chakra Algorithm is a symmetric key encryption technique. It is a process of encrypting the data with the concepts of Cartesian Co-ordinate Geometry andcircle generation. The process considers the translation and rotation of axis when the data is grouped into circles each circle holds the portion of data. The Cartesian axis will be migrated to the respective centerscircles and rotated by certain angle. The collection of angle with which each individual circle is rotated; the co-ordinates to which it is swapped, the size of the square grid the radius of the circle hold the symmetric key. Unlike the other current algorithms, in Chakra Algorithm we will not directly change the data instead location of data.","PeriodicalId":445333,"journal":{"name":"2012 World Congress on Information and Communication Technologies","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129799831","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
期刊
2012 World Congress on Information and Communication Technologies
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1