首页 > 最新文献

2016 IEEE International Conference on Recent Trends in Electronics, Information & Communication Technology (RTEICT)最新文献

英文 中文
A swarm intelligence technique to enhance network lifetime in WSN 一种提高无线传感器网络生存期的群体智能技术
K. A. Sharada, Siddaraju
A Wireless Sensor Network (WSN) is a field of interest for researchers due to its monitoring capability and giving the information which helps in predicting the future scenarios like in health care system, monitoring or tracking etc. Sensor nodes are very small and powerful devices which are continuously sense the data and send it to the base station (Sink) which generates the results based on the details received from sensor nodes. Sensor nodes are battery constrained, they use a lot of energy for transmitting the data and die very quickly. To save the energy of sensor node and make WSN more reliable here authors proposed a clustering mechanism. In clustering mechanism large network divided into small clusters. Each cluster has its own cluster head, cluster members communicate with cluster head and cluster head collects all the data from cluster members and send it to the base station. For cluster formation a noble concept is given called adaptive swarm optimization, here authors worked on best previous position and best global position of nodes. Nodes can changes their position as per their best global position from the previous position and based on this lifetime of overall network can be increased. Nodes death rate is decreased as compared with the existing method.
无线传感器网络(WSN)是研究人员感兴趣的领域,因为它的监测能力和提供的信息有助于预测未来的场景,如在医疗保健系统,监测或跟踪等。传感器节点是非常小而功能强大的设备,它不断地感知数据并将其发送到基站(Sink),基站根据从传感器节点接收到的详细信息生成结果。传感器节点受到电池的限制,它们使用大量的能量来传输数据,并且很快就会死亡。为了节省传感器节点的能量,提高无线传感器网络的可靠性,本文提出了一种聚类机制。在集群机制中,大的网络被分成小的集群。每个集群都有自己的集群头,集群成员与集群头通信,集群头收集来自集群成员的所有数据并将其发送到基站。对于集群的形成,提出了一个崇高的概念,称为自适应群优化,这里作者研究了节点的最佳先前位置和最佳全局位置。节点可以根据自己的最佳全局位置改变自己的位置,并在此基础上增加整个网络的生命周期。与现有方法相比,降低了节点死亡率。
{"title":"A swarm intelligence technique to enhance network lifetime in WSN","authors":"K. A. Sharada, Siddaraju","doi":"10.1109/RTEICT.2016.7808093","DOIUrl":"https://doi.org/10.1109/RTEICT.2016.7808093","url":null,"abstract":"A Wireless Sensor Network (WSN) is a field of interest for researchers due to its monitoring capability and giving the information which helps in predicting the future scenarios like in health care system, monitoring or tracking etc. Sensor nodes are very small and powerful devices which are continuously sense the data and send it to the base station (Sink) which generates the results based on the details received from sensor nodes. Sensor nodes are battery constrained, they use a lot of energy for transmitting the data and die very quickly. To save the energy of sensor node and make WSN more reliable here authors proposed a clustering mechanism. In clustering mechanism large network divided into small clusters. Each cluster has its own cluster head, cluster members communicate with cluster head and cluster head collects all the data from cluster members and send it to the base station. For cluster formation a noble concept is given called adaptive swarm optimization, here authors worked on best previous position and best global position of nodes. Nodes can changes their position as per their best global position from the previous position and based on this lifetime of overall network can be increased. Nodes death rate is decreased as compared with the existing method.","PeriodicalId":6527,"journal":{"name":"2016 IEEE International Conference on Recent Trends in Electronics, Information & Communication Technology (RTEICT)","volume":"135 1","pages":"1554-1557"},"PeriodicalIF":0.0,"publicationDate":"2016-05-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79584130","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design and implementation of Izhikevich spiking neuron model on FPGA Izhikevich脉冲神经元模型在FPGA上的设计与实现
S. Murali, J. Kumar, Jayanth Kumar, R. Bhakthavatchalu
The elementary processing units in brain are neurons which are connected to each other in many shapes and sizes. A typical neuron can be divided into functionally three distinct parts called Dendrites, Soma and Axon. Dendrites play the role of input device that collect signals from other neurons and transmits them to soma. Soma performs a Non-linear operation, i.e. if input exceeds a certain threshold, an output signal is generated. This output signal is taken over by an output device, the Axon, which delivers the signal to other neurons. This is the basic function of a biological neuron. A biological neuron model which is also known as Spiking Neuron Model is a mathematical description of properties of neuron that is to be designed accurately to describe and predict the biological processes. So there comes the concept of modelling and analysis of neurons. Modelling and analysis of neurons was performed by different researchers on First, Second and Third generation of neurons. The Third generation of neurons are also called as spiking neurons. The focus of this work is to present different types of spiking neurons developed by Izhikevich which mathematically supports the properties and resembles the biological neuron. These mathematical model simulations are done in MATLAB. These spiking neurons are modelled using digital logic circuits in Verilog Hardware Description Language (HDL) and simulated in ModelSIM RTL simulator. The design is then implemented in Xilinx FPGA and checked for the functionality.
大脑的基本处理单元是神经元,它们以各种形状和大小相互连接。一个典型的神经元在功能上可以分为三个不同的部分,分别是树突、体细胞和轴突。树突扮演输入装置的角色,收集来自其他神经元的信号并将其传递给躯体。Soma执行非线性操作,即如果输入超过某个阈值,则产生输出信号。输出信号由输出装置轴突接收,轴突将信号传递给其他神经元。这是生物神经元的基本功能。生物神经元模型又称脉冲神经元模型,是对神经元特性的数学描述,用以准确地描述和预测生物过程。于是就有了神经元建模和分析的概念。不同的研究者对第一代、第二代和第三代神经元进行了建模和分析。第三代神经元也被称为尖峰神经元。这项工作的重点是展示由Izhikevich开发的不同类型的尖峰神经元,这些神经元在数学上支持这些特性并与生物神经元相似。这些数学模型的仿真是在MATLAB中完成的。这些尖峰神经元使用Verilog硬件描述语言(HDL)中的数字逻辑电路建模,并在ModelSIM RTL模拟器中进行仿真。然后在Xilinx FPGA中实现该设计并检查其功能。
{"title":"Design and implementation of Izhikevich spiking neuron model on FPGA","authors":"S. Murali, J. Kumar, Jayanth Kumar, R. Bhakthavatchalu","doi":"10.1109/RTEICT.2016.7807968","DOIUrl":"https://doi.org/10.1109/RTEICT.2016.7807968","url":null,"abstract":"The elementary processing units in brain are neurons which are connected to each other in many shapes and sizes. A typical neuron can be divided into functionally three distinct parts called Dendrites, Soma and Axon. Dendrites play the role of input device that collect signals from other neurons and transmits them to soma. Soma performs a Non-linear operation, i.e. if input exceeds a certain threshold, an output signal is generated. This output signal is taken over by an output device, the Axon, which delivers the signal to other neurons. This is the basic function of a biological neuron. A biological neuron model which is also known as Spiking Neuron Model is a mathematical description of properties of neuron that is to be designed accurately to describe and predict the biological processes. So there comes the concept of modelling and analysis of neurons. Modelling and analysis of neurons was performed by different researchers on First, Second and Third generation of neurons. The Third generation of neurons are also called as spiking neurons. The focus of this work is to present different types of spiking neurons developed by Izhikevich which mathematically supports the properties and resembles the biological neuron. These mathematical model simulations are done in MATLAB. These spiking neurons are modelled using digital logic circuits in Verilog Hardware Description Language (HDL) and simulated in ModelSIM RTL simulator. The design is then implemented in Xilinx FPGA and checked for the functionality.","PeriodicalId":6527,"journal":{"name":"2016 IEEE International Conference on Recent Trends in Electronics, Information & Communication Technology (RTEICT)","volume":"1 1","pages":"946-951"},"PeriodicalIF":0.0,"publicationDate":"2016-05-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78212240","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Performance enhancement of OFDM system by reducing PAPR using DFT spreading technique 利用DFT扩频技术降低PAPR提高OFDM系统性能
Utpal Das, Silpa Das, Satyam Kumar, Y. Kumar, Seema Singh, D. Nayak
Orthogonal Frequency-Division Multiple Access (OFDMA) and Single Carrier Frequency-Division Multiple Access (SC-FDMA) schemes are major part of Long Term Evolution (LTE). OFDM is more widely used technique due to its robustness against frequency selective fading channels. However, it suffers from a high Peak-to-Average Power Ratio (PAPR). In this paper, Discrete Fourier Transform (DFT) spreading technique has been proposed to improve the performance of OFDMA system by reduction of PAPR. OFDMA and SC-FDMA system has been investigated using different modulation schemes on the basis of PAPR and Bit Error Rate (BER). The results of proposed system show satisfactory improvement in system performance over OFDMA.
正交频分多址(OFDMA)和单载波频分多址(SC-FDMA)是长期演进(LTE)技术的主要组成部分。OFDM技术由于其对频率选择性衰落信道的鲁棒性而得到了广泛的应用。然而,它的峰值平均功率比(PAPR)很高。本文提出了离散傅立叶变换(DFT)扩频技术,通过降低PAPR来提高OFDMA系统的性能。基于PAPR和误码率(BER),研究了OFDMA和SC-FDMA系统采用不同的调制方案。结果表明,与OFDMA相比,系统性能有了令人满意的提高。
{"title":"Performance enhancement of OFDM system by reducing PAPR using DFT spreading technique","authors":"Utpal Das, Silpa Das, Satyam Kumar, Y. Kumar, Seema Singh, D. Nayak","doi":"10.1109/RTEICT.2016.7807955","DOIUrl":"https://doi.org/10.1109/RTEICT.2016.7807955","url":null,"abstract":"Orthogonal Frequency-Division Multiple Access (OFDMA) and Single Carrier Frequency-Division Multiple Access (SC-FDMA) schemes are major part of Long Term Evolution (LTE). OFDM is more widely used technique due to its robustness against frequency selective fading channels. However, it suffers from a high Peak-to-Average Power Ratio (PAPR). In this paper, Discrete Fourier Transform (DFT) spreading technique has been proposed to improve the performance of OFDMA system by reduction of PAPR. OFDMA and SC-FDMA system has been investigated using different modulation schemes on the basis of PAPR and Bit Error Rate (BER). The results of proposed system show satisfactory improvement in system performance over OFDMA.","PeriodicalId":6527,"journal":{"name":"2016 IEEE International Conference on Recent Trends in Electronics, Information & Communication Technology (RTEICT)","volume":"222 1","pages":"886-887"},"PeriodicalIF":0.0,"publicationDate":"2016-05-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75633998","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Fractional-order filter design for ultra-low frequency applications 分数阶滤波器设计,用于超低频率应用
M. R. Dar, N. A. Kant, F. A. Khanday, C. Psychalinos
The paper presents a novel scheme to implement fractional-order filters for ultra-low frequency applications. The scheme is based on the intrinsic property of the fractional-order filters that the pole frequency can be scaled down to sub-hertz by employing the order if the normal pole frequency of the filter is designed slightly less than one. This is in contrast to the scaling techniques employed in low-frequency integer-order filters where the impedance is scaled to decrease the overall capacitance required for low-frequency design. The functioning of the scheme has been demonstrated by an OTA-based low-pass filter example implemented with 0.35μm technology node at ± 1.2V supply voltage.
本文提出了一种用于超低频应用的分数阶滤波器的新方案。该方案是基于分数阶滤波器的固有特性,即如果设计的滤波器的正极频率略小于1,则利用该阶可以将极频率降至亚赫兹。这与低频整阶滤波器中采用的缩放技术形成对比,在低频滤波器中,阻抗被缩放以降低低频设计所需的总电容。在±1.2V电源电压下,采用0.35μm技术节点实现了一个基于ota的低通滤波器实例,验证了该方案的有效性。
{"title":"Fractional-order filter design for ultra-low frequency applications","authors":"M. R. Dar, N. A. Kant, F. A. Khanday, C. Psychalinos","doi":"10.1109/RTEICT.2016.7808129","DOIUrl":"https://doi.org/10.1109/RTEICT.2016.7808129","url":null,"abstract":"The paper presents a novel scheme to implement fractional-order filters for ultra-low frequency applications. The scheme is based on the intrinsic property of the fractional-order filters that the pole frequency can be scaled down to sub-hertz by employing the order if the normal pole frequency of the filter is designed slightly less than one. This is in contrast to the scaling techniques employed in low-frequency integer-order filters where the impedance is scaled to decrease the overall capacitance required for low-frequency design. The functioning of the scheme has been demonstrated by an OTA-based low-pass filter example implemented with 0.35μm technology node at ± 1.2V supply voltage.","PeriodicalId":6527,"journal":{"name":"2016 IEEE International Conference on Recent Trends in Electronics, Information & Communication Technology (RTEICT)","volume":"9 1","pages":"1727-1730"},"PeriodicalIF":0.0,"publicationDate":"2016-05-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73151805","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
An efficient mobile sink path selection approach for WSN's 一种有效的无线传感器网络移动汇聚路径选择方法
H. Pavithra, Shivashankar, G. Poornima
With the quick advancement of the Internet, wireless communications have gotten remarkable consideration. Wireless sensor systems are outfitted with minor, essential batteries and along these lines it is important to plan vitality effective calculations to draw out the system lifetime. In remote sensor systems (WSNs), the sink versatility along an obliged mode can enhance the vitality proficiency. Sink mobility is an imperative method to enhance sensor system execution including vitality utilization, end-to-end delay and lifetime. To manage the above issues researches introduced a Rendezvous design technique, where some sensor nodes are selected as an RP's and the nodes which are not RP's will forward data to the nearest RP's. The major issue in this design is to find the set of RP's and determine the tour that visits these RP's. To overcome this issue in this paper we proposed an algorithm called as an " Weighted Rendezvous Planning(WRP)", where each node is provided with some weight based on the number of packets that it sends and the nearest hop distance. The simulation is performed using NS2 simulator and we compared the WRP with the existing approach with the energy consumption and network lifetime of sensor nodes.
随着互联网的飞速发展,无线通信得到了人们的广泛关注。无线传感器系统配备了小型的、必不可少的电池,沿着这些路线,规划有效的生命力计算来绘制系统寿命是很重要的。在遥感系统中,基于有义务模式的sink通用性可以提高系统的生命力。Sink移动是提高传感器系统执行力的必要方法,包括生命力利用率、端到端延迟和寿命。为了解决上述问题,研究人员引入了一种交会设计技术,其中选择一些传感器节点作为RP节点,而非RP节点将数据转发到最近的RP节点。本设计的主要问题是找到RP集合并确定访问这些RP的行程。为了克服这个问题,本文提出了一种称为“加权交会规划(WRP)”的算法,其中每个节点根据其发送的数据包数量和最近的跳距离提供一些权重。利用NS2仿真器进行了仿真,比较了WRP与现有方法在传感器节点能耗和网络寿命方面的差异。
{"title":"An efficient mobile sink path selection approach for WSN's","authors":"H. Pavithra, Shivashankar, G. Poornima","doi":"10.1109/RTEICT.2016.7807802","DOIUrl":"https://doi.org/10.1109/RTEICT.2016.7807802","url":null,"abstract":"With the quick advancement of the Internet, wireless communications have gotten remarkable consideration. Wireless sensor systems are outfitted with minor, essential batteries and along these lines it is important to plan vitality effective calculations to draw out the system lifetime. In remote sensor systems (WSNs), the sink versatility along an obliged mode can enhance the vitality proficiency. Sink mobility is an imperative method to enhance sensor system execution including vitality utilization, end-to-end delay and lifetime. To manage the above issues researches introduced a Rendezvous design technique, where some sensor nodes are selected as an RP's and the nodes which are not RP's will forward data to the nearest RP's. The major issue in this design is to find the set of RP's and determine the tour that visits these RP's. To overcome this issue in this paper we proposed an algorithm called as an \" Weighted Rendezvous Planning(WRP)\", where each node is provided with some weight based on the number of packets that it sends and the nearest hop distance. The simulation is performed using NS2 simulator and we compared the WRP with the existing approach with the energy consumption and network lifetime of sensor nodes.","PeriodicalId":6527,"journal":{"name":"2016 IEEE International Conference on Recent Trends in Electronics, Information & Communication Technology (RTEICT)","volume":"142 1","pages":"151-155"},"PeriodicalIF":0.0,"publicationDate":"2016-05-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73276039","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Detection and prevention of ARP poisoning in dynamic IP configuration 动态IP配置中ARP中毒的检测和预防
D. Raviya Rupal, Dhaval Satasiya, H. Kumar, Archit Agrawal
Nowadays security is a major concern. Address resolution Protocol (ARP) is a most popular communication protocol in the LAN. ARP is mapping from IP address (32 bits) into MAC address (48 bits). ARP has some limitations like lack of states and authentication. So attacker can exploit these vulnerabilities and gain unauthorized access to one's sensitive data. There are some attacks against ARP like MAC Spoofing, MAC duplicating, Man-in-the-middle (MITM) and denial of services (DOS). So efficient and secure scheme is provided which prevents ARP attacks. This paper demonstrates a utility which gives users the authentication as well as detection and prevention of ARP poisoning in dynamic IP configuration. Utility provides a mechanism which is based on internet control management protocol (ICMP) which uses secondary cache for checking pair entry of IP-MAC respective the system in the network.
如今,安全是一个主要问题。地址解析协议(ARP)是局域网中最常用的通信协议。ARP是从IP地址(32位)映射到MAC地址(48位)。ARP有一些限制,如缺乏状态和身份验证。因此,攻击者可以利用这些漏洞并获得对敏感数据的未经授权访问。针对ARP的攻击有MAC欺骗、MAC复制、中间人攻击(MITM)和拒绝服务(DOS)等。从而提供了有效、安全的防止ARP攻击的方案。本文介绍了一个在动态IP配置中对ARP中毒进行认证、检测和预防的实用程序。实用程序提供了一种基于因特网控制管理协议(ICMP)的机制,该机制使用二级缓存来检查网络中各个系统的IP-MAC对条目。
{"title":"Detection and prevention of ARP poisoning in dynamic IP configuration","authors":"D. Raviya Rupal, Dhaval Satasiya, H. Kumar, Archit Agrawal","doi":"10.1109/RTEICT.2016.7808030","DOIUrl":"https://doi.org/10.1109/RTEICT.2016.7808030","url":null,"abstract":"Nowadays security is a major concern. Address resolution Protocol (ARP) is a most popular communication protocol in the LAN. ARP is mapping from IP address (32 bits) into MAC address (48 bits). ARP has some limitations like lack of states and authentication. So attacker can exploit these vulnerabilities and gain unauthorized access to one's sensitive data. There are some attacks against ARP like MAC Spoofing, MAC duplicating, Man-in-the-middle (MITM) and denial of services (DOS). So efficient and secure scheme is provided which prevents ARP attacks. This paper demonstrates a utility which gives users the authentication as well as detection and prevention of ARP poisoning in dynamic IP configuration. Utility provides a mechanism which is based on internet control management protocol (ICMP) which uses secondary cache for checking pair entry of IP-MAC respective the system in the network.","PeriodicalId":6527,"journal":{"name":"2016 IEEE International Conference on Recent Trends in Electronics, Information & Communication Technology (RTEICT)","volume":"35 1","pages":"1240-1244"},"PeriodicalIF":0.0,"publicationDate":"2016-05-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82516727","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Novel design of fast and compact SHA-1 algorithm for security applications 为安全应用设计了快速、紧凑的SHA-1算法
Ritu Kaur Makkad, A. Sahu
In this work, a novel architecture of Secure Hash Algorithm-1(SHA-1) for increased throughput and reduced area is presented. Various acceleration techniques are applied such as pre-computation, loop unfolding, and pipelining simultaneously. Carry Save Adder using Carry Lookahead Adder in its final stage is used for multi-input addition function to achieve high performance. The proposed architecture is designed using VHDL language. The synthesis and simulation work is performed in Xilinx ISE Design Suite 13.2 tool. The present implementation of SHA-1 offers better results as compared to previous works.
在这项工作中,提出了一种新的安全哈希算法-1(SHA-1)架构,用于增加吞吐量和减少面积。同时应用了各种加速技术,如预计算、循环展开和流水线。进位保存加法器在其最后阶段使用进位前瞻加法器,用于多输入加法功能,以达到高性能。该体系结构采用VHDL语言设计。合成和仿真工作在Xilinx ISE Design Suite 13.2工具中进行。与以前的工作相比,目前的SHA-1实现提供了更好的结果。
{"title":"Novel design of fast and compact SHA-1 algorithm for security applications","authors":"Ritu Kaur Makkad, A. Sahu","doi":"10.1109/RTEICT.2016.7807963","DOIUrl":"https://doi.org/10.1109/RTEICT.2016.7807963","url":null,"abstract":"In this work, a novel architecture of Secure Hash Algorithm-1(SHA-1) for increased throughput and reduced area is presented. Various acceleration techniques are applied such as pre-computation, loop unfolding, and pipelining simultaneously. Carry Save Adder using Carry Lookahead Adder in its final stage is used for multi-input addition function to achieve high performance. The proposed architecture is designed using VHDL language. The synthesis and simulation work is performed in Xilinx ISE Design Suite 13.2 tool. The present implementation of SHA-1 offers better results as compared to previous works.","PeriodicalId":6527,"journal":{"name":"2016 IEEE International Conference on Recent Trends in Electronics, Information & Communication Technology (RTEICT)","volume":"66 1","pages":"921-925"},"PeriodicalIF":0.0,"publicationDate":"2016-05-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91084579","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Classification of benign and malignant bone lesions on CT imagesusing support vector machine: A comparison of kernel functions 基于支持向量机的CT图像良恶性骨病变分类:核函数的比较
Rishav Kumar, M. Suhas
Skeletal metastasis has tendency to develop from any kind of primary tumor. In the spine, the vertebral body is the most common site of metastasis which then extends to pedicle. About 2/3rd of the malignant tumor cases are found to develop metastasis. This work presents a Computer Aided Diagnosis (CAD) system that helps radiologists in differentiating malignant and benign bone lesions in the spine on Computed Tomography (CT) images usingSupport Vector Machines(SVM). The CT images are segmented using Snakes or Active Contour Model to retrieve the Region of Interest(ROI). From the segmented images, Haralick features are calculated. These features are then passed to the SVM classifier. With the help of SVM model generated, the data are classified into benign and malignant nodules. The performances of different kernel functions are compared.
任何原发肿瘤都有发生骨转移的趋势。在脊柱中,椎体是最常见的转移部位,然后延伸到椎弓根。约2/3的恶性肿瘤发生转移。这项工作提出了一个计算机辅助诊断(CAD)系统,帮助放射科医生使用支持向量机(SVM)在计算机断层扫描(CT)图像上区分脊柱的恶性和良性骨病变。利用蛇形或活动轮廓模型对CT图像进行分割,提取感兴趣区域(ROI)。从分割后的图像中,计算出哈拉里克特征。然后将这些特征传递给SVM分类器。在生成的SVM模型的帮助下,将数据分为良性和恶性结节。比较了不同核函数的性能。
{"title":"Classification of benign and malignant bone lesions on CT imagesusing support vector machine: A comparison of kernel functions","authors":"Rishav Kumar, M. Suhas","doi":"10.1109/RTEICT.2016.7807941","DOIUrl":"https://doi.org/10.1109/RTEICT.2016.7807941","url":null,"abstract":"Skeletal metastasis has tendency to develop from any kind of primary tumor. In the spine, the vertebral body is the most common site of metastasis which then extends to pedicle. About 2/3rd of the malignant tumor cases are found to develop metastasis. This work presents a Computer Aided Diagnosis (CAD) system that helps radiologists in differentiating malignant and benign bone lesions in the spine on Computed Tomography (CT) images usingSupport Vector Machines(SVM). The CT images are segmented using Snakes or Active Contour Model to retrieve the Region of Interest(ROI). From the segmented images, Haralick features are calculated. These features are then passed to the SVM classifier. With the help of SVM model generated, the data are classified into benign and malignant nodules. The performances of different kernel functions are compared.","PeriodicalId":6527,"journal":{"name":"2016 IEEE International Conference on Recent Trends in Electronics, Information & Communication Technology (RTEICT)","volume":"47 1","pages":"821-824"},"PeriodicalIF":0.0,"publicationDate":"2016-05-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91257780","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Design and development of an IOT based wearable device for the safety and security of women and girl children 设计和开发基于物联网的可穿戴设备,以保障妇女和女童的安全
A. Jatti, M. Kannan, R M Alisha, P. Vijayalakshmi, Shrestha Sinha
The aim of this work is to develop a wearable device for the safety and protection of women and girls. This objective is achieved by the analysis of physiological signals in conjunction with body position. The physiological signals that are analyzed are galvanic skin resistance and body temperature. Body position is determined by acquiring raw accelerometer data from a triple axis accelerometer. Acquisition of raw data is then followed by activity recognition which is a process of employing a specialized machine learning algorithm. Real-time monitoring of data is achieved by wirelessly sending sensor data to an open source Cloud Platform. Analysis of the data is done on MATLAB simultaneously. This device is programmed to continuously monitor the subject's parameters and take action when any dangerous situation presents itself. It does so by detecting the change in the monitored signals, following which appropriate action is taken by means of sending notifications/alerts to designated individuals.
这项工作的目的是开发一种可穿戴设备,用于保护妇女和女孩的安全。这一目标是通过结合身体位置分析生理信号来实现的。所分析的生理信号是皮肤电电阻和体温。通过从三轴加速度计获取原始加速度计数据来确定身体位置。获取原始数据之后是活动识别,这是一个使用专门的机器学习算法的过程。通过将传感器数据无线发送到开源云平台,可以实现数据的实时监控。同时在MATLAB上对数据进行分析。这个装置被设定为持续监测受试者的参数,并在任何危险情况出现时采取行动。它通过检测监测信号的变化来做到这一点,然后采取适当的行动,向指定的个人发送通知/警报。
{"title":"Design and development of an IOT based wearable device for the safety and security of women and girl children","authors":"A. Jatti, M. Kannan, R M Alisha, P. Vijayalakshmi, Shrestha Sinha","doi":"10.1109/RTEICT.2016.7808003","DOIUrl":"https://doi.org/10.1109/RTEICT.2016.7808003","url":null,"abstract":"The aim of this work is to develop a wearable device for the safety and protection of women and girls. This objective is achieved by the analysis of physiological signals in conjunction with body position. The physiological signals that are analyzed are galvanic skin resistance and body temperature. Body position is determined by acquiring raw accelerometer data from a triple axis accelerometer. Acquisition of raw data is then followed by activity recognition which is a process of employing a specialized machine learning algorithm. Real-time monitoring of data is achieved by wirelessly sending sensor data to an open source Cloud Platform. Analysis of the data is done on MATLAB simultaneously. This device is programmed to continuously monitor the subject's parameters and take action when any dangerous situation presents itself. It does so by detecting the change in the monitored signals, following which appropriate action is taken by means of sending notifications/alerts to designated individuals.","PeriodicalId":6527,"journal":{"name":"2016 IEEE International Conference on Recent Trends in Electronics, Information & Communication Technology (RTEICT)","volume":"2021 1","pages":"1108-1112"},"PeriodicalIF":0.0,"publicationDate":"2016-05-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91317667","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 46
Passive copy-move forgery detection using SIFT, HOG and SURF features 被动复制移动伪造检测使用SIFT, HOG和SURF的特点
S. Prasad, B. Ramkumar
Copy-move is a common type of digital image forgery. In an image, Copy-Move tampering might be done to hide an undesirable region or to duplicate something in the image. These images might be used for the necessary purpose like evidence in the court of law. So, authenticity verification plays a vital role for digital images. In this paper, we compare the CMFD (Copy-Move Forgery Detection) using Image features like SIFT (Scale Invariant Features Transform), HOG (Histogram Oriented Gradient) and SURF (Speed-Up Robust Features) and hybrid features (SURF-HOG and SIFT-HOG). The comparison results show that CMFD using SIFT features provide better results as compared with SURF and HOG features. Also, considering hybrid features, SIFT-HOG and SURF-HOG produce better results for CMFD using SIFT, SURF or HOG alone.
复制移动是一种常见的数字图像伪造类型。在图像中,复制-移动篡改可能是为了隐藏不需要的区域或复制图像中的某些内容。这些图像可以用于必要的目的,如法庭上的证据。因此,对数字图像的真实性验证起着至关重要的作用。在本文中,我们比较了使用SIFT(比例不变特征变换),HOG(直方图导向梯度)和SURF(加速鲁棒特征)等图像特征和混合特征(SURF-HOG和SIFT-HOG)的CMFD(复制-移动伪造检测)。对比结果表明,与SURF和HOG特征相比,使用SIFT特征的CMFD效果更好。此外,考虑到混合特性,SIFT-HOG和SURF-HOG单独使用SIFT、SURF或HOG可以产生更好的CMFD结果。
{"title":"Passive copy-move forgery detection using SIFT, HOG and SURF features","authors":"S. Prasad, B. Ramkumar","doi":"10.1109/RTEICT.2016.7807915","DOIUrl":"https://doi.org/10.1109/RTEICT.2016.7807915","url":null,"abstract":"Copy-move is a common type of digital image forgery. In an image, Copy-Move tampering might be done to hide an undesirable region or to duplicate something in the image. These images might be used for the necessary purpose like evidence in the court of law. So, authenticity verification plays a vital role for digital images. In this paper, we compare the CMFD (Copy-Move Forgery Detection) using Image features like SIFT (Scale Invariant Features Transform), HOG (Histogram Oriented Gradient) and SURF (Speed-Up Robust Features) and hybrid features (SURF-HOG and SIFT-HOG). The comparison results show that CMFD using SIFT features provide better results as compared with SURF and HOG features. Also, considering hybrid features, SIFT-HOG and SURF-HOG produce better results for CMFD using SIFT, SURF or HOG alone.","PeriodicalId":6527,"journal":{"name":"2016 IEEE International Conference on Recent Trends in Electronics, Information & Communication Technology (RTEICT)","volume":"30 1","pages":"706-710"},"PeriodicalIF":0.0,"publicationDate":"2016-05-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83119182","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
期刊
2016 IEEE International Conference on Recent Trends in Electronics, Information & Communication Technology (RTEICT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1