Pub Date : 2018-03-01DOI: 10.1109/WISPNET.2018.8538684
V. Kumar, Shakrajit Sahu, S. Das
In recent years, a rapid growth of new technologies requires communication systems to support higher bit rate and longer distance. The Optical network is one of the best optimal solutions which can satisfy the demand for high data rate. The performance of current optical networks depends on the traffic demands. To minimize the traffic mixed line rate (MLR) optical network is implemented. In a transparent MLR optical network, data transmission is done over different wavelength at different line rates within the same fiber. MLR optical networks with data rate 10/40/100 Gb/s over different wavelength channels is a new networking paradigm. This paper considers various modulation techniques in order to achieve better bit error rates (BER). It also shows that modulation technique has a great role in improving the data rates and quality of transmission.
{"title":"Performance Analysis for Mixed Line Rates (MLR) WDM/DWDM Networks Under Various Modulation Techniques","authors":"V. Kumar, Shakrajit Sahu, S. Das","doi":"10.1109/WISPNET.2018.8538684","DOIUrl":"https://doi.org/10.1109/WISPNET.2018.8538684","url":null,"abstract":"In recent years, a rapid growth of new technologies requires communication systems to support higher bit rate and longer distance. The Optical network is one of the best optimal solutions which can satisfy the demand for high data rate. The performance of current optical networks depends on the traffic demands. To minimize the traffic mixed line rate (MLR) optical network is implemented. In a transparent MLR optical network, data transmission is done over different wavelength at different line rates within the same fiber. MLR optical networks with data rate 10/40/100 Gb/s over different wavelength channels is a new networking paradigm. This paper considers various modulation techniques in order to achieve better bit error rates (BER). It also shows that modulation technique has a great role in improving the data rates and quality of transmission.","PeriodicalId":6858,"journal":{"name":"2018 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET)","volume":"20 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2018-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81423220","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-03-01DOI: 10.1109/WISPNET.2018.8538615
Soumayan Dutta, Pradipta Sasmal, M. Bhuyan, Y. Iwahori
Automatic segmentation of colorectal polyps from endoscopic images forms an interesting challenge in computer vision. The method proposed in this paper intends to segment colorectal polyp (abnormal) regions from normal regions from a given endoscopic image. Due to lack of any regular texture patterns in this kind of images and apparent visual similarity in background and foreground pixels, conventional texture feature extraction and classification methods do not always yield good results. Hence, active contour based method has been explored to automatically segment out probable abnormal region(s). Our aim is to automatically detect the probable polyp region(s) and then verify the results with respect to the ground truth. Due to lack of very definitive edge criteria along the boundaries of a polyp, we used “active contour without edges” instead of classical active contour.
{"title":"Automatic Segmentation of Polyps in Endoscopic Image Using Level-Set Formulation","authors":"Soumayan Dutta, Pradipta Sasmal, M. Bhuyan, Y. Iwahori","doi":"10.1109/WISPNET.2018.8538615","DOIUrl":"https://doi.org/10.1109/WISPNET.2018.8538615","url":null,"abstract":"Automatic segmentation of colorectal polyps from endoscopic images forms an interesting challenge in computer vision. The method proposed in this paper intends to segment colorectal polyp (abnormal) regions from normal regions from a given endoscopic image. Due to lack of any regular texture patterns in this kind of images and apparent visual similarity in background and foreground pixels, conventional texture feature extraction and classification methods do not always yield good results. Hence, active contour based method has been explored to automatically segment out probable abnormal region(s). Our aim is to automatically detect the probable polyp region(s) and then verify the results with respect to the ground truth. Due to lack of very definitive edge criteria along the boundaries of a polyp, we used “active contour without edges” instead of classical active contour.","PeriodicalId":6858,"journal":{"name":"2018 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET)","volume":"36 9 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2018-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90650173","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-03-01DOI: 10.1109/WISPNET.2018.8538708
Z. Youssef, Erfan Majeed, M. Mueck, Ingolf Karls, C. Drewes, G. Bruck, P. Jung
The federal communications commission (FCC) has addressed a three-tiered spectrum access system (SAS) in the so called innovation band (3.5 GHz) which foresees besides the priority access licenses (PAL) an unlicensed spectrum access as general authorized access (GAA). In this context, the SAS assigns the spectrum to the PAL and GAA systems which are citizens broadband radio service devices (CBSDs). Thus, the issue of finding a scheme that achieves an optimal spectrum access among the CBSDs and their nodes in term of maximizing the throughput is addressed. In this paper we present the design and results of a broadcast message termed reject request to send (RRTS) based on the IEEE 802.11 distributed coordination function (DCF) mechanisms for SAS with efficient spectrum access in respect to maximize the system throughput for GAA CBSDs in an unlicensed spectrum. The system improvement shows how the RRTS message can be used in a minimum intrusive way to enhance the system throughput compared with the state-ofthe-art (SoA) DCF scheme. Moreover, the suggested scheme is able to handle a large number of accessing nodes because our scheme is robust against the number of nodes which opens a new perspective for high connection density in a SAS context and beyond 5G.
{"title":"Performance Enhancement of the CSMA/CA MAC Mechanisms Using a Reject Request to Send (RRTS) Message for 3.5 GHz Shared Spectrum Systems","authors":"Z. Youssef, Erfan Majeed, M. Mueck, Ingolf Karls, C. Drewes, G. Bruck, P. Jung","doi":"10.1109/WISPNET.2018.8538708","DOIUrl":"https://doi.org/10.1109/WISPNET.2018.8538708","url":null,"abstract":"The federal communications commission (FCC) has addressed a three-tiered spectrum access system (SAS) in the so called innovation band (3.5 GHz) which foresees besides the priority access licenses (PAL) an unlicensed spectrum access as general authorized access (GAA). In this context, the SAS assigns the spectrum to the PAL and GAA systems which are citizens broadband radio service devices (CBSDs). Thus, the issue of finding a scheme that achieves an optimal spectrum access among the CBSDs and their nodes in term of maximizing the throughput is addressed. In this paper we present the design and results of a broadcast message termed reject request to send (RRTS) based on the IEEE 802.11 distributed coordination function (DCF) mechanisms for SAS with efficient spectrum access in respect to maximize the system throughput for GAA CBSDs in an unlicensed spectrum. The system improvement shows how the RRTS message can be used in a minimum intrusive way to enhance the system throughput compared with the state-ofthe-art (SoA) DCF scheme. Moreover, the suggested scheme is able to handle a large number of accessing nodes because our scheme is robust against the number of nodes which opens a new perspective for high connection density in a SAS context and beyond 5G.","PeriodicalId":6858,"journal":{"name":"2018 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET)","volume":"88 4 1","pages":"1-8"},"PeriodicalIF":0.0,"publicationDate":"2018-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89386985","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-03-01DOI: 10.1109/WISPNET.2018.8538555
Harikrishna Pillutla, Amuthan Arjunan
Nowadays, most of the world’s population has become much dependent on computers for banking, healthcare, shopping, and telecommunication. Security has now become a basic norm for computers and its resources since it has become inherently insecure. Security issues like Denial of Service attacks, TCP SYN Flooding attacks, Packet Dropping attacks and Distributed Denial of Service attacks are some of the methods by which unauthorized users make the resource unavailable to authorized users. There are several security mechanisms like Intrusion Detection System, Anomaly detection and Trust model by which we can be able to identify and counter the abuse of computer resources by unauthorized users. This paper presents a survey of several security mechanisms which have been implemented using Fuzzy logic. Fuzzy logic is one of the rapidly developing technologies, which is used in a sophisticated control system. Fuzzy logic deals with the degree of truth rather than the Boolean logic, which carries the values of either true or false. So instead of providing only two values, we will be able to define intermediate values.
{"title":"A Brief Review of Fuzzy Logic and Its Usage Towards Counter-Security Issues","authors":"Harikrishna Pillutla, Amuthan Arjunan","doi":"10.1109/WISPNET.2018.8538555","DOIUrl":"https://doi.org/10.1109/WISPNET.2018.8538555","url":null,"abstract":"Nowadays, most of the world’s population has become much dependent on computers for banking, healthcare, shopping, and telecommunication. Security has now become a basic norm for computers and its resources since it has become inherently insecure. Security issues like Denial of Service attacks, TCP SYN Flooding attacks, Packet Dropping attacks and Distributed Denial of Service attacks are some of the methods by which unauthorized users make the resource unavailable to authorized users. There are several security mechanisms like Intrusion Detection System, Anomaly detection and Trust model by which we can be able to identify and counter the abuse of computer resources by unauthorized users. This paper presents a survey of several security mechanisms which have been implemented using Fuzzy logic. Fuzzy logic is one of the rapidly developing technologies, which is used in a sophisticated control system. Fuzzy logic deals with the degree of truth rather than the Boolean logic, which carries the values of either true or false. So instead of providing only two values, we will be able to define intermediate values.","PeriodicalId":6858,"journal":{"name":"2018 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET)","volume":"153 8 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2018-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83130854","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-03-01DOI: 10.1109/WISPNET.2018.8538531
Jerin Baby Mathew, Jonie Jacob, Karun Sajeev, Jithin Joy, R. Rajan
In this paper, a comparative study of various feature extraction methods is carried out on dysarthric speech. Dysarthric speech is difficult to recognize and thus pose challenges that normal speech does not. Since various features can be used to model phonemes in hidden Markov model (HMM) based recognition system, which feature is suitable for the task specified is a topic to be addressed.Dysarthric speech becomes unintelligible due to the improper coordination of articulators. In this paper, recognition results are compared using mel-frequency cepstral coefficients (MFCC), perceptual linear prediction (PLP), filter bank and reflection coefficients feature sets. The performance is analyzed using TORGO database. Phonemes are grouped for the analysis. Our study shows that MFCC and PLP gave better results than filter bank and reflection coefficients for dysarthric speech analysis.
{"title":"Significance of Feature Selection for Acoustic Modeling in Dysarthric Speech Recognition","authors":"Jerin Baby Mathew, Jonie Jacob, Karun Sajeev, Jithin Joy, R. Rajan","doi":"10.1109/WISPNET.2018.8538531","DOIUrl":"https://doi.org/10.1109/WISPNET.2018.8538531","url":null,"abstract":"In this paper, a comparative study of various feature extraction methods is carried out on dysarthric speech. Dysarthric speech is difficult to recognize and thus pose challenges that normal speech does not. Since various features can be used to model phonemes in hidden Markov model (HMM) based recognition system, which feature is suitable for the task specified is a topic to be addressed.Dysarthric speech becomes unintelligible due to the improper coordination of articulators. In this paper, recognition results are compared using mel-frequency cepstral coefficients (MFCC), perceptual linear prediction (PLP), filter bank and reflection coefficients feature sets. The performance is analyzed using TORGO database. Phonemes are grouped for the analysis. Our study shows that MFCC and PLP gave better results than filter bank and reflection coefficients for dysarthric speech analysis.","PeriodicalId":6858,"journal":{"name":"2018 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET)","volume":"62 1","pages":"1-4"},"PeriodicalIF":0.0,"publicationDate":"2018-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80726272","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-03-01DOI: 10.1109/WISPNET.2018.8538461
Savinu T. Vijay, P.N. Poumami
The process of matching two visual descriptions of images is a major task in Computer Vision. This matching is generally done using Exhaustive search (Brute-Force) and Nearest Neighbor search which has been proved computationally expensive in some cases. This paper proposes a heuristic method to perform feature descriptor matching. The heuristic approach applied here works based on a combinatorial optimization algorithm called Threshold Accepting. The experiments performed suggest that the proposed algorithm can produce better results within a minimum number of iterations than existing algorithms.
{"title":"Accelerated Feature Descriptor Matching in Images Using Threshold Accepting","authors":"Savinu T. Vijay, P.N. Poumami","doi":"10.1109/WISPNET.2018.8538461","DOIUrl":"https://doi.org/10.1109/WISPNET.2018.8538461","url":null,"abstract":"The process of matching two visual descriptions of images is a major task in Computer Vision. This matching is generally done using Exhaustive search (Brute-Force) and Nearest Neighbor search which has been proved computationally expensive in some cases. This paper proposes a heuristic method to perform feature descriptor matching. The heuristic approach applied here works based on a combinatorial optimization algorithm called Threshold Accepting. The experiments performed suggest that the proposed algorithm can produce better results within a minimum number of iterations than existing algorithms.","PeriodicalId":6858,"journal":{"name":"2018 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET)","volume":"45 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2018-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76931082","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-03-01DOI: 10.1109/WISPNET.2018.8538644
S. Bharkad
This paper presents a new technique for segmentation of exudates in fundus images. This technique is based on Discrete Wavelet Transform (DWT) and histogram based thresholding procedure. In this work, Optic Disc (OD) is eliminated using DWT from original green component image prior segmentation of exudates. This step aids to avoid the misclassification of exudates region. Histogram based threshold calculation procedure is introduced for segmentation of bright regions in green component image. Hard exudates are obtained after masking the OD region in segmented bright regions of the green component image. This technique was evaluated on images from DIARETDB0 and DIARETDB1 databases. The average sensitivity, specificity and accuracy achieved by proposed method are 0.7890, 0.9972 and 0.9964 respectively. Comparison with existing methods offered in the literature shows that the performance of proposed approach is significant.
{"title":"Automatic Segmentation of Exudates in Retinal Images","authors":"S. Bharkad","doi":"10.1109/WISPNET.2018.8538644","DOIUrl":"https://doi.org/10.1109/WISPNET.2018.8538644","url":null,"abstract":"This paper presents a new technique for segmentation of exudates in fundus images. This technique is based on Discrete Wavelet Transform (DWT) and histogram based thresholding procedure. In this work, Optic Disc (OD) is eliminated using DWT from original green component image prior segmentation of exudates. This step aids to avoid the misclassification of exudates region. Histogram based threshold calculation procedure is introduced for segmentation of bright regions in green component image. Hard exudates are obtained after masking the OD region in segmented bright regions of the green component image. This technique was evaluated on images from DIARETDB0 and DIARETDB1 databases. The average sensitivity, specificity and accuracy achieved by proposed method are 0.7890, 0.9972 and 0.9964 respectively. Comparison with existing methods offered in the literature shows that the performance of proposed approach is significant.","PeriodicalId":6858,"journal":{"name":"2018 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET)","volume":"31 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2018-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75355066","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-03-01DOI: 10.1109/WISPNET.2018.8538462
M. Diouf, I. Diop, I. Dioum, K. Tall, S. M. Farssi
The tools of information theory (error correcting codes) are exploited to improve the detection of MIMO channels. In particular, we use the polar codes, which currently represent the first and only code family to reach Shannon's two limits on channel and source coding. Our proposal consists in using a medium-length polar encoding, a detection minimizing the mean squared error by successive interference cancellation (MMSE- SIC) and a Successive Cancellation (SC) decoder.To improve the reliability of the information over the iterations, we added an iterative (turbo-equalization) process between the SC decoder and the MMSE-SIC detector. We have shown that the association of the SC decoder with the MMSE-SIC detector can reduce the Bit Error Rate (BER) instead of Believe Propagation (BP) decoding. This has increased the diversity and the ability to correct.
{"title":"Iterative Detection for MIMO Systems Associated with Polar Codes","authors":"M. Diouf, I. Diop, I. Dioum, K. Tall, S. M. Farssi","doi":"10.1109/WISPNET.2018.8538462","DOIUrl":"https://doi.org/10.1109/WISPNET.2018.8538462","url":null,"abstract":"The tools of information theory (error correcting codes) are exploited to improve the detection of MIMO channels. In particular, we use the polar codes, which currently represent the first and only code family to reach Shannon's two limits on channel and source coding. Our proposal consists in using a medium-length polar encoding, a detection minimizing the mean squared error by successive interference cancellation (MMSE- SIC) and a Successive Cancellation (SC) decoder.To improve the reliability of the information over the iterations, we added an iterative (turbo-equalization) process between the SC decoder and the MMSE-SIC detector. We have shown that the association of the SC decoder with the MMSE-SIC detector can reduce the Bit Error Rate (BER) instead of Believe Propagation (BP) decoding. This has increased the diversity and the ability to correct.","PeriodicalId":6858,"journal":{"name":"2018 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET)","volume":"36 1","pages":"1-7"},"PeriodicalIF":0.0,"publicationDate":"2018-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72724016","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-03-01DOI: 10.1109/WISPNET.2018.8538464
Gunjan, P. Maheshwari, A. Sharma
WSN is a network technology which is currently in use in many existing and latest applications. Among the major problems in Wireless Sensor Networks, Energy Conservation is of utmost importance since batteries used in the sensor devices are not replaceable. There are number of cluster based routing protocols such as LEACH, TEEN, SEP proposed which handle these issues. This paper introduces an extension to TEEN protocol, a reactive homogeneous protocol. Modified TEEN (MTEEN) handles hotspot problem and the problem of load balancing in existing WSN routing algorithms. On the basis of our simulation carried on MATLAB, it is found that the proposed algorithm outperforms LEACH and TEEN in network lifetime.
{"title":"Modified TEEN for Handling Inconsistent Cluster Size Problem in WSN","authors":"Gunjan, P. Maheshwari, A. Sharma","doi":"10.1109/WISPNET.2018.8538464","DOIUrl":"https://doi.org/10.1109/WISPNET.2018.8538464","url":null,"abstract":"WSN is a network technology which is currently in use in many existing and latest applications. Among the major problems in Wireless Sensor Networks, Energy Conservation is of utmost importance since batteries used in the sensor devices are not replaceable. There are number of cluster based routing protocols such as LEACH, TEEN, SEP proposed which handle these issues. This paper introduces an extension to TEEN protocol, a reactive homogeneous protocol. Modified TEEN (MTEEN) handles hotspot problem and the problem of load balancing in existing WSN routing algorithms. On the basis of our simulation carried on MATLAB, it is found that the proposed algorithm outperforms LEACH and TEEN in network lifetime.","PeriodicalId":6858,"journal":{"name":"2018 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET)","volume":"52 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2018-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77242520","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-03-01DOI: 10.1109/WISPNET.2018.8538569
G. Mallikharjuna Rao, P. Srinivas
In this paper, we present a scheme for performance analysis of spatial domain methods, namely, Laplacian, Arbitrary, Sobel and Prewitt operator methods for traffic control using an image processing with LabVIEW approach, including timing constraints are used to control the signal along the crossroad signal posts. In this paperwork, the reference image and the real-time image captured from the camera is loaded in the image acquisition of LabVIEW. To process the acquired image, four different methods of kernels namely Arbitrary, Laplacian, Prewitt and Sobel methods are used to obtain an edge detection image. The edge detection images have stored and captured images are compared and the Root Mean Square Error is calculated to estimate the timing constraints to operate the traffic signal lights on a four-lane dynamically. LabVIEW graphical programming tools are used for the development of the scheme and simulation results are shown. Finally, the performance of the four methods analyzed using an image quality metric RMSE value to estimate the time in order to allow the vehicles in a particular direction and dynamically to switch them on and off control from one particular direction to another.
{"title":"Performance Analysis of Different Spatial Domain Methods for Traffic Control Using Image Processing: A LabVIEW Approach","authors":"G. Mallikharjuna Rao, P. Srinivas","doi":"10.1109/WISPNET.2018.8538569","DOIUrl":"https://doi.org/10.1109/WISPNET.2018.8538569","url":null,"abstract":"In this paper, we present a scheme for performance analysis of spatial domain methods, namely, Laplacian, Arbitrary, Sobel and Prewitt operator methods for traffic control using an image processing with LabVIEW approach, including timing constraints are used to control the signal along the crossroad signal posts. In this paperwork, the reference image and the real-time image captured from the camera is loaded in the image acquisition of LabVIEW. To process the acquired image, four different methods of kernels namely Arbitrary, Laplacian, Prewitt and Sobel methods are used to obtain an edge detection image. The edge detection images have stored and captured images are compared and the Root Mean Square Error is calculated to estimate the timing constraints to operate the traffic signal lights on a four-lane dynamically. LabVIEW graphical programming tools are used for the development of the scheme and simulation results are shown. Finally, the performance of the four methods analyzed using an image quality metric RMSE value to estimate the time in order to allow the vehicles in a particular direction and dynamically to switch them on and off control from one particular direction to another.","PeriodicalId":6858,"journal":{"name":"2018 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET)","volume":"45 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2018-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85786765","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}