首页 > 最新文献

2018 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET)最新文献

英文 中文
A New Design Strategy of Sharp Cut-off FIR Filter with Powers-of-two Coefficients 一种新的2次幂系数锐利截止FIR滤波器设计策略
Subhabrata Roy, A. Chandra
Optimal design of fixed coefficient finite wordlength linear phase FIR digital filters for custom ICs has been the focus of research during the last few decades. With the ever increasing demands for higher throughput and low power circuits, design of FIR filters with reduced hardware complexity has received serious attention day by day. This paper addresses the design problem of linear phase, sharp cut-off FIR filter with discrete coefficients. Number of simulation results has been presented in this regard so as to compare the performance of discrete coefficient filter with that of the continuous one. Supremacy of the proposed scheme over other existing works has also been established by means of a number of parameters pertaining to frequency response of the designed filter.
自定义集成电路中固定系数有限字长线性相位FIR数字滤波器的优化设计一直是过去几十年研究的焦点。随着人们对高吞吐量、低功耗电路的要求不断提高,设计硬件复杂度较低的FIR滤波器日益受到人们的重视。本文研究了离散系数线性相位锐截止FIR滤波器的设计问题。为了比较离散系数滤波器与连续系数滤波器的性能,本文给出了大量的仿真结果。通过与所设计滤波器的频率响应有关的一些参数,也确定了所提出的方案优于其他现有工程。
{"title":"A New Design Strategy of Sharp Cut-off FIR Filter with Powers-of-two Coefficients","authors":"Subhabrata Roy, A. Chandra","doi":"10.1109/WISPNET.2018.8538605","DOIUrl":"https://doi.org/10.1109/WISPNET.2018.8538605","url":null,"abstract":"Optimal design of fixed coefficient finite wordlength linear phase FIR digital filters for custom ICs has been the focus of research during the last few decades. With the ever increasing demands for higher throughput and low power circuits, design of FIR filters with reduced hardware complexity has received serious attention day by day. This paper addresses the design problem of linear phase, sharp cut-off FIR filter with discrete coefficients. Number of simulation results has been presented in this regard so as to compare the performance of discrete coefficient filter with that of the continuous one. Supremacy of the proposed scheme over other existing works has also been established by means of a number of parameters pertaining to frequency response of the designed filter.","PeriodicalId":6858,"journal":{"name":"2018 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET)","volume":"635 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2018-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76814930","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
IoT Security Solution to Avoid Theft 物联网安全解决方案,避免盗窃
D. Chandrappa, H. Pavan, M. V. M. Sagar, M. Dakshayini
In these days security has become one of the most important societal concerns to be addressed. This is because of the increased robbery and intrusion cases at almost all the places like home, temples, colleges, offices etc. So people are finding it difficult to lead a secure, peaceful and happy life. Hence in this paper, an efficient IoT smart security system has been designed and developed that continuously monitors and informs the authorized person in case of intrusion is detected. An alarm is also raised locally that intimates the neighbouring people about the presence of intruder. This Theft Control unit has been developed using IoT technologies (IoT-TCU). The demonstration of this system have proved in successfully sending a message and raising an alarm, when any intruder is detected there by reducing the chances of theft by alerting the nearby and authorised people with the required information about the presence of intruder ontime.
如今,安全已成为需要解决的最重要的社会问题之一。这是因为在家里、寺庙、大学、办公室等几乎所有地方,抢劫和闯入案件都在增加。因此,人们发现很难过上安全、安宁和幸福的生活。因此,本文设计并开发了一种高效的物联网智能安全系统,可以在检测到入侵时持续监控并通知授权人员。当地也会发出警报,提醒邻居入侵者的存在。这款盗窃控制单元是使用物联网技术(IoT- tcu)开发的。该系统的演示已经证明,当检测到任何入侵者时,通过向附近和授权人员及时提供有关入侵者存在的所需信息来减少盗窃的机会,从而成功地发送消息并发出警报。
{"title":"IoT Security Solution to Avoid Theft","authors":"D. Chandrappa, H. Pavan, M. V. M. Sagar, M. Dakshayini","doi":"10.1109/WISPNET.2018.8538735","DOIUrl":"https://doi.org/10.1109/WISPNET.2018.8538735","url":null,"abstract":"In these days security has become one of the most important societal concerns to be addressed. This is because of the increased robbery and intrusion cases at almost all the places like home, temples, colleges, offices etc. So people are finding it difficult to lead a secure, peaceful and happy life. Hence in this paper, an efficient IoT smart security system has been designed and developed that continuously monitors and informs the authorized person in case of intrusion is detected. An alarm is also raised locally that intimates the neighbouring people about the presence of intruder. This Theft Control unit has been developed using IoT technologies (IoT-TCU). The demonstration of this system have proved in successfully sending a message and raising an alarm, when any intruder is detected there by reducing the chances of theft by alerting the nearby and authorised people with the required information about the presence of intruder ontime.","PeriodicalId":6858,"journal":{"name":"2018 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET)","volume":"209 1","pages":"1-3"},"PeriodicalIF":0.0,"publicationDate":"2018-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77948058","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A NOVEL CAZAC Sequence Based Timing Synchronization Scheme for OFDM System 一种新的基于CAZAC序列的OFDM系统定时同步方案
Anuja Das, B. Mohanty, B. Sahu
Several classical timing synchronization schemes have been proposed for the timing synchronization in OFDM systems based on the correlation between identical parts of OFDM symbol. These schemes show poor performance due to the presence of plateau and significant side lobe. In this paper we present a timing synchronization schemes with timing metric based on a Constant Amplitude Zero Auto Correlation (CAZAC) sequence. The performance of the proposed timing synchronization scheme is better than the classical techniques.
针对OFDM系统中基于OFDM符号相同部分之间的相关性的定时同步问题,提出了几种经典的定时同步方案。由于存在平台和显著的副瓣,这些方案的性能较差。提出了一种基于等幅零自相关(CAZAC)序列的定时度量同步方案。该定时同步方案的性能优于传统的定时同步方案。
{"title":"A NOVEL CAZAC Sequence Based Timing Synchronization Scheme for OFDM System","authors":"Anuja Das, B. Mohanty, B. Sahu","doi":"10.1109/WISPNET.2018.8538566","DOIUrl":"https://doi.org/10.1109/WISPNET.2018.8538566","url":null,"abstract":"Several classical timing synchronization schemes have been proposed for the timing synchronization in OFDM systems based on the correlation between identical parts of OFDM symbol. These schemes show poor performance due to the presence of plateau and significant side lobe. In this paper we present a timing synchronization schemes with timing metric based on a Constant Amplitude Zero Auto Correlation (CAZAC) sequence. The performance of the proposed timing synchronization scheme is better than the classical techniques.","PeriodicalId":6858,"journal":{"name":"2018 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET)","volume":"8 1","pages":"1-4"},"PeriodicalIF":0.0,"publicationDate":"2018-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79497080","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Graphical Computational Tool for Segmentation of Gray and White Matter Regions in Brain MRI Images 脑MRI图像中灰质和白质区域分割的图形计算工具
Sunayana Tirumalasetty, Vidwan Reddy Patlolla, Rakshith Tirumalasetty, Manish K. Arya, R. Agrawal, G. Hossain, A. Jothi, Ashwani K. Dubey, R. Challoo, Ayush Goyal
There is a need for computational tools for processing medical patient data and extracting clinically relevant information from patient images for providing patient-specific personalized treatment. Tools have been and are actively being developed by software engineers and programmers in the field of bio-medical image processing for assisting doctors, scientists and researchers. This paper presents an independent stand-alone software application that is a graphical computational tool with a user interface for automatic segmentation of brain MRI images. The same software tool subsequently functions as a neurological disease prediction framework for detection of disease, dementia, impairment, injury, lesions, or tumors in brain MRI images. Brain MRI image segmentation techniques have become an important tool for neurologists to detect disease and cure patients in their early stages of the disease so detected. The tool presented in this paper facilitates the user to automatically segment the regions of brain MRI images using an algorithm called adapted fuzzy c-means (FCM). This methodology for segmentation is based on pixel classification technique, in conjunction with connected region analysis.
需要计算工具来处理医疗患者数据并从患者图像中提取临床相关信息,以提供针对患者的个性化治疗。生物医学图像处理领域的软件工程师和程序员已经并正在积极开发工具,以协助医生、科学家和研究人员。本文提出了一个独立的独立软件应用程序,它是一个具有用户界面的图形计算工具,用于脑MRI图像的自动分割。同样的软件工具随后作为神经系统疾病预测框架,用于检测大脑MRI图像中的疾病、痴呆、损伤、损伤、病变或肿瘤。脑MRI图像分割技术已成为神经科医生发现疾病并在疾病早期治疗患者的重要工具。本文提出的工具便于用户使用一种称为自适应模糊c均值(FCM)的算法自动分割脑MRI图像的区域。这种分割方法是基于像素分类技术,结合连通区域分析。
{"title":"Graphical Computational Tool for Segmentation of Gray and White Matter Regions in Brain MRI Images","authors":"Sunayana Tirumalasetty, Vidwan Reddy Patlolla, Rakshith Tirumalasetty, Manish K. Arya, R. Agrawal, G. Hossain, A. Jothi, Ashwani K. Dubey, R. Challoo, Ayush Goyal","doi":"10.1109/WISPNET.2018.8538587","DOIUrl":"https://doi.org/10.1109/WISPNET.2018.8538587","url":null,"abstract":"There is a need for computational tools for processing medical patient data and extracting clinically relevant information from patient images for providing patient-specific personalized treatment. Tools have been and are actively being developed by software engineers and programmers in the field of bio-medical image processing for assisting doctors, scientists and researchers. This paper presents an independent stand-alone software application that is a graphical computational tool with a user interface for automatic segmentation of brain MRI images. The same software tool subsequently functions as a neurological disease prediction framework for detection of disease, dementia, impairment, injury, lesions, or tumors in brain MRI images. Brain MRI image segmentation techniques have become an important tool for neurologists to detect disease and cure patients in their early stages of the disease so detected. The tool presented in this paper facilitates the user to automatically segment the regions of brain MRI images using an algorithm called adapted fuzzy c-means (FCM). This methodology for segmentation is based on pixel classification technique, in conjunction with connected region analysis.","PeriodicalId":6858,"journal":{"name":"2018 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET)","volume":"1 1","pages":"1-7"},"PeriodicalIF":0.0,"publicationDate":"2018-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81545252","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Multi-Modal Humanoid Robot 多模态人形机器人
S. Thoshith, Samarth Mulgund, Praveen Sindgi, N. Yogesh, R. Kumaraswamy
Human-Robot Interaction deals with the direct use of robotic systems to interact with humans in particular context. In this paper, a humanoid is developed which can understand the commands in the form of speech and gesture. A connectedword speaker-independent speech recognition system is built using Mel Frequency Cepstral Coefficient and Gaussian Mixture Model in Kaldi toolkit. Gesture recognition is implemented using Convolutional Neural Network.
人机交互是指在特定环境中直接使用机器人系统与人类进行交互。本文研制了一种能够理解语音和手势指令的类人机器人。利用Kaldi工具包中的Mel频率倒谱系数和高斯混合模型,构建了一个独立于连词说话人的语音识别系统。手势识别是用卷积神经网络实现的。
{"title":"Multi-Modal Humanoid Robot","authors":"S. Thoshith, Samarth Mulgund, Praveen Sindgi, N. Yogesh, R. Kumaraswamy","doi":"10.1109/WISPNET.2018.8538449","DOIUrl":"https://doi.org/10.1109/WISPNET.2018.8538449","url":null,"abstract":"Human-Robot Interaction deals with the direct use of robotic systems to interact with humans in particular context. In this paper, a humanoid is developed which can understand the commands in the form of speech and gesture. A connectedword speaker-independent speech recognition system is built using Mel Frequency Cepstral Coefficient and Gaussian Mixture Model in Kaldi toolkit. Gesture recognition is implemented using Convolutional Neural Network.","PeriodicalId":6858,"journal":{"name":"2018 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET)","volume":"10 1","pages":"1-4"},"PeriodicalIF":0.0,"publicationDate":"2018-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81550186","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Improving Security Using Aggregate Signature Scheme Against Different Attacks in WSN 利用聚合签名方案提高WSN中防范不同攻击的安全性
T. Nivedha, K. Jayanthi
In Wireless Sensor Network (WSN) transmitting the data is common but protecting the transferred information is more important. For example, in military surveillance scenario, an attacker may observe the sensor data moving from source to the sink and could identify the sink node location and may acquire the data directly. Under such circumstances, providing security and authentication is very essential. The objective of the work is to eliminate different attackers using aggregate signature scheme and provide security and authentication using Digital Signature (DS) and Additive Homomorphic Encryption (AHE) scheme. In this proposed work, the sink node (base station) broadcast hello message to sensor nodes for evaluating the node energy and distance and then clustering process is activated for Cluster head selection. Sink node generates the key for digital signature using the SHA1 algorithm and verifies the signature by using DSA verification code. AHE is added for secure transfer of data from Cluster head to sink node and also authentication is done between cluster head and nodes. Malicious nodes are added to the network to absorb the packets and to mimic a threat scenario. The performance metrics like Communication overhead, Energy consumption, and Packet delivery rate are analyzed from the obtained results and they are found to be better than the performance of the existing work.
在无线传感器网络(WSN)中,数据传输是常见的,但对传输信息的保护更为重要。例如,在军事监视场景中,攻击者可以观察到传感器数据从源到汇聚的移动,可以识别汇聚节点的位置,并可以直接获取数据。在这种情况下,提供安全和身份验证是非常必要的。该工作的目的是利用聚合签名方案消除不同的攻击者,并利用数字签名(DS)和加性同态加密(AHE)方案提供安全性和身份验证。在该算法中,汇聚节点(基站)向传感器节点广播hello消息,评估节点能量和距离,然后启动聚类过程,选择簇头。Sink节点使用SHA1算法生成数字签名密钥,并使用DSA验证码对签名进行验证。为了保证数据从簇头到汇聚节点的安全传输,增加了AHE,并且在簇头和节点之间进行了身份验证。恶意节点被添加到网络中,以吸收数据包并模拟威胁场景。根据获得的结果分析了通信开销、能耗和包交付率等性能指标,发现它们比现有工作的性能更好。
{"title":"Improving Security Using Aggregate Signature Scheme Against Different Attacks in WSN","authors":"T. Nivedha, K. Jayanthi","doi":"10.1109/WISPNET.2018.8538476","DOIUrl":"https://doi.org/10.1109/WISPNET.2018.8538476","url":null,"abstract":"In Wireless Sensor Network (WSN) transmitting the data is common but protecting the transferred information is more important. For example, in military surveillance scenario, an attacker may observe the sensor data moving from source to the sink and could identify the sink node location and may acquire the data directly. Under such circumstances, providing security and authentication is very essential. The objective of the work is to eliminate different attackers using aggregate signature scheme and provide security and authentication using Digital Signature (DS) and Additive Homomorphic Encryption (AHE) scheme. In this proposed work, the sink node (base station) broadcast hello message to sensor nodes for evaluating the node energy and distance and then clustering process is activated for Cluster head selection. Sink node generates the key for digital signature using the SHA1 algorithm and verifies the signature by using DSA verification code. AHE is added for secure transfer of data from Cluster head to sink node and also authentication is done between cluster head and nodes. Malicious nodes are added to the network to absorb the packets and to mimic a threat scenario. The performance metrics like Communication overhead, Energy consumption, and Packet delivery rate are analyzed from the obtained results and they are found to be better than the performance of the existing work.","PeriodicalId":6858,"journal":{"name":"2018 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET)","volume":"728 1","pages":"1-4"},"PeriodicalIF":0.0,"publicationDate":"2018-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76777861","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
IT and Developing Countries With a Case Study of Recycling 信息技术与发展中国家的回收案例研究
Tamer F. Hafez, Ali Badawey Ali, R. S. Ali, Nadia Abd-Alsabour
The importance of non-governmental organizations (NGOs) in the renaissance of developing countries is constantly increasing in performing many activities such as keeping the environment. On the other hand, these societies suffer from the problem of garbage disposal although such garbage represents real wealth and added value if they could have been utilized optimally. This paper discusses this issue and proposes a comprehensive and easily used system that aims at managing the recycling of different types of garbage. It also includes nonprofit activities such as donating and facilitating the collecting of the garbage from different donors through a network of a wide range of charities.
非政府组织在发展中国家复兴过程中进行许多活动,例如保护环境,其重要性不断增加。另一方面,这些社会遭受垃圾处理的问题,尽管这些垃圾是真正的财富和附加价值,如果它们可以得到最佳利用。本文对这一问题进行了探讨,并提出了一个全面、易用的系统,旨在对不同类型的垃圾进行回收管理。它还包括非营利性活动,如捐赠和促进收集垃圾从不同的捐助者通过一个广泛的慈善网络。
{"title":"IT and Developing Countries With a Case Study of Recycling","authors":"Tamer F. Hafez, Ali Badawey Ali, R. S. Ali, Nadia Abd-Alsabour","doi":"10.1109/WISPNET.2018.8538623","DOIUrl":"https://doi.org/10.1109/WISPNET.2018.8538623","url":null,"abstract":"The importance of non-governmental organizations (NGOs) in the renaissance of developing countries is constantly increasing in performing many activities such as keeping the environment. On the other hand, these societies suffer from the problem of garbage disposal although such garbage represents real wealth and added value if they could have been utilized optimally. This paper discusses this issue and proposes a comprehensive and easily used system that aims at managing the recycling of different types of garbage. It also includes nonprofit activities such as donating and facilitating the collecting of the garbage from different donors through a network of a wide range of charities.","PeriodicalId":6858,"journal":{"name":"2018 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET)","volume":"21 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2018-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74795479","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Small Motion Magnification Using Automated RoI Selection and Spatial Co-ordinate Approach 使用自动RoI选择和空间坐标方法的小运动放大
M. Kumar, Tilendra Choudhary, M. Bhuyan
This paper presents a new framework to magnify small motions present in videos, which are invisible to the naked eyes. The proposed method is based on spatial coordinates. It has an ability to magnify motions of our interest in presence of large background motions as well as static background. It is assumed that the camera is static when the video is recorded. Initially, regions of interest (RoI) are detected in our method, which need to be magnified. Histogram of oriented gradients (HoG) with thresholding is used to estimate the RoIs. Subsequently, a feature point tracker is used to detect the motion of feature points with respect to time. Finally, the velocity of these feature points are amplified by a magnification factor, which results in a video with small motions amplified. The proposed method provides a newly introduced block based spiral search technique for automatically detecting RoIs. The qualitative analysis of the experimental results shows that the proposed method can produce significant motion magnification even for very small motions. The experimental results show the efficacy of the proposed motion amplification scheme.
本文提出了一种新的框架来放大视频中肉眼看不见的微小运动。该方法基于空间坐标。它有能力放大我们感兴趣的运动,无论是大的背景运动还是静态的背景。我们假设摄像机在录制视频时是静止的。首先,我们的方法检测到感兴趣的区域(RoI),这些区域需要放大。采用定向梯度直方图(HoG)和阈值法估计roi。随后,使用特征点跟踪器检测特征点相对于时间的运动。最后,将这些特征点的速度通过放大系数放大,得到具有小运动的视频。该方法为自动检测roi提供了一种新的基于分块的螺旋搜索技术。实验结果的定性分析表明,该方法即使对非常小的运动也能产生显著的运动放大效果。实验结果表明了运动放大方案的有效性。
{"title":"Small Motion Magnification Using Automated RoI Selection and Spatial Co-ordinate Approach","authors":"M. Kumar, Tilendra Choudhary, M. Bhuyan","doi":"10.1109/WISPNET.2018.8538534","DOIUrl":"https://doi.org/10.1109/WISPNET.2018.8538534","url":null,"abstract":"This paper presents a new framework to magnify small motions present in videos, which are invisible to the naked eyes. The proposed method is based on spatial coordinates. It has an ability to magnify motions of our interest in presence of large background motions as well as static background. It is assumed that the camera is static when the video is recorded. Initially, regions of interest (RoI) are detected in our method, which need to be magnified. Histogram of oriented gradients (HoG) with thresholding is used to estimate the RoIs. Subsequently, a feature point tracker is used to detect the motion of feature points with respect to time. Finally, the velocity of these feature points are amplified by a magnification factor, which results in a video with small motions amplified. The proposed method provides a newly introduced block based spiral search technique for automatically detecting RoIs. The qualitative analysis of the experimental results shows that the proposed method can produce significant motion magnification even for very small motions. The experimental results show the efficacy of the proposed motion amplification scheme.","PeriodicalId":6858,"journal":{"name":"2018 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET)","volume":"333 1","pages":"1-4"},"PeriodicalIF":0.0,"publicationDate":"2018-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80565814","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Language Identification From Speech Features Using SVM and LDA 基于SVM和LDA的语音特征语言识别
J. Anjana, S. Poorna
Speech based language identification system has a wide range of applications in the field of telephone services, multilingual translation services, government intelligence and monitoring etc. Identifying the exact speech feature for classification is an important problem in the language identification research area. In this work, we are comparing the performance measures of a language identification system using two different supervised learning algorithms. Mel frequency cepstral coefficients and formant feature vectors are extracted for classification purpose. The system which is developed using the database of seven different Indian languages is capable of identifying languages with LDA giving a maximum classification accuracy of 93.88% when compared to SVM with a classification accuracy of 84%.
基于语音的语言识别系统在电话服务、多语种翻译服务、政府情报和监控等领域有着广泛的应用。准确识别语音特征进行分类是语言识别研究领域的一个重要问题。在这项工作中,我们比较了使用两种不同的监督学习算法的语言识别系统的性能指标。提取Mel频率倒谱系数和形成峰特征向量进行分类。该系统使用七种不同的印度语言数据库开发,与支持向量机的84%分类准确率相比,LDA能够识别语言,最大分类准确率为93.88%。
{"title":"Language Identification From Speech Features Using SVM and LDA","authors":"J. Anjana, S. Poorna","doi":"10.1109/WISPNET.2018.8538638","DOIUrl":"https://doi.org/10.1109/WISPNET.2018.8538638","url":null,"abstract":"Speech based language identification system has a wide range of applications in the field of telephone services, multilingual translation services, government intelligence and monitoring etc. Identifying the exact speech feature for classification is an important problem in the language identification research area. In this work, we are comparing the performance measures of a language identification system using two different supervised learning algorithms. Mel frequency cepstral coefficients and formant feature vectors are extracted for classification purpose. The system which is developed using the database of seven different Indian languages is capable of identifying languages with LDA giving a maximum classification accuracy of 93.88% when compared to SVM with a classification accuracy of 84%.","PeriodicalId":6858,"journal":{"name":"2018 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET)","volume":"157 1","pages":"1-4"},"PeriodicalIF":0.0,"publicationDate":"2018-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78136201","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Device-to-Device Communication Aided by Two-Way Relay Underlaying Cellular Network 基于蜂窝网络的双向中继辅助的设备间通信
Pratap Khuntia, Ranjay Hazra
In this paper, we investigate the performance of device-to-device (D2D) communication assisted by two-way detect and forward (DF) relaying. Here, we derive an accurate approximate expression for sum-rate of two-way relaying D2D link under varying interference from cellular users and base station (BS). The analytical results reveal that D2D communication using relaying strategy provides a better and reliable communication in terms of maximum achievable sum-rate as compared to cellular communication mode. The two-way relaying technique improves bit error probability (BEP) by mitigating interference in the first phase of two-way transmission. On the basis of instantaneous signal to noise ratio (SNR), the combiner at the destination node follows an adaptive weight update process to improve the BEP performance in the second phase. We also analyze heuristic mode selection and resource allocation strategies in cellular network in association with multi-node two-way relay scheme, which not only boosts the energy efficiency of the system but also extends the coverage of cellular network.
在本文中,我们研究了由双向检测和转发(DF)中继辅助的设备到设备(D2D)通信的性能。在此,我们导出了在不同蜂窝用户和基站(BS)干扰下双向中继D2D链路和速率的精确近似表达式。分析结果表明,与蜂窝通信模式相比,采用中继策略的D2D通信在最大可实现和速率方面提供了更好的可靠通信。双向中继技术通过减轻双向传输第一阶段的干扰来提高误码率(BEP)。基于瞬时信噪比(SNR),目标节点的合并器遵循自适应权值更新过程,以提高第二阶段的BEP性能。结合多节点双向中继方案,分析了蜂窝网络中启发式模式选择和资源分配策略,该策略不仅提高了系统的能源效率,而且扩大了蜂窝网络的覆盖范围。
{"title":"Device-to-Device Communication Aided by Two-Way Relay Underlaying Cellular Network","authors":"Pratap Khuntia, Ranjay Hazra","doi":"10.1109/WISPNET.2018.8538501","DOIUrl":"https://doi.org/10.1109/WISPNET.2018.8538501","url":null,"abstract":"In this paper, we investigate the performance of device-to-device (D2D) communication assisted by two-way detect and forward (DF) relaying. Here, we derive an accurate approximate expression for sum-rate of two-way relaying D2D link under varying interference from cellular users and base station (BS). The analytical results reveal that D2D communication using relaying strategy provides a better and reliable communication in terms of maximum achievable sum-rate as compared to cellular communication mode. The two-way relaying technique improves bit error probability (BEP) by mitigating interference in the first phase of two-way transmission. On the basis of instantaneous signal to noise ratio (SNR), the combiner at the destination node follows an adaptive weight update process to improve the BEP performance in the second phase. We also analyze heuristic mode selection and resource allocation strategies in cellular network in association with multi-node two-way relay scheme, which not only boosts the energy efficiency of the system but also extends the coverage of cellular network.","PeriodicalId":6858,"journal":{"name":"2018 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET)","volume":"129 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2018-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79507952","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
期刊
2018 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1