This paper presents a trifocal Rotman Lens Design
approach. The effects of focal ratio and element spacing on
the performance of Rotman Lens are described. A three beam
prototype feeding 4 element antenna array working in L-band
has been simulated using RLD v1.7 software. Simulated
results show that the simulated lens has a return loss of –
12.4dB at 1.8GHz. Beam to array port phase error variation
with change in the focal ratio and element spacing has also
been investigated.
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral ImagesIDES Editor
Hyperspectral images can be efficiently compressed
through a linear predictive model, as for example the one
used in the SLSQ algorithm. In this paper we exploit this
predictive model on the AVIRIS images by individuating,
through an off-line approach, a common subset of bands, which
are not spectrally related with any other bands. These bands
are not useful as prediction reference for the SLSQ 3-D
predictive model and we need to encode them via other
prediction strategies which consider only spatial correlation.
We have obtained this subset by clustering the AVIRIS bands
via the clustering by compression approach. The main result
of this paper is the list of the bands, not related with the
others, for AVIRIS images. The clustering trees obtained for
AVIRIS and the relationship among bands they depict is also
an interesting starting point for future research.
DETECTION OF POWER-LINES IN COMPLEX NATURAL SURROUNDINGScsandit
Power transmission line inspection using Unmanned Aerial Vehicles (UAV) is taking off as an
exciting solution due to advances in sensors and flight technology. Extracting power-lines from
aerial images, taken from the UAV, having complex natural surroundings is a critical task in the
above problem. In this paper we propose an approach for suppressing natural surrounding that
leads to power line detection. The results of applying our method on real-life video frames taken
from a UAV demonstrate that our approach is very effective. We believe that our approach can
be easily used for line detection in any other real outdoor video as well.
Integral imaging three dimensional (3 d)IJCI JOURNAL
In this paper, a three-dimensional (3-D) integral imaging (II) system to improve the viewing angle by using
the multiple illuminations is proposed. In this system, three collimated illuminations that are directed to
three different angles in order to get widen propagation angle of point light source (PLS). Among three
illuminations two slanted illuminations increase the propagation angle of PLS over the conventional
method. Simulation result shows that the viewing angle of proposed PLS displays is three times larger than
conventional PLS displays. In the simulation, we used Light Tools 6.3 to reconstruct an object.
Target Detection by Fuzzy Gustafson-Kessel AlgorithmCSCJournals
Many commercially available radar systems offer a range of filter options but the problem of clutter rejection for target detection is still present in a number of situations. Rejection of clutter and detection of targets from radar captured data is a challenging task. Raw data captured by radar are not always scaled. A normalization technique has been proposed which transforms the radar captured data into 8 bit. As 8 bit data is easy to analyze and visualize. A modification on Fuzzy c-means has been done by developing Fuzzy Gustafson–Kessel (FGK) algorithm and the result shows robustness of this proposed method.
Kernel Estimation of Videodeblurringalgorithm and Motion Compensation of Resi...IJERA Editor
This paper presents a videodeblurring algorithm utilizing the high resolution information of adjacent unblurredframes.First, two motion-compensated predictors of a blurred frame are derived from its neighboring unblurred frames via bidirectional motion compensation. Then, an accurate blur kernel, which is difficult to directly obtain from the blurred frame itself, is computed between the predictors and the blurred frame. Next, a residual deconvolution is employed to reduce the ringing artifacts inherently caused by conventional deconvolution. The blur kernel estimation and deconvolution processes are iteratively performed for the deblurred frame. Experimental results show that the proposed algorithm provides sharper details and smaller artifacts than the state-of-the-art algorithms.
International Journal of Engineering and Science Invention (IJESI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJESI publishes research articles and reviews within the whole field Engineering Science and Technology, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online.
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral ImagesIDES Editor
Hyperspectral images can be efficiently compressed
through a linear predictive model, as for example the one
used in the SLSQ algorithm. In this paper we exploit this
predictive model on the AVIRIS images by individuating,
through an off-line approach, a common subset of bands, which
are not spectrally related with any other bands. These bands
are not useful as prediction reference for the SLSQ 3-D
predictive model and we need to encode them via other
prediction strategies which consider only spatial correlation.
We have obtained this subset by clustering the AVIRIS bands
via the clustering by compression approach. The main result
of this paper is the list of the bands, not related with the
others, for AVIRIS images. The clustering trees obtained for
AVIRIS and the relationship among bands they depict is also
an interesting starting point for future research.
DETECTION OF POWER-LINES IN COMPLEX NATURAL SURROUNDINGScsandit
Power transmission line inspection using Unmanned Aerial Vehicles (UAV) is taking off as an
exciting solution due to advances in sensors and flight technology. Extracting power-lines from
aerial images, taken from the UAV, having complex natural surroundings is a critical task in the
above problem. In this paper we propose an approach for suppressing natural surrounding that
leads to power line detection. The results of applying our method on real-life video frames taken
from a UAV demonstrate that our approach is very effective. We believe that our approach can
be easily used for line detection in any other real outdoor video as well.
Integral imaging three dimensional (3 d)IJCI JOURNAL
In this paper, a three-dimensional (3-D) integral imaging (II) system to improve the viewing angle by using
the multiple illuminations is proposed. In this system, three collimated illuminations that are directed to
three different angles in order to get widen propagation angle of point light source (PLS). Among three
illuminations two slanted illuminations increase the propagation angle of PLS over the conventional
method. Simulation result shows that the viewing angle of proposed PLS displays is three times larger than
conventional PLS displays. In the simulation, we used Light Tools 6.3 to reconstruct an object.
Target Detection by Fuzzy Gustafson-Kessel AlgorithmCSCJournals
Many commercially available radar systems offer a range of filter options but the problem of clutter rejection for target detection is still present in a number of situations. Rejection of clutter and detection of targets from radar captured data is a challenging task. Raw data captured by radar are not always scaled. A normalization technique has been proposed which transforms the radar captured data into 8 bit. As 8 bit data is easy to analyze and visualize. A modification on Fuzzy c-means has been done by developing Fuzzy Gustafson–Kessel (FGK) algorithm and the result shows robustness of this proposed method.
Kernel Estimation of Videodeblurringalgorithm and Motion Compensation of Resi...IJERA Editor
This paper presents a videodeblurring algorithm utilizing the high resolution information of adjacent unblurredframes.First, two motion-compensated predictors of a blurred frame are derived from its neighboring unblurred frames via bidirectional motion compensation. Then, an accurate blur kernel, which is difficult to directly obtain from the blurred frame itself, is computed between the predictors and the blurred frame. Next, a residual deconvolution is employed to reduce the ringing artifacts inherently caused by conventional deconvolution. The blur kernel estimation and deconvolution processes are iteratively performed for the deblurred frame. Experimental results show that the proposed algorithm provides sharper details and smaller artifacts than the state-of-the-art algorithms.
International Journal of Engineering and Science Invention (IJESI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJESI publishes research articles and reviews within the whole field Engineering Science and Technology, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online.
Design of c slotted microstrip antenna using artificial neural network modeleSAT Journals
Abstract In this paper, neural network model has been used to estimation of resonance frequency of a coaxial feed C-slotted Microstrip Antenna. The Multi-Layer Perceptron Feed forward back Propagation (MLPFFBP) and Radial basis function Artificial Neural Network (RBFANN) have been used to implement the neural network model. A relative performance analysis of the proposed neural network for different training algorithms. Number of neurons and number of hidden layer is also carried out for estimating the resonance frequency. The method of moment (MOM) based IE3D software was used to generate data dictionary for training and validation set of ANN. The results obtain using ANN are compared with simulation feeding and found quite satisfactory and also it is concluded that RBFANN network is more accurate and fast compared to MLPFFBP network algorithm. Index Terms: Artificial Neural Network, C slot, Microstrip Antenna, Multilayer Feed Forward Networks, Radial basis function Artificial Neural Network, Resonance frequency.
BER Performance of Antenna Array-Based Receiver using Multi-user Detection in...ijwmn
Antenna promises to provide significant increases in system capacity and performance in
wireless systems. In this paper, a simplified, near-optimum array receiver is proposed,
which is based on the angular gain of the spatial filter. This detection is then analyzed by
calculating the exact error probability.The proposed model confirms the benefits of adaptive
antennas in reducing the overall interference level (intercell/intracell) and to find an
accurate approximation of the error probability. We extend the method that has been
proposed for propagation over Nakagami-m fading channels, the model shows good
agreements with simulation results.
Image resolution enhancement using blind techniqueeSAT Journals
Abstract Image resolution enhancement (IRE) is the process of manipulating a set of low quality images and produce high quality and high resolution images. The two groups of techniques to increase the apparent resolution of the imaging system are Blind deconvolution (BD) and Super-resolution (SR).Most publications on BD/SR are non-blind, i.e., do not explicitly consider blur identification during the reconstruction procedure. This technical paper, we focuses on various methods of super resolution ,blind deconvolution and unifying blind approach to the blind deconvolution and super resolution problem i.e., methods that combine blur identification and image restoration into a single procedure, e.g. alternating minimization (AM). Keywords: Blind Decovolution (BD), Super Resolution (SR), Alternating Minimization (AM)
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
A Scheme for Joint Signal Reconstruction in Wireless Multimedia Sensor Networksijma
In context aware wireless multimedia sensor networks, scenarios are usually such that
signals of multiple distributed sensors contain a common sparse component and each individual
signal owns an innovation sparse component. So distributed compressive sensing based on joint
sparsity of a signal ensemble concept exploits both these intra- and inter- signal correlation structures
and compress signals to the extent possible. This paper proposes an optimized reconstruction
scheme based on joint sparsity model which is derived from the distributed compressive sensing. In
this regard, based on distributed compressive sensing, a joint reconstruction scheme is proposed to
compress and reconstruct ensemble of signals even in large scale data transmission. Furthermore,
simulation results show the effectiveness of the proposed method in diverse compression ratios and
processing times in comparison with the joint sparsity model and individual compressive sensing
reconstruction methods.
This paper presents a new approach for the enhancement of Synthetic Radar Imagery using Discrete Wavelet Transform and its variants. Some of the approaches like nonlocal filtering (NLF) techniques, and multiscale iterative reconstruction (e.g., the BM3D method) do not solve the RE/SR imaging inverse problems in descriptive settings imposing some structured regularization constraints and exploits the sparsity of the desired image representations for resolution enhancement (RE) and superresolution (SR) of coherent remote sensing (RS). Such approaches are not properly adapted to the SR recovery of the speckle-corrupted low resolution (LR) coherent radar imagery. These pitfalls are eradicated by using DWT approach wherein the despeckled/deblurred HR image is recovered from the LR speckle/blurry corrupted radar image by applying some of the descriptive-experiment-design-regularization (DEDR) based re-constructive steps. Next, the multistage RE is consequently performed in each scaled refined SR frame via the iterative reconstruction of the upscaled radar images, followed by the discrete-wavelet-transform-based sparsity promoting denoising with guaranteed consistency preservation in each resolution frame. The performance of the method proposed is compared in terms of the number of iterations taken by it with other techniques existing in the literature.
ANALYSIS OF INTEREST POINTS OF CURVELET COEFFICIENTS CONTRIBUTIONS OF MICROS...sipij
This paper focuses on improved edge model based on Curvelet coefficients analysis. Curvelet transform is
a powerful tool for multiresolution representation of object with anisotropic edge. Curvelet coefficients
contributions have been analyzed using Scale Invariant Feature Transform (SIFT), commonly used to study
local structure in images. The permutation of Curvelet coefficients from original image and edges image
obtained from gradient operator is used to improve original edges. Experimental results show that this
method brings out details on edges when the decomposition scale increases.
Survey on Single image Super Resolution TechniquesIOSR Journals
Super-resolution is the process of recovering a high-resolution image from multiple lowresolutionimages
of the same scene. The key objective of super-resolution (SR) imaging is to reconstruct a
higher-resolution image based on a set of images, acquired from the same scene and denoted as ‘lowresolution’
images, to overcome the limitation and/or ill-posed conditions of the image acquisition process for
facilitating better content visualization and scene recognition. In this paper, we provide a comprehensive review
of existing super-resolution techniques and highlight the future research challenges. This includes the
formulation of an observation model and coverage of the dominant algorithm – Iterative back projection.We
critique these methods and identify areas which promise performance improvements. In this paper, future
directions for super-resolution algorithms are discussed. Finally results of available methods are given.
Detection of Bridges using Different Types of High Resolution Satellite Imagesidescitation
Automatic detection of geographical objects such as roads, buildings and bridges
from remote sensing imagery is a very meaningful but difficult work. Bridges over water is
a typical geographical object and its automatic detection is of great significance for many
applications. Finding Region Of Interest (ROI) having water areas alone is the most crucial
task in bridge detection. This can be done with image processing / soft computing methods
using images in spatial domain or with Normalized Differential Water Index (NDWI) using
images in spectral domain. We have developed an efficient algorithm for bridge detection
where the ROI segmentation is done using both methods. Exact locations of bridges are
obtained by knowledge models and spatial resolution of the image. These knowledge models
are applied in the algorithm in such a way that the thresholds are automatically fixed
depending on the quality of the image. Using the algorithm any type of bridges are extracted
irrespective of their inclination and shape.
Remote sensing image fusion using contourlet transform with sharp frequency l...Zac Darcy
This paper addresses four different aspects of the remote sensing image fusion: i) image fusion method, ii)
quality analysis of fusion results, iii) effects of image decomposition level, and iv) importance of image
registration. First, a new contourlet-based image fusion method is presented, which is an improvement
over the wavelet-based fusion. This fusion method is then utilized withinthe main fusion process to analyze
the final fusion results. Fusion framework, scheme and datasets used in the study are discussed in detail.
Second, quality analysis of the fusion results is discussed using various quantitative metrics for both spatial
and spectral analyses. Our results indicate that the proposed contourlet-based fusion method performs
better than the conventional wavelet-based fusion methodsin terms of both spatial and spectral analyses.
Third, we conducted an analysis on the effects of the image decomposition level and observed that the
decomposition level of 3 produced better fusion results than both smaller and greater number of levels.
Last, we created four different fusion scenarios to examine the importance of the image registration. As a
result, the feature-based image registration using the edge features of the source images produced better
fusion results than the intensity-based imageregistration.
IMPROVEMENT OF BM3D ALGORITHM AND EMPLOYMENT TO SATELLITE AND CFA IMAGES DENO...ijistjournal
This paper proposes a new procedure in order to improve the performance of block matching and 3-D filtering (BM3D) image denoising algorithm. It is demonstrated that it is possible to achieve a better performance than that of BM3D algorithm in a variety of noise levels. This method changes BM3D algorithm parameter values according to noise level, removes prefiltering, which is used in high noise level; therefore Peak Signal-to-Noise Ratio (PSNR) and visual quality get improved, and BM3D complexities and processing time are reduced. This improved BM3D algorithm is extended and used to denoise satellite and color filter array (CFA) images. Output results show that the performance has upgraded in comparison with current methods of denoising satellite and CFA images. In this regard this algorithm is compared with Adaptive PCA algorithm, that has led to superior performance for denoising CFA images, on the subject of PSNR and visual quality. Also the processing time has decreased significantly.
On the Performance Analysis of Composite Multipath/Shadowing (Weibull-Log Nor...IJEEE
Composite multipath/shadowing fading environments are frequently encountered in different mobile realistic scenarios. These channels are generally modeled differentComposite multipath/shadowing fading. In this paper wepresent the performance analysis of composite (Weibull-Lognormal shadowed) fading. We adopt efficient toolproposed by Holtzman to approximate composite (Weibull-Lognormal shadowed) fading. The performance measures offading communication systems such as Probability densityfunction (PDF) of Signal to Noise ratio (SNR), Amount offading (AF), Outage probability (Pout) and ChannelCapacity(C/B) will be calculated. Graphical results will bepresented for different signals and fading parameters. Thedifferent expressions that will be provided are of greatimportance in assessing the performance of communicationsystems in composite channels.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Efficient 3D stereo vision stabilization for multi-camera viewpointsjournalBEEI
In this paper, an algorithm is developed in 3D Stereo vision to improve image stabilization process for multi-camera viewpoints. Finding accurate unique matching key-points using Harris Laplace corner detection method for different photometric changes and geometric transformation in images. Then improved the connectivity of correct matching pairs by minimizing
the global error using spanning tree algorithm. Tree algorithm helps to stabilize randomly positioned camera viewpoints in linear order. The unique matching key-points will be calculated only once with our method.
Then calculated planar transformation will be applied for real time video rendering. The proposed algorithm can process more than 200 camera viewpoints within two seconds.
Comparative Study of Compressive Sensing Techniques For Image EnhancementCSCJournals
Compressive Sensing is a new way of sampling signals at a sub-Nyquist rate. For many signals, this revolutionary technology strongly relies on the sparsity of the signal and incoherency between sensing basis and representation basis. In this work, compressed sensing method is proposed to reduce the noise of the image signal. Noise reduction and image reconstruction are formulated in the theoretical framework of compressed sensing using Basis Pursuit de-noising (BPDN) and Compressive Sampling Matching Pursuit (CoSaMP) algorithm when random measurement matrix is utilized to acquire the data. Ultimately, it is demonstrated that the proposed methods can't perfectly recover the image signal. Therefore, we have used a complementary approach for enhancing the performance of CS recovery with non-sparse signals. In this work, we have used a new designed CS recovery framework, called De-noising-based Approximate Message Passing (D-AMP). This method uses a de-noising algorithm to recover signals from compressive measurements. For de-noising purpose the Non-Local Means (NLM), Bayesian Least Squares Gaussian Scale Mixtures (BLS-GSM) and Block Matching 3D collaborative have been used. Also, in this work, we have evaluated the performance of our proposed image enhancement methods using the quality measure peak signal-to-noise ratio (PSNR).
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
Design and implementation of microstrip rotman lens for ISM band applicationsjournalBEEI
This work presents the design and implementation of Rotman lens as a beam steering device for Industrial, Scientific, and Medical (ISM) applications. 2.45 GHz is considered as a center frequency design with (2-6) GHz frequency bandwidth. The beam steering is examined to cover ±21o scan angle with maximum main lobe magnitude 10.1 dBi, rectangular patch antennas are used as radiation elements to beam the output far field. The work is extended to compare between the tapered line which is used for matching between 50-Ω ports and lens cavity. CST microwave simulation studio results show that the rectangular taper line can yield 2 dB return loss less than linear taper line with a little bit shifting in responses for same input and load impedance.
Design of c slotted microstrip antenna using artificial neural network modeleSAT Journals
Abstract In this paper, neural network model has been used to estimation of resonance frequency of a coaxial feed C-slotted Microstrip Antenna. The Multi-Layer Perceptron Feed forward back Propagation (MLPFFBP) and Radial basis function Artificial Neural Network (RBFANN) have been used to implement the neural network model. A relative performance analysis of the proposed neural network for different training algorithms. Number of neurons and number of hidden layer is also carried out for estimating the resonance frequency. The method of moment (MOM) based IE3D software was used to generate data dictionary for training and validation set of ANN. The results obtain using ANN are compared with simulation feeding and found quite satisfactory and also it is concluded that RBFANN network is more accurate and fast compared to MLPFFBP network algorithm. Index Terms: Artificial Neural Network, C slot, Microstrip Antenna, Multilayer Feed Forward Networks, Radial basis function Artificial Neural Network, Resonance frequency.
BER Performance of Antenna Array-Based Receiver using Multi-user Detection in...ijwmn
Antenna promises to provide significant increases in system capacity and performance in
wireless systems. In this paper, a simplified, near-optimum array receiver is proposed,
which is based on the angular gain of the spatial filter. This detection is then analyzed by
calculating the exact error probability.The proposed model confirms the benefits of adaptive
antennas in reducing the overall interference level (intercell/intracell) and to find an
accurate approximation of the error probability. We extend the method that has been
proposed for propagation over Nakagami-m fading channels, the model shows good
agreements with simulation results.
Image resolution enhancement using blind techniqueeSAT Journals
Abstract Image resolution enhancement (IRE) is the process of manipulating a set of low quality images and produce high quality and high resolution images. The two groups of techniques to increase the apparent resolution of the imaging system are Blind deconvolution (BD) and Super-resolution (SR).Most publications on BD/SR are non-blind, i.e., do not explicitly consider blur identification during the reconstruction procedure. This technical paper, we focuses on various methods of super resolution ,blind deconvolution and unifying blind approach to the blind deconvolution and super resolution problem i.e., methods that combine blur identification and image restoration into a single procedure, e.g. alternating minimization (AM). Keywords: Blind Decovolution (BD), Super Resolution (SR), Alternating Minimization (AM)
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
A Scheme for Joint Signal Reconstruction in Wireless Multimedia Sensor Networksijma
In context aware wireless multimedia sensor networks, scenarios are usually such that
signals of multiple distributed sensors contain a common sparse component and each individual
signal owns an innovation sparse component. So distributed compressive sensing based on joint
sparsity of a signal ensemble concept exploits both these intra- and inter- signal correlation structures
and compress signals to the extent possible. This paper proposes an optimized reconstruction
scheme based on joint sparsity model which is derived from the distributed compressive sensing. In
this regard, based on distributed compressive sensing, a joint reconstruction scheme is proposed to
compress and reconstruct ensemble of signals even in large scale data transmission. Furthermore,
simulation results show the effectiveness of the proposed method in diverse compression ratios and
processing times in comparison with the joint sparsity model and individual compressive sensing
reconstruction methods.
This paper presents a new approach for the enhancement of Synthetic Radar Imagery using Discrete Wavelet Transform and its variants. Some of the approaches like nonlocal filtering (NLF) techniques, and multiscale iterative reconstruction (e.g., the BM3D method) do not solve the RE/SR imaging inverse problems in descriptive settings imposing some structured regularization constraints and exploits the sparsity of the desired image representations for resolution enhancement (RE) and superresolution (SR) of coherent remote sensing (RS). Such approaches are not properly adapted to the SR recovery of the speckle-corrupted low resolution (LR) coherent radar imagery. These pitfalls are eradicated by using DWT approach wherein the despeckled/deblurred HR image is recovered from the LR speckle/blurry corrupted radar image by applying some of the descriptive-experiment-design-regularization (DEDR) based re-constructive steps. Next, the multistage RE is consequently performed in each scaled refined SR frame via the iterative reconstruction of the upscaled radar images, followed by the discrete-wavelet-transform-based sparsity promoting denoising with guaranteed consistency preservation in each resolution frame. The performance of the method proposed is compared in terms of the number of iterations taken by it with other techniques existing in the literature.
ANALYSIS OF INTEREST POINTS OF CURVELET COEFFICIENTS CONTRIBUTIONS OF MICROS...sipij
This paper focuses on improved edge model based on Curvelet coefficients analysis. Curvelet transform is
a powerful tool for multiresolution representation of object with anisotropic edge. Curvelet coefficients
contributions have been analyzed using Scale Invariant Feature Transform (SIFT), commonly used to study
local structure in images. The permutation of Curvelet coefficients from original image and edges image
obtained from gradient operator is used to improve original edges. Experimental results show that this
method brings out details on edges when the decomposition scale increases.
Survey on Single image Super Resolution TechniquesIOSR Journals
Super-resolution is the process of recovering a high-resolution image from multiple lowresolutionimages
of the same scene. The key objective of super-resolution (SR) imaging is to reconstruct a
higher-resolution image based on a set of images, acquired from the same scene and denoted as ‘lowresolution’
images, to overcome the limitation and/or ill-posed conditions of the image acquisition process for
facilitating better content visualization and scene recognition. In this paper, we provide a comprehensive review
of existing super-resolution techniques and highlight the future research challenges. This includes the
formulation of an observation model and coverage of the dominant algorithm – Iterative back projection.We
critique these methods and identify areas which promise performance improvements. In this paper, future
directions for super-resolution algorithms are discussed. Finally results of available methods are given.
Detection of Bridges using Different Types of High Resolution Satellite Imagesidescitation
Automatic detection of geographical objects such as roads, buildings and bridges
from remote sensing imagery is a very meaningful but difficult work. Bridges over water is
a typical geographical object and its automatic detection is of great significance for many
applications. Finding Region Of Interest (ROI) having water areas alone is the most crucial
task in bridge detection. This can be done with image processing / soft computing methods
using images in spatial domain or with Normalized Differential Water Index (NDWI) using
images in spectral domain. We have developed an efficient algorithm for bridge detection
where the ROI segmentation is done using both methods. Exact locations of bridges are
obtained by knowledge models and spatial resolution of the image. These knowledge models
are applied in the algorithm in such a way that the thresholds are automatically fixed
depending on the quality of the image. Using the algorithm any type of bridges are extracted
irrespective of their inclination and shape.
Remote sensing image fusion using contourlet transform with sharp frequency l...Zac Darcy
This paper addresses four different aspects of the remote sensing image fusion: i) image fusion method, ii)
quality analysis of fusion results, iii) effects of image decomposition level, and iv) importance of image
registration. First, a new contourlet-based image fusion method is presented, which is an improvement
over the wavelet-based fusion. This fusion method is then utilized withinthe main fusion process to analyze
the final fusion results. Fusion framework, scheme and datasets used in the study are discussed in detail.
Second, quality analysis of the fusion results is discussed using various quantitative metrics for both spatial
and spectral analyses. Our results indicate that the proposed contourlet-based fusion method performs
better than the conventional wavelet-based fusion methodsin terms of both spatial and spectral analyses.
Third, we conducted an analysis on the effects of the image decomposition level and observed that the
decomposition level of 3 produced better fusion results than both smaller and greater number of levels.
Last, we created four different fusion scenarios to examine the importance of the image registration. As a
result, the feature-based image registration using the edge features of the source images produced better
fusion results than the intensity-based imageregistration.
IMPROVEMENT OF BM3D ALGORITHM AND EMPLOYMENT TO SATELLITE AND CFA IMAGES DENO...ijistjournal
This paper proposes a new procedure in order to improve the performance of block matching and 3-D filtering (BM3D) image denoising algorithm. It is demonstrated that it is possible to achieve a better performance than that of BM3D algorithm in a variety of noise levels. This method changes BM3D algorithm parameter values according to noise level, removes prefiltering, which is used in high noise level; therefore Peak Signal-to-Noise Ratio (PSNR) and visual quality get improved, and BM3D complexities and processing time are reduced. This improved BM3D algorithm is extended and used to denoise satellite and color filter array (CFA) images. Output results show that the performance has upgraded in comparison with current methods of denoising satellite and CFA images. In this regard this algorithm is compared with Adaptive PCA algorithm, that has led to superior performance for denoising CFA images, on the subject of PSNR and visual quality. Also the processing time has decreased significantly.
On the Performance Analysis of Composite Multipath/Shadowing (Weibull-Log Nor...IJEEE
Composite multipath/shadowing fading environments are frequently encountered in different mobile realistic scenarios. These channels are generally modeled differentComposite multipath/shadowing fading. In this paper wepresent the performance analysis of composite (Weibull-Lognormal shadowed) fading. We adopt efficient toolproposed by Holtzman to approximate composite (Weibull-Lognormal shadowed) fading. The performance measures offading communication systems such as Probability densityfunction (PDF) of Signal to Noise ratio (SNR), Amount offading (AF), Outage probability (Pout) and ChannelCapacity(C/B) will be calculated. Graphical results will bepresented for different signals and fading parameters. Thedifferent expressions that will be provided are of greatimportance in assessing the performance of communicationsystems in composite channels.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Efficient 3D stereo vision stabilization for multi-camera viewpointsjournalBEEI
In this paper, an algorithm is developed in 3D Stereo vision to improve image stabilization process for multi-camera viewpoints. Finding accurate unique matching key-points using Harris Laplace corner detection method for different photometric changes and geometric transformation in images. Then improved the connectivity of correct matching pairs by minimizing
the global error using spanning tree algorithm. Tree algorithm helps to stabilize randomly positioned camera viewpoints in linear order. The unique matching key-points will be calculated only once with our method.
Then calculated planar transformation will be applied for real time video rendering. The proposed algorithm can process more than 200 camera viewpoints within two seconds.
Comparative Study of Compressive Sensing Techniques For Image EnhancementCSCJournals
Compressive Sensing is a new way of sampling signals at a sub-Nyquist rate. For many signals, this revolutionary technology strongly relies on the sparsity of the signal and incoherency between sensing basis and representation basis. In this work, compressed sensing method is proposed to reduce the noise of the image signal. Noise reduction and image reconstruction are formulated in the theoretical framework of compressed sensing using Basis Pursuit de-noising (BPDN) and Compressive Sampling Matching Pursuit (CoSaMP) algorithm when random measurement matrix is utilized to acquire the data. Ultimately, it is demonstrated that the proposed methods can't perfectly recover the image signal. Therefore, we have used a complementary approach for enhancing the performance of CS recovery with non-sparse signals. In this work, we have used a new designed CS recovery framework, called De-noising-based Approximate Message Passing (D-AMP). This method uses a de-noising algorithm to recover signals from compressive measurements. For de-noising purpose the Non-Local Means (NLM), Bayesian Least Squares Gaussian Scale Mixtures (BLS-GSM) and Block Matching 3D collaborative have been used. Also, in this work, we have evaluated the performance of our proposed image enhancement methods using the quality measure peak signal-to-noise ratio (PSNR).
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
Design and implementation of microstrip rotman lens for ISM band applicationsjournalBEEI
This work presents the design and implementation of Rotman lens as a beam steering device for Industrial, Scientific, and Medical (ISM) applications. 2.45 GHz is considered as a center frequency design with (2-6) GHz frequency bandwidth. The beam steering is examined to cover ±21o scan angle with maximum main lobe magnitude 10.1 dBi, rectangular patch antennas are used as radiation elements to beam the output far field. The work is extended to compare between the tapered line which is used for matching between 50-Ω ports and lens cavity. CST microwave simulation studio results show that the rectangular taper line can yield 2 dB return loss less than linear taper line with a little bit shifting in responses for same input and load impedance.
Design of wideband Rotman lens for wireless applicationsTELKOMNIKA JOURNAL
An electrically steerable beam is an essential standard in the recent wireless application in order
to increase the gain and reduce the interference. However, high performance of amplitude besides low
phase error difficult to achieve without indicators are used to set lens parameters to desired optimum
performance design level. In this paper, the introduced microstrip lens has examined a comprehensive
explanation for parameters and indications amid a full wave structure methodology. Further, Phase and
energy coupling between excited ports and received ports besides phase error and its relation with
the lens parameters design are explained in detailed. A wideband beamforming network based on a
printed microstrip Rotman lens with a ±26o scanning angle was designed in this study. The designed lens
operates at 2.45 GHz with 592 MHz bandwidth. The lens consists of five switchable ports (input ports) with
four output ports that connected to the microstrip patch antennas. The five switchable ports were used to
realize the scanning beams angle in the azimuth plane. The proposed model is simulated by CST
Microwave Studio and fabricated on FR-4 with 1.565 mm thickness and 4.2 permittivity. A good agreement
between simulation and measurement results were achieved.
Designing geometric parameters of axisymmetrical cassegrain antenna and corru...Editor Jacotech
Early detection of faults occurring in three-phase induction motors can appreciably reduce the costs of maintenance, which could otherwise be too much costly to repair. Internal faults in three phase induction motors can result in significant performance degradation and eventual system failures. Artificial intelligence techniques have numerous advantages over conventional Model-based and Signal Processing fault diagnostic approaches; therefore, in this paper, a soft-computing system was studied through Neural Network Analysis to detect and diagnose the stator and rotor faults. The fault diagnostic system for three-phase induction motors samples the fault symptoms and then uses a Neural Network model to first train and then identify the fault which gives fast accurate diagnostics. This approach can also be extended to other applications.
Microstrip patch antenna for pcs and wlaneSAT Journals
Abstract Due to development in wireless devices, it poses a new challenge for the design of an antenna in wireless communication. Patch antennas are well suited for various wireless application systems due to their low weight, low profile, versatility, conformability, low cost and low sensitivity to manufacturing tolerances. This paper present design, simulation of a rectangular micro strip antenna for WLAN and PCS. The aim of the work is to design reliable broadband, compact patch antenna for wireless devices. Antenna is proposed which is providing circular polarization, dual band, resonant frequencies at 1.9 GHz, 2.4 GHz. Key Words: Patch antenna, co-axial feeding, polarization, dual band, HFSS …
A new approach for impedance matching rotman lens using defected ground struc...journalBEEI
Many recent radar applications and smart antenna are based on the electronically steerable beam in order to increase the performance of targeting the desired scan angle with the high performance of gain and directivity. Scanning angle with ±26o based on Microstrip Rotman lens and design frequency 2.45 GHz is presented in this study. Five beam ports provide five output beams directed the beams in five different scanning angles in the azimuth plane is provided. The traditional matching method by tapering the transmission line in order to guarantee a smooth energy transition from the 50 Ω input ports is replaced by Defected Ground Structure to achieve an acceptable return loss with a linear progressive phase for each beam port. The new approach is providing increasing in the scan angle. Besides, the size miniaturization is achieved by removing the tapering length and reduces the total size of the lens length by 23.67 mm. The proposed model is implemented using Computer Simulation Technology (CST) using the FR-4 substrate and the measurements lead to a good validation.
Available online at [www.ijeete.com]EFFECT OF DISPERSION AND FIBER LENGTH ON ...Ankur Bindal
This paper introduces the non linear optical effect known as four wave mixing (FWM). In wavelength division multiplexing (WDM) systems four wave mixing can strongly affect the transmission performance on an optical link. As a result it is important to investigate the impact of FWM on the design and performance of WDM optical communication systems. The main objective of this paper is to analyze the FWM power for different values of fiber length and dispersion by designing and simulating a model in Optisim. In this paper, we have simulated the FWM design for three waves. The results obtained show that when the optical fiber length and dispersion value is increased FWM effect reduces. This result confirms that the fiber nonlinearities play decisive role in the WDM.
Modelling Optical Waveguide Bends by the Method of LinesTELKOMNIKA JOURNAL
A rigorous analytical and semi analytical method of lines has been used to calculate the
transverse-electric field attenuation coefficient of guided mode as it travels in waveguide bends structure.
Both approaches then were compared to get a better understanding on how the attenuation behaves along
single curve waveguides with constant radius of curvature. The Helmholtz Equation in polar coordinate
was transformed into a curvalinier coordinate to simulate the waveguide bends using the method of line
analysis. The simple absorption boundary conditions are used into the method of lines to demonstrate
evanescent field of the guided mode nature as its travels in waveguide bends structures. The results show
that a reasonable agreement between both theoretical approaches.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Propagation Model for Tree Blockage in Mobile Communication Systems using Uni...IJEEE
A deterministic model for spherical wave propagation in microcellular urban environment is presented. This methodis based on ray tracing and uniform theory of diffraction. The various ray contributions includes the diffraction from corner of obstacle, reflection from ground and direct wave. According to the height of transmitting station, different ray paths will be presented in the received signal. Calculation is carried out using hard and soft polarization. Results can be used for the planning of new cellular system.
Power System State Estimation - A ReviewIDES Editor
The aim of this article is to provide a comprehensive
survey on power system state estimation techniques. The
algorithms used for finding the system states under both static
and dynamic state estimations are discussed in brief. The
authors are opinion that the scope of pursuing research in the
area of state estimation with PMU and SCADA measurements
is the state of the art and timely.
Artificial Intelligence Technique based Reactive Power Planning Incorporating...IDES Editor
Reactive Power Planning is a major concern in the
operation and control of power systems This paper compares
the effectiveness of Evolutionary Programming (EP) and
New Improved Differential Evolution (NIMDE) to solve
Reactive Power Planning (RPP) problem incorporating
FACTS Controllers like Static VAR Compensator (SVC),
Thyristor Controlled Series Capacitor (TCSC) and Unified
power flow controller (UPFC) considering voltage stability.
With help of Fast Voltage Stability Index (FVSI), the critical
lines and buses are identified to install the FACTS controllers.
The optimal settings of the control variables of the generator
voltages,transformer tap settings and allocation and parameter
settings of the SVC,TCSC,UPFC are considered for reactive
power planning. The test and Validation of the proposed
algorithm are conducted on IEEE 30–bus system and 72-bus
Indian system.Simulation results shows that the UPFC gives
better results than SVC and TCSC and the FACTS controllers
reduce the system losses.
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...IDES Editor
Damping of power system oscillations with the help
of proposed optimal Proportional Integral Derivative Power
System Stabilizer (PID-PSS) and Static Var Compensator
(SVC)-based controllers are thoroughly investigated in this
paper. This study presents robust tuning of PID-PSS and
SVC-based controllers using Genetic Algorithms (GA) in
multi machine power systems by considering detailed model
of the generators (model 1.1). The effectiveness of FACTSbased
controllers in general and SVC-based controller in
particular depends upon their proper location. Modal
controllability and observability are used to locate SVC–based
controller. The performance of the proposed controllers is
compared with conventional lead-lag power system stabilizer
(CPSS) and demonstrated on 10 machines, 39 bus New England
test system. Simulation studies show that the proposed genetic
based PID-PSS with SVC based controller provides better
performance.
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...IDES Editor
This paper presents the need to operate the power
system economically and with optimum levels of voltages has
further led to an increase in interest in Distributed
Generation. In order to reduce the power losses and to improve
the voltage in the distribution system, distributed generators
(DGs) are connected to load bus. To reduce the total power
losses in the system, the most important process is to identify
the proper location for fixing and sizing of DGs. It presents a
new methodology using a new population based meta heuristic
approach namely Artificial Bee Colony algorithm(ABC) for
the placement of Distributed Generators(DG) in the radial
distribution systems to reduce the real power losses and to
improve the voltage profile, voltage sag mitigation. The power
loss reduction is important factor for utility companies because
it is directly proportional to the company benefits in a
competitive electricity market, while reaching the better power
quality standards is too important as it has vital effect on
customer orientation. In this paper an ABC algorithm is
developed to gain these goals all together. In order to evaluate
sag mitigation capability of the proposed algorithm, voltage
in voltage sensitive buses is investigated. An existing 20KV
network has been chosen as test network and results are
compared with the proposed method in the radial distribution
system.
Line Losses in the 14-Bus Power System Network using UPFCIDES Editor
Controlling power flow in modern power systems
can be made more flexible by the use of recent developments
in power electronic and computing control technology. The
Unified Power Flow Controller (UPFC) is a Flexible AC
transmission system (FACTS) device that can control all the
three system variables namely line reactance, magnitude and
phase angle difference of voltage across the line. The UPFC
provides a promising means to control power flow in modern
power systems. Essentially the performance depends on proper
control setting achievable through a power flow analysis
program. This paper presents a reliable method to meet the
requirements by developing a Newton-Raphson based load
flow calculation through which control settings of UPFC can
be determined for the pre-specified power flow between the
lines. The proposed method keeps Newton-Raphson Load Flow
(NRLF) algorithm intact and needs (little modification in the
Jacobian matrix). A MATLAB program has been developed to
calculate the control settings of UPFC and the power flow
between the lines after the load flow is converged. Case studies
have been performed on IEEE 5-bus system and 14-bus system
to show that the proposed method is effective. These studies
indicate that the method maintains the basic NRLF properties
such as fast computational speed, high degree of accuracy and
good convergence rate.
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...IDES Editor
The size and shape of opening in dam causes the
stress concentration, it also causes the stress variation in the
rest of the dam cross section. The gravity method of the analysis
does not consider the size of opening and the elastic property
of dam material. Thus the objective of study is comprises of
the Finite Element Method which considers the size of
opening, elastic property of material, and stress distribution
because of geometric discontinuity in cross section of dam.
Stress concentration inside the dam increases with the opening
in dam which results in the failure of dam. Hence it is
necessary to analyses large opening inside the dam. By making
the percentage area of opening constant and varying size and
shape of opening the analysis is carried out. For this purpose
a section of Koyna Dam is considered. Dam is defined as a
plane strain element in FEM, based on geometry and loading
condition. Thus this available information specified our path
of approach to carry out 2D plane strain analysis. The results
obtained are then compared mutually to get most efficient
way of providing large opening in the gravity dam.
Assessing Uncertainty of Pushover Analysis to Geometric ModelingIDES Editor
Pushover Analysis a popular tool for seismic
performance evaluation of existing and new structures and is
nonlinear Static procedure where in monotonically increasing
loads are applied to the structure till the structure is unable
to resist the further load .During the analysis, whatever the
strength of concrete and steel is adopted for analysis of
structure may not be the same when real structure is
constructed and the pushover analysis results are very sensitive
to material model adopted, geometric model adopted, location
of plastic hinges and in general to procedure followed by the
analyzer. In this paper attempt has been made to assess
uncertainty in pushover analysis results by considering user
defined hinges and frame modeled as bare frame and frame
with slab modeled as rigid diaphragm and results compared
with experimental observations. Uncertain parameters
considered includes the strength of concrete, strength of steel
and cover to the reinforcement which are randomly generated
and incorporated into the analysis. The results are then
compared with experimental observations.
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...IDES Editor
This paper is an attempt to base on auctions which
presents a frame work for the secure multi-party decision
protocols. In addition to the implementations which are very
light weighted, the main focus is on synchronizing security
features for avoiding agreements manipulations and reducing
the user traffic. Through this paper one can understand that
this different auction protocols on top of the frame work can
be collaborated using mobile devices. This paper present the
negotiation between auctioneer and the proffered and this
negotiation shows that multiparty security is far better than
the existing system.
Selfish Node Isolation & Incentivation using Progressive ThresholdsIDES Editor
The problems associated with selfish nodes in
MANET are addressed by a collaborative watchdog approach
which reduces the detection time for selfish nodes thereby
improves the performance and accuracy of watchdogs[1]. In
the related works they make use of credit based systems, reputation
based mechanisms, pathrater and watchdog mechanism
to detect such selfish nodes. In this paper we follow an approach
of collaborative watchdog which reduces the detection
time for selfish nodes and also involves the removal of such
selfish nodes based on some progressively assessed thresholds.
The threshold gives the nodes a chance to stop misbehaving
before it is permanently deleted from the network.
The node passes through several isolation processes before it
is permanently removed. Another version of AODV protocol
is used here which allows the simulation of selfish nodes in
NS2 by adding or modifying log files in the protocol.
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...IDES Editor
Wireless sensor networks are networks having non
wired infrastructure and dynamic topology. In OSI model each
layer is prone to various attacks, which halts the performance
of a network .In this paper several attacks on four layers of
OSI model are discussed and security mechanism is described
to prevent attack in network layer i.e wormhole attack. In
Wormhole attack two or more malicious nodes makes a covert
channel which attracts the traffic towards itself by depicting a
low latency link and then start dropping and replaying packets
in the multi-path route. This paper proposes promiscuous mode
method to detect and isolate the malicious node during
wormhole attack by using Ad-hoc on demand distance vector
routing protocol (AODV) with omnidirectional antenna. The
methodology implemented notifies that the nodes which are
not participating in multi-path routing generates an alarm
message during delay and then detects and isolate the
malicious node from network. We also notice that not only
the same kind of attacks but also the same kind of
countermeasures can appear in multiple layer. For example,
misbehavior detection techniques can be applied to almost all
the layers we discussed.
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...IDES Editor
The recent advancements in the wireless technology
and their wide-spread deployment have made remarkable
enhancements in efficiency in the corporate and industrial
and Military sectors The increasing popularity and usage of
wireless technology is creating a need for more secure wireless
Ad hoc networks. This paper aims researched and developed
a new protocol that prevents wormhole attacks on a ad hoc
network. A few existing protocols detect wormhole attacks but
they require highly specialized equipment not found on most
wireless devices. This paper aims to develop a defense against
wormhole attacks as an Anti-worm protocol which is based on
responsive parameters, that does not require as a significant
amount of specialized equipment, trick clock synchronization,
no GPS dependencies.
Cloud Security and Data Integrity with Client Accountability FrameworkIDES Editor
The Cloud based services provide much efficient
and seamless ways for data sharing across the cloud. The fact
that the data owners no longer possess data makes it very
difficult to assure data confidentiality and to enable secure
data sharing in the cloud. Despite of all its advantages this
will remain a major limitation that acts as a barrier to the
wider deployment of cloud based services. One of the possible
ways for ensuring trust in this aspect is the introduction of
accountability feature in the cloud computing scenario. The
Cloud framework requires promotion of distributed
accountability for such dynamic environment[1]. In some
works, there‘s an accountable framework suggested to ensure
distributed accountability for data sharing by the generation
of only a log of data access, but without any embedded feedback
mechanism for owner permission towards data
protection[2].The proposed system is an enhanced client
accountability framework which provides an additional client
side verification for each access towards enhanced security of
data. The integrity of content of data which resides in the
cloud service provider is also maintained by secured
outsourcing. Besides, the authentication of JAR(Java Archive)
files are done to ensure file protection and to maintain a safer
environment for data sharing. The analysis of various
functionalities of the framework depicts both the
accountability and security feature in an efficient manner.
Genetic Algorithm based Layered Detection and Defense of HTTP BotnetIDES Editor
A System state in HTTP botnet uses HTTP protocol
for the creation of chain of Botnets thereby compromising
other systems. By using HTTP protocol and port number 80,
attacks can not only be hidden but also pass through the
firewall without being detected. The DPR based detection
leads to better analysis of botnet attacks [3]. However, it
provides only probabilistic detection of the attacker and also
time consuming and error prone. This paper proposes a Genetic
algorithm based layered approach for detecting as well as
preventing botnet attacks. The paper reviews p2p firewall
implementation which forms the basis of filtering.
Performance evaluation is done based on precision, F-value
and probability. Layered approach reduces the computation
and overall time requirement [7]. Genetic algorithm promises
a low false positive rate.
Enhancing Data Storage Security in Cloud Computing Through SteganographyIDES Editor
in cloud computing data storage is a significant issue
because the entire data reside over a set of interconnected
resource pools that enables the data to be accessed through
virtual machines. It moves the application software’s and
databases to the large data centers where the management of
data is actually done. As the resource pools are situated over
various corners of the world, the management of data and
services may not be fully trustworthy. So, there are various
issues that need to be addressed with respect to the
management of data, service of data, privacy of data, security
of data etc. But the privacy and security of data is highly
challenging. To ensure privacy and security of data-at-rest in
cloud computing, we have proposed an effective and a novel
approach to ensure data security in cloud computing by means
of hiding data within images following is the concept of
steganography. The main objective of this paper is to prevent
data access from cloud data storage centers by unauthorized
users. This scheme perfectly stores data at cloud data storage
centers and retrieves data from it when it is needed.
The main tasks of a Wireless Sensor Network
(WSN) are data collection from its nodes and communication
of this data to the base station (BS). The protocols used for
communication among the WSN nodes and between the WSN
and the BS, must consider the resource constraints of nodes,
battery energy, computational capabilities and memory. The
WSN applications involve unattended operation of the network
over an extended period of time. In order to extend the lifetime
of a WSN, efficient routing protocols need to be adopted. The
proposed low power routing protocol based on tree-based
network structure reliably forwards the measured data towards
the BS using TDMA. An energy consumption analysis of the
WSN making use of this protocol is also carried out. It is
found that the network is energy efficient with an average
duty cycle of 0:7% for the WSN nodes. The OmNET++
simulation platform along with MiXiM framework is made
use of.
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...IDES Editor
The security of authentication of internet based
co-banking services should not be susceptible to high risks.
The passwords are highly vulnerable to virus attacks due to
the lack of high end embedding of security methods. In order
for the passwords to be more secure, people are generally
compelled to select jumbled up character based passwords
which are not only less memorable but are also equally prone
to insecurity. Multiple use of distributed shares has been
studied to solve the problem of authentication by algorithms
based on thresholding of pixels in image processing and visual
cryptography concepts where the subset of shares is considered
for the recovery of the original image for authentication using
correlation function[1][2].The main disadvantage in the above
study is the plain storage of shares and also one of the shares
is being supplied to the customer, which will lead to the
possibility of misuse by a third party. This paper proposes a
technique for scrambling of pixels by key based random
permutation (KBRP) within the shares before the
authentication has been attempted. Total number of shares to
be created is dependent on the multiplicity of ownership of
the account. By this method the problem of uncertainty among
the customers with regard to security, storage, retrieval of
holding of half of the shares is minimized.
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...IDES Editor
A microelectronic circuit of block-elements
functionally analogous to two hydrogen bonding networks is
investigated. The hydrogen bonding networks are extracted
from â-lactamase protein and are formed in its active site.
Each hydrogen bond of the network is described in equivalent
electrical circuit by three or four-terminal block-element.
Each block-element is coded in Matlab. Static and dynamic
analyses are performed. The resultant microelectronic circuit
analogous to the hydrogen bonding network operates as
current mirror, sine pulse source, triangular pulse source as
well as signal modulator.
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...IDES Editor
In this paper a method is proposed to discriminate
real world scenes in to natural and manmade scenes of similar
depth. Global-roughness of a scene image varies as a function
of image-depth. Increase in image depth leads to increase in
roughness in manmade scenes; on the contrary natural scenes
exhibit smooth behavior at higher image depth. This particular
arrangement of pixels in scene structure can be well explained
by local texture information in a pixel and its neighborhood.
Our proposed method analyses local texture information of a
scene image using texture unit matrix. For final classification
we have used both supervised and unsupervised learning using
K-Nearest Neighbor classifier (KNN) and Self Organizing
Map (SOM) respectively. This technique is useful for online
classification due to very less computational complexity.
Mental Stress Evaluation using an Adaptive ModelIDES Editor
Chronic stress can have serious physiological and
psychological impact on an individual’s health. Wearable
sensor systems can enable physicians to monitor physiological
variables and observe the impact of stress over long periods of
time. To correlate an individual’s physiological measures with
their perception of psychological stress, it is essential that
the stress monitoring system accounts for individual
differences in self-reporting. Self-reporting of stress is highly
subjective as it is dependent on an individual’s perception of
stress and thus prone to errors. In addition, subjects can tailor
their answers to present their behavior more favorably. In
this paper we present an adaptive model which allows recorded
stress scores and physiological variables to be tuned to remove
biases in self-reported scores. The model takes an individual’s
physiological and psychological responses into account and
adapts to the user’s variations. Using our adaptive model,
physiological data is mapped efficiently to perceived stress
levels with 90% accuracy.
Genetic Algorithm based Mosaic Image Steganography for Enhanced SecurityIDES Editor
The concept of mosaic steganography was proposed
by Lai and Tsai [4] for information hiding and retrieval using
techniques such as histogram value, greedy search algorithm,
and random permutation techniques. In the present paper, a
novel method is attempted in mosaic image steganography
using techniques such as Genetic algorithm, Key based
random permutation .The creation of a predefined database
of target images has been avoided. Instead, the randomly
selected image is used as the target image reduces the enforced
memory load results reduction in the space complexity .GA is
used to generate a mapping sequence for tile image hiding.
This has resulted in better clarity in the retrieved secret image
as well as reduction in computational complexity. The quality
of original cover image remains preserved in spite of the
embedded data image, thereby better security and robustness
is assured. The mosaic image is yielded by dividing the secret
image into fragments and embed these tile fragments into
the target image based on the mapping sequence by GA and
permuted the sequence again by KBRP with a key .The recovery
of the secret image is by using the same key and the mapping
sequence. This is found to be a lossless data hiding method.
Read| The latest issue of The Challenger is here! We are thrilled to announce that our school paper has qualified for the NATIONAL SCHOOLS PRESS CONFERENCE (NSPC) 2024. Thank you for your unwavering support and trust. Dive into the stories that made us stand out!
Operation “Blue Star” is the only event in the history of Independent India where the state went into war with its own people. Even after about 40 years it is not clear if it was culmination of states anger over people of the region, a political game of power or start of dictatorial chapter in the democratic setup.
The people of Punjab felt alienated from main stream due to denial of their just demands during a long democratic struggle since independence. As it happen all over the word, it led to militant struggle with great loss of lives of military, police and civilian personnel. Killing of Indira Gandhi and massacre of innocent Sikhs in Delhi and other India cities was also associated with this movement.
The Indian economy is classified into different sectors to simplify the analysis and understanding of economic activities. For Class 10, it's essential to grasp the sectors of the Indian economy, understand their characteristics, and recognize their importance. This guide will provide detailed notes on the Sectors of the Indian Economy Class 10, using specific long-tail keywords to enhance comprehension.
For more information, visit-www.vavaclasses.com
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdfTechSoup
In this webinar you will learn how your organization can access TechSoup's wide variety of product discount and donation programs. From hardware to software, we'll give you a tour of the tools available to help your nonprofit with productivity, collaboration, financial management, donor tracking, security, and more.
2024.06.01 Introducing a competency framework for languag learning materials ...Sandy Millin
http://sandymillin.wordpress.com/iateflwebinar2024
Published classroom materials form the basis of syllabuses, drive teacher professional development, and have a potentially huge influence on learners, teachers and education systems. All teachers also create their own materials, whether a few sentences on a blackboard, a highly-structured fully-realised online course, or anything in between. Despite this, the knowledge and skills needed to create effective language learning materials are rarely part of teacher training, and are mostly learnt by trial and error.
Knowledge and skills frameworks, generally called competency frameworks, for ELT teachers, trainers and managers have existed for a few years now. However, until I created one for my MA dissertation, there wasn’t one drawing together what we need to know and do to be able to effectively produce language learning materials.
This webinar will introduce you to my framework, highlighting the key competencies I identified from my research. It will also show how anybody involved in language teaching (any language, not just English!), teacher training, managing schools or developing language learning materials can benefit from using the framework.
How to Create Map Views in the Odoo 17 ERPCeline George
The map views are useful for providing a geographical representation of data. They allow users to visualize and analyze the data in a more intuitive manner.
Synthetic Fiber Construction in lab .pptxPavel ( NSTU)
Synthetic fiber production is a fascinating and complex field that blends chemistry, engineering, and environmental science. By understanding these aspects, students can gain a comprehensive view of synthetic fiber production, its impact on society and the environment, and the potential for future innovations. Synthetic fibers play a crucial role in modern society, impacting various aspects of daily life, industry, and the environment. ynthetic fibers are integral to modern life, offering a range of benefits from cost-effectiveness and versatility to innovative applications and performance characteristics. While they pose environmental challenges, ongoing research and development aim to create more sustainable and eco-friendly alternatives. Understanding the importance of synthetic fibers helps in appreciating their role in the economy, industry, and daily life, while also emphasizing the need for sustainable practices and innovation.
The French Revolution, which began in 1789, was a period of radical social and political upheaval in France. It marked the decline of absolute monarchies, the rise of secular and democratic republics, and the eventual rise of Napoleon Bonaparte. This revolutionary period is crucial in understanding the transition from feudalism to modernity in Europe.
For more information, visit-www.vavaclasses.com