This paper proposes a new wavelet family based on fractional calculus. The Haar wavelet is extended to fractional order by a generalization of the associated conventional low-pass filter using the fractional delay operator Z-D. The high-pass fractional filter is then designed by a simple modulation of the low-pass filter. In contrast, the scaling and wavelet functions are constructed using the cascade Daubechies algorithm. The regularity and orthogonality of the obtained wavelet basis are ensured by a good choice of the fractional filter coefficients. An application example is presented to illustrate the effectiveness of the proposed method. Thanks to the flexibility of the fractional filters, the proposed approach provides better performance in term of image denoising.
E NERGY D EGREE D ISTANCE C LUSTERING A LGORITHM FOR W Snsijwmn
Energy consumption is an important parameter in th
e context of the wireless sensor networks (WSNs).
Several factors can cause energy over consumption s
uch as mobility, node position (relay or gateway),
retransmissions... In this paper, we described a ne
w Energy-Degree Distance(EDD) Clustering Algorithm
for the WSNs. A node with higher residual energy,
higher degree and closer to the base station is mor
e
likely elected as a clusterhead (CH). The inter clu
ster and intra cluster communications are realized
on one
hop. The principal goal of our algorithm is to min
imize the energy consumption and balance energy
consumption among all nodes. By comparing EDD clust
ering algorithm with LEACH algorithm,
simulation results have shown its effectiveness i
n saving energy
Discrete wavelet transform-based RI adaptive algorithm for system identificationIJECEIAES
In this paper, we propose a new adaptive filtering algorithm for system identifica- tion. The algorithm is based on the recursive inverse (RI) adaptive algorithm which suffers from low convergence rates in some applications; i.e., the eigenvalue spread of the autocorrelation matrix is relatively high. The proposed algorithm applies discrete-wavelet transform (DWT) to the input signal which, in turn, helps to overcome the low convergence rate of the RI algorithm with relatively small step-size(s). Different scenarios has been investigated in different noise environments in system identification setting. Experiments demonstrate the advantages of the proposed DWT recursive inverse (DWT-RI) filter in terms of convergence rate and mean-square-error (MSE) compared to the RI, discrete cosine transform LMS (DCT-LMS), discretewavelet transform LMS (DWT-LMS) and recursive-least-squares (RLS) algorithms under same conditions.
Transmission Time and Throughput analysis of EEE LEACH, LEACH and Direct Tran...acijjournal
This paper gives a brief description about some routing protocols like EEE LEACH, LEACH and Direct
Transmission protocol (DTx) in Wireless Sensor Network (WSN) and a comparison study of these
protocols based on some performance matrices. Addition to this an attempt is done to calculate their
transmission time and throughput. To calculate these, MATLAB environment is used. Finally, on the basis
of the obtained results from the simulation, the above mentioned three protocols are compared. The
comparison results show that, the EEE LEACH routing protocol has a greater transmission time than
LEACH and DTx protocol and with smaller throughput.
In this paper, a novel architecture of RNS based 1D Lifting Integer Wavelet Transform (IWT) has been introduced. Advantage of Residue Number System (RNS) based Lifting Scheme over RNS based Filter Bank and non-binary IWT has been discussed. The performance of traditional predicts and updates stage of binary Lifting Scheme (LS) for Discrete Wavelet Transform (DWT) generates huge carry propagation
delay, power and complexity. As a result non binary number system is becoming popular in the field of Digital Signal Processing (DSP) due to its efficient performance. In this paper also a new fixed number ROM based RNS division circuit has been proposed. The proposed architecture has been validated on Xilinx Vertex5 FPGA platform and the corresponding result and reports are shown in here.
A DELAY – CONSTRAINED IN MULTICAST ROUTING USING JIA ALGORITHMIJCI JOURNAL
The Distributed multicast routing protocol under delay constraints, is one of the software, which requires simultaneous transmission of message from a source to a group of destinations within specified time delay. For example. Video Conferencing system. Multicast routing is to find a routing tree which is routed from the source and contains all the destinations. The principle goal of multicast routing is to minimize the network cost. A tree with minimal overall cost is called a Steiner tree. Finding such tree is the principle of the NP complete.
Many inexpensive heuristic algorithms have been proposed for the Steiner tree problem. However, most of the proposed algorithms are centralized in nature. Centralized algorithm requires a central node to be responsible for computing the tree and this central node must have full knowledge about the global network. But, this is not practical in large networks. Therefore, existing algorithms suffer from the drawback such as heavy communication cost, long connection setup time and poor quality of produced routing trees. So far, a little work has been done on finding delay bounded Steiner tree in a distributed manner. An effort is made in this paper to this effect. The Study reveals that the drawbacks mentioned
above has been sufficiently reduced. This paper gives complete guidelines for authors submitting papers for the AIRCC Journals.
E NERGY D EGREE D ISTANCE C LUSTERING A LGORITHM FOR W Snsijwmn
Energy consumption is an important parameter in th
e context of the wireless sensor networks (WSNs).
Several factors can cause energy over consumption s
uch as mobility, node position (relay or gateway),
retransmissions... In this paper, we described a ne
w Energy-Degree Distance(EDD) Clustering Algorithm
for the WSNs. A node with higher residual energy,
higher degree and closer to the base station is mor
e
likely elected as a clusterhead (CH). The inter clu
ster and intra cluster communications are realized
on one
hop. The principal goal of our algorithm is to min
imize the energy consumption and balance energy
consumption among all nodes. By comparing EDD clust
ering algorithm with LEACH algorithm,
simulation results have shown its effectiveness i
n saving energy
Discrete wavelet transform-based RI adaptive algorithm for system identificationIJECEIAES
In this paper, we propose a new adaptive filtering algorithm for system identifica- tion. The algorithm is based on the recursive inverse (RI) adaptive algorithm which suffers from low convergence rates in some applications; i.e., the eigenvalue spread of the autocorrelation matrix is relatively high. The proposed algorithm applies discrete-wavelet transform (DWT) to the input signal which, in turn, helps to overcome the low convergence rate of the RI algorithm with relatively small step-size(s). Different scenarios has been investigated in different noise environments in system identification setting. Experiments demonstrate the advantages of the proposed DWT recursive inverse (DWT-RI) filter in terms of convergence rate and mean-square-error (MSE) compared to the RI, discrete cosine transform LMS (DCT-LMS), discretewavelet transform LMS (DWT-LMS) and recursive-least-squares (RLS) algorithms under same conditions.
Transmission Time and Throughput analysis of EEE LEACH, LEACH and Direct Tran...acijjournal
This paper gives a brief description about some routing protocols like EEE LEACH, LEACH and Direct
Transmission protocol (DTx) in Wireless Sensor Network (WSN) and a comparison study of these
protocols based on some performance matrices. Addition to this an attempt is done to calculate their
transmission time and throughput. To calculate these, MATLAB environment is used. Finally, on the basis
of the obtained results from the simulation, the above mentioned three protocols are compared. The
comparison results show that, the EEE LEACH routing protocol has a greater transmission time than
LEACH and DTx protocol and with smaller throughput.
In this paper, a novel architecture of RNS based 1D Lifting Integer Wavelet Transform (IWT) has been introduced. Advantage of Residue Number System (RNS) based Lifting Scheme over RNS based Filter Bank and non-binary IWT has been discussed. The performance of traditional predicts and updates stage of binary Lifting Scheme (LS) for Discrete Wavelet Transform (DWT) generates huge carry propagation
delay, power and complexity. As a result non binary number system is becoming popular in the field of Digital Signal Processing (DSP) due to its efficient performance. In this paper also a new fixed number ROM based RNS division circuit has been proposed. The proposed architecture has been validated on Xilinx Vertex5 FPGA platform and the corresponding result and reports are shown in here.
A DELAY – CONSTRAINED IN MULTICAST ROUTING USING JIA ALGORITHMIJCI JOURNAL
The Distributed multicast routing protocol under delay constraints, is one of the software, which requires simultaneous transmission of message from a source to a group of destinations within specified time delay. For example. Video Conferencing system. Multicast routing is to find a routing tree which is routed from the source and contains all the destinations. The principle goal of multicast routing is to minimize the network cost. A tree with minimal overall cost is called a Steiner tree. Finding such tree is the principle of the NP complete.
Many inexpensive heuristic algorithms have been proposed for the Steiner tree problem. However, most of the proposed algorithms are centralized in nature. Centralized algorithm requires a central node to be responsible for computing the tree and this central node must have full knowledge about the global network. But, this is not practical in large networks. Therefore, existing algorithms suffer from the drawback such as heavy communication cost, long connection setup time and poor quality of produced routing trees. So far, a little work has been done on finding delay bounded Steiner tree in a distributed manner. An effort is made in this paper to this effect. The Study reveals that the drawbacks mentioned
above has been sufficiently reduced. This paper gives complete guidelines for authors submitting papers for the AIRCC Journals.
Congestion Control through Load Balancing Technique for Mobile Networks: A Cl...IDES Editor
The Optimal Routing Path (ORP) for mobile
cellular networks is proposed in this paper with the
introduction of cluster-based approach. Here an improved
dynamic selection procedure is used to elect cluster head.
The cluster head is only responsible for the computation of
least congested path. Hence the delay is reduced with the
significant reduction on the number of backtrackings.
A New Transistor Sizing Approach for Digital Integrated Circuits Using Firefl...VLSICS Design
Due to the fact that, the power consumption and speed of a VLSI circuit are dependent on the transistor
sizes, efficient transistor sizing is a new challenge for VLSI circuit designers. However, evolutionary
computation can be successfully used for complex VLSI transistor sizing which reduces the time to market
and enables the designer to find the optimized solutions for a non-linear and complex circuit design
process. In this paper, a new digital integrated circuit design approach is proposed based on the firefly
artificial intelligence optimization algorithm. In order to justify the effectiveness of the proposed algorithm
in the design of VLSI circuits, an inverter (NOT gate) is designed and optimized by the proposed algorithm.
As the simulation results show, the inverter circuit has a very good performance for power and delay
parameters.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
Shunt Faults Detection on Transmission Line by Waveletpaperpublications3
Abstract: Transmission line fault detection is a very important task because major portion of power system fault occurring in transmission system. This paper represents a fast and reliable method of transmission line shunt fault detection. MATLAB Simulink use for modeled an IEEE 9-bus test power system for case study of various faults. In proposed work Daubechies wavelet is applied for decomposition of fault transients. The application of wavelet analysis helps in accurate classification of the various fault patterns. Wavelet entropy measure based on wavelet analysis is able to observe the unsteady signals and complexity of the system at time-frequency plane.
The result shows that the proposed method is capable to detect all the shunt faults.
Trilateration-based localization (TBL) has become a corner stone of modern technology. This study
formulates the concern on how wireless sensor networks can take advantage of the computational
intelligent techniques using both single- and multi-objective particle swarm optimization (PSO) with an
overall aim of concurrently minimizing the required time for localization, minimizing energy consumed
during localization, and maximizing the number of nodes fully localized through the adjustment of wireless
sensor transmission ranges while using TBL process. A parameter-study of the applied PSO variants is
performed, leading to results that show algorithmic improvements of up to 32% in the evaluated objectives.
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
A Survey on Routing Protocols in Wireless Sensor Network Using Mobile SinkIJEEE
Wireless sensor network (WSN) is collection of large number of sensor nodes which senses the physical conditions of environment and send the data to sink. WSN can be classified as static and mobile WSN. In static routing protocol, energy consumption is not uniformly distributed. To avoid this problem, wireless sensor network with mobile sink can be used, where mobile sink gathers data from other nodes using 1-hop communication. In this paper, we presented the various types of WSN. At last, we compared the various routing protocol of WSN with mobile sink based on parameter no. of sinks, mobility of CH and mobility pattern.
Wireless sensor network are emerging in various fields like environmental monitoring, mining, surveillance
system, medical monitoring. LEACH protocol is one of the predominantly used clustering routing protocols
in wireless sensor networks. In Leach each node has equal chance to become a cluster head which make
the energy dissipated of each node be moderately balanced. We have pioneered an improved algorithm
named as Novel Leach based on Leach protocol. The proposed algorithm shows the significant
improvement in network lifetime .Comparison of proposed algorithm is done with basic leach in terms of
network life time, cluster head selection, energy consumption, and data transmission to base station. The
simulation results shows that proposed algorithm can reduce network energy consumption and prolong
network life commendably. Simulation of our protocol is done with Matlab.
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
Carbon nano tube based delay model for high speed energy efficient on chip da...elelijjournal
Speed is a major concern for high density VLSI networks. In this paper the closed form delay model for current mode signalling in VLSI interconnects has been proposed with resistive load termination.RLC interconnect line is modelled using characteristic impedance of transmission line and inductive effect.The inductive effect is dominant at lower technology node is modelled into an equivalent resistance. In this model first order transfer function is designed using finite difference equation, and by applying the boundary conditions at the source and load termination. It has been observed that the dominant pole determines system response and delay in the proposed model. Using CNIA tool (carbon nanotube interconnect analyzer) the interconnect line parameters has been estimated at 45nm technology node. The novel proposed current mode model superiority has been validated for CNT type of material. It superiority factor remains to 66.66% as compared to voltage mode signalling. And current mode dissipates 0.015pJ energy where as VM consume 0.045pJ for a single bit transmission across the interconnect over CNT
material. Secondly the damping factor of a lumped RLC circuit is shown to be a useful figure of merit.
MULTIUSER BER ANALYSIS OF CS-QCSK MODULATION SCHEME IN A CELLULAR SYSTEM ijwmn
In recent years, chaotic communication is a hot research topic and it suits better for the emerging wireless networks because of its excellent features. Different chaos based modulation schemes have evolved, of which the CS-DCSK modulation technique provides better BER performance and bandwidth
efficiency, due to its code domain approach. The QCSK modulation technique provides double benefit: higher data rate with similar BER performance and same bandwidth occupation as DCSK. By combining the advantage of code shifted differential chaos shift keying (CS-DCSK) and Quadrature chaos shift keying (QCSK) scheme, a novel modulation scheme called code shifted Quadrature chaos shift keying (CS-QCSK) is proposed and its suitability in a multiuser scenario is tested in this paper. The analytical expressions for the bit-error rate for Multi-user CS-QCSK scheme (MU-CS-QCSK) under Rayleigh
multipath fading channel is derived. The simulation result shows that, in multiuser scenario the proposed method outperforms classical chaotic modulation schemes in terms of bit error rate (BER).
Magnify Network Lifetime in WSN by Reducing Data Aggregation Distance of Weak...ijwmn
Energy efficient protocols have always played a vital role in conservation of energy in Wireless Sensor
Network. One of the major introduced protocols is LEACH a cluster based protocol. To improve its
performance, an algorithm named as Maximizing the Network Lifetime of Clustered-based WSN Using
Probability of Residual Energy is introduced. This protocol improved the Cluster Head selection process of
LEACH by using the concept of residual energy. In the proposed paper, further improvement is done by
enhancing the data transmission process. This process heightens the lifetime of the nodes having very less
energy left by reducing their data transmission distance. Implemented results in MATLAB shows increase
in the stability and lifetime of the network..
Evaluation of the Medical Image Compression using Wavelet Packet Transform an...IJECEIAES
Wavelet transforms and wavelet packets are widely imposed in the analysis and resolution of problems related to science and technical engineering. Decomposition wavelet packet allows several frequency bands according to various levels of resolutions. We apply this transform (PWT) coupled with the SPIHT coder to reduce the limitations of conventional wavelet filter bank. The results obtained using the applied algorithm, are very satisfactory and encouraging compared to many of the best coders cited in the literature and show a visual and numerical superiority over conventional methods. These the promising results are confirmed by visual evaluation parameters (PSNR, MSSIM and VIF).
Wavelets are mathematical functions. The wavelet transform is a tool that cuts up data, functions or operators into different frequency components and then studies each component with a resolution matched to its scale. It is needed, because analyzing discontinuities and sharp spikes of the signal and applications as image compression, human vision, radar, and earthquake prediction. Wai Mar Lwin | Thinn Aung | Khaing Khaing Wai "Applications of Wavelet Transform" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-5 , August 2019, URL: https://www.ijtsrd.com/papers/ijtsrd27958.pdfPaper URL: https://www.ijtsrd.com/mathemetics/applied-mathematics/27958/applications-of-wavelet-transform/wai-mar-lwin
Modified Adaptive Lifting Structure Of CDF 9/7 Wavelet With Spiht For Lossy I...idescitation
We present a modified structure of 2-D cdf 9/7 wavelet
transforms based on adaptive lifting in image coding. Instead
of alternately applying horizontal and vertical lifting, as in
present practice, Adaptive lifting performs lifting-based
prediction in local windows in the direction of high pixel
correlation. Hence, it adapts far better to the image orientation
features in local windows. The predicting and updating signals
of Adaptive lifting can be derived even at the fractional pixel
precision level to achieve high resolution, while still
maintaining perfect reconstruction. To enhance the
performance of adaptive based modified structure of 2-D CDF
9/7 is coupled with SPIHT coding algorithm to improve the
drawbacks of wavelet transform. Experimental results show
that the proposed modified scheme based image coding
technique outperforms JPEG 2000 in both PSNR and visual
quality, with the improvement up to 6.0 dB than existing
structure on images with rich orientation features .
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Ijri ece-01-02 image enhancement aided denoising using dual tree complex wave...Ijripublishers Ijri
This paper presents a novel way to reduce noise introduced or exacerbated by image enhancement methods, in particular
algorithms based on the random spray sampling technique, but not only. According to the nature of sprays,
output images of spray-based methods tend to exhibit noise with unknown statistical distribution. To avoid inappropriate
assumptions on the statistical characteristics of noise, a different one is made. In fact, the non-enhanced image is
considered to be either free of noise or affected by non-perceivable levels of noise. Taking advantage of the higher sensitivity
of the human visual system to changes in brightness, the analysis can be limited to the luma channel of both the
non-enhanced and enhanced image. Also, given the importance of directional content in human vision, the analysis is
performed through the dual-tree complex wavelet transform , lanczos interpolator and edge preserving smoothing filters.
Unlike the discrete wavelet transform, the DTWCT allows for distinction of data directionality in the transform space.
For each level of the transform, the standard deviation of the non-enhanced image coefficients is computed across the
six orientations of the DTWCT, then it is normalized.
Keywords: dual-tree complex wavelet transform (DTWCT), lanczos interpolator, edge preserving smoothing filters.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Congestion Control through Load Balancing Technique for Mobile Networks: A Cl...IDES Editor
The Optimal Routing Path (ORP) for mobile
cellular networks is proposed in this paper with the
introduction of cluster-based approach. Here an improved
dynamic selection procedure is used to elect cluster head.
The cluster head is only responsible for the computation of
least congested path. Hence the delay is reduced with the
significant reduction on the number of backtrackings.
A New Transistor Sizing Approach for Digital Integrated Circuits Using Firefl...VLSICS Design
Due to the fact that, the power consumption and speed of a VLSI circuit are dependent on the transistor
sizes, efficient transistor sizing is a new challenge for VLSI circuit designers. However, evolutionary
computation can be successfully used for complex VLSI transistor sizing which reduces the time to market
and enables the designer to find the optimized solutions for a non-linear and complex circuit design
process. In this paper, a new digital integrated circuit design approach is proposed based on the firefly
artificial intelligence optimization algorithm. In order to justify the effectiveness of the proposed algorithm
in the design of VLSI circuits, an inverter (NOT gate) is designed and optimized by the proposed algorithm.
As the simulation results show, the inverter circuit has a very good performance for power and delay
parameters.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
Shunt Faults Detection on Transmission Line by Waveletpaperpublications3
Abstract: Transmission line fault detection is a very important task because major portion of power system fault occurring in transmission system. This paper represents a fast and reliable method of transmission line shunt fault detection. MATLAB Simulink use for modeled an IEEE 9-bus test power system for case study of various faults. In proposed work Daubechies wavelet is applied for decomposition of fault transients. The application of wavelet analysis helps in accurate classification of the various fault patterns. Wavelet entropy measure based on wavelet analysis is able to observe the unsteady signals and complexity of the system at time-frequency plane.
The result shows that the proposed method is capable to detect all the shunt faults.
Trilateration-based localization (TBL) has become a corner stone of modern technology. This study
formulates the concern on how wireless sensor networks can take advantage of the computational
intelligent techniques using both single- and multi-objective particle swarm optimization (PSO) with an
overall aim of concurrently minimizing the required time for localization, minimizing energy consumed
during localization, and maximizing the number of nodes fully localized through the adjustment of wireless
sensor transmission ranges while using TBL process. A parameter-study of the applied PSO variants is
performed, leading to results that show algorithmic improvements of up to 32% in the evaluated objectives.
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
A Survey on Routing Protocols in Wireless Sensor Network Using Mobile SinkIJEEE
Wireless sensor network (WSN) is collection of large number of sensor nodes which senses the physical conditions of environment and send the data to sink. WSN can be classified as static and mobile WSN. In static routing protocol, energy consumption is not uniformly distributed. To avoid this problem, wireless sensor network with mobile sink can be used, where mobile sink gathers data from other nodes using 1-hop communication. In this paper, we presented the various types of WSN. At last, we compared the various routing protocol of WSN with mobile sink based on parameter no. of sinks, mobility of CH and mobility pattern.
Wireless sensor network are emerging in various fields like environmental monitoring, mining, surveillance
system, medical monitoring. LEACH protocol is one of the predominantly used clustering routing protocols
in wireless sensor networks. In Leach each node has equal chance to become a cluster head which make
the energy dissipated of each node be moderately balanced. We have pioneered an improved algorithm
named as Novel Leach based on Leach protocol. The proposed algorithm shows the significant
improvement in network lifetime .Comparison of proposed algorithm is done with basic leach in terms of
network life time, cluster head selection, energy consumption, and data transmission to base station. The
simulation results shows that proposed algorithm can reduce network energy consumption and prolong
network life commendably. Simulation of our protocol is done with Matlab.
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
Carbon nano tube based delay model for high speed energy efficient on chip da...elelijjournal
Speed is a major concern for high density VLSI networks. In this paper the closed form delay model for current mode signalling in VLSI interconnects has been proposed with resistive load termination.RLC interconnect line is modelled using characteristic impedance of transmission line and inductive effect.The inductive effect is dominant at lower technology node is modelled into an equivalent resistance. In this model first order transfer function is designed using finite difference equation, and by applying the boundary conditions at the source and load termination. It has been observed that the dominant pole determines system response and delay in the proposed model. Using CNIA tool (carbon nanotube interconnect analyzer) the interconnect line parameters has been estimated at 45nm technology node. The novel proposed current mode model superiority has been validated for CNT type of material. It superiority factor remains to 66.66% as compared to voltage mode signalling. And current mode dissipates 0.015pJ energy where as VM consume 0.045pJ for a single bit transmission across the interconnect over CNT
material. Secondly the damping factor of a lumped RLC circuit is shown to be a useful figure of merit.
MULTIUSER BER ANALYSIS OF CS-QCSK MODULATION SCHEME IN A CELLULAR SYSTEM ijwmn
In recent years, chaotic communication is a hot research topic and it suits better for the emerging wireless networks because of its excellent features. Different chaos based modulation schemes have evolved, of which the CS-DCSK modulation technique provides better BER performance and bandwidth
efficiency, due to its code domain approach. The QCSK modulation technique provides double benefit: higher data rate with similar BER performance and same bandwidth occupation as DCSK. By combining the advantage of code shifted differential chaos shift keying (CS-DCSK) and Quadrature chaos shift keying (QCSK) scheme, a novel modulation scheme called code shifted Quadrature chaos shift keying (CS-QCSK) is proposed and its suitability in a multiuser scenario is tested in this paper. The analytical expressions for the bit-error rate for Multi-user CS-QCSK scheme (MU-CS-QCSK) under Rayleigh
multipath fading channel is derived. The simulation result shows that, in multiuser scenario the proposed method outperforms classical chaotic modulation schemes in terms of bit error rate (BER).
Magnify Network Lifetime in WSN by Reducing Data Aggregation Distance of Weak...ijwmn
Energy efficient protocols have always played a vital role in conservation of energy in Wireless Sensor
Network. One of the major introduced protocols is LEACH a cluster based protocol. To improve its
performance, an algorithm named as Maximizing the Network Lifetime of Clustered-based WSN Using
Probability of Residual Energy is introduced. This protocol improved the Cluster Head selection process of
LEACH by using the concept of residual energy. In the proposed paper, further improvement is done by
enhancing the data transmission process. This process heightens the lifetime of the nodes having very less
energy left by reducing their data transmission distance. Implemented results in MATLAB shows increase
in the stability and lifetime of the network..
Evaluation of the Medical Image Compression using Wavelet Packet Transform an...IJECEIAES
Wavelet transforms and wavelet packets are widely imposed in the analysis and resolution of problems related to science and technical engineering. Decomposition wavelet packet allows several frequency bands according to various levels of resolutions. We apply this transform (PWT) coupled with the SPIHT coder to reduce the limitations of conventional wavelet filter bank. The results obtained using the applied algorithm, are very satisfactory and encouraging compared to many of the best coders cited in the literature and show a visual and numerical superiority over conventional methods. These the promising results are confirmed by visual evaluation parameters (PSNR, MSSIM and VIF).
Wavelets are mathematical functions. The wavelet transform is a tool that cuts up data, functions or operators into different frequency components and then studies each component with a resolution matched to its scale. It is needed, because analyzing discontinuities and sharp spikes of the signal and applications as image compression, human vision, radar, and earthquake prediction. Wai Mar Lwin | Thinn Aung | Khaing Khaing Wai "Applications of Wavelet Transform" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-5 , August 2019, URL: https://www.ijtsrd.com/papers/ijtsrd27958.pdfPaper URL: https://www.ijtsrd.com/mathemetics/applied-mathematics/27958/applications-of-wavelet-transform/wai-mar-lwin
Modified Adaptive Lifting Structure Of CDF 9/7 Wavelet With Spiht For Lossy I...idescitation
We present a modified structure of 2-D cdf 9/7 wavelet
transforms based on adaptive lifting in image coding. Instead
of alternately applying horizontal and vertical lifting, as in
present practice, Adaptive lifting performs lifting-based
prediction in local windows in the direction of high pixel
correlation. Hence, it adapts far better to the image orientation
features in local windows. The predicting and updating signals
of Adaptive lifting can be derived even at the fractional pixel
precision level to achieve high resolution, while still
maintaining perfect reconstruction. To enhance the
performance of adaptive based modified structure of 2-D CDF
9/7 is coupled with SPIHT coding algorithm to improve the
drawbacks of wavelet transform. Experimental results show
that the proposed modified scheme based image coding
technique outperforms JPEG 2000 in both PSNR and visual
quality, with the improvement up to 6.0 dB than existing
structure on images with rich orientation features .
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Ijri ece-01-02 image enhancement aided denoising using dual tree complex wave...Ijripublishers Ijri
This paper presents a novel way to reduce noise introduced or exacerbated by image enhancement methods, in particular
algorithms based on the random spray sampling technique, but not only. According to the nature of sprays,
output images of spray-based methods tend to exhibit noise with unknown statistical distribution. To avoid inappropriate
assumptions on the statistical characteristics of noise, a different one is made. In fact, the non-enhanced image is
considered to be either free of noise or affected by non-perceivable levels of noise. Taking advantage of the higher sensitivity
of the human visual system to changes in brightness, the analysis can be limited to the luma channel of both the
non-enhanced and enhanced image. Also, given the importance of directional content in human vision, the analysis is
performed through the dual-tree complex wavelet transform , lanczos interpolator and edge preserving smoothing filters.
Unlike the discrete wavelet transform, the DTWCT allows for distinction of data directionality in the transform space.
For each level of the transform, the standard deviation of the non-enhanced image coefficients is computed across the
six orientations of the DTWCT, then it is normalized.
Keywords: dual-tree complex wavelet transform (DTWCT), lanczos interpolator, edge preserving smoothing filters.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Comparative detection and fault location in underground cables using Fourier...IJECEIAES
In this research, we create a single-phase to ground synthetic fault by the simulation of a three-phase cable system and identify the location using mathematical techniques of Fourier and modal transforms. Current and voltage signals are measured and analyzed for fault location by the reflection of the waves between the measured point and the fault location. By simulating the network and line modeling using alternative transient programs (ATP) and MATLAB software, two single-phase to ground faults are generated at different points of the line at times of 0.3 and 0.305 s. First, the fault waveforms are displayed in the ATP software, and then this waveform is transmitted to MATLAB and presented along with its phasor view over time. In addition to the waveforms, the detection and fault location indicators are presented in different states of fault. Fault resistances of 1, 100, and 1,000 ohms are considered for fault creation and modeling with low arch strength. The results show that the proposed method has an average fault of less than 0.25% to determine the fault location, which is perfectly correct. It is varied due to changing the conditions of time, resistance, location, and type of error but does not exceed the above value.
A Dual Tree Complex Wavelet Transform Construction and Its Application to Ima...CSCJournals
This paper discusses the application of complex discrete wavelet transform (CDWT) which has significant advantages over real wavelet transform for certain signal processing problems. CDWT is a form of discrete wavelet transform, which generates complex coefficients by using a dual tree of wavelet filters to obtain their real and imaginary parts. The paper is divided into three sections. The first section deals with the disadvantage of Discrete Wavelet Transform (DWT) and method to overcome it. The second section of the paper is devoted to the theoretical analysis of complex wavelet transform and the last section deals with its verification using the simulated images.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Inductanceless high order low frequency filters for medical applicationsIJECEIAES
In this paper, a designed circuit used for low-frequency filters is implemented and realized the filter is based on frequency-dependent negative resistance (FDNR) as an inductor simulator to substitute the traditional inductance, which is heavy and high cost due to the coil material manufacturing and size area. The simulator is based on an active operation amplifier or operation transconductance amplifier (OTA) that is easy to build in an integrated circuit with a minimum number of components. The third and higher-order Butterworth filter is simulated at low frequency for low pass filter to use in medical instruments and low-frequency applications. The designed circuit is compared with the traditional proportional integral controller enhanced (PIE) and T section ordinary filter. The results with magnitude and phase response were compared and an acceptable result is obtained. The filter can be used for general applications such as medical and other low-frequency filters needed.
Segmentation Based Multilevel Wide Band Compression for SAR Images Using Coif...CSCJournals
Synthetic aperture radar (SAR) data represents a significant resource of information for a large variety of researchers. Thus, there is a strong interest in developing data encoding and decoding algorithms which can obtain higher compression ratios while keeping image quality to an acceptable level. In this work, results of different wavelet-based image compression and segmentation based wavelet image compression are assessed through controlled experiments on synthetic SAR images. The effects of dissimilar wavelet functions, number of decompositions are examined in order to find optimal family for SAR images. The choice of optimal wavelets in segmentation based wavelet image compression is coiflet for low frequency and high frequency component. The results presented here is a good reference for SAR application developers to choose the wavelet families and also it concludes that wavelets transform is rapid, robust and reliable tool for SAR image compression. Numerical results confirm the potency of this approach.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Comparative Analysis of Different Wavelet Functions using Modified Adaptive F...IJERA Editor
The traditional method of wavelet denoising is inefficient in removing the overlap noise between noisy signal
and noise, due to which a modified adaptive filtering based on wavelet transform method is introduced. The
method used in this paper filters out the noise on the basis of wavelet denoising using different wavelet
functions. The simulation results indicate the Signal to Noise ratio (SNR), Mean Square Error (MSE) and signal
error power spectral density comparison plot between different wavelet functions. These comparison results
verified that Daubechies is more efficient than other wavelet functions in filtering out noise in all perspectives.
Determining the Efficient Subband Coefficients of Biorthogonal Wavelet for Gr...CSCJournals
In this paper, we propose an invisible blind watermarking scheme for the gray-level images. The cover image is decomposed using the Discrete Wavelet Transform with Biorthogonal wavelet filters and the watermark is embedded into significant coefficients of the transformation. The Biorthogonal wavelet is used because it has the property of perfect reconstruction and smoothness. The proposed scheme embeds a monochrome watermark into a gray-level image. In the embedding process, we use a localized decomposition, means that the second level decomposition is performed on the detail sub-band resulting from the first level decomposition. The image is decomposed into first level and for second level decomposition we consider Horizontal, vertical and diagonal subband separately. From this second level decomposition we take the respective Horizontal, vertical and diagonal coefficients for embedding the watermark. The robustness of the scheme is tested by considering the different types of image processing attacks like blurring, cropping, sharpening, Gaussian filtering and salt and pepper noise effect. The experimental result shows that the embedding watermark into diagonal subband coefficients is robust against different types of attacks.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Ijri ece-01-02 image enhancement aided denoising using dual tree complex wave...Ijripublishers Ijri
This paper presents a novel way to reduce noise introduced or exacerbated by image enhancement methods, in particular algorithms based on the random spray sampling technique, but not only. According to the nature of sprays, output images of spray-based methods tend to exhibit noise with unknown statistical distribution. To avoid inappropriate assumptions on the statistical characteristics of noise, a different one is made. In fact, the non-enhanced image is considered to be either free of noise or affected by non-perceivable levels of noise. Taking advantage of the higher sensitivity of the human visual system to changes in brightness, the analysis can be limited to the luma channel of both the non-enhanced and enhanced image. Also, given the importance of directional content in human vision, the analysis is performed through the dual-tree complex wavelet transform , lanczos interpolator and edge preserving smoothing filters. Unlike the discrete wavelet transform, the DTWCT allows for distinction of data directionality in the transform space. For each level of the transform, the standard deviation of the non-enhanced image coefficients is computed across the six orientations of the DTWCT, then it is normalized.
Keywords: dual-tree complex wavelet transform (DTWCT), lanczos interpolator, edge preserving smoothing filters.
Similar to Novel design of a fractional wavelet and its application to image denoising (20)
Square transposition: an approach to the transposition process in block cipherjournalBEEI
The transposition process is needed in cryptography to create a diffusion effect on data encryption standard (DES) and advanced encryption standard (AES) algorithms as standard information security algorithms by the National Institute of Standards and Technology. The problem with DES and AES algorithms is that their transposition index values form patterns and do not form random values. This condition will certainly make it easier for a cryptanalyst to look for a relationship between ciphertexts because some processes are predictable. This research designs a transposition algorithm called square transposition. Each process uses square 8 × 8 as a place to insert and retrieve 64-bits. The determination of the pairing of the input scheme and the retrieval scheme that have unequal flow is an important factor in producing a good transposition. The square transposition can generate random and non-pattern indices so that transposition can be done better than DES and AES.
Hyper-parameter optimization of convolutional neural network based on particl...journalBEEI
Deep neural networks have accomplished enormous progress in tackling many problems. More specifically, convolutional neural network (CNN) is a category of deep networks that have been a dominant technique in computer vision tasks. Despite that these deep neural networks are highly effective; the ideal structure is still an issue that needs a lot of investigation. Deep Convolutional Neural Network model is usually designed manually by trials and repeated tests which enormously constrain its application. Many hyper-parameters of the CNN can affect the model performance. These parameters are depth of the network, numbers of convolutional layers, and numbers of kernels with their sizes. Therefore, it may be a huge challenge to design an appropriate CNN model that uses optimized hyper-parameters and reduces the reliance on manual involvement and domain expertise. In this paper, a design architecture method for CNNs is proposed by utilization of particle swarm optimization (PSO) algorithm to learn the optimal CNN hyper-parameters values. In the experiment, we used Modified National Institute of Standards and Technology (MNIST) database of handwritten digit recognition. The experiments showed that our proposed approach can find an architecture that is competitive to the state-of-the-art models with a testing error of 0.87%.
Supervised machine learning based liver disease prediction approach with LASS...journalBEEI
In this contemporary era, the uses of machine learning techniques are increasing rapidly in the field of medical science for detecting various diseases such as liver disease (LD). Around the globe, a large number of people die because of this deadly disease. By diagnosing the disease in a primary stage, early treatment can be helpful to cure the patient. In this research paper, a method is proposed to diagnose the LD using supervised machine learning classification algorithms, namely logistic regression, decision tree, random forest, AdaBoost, KNN, linear discriminant analysis, gradient boosting and support vector machine (SVM). We also deployed a least absolute shrinkage and selection operator (LASSO) feature selection technique on our taken dataset to suggest the most highly correlated attributes of LD. The predictions with 10 fold cross-validation (CV) made by the algorithms are tested in terms of accuracy, sensitivity, precision and f1-score values to forecast the disease. It is observed that the decision tree algorithm has the best performance score where accuracy, precision, sensitivity and f1-score values are 94.295%, 92%, 99% and 96% respectively with the inclusion of LASSO. Furthermore, a comparison with recent studies is shown to prove the significance of the proposed system.
A secure and energy saving protocol for wireless sensor networksjournalBEEI
The research domain for wireless sensor networks (WSN) has been extensively conducted due to innovative technologies and research directions that have come up addressing the usability of WSN under various schemes. This domain permits dependable tracking of a diversity of environments for both military and civil applications. The key management mechanism is a primary protocol for keeping the privacy and confidentiality of the data transmitted among different sensor nodes in WSNs. Since node's size is small; they are intrinsically limited by inadequate resources such as battery life-time and memory capacity. The proposed secure and energy saving protocol (SESP) for wireless sensor networks) has a significant impact on the overall network life-time and energy dissipation. To encrypt sent messsages, the SESP uses the public-key cryptography’s concept. It depends on sensor nodes' identities (IDs) to prevent the messages repeated; making security goals- authentication, confidentiality, integrity, availability, and freshness to be achieved. Finally, simulation results show that the proposed approach produced better energy consumption and network life-time compared to LEACH protocol; sensors are dead after 900 rounds in the proposed SESP protocol. While, in the low-energy adaptive clustering hierarchy (LEACH) scheme, the sensors are dead after 750 rounds.
Plant leaf identification system using convolutional neural networkjournalBEEI
This paper proposes a leaf identification system using convolutional neural network (CNN). This proposed system can identify five types of local Malaysia leaf which were acacia, papaya, cherry, mango and rambutan. By using CNN from deep learning, the network is trained from the database that acquired from leaf images captured by mobile phone for image classification. ResNet-50 was the architecture has been used for neural networks image classification and training the network for leaf identification. The recognition of photographs leaves requested several numbers of steps, starting with image pre-processing, feature extraction, plant identification, matching and testing, and finally extracting the results achieved in MATLAB. Testing sets of the system consists of 3 types of images which were white background, and noise added and random background images. Finally, interfaces for the leaf identification system have developed as the end software product using MATLAB app designer. As a result, the accuracy achieved for each training sets on five leaf classes are recorded above 98%, thus recognition process was successfully implemented.
Customized moodle-based learning management system for socially disadvantaged...journalBEEI
This study aims to develop Moodle-based LMS with customized learning content and modified user interface to facilitate pedagogical processes during covid-19 pandemic and investigate how teachers of socially disadvantaged schools perceived usability and technology acceptance. Co-design process was conducted with two activities: 1) need assessment phase using an online survey and interview session with the teachers and 2) the development phase of the LMS. The system was evaluated by 30 teachers from socially disadvantaged schools for relevance to their distance learning activities. We employed computer software usability questionnaire (CSUQ) to measure perceived usability and the technology acceptance model (TAM) with insertion of 3 original variables (i.e., perceived usefulness, perceived ease of use, and intention to use) and 5 external variables (i.e., attitude toward the system, perceived interaction, self-efficacy, user interface design, and course design). The average CSUQ rating exceeded 5.0 of 7 point-scale, indicated that teachers agreed that the information quality, interaction quality, and user interface quality were clear and easy to understand. TAM results concluded that the LMS design was judged to be usable, interactive, and well-developed. Teachers reported an effective user interface that allows effective teaching operations and lead to the system adoption in immediate time.
Understanding the role of individual learner in adaptive and personalized e-l...journalBEEI
Dynamic learning environment has emerged as a powerful platform in a modern e-learning system. The learning situation that constantly changing has forced the learning platform to adapt and personalize its learning resources for students. Evidence suggested that adaptation and personalization of e-learning systems (APLS) can be achieved by utilizing learner modeling, domain modeling, and instructional modeling. In the literature of APLS, questions have been raised about the role of individual characteristics that are relevant for adaptation. With several options, a new problem has been raised where the attributes of students in APLS often overlap and are not related between studies. Therefore, this study proposed a list of learner model attributes in dynamic learning to support adaptation and personalization. The study was conducted by exploring concepts from the literature selected based on the best criteria. Then, we described the results of important concepts in student modeling and provided definitions and examples of data values that researchers have used. Besides, we also discussed the implementation of the selected learner model in providing adaptation in dynamic learning.
Prototype mobile contactless transaction system in traditional markets to sup...journalBEEI
One way to prevent and reduce the spread of the covid-19 pandemic is through physical distancing program. This research aims to develop a prototype contactless transaction system using digital payment mechanisms and QR code technology that will be applied in traditional markets. The method used in the development of electronic market systems is a prototype approach. The application of QR code and digital payments are used as a solution to minimize money exchange contacts that are common in traditional markets. The results showed that the system built was able to accelerate and facilitate the buying and selling transaction process in traditional market environment. Alpha testing shows that all functional systems are running well. Meanwhile, beta testing shows that the user can very well accept the system that was built. The results of the study also show acceptance of the usefulness of the system being built, as well as the optimism of its users to be able to take advantage of this system both technologically and functionally, so its can be a part of the digital transformation of the traditional market to the electronic market and has become one of the solutions in reducing the spread of the current covid-19 pandemic.
Wireless HART stack using multiprocessor technique with laxity algorithmjournalBEEI
The use of a real-time operating system is required for the demarcation of industrial wireless sensor network (IWSN) stacks (RTOS). In the industrial world, a vast number of sensors are utilised to gather various types of data. The data gathered by the sensors cannot be prioritised ahead of time. Because all of the information is equally essential. As a result, a protocol stack is employed to guarantee that data is acquired and processed fairly. In IWSN, the protocol stack is implemented using RTOS. The data collected from IWSN sensor nodes is processed using non-preemptive scheduling and the protocol stack, and then sent in parallel to the IWSN's central controller. The real-time operating system (RTOS) is a process that occurs between hardware and software. Packets must be sent at a certain time. It's possible that some packets may collide during transmission. We're going to undertake this project to get around this collision. As a prototype, this project is divided into two parts. The first uses RTOS and the LPC2148 as a master node, while the second serves as a standard data collection node to which sensors are attached. Any controller may be used in the second part, depending on the situation. Wireless HART allows two nodes to communicate with each other.
Implementation of double-layer loaded on octagon microstrip yagi antennajournalBEEI
A double-layer loaded on the octagon microstrip yagi antenna (OMYA) at 5.8 GHz industrial, scientific and medical (ISM) Band is investigated in this paper. The double-layer consist of two double positive (DPS) substrates. The OMYA is overlaid with a double-layer configuration were simulated, fabricated and measured. A good agreement was observed between the computed and measured results of the gain for this antenna. According to comparison results, it shows that 2.5 dB improvement of the OMYA gain can be obtained by applying the double-layer on the top of the OMYA. Meanwhile, the bandwidth of the measured OMYA with the double-layer is 14.6%. It indicates that the double-layer can be used to increase the OMYA performance in term of gain and bandwidth.
The calculation of the field of an antenna located near the human headjournalBEEI
In this work, a numerical calculation was carried out in one of the universal programs for automatic electro-dynamic design. The calculation is aimed at obtaining numerical values for specific absorbed power (SAR). It is the SAR value that can be used to determine the effect of the antenna of a wireless device on biological objects; the dipole parameters will be selected for GSM1800. Investigation of the influence of distance to a cell phone on radiation shows that absorbed in the head of a person the effect of electromagnetic radiation on the brain decreases by three times this is a very important result the SAR value has decreased by almost three times it is acceptable results.
Exact secure outage probability performance of uplinkdownlink multiple access...journalBEEI
In this paper, we study uplink-downlink non-orthogonal multiple access (NOMA) systems by considering the secure performance at the physical layer. In the considered system model, the base station acts a relay to allow two users at the left side communicate with two users at the right side. By considering imperfect channel state information (CSI), the secure performance need be studied since an eavesdropper wants to overhear signals processed at the downlink. To provide secure performance metric, we derive exact expressions of secrecy outage probability (SOP) and and evaluating the impacts of main parameters on SOP metric. The important finding is that we can achieve the higher secrecy performance at high signal to noise ratio (SNR). Moreover, the numerical results demonstrate that the SOP tends to a constant at high SNR. Finally, our results show that the power allocation factors, target rates are main factors affecting to the secrecy performance of considered uplink-downlink NOMA systems.
Design of a dual-band antenna for energy harvesting applicationjournalBEEI
This report presents an investigation on how to improve the current dual-band antenna to enhance the better result of the antenna parameters for energy harvesting application. Besides that, to develop a new design and validate the antenna frequencies that will operate at 2.4 GHz and 5.4 GHz. At 5.4 GHz, more data can be transmitted compare to 2.4 GHz. However, 2.4 GHz has long distance of radiation, so it can be used when far away from the antenna module compare to 5 GHz that has short distance in radiation. The development of this project includes the scope of designing and testing of antenna using computer simulation technology (CST) 2018 software and vector network analyzer (VNA) equipment. In the process of designing, fundamental parameters of antenna are being measured and validated, in purpose to identify the better antenna performance.
Transforming data-centric eXtensible markup language into relational database...journalBEEI
eXtensible markup language (XML) appeared internationally as the format for data representation over the web. Yet, most organizations are still utilising relational databases as their database solutions. As such, it is crucial to provide seamless integration via effective transformation between these database infrastructures. In this paper, we propose XML-REG to bridge these two technologies based on node-based and path-based approaches. The node-based approach is good to annotate each positional node uniquely, while the path-based approach provides summarised path information to join the nodes. On top of that, a new range labelling is also proposed to annotate nodes uniquely by ensuring the structural relationships are maintained between nodes. If a new node is to be added to the document, re-labelling is not required as the new label will be assigned to the node via the new proposed labelling scheme. Experimental evaluations indicated that the performance of XML-REG exceeded XMap, XRecursive, XAncestor and Mini-XML concerning storing time, query retrieval time and scalability. This research produces a core framework for XML to relational databases (RDB) mapping, which could be adopted in various industries.
Key performance requirement of future next wireless networks (6G)journalBEEI
Given the massive potentials of 5G communication networks and their foreseeable evolution, what should there be in 6G that is not in 5G or its long-term evolution? 6G communication networks are estimated to integrate the terrestrial, aerial, and maritime communications into a forceful network which would be faster, more reliable, and can support a massive number of devices with ultra-low latency requirements. This article presents a complete overview of potential 6G communication networks. The major contribution of this study is to present a broad overview of key performance indicators (KPIs) of 6G networks that cover the latest manufacturing progress in the environment of the principal areas of research application, and challenges.
Noise resistance territorial intensity-based optical flow using inverse confi...journalBEEI
This paper presents the use of the inverse confidential technique on bilateral function with the territorial intensity-based optical flow to prove the effectiveness in noise resistance environment. In general, the image’s motion vector is coded by the technique called optical flow where the sequences of the image are used to determine the motion vector. But, the accuracy rate of the motion vector is reduced when the source of image sequences is interfered by noises. This work proved that the inverse confidential technique on bilateral function can increase the percentage of accuracy in the motion vector determination by the territorial intensity-based optical flow under the noisy environment. We performed the testing with several kinds of non-Gaussian noises at several patterns of standard image sequences by analyzing the result of the motion vector in a form of the error vector magnitude (EVM) and compared it with several noise resistance techniques in territorial intensity-based optical flow method.
Modeling climate phenomenon with software grids analysis and display system i...journalBEEI
This study aims to model climate change based on rainfall, air temperature, pressure, humidity and wind with grADS software and create a global warming module. This research uses 3D model, define, design, and develop. The results of the modeling of the five climate elements consist of the annual average temperature in Indonesia in 2009-2015 which is between 29oC to 30.1oC, the horizontal distribution of the annual average pressure in Indonesia in 2009-2018 is between 800 mBar to 1000 mBar, the horizontal distribution the average annual humidity in Indonesia in 2009 and 2011 ranged between 27-57, in 2012-2015, 2017 and 2018 it ranged between 30-60, during the East Monsoon, the wind circulation moved from northern Indonesia to the southern region Indonesia. During the west monsoon, the wind circulation moves from the southern part of Indonesia to the northern part of Indonesia. The global warming module for SMA/MA produced is feasible to use, this is in accordance with the value given by the validate of 69 which is in the appropriate category and the response of teachers and students through a 91% questionnaire.
An approach of re-organizing input dataset to enhance the quality of emotion ...journalBEEI
The purpose of this paper is to propose an approach of re-organizing input data to recognize emotion based on short signal segments and increase the quality of emotional recognition using physiological signals. MIT's long physiological signal set was divided into two new datasets, with shorter and overlapped segments. Three different classification methods (support vector machine, random forest, and multilayer perceptron) were implemented to identify eight emotional states based on statistical features of each segment in these two datasets. By re-organizing the input dataset, the quality of recognition results was enhanced. The random forest shows the best classification result among three implemented classification methods, with an accuracy of 97.72% for eight emotional states, on the overlapped dataset. This approach shows that, by re-organizing the input dataset, the high accuracy of recognition results can be achieved without the use of EEG and ECG signals.
Parking detection system using background subtraction and HSV color segmentationjournalBEEI
Manual system vehicle parking makes finding vacant parking lots difficult, so it has to check directly to the vacant space. If many people do parking, then the time needed for it is very much or requires many people to handle it. This research develops a real-time parking system to detect parking. The system is designed using the HSV color segmentation method in determining the background image. In addition, the detection process uses the background subtraction method. Applying these two methods requires image preprocessing using several methods such as grayscaling, blurring (low-pass filter). In addition, it is followed by a thresholding and filtering process to get the best image in the detection process. In the process, there is a determination of the ROI to determine the focus area of the object identified as empty parking. The parking detection process produces the best average accuracy of 95.76%. The minimum threshold value of 255 pixels is 0.4. This value is the best value from 33 test data in several criteria, such as the time of capture, composition and color of the vehicle, the shape of the shadow of the object’s environment, and the intensity of light. This parking detection system can be implemented in real-time to determine the position of an empty place.
Quality of service performances of video and voice transmission in universal ...journalBEEI
The universal mobile telecommunications system (UMTS) has distinct benefits in that it supports a wide range of quality of service (QoS) criteria that users require in order to fulfill their requirements. The transmission of video and audio in real-time applications places a high demand on the cellular network, therefore QoS is a major problem in these applications. The ability to provide QoS in the UMTS backbone network necessitates an active QoS mechanism in order to maintain the necessary level of convenience on UMTS networks. For UMTS networks, investigation models for end-to-end QoS, total transmitted and received data, packet loss, and throughput providing techniques are run and assessed and the simulation results are examined. According to the results, appropriate QoS adaption allows for specific voice and video transmission. Finally, by analyzing existing QoS parameters, the QoS performance of 4G/UMTS networks may be improved.
Overview of the fundamental roles in Hydropower generation and the components involved in wider Electrical Engineering.
This paper presents the design and construction of hydroelectric dams from the hydrologist’s survey of the valley before construction, all aspects and involved disciplines, fluid dynamics, structural engineering, generation and mains frequency regulation to the very transmission of power through the network in the United Kingdom.
Author: Robbie Edward Sayers
Collaborators and co editors: Charlie Sims and Connor Healey.
(C) 2024 Robbie E. Sayers
Immunizing Image Classifiers Against Localized Adversary Attacksgerogepatton
This paper addresses the vulnerability of deep learning models, particularly convolutional neural networks
(CNN)s, to adversarial attacks and presents a proactive training technique designed to counter them. We
introduce a novel volumization algorithm, which transforms 2D images into 3D volumetric representations.
When combined with 3D convolution and deep curriculum learning optimization (CLO), itsignificantly improves
the immunity of models against localized universal attacks by up to 40%. We evaluate our proposed approach
using contemporary CNN architectures and the modified Canadian Institute for Advanced Research (CIFAR-10
and CIFAR-100) and ImageNet Large Scale Visual Recognition Challenge (ILSVRC12) datasets, showcasing
accuracy improvements over previous techniques. The results indicate that the combination of the volumetric
input and curriculum learning holds significant promise for mitigating adversarial attacks without necessitating
adversary training.
Hierarchical Digital Twin of a Naval Power SystemKerry Sado
A hierarchical digital twin of a Naval DC power system has been developed and experimentally verified. Similar to other state-of-the-art digital twins, this technology creates a digital replica of the physical system executed in real-time or faster, which can modify hardware controls. However, its advantage stems from distributing computational efforts by utilizing a hierarchical structure composed of lower-level digital twin blocks and a higher-level system digital twin. Each digital twin block is associated with a physical subsystem of the hardware and communicates with a singular system digital twin, which creates a system-level response. By extracting information from each level of the hierarchy, power system controls of the hardware were reconfigured autonomously. This hierarchical digital twin development offers several advantages over other digital twins, particularly in the field of naval power systems. The hierarchical structure allows for greater computational efficiency and scalability while the ability to autonomously reconfigure hardware controls offers increased flexibility and responsiveness. The hierarchical decomposition and models utilized were well aligned with the physical twin, as indicated by the maximum deviations between the developed digital twin hierarchy and the hardware.
Cosmetic shop management system project report.pdfKamal Acharya
Buying new cosmetic products is difficult. It can even be scary for those who have sensitive skin and are prone to skin trouble. The information needed to alleviate this problem is on the back of each product, but it's thought to interpret those ingredient lists unless you have a background in chemistry.
Instead of buying and hoping for the best, we can use data science to help us predict which products may be good fits for us. It includes various function programs to do the above mentioned tasks.
Data file handling has been effectively used in the program.
The automated cosmetic shop management system should deal with the automation of general workflow and administration process of the shop. The main processes of the system focus on customer's request where the system is able to search the most appropriate products and deliver it to the customers. It should help the employees to quickly identify the list of cosmetic product that have reached the minimum quantity and also keep a track of expired date for each cosmetic product. It should help the employees to find the rack number in which the product is placed.It is also Faster and more efficient way.
Water scarcity is the lack of fresh water resources to meet the standard water demand. There are two type of water scarcity. One is physical. The other is economic water scarcity.
Explore the innovative world of trenchless pipe repair with our comprehensive guide, "The Benefits and Techniques of Trenchless Pipe Repair." This document delves into the modern methods of repairing underground pipes without the need for extensive excavation, highlighting the numerous advantages and the latest techniques used in the industry.
Learn about the cost savings, reduced environmental impact, and minimal disruption associated with trenchless technology. Discover detailed explanations of popular techniques such as pipe bursting, cured-in-place pipe (CIPP) lining, and directional drilling. Understand how these methods can be applied to various types of infrastructure, from residential plumbing to large-scale municipal systems.
Ideal for homeowners, contractors, engineers, and anyone interested in modern plumbing solutions, this guide provides valuable insights into why trenchless pipe repair is becoming the preferred choice for pipe rehabilitation. Stay informed about the latest advancements and best practices in the field.
Welcome to WIPAC Monthly the magazine brought to you by the LinkedIn Group Water Industry Process Automation & Control.
In this month's edition, along with this month's industry news to celebrate the 13 years since the group was created we have articles including
A case study of the used of Advanced Process Control at the Wastewater Treatment works at Lleida in Spain
A look back on an article on smart wastewater networks in order to see how the industry has measured up in the interim around the adoption of Digital Transformation in the Water Industry.
About
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Technical Specifications
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
Key Features
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface
• Compatible with MAFI CCR system
• Copatiable with IDM8000 CCR
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
Application
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Novel design of a fractional wavelet and its application to image denoising
1. Bulletin of Electrical Engineering and Informatics
Vol. 9, No. 1, February 2020,pp. 129~140
ISSN: 2302-9285,DOI: 10.11591/eei.v9i1.1548 129
Journal homepage: http://beei.org
Novel design of a fractional wavelet and its application to
image denoising
Lanani Abderrahim1, Meghriche Salama2,Djouambi Abdelbaki3
1
Department of Electronics, University of Batna 2, Mostefa Ben Boulaid, Batna, Algeria
2
Department of Pharmaceutical Engineering, University of Constantine 3, Salah Boubnider, Constantine, Algeria
3
Department of Electrical Engineering, Larbi Ben M’hidi University, Oum El Bouaghi, Algeria
Article Info ABSTRACT
Article history:
Received Feb 23, 2019
Revised Jun 2, 2019
Accepted Sep 26, 2019
This paper proposes a new wavelet family based on fractional calculus.
The Haar wavelet is extended to fractional order by a generalization
of the associated conventional low-pass filter using the fractional delay
operator 𝑍−𝐷
. The high-pass fractional filter is then designed by a simple
modulation of the low-pass filter. In contrast, the scaling and wavelet
functions are constructed using the cascade Daubechies algorithm.
The regularity and orthogonality of the obtained wavelet basis are ensured by
a good choice of the fractional filter coefficients. An application example
is presented to illustrate the effectiveness of the proposed method. Thanks to
the flexibility of the fractional filters, the proposed approach provides better
performance in term of image denoising.
Keywords:
Fractionaldelay
Fractionalfilters
Image denoising
The Haarwavelet
This is an open access article under the CC BY-SA license.
Corresponding Author:
LananiAbderrahim,
Department of Electronics,
University of Batna 2,Mostefa Ben Boulaid, Batna,Algeria.
Email: lanani_arahim@yahoo.fr
1. INTRODUCTION
The main purpose of signal processing is to describe signals related to the real world for the purpose
of processing, identifying, compressing, understanding or transmitting. In this context, wavelets have always
played a very important role, and we no longer count the applications that use them. It is a tool allows
analyzing and locating the discontinuities of a signal along one or two dimensions and at different scales.
This feature is used to solve many problems,such as image compression and restoration [1].
Since their introduction, the wavelets have been very rapidly developed and have attracted
the attention of many researchers. Solid mathematical foundations (basis) were quickly put into place for
the notions of an orthogonal basis [2], multiresolution analysis [3-5] and wavelets with compact support [6],
giving birth to several real, complex and fractional wavelet families [1]. However, identification of an
adequate analyzing wavelet remains an important problem. No single wavelet has been adapted to all cases.
For some applications,it is possible that no suitable wavelet exists amongthe known wavelets. In such cases,
it is necessary to try to build a new wavelet adapted to the specific problem to be addressed.
Thus, many studies have appeared whose purpose is to build wavelets which have more elegant
mathematical properties and are more efficient. Among the wavelets which are currently of considerable
interest those based on fractional calculus. The main advantage of having a fractional order is flexibility,
which allows adjustments in transform parameters such as regularity and localization of the base
functions [5]. These advantages can be exploited to improve several approaches and ameliorate problems
such as denoising by thresholding wavelet coefficients [1]. The idea of fractional wavelets was first proposed
2. ISSN: 2302-9285
Bulletin of Electr Eng & Inf, Vol. 9, No. 1, February 2020 : 129 – 140
130
by Mendlovic [7] in the context of optical signal processing, where they were defined as a cascade
of the classical wavelet transform and the fractional Fourier transform (FRFT) [8]. Shortly thereafter,
Huang and Suter [9] proposed a fractional version of the wave packet transform (FRWPT), based on
combining FRFT and the wave packet transform (WPT). Due to a lack of physical interpretation
and the complexity of the calculation, the FRWPT unfortunately did not receive much attention.
However, several years later, the idea was extended in the context of spline wavelets to non-integer
degrees [10]. Quincunx wavelets have also been generalized to non-integer orders with a construction based
on fractional Quincunx filters, which are generated through the diamond McClellan transform [11].
Several fractional wavelet models have recently been proposed and developed, with a wide
range of applications[12˗16].
The aim of the present paper is to introduce the new fractional wavelet (NFRW), which we consider
a generalization of the Haar wavelet [1]. However, this idea can also be extended to generalize other wavelet
families. The construction generally begins with the choice of a low-pass digital filter with the orthogonality
property checked in Fourier or direct space; then it is generalized through the fractional delay (FD) Z-D
[17]
while ensuring correct properties of orthogonality, compact support and regularity. The high-pass filter can
then be built from the low-pass filter, and the associated scaling function and wavelet can be deduced.
To illustrate the potential of the proposed wavelet, we present a denoising application on images. The rest of
this paper is organized as follows. Section 2 briefly defines the discrete wavelet transform (DWT) and
introduces the relation between multiresolution analysis and filter banks. Section 3 proposes the NFRW.
Section 4 examines and simulates an experimental application of the NFRW. Finally, section 5 presents
concluding remarks.
2. DISCRETE WAVELET TRANSFORM AND FILTER BANKS
The DWT is a multiresolution/multifrequency representation. This tool separates the data, functions
or operators in frequency components according to a resolution adapted to the scale. The multiresolution
analysis developed by Mallat [5] connects the DWT and filter banks in an elegant way, with the DWT
considered as a process of decomposing the signal into approximations and details. The original signal 𝑥
̃[n]
passes through two complementary low-pass and high-pass filters ℎ
̃[n] and 𝑔
̃[n], followed by a factor 2
subsampling, and emerges as two signals: the approxima tion signal A and the detail signal D,
respectively [5]. Figure 1 illustrates this principle. The reconstruction is performed by low-pass and high-pass
synthesis filters ℎ
̅[n] and 𝑔̅[n], preceded by a factor2 upsampling, as illustrated in Figure 2.
Figure 1. One-dimensional
wavelet decomposition
Figure 2. One-dimensional wavelet reconstruction
The filter bank ensures a perfect reconstruction if and only if [18]
(1)
Where 𝐻
̃, 𝐺
̃, 𝐻
̅ and 𝐺̅ are, respectively, the transfer functions of the low-pass and high-pass analysis
and the synthesis filters. In the case of an orthogonal basis, the high-pass filter is a modulated version of
the low-pass filter; however, the analysisand synthesis filters are identical up to a centralsymmetry.
3. Bulletin of Electr Eng & Inf ISSN: 2302-9285
Novel design of a fractional wavelet and its application to image denoising (Lanani Abderrahim)
131
Moreover, the orthogonal wavelet transform is generally characterized by a scaling function 𝝋 and
wavelet 𝝍 (for more details see [19]), where the scaling function can be expressed in terms of the low-pass
filter by the equation
𝜑(𝑥) = ∑ ℎ
̃[𝑛]√2𝜑(2𝑥 − 𝑛).
𝑛 (2)
In contrast, the wavelet function decomposes at the lower scale based on the scaling functions and can be
expressed in terms of the high-pass filter by the equation
𝜓(𝑥) = ∑ 𝑔
̃[𝑛]√2
𝑛 𝜑(2𝑥 − 𝑛). (3)
3. PROPOSED DISCRETE FRACTIONAL WAVELET STRUCTURE
From a structural point of view, the DWT is identical to an iterated filter bank, which gives
it a multiresolution character, so we can use a fractional filter to implement a fractional discrete wavelet as
shown in Figure 3; indeed, based on fractional operators, we can build fractional filters which lead to
wavelets with interesting properties (precision, flexibility, regularity, etc.).
In this paper, we have chosen the Haar filter as the starting point for our construction; this is an
orthogonal FIR filter which has a linear phase, one vanishing moment and a finite support. It is generalized
using a fractional delay (FD) 𝑍−𝐷
, which is simulated by a filter which we call the “fractional delay filter”
(FDF). We can then build the high-pass fractional filter from the low-pass fractional filter and deduce
the associated scaling function and wavelet by the cascade algorithm [6]. A perfect reconstruction is ensured
by fractionalsynthesisfilters, built in accordance with the conditions of (1).
Figure 3. One-dimensional fractionalwavelet decomposition and reconstruction
3.1. Fractional filter design
The transfer function of the low-pass filter associated with the Haar analysis is described by
the equation [20]
𝐻
̃(𝑧) =
(1+𝑧−1)
√2
(4)
We propose a generalization of this function to a fractional order by exploiting the fractional operator Z-D
with D considered to be a real number:
𝐻𝑓
̃(𝑧) =
(1+𝑧−𝐷)
√2
(5)
This function can be written in a more general way as follows:
𝐻𝑓
̃(𝑧) = 𝐴 + 𝐵 ∙ 𝑍−𝐷
(6)
where 𝐷 ∈ ℝ is the filter order, and 𝐴 ∈ ℝ and 𝐵 ∈ ℝ are the coefficients. The orthogonality and regularity
of the scaling function and wavelet are ensured by a good choice of the coefficients A and B. In the classical
case, D=1, 𝐴 = 1 √2
⁄ and 𝐵 = 1 √2
⁄ .
4. ISSN: 2302-9285
Bulletin of Electr Eng & Inf, Vol. 9, No. 1, February 2020 : 129 – 140
132
In contrast, it should be noted that the fractional order digital delay 𝑍−𝐷
is represented by an
irrational function in which the impulse response is infinitely long. This is similar to a non-causal filter for
any finite shift in time, which makes its implementation an unrealizable task [17] and implies a very limited
implementation for the transfer function of the fractional filter 𝐻𝑓
̃ . Therefore, it is necessary to use
approximation techniques to obtain a realizable implementation of the FD and, obviously, a rational
representation for the transfer function of the fractional filter 𝐻𝑓
̃ . The majority of the design techniques
which have been proposed in the literature to approximate the FD focus exclusively on finite impulse
response (FIR) and infinite impulse response filters (IIR) [17]. In this paper, we focus on the FIR filter due to
its easy implementation and good approximation.
3.1.1. Fractional delay approximation using FIR filters
The transferfunction of the FIR filter approximatingthe FD 𝑍−𝐷
is given by [17]:
𝐻(𝑍) = ∑ ℎ[𝑛]𝑍−𝑛
𝑁
𝑛=0 , (7)
where N is the order of the filter and ℎ[n], n=0,1,...N, are the real coefficients which form the impulse
response of the FIR filter.
Several techniques have been developed to identify the coefficients h[n], such as windowing
methods, maximally flat FIR approximation (Lagrange interpolation), FIR filter design with a smooth
transition band function,the minimax or Chebyshev method,and the stochastic method. More deta ils a bout
these can be found in [17]. In the present paper, we choose the method based on Lagrange interpolation,
due to the ease of calculating filter coefficients from a closed form equation and also because the filter
obtained by this method has a completely flat magnitude frequency response at low frequencies.
Indeed, the Lagrange interpolation is one of the simplest and most efficient methods for designing an FIR
filter approximatingthe FD 𝑍−𝐷
. The FDF coefficients are given by [17]:
ℎ[𝑛] = ∏ 𝐷−𝑘
𝑛−𝑘
𝑁
𝑘=0
𝑘≠𝑛
𝑓𝑜𝑟 𝑛 = 0,1,2, … 𝑁 (8)
where N is the order of the filter and D is the desired delay,
𝑁−1
2
≤ 𝐷 ≤
𝑁+1
2
𝑓𝑜𝑟 𝑜𝑑𝑑 𝑁
such that (9)
𝑁
2
− 1 ≤ 𝐷 ≤
𝑁
2
+ 1 𝑓𝑜𝑟 𝑒𝑣𝑒𝑛 𝑁.
Using (7), we draw up Table 1, which groups the coefficients for Lagrange FD filters of order
N=1, 2 and 3.
Table 1. The coefficients of the Lagrange fractionaldelay filters of order N=1, 2 and 3
h[0] h[1] h[2] h[3]
N=1 1-D D
N=2 (D-1)(D-2)/2 -D(D-2) D(D-1)/2
N=3 -(D-1)(D-2)(D-3)/6 D(D-2)(D-3)/2 -D(D-1)(D-3)/2 D(D-1)(D-2)/6
3.1.2. Fractional filter bank approximation
Following the approximation of the FD 𝑍−𝐷
by an FIR filter, the transfer function of the fractional
filter 𝐻𝑓
̃ (6) is represented by the following function:
𝐻𝑓
̃(𝑧) ≈ 𝐴 + 𝐵 ∙ (∑ ℎ[𝑛]𝑍−𝑛
).
𝑁
𝑛=0 (10)
Where h(n) and N are respectively the coefficients and the order of the FIR filter approximating
the FD 𝑍−𝐷
, and A and B are the coefficients of the fractional filter which constitutes the wavelet. In order to
ensure the orthogonality and regularity of the scaling function and the wavelet, the coefficients A and B are
chosen according to the following conditions [2-3], [21]:
5. Bulletin of Electr Eng & Inf ISSN: 2302-9285
Novel design of a fractional wavelet and its application to image denoising (Lanani Abderrahim)
133
∀ 𝜔 ∈ ℝ, |𝐻𝑓
̃(𝜔)|
2
+ |𝐻𝑓
̃(𝜔 + 𝜋)|
2
= 2, (11)
𝐻𝑓
̃(0) = √2, (12)
|𝐻𝑓
̃(𝜋)| = 0. (13)
Condition (11) is a constraint corresponding to the orthonormality of the scaling function,and it also
means that the filter 𝐻𝑓
̃ is a conjugate mirror filter [22]. Condition (12) is a simple normalization, and
condition (13) ensures the regularity of the scaling functions and wavelets. There exist only a few solutions
for identifying A and B while respecting these three conditions. In this paper, we calculate A and B while
ensuring that conditions (12) and (13) hold; however, condition (11) is provided only approximately, i.e.:
|𝐻𝑓
̃(𝜔)|
2
+ |𝐻𝑓
̃(𝜔 + 𝜋)|
2
≈ 2, (14)
|𝐻𝑓
̃(𝜔)|
2
+ |𝐻𝑓
̃(𝜔 + 𝜋)|
2
− 2 = 𝜀. (15)
The coefficients A and B of the fractionalfilter 𝐻𝑓
̃ are given in Table 2 for N=1, 2 and 3.
The error 𝜀 is very small and does not have dramatic effects on our construction, while the fractional
filter 𝐻𝑓
̃ generates regular orthogonal bases for 0.5 < 𝐷 < 1.7, which implies a limitation of the FD order to
the interval [0.5, 1.7]. Beyond this interval, the accuracy of the calculation can cause problems,
and the orthogonality of the obtained bases is lost.
Table 2. Fractionalfilter coefficients for different values of N
A B
N=1 √2 −
√2
1 − (ℎ[0]− ℎ[1])
√2
1 − (ℎ[0]− ℎ[1])
N=2 √2 −
√2
1 − (ℎ[0]− ℎ[1] + ℎ[2])
√2
1 − (ℎ[0]− ℎ[1]+ ℎ[2])
N=3 √2 −
√2
1 − (ℎ[0]− ℎ[1]+ ℎ[2] − ℎ[3])
√2
1 − (ℎ[0]− ℎ[1]+ ℎ[2] − ℎ[3])
According to the above table, the fractional filter 𝐻𝑓
̃ is represented by a finite number of non-zero
coefficients, i.e. it is a filter with compact support, where the number of coefficients is directly related to
the FD filter order (length of filter 𝐻𝑓
̃=FD filter order + 1). The regularity of the scaling function
and the wavelet are ensured as long asthe zero of 𝐻𝑓
̃(𝜔) at 𝜔 = 𝜋 has an order of at least 1 [21].
On the other hand, as indicated above (in section 2), the high-pass fractional filter is a modulated
version of the low-pass filter, where the transfer function is defined by the property of quadrature mirror
filters [23]; its coefficient is given by the following expression:
𝑔𝑓
̃[𝑛] = (−1)𝑁−𝑛
ℎ𝑓
̃[𝑁 − 𝑛]. (16)
However, the synthesis filters (H and G) are constructed according to (1), and their coefficients
are defined asfollows:
ℎ
̅𝑓
[𝑛] = ℎ𝑓
̃[𝑁 − 𝑛], (17)
𝑔̅𝑓
[𝑛] = 𝑔𝑓
̃[𝑁 − 𝑛]. (18)
The frequency responses of the analysis and synthesis filters (𝐻
̃, 𝐺
̃, 𝐻
̅ and 𝐺̅) are adjusted by
the variation of the parameter D, as shown in Figure 4. It can be seen that the generalization of these filters
through the fractional operator Z-D
leads to more flexible filters with better precision, allowing a continuous
adjustment of the key parametersof the filters.
6. ISSN: 2302-9285
Bulletin of Electr Eng & Inf, Vol. 9, No. 1, February 2020 : 129 – 140
134
(a) (b)
(c) (d)
Figure 4. Frequency responses of analysis and synthesis filters for N=2 and D=0.5 1.5: (a) low-pass analysis
filter, (b) high-pass analysisfilter, (c) low-pass synthesis filter, (d) high-pass synthesis filter
3.2. Fractional scaling function and fractional wavelet
The construction of the scaling and wavelet functions is ensured by the cascade algorithm [6].
They are respectively represented in terms of the low-pass and high-pass filters ℎ
̃𝑓 and 𝑔
̃𝑓 by
the following expressions:
𝜑𝑓
(𝑥) = ∑ ℎ
̃𝑓
𝑛
[𝑛]√2𝜑𝑓
(2𝑥 − 𝑛), (19)
𝜓𝑓
(𝑥) = ∑ 𝑔
̃𝑓
𝑛
[𝑛]√2𝜑𝑓
(2𝑥 − 𝑛). (20)
Figure 5 presents the scaling and wavelet functions for different values of D: 0.5, 0.8, 1, 1.1, 1.3 and 1.5.
It can be seen that these functions gain in regularity with the increase of the parameter D, until the value
D=1.7, where the orthogonality of the obtained base is completely lost.
0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1
0
0.5
1
1.5
Normalized Frequency
Magnitude
D=0.5
D=1.5
0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1
0
0.5
1
1.5
Normalized Frequency
Magnitude
D=1.5
D=0.5
0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1
0
0.5
1
1.5
Normalized Frequency
Magnitude
D=0.5
D=1.5
0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1
0
0.5
1
1.5
Normalized Frequency
Magnitude
D=1.5
D=0.5
7. Bulletin of Electr Eng & Inf ISSN: 2302-9285
Novel design of a fractional wavelet and its application to image denoising (Lanani Abderrahim)
135
Figure 5. The fractionalscaling and wavelet functions fordifferent values of D
4. APPLICATION AND RESULTS
In this section, to illustrate the potential of the proposed wavelet, some results of using the proposed
fractional wavelet in image denoising algorithm are presented. The denoising algorithms, which threshold
wavelet coefficients, are based on an estimation of the noise variance. This estimation is obtained according
to a statistical calculation performed on the wavelet coefficients at the first scale. The threshold computed
from this estimation is then applied at each scale to denoise the image (for more details see [24]).
In the context of dyadic analysis, an adaptive threshold selection using Stein's unbiased risk estimate
(SURE) principle and hard thresholding [25], the denoising algorithm is applied to a set of 8-bit gray scale
images: Lena,boat,cameraman and building as shown in Figure 6, corrupted by simulated additive Gaussia n
0 1 2 3
-2
-1.5
-1
-0.5
0
0.5
1
1.5
2
2.5
3
Scaling function for D = 0.5
Time
Magnitude
0 1 2 3
-3
-2
-1
0
1
2
3
4
5
Wavelet function for D = 0.5
Time
Magnitude
0 1 2 3
-1
-0.5
0
0.5
1
1.5
2
Scaling function for D = 0.8
Time
Magnitude
0 1 2 3
-2
-1.5
-1
-0.5
0
0.5
1
1.5
2
2.5
Wavelet function for D = 0.8
Time
Magnitude
0 0.5 1 1.5
0
0.2
0.4
0.6
0.8
1
1.2
1.4
Scaling function for D = 1
Time
Magnitude
0 0.5 1 1.5
-1.5
-1
-0.5
0
0.5
1
1.5
Wavelet function for D = 1
Time
Magnitude
0 1 2 3 4
-0.2
0
0.2
0.4
0.6
0.8
1
1.2
Scaling function for D =1.1
Time
Magnitude
0 1 2 3 4
-1.5
-1
-0.5
0
0.5
1
Wavelet function for D =1.1
Time
Magnitude
0 1 2 3 4
-0.2
0
0.2
0.4
0.6
0.8
1
1.2
Scaling function for D = 1.3
Time
Magnitude
0 1 2 3 4
-1.5
-1
-0.5
0
0.5
1
Wavelet function for D = 1.3
Time
Magnitude
0 1 2 3
0
0.2
0.4
0.6
0.8
1
1.2
1.4
Scaling function for D = 1.5
Time
Magnitude
0 1 2 3
-1.2
-1
-0.8
-0.6
-0.4
-0.2
0
0.2
0.4
0.6
Wavelet function for D = 1.5
Time
Magnitude
8. ISSN: 2302-9285
Bulletin of Electr Eng & Inf, Vol. 9, No. 1, February 2020 : 129 – 140
136
white noise with standard deviations of 10, 20 and 30. The wavelet basis proposed in this paper (generalized
Haar)is exploited for different valuesof D, where the ordinary case is D=1.
Figure 6. Input images (Lena, boat,cameraman and building)
To evaluate and measure the quality of the restoration, the peak signal-to-noise ratio (PSNR) is computed
(with MATLAB® coding). It is defined for a B-bit gray scale level by the equation
𝑃𝑆𝑁𝑅 = 10𝑙𝑜𝑔10 (
(2𝐵−1)
2
𝑀𝑆𝐸
). (21)
where MSE is the mean square error between the initial image (without noise) and the denoised image.
The PSNR results after denoising are reported in Table 3, for different values of the parameter D.
Figure 7 presents the PSNR variationsof the Lena,building, cameraman and boat image denoising with three
different noise levels using the proposed wavelet basis with different values of D.
Table 3. PSNR (dB) results of denoising images with Gaussian noise with standard deviations σ=10, 20 and
30, using several values of D.
PSNR denoisedimage (dB)
Input
image
σ/PSNR
noised
image
D=0.5 D=0.6 D=0.7 D=0.8 D=0.9 D=1 D=1.1 D=1.2 D=1.3 D=1.4
D=1.5
D=1.6
Lena
512x5
12
σ=10/ 20.00 21.89 22.16 22.86 23.44 24.15 24.95 26.23 27.36 27.81 28.13
28.43
27.65
σ=20/ 13.98 16.58 17.00 17.60 18.25 18.93 18.93 21.10 22.29 22.88 23.43
23.86
22.89
σ=30/ 10.46 13.21 13.74 14.45 15.22 15.98 15.98 17.77 19.00 19.51 20.18
20.67
19.56
Buildi
ng
512x5
12
σ=10/20.00 18.64 18.84 19.33 20.08 21.28 22.60 23.36 23.69 23.83 23.71
23.81
23.58
σ=20/13.98 15.55 16.22 16.73 17.29 17.99 18.72 19.82 17.14 21.04 21.35
21.59
21.01
σ=30/10.46 13.13 13.62 13.62 14.87 15.51 15.85 17.14 18.20 18.61 19.11
19.43
18.63
Came
raman
256x2
56
σ=10/20.02 18.29 18.81 19.65 20.20 20.92 23.18 24.15 24.59 24.61 24.36
24.46
21.30
σ=20/13.97 15.81 16.28 16.91 17.40 18.07 18.07 20.12 21.05 21.32 21.66
21.94
18.74
σ=30/10.45
13.46 13.54 14.11 14.89 15.52 15.52 17.28 18.44 18.71 19.31
19.63
18.74
Boat
512x5
12
σ=10/20.00
20.87 21.64 21.79 22.55 23.06 24.22 25.29 26.10 26.39 26.51
26.71
26.18
σ=20/13.98 16.35 16.79 17.44 17.94 18.64 19.44 20.77 21.88 22.31 22.82
23.18
22.30
σ=30/10.46 13.04 13.55 14.24 15.04 15.81 16.21 17.60 18.83 19.30 19.92
20.36
19.33
9. Bulletin of Electr Eng & Inf ISSN: 2302-9285
Novel design of a fractional wavelet and its application to image denoising (Lanani Abderrahim)
137
Figure 7. Presents the PSNR variations of the Lena, building, cameraman and boat image denoising
0.4 0.6 0.8 1 1.2 1.4 1.6 1.8
12
14
16
18
20
22
24
26
28
30
lena 512x512
Fractional order D
PSNR
(dB)
Noise 10%
Noise 20%
Noise 30%
0.4 0.6 0.8 1 1.2 1.4 1.6 1.8 2
0
5
10
15
20
25
30
lena 512x512
Fractional order D
PSNR
(dB)
Noise 10%
Noise 20%
Noise 30%
0.4 0.6 0.8 1 1.2 1.4 1.6 1.8
12
14
16
18
20
22
24
building 512x512
Fractional order D
PSNR
(dB)
Noise 10%
Noise 20%
Noise 30%
0.4 0.6 0.8 1 1.2 1.4 1.6 1.8 2
0
5
10
15
20
25
building 512x512
Fractional order D
PSNR
(dB)
Noise 10%
Noise 20%
Noise 30%
0.4 0.6 0.8 1 1.2 1.4 1.6 1.8
12
14
16
18
20
22
24
26
Cameraman 256x256
Fractional order D
PSNR
(dB)
Noise 10%
Noise 20%
Noise 30%
0.4 0.6 0.8 1 1.2 1.4 1.6 1.8 2
0
5
10
15
20
25
Cameraman 256x256
Fractional order D
PSNR
(dB)
Noise 10%
Noise 20%
Noise 30%
0.4 0.6 0.8 1 1.2 1.4 1.6 1.8
12
14
16
18
20
22
24
26
28
Boat 512x512
Fractional order D
PSNR
(dB)
Noise 10%
Noise 20%
Noise 30%
0.4 0.6 0.8 1 1.2 1.4 1.6 1.8 2
0
5
10
15
20
25
30
Boat 512x512
Fractional order D
PSNR
(dB)
Noise 10%
Noise 20%
Noise 30%
10. ISSN: 2302-9285
Bulletin of Electr Eng & Inf, Vol. 9, No. 1, February 2020 : 129 – 140
138
As can be seen, the best value of the PSNR for all images with different noise densities corresponds
to a fractionalvalue of the parameterD, which indicates that the fractionalanalysis leads to an improvemen t
in the denoising result due to the flexibility of the fractional filters which constitute the proposed wavelet
basis. Moreover, it can be seen in the denoising results for the images Lena,boat,cameraman and building as
shown in Figure 8 that the use of fractional calculation through the FD 𝑧−𝐷
offers considerable performance
improvement in terms of visual quality, especially because the noise is eliminated with significant
preservation of edge sharpness.
Noisy image D=0.8 D=1
D=1.1 D=1.3 D=1.5
Noisy image D=0.8 D=1
D=1.1 D=1.3 D=1.5
Figure 8. Comparison of the visual quality of the images lena, boat,cameraman and building
for different values of D
11. Bulletin of Electr Eng & Inf ISSN: 2302-9285
Novel design of a fractional wavelet and its application to image denoising (Lanani Abderrahim)
139
Noisy image D=0.8 D=1
D=1.1 D=1.3 D=1.5
Noisy image D=0.8 D=1
D=1.1 D=1.3 D=1.5
Figure 8. Comparison of the visual quality of the images lena, boat,cameraman and building
for different values of D (continue)
5. CONCLUSION
In this paper, we have introduced a generalization of the Haar wavelet using fractional operators,
where the construction is based on exploiting the FD 𝑍−𝐷
, approximated by an FIR filter. Variation of
the parameter D provides greater flexibility for the fractional filters which constitute the wavelet, leading to
more precise decomposition (in terms of detail and approximation). To illustrate the effectiveness of
the proposed fractional wavelet (generalized Haar), we have presented the results of using a denoising
application on images. The results are very promising, and this idea can be expanded to generalize other
families of wavelets.
12. ISSN: 2302-9285
Bulletin of Electr Eng & Inf, Vol. 9, No. 1, February 2020 : 129 – 140
140
REFERENCES
[1] Michel Misiti, Yves Misiti, Georges Oppenheim and Jean-Michel Poggi, “Wavelets and their applications,”
ISTE, 2007.
[2] Y. Meyer, “Wavelets and operators,” Advanced mathematics. Cambridge University Press, 1992.
[3] S. Mallat, “Multi-resolution approximations and wavelet orthonormal bases of 𝐿2
(ℝ),” Trans. Am. Math. Soc.,
vol. 315, no. 1, pp. 69-87, sep. 1989.
[4] S. G. Mallat, "Multifrequency channel decompositions of images and wavelet models," in IEEE Transactions on
Acoustics, Speech, and Signal Processing, vol. 37, no. 12, pp. 2091-2110, Dec. 1989.
[5] S. G. Mallat, "A theory for multiresolution signal decomposition: the wavelet representation," in
IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 11, no. 7, pp. 674-693, July 1989.
[6] I. Daubechies, “Orthonormal bases of compactly supported wavelets,” Com. on Pure Appl. Math., vol. 41,
pp. 909-996, nov. 1988.
[7] D. Mendlovic, Z. Zalevsky, D. Mas, J. Garcia, and C. Ferreira, “Fractional wavelet transform,” Appl. Opt., vol. 36,
pp. 4801-4806, 1997.
[8] Tao R, Deng B, Wang Y, “Research progress of the fractional Fourier transform in signal processing,” Sci China
Ser F-Inf Sci, vol. 49, pp. 1-25, 2006.
[9] Huang Y, Suter B, “The fractional wave packet transform,” Multidim Sys Signal Process, vol 9, pp 399-402, 1998.
[10] M. Unser, T. Blu, “Fractional splines and wavelets,” SIAM Review, vol. 42, pp. 43–67, 2000.
[11] M. Feilner, M. Jacob and M. Unser, "Orthogonal quincunx wavelets with fractional orders," Proceedings 2001
International Conference on Image Processing (Cat. No.01CH37205), Thessaloniki, Greece, vol. 1,
pp. 606-609, 2001.
[12] Linfei Chen, Daomu Zhao, “Optical image encryption based on fractional wavelet transform,” Optics
Communications, vol. 254, pp. 361-367, 2005.
[13] Jun Shi, Nai Tong Zhang, Xiao Ping Liu, “A novel fractional wavelet transform and its applications,” Sci China
Ser F-Inf Sci, vol. 55, pp. 1270-1279, 2012.
[14] J. Shi , X. Liu, N. Zhang, “Multiresolution analysis and orthogonal wavelets associated with fractional wavelet
transform,” Signal Image Video Process, vol. 9, pp. 211-220, 2013.
[15] Gaurav Bhatnagar, Q.M. Jonathan Wu, Balasubramanian Raman, “Discrete fractional wavelet transform and its
application to multiple encryption,” Information Sciences, vol. 223, pp. 297-316, 2013.
[16] Dai Hongzhe, Zheng Zhibao, Wang Wei, “A new fractional wavelet transform,” Communications in Nonlinear
Science and Numerical Simulation, vol. 44, pp. 19-36, 2016.
[17] T. I. Laakso, V. Valimaki, M. Karjalainen and U. K. Laine, "Splitting the unit delay [FIR/all pass filters design],"
in IEEE Signal Processing Magazine, vol. 13, no. 1, pp. 30-60, Jan. 1996.
[18] M. Vetterli, J. Kovacevic. “Wavelets and Subband Coding”. Prentice-Hall, Englewood Cliffs, New Jersey, 1995.
[19] M. Vetterli and C. Herley, "Wavelets and filter banks: theory and design," in IEEE Transactions on Signal
Processing, vol. 40, no. 9, pp. 2207-2232, Sept. 1992.
[20] I. Daubechies, “Ten Lectures on wavelets,” Springer-Verlag, 1992.
[21] P. Tchamitchian, “Biorthogonalité et théorie des opérateurs,” Revista Mathemática Iberoamericana, vol. 3,
pp. 163-189, 1987.
[22] S. Mallat. “A wavelet tour of signal processing”. Second edition, Academic Press, 1998.
[23] A. Croisier, D. Esteban, and C. Galand, “Perfect channel splitting by use of interpolation/decimation/tree
decomposition techniques,” In Int. Conf. on Inform. Sciences and Systems, pages 443–446, Patras, Greece,
August 1976.
[24] R. Coifman, D. Donoho, “Time-invariant wavelet denoising,” in: A. Antoniadis, G. Oppenhiem, Lecture Notes in
Statistics, vol. 103, pp. 125-150, Springer, Berlin, 1995.
[25] D. Donoho, I. Johnstone, “Adapting to unknown smoothness via wavelet shrinkage,” J. Amer. Statist. Assoc,
vol. 90, pp. 1200-1244, 1995.