2014 International Conference on Communication and Signal Processing最新文献

筛选
英文 中文
Estimation of voltage signal analysis using Extended Kalman Filter 基于扩展卡尔曼滤波的电压信号估计分析
2014 International Conference on Communication and Signal Processing Pub Date : 2014-04-03 DOI: 10.1109/ICCSP.2014.6950131
G.Muthupandi, G.Sivakumar, M.Deepak Pious, M.Naveen Kumar
{"title":"Estimation of voltage signal analysis using Extended Kalman Filter","authors":"G.Muthupandi, G.Sivakumar, M.Deepak Pious, M.Naveen Kumar","doi":"10.1109/ICCSP.2014.6950131","DOIUrl":"https://doi.org/10.1109/ICCSP.2014.6950131","url":null,"abstract":"The fundamental voltage, current and phase angle are required for a wide variety of power system applications. The processed signal must be taken from the power source, when the disturbance is occurred in the system it is difficult to access the power system application. In the proposed method white noise is added into the input voltage waveform to get an unbalanced voltage signal from the source in simulation environment. Then, the unbalanced signal is given to an Extended Kalman filter circuits to estimate and remove the noise signal presents in the voltage waveform. The Extended Kalman Filter is used to remove the voltage disturbance from the power source.","PeriodicalId":149965,"journal":{"name":"2014 International Conference on Communication and Signal Processing","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132625634","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Probabilistic method for energy efficiency routing with node compromised resistance 考虑节点折衷电阻的能效路由的概率方法
2014 International Conference on Communication and Signal Processing Pub Date : 2014-04-03 DOI: 10.1109/ICCSP.2014.6949950
D. Singh, Shubhanjali Sharma, V. Jain, Jyoti Gajrani
{"title":"Probabilistic method for energy efficiency routing with node compromised resistance","authors":"D. Singh, Shubhanjali Sharma, V. Jain, Jyoti Gajrani","doi":"10.1109/ICCSP.2014.6949950","DOIUrl":"https://doi.org/10.1109/ICCSP.2014.6949950","url":null,"abstract":"A wireless sensor network is basically a data communication system that consists of from several to thousands of tiny wireless sensor nodes. These battery powered sensor nodes work with each other to accomplish data transmission. Since the lifetime of wireless sensor network depends on such battery powered sensor nodes, hop counts and battery power have been taken as metrics in routing protocols. In wireless sensor network, energy efficiency is most critical issue that should be considered while transmitting information or data packet from source node to sink node. Some techniques can be used by attacker communities through getting the knowledge about efficiency and trust relationship among the nodes and then insert some unwanted packets in the path from source to sink. DRP, MTRP and EENC are some techniques that can be used to provide energy efficient transmission of data packets. EENC is energy efficiency routing with node compromised resistance. This technique is based on the ant colony optimization technique. Three parameters in this technique, energy, trust and hop count are considered here to find out the compromised node among the nodes and remove the path from source to sink containing that node.","PeriodicalId":149965,"journal":{"name":"2014 International Conference on Communication and Signal Processing","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132726179","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Detection of Leukemia in microscopic images using image processing 利用图像处理技术检测显微图像中的白血病
2014 International Conference on Communication and Signal Processing Pub Date : 2014-04-03 DOI: 10.1109/ICCSP.2014.6949840
C. Raje, J. Rangole
{"title":"Detection of Leukemia in microscopic images using image processing","authors":"C. Raje, J. Rangole","doi":"10.1109/ICCSP.2014.6949840","DOIUrl":"https://doi.org/10.1109/ICCSP.2014.6949840","url":null,"abstract":"Leukemia occurs when lot of abnormal white blood cells produced by the bone marrow. Hematologist makes use of microscopic study of human blood, which leads to need of methods, including microscopic color imaging, segmentation, classification and clustering that can allow identification of patients suffering from Leukemia. The microscopic images will be inspected visually by hematologists and the process is time consuming and tiring. The automatic image processing system is urgently needed and can overcome related constraints in visual inspection. The proposed system will be on microscopic images to detect Leukemia. The early and fast identification of Leukemia greatly aids in providing the appropriate treatment. Initial segmentation is done using Statistical parameters such as mean, standard deviation which segregates white blood cells from other blood components i.e. erythrocytes and platelets. Geometrical features such as area, perimeter of the white blood cell nucleusis investigated for diagnostic prediction of Leukemia. The proposed method is successfully applied to a large number of images, showing promising results for varying image quality. Different image processing algorithms such as Image Enhancement, Thresholding, Mathematical morphology and Labelling are implemented using LabVIEW and MATLAB.","PeriodicalId":149965,"journal":{"name":"2014 International Conference on Communication and Signal Processing","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134488193","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 36
QoS performance analysis of routing protocols in Vehicular Ad-hoc Networks 车载自组织网络中路由协议的QoS性能分析
2014 International Conference on Communication and Signal Processing Pub Date : 2014-04-03 DOI: 10.1109/ICCSP.2014.6950051
D. Nagendar Naik, T. Hussain, S. Limbu, G. Patowary
{"title":"QoS performance analysis of routing protocols in Vehicular Ad-hoc Networks","authors":"D. Nagendar Naik, T. Hussain, S. Limbu, G. Patowary","doi":"10.1109/ICCSP.2014.6950051","DOIUrl":"https://doi.org/10.1109/ICCSP.2014.6950051","url":null,"abstract":"Vehicular Ad-hoc Networks (VANET), is a type of wireless ad-hoc network that aims to provide communication among vehicles. A key characteristic of VANETs is the very high mobility of nodes that result in a frequently changing topology along with the frequent breakage and linkage of the paths among the nodes involved. These characteristics make the Quality of Service (QoS) requirements in VANET a challenging issue. In this paper we characterize the performance available to applications in infrastructureless VANETs in terms of path holding time, path breakage probability and per session throughput as a function of various vehicle densities on road, data traffic rate and number of connections formed among vehicles by making use of table-driven and on-demand routing algorithms. Several QoS constraints in the applications of infrastructureless VANETs are observed in the results obtained.","PeriodicalId":149965,"journal":{"name":"2014 International Conference on Communication and Signal Processing","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127897489","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Privacy preservation algorithm in data mining for CRM systems CRM系统数据挖掘中的隐私保护算法
2014 International Conference on Communication and Signal Processing Pub Date : 2014-04-03 DOI: 10.1109/ICCSP.2014.6950121
Shashidhar Virupaksha, G. Sahoo, A. Vasudevan
{"title":"Privacy preservation algorithm in data mining for CRM systems","authors":"Shashidhar Virupaksha, G. Sahoo, A. Vasudevan","doi":"10.1109/ICCSP.2014.6950121","DOIUrl":"https://doi.org/10.1109/ICCSP.2014.6950121","url":null,"abstract":"Organizations have a huge customer base and thus they use data mining tools to study their customers. However there is risk of sensitive information about individuals which can be gained also during this process. Hence data that is used for data mining has to be protected. There are some privacy protection algorithms which ensure privacy and protect data. These algorithms preserve privacy but data mining results significantly. In this paper we propose a clustering based noise addition that not only preserves privacy but also ensures effective data mining. Data characteristics are identified using clustering technique and noise is added within the clusters thus retaining the data characteristics.","PeriodicalId":149965,"journal":{"name":"2014 International Conference on Communication and Signal Processing","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115346478","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Blend of error control codes in OFDM - effect of channel - a comparative approach OFDM中差错控制码的混合——信道的影响——一种比较方法
2014 International Conference on Communication and Signal Processing Pub Date : 2014-04-03 DOI: 10.1109/ICCSP.2014.6949833
P. Praveenkumar, K. Thenmozhi, J. Alfaaz Zami, Rengarajan Amirtharajan
{"title":"Blend of error control codes in OFDM - effect of channel - a comparative approach","authors":"P. Praveenkumar, K. Thenmozhi, J. Alfaaz Zami, Rengarajan Amirtharajan","doi":"10.1109/ICCSP.2014.6949833","DOIUrl":"https://doi.org/10.1109/ICCSP.2014.6949833","url":null,"abstract":"Role of modern day technology in business world is very imperative and moving. Be it collaboration, telephony, social media etc. in a particular trade, ultimately, information is what being communed. Its importance is more studied and explored in the domain of Business communication. At the same time, emphasis is greatly laid to have secure communication between the parties irrespective of the medium of communication. This is where software and cryptic techniques come into help. Information security plays a crucial role in safeguarding the message or information involved in the communication. Nowadays, right from small vendors to corporate giants, every business organization relies directly or indirectly on cryptic experts for the same. This work is one such blend of technology and security for data protection. This paper deals with the comparative performance analysis of different modulation schemes like BPSK, QPSK, 8QAM, 16QAM, 32QAM and 64 QAM using concatenated Error Control Codes (ECC) in OFDM(Orthogonal Frequency Division Multiplexing). RS(Reed Solomon) codes with Convolutional codes has been used as the concatenated error control code. Then the coded data bits are encrypted to the enhance copy right protection. BER Vs Eb/No graphs are plotted using various modulation schemes adopting AWGN (Additive White Gaussian Noise channel), Rayleigh and Rician Fading Channels. Correlation values are computed for various inner and outer code rates to validate the encryption operation.","PeriodicalId":149965,"journal":{"name":"2014 International Conference on Communication and Signal Processing","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115602710","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design of 50–75 GHz V-band low power and high gain down-conversion mixer 50 - 75ghz v波段低功率高增益下变频混频器的设计
2014 International Conference on Communication and Signal Processing Pub Date : 2014-04-03 DOI: 10.1109/ICCSP.2014.6950123
K. Suriya, G. Durga
{"title":"Design of 50–75 GHz V-band low power and high gain down-conversion mixer","authors":"K. Suriya, G. Durga","doi":"10.1109/ICCSP.2014.6950123","DOIUrl":"https://doi.org/10.1109/ICCSP.2014.6950123","url":null,"abstract":"This paper presents the design of V-band low power down-conversion mixer operating in weak inversion biasing region using 90-nm CMOS technology. The mixer exhibits a double-balanced Gilbert cell structure in source-driven topology with RF signal applied at the gate and local oscillator (LO) signal at the source. It achieves high conversion gain of 7.297 dB at RF signal of 60 GHz at standard supply voltage of 1.2 V. Other performance parameters measured are LO-to-RF port isolation as more than 40 dB, the third-order input intercept point (IIP3) as -1.692 dBm, OP1dB as -7.382 dBm and DC power consumption of 548 μW at LO power of -6 dBm indicates that this mixer is suitable for low power millimeter-wave (MMW) radio applications. The mixer is designed and simulated using Agilent's Advanced Design System (ADS).","PeriodicalId":149965,"journal":{"name":"2014 International Conference on Communication and Signal Processing","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115738055","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Implementation of Sinusoidal Pulse Width Modulation for Matrix Converter using FPGA 矩阵变换器正弦脉宽调制的FPGA实现
2014 International Conference on Communication and Signal Processing Pub Date : 2014-04-03 DOI: 10.1109/ICCSP.2014.6949971
K. Vijayakumar, R. A. Kumar, A. Govindasamy, S. Kannan
{"title":"Implementation of Sinusoidal Pulse Width Modulation for Matrix Converter using FPGA","authors":"K. Vijayakumar, R. A. Kumar, A. Govindasamy, S. Kannan","doi":"10.1109/ICCSP.2014.6949971","DOIUrl":"https://doi.org/10.1109/ICCSP.2014.6949971","url":null,"abstract":"The purpose of this paper is to develop the Sinusoidal Pulse Width Modulation (SPWM) for toggling the switches of Matrix Converter for its operation as several Power Electronics Converters. The SPWM generation is developed with the help of Quartus based Field Programmable Gate Array (FPGA). Quartus II is a software tool produced by Altera for analysis and synthesis of HDL design which enables the developer to compile their designs. Quartus II software includes all the design files, software source files and other related files necessary for the eventual implementation of a design in Programmable Logic Devices. SPWM provides a way to reduce the Total Harmonic Distortion (THD) of load current. The VHDL programming is used to generate the SPWM for switches. Simulation waveforms are obtained and the output of SPWM generation is developed with the help of the FPGA and the output is displayed in the CRO.","PeriodicalId":149965,"journal":{"name":"2014 International Conference on Communication and Signal Processing","volume":"214 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124206093","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An improved method for emotion detection using weighted Gabor filter and radial basis Function kernel 一种基于加权Gabor滤波器和径向基函数核的情绪检测改进方法
2014 International Conference on Communication and Signal Processing Pub Date : 2014-04-03 DOI: 10.1109/ICCSP.2014.6950031
P. Sisodia, A. Verma, K. Juneja, S. Goel
{"title":"An improved method for emotion detection using weighted Gabor filter and radial basis Function kernel","authors":"P. Sisodia, A. Verma, K. Juneja, S. Goel","doi":"10.1109/ICCSP.2014.6950031","DOIUrl":"https://doi.org/10.1109/ICCSP.2014.6950031","url":null,"abstract":"Human emotion detection plays an important role in the human-computer interaction. In this paper, the emotions are detected on segmented image using low dimension weighted Gabor filter bank. The segmentation reduces the space domain and only those facial features are focused that reflects expressions accurately. The classification of selected features values classifies through a RBF network. The experimental results show that by the selection of optimal features, the computational complexity reduces significantly.","PeriodicalId":149965,"journal":{"name":"2014 International Conference on Communication and Signal Processing","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124416315","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Identification and feature extraction of moving vehicles in LabVIEW LabVIEW中移动车辆的识别与特征提取
2014 International Conference on Communication and Signal Processing Pub Date : 2014-04-03 DOI: 10.1109/ICCSP.2014.6950172
Suresh Babu Changalasetty, Ahmed S. Badawy, Wade Ghribi, Lalitha Saroja Thota
{"title":"Identification and feature extraction of moving vehicles in LabVIEW","authors":"Suresh Babu Changalasetty, Ahmed S. Badawy, Wade Ghribi, Lalitha Saroja Thota","doi":"10.1109/ICCSP.2014.6950172","DOIUrl":"https://doi.org/10.1109/ICCSP.2014.6950172","url":null,"abstract":"In recent years, video monitoring and surveillance systems have been widely used in traffic management. The image sequences for traffic scenes are recorded by a stationary camera. The video clip is sent to LabVIEW program to convert into image frames. NI LabVIEW vision assistant module is used to detect the moving vehicle. The method is based on the establishment of correspondences between regions and vehicles, as the vehicles move through the image sequence. Background subtraction is used which improves the adaptive background mixture model and makes the system learn faster and more accurately, as well as adapt effectively to changing environments. The resulting system robustly identifies vehicles, rejecting background and tracks vehicles over a specific period of time. Once the (object) vehicle is tracked, the attributes of the vehicle like width, length, perimeter, area etc are extracted by image process feature extraction techniques. In proposed system we use LabVIEW and Vision assistant module for image processing and feature extraction. The project will benefit to reduce cost of traffic monitoring system and complete automation of traffic monitoring system.","PeriodicalId":149965,"journal":{"name":"2014 International Conference on Communication and Signal Processing","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115035971","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信