2011 IEEE Symposium on Computers & Informatics最新文献

筛选
英文 中文
Image denoising using Gabor filter banks 图像去噪使用Gabor滤波器组
2011 IEEE Symposium on Computers & Informatics Pub Date : 2011-03-20 DOI: 10.1109/ISCI.2011.5958914
A. Ahmmed
{"title":"Image denoising using Gabor filter banks","authors":"A. Ahmmed","doi":"10.1109/ISCI.2011.5958914","DOIUrl":"https://doi.org/10.1109/ISCI.2011.5958914","url":null,"abstract":"We introduce a method for denoising a digital image corrupted with additive noise. A dyadic Gabor filter bank is used to obtain localized frequency information. It decomposes the noisy image into Gabor coefficients of different scales and orientations. Denoising is performed in the transform domain by thresholding the Gabor coefficients with phase preserving threshold and non-phase preserving threshold where both approaches have been formulated as adaptive and data-driven. For the non-phase preserving approach the BayesShrink thresholding methods have been used. Finally using the thresholded Gabor coefficients of each channel the denoised image has been formed. It has been found that for smoothly varying images the modified BayesShrink method outperforms both the BayesShrink and the phase preserving approaches whereas for images with high variations the phase preserving approach performs better.","PeriodicalId":166647,"journal":{"name":"2011 IEEE Symposium on Computers & Informatics","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115735368","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Samsung ARM9 S3C2440A hardware core circuit design 三星ARM9 S3C2440A硬件核心电路设计
2011 IEEE Symposium on Computers & Informatics Pub Date : 2011-03-20 DOI: 10.1109/ISCI.2011.5958940
A. Sulaiman, M. Nordin, N. Azhari, J. Desa
{"title":"Samsung ARM9 S3C2440A hardware core circuit design","authors":"A. Sulaiman, M. Nordin, N. Azhari, J. Desa","doi":"10.1109/ISCI.2011.5958940","DOIUrl":"https://doi.org/10.1109/ISCI.2011.5958940","url":null,"abstract":"The Samsung S3C2440A is an advance microprocessor available with good performance for cost. The 32-bit CMOS microprocessor contained ARM920T core, with 0.13 um CMOS standard cells and memory complier. The interesting features are consumed less power and fully static design for the cost and power sensitive applications. This paper described the hardware design of core circuitry and PCB layout for the microprocessor that can be implemented for various applications, including mobile and desktop model devices. The core design consisted of basic development platform which utilized the features offered by the S3C2440 microprocessor.","PeriodicalId":166647,"journal":{"name":"2011 IEEE Symposium on Computers & Informatics","volume":"198 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114618016","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Study of mobility effect on energy efficiency in medium access control protocols 介质访问控制协议中移动性对能效的影响研究
2011 IEEE Symposium on Computers & Informatics Pub Date : 2011-03-20 DOI: 10.1109/ISCI.2011.5959013
M. Zareei, R. Budiarto, T. Wan
{"title":"Study of mobility effect on energy efficiency in medium access control protocols","authors":"M. Zareei, R. Budiarto, T. Wan","doi":"10.1109/ISCI.2011.5959013","DOIUrl":"https://doi.org/10.1109/ISCI.2011.5959013","url":null,"abstract":"Wireless sensor networks (WSN) became popular in recent years, with big variety of applications from environmental monitoring to disaster recovery. Energy efficiency is a key characteristic of todays wireless sensors. In energy constraint sensor network, mobility handling can cause some additional challenges in sensor protocol design. Recently there are many MAC protocols have been proposed and adopted specially for sensor networks. Most of the proposed MAC protocols in wireless sensor network assumed nodes to be static. However some application like medical care and disaster response make use of mobile sensors essential. In this paper, we take closer look at S-MAC, T-MAC (which are well-known energy efficient MAC protocols) and IEEE 802.15.4 (which is the ZigBee standard) MAC protocols and studies their performance in terms of energy efficiency in different situation of mobility.","PeriodicalId":166647,"journal":{"name":"2011 IEEE Symposium on Computers & Informatics","volume":"217 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120854581","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Autonomic computing approach in service oriented architecture 面向服务体系结构中的自主计算方法
2011 IEEE Symposium on Computers & Informatics Pub Date : 2011-03-20 DOI: 10.1109/ISCI.2011.5958919
M. Bhakti, A. Abdullah
{"title":"Autonomic computing approach in service oriented architecture","authors":"M. Bhakti, A. Abdullah","doi":"10.1109/ISCI.2011.5958919","DOIUrl":"https://doi.org/10.1109/ISCI.2011.5958919","url":null,"abstract":"Service oriented computing is a computing paradigm that utilizes existing services as the basic construct to compose new service / application, with service oriented architecture (SOA) as its architectural concept. A service architecture that is capable of changing its structure and functionality autonomously with little human intervention is required to address the issue of complexity and dynamism in the current network systems, due to unpredictable events which could cause services unavailability in the event of crashes or other network problems. In this paper, we elaborate and discuss the idea of incorporating the autonomic computing paradigm into SOA and utilizing case-based reasoning approach to achieve a more autonomous SOA, and our current work shows the feasibility of its implementation.","PeriodicalId":166647,"journal":{"name":"2011 IEEE Symposium on Computers & Informatics","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125899521","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Technique to correct displacement of vector drawings on scaled underlying raster image 基于栅格图像的矢量图位移校正技术
2011 IEEE Symposium on Computers & Informatics Pub Date : 2011-03-20 DOI: 10.1109/ISCI.2011.5958892
Yew Kwang Hooi, Leong Siew Yoong
{"title":"Technique to correct displacement of vector drawings on scaled underlying raster image","authors":"Yew Kwang Hooi, Leong Siew Yoong","doi":"10.1109/ISCI.2011.5958892","DOIUrl":"https://doi.org/10.1109/ISCI.2011.5958892","url":null,"abstract":"The problems of vector graphics displacement over raster drawing due to magnification in Java Graphics2D are described. Demarcation of engineering drawing is a process of highlighting sections of interest by drawing clouds. The clouds were stored as an array of points that are combined with background image at runtime. Magnification of background causes unexpected displacement of newly drawn clouds. This may be a common but unreported problem for interactive drawing in Java Graphics2D. The paper proposed a technique that successfully corrects the issue.","PeriodicalId":166647,"journal":{"name":"2011 IEEE Symposium on Computers & Informatics","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130673760","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
FPGA implementation of DSSS-CDMA transmitter and receiver for ADHOC networks ADHOC网络DSSS-CDMA收发机的FPGA实现
2011 IEEE Symposium on Computers & Informatics Pub Date : 2011-03-20 DOI: 10.1109/ISCI.2011.5958923
B. Sreedevi, V. Vijaya, Ch. Kranthi Rekh, R. Valupadasu, B. R. Chunduri
{"title":"FPGA implementation of DSSS-CDMA transmitter and receiver for ADHOC networks","authors":"B. Sreedevi, V. Vijaya, Ch. Kranthi Rekh, R. Valupadasu, B. R. Chunduri","doi":"10.1109/ISCI.2011.5958923","DOIUrl":"https://doi.org/10.1109/ISCI.2011.5958923","url":null,"abstract":"The DS — CDMA is expected to be the major medium access technology in the future mobile systems owing to its potential capacity enhancement and the robustness against noise. The CDMA is uniquely featured by its spectrum-spreading randomization process employing a pseudo-noise (PN) sequence, thus is often called the spread spectrum multiple access (SSMA). As different CDMA users take different PN sequences, each CDMA receiver can discriminate and detect its own signal, by regarding the signals transmitted by other users as noise-like interferences. In this project Direct sequence principle based CDMA transmitter and receiver is implemented in VHDL for FPGA. The digital frequency synthesizer principle is used in generating the carrier signals both at transmitter and receiver modules. The transmitter module mainly consists of symbol generator, programmable PN sequence generator, digital local oscillator, spreader and BPSK modulator blocks. The receiver module consists of BPSK demodulator, matched filter, programmable PN sequence generator and threshold detector blocks. The CDMA receiver gets this input and recovers the data using matched filter. Modlesim Xilinx Edition 5.8 (MXE) tool will be used for functional simulation and logic verification at each block level and system level. The Xilinx Synthesis Technology (XST) of Xilinx ISE tool will be used for synthesis of transmitter and receiver on FPGAs. Applications of the developed CDMA system for ADHOC networks and defense communication links will be studied. The possible extensions of work in view of advancements in software defined radio principles will be discussed.","PeriodicalId":166647,"journal":{"name":"2011 IEEE Symposium on Computers & Informatics","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130718331","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Mobility tolerant TDMA based MAC protocol for WSN 基于移动容忍度TDMA的WSN MAC协议
2011 IEEE Symposium on Computers & Informatics Pub Date : 2011-03-20 DOI: 10.1109/ISCI.2011.5958969
Sandhyasree Thaskani, K. Kumar, G. R. Murthy
{"title":"Mobility tolerant TDMA based MAC protocol for WSN","authors":"Sandhyasree Thaskani, K. Kumar, G. R. Murthy","doi":"10.1109/ISCI.2011.5958969","DOIUrl":"https://doi.org/10.1109/ISCI.2011.5958969","url":null,"abstract":"Recent advancements in wireless communications and electronics have enabled the development of low cost sensor networks. Among the protocols of wireless Sensor Networks (WSN), Medium Access Control (MAC) protocols are given more priority as traditional MAC protocols are not suitable for Wireless communication. As many of the MAC protocols consider the sensor nodes to be stationary, and when these protocols are used in mobile environment the network performance decreases. In this paper, we introduce a new TDMA based MAC protocol which can be used in mobile wireless sensor network. This protocol uses TDMA based MAC scheme where the time will be divided into frames and then time slots. These slots are further divided into sections as channel request (CR), channel allocation (CA) and data section. We will also design an algorithm considering the energy efficiency of a wireless sensor network. Therefore the life time of the sensor nodes deployed in a wireless sensor network will be increased.","PeriodicalId":166647,"journal":{"name":"2011 IEEE Symposium on Computers & Informatics","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132402130","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Reinforcement learning in power system scheduling and control: A unified perspective 强化学习在电力系统调度与控制中的应用
2011 IEEE Symposium on Computers & Informatics Pub Date : 2011-03-20 DOI: 10.1109/ISCI.2011.5958993
T. P. Imthias Ahamed, E. A. Jasmin, Essam A. Al-Ammar
{"title":"Reinforcement learning in power system scheduling and control: A unified perspective","authors":"T. P. Imthias Ahamed, E. A. Jasmin, Essam A. Al-Ammar","doi":"10.1109/ISCI.2011.5958993","DOIUrl":"https://doi.org/10.1109/ISCI.2011.5958993","url":null,"abstract":"Reinforcement Learning (RL) has been applied to various scheduling and control problems in power systems in the last decade. However, the area is still in its infancy. In this paper, we present various research works in this area in a unified perspective. In most of the applications, power system problems — control of FACTS devices, reactive power control, Automatic Generation Control, Economic Dispatch, etc — are modeled as a Multistage Decision making Problem and RL is used to solve the MDP. One important point about RL is, it takes considerable amount of time to learn a control strategy. However, RL can learn off line using a simulation model. Once the control strategy is learned decision making can be done almost instantaneously. A major drawback of RL is most of the application does not scale up and much work need to be done. We hope this paper will generate more interest in the area and RL will be utilized to its full potential.","PeriodicalId":166647,"journal":{"name":"2011 IEEE Symposium on Computers & Informatics","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132083154","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Efficient design of Local Binary Pattern for image retrieval 图像检索中局部二值模式的高效设计
2011 IEEE Symposium on Computers & Informatics Pub Date : 2011-03-20 DOI: 10.1109/ISCI.2011.5958968
Rafi Md. Najmus Sadat, A. Rakib, M. Salehin, Naurin Afrin
{"title":"Efficient design of Local Binary Pattern for image retrieval","authors":"Rafi Md. Najmus Sadat, A. Rakib, M. Salehin, Naurin Afrin","doi":"10.1109/ISCI.2011.5958968","DOIUrl":"https://doi.org/10.1109/ISCI.2011.5958968","url":null,"abstract":"A novel image description method named Half-LBP has been proposed in this paper for image retrieval applications. Half-LBP transforms the relationship among the intensity levels of image local pixel blocks into a binary pattern in such a way that reduces the dimension of the descriptor significantly while keeping the retrieval accuracy comparable with the state of art methods. The basic operation is quite similar to the texture operator named Local Binary Pattern (LBP). However, the dimension of the LBP method and its variants are too high and take substantial amount of time to retrieve the images. To address this issue, Half-LBP image descriptor has been proposed which takes comparatively less time to find out the matched images from the database.","PeriodicalId":166647,"journal":{"name":"2011 IEEE Symposium on Computers & Informatics","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127854657","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
IPSec authentication using certificateless signature in heterogeneous IPv4/IPv6 network 异构IPv4/IPv6网络中采用无证书签名的IPSec认证
2011 IEEE Symposium on Computers & Informatics Pub Date : 2011-03-20 DOI: 10.1109/ISCI.2011.5958996
N. M. Ahmad, A. H. Yaacob, R. Fauzi, Alireza Khorram
{"title":"IPSec authentication using certificateless signature in heterogeneous IPv4/IPv6 network","authors":"N. M. Ahmad, A. H. Yaacob, R. Fauzi, Alireza Khorram","doi":"10.1109/ISCI.2011.5958996","DOIUrl":"https://doi.org/10.1109/ISCI.2011.5958996","url":null,"abstract":"This paper studies the incompatibilities issues on deploying IPSec Encapsulating Security Payload (ESP) in providing end to end security between heterogeneous IPv4 and IPv6 networks. The presence of IPv4/IPv6 translation gateway violates the TCP/UDP intrinsic functionalities due to the translation of the IP addresses in IP packets. We address these interoperability issues by modifying IKE negotiation with NAT-Traversal capability and some improvements on IPSec software. However, the implementation of the conventional IKE authentication mechanisms such as pre-shared key and Public Key Infrastructure (PKI) certificate-based requires both nodes either to be manually configured, or to exchange the certificates and the necessity to enrol to certain Certificate Authority (CA). This paper proposes a new Internet Key Exchange (IKE) authentication based on certificateless public key infrastructure in order to alleviate the limitation of the conventional IKE authentication. We also propose an efficient public and shared parameters distribution mechanism whereby the translation gateway acts as Key Generator Centre (KGC).","PeriodicalId":166647,"journal":{"name":"2011 IEEE Symposium on Computers & Informatics","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126721181","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信