{"title":"Image denoising using Gabor filter banks","authors":"A. Ahmmed","doi":"10.1109/ISCI.2011.5958914","DOIUrl":"https://doi.org/10.1109/ISCI.2011.5958914","url":null,"abstract":"We introduce a method for denoising a digital image corrupted with additive noise. A dyadic Gabor filter bank is used to obtain localized frequency information. It decomposes the noisy image into Gabor coefficients of different scales and orientations. Denoising is performed in the transform domain by thresholding the Gabor coefficients with phase preserving threshold and non-phase preserving threshold where both approaches have been formulated as adaptive and data-driven. For the non-phase preserving approach the BayesShrink thresholding methods have been used. Finally using the thresholded Gabor coefficients of each channel the denoised image has been formed. It has been found that for smoothly varying images the modified BayesShrink method outperforms both the BayesShrink and the phase preserving approaches whereas for images with high variations the phase preserving approach performs better.","PeriodicalId":166647,"journal":{"name":"2011 IEEE Symposium on Computers & Informatics","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115735368","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Samsung ARM9 S3C2440A hardware core circuit design","authors":"A. Sulaiman, M. Nordin, N. Azhari, J. Desa","doi":"10.1109/ISCI.2011.5958940","DOIUrl":"https://doi.org/10.1109/ISCI.2011.5958940","url":null,"abstract":"The Samsung S3C2440A is an advance microprocessor available with good performance for cost. The 32-bit CMOS microprocessor contained ARM920T core, with 0.13 um CMOS standard cells and memory complier. The interesting features are consumed less power and fully static design for the cost and power sensitive applications. This paper described the hardware design of core circuitry and PCB layout for the microprocessor that can be implemented for various applications, including mobile and desktop model devices. The core design consisted of basic development platform which utilized the features offered by the S3C2440 microprocessor.","PeriodicalId":166647,"journal":{"name":"2011 IEEE Symposium on Computers & Informatics","volume":"198 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114618016","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Study of mobility effect on energy efficiency in medium access control protocols","authors":"M. Zareei, R. Budiarto, T. Wan","doi":"10.1109/ISCI.2011.5959013","DOIUrl":"https://doi.org/10.1109/ISCI.2011.5959013","url":null,"abstract":"Wireless sensor networks (WSN) became popular in recent years, with big variety of applications from environmental monitoring to disaster recovery. Energy efficiency is a key characteristic of todays wireless sensors. In energy constraint sensor network, mobility handling can cause some additional challenges in sensor protocol design. Recently there are many MAC protocols have been proposed and adopted specially for sensor networks. Most of the proposed MAC protocols in wireless sensor network assumed nodes to be static. However some application like medical care and disaster response make use of mobile sensors essential. In this paper, we take closer look at S-MAC, T-MAC (which are well-known energy efficient MAC protocols) and IEEE 802.15.4 (which is the ZigBee standard) MAC protocols and studies their performance in terms of energy efficiency in different situation of mobility.","PeriodicalId":166647,"journal":{"name":"2011 IEEE Symposium on Computers & Informatics","volume":"217 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120854581","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Autonomic computing approach in service oriented architecture","authors":"M. Bhakti, A. Abdullah","doi":"10.1109/ISCI.2011.5958919","DOIUrl":"https://doi.org/10.1109/ISCI.2011.5958919","url":null,"abstract":"Service oriented computing is a computing paradigm that utilizes existing services as the basic construct to compose new service / application, with service oriented architecture (SOA) as its architectural concept. A service architecture that is capable of changing its structure and functionality autonomously with little human intervention is required to address the issue of complexity and dynamism in the current network systems, due to unpredictable events which could cause services unavailability in the event of crashes or other network problems. In this paper, we elaborate and discuss the idea of incorporating the autonomic computing paradigm into SOA and utilizing case-based reasoning approach to achieve a more autonomous SOA, and our current work shows the feasibility of its implementation.","PeriodicalId":166647,"journal":{"name":"2011 IEEE Symposium on Computers & Informatics","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125899521","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Technique to correct displacement of vector drawings on scaled underlying raster image","authors":"Yew Kwang Hooi, Leong Siew Yoong","doi":"10.1109/ISCI.2011.5958892","DOIUrl":"https://doi.org/10.1109/ISCI.2011.5958892","url":null,"abstract":"The problems of vector graphics displacement over raster drawing due to magnification in Java Graphics2D are described. Demarcation of engineering drawing is a process of highlighting sections of interest by drawing clouds. The clouds were stored as an array of points that are combined with background image at runtime. Magnification of background causes unexpected displacement of newly drawn clouds. This may be a common but unreported problem for interactive drawing in Java Graphics2D. The paper proposed a technique that successfully corrects the issue.","PeriodicalId":166647,"journal":{"name":"2011 IEEE Symposium on Computers & Informatics","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130673760","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
B. Sreedevi, V. Vijaya, Ch. Kranthi Rekh, R. Valupadasu, B. R. Chunduri
{"title":"FPGA implementation of DSSS-CDMA transmitter and receiver for ADHOC networks","authors":"B. Sreedevi, V. Vijaya, Ch. Kranthi Rekh, R. Valupadasu, B. R. Chunduri","doi":"10.1109/ISCI.2011.5958923","DOIUrl":"https://doi.org/10.1109/ISCI.2011.5958923","url":null,"abstract":"The DS — CDMA is expected to be the major medium access technology in the future mobile systems owing to its potential capacity enhancement and the robustness against noise. The CDMA is uniquely featured by its spectrum-spreading randomization process employing a pseudo-noise (PN) sequence, thus is often called the spread spectrum multiple access (SSMA). As different CDMA users take different PN sequences, each CDMA receiver can discriminate and detect its own signal, by regarding the signals transmitted by other users as noise-like interferences. In this project Direct sequence principle based CDMA transmitter and receiver is implemented in VHDL for FPGA. The digital frequency synthesizer principle is used in generating the carrier signals both at transmitter and receiver modules. The transmitter module mainly consists of symbol generator, programmable PN sequence generator, digital local oscillator, spreader and BPSK modulator blocks. The receiver module consists of BPSK demodulator, matched filter, programmable PN sequence generator and threshold detector blocks. The CDMA receiver gets this input and recovers the data using matched filter. Modlesim Xilinx Edition 5.8 (MXE) tool will be used for functional simulation and logic verification at each block level and system level. The Xilinx Synthesis Technology (XST) of Xilinx ISE tool will be used for synthesis of transmitter and receiver on FPGAs. Applications of the developed CDMA system for ADHOC networks and defense communication links will be studied. The possible extensions of work in view of advancements in software defined radio principles will be discussed.","PeriodicalId":166647,"journal":{"name":"2011 IEEE Symposium on Computers & Informatics","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130718331","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Mobility tolerant TDMA based MAC protocol for WSN","authors":"Sandhyasree Thaskani, K. Kumar, G. R. Murthy","doi":"10.1109/ISCI.2011.5958969","DOIUrl":"https://doi.org/10.1109/ISCI.2011.5958969","url":null,"abstract":"Recent advancements in wireless communications and electronics have enabled the development of low cost sensor networks. Among the protocols of wireless Sensor Networks (WSN), Medium Access Control (MAC) protocols are given more priority as traditional MAC protocols are not suitable for Wireless communication. As many of the MAC protocols consider the sensor nodes to be stationary, and when these protocols are used in mobile environment the network performance decreases. In this paper, we introduce a new TDMA based MAC protocol which can be used in mobile wireless sensor network. This protocol uses TDMA based MAC scheme where the time will be divided into frames and then time slots. These slots are further divided into sections as channel request (CR), channel allocation (CA) and data section. We will also design an algorithm considering the energy efficiency of a wireless sensor network. Therefore the life time of the sensor nodes deployed in a wireless sensor network will be increased.","PeriodicalId":166647,"journal":{"name":"2011 IEEE Symposium on Computers & Informatics","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132402130","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
T. P. Imthias Ahamed, E. A. Jasmin, Essam A. Al-Ammar
{"title":"Reinforcement learning in power system scheduling and control: A unified perspective","authors":"T. P. Imthias Ahamed, E. A. Jasmin, Essam A. Al-Ammar","doi":"10.1109/ISCI.2011.5958993","DOIUrl":"https://doi.org/10.1109/ISCI.2011.5958993","url":null,"abstract":"Reinforcement Learning (RL) has been applied to various scheduling and control problems in power systems in the last decade. However, the area is still in its infancy. In this paper, we present various research works in this area in a unified perspective. In most of the applications, power system problems — control of FACTS devices, reactive power control, Automatic Generation Control, Economic Dispatch, etc — are modeled as a Multistage Decision making Problem and RL is used to solve the MDP. One important point about RL is, it takes considerable amount of time to learn a control strategy. However, RL can learn off line using a simulation model. Once the control strategy is learned decision making can be done almost instantaneously. A major drawback of RL is most of the application does not scale up and much work need to be done. We hope this paper will generate more interest in the area and RL will be utilized to its full potential.","PeriodicalId":166647,"journal":{"name":"2011 IEEE Symposium on Computers & Informatics","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132083154","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Rafi Md. Najmus Sadat, A. Rakib, M. Salehin, Naurin Afrin
{"title":"Efficient design of Local Binary Pattern for image retrieval","authors":"Rafi Md. Najmus Sadat, A. Rakib, M. Salehin, Naurin Afrin","doi":"10.1109/ISCI.2011.5958968","DOIUrl":"https://doi.org/10.1109/ISCI.2011.5958968","url":null,"abstract":"A novel image description method named Half-LBP has been proposed in this paper for image retrieval applications. Half-LBP transforms the relationship among the intensity levels of image local pixel blocks into a binary pattern in such a way that reduces the dimension of the descriptor significantly while keeping the retrieval accuracy comparable with the state of art methods. The basic operation is quite similar to the texture operator named Local Binary Pattern (LBP). However, the dimension of the LBP method and its variants are too high and take substantial amount of time to retrieve the images. To address this issue, Half-LBP image descriptor has been proposed which takes comparatively less time to find out the matched images from the database.","PeriodicalId":166647,"journal":{"name":"2011 IEEE Symposium on Computers & Informatics","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127854657","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
N. M. Ahmad, A. H. Yaacob, R. Fauzi, Alireza Khorram
{"title":"IPSec authentication using certificateless signature in heterogeneous IPv4/IPv6 network","authors":"N. M. Ahmad, A. H. Yaacob, R. Fauzi, Alireza Khorram","doi":"10.1109/ISCI.2011.5958996","DOIUrl":"https://doi.org/10.1109/ISCI.2011.5958996","url":null,"abstract":"This paper studies the incompatibilities issues on deploying IPSec Encapsulating Security Payload (ESP) in providing end to end security between heterogeneous IPv4 and IPv6 networks. The presence of IPv4/IPv6 translation gateway violates the TCP/UDP intrinsic functionalities due to the translation of the IP addresses in IP packets. We address these interoperability issues by modifying IKE negotiation with NAT-Traversal capability and some improvements on IPSec software. However, the implementation of the conventional IKE authentication mechanisms such as pre-shared key and Public Key Infrastructure (PKI) certificate-based requires both nodes either to be manually configured, or to exchange the certificates and the necessity to enrol to certain Certificate Authority (CA). This paper proposes a new Internet Key Exchange (IKE) authentication based on certificateless public key infrastructure in order to alleviate the limitation of the conventional IKE authentication. We also propose an efficient public and shared parameters distribution mechanism whereby the translation gateway acts as Key Generator Centre (KGC).","PeriodicalId":166647,"journal":{"name":"2011 IEEE Symposium on Computers & Informatics","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126721181","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}