2013 International Conference on Current Trends in Engineering and Technology (ICCTET)最新文献

筛选
英文 中文
A secure fast 2D — Discrete fractional fourier transform based medical image compression using hybrid encoding technique 基于混合编码技术的二维离散分数傅里叶变换医学图像安全快速压缩
P. Kumari, K. Thanushkodi
{"title":"A secure fast 2D — Discrete fractional fourier transform based medical image compression using hybrid encoding technique","authors":"P. Kumari, K. Thanushkodi","doi":"10.1109/ICCTET.2013.6675900","DOIUrl":"https://doi.org/10.1109/ICCTET.2013.6675900","url":null,"abstract":"The arrival of CT and MRI imaging in the last two decades used for analysis of various diseases in medical field. Magnetic Resonance Imaging (MRI) and Computed Tomography (CT) sequences have become essential in healthcare systems and an integral segment of a patient's medical record. Such medical image data needed a huge amount of resources for storage and transmission. Compression of medical images for efficient use of storage space and transmission bit rate has become a necessity. A quasigroup successfully creates an astronomical number of keys which is used to confuse the hackers in determining the original data. However, quasi group encryption is not capable in diffusing the information of the plain text. Hence, in this study the DICOM images are encrypted using a chained Hadamard transforms and Number Theoretic Transforms to introduce diffusion along with the quasigroup transformation. A secure Fast Two Dimensional Discrete Fractional Fourier Transform (DFRFT) and a SPIHT Algorithm with Huffman Encoder is used for compress the image and it provides a secure compression of medical images as compared to the other transform. The experimental results evaluate the performance of the proposed encryption approach based on the PSNR and MSE it shows the proposed approach gives better results.","PeriodicalId":242568,"journal":{"name":"2013 International Conference on Current Trends in Engineering and Technology (ICCTET)","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130943852","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Automated seizure detection using multilayer feed forward network trained using scaled conjugate gradient method 基于尺度共轭梯度法训练的多层前馈网络的癫痫自动检测
K. Sivasankari, K. Thanushkodi, K. Kalaivanan
{"title":"Automated seizure detection using multilayer feed forward network trained using scaled conjugate gradient method","authors":"K. Sivasankari, K. Thanushkodi, K. Kalaivanan","doi":"10.1109/ICCTET.2013.6675944","DOIUrl":"https://doi.org/10.1109/ICCTET.2013.6675944","url":null,"abstract":"Electroencephalogram (EEG) is a tool used in the diagnosis of a common neurological disorder Epilepsy. Analysis of long recordings of EEG by visual inspection for epilepsy is quite a tedious process. In this paper, we present an approach for automated epileptic seizure detection by employing Multi layer Perceptron Neural Network (MLPNN) classifier. Independent Component Analysis (ICA), a statistical tool is used for extraction of features. The ascertained signals are trained under supervision by making use of memory efficient and fast Scaled Conjugate Gradient (SCG) backpropagation algorithm. The data set is taken from a publicly available EEG database. The MLPNN is designed with the tan-sigmoid transfer function in the hidden layer and output layer. The network is analyzed using performance metric like Mean Square Error and confusion matrix. The best classification accuracy is about 100% for the overall dataset. This indicates the proposed method has potential in designing a new intelligent EEG-based assistance diagnosis system for early detection of the electroencephalographic changes.","PeriodicalId":242568,"journal":{"name":"2013 International Conference on Current Trends in Engineering and Technology (ICCTET)","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133462756","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design and analysis of various slice reduction algorithm for low power and area efficient FIR filter 低功耗、面积效率高的FIR滤波器的各种切片缩减算法的设计与分析
A. Umasankar, N. Vasudevan
{"title":"Design and analysis of various slice reduction algorithm for low power and area efficient FIR filter","authors":"A. Umasankar, N. Vasudevan","doi":"10.1109/ICCTET.2013.6675962","DOIUrl":"https://doi.org/10.1109/ICCTET.2013.6675962","url":null,"abstract":"DA architecture synthesizes multiplier blocks with low hardware requirement suitable for implementation as part of full parallel finite impulse response (FIR) filters is presented in this paper. Then new add and shift method is introduced for low power, this method is used for SDR. SDR is fast becoming a crucial element of wireless technology the use of SDR technology is predicted to replace many of the traditional methods of implementing transmitters and receivers while offering a wide range of advantages including adaptability, reconfigurability, and multifunctionality encompassing modes of operation, radio frequency bands, air interfaces, and waveforms. Software-defined radio (SDR) refers to wireless communication in which the transmitter modulation and the receiver demodulation are both generated through software. The main advantage of this approach is flexibility, as the software runs on one common hardware platform for any type of receiver configuration. The most computationally intensive part of the wideband receiver of a software defined radio (SDR) is the intermediate frequency (IF) processing block. The proposed reconfigurable synthesizes multiplier blocks offer significant savings in area over the traditional multiplier blocks for high-speed digital signal processor (DSP) systems are implemented on field programmable gate array (FPGA) hardware platforms. Various slice reduction algorithm like RSG, MSG, Add and Shift and DA algorithm are designed to get the low power and area efficient fir filter.","PeriodicalId":242568,"journal":{"name":"2013 International Conference on Current Trends in Engineering and Technology (ICCTET)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128851001","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Design and implementation of digital RF transmitter for bluetooth applications 用于蓝牙应用的数字射频发射机的设计与实现
S. P. Raajhen, S. Janardhana, J. Jaya, K. J. Sabareesaan
{"title":"Design and implementation of digital RF transmitter for bluetooth applications","authors":"S. P. Raajhen, S. Janardhana, J. Jaya, K. J. Sabareesaan","doi":"10.1109/ICCTET.2013.6675952","DOIUrl":"https://doi.org/10.1109/ICCTET.2013.6675952","url":null,"abstract":"A novel fully digital architecture for a multi gigahertz RF transmitter that meets blue tooth specifications is presented in this paper. The transmitter architecture uses All Digital Phase-locked loop. (ADPLL) in contrast to charge-pump PLLs used in analog transmitters. The ADPLL has several advantages when compared to traditional Charge-pump PLLs. The conventional RF frequency synthesizer architecture, based on the voltage-controlled oscillator and the phase /frequency detector and charge-pump combination, has been replaced with a digitally controlled oscillator (DCO) and a time-to-digital converter, respectively. All digital blocks are synthesized using VHDL code. The RF transmitter so created can be used for any short-range wireless applications and it can also be integrated with DSP systems as a System-on-chip (SoC).","PeriodicalId":242568,"journal":{"name":"2013 International Conference on Current Trends in Engineering and Technology (ICCTET)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114476438","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Empowered service delegation with attribute encryption for distributed cloud computing 为分布式云计算提供属性加密的授权服务委托
S. Aravinth, M. Ramkumar, B. Rajkumar, M. Anitha, S. Elangodi
{"title":"Empowered service delegation with attribute encryption for distributed cloud computing","authors":"S. Aravinth, M. Ramkumar, B. Rajkumar, M. Anitha, S. Elangodi","doi":"10.1109/ICCTET.2013.6675922","DOIUrl":"https://doi.org/10.1109/ICCTET.2013.6675922","url":null,"abstract":"Cloud computing has emerged as one of the most influential paradigms in the IT industry. In this, new computing technology requires users to entrust their valuable data to cloud providers, there have been increasing security and privacy concerns on outsourced data. Several schemes employing attribute-based encryption (ABE) have been proposed for access control of outsourced data in cloud computing. The most[1][2] of them suffer from inflexibility in implementing complex access control policies. In this paper, allowing cloud service providers (CSPs), which are not in the same trusted domains as enterprise users, to take care of confidential data, may raise potential security and privacy issues. To keep the sensitive user data confidential against untrusted CSPs, a Natural way is to apply cryptographic approaches, by disclosing Decryption keys only to authorized users. But also provide full delegation, and scalability, so as to best serve the needs of accessing data anytime and anywhere, delegating within enterprises, and achieving a dynamic set of users. [3][4]HASBE employs multiple value assignments for access expiration time to deal with user revocation more efficiently than existing schemes. It can be providefine-grained access control and full delegation. Finally, we propose a scalable revocation scheme by delegating to the CSP most of the computing tasks in revocation, to achieve a dynamic set of users efficiently.","PeriodicalId":242568,"journal":{"name":"2013 International Conference on Current Trends in Engineering and Technology (ICCTET)","volume":"90 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114878726","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Efficient and secure trust based Ad Hoc routing in MANET MANET中基于信任的高效安全Ad Hoc路由
D. Kumar, K. Sikamani
{"title":"Efficient and secure trust based Ad Hoc routing in MANET","authors":"D. Kumar, K. Sikamani","doi":"10.1109/ICCTET.2013.6675961","DOIUrl":"https://doi.org/10.1109/ICCTET.2013.6675961","url":null,"abstract":"A mobile ad-hoc network (MANET)[1] is a self-configuring infrastructure less network of mobile devices connected by wireless. Each device in a MANET is free to move independently in any direction, and will therefore change its links to other devices frequently. The use of wireless ad hoc networks also introduces additional security challenges that have to be dealt with. Efficient Trust based Ad Hoc Routing (ETAR) is an algorithm to provide secure routing in ad hoc mobile networks. We propose this scheme that has been drawn from a network of friends in real life scenarios. The algorithm works by sending challenges and sharing friend Lists to provide a list of trusted nodes to the source node through which data transmission finally takes place. The nodes in the friend list are rated on the basis of the amount of data transmission they accomplish and their friendship with other nodes in the network. The account of friendship of a node with other nodes in the network is obtained through the Share Your Friends process which is a periodic event in the network. As a result of this scheme of operation, the network is able to effectively [2]isolate the malicious nodes which are left with no role to play in the ad hoc network.","PeriodicalId":242568,"journal":{"name":"2013 International Conference on Current Trends in Engineering and Technology (ICCTET)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116950293","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A framework for dual watermarking scheme under fractional transform 分数阶变换下的对偶水印方案框架
R. Lavanya, N. Suguna
{"title":"A framework for dual watermarking scheme under fractional transform","authors":"R. Lavanya, N. Suguna","doi":"10.1109/ICCTET.2013.6675977","DOIUrl":"https://doi.org/10.1109/ICCTET.2013.6675977","url":null,"abstract":"Digital revolution has resulted in explosion of knowledge in today's technology driven economy. Under that watermarking has been considered as the approaching technology for the communication of digital contents such as confidential data, company logo, etc. However it sustains poor quality, suffers limited robustness and reduced invisibility due to poor preprocessing of image. This paper presents a novel framework named fractional dual tree complex wavelet transform based dual watermarking (FDT-CWT-DW). The proposed method includes components such as property-inspired pixel adjustment to effectively handle both overflow and underflow of pixels for preprocessing and adopts k-means clustering algorithm for extraction in effective manner. The experimental results on the above method prove the effectiveness of the proposed framework.","PeriodicalId":242568,"journal":{"name":"2013 International Conference on Current Trends in Engineering and Technology (ICCTET)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117158840","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Notice of Violation of IEEE Publication PrinciplesNeural networks and genetic algorithm based intelligent robot for face recognition and obstacle avoidance 基于神经网络和遗传算法的人脸识别与避障智能机器人
S. Arun, G. Harish, K. Salomon, R. Saravanan, K. Kalpana, J. Jaya
{"title":"Notice of Violation of IEEE Publication PrinciplesNeural networks and genetic algorithm based intelligent robot for face recognition and obstacle avoidance","authors":"S. Arun, G. Harish, K. Salomon, R. Saravanan, K. Kalpana, J. Jaya","doi":"10.1109/ICCTET.2013.6675985","DOIUrl":"https://doi.org/10.1109/ICCTET.2013.6675985","url":null,"abstract":"The Internet-based security Soft-i-Robot is modeled using Soft computing paradigms for problem solving and decision-making in complex and ill-structured situations. Soft-i-Robot monitors the workspace with multimedia devices and sensor using an Internet application program. The model has sensory subsystems such as Intruder detection which, detects intruder, captures image and sends to server, and an Obstacle Avoidance Unit to detect the objects in the path of the mobile robot. These multiple features with hybrid Soft computing techniques depart the developed Soft-i-Robot from the existing developments, proving that the streaming technology-based approach greatly improves the sensibility of robot tele-operation. The relatively powerful online robots available today provoke the simple question, in terms of two competing goals: recognition accuracy and computing time. Improved recognition accuracy and reduced computing time for face recognition of the intruder is obtained using Morphological Shared Weight Neural Network. To obtain a collision-free optimized path, Soft-i-Robot uses derivative free Genetic Algorithm. With rapid expansion of Robotics and Soft computing paradigms, robotic technology touches upon self-understanding of humans, socio-economic, legal and ethical issues leading to improved performance rate and information processing capabilities.","PeriodicalId":242568,"journal":{"name":"2013 International Conference on Current Trends in Engineering and Technology (ICCTET)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127069595","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Anaerobic digestion treatment of Tannery waste water 制革废水的厌氧消化处理
P. Tamilchelvan, S. Mohan
{"title":"Anaerobic digestion treatment of Tannery waste water","authors":"P. Tamilchelvan, S. Mohan","doi":"10.1109/ICCTET.2013.6675932","DOIUrl":"https://doi.org/10.1109/ICCTET.2013.6675932","url":null,"abstract":"In this article an attempt is made to study the highly complex and is characterized by high content of organic, inorganic and chromium, suspended solids and dissolved solids present in Tannery waste water. Treatment of tannery waste water is carried out by physical, chemical, biological or the combination of these methods. Up flow anaerobic sludge Banked Reactor (UASB) exhibited better performance for treating high strength tannery wastewater effectively, compared with conventional reactors. Both aerobic and anaerobic processes are employed for the treatment of tannery wastewater.","PeriodicalId":242568,"journal":{"name":"2013 International Conference on Current Trends in Engineering and Technology (ICCTET)","volume":"21 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132898742","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Detection of suspicious region in medical images by Genetic Algorithm 基于遗传算法的医学图像可疑区域检测
S. Janardhana, J. Jaya, K. J. Sabareesaan, Jaina George, D. Yokeshwaran
{"title":"Detection of suspicious region in medical images by Genetic Algorithm","authors":"S. Janardhana, J. Jaya, K. J. Sabareesaan, Jaina George, D. Yokeshwaran","doi":"10.1109/ICCTET.2013.6675905","DOIUrl":"https://doi.org/10.1109/ICCTET.2013.6675905","url":null,"abstract":"Medical image analysis and processing has great significance in the field of medicine, especially in non-invasive treatment and clinical study. It helps the doctors to visualize and analyze the image for understand abnormalities in internal structures. This proposed technique consists of four stages. In first stage MRI image is acquired by using MATLAB. In the second stage preprocessing has been done. This pre-processed MRI brain image is normalized and enhanced to achieve computational consistency. In the third stage high frequency noise components are removed by suitable filters. In fourth stage the tumor part has been segmented using effective Genetic Algorithm and the performance analysis has been made.","PeriodicalId":242568,"journal":{"name":"2013 International Conference on Current Trends in Engineering and Technology (ICCTET)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114089578","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信