2011 International Conference on Computational Intelligence and Communication Networks最新文献

筛选
英文 中文
A Study on Keyframe Extraction Methods for Video Summary 视频摘要关键帧提取方法研究
Sujatha C, U. Mudenagudi
{"title":"A Study on Keyframe Extraction Methods for Video Summary","authors":"Sujatha C, U. Mudenagudi","doi":"10.1109/CICN.2011.15","DOIUrl":"https://doi.org/10.1109/CICN.2011.15","url":null,"abstract":"In this paper we carry out a survey on key frame extraction methods for Video Summary. We also discuss the summary evaluation criteria and compare the approaches based on the method, data set and the results. Video Summary is a process of presenting an abstract of entire video within a short period of time. It aims to provide a compact video representation, while preserving the essential activities of the original video. It is an essential task in video analysis and indexing applications. Most of the video summaries are based on selection of key frames within the shots of a video. Many of them use motion features and few use visual features for extracting the key frames. The video summary quality assessment methods are based more on subjective and less on objective measures. Tong wei Ren et al has provided a framework to assess the quality of the video against a given reference summary using both subjective and objective measures. Ciocca et al used the objective measures for evaluation of summary and most of them evaluate by taking the subjective opinion of experts. A framework for automatic evalution is needed based on both subjective and objective measures without the reference summary.","PeriodicalId":292190,"journal":{"name":"2011 International Conference on Computational Intelligence and Communication Networks","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125087594","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 56
Simulation and Performance Analysis of WiMAX System Using Transmit Diversity and Alamouti Coding Scheme with Real Time Image Input 采用实时图像输入传输分集和Alamouti编码的WiMAX系统仿真与性能分析
B. Sedani, K. Borisagar, D. Kamdar, G. R. Kulkarni
{"title":"Simulation and Performance Analysis of WiMAX System Using Transmit Diversity and Alamouti Coding Scheme with Real Time Image Input","authors":"B. Sedani, K. Borisagar, D. Kamdar, G. R. Kulkarni","doi":"10.1109/CICN.2011.149","DOIUrl":"https://doi.org/10.1109/CICN.2011.149","url":null,"abstract":"This paper presents the simulation and performance analyses of WiMAX (Worldwide Interoperability for Microwave Access) system along with transmit antenna diversity technique using Alamouti coding scheme. Traditionally the design of wireless systems has been focused on increasing the reliability of the air interface where fading and interference are viewed as nuisances. Recent focus is now on spectral efficiency, associated with this shift is a new point of view that fading can be viewed as an opportunity to be exploited. In the initial stages, the single antenna system was used at transmitter and receiver in both the sides (SISO system) anticipating lower spectral efficiency and lesser capacity. It can be seen that root cause of the poor performance of these technique is that reliable communication depends on the strength of the single signal path only which may be in a deep fade under certain circumstances. A natural solution is to ensure that the information symbols pass through multiple signal paths, each of which fades independently, making sure that reliable communication is possible as long as one of the paths is strong. This technique is called diversity. The main objective of this paper is to achieve the greater reduction in bit error rate in 4G wireless system using antenna diversity principles along with efficient wireless channels. The quality based simulation models are developed for WiMAX system using antenna diversity technique and real time image input. The simulation results are presented along with the comparative analysis for several test cases.","PeriodicalId":292190,"journal":{"name":"2011 International Conference on Computational Intelligence and Communication Networks","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130287235","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Swarm Intelligence for Feature Identification in Natural Terrain Environment 基于群体智能的自然地形环境特征识别
Pooja Arora, A. Mishra, V. Panchal
{"title":"Swarm Intelligence for Feature Identification in Natural Terrain Environment","authors":"Pooja Arora, A. Mishra, V. Panchal","doi":"10.1109/CICN.2011.157","DOIUrl":"https://doi.org/10.1109/CICN.2011.157","url":null,"abstract":"One of the most important problems in remote sensing studies is the classification of features in the satellite images, as it provides land use/ land cover information of the area under study. The Land Cover information like vegetation, water bodies, rocky area, sandy area etc. and its change over a period of time greatly affect local, regional and global environmental changes. Land Use information like buildings, roads and railway tracks are important features of urban infrastructure which crucially affect the life of people in cities. Recent developments in biologically inspired optimization techniques have motivated the researchers to explore the application of these techniques to the problem of satellite image feature classification. In this paper particle swarm optimization (PSO) along with the morphological operators is used for the identification of urban features like road and railway network, as well as land cover types, contained in the image. The concept of this paper is to explore and utilize the neighborhood information of the swarm computing algorithm to accurately identify features in the natural terrain environment. The test areas used are located in urban environment of Chandigarh and Saharanpur. Google Earth images of these areas were acquired and processed. The approach adopted has yielded satisfactory results.","PeriodicalId":292190,"journal":{"name":"2011 International Conference on Computational Intelligence and Communication Networks","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127390063","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
FPGA Implementation of Secure Time Shared Hash Stream Cipher 安全分时散列流密码的FPGA实现
K. Jithendra, K. Lalmohan, P. Deepthi
{"title":"FPGA Implementation of Secure Time Shared Hash Stream Cipher","authors":"K. Jithendra, K. Lalmohan, P. Deepthi","doi":"10.1109/CICN.2011.80","DOIUrl":"https://doi.org/10.1109/CICN.2011.80","url":null,"abstract":"Hash functions are widely used in secure communication systems for message authentication and data integrity verification. For encryption of data, stream ciphers are preferred to block ciphers because it consumes less power and hardware. In this paper we propose implementation and analysis of a circuit for both Hash generation and Encryption of data, based on a single hardware block in the time shared manner. The design of stream cipher based on hardware efficient hash function was reported earlier but in a paper which appeared later, the security of this stream cipher was proved to be very low. In this paper, we investigate how to overcome this weakness and make the design more secure, without much increase in hardware complexity. Here, we implement a 128 bit message encryption circuit which facilitates data integrity check using hash function in FPGA.","PeriodicalId":292190,"journal":{"name":"2011 International Conference on Computational Intelligence and Communication Networks","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129086439","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Modified RSA Algorithm: A Secure Approach 改进的RSA算法:一种安全的方法
Aayush Chhabra, S. Mathur
{"title":"Modified RSA Algorithm: A Secure Approach","authors":"Aayush Chhabra, S. Mathur","doi":"10.1109/CICN.2011.117","DOIUrl":"https://doi.org/10.1109/CICN.2011.117","url":null,"abstract":"In this paper we introduce an approach which is more secure than original RSA algorithm, which is used for digital signatures and encryption in public key cryptography. This approach eliminates the need to transfer n, the product of two random but essentially big prime numbers, in the public key due to which it becomes difficult for the intruder to guess the factors of n and hence the encrypted message remains safe from the hackers. Thus this approach provides a more secure path for transmission and reception of messages through public key cryptography.","PeriodicalId":292190,"journal":{"name":"2011 International Conference on Computational Intelligence and Communication Networks","volume":"183 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115059166","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 27
Knowledge Discovery in Text Mining Technique Using Association Rules Extraction 基于关联规则抽取的文本挖掘技术中的知识发现
V. Bhujade, N. Janwe
{"title":"Knowledge Discovery in Text Mining Technique Using Association Rules Extraction","authors":"V. Bhujade, N. Janwe","doi":"10.1109/CICN.2011.104","DOIUrl":"https://doi.org/10.1109/CICN.2011.104","url":null,"abstract":"This paper describes text mining technique for automatically extracting association rules from collections of textual documents. The technique called, Extracting Association Rules from Text (EART). It depends on keyword features for discover association rules amongst keywords labeling the documents. EART system ignores the order in which the words occur, but instead focusing on the words and their statistical distributions in documents. The system based on Information Retrieval scheme (TF-IDF) for selecting most important keywords for association rules generation. It consists of three phases: Text Preprocessing phase (transformation, filtration, stemming and indexing of the documents), Association Rule Mining (ARM) phase (applying our designed algorithm for Generating Association Rules based on Weighting scheme GARW) and Visualization phase (visualization of results). Experiments applied on Online WebPages related to the cryptography. The extracted association rules contain important features.","PeriodicalId":292190,"journal":{"name":"2011 International Conference on Computational Intelligence and Communication Networks","volume":"146 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123394176","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Analysis of Attack on RSA through Formal Verification Methods 基于形式化验证方法的RSA攻击分析
Sachin Upadhyay, Yashpal Singh
{"title":"Analysis of Attack on RSA through Formal Verification Methods","authors":"Sachin Upadhyay, Yashpal Singh","doi":"10.1109/CICN.2011.33","DOIUrl":"https://doi.org/10.1109/CICN.2011.33","url":null,"abstract":"By considering the old results if the private exponent d used in RSA cryptosystem is less than n^0.292 than the system is insecure. So the problem is that we need to consider a very big prime numbers in order to make our system secure. Our approach will help to increase the range of private exponent d up to n^0.5. This will help the individual to have bigger ranges regarding the prime numbers, so that the system remains secure to a greater extent.","PeriodicalId":292190,"journal":{"name":"2011 International Conference on Computational Intelligence and Communication Networks","volume":"645 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117099520","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Mixed-Signal VLSI Design in 0.5µm Process of Nano-Power Subcompact Mirror-Amplifier for AccuSensor 基于0.5µm工艺的光电传感器纳米功率微型镜像放大器混合信号VLSI设计
I. Chowdhury, Rumana Amin, S. M. S. Islam, Md. Shoaibur Rahman, S. Binzaid
{"title":"Mixed-Signal VLSI Design in 0.5µm Process of Nano-Power Subcompact Mirror-Amplifier for AccuSensor","authors":"I. Chowdhury, Rumana Amin, S. M. S. Islam, Md. Shoaibur Rahman, S. Binzaid","doi":"10.1109/CICN.2011.112","DOIUrl":"https://doi.org/10.1109/CICN.2011.112","url":null,"abstract":"Emerging semiconductor VLSI requires improved device density on a single chip solution that many parameters are becoming vital concern for cost reduction by lowering the chip area, lowering power dissipation, reducing operating voltage, increasing speed etc. A previously designed precision sensor application mirror-amplifier was considered for optimizing in chip area consumption and improves sensing to make it ultra-precise, also this work has reduced the IC to a subcompact die sizes. MAGIC is used as two-dimensional CAD layout tool. Also PSPICE is used for electrical simulation purposes employed by extraction tool. Feature size is taken from mSCN3M_SUBM.30 process for 0.6μm layout and 0.5μm enhanced fabrication process. The improved design has area of 101?X48? (minimized from 126?X59?) or 30.3μmX15μm (minimized from 37.8μmX17.7μm) in 0.6?m CMOS design process. For multi-die placement, two sets of chip are designed those are placed on the four sub-dies in a single MOSIS tiny chip die. For one set of chip coincidence detector is designed to make the mirror-amplifier ultra precise, buffer stage is designed for another set of chip to drive large load. This paper presents details of the key research works, results, completed chip layout and packaging of the chip.","PeriodicalId":292190,"journal":{"name":"2011 International Conference on Computational Intelligence and Communication Networks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130860820","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Elliptical Patch UWB Antenna with Reduced Ground Plane Effect 减小地平面效应的椭圆贴片超宽带天线
A. Katariya, Heena Gupta, K. Prajapat
{"title":"An Elliptical Patch UWB Antenna with Reduced Ground Plane Effect","authors":"A. Katariya, Heena Gupta, K. Prajapat","doi":"10.1109/CICN.2011.26","DOIUrl":"https://doi.org/10.1109/CICN.2011.26","url":null,"abstract":"The design and analysis of printed antenna with the reduced ground plane effect, fed by micro strip line for Ultra Wide Band (UWB) communication systems is presented. The simulated results indicate that by cutting an elliptical patch at radiator, the proposed antenna yields a wide operating bandwidth of 2.1-13.8 GHz for-10dB return loss. In particular, the ground-plane effect on impedance performance is greatly reduced by cutting the patch from the radiator because the electric currents on the ground plane are significantly suppressed at the lower edge operating frequencies. In addition to being small in size of 15mm x15mm, the antenna presents three-dimensional omni directional radiation across the entire UWB bandwidth with high gain. The proposed antenna has satisfactory band notched characteristics with the peak value of the VSWR in the stop band is 8.","PeriodicalId":292190,"journal":{"name":"2011 International Conference on Computational Intelligence and Communication Networks","volume":"560 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131625321","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Novel Wavelet-Based Denoising Method of SAR Image Using Interscale Dependency 基于尺度间相关性的SAR图像小波去噪方法
Roopa Ahirwar, A. Choubey
{"title":"A Novel Wavelet-Based Denoising Method of SAR Image Using Interscale Dependency","authors":"Roopa Ahirwar, A. Choubey","doi":"10.1109/CICN.2011.11","DOIUrl":"https://doi.org/10.1109/CICN.2011.11","url":null,"abstract":"This paper attempts to undertake the study of two types of noise such as Salt and Pepper (SPN), Speckle (SPKN). Different noise densities have been removed by using four types of filters as meidan filter, Lee filter, Kuan filter, Frost filter, and Wavelet based Bivariate Shrinkage function. Synthetic aperture radar (SAR) images are inherently affected by multiplicative speckle noise, which is due to the coherent nature of the scattering phenomenon. Multiwavelet transform technique has a big advantage over the other techniques that it less distorts spectral characteristics of the image denoising We apply the proposed method for speckle SAR images by using logarithmic transformation. We present a novel approach to estimating the mean square error (MSE) associated with any given threshold level in both hard and soft thresholding This paper proposes different filtering techniques based on statistical methods for the removal of speckle noise.. The quality of the enhanced images is measured by the statistical quantity measures: Noise Variance, Mean Square Error (MSE), Equivalent Numbers of Looks (ENL), Signal-to-Noise Ratio (SNR), and Peak Signal-to-Noise Ratio (PSNR),","PeriodicalId":292190,"journal":{"name":"2011 International Conference on Computational Intelligence and Communication Networks","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131292995","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信