{"title":"A Mixed Model Binary Imaging Strategy Using Wireless Sensors for Brain Imaging","authors":"A. Tiwari, R. Mishra, R. Nema, Puran Gaur","doi":"10.1109/CSNT.2011.125","DOIUrl":"https://doi.org/10.1109/CSNT.2011.125","url":null,"abstract":"Cognitive radio is a new paradigm for wireless communications offering a solution to conciliate the current spectrum demand growth and underutilization without changes to the existing legacy wireless systems. Segmentation of brain structures from MR images is crucial in understanding the disease progress, diagnosis, and treatment monitoring. Atlases, showing the expected locations of the structures, are commonly used to start and guide the segmentation process. Classification of complex motor activities from brain imaging is relatively new in the fields of neuroscience and brain-computer interfaces (BCIs). In many cases, the quality of the atlas may have a significant effect in the final result. In this paper we propose a novel mixed model Binary Imaging Strategy using Wireless Sensors for brain imaging. In this technique we first segmented the images and deform with the manual contour. Our study shows that the expected result is good in various areas.","PeriodicalId":294850,"journal":{"name":"2011 International Conference on Communication Systems and Network Technologies","volume":"156 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116373709","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Identifying Resemblance in Local Plastic Surgical Faces Using Near Sets for Face Recognition","authors":"R. Khedgaonkar, K. Singh, Swati P. Gawande","doi":"10.1109/CSNT.2011.126","DOIUrl":"https://doi.org/10.1109/CSNT.2011.126","url":null,"abstract":"In recent years, much advancement have been made in face recognition techniques which leads to the popularity of plastic surgery procedures. Pose, illumination and expressions are some of the problems that have been already recognized and studied in the domain of face recognition. In this paper, we have proposed an approach based on near set theory to develop a classifier for facial images that have previously undergone some feature modifications through plastic surgery. Our work concerns only geometrically obtained feature values and their approximation using near sets. Near set theory provides a method to establish resemblance between objects contained in a disjoint set, that is, it provides a formal basis for observation, comparison and classification of the objects. The experimental results indicate the performance and accuracy of the plastic surgery based face recognition.","PeriodicalId":294850,"journal":{"name":"2011 International Conference on Communication Systems and Network Technologies","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128282419","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"End-to-end Congestion Control Techniques for Router","authors":"B. Mahesh, M. Venkateswarlu, M. Raghavendra","doi":"10.1109/CSNT.2011.40","DOIUrl":"https://doi.org/10.1109/CSNT.2011.40","url":null,"abstract":"END-TO-END packet delay is one of the canonical metrics in Internet Protocol (IP) networks and is important both from the network operator and application performance points of view. The motivation for the present work is a detailed know-ledge and understanding of such \"through-router\" delays. A thorough examination of delay leads inevitably to deeper quest-ions about congestion and router queuing dynamics in general. Although there have been many studies examining delay statistics and congestion measured at the edges of the network, very few have been able to report with any degree of authority on what actually occurs at switching elements. In existing system the single-hop packet delay measured and analyzed through operational routers in a backbone IP network. However since the router had only one input and one output link, which were of the same speed, the internal queuing was extremely limited. In this paper work with a data set recording all IP packets traversing a Tier-1 access router. All input and output links were monitored, allowing a complete picture of congestion and in particular router delays to be obtained. This paper provides a comprehensive examination of these issues from the understanding of origins and measurement.","PeriodicalId":294850,"journal":{"name":"2011 International Conference on Communication Systems and Network Technologies","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125929305","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"VHDL Environment for Floating Point Arithmetic Logic Unit-ALU Design and Simulation","authors":"R. Singh, Asish Tiwari, V. Singh, G. Tomar","doi":"10.1109/CSNT.2011.167","DOIUrl":"https://doi.org/10.1109/CSNT.2011.167","url":null,"abstract":"VHDL environment for floating point arithmetic and logic unit design using pipelining is introduced; the novelty in the ALU design with pipelining provides a high performance ALU to execute multiple instructions simultaneously. In top-down design approach, four arithmetic modules, addition, subtraction, multiplication and division are combined to form a floating point ALU unit. Each module is divided into sub- modules with two selection bits are combined to select a particular operation. Each module is independent to each other. The modules are realized and validated using VHDL simulation in the Xilinx12.1i software.","PeriodicalId":294850,"journal":{"name":"2011 International Conference on Communication Systems and Network Technologies","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121970358","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mahesh M. Goyani, Gunvantsinh Gohil, Amit Chaudhari
{"title":"Robust Face Recognition in Low Dimensional Subspace Using Reconstructive and Discriminative Features","authors":"Mahesh M. Goyani, Gunvantsinh Gohil, Amit Chaudhari","doi":"10.1109/CSNT.2011.80","DOIUrl":"https://doi.org/10.1109/CSNT.2011.80","url":null,"abstract":"In this paper, we have discussed dimensionality reduction techniques for face recognition - Principle Component Analysis (PCA) and Fisher Discriminant Analysis(FDA). Both the methods are based on linear projection, which projects the face from higher dimensional image space to lower dimensional feature space. PCA derives the most expressive features (MEF) by projecting face vector such that it captures greatest variance. FDA derives most discriminating features(MDF) by maximizing between class scatter and minimizing within class scatter. Lower dimensional features are used for recognition process. Classification can be achieved using Neural Network (NN), Support Vector Machine (SVM) etc. We have tested our system for the L2 norm measure. At the end of the paper, we have discussed results which show that FDA out weights the performance of PCA with average recognition rate more than 95%.","PeriodicalId":294850,"journal":{"name":"2011 International Conference on Communication Systems and Network Technologies","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131097279","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Hanmandlu, R. B. Gupta, Farrukh Sayeed, A. Q. Ansari
{"title":"An Experimental Study of Different Features for Face Recognition","authors":"M. Hanmandlu, R. B. Gupta, Farrukh Sayeed, A. Q. Ansari","doi":"10.1109/CSNT.2011.121","DOIUrl":"https://doi.org/10.1109/CSNT.2011.121","url":null,"abstract":"As a first study, the use the Gabor filter bank is made to generate features for face recognition. The features so obtained on the application of SVM classifier yields accuracy rate of 96.2%. With a view to improve the performance, two more feature types, viz., wavelet features and wavelet-fuzzy features resulting from the application of 2D wavelet transform on the Composite detail images and the Approximate images at 3 levels of decomposition, are devised. The ROCs of three feature types show that wavelet-fuzzy features have a better performance. The performance of Gabor features is slightly inferior to that of wavelet-fuzzy features. The algorithm was tested on ORL (Olivetti Research Laboratory) database that has slight orientations in face images.","PeriodicalId":294850,"journal":{"name":"2011 International Conference on Communication Systems and Network Technologies","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130630876","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cloud Computing: The Fifth Generation of Computing","authors":"S. Rajan, Apurva Jairath","doi":"10.1109/CSNT.2011.143","DOIUrl":"https://doi.org/10.1109/CSNT.2011.143","url":null,"abstract":"Cloud Computing is the emerging buzzword in Information Technology. It is growing day by day due to its rich features of services. It is a virtual pool of resources which are provided to the users through Internet. Cloud computing is a new flavor of computing where our trend of using Internet changes. It is the future of Internet. It is also called as fifth generation of computing after Mainframe, Personal Computer, Client-Server Computing, and the Web. Nowadays, various Internet services are available in distributed manner. To use these services in a feasible manner is a big question because sometimes many resources become idle, they are costly and increase the budget of organization. This is the great matter of concern, especially when the world is facing financial crisis. Cloud Computing can be the answer of these questions. In this paper, we have analyzed and highlighted the various aspects of Cloud Computing to find the actuality of the fifth generation computing in the form of cloud computing.","PeriodicalId":294850,"journal":{"name":"2011 International Conference on Communication Systems and Network Technologies","volume":"103 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126583756","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Evolution of RFID Security and Privacy: A Research Survey","authors":"R. Pateriya, Sangeeta Sharma","doi":"10.1109/CSNT.2011.31","DOIUrl":"https://doi.org/10.1109/CSNT.2011.31","url":null,"abstract":"This paper presents the recent technical research on the problems of privacy and security for radio frequency identification (RFID). RFID technology is already used widely and is increasingly becoming a part of daily life. However, issues regarding security and privacy with respect to RFID technology have not been resolved satisfactorily. There are huge number of challenges, which must be overcome to resolve RFID security and privacy issues. It is because of the many constraints attached to the provision of security and privacy in RFID systems. These challenges are chiefly technical and economic in nature but also include ethical and social issues. Along with meeting the security and privacy needs of RFID technology, solutions must be inexpensive, practical, reliable, scalable, flexible, inter-organizational, and long lasting. This paper reviews the approaches which had been proposed by scientists for privacy protection and integrity assurance in RFID systems, and treats the social and technical context of their work. This paper can be useful as a reference for non specialist, as well as for specialist readers.","PeriodicalId":294850,"journal":{"name":"2011 International Conference on Communication Systems and Network Technologies","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132422593","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analysis of Channel Capacity of Generalized -K Fading with Maximal-Ratio Combining Diversity Receivers","authors":"V. Dwivedi, G. Singh","doi":"10.1109/CSNT.2011.117","DOIUrl":"https://doi.org/10.1109/CSNT.2011.117","url":null,"abstract":"In this paper, we have analyzed the channel capacity of the maximal -- ratio combing (MRC) diversity scheme over Generalized-K fading channels model at the receiver. For this analysis, we have evaluated the moment generating function (MGF) for the Generalized-K fading channel model. The derived MGF expression is used to obtain, new closed-form expression for the channel capacity under different adaptive transmission schemes.","PeriodicalId":294850,"journal":{"name":"2011 International Conference on Communication Systems and Network Technologies","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131319173","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Proposed Modification in ETSI GSM 06.10 Full Rate Speech Codec for High Rate Data Hiding and its Objective Evaluation of Performance Using Simulink","authors":"N. Bhatt, Y. Kosta, V. Tank","doi":"10.1109/CSNT.2011.13","DOIUrl":"https://doi.org/10.1109/CSNT.2011.13","url":null,"abstract":"Today, the primary constrain in wireless communication system is limited bandwidth and power. Wireless systems involved in transmission of speech envisage that efficient and effective methods be developed (bandwidth usage & power) to transmit and receive the same while maintaining quality-of-speech, especially at the receiving end. Speech coding is a technique, since the era of digitization (digital) and computerization (computational and processing horsepower - DSP) that has been a material-of-research for quite some time amongst the scientific and academic community. This paper proposes modifications in grid selection strategy in Regular Pulse Excitation section of ETSI GSM 06.10 Full Rate 13 kbps coder [6] so that there is an overall 1.8 kbps (36bits / each 20ms frame) reduction in bit-rate which can be utilized for high bit rate data hiding. These steganographic 36bits are appended in class 1B (bit d146-d181) as per 05.03[7] to finally produce bit stream of 260 bits for each frame. So, proposed modifications in GSM FR allow joint data hiding and speech coding. Watermark data like text, audio and image can be reliably transmitted at a rate of 1.8 kbps with a small effect on Objective speech quality (as can be witnessed from the obtained results with text file chosen in our analysis) and with reasonable computational complexity [1]. Here, both ETSI GSM 06.10 FR coder and proposed steganographic GSM FR coders are implemented using Simulink model in MATLAB and then Objective analysis comparison between both coders are carried out using set of tables and graphs. Apart from hiding data, the proposed modifications in GSM FR is useful for overall reduction in codec bit-rate and provides room for better error concealment at channel coding.","PeriodicalId":294850,"journal":{"name":"2011 International Conference on Communication Systems and Network Technologies","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132776670","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}