2011 International Conference on Communication Systems and Network Technologies最新文献

筛选
英文 中文
A Mixed Model Binary Imaging Strategy Using Wireless Sensors for Brain Imaging 基于无线传感器的脑成像混合模型二值成像策略
A. Tiwari, R. Mishra, R. Nema, Puran Gaur
{"title":"A Mixed Model Binary Imaging Strategy Using Wireless Sensors for Brain Imaging","authors":"A. Tiwari, R. Mishra, R. Nema, Puran Gaur","doi":"10.1109/CSNT.2011.125","DOIUrl":"https://doi.org/10.1109/CSNT.2011.125","url":null,"abstract":"Cognitive radio is a new paradigm for wireless communications offering a solution to conciliate the current spectrum demand growth and underutilization without changes to the existing legacy wireless systems. Segmentation of brain structures from MR images is crucial in understanding the disease progress, diagnosis, and treatment monitoring. Atlases, showing the expected locations of the structures, are commonly used to start and guide the segmentation process. Classification of complex motor activities from brain imaging is relatively new in the fields of neuroscience and brain-computer interfaces (BCIs). In many cases, the quality of the atlas may have a significant effect in the final result. In this paper we propose a novel mixed model Binary Imaging Strategy using Wireless Sensors for brain imaging. In this technique we first segmented the images and deform with the manual contour. Our study shows that the expected result is good in various areas.","PeriodicalId":294850,"journal":{"name":"2011 International Conference on Communication Systems and Network Technologies","volume":"156 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116373709","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Identifying Resemblance in Local Plastic Surgical Faces Using Near Sets for Face Recognition 基于近集的局部整形外科面部相似性识别
R. Khedgaonkar, K. Singh, Swati P. Gawande
{"title":"Identifying Resemblance in Local Plastic Surgical Faces Using Near Sets for Face Recognition","authors":"R. Khedgaonkar, K. Singh, Swati P. Gawande","doi":"10.1109/CSNT.2011.126","DOIUrl":"https://doi.org/10.1109/CSNT.2011.126","url":null,"abstract":"In recent years, much advancement have been made in face recognition techniques which leads to the popularity of plastic surgery procedures. Pose, illumination and expressions are some of the problems that have been already recognized and studied in the domain of face recognition. In this paper, we have proposed an approach based on near set theory to develop a classifier for facial images that have previously undergone some feature modifications through plastic surgery. Our work concerns only geometrically obtained feature values and their approximation using near sets. Near set theory provides a method to establish resemblance between objects contained in a disjoint set, that is, it provides a formal basis for observation, comparison and classification of the objects. The experimental results indicate the performance and accuracy of the plastic surgery based face recognition.","PeriodicalId":294850,"journal":{"name":"2011 International Conference on Communication Systems and Network Technologies","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128282419","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
End-to-end Congestion Control Techniques for Router 路由器端到端拥塞控制技术
B. Mahesh, M. Venkateswarlu, M. Raghavendra
{"title":"End-to-end Congestion Control Techniques for Router","authors":"B. Mahesh, M. Venkateswarlu, M. Raghavendra","doi":"10.1109/CSNT.2011.40","DOIUrl":"https://doi.org/10.1109/CSNT.2011.40","url":null,"abstract":"END-TO-END packet delay is one of the canonical metrics in Internet Protocol (IP) networks and is important both from the network operator and application performance points of view. The motivation for the present work is a detailed know-ledge and understanding of such \"through-router\" delays. A thorough examination of delay leads inevitably to deeper quest-ions about congestion and router queuing dynamics in general. Although there have been many studies examining delay statistics and congestion measured at the edges of the network, very few have been able to report with any degree of authority on what actually occurs at switching elements. In existing system the single-hop packet delay measured and analyzed through operational routers in a backbone IP network. However since the router had only one input and one output link, which were of the same speed, the internal queuing was extremely limited. In this paper work with a data set recording all IP packets traversing a Tier-1 access router. All input and output links were monitored, allowing a complete picture of congestion and in particular router delays to be obtained. This paper provides a comprehensive examination of these issues from the understanding of origins and measurement.","PeriodicalId":294850,"journal":{"name":"2011 International Conference on Communication Systems and Network Technologies","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125929305","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
VHDL Environment for Floating Point Arithmetic Logic Unit-ALU Design and Simulation 浮点算术逻辑单元的VHDL环境- alu设计与仿真
R. Singh, Asish Tiwari, V. Singh, G. Tomar
{"title":"VHDL Environment for Floating Point Arithmetic Logic Unit-ALU Design and Simulation","authors":"R. Singh, Asish Tiwari, V. Singh, G. Tomar","doi":"10.1109/CSNT.2011.167","DOIUrl":"https://doi.org/10.1109/CSNT.2011.167","url":null,"abstract":"VHDL environment for floating point arithmetic and logic unit design using pipelining is introduced; the novelty in the ALU design with pipelining provides a high performance ALU to execute multiple instructions simultaneously. In top-down design approach, four arithmetic modules, addition, subtraction, multiplication and division are combined to form a floating point ALU unit. Each module is divided into sub- modules with two selection bits are combined to select a particular operation. Each module is independent to each other. The modules are realized and validated using VHDL simulation in the Xilinx12.1i software.","PeriodicalId":294850,"journal":{"name":"2011 International Conference on Communication Systems and Network Technologies","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121970358","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
Robust Face Recognition in Low Dimensional Subspace Using Reconstructive and Discriminative Features 基于重构和判别特征的低维子空间鲁棒人脸识别
Mahesh M. Goyani, Gunvantsinh Gohil, Amit Chaudhari
{"title":"Robust Face Recognition in Low Dimensional Subspace Using Reconstructive and Discriminative Features","authors":"Mahesh M. Goyani, Gunvantsinh Gohil, Amit Chaudhari","doi":"10.1109/CSNT.2011.80","DOIUrl":"https://doi.org/10.1109/CSNT.2011.80","url":null,"abstract":"In this paper, we have discussed dimensionality reduction techniques for face recognition - Principle Component Analysis (PCA) and Fisher Discriminant Analysis(FDA). Both the methods are based on linear projection, which projects the face from higher dimensional image space to lower dimensional feature space. PCA derives the most expressive features (MEF) by projecting face vector such that it captures greatest variance. FDA derives most discriminating features(MDF) by maximizing between class scatter and minimizing within class scatter. Lower dimensional features are used for recognition process. Classification can be achieved using Neural Network (NN), Support Vector Machine (SVM) etc. We have tested our system for the L2 norm measure. At the end of the paper, we have discussed results which show that FDA out weights the performance of PCA with average recognition rate more than 95%.","PeriodicalId":294850,"journal":{"name":"2011 International Conference on Communication Systems and Network Technologies","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131097279","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
An Experimental Study of Different Features for Face Recognition 人脸识别中不同特征的实验研究
M. Hanmandlu, R. B. Gupta, Farrukh Sayeed, A. Q. Ansari
{"title":"An Experimental Study of Different Features for Face Recognition","authors":"M. Hanmandlu, R. B. Gupta, Farrukh Sayeed, A. Q. Ansari","doi":"10.1109/CSNT.2011.121","DOIUrl":"https://doi.org/10.1109/CSNT.2011.121","url":null,"abstract":"As a first study, the use the Gabor filter bank is made to generate features for face recognition. The features so obtained on the application of SVM classifier yields accuracy rate of 96.2%. With a view to improve the performance, two more feature types, viz., wavelet features and wavelet-fuzzy features resulting from the application of 2D wavelet transform on the Composite detail images and the Approximate images at 3 levels of decomposition, are devised. The ROCs of three feature types show that wavelet-fuzzy features have a better performance. The performance of Gabor features is slightly inferior to that of wavelet-fuzzy features. The algorithm was tested on ORL (Olivetti Research Laboratory) database that has slight orientations in face images.","PeriodicalId":294850,"journal":{"name":"2011 International Conference on Communication Systems and Network Technologies","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130630876","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Cloud Computing: The Fifth Generation of Computing 云计算:第五代计算
S. Rajan, Apurva Jairath
{"title":"Cloud Computing: The Fifth Generation of Computing","authors":"S. Rajan, Apurva Jairath","doi":"10.1109/CSNT.2011.143","DOIUrl":"https://doi.org/10.1109/CSNT.2011.143","url":null,"abstract":"Cloud Computing is the emerging buzzword in Information Technology. It is growing day by day due to its rich features of services. It is a virtual pool of resources which are provided to the users through Internet. Cloud computing is a new flavor of computing where our trend of using Internet changes. It is the future of Internet. It is also called as fifth generation of computing after Mainframe, Personal Computer, Client-Server Computing, and the Web. Nowadays, various Internet services are available in distributed manner. To use these services in a feasible manner is a big question because sometimes many resources become idle, they are costly and increase the budget of organization. This is the great matter of concern, especially when the world is facing financial crisis. Cloud Computing can be the answer of these questions. In this paper, we have analyzed and highlighted the various aspects of Cloud Computing to find the actuality of the fifth generation computing in the form of cloud computing.","PeriodicalId":294850,"journal":{"name":"2011 International Conference on Communication Systems and Network Technologies","volume":"103 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126583756","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 79
The Evolution of RFID Security and Privacy: A Research Survey RFID安全与隐私的演进研究综述
R. Pateriya, Sangeeta Sharma
{"title":"The Evolution of RFID Security and Privacy: A Research Survey","authors":"R. Pateriya, Sangeeta Sharma","doi":"10.1109/CSNT.2011.31","DOIUrl":"https://doi.org/10.1109/CSNT.2011.31","url":null,"abstract":"This paper presents the recent technical research on the problems of privacy and security for radio frequency identification (RFID). RFID technology is already used widely and is increasingly becoming a part of daily life. However, issues regarding security and privacy with respect to RFID technology have not been resolved satisfactorily. There are huge number of challenges, which must be overcome to resolve RFID security and privacy issues. It is because of the many constraints attached to the provision of security and privacy in RFID systems. These challenges are chiefly technical and economic in nature but also include ethical and social issues. Along with meeting the security and privacy needs of RFID technology, solutions must be inexpensive, practical, reliable, scalable, flexible, inter-organizational, and long lasting. This paper reviews the approaches which had been proposed by scientists for privacy protection and integrity assurance in RFID systems, and treats the social and technical context of their work. This paper can be useful as a reference for non specialist, as well as for specialist readers.","PeriodicalId":294850,"journal":{"name":"2011 International Conference on Communication Systems and Network Technologies","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132422593","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 76
Analysis of Channel Capacity of Generalized -K Fading with Maximal-Ratio Combining Diversity Receivers 最大比组合分集接收机广义-K衰落信道容量分析
V. Dwivedi, G. Singh
{"title":"Analysis of Channel Capacity of Generalized -K Fading with Maximal-Ratio Combining Diversity Receivers","authors":"V. Dwivedi, G. Singh","doi":"10.1109/CSNT.2011.117","DOIUrl":"https://doi.org/10.1109/CSNT.2011.117","url":null,"abstract":"In this paper, we have analyzed the channel capacity of the maximal -- ratio combing (MRC) diversity scheme over Generalized-K fading channels model at the receiver. For this analysis, we have evaluated the moment generating function (MGF) for the Generalized-K fading channel model. The derived MGF expression is used to obtain, new closed-form expression for the channel capacity under different adaptive transmission schemes.","PeriodicalId":294850,"journal":{"name":"2011 International Conference on Communication Systems and Network Technologies","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131319173","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Proposed Modification in ETSI GSM 06.10 Full Rate Speech Codec for High Rate Data Hiding and its Objective Evaluation of Performance Using Simulink ETSI GSM 06.10全速率语音编解码器对高速率数据隐藏的改进及其Simulink性能客观评价
N. Bhatt, Y. Kosta, V. Tank
{"title":"Proposed Modification in ETSI GSM 06.10 Full Rate Speech Codec for High Rate Data Hiding and its Objective Evaluation of Performance Using Simulink","authors":"N. Bhatt, Y. Kosta, V. Tank","doi":"10.1109/CSNT.2011.13","DOIUrl":"https://doi.org/10.1109/CSNT.2011.13","url":null,"abstract":"Today, the primary constrain in wireless communication system is limited bandwidth and power. Wireless systems involved in transmission of speech envisage that efficient and effective methods be developed (bandwidth usage & power) to transmit and receive the same while maintaining quality-of-speech, especially at the receiving end. Speech coding is a technique, since the era of digitization (digital) and computerization (computational and processing horsepower - DSP) that has been a material-of-research for quite some time amongst the scientific and academic community. This paper proposes modifications in grid selection strategy in Regular Pulse Excitation section of ETSI GSM 06.10 Full Rate 13 kbps coder [6] so that there is an overall 1.8 kbps (36bits / each 20ms frame) reduction in bit-rate which can be utilized for high bit rate data hiding. These steganographic 36bits are appended in class 1B (bit d146-d181) as per 05.03[7] to finally produce bit stream of 260 bits for each frame. So, proposed modifications in GSM FR allow joint data hiding and speech coding. Watermark data like text, audio and image can be reliably transmitted at a rate of 1.8 kbps with a small effect on Objective speech quality (as can be witnessed from the obtained results with text file chosen in our analysis) and with reasonable computational complexity [1]. Here, both ETSI GSM 06.10 FR coder and proposed steganographic GSM FR coders are implemented using Simulink model in MATLAB and then Objective analysis comparison between both coders are carried out using set of tables and graphs. Apart from hiding data, the proposed modifications in GSM FR is useful for overall reduction in codec bit-rate and provides room for better error concealment at channel coding.","PeriodicalId":294850,"journal":{"name":"2011 International Conference on Communication Systems and Network Technologies","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132776670","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信