{"title":"Automatic detection of fovea using property of vessel free region","authors":"J. Medhi, S. Dandapat","doi":"10.1109/NCC.2015.7084852","DOIUrl":"https://doi.org/10.1109/NCC.2015.7084852","url":null,"abstract":"Accumulation of blood and its constituents over fovea of the retina lead to irreversible vision degradation in Diabetic Retinopathy (DR). Thus, fovea location contains very vital information in automated analysis. In this study, we have developed a simple approach for identification of fovea location. The main advantage of the method is that it does not require prior knowledge of the spatial relationship of optic disc location. The algorithm first searches for the fovea region considering the information that fovea is devoid of blood vessels. Later, dark intensity property of fovea is utilized for its detection from the region of interest. The method requires detection of blood vessel network and then search for vessel free region. Various morphological image processing tools are explored in different color planes for the successful execution of the method. The algorithm is tested on 759 images of DRIVE, DIARETDB0, DIARETDB1, LOCAL, MESSIDOR and HRF databases containing both normal and pathological cases of DR, with efficiency of detection obtained at 100%, 96.85%, 97.67%, 98.46% 96.25% and 100% respectively. The overall accuracy is 98.21%.","PeriodicalId":302718,"journal":{"name":"2015 Twenty First National Conference on Communications (NCC)","volume":"112 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126080674","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Multi-exposure image fusion for dynamic scenes without ghost effect","authors":"Ashish V. Vanmali, Samrudha G. Kelkar, V. Gadre","doi":"10.1109/NCC.2015.7084823","DOIUrl":"https://doi.org/10.1109/NCC.2015.7084823","url":null,"abstract":"Fusion of multi-exposure images for dynamic scenes often show ghost effect. This is mainly due to motion blur present in the image sequences or due to presence of totally new object. Detection and removal of such ghost effect plays an important role for automatically generating HDR images of dynamic scenes. In this paper, we present a simple, yet effective method for multi-exposure image fusion for dynamic scenes with new objects without ghost effect. The proposed method is carried out in four steps, viz.: weight map generation, new object detection, modification of weight maps and finally exposure fusion using modified weight maps. The experimental result show that our method produce HDR images without noticeable ghost effect.","PeriodicalId":302718,"journal":{"name":"2015 Twenty First National Conference on Communications (NCC)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122256670","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Naresh Vattikuti, Himanshu Sindhwal, Mallesham Dasari, T. B. Reddy
{"title":"Delay sensitive TDMA slot assignment in ad hoc wireless networks","authors":"Naresh Vattikuti, Himanshu Sindhwal, Mallesham Dasari, T. B. Reddy","doi":"10.1109/NCC.2015.7084878","DOIUrl":"https://doi.org/10.1109/NCC.2015.7084878","url":null,"abstract":"Time slot assignments in a TDMA ad hoc wireless network (AWN) is either centrally coordinated by a root node or distributed among all the nodes in the network. In the centralized TDMA network, the root node uses the global knowledge of the network to assign slots, but becomes more challenging in case of distributed network, as each node is expected to assign a slot for itself without conflicting other nodes' slot selection. There is plenty of literature on how slots are assigned in a centralized TDMA network but only a few on distributed. Quality of Service (QoS) is critically important in AWNs and a good slot assignment scheme prioritizes its QoS metrics during the process of slot assignments. Real-time communications require end-to-end delay and jitter within acceptable limits for better overall QoS. This paper proposes a delay sensitive approach to TDMA Slot assignment problem in distributed AWNs. The proposed approach does a balancing act between end-to-end delay and spatial reuse. The experimental results demonstrate that the proposed approach obtains quality results in terms of call acceptance rate, end-to-end delay and spatial reusability.","PeriodicalId":302718,"journal":{"name":"2015 Twenty First National Conference on Communications (NCC)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130385510","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Decentralized power adaptation in ergodic fading multiple access channels","authors":"Kamal Singh, S. R. Pillai","doi":"10.1109/NCC.2015.7084857","DOIUrl":"https://doi.org/10.1109/NCC.2015.7084857","url":null,"abstract":"We consider decentralized power control in fading multiple-access channels (MAC). When compared to a centralized MAC, solving the optimal power control for a decentralized system is difficult even for moderate number of users. Good thumb-rules for decentralized power control are available in literature, which are also asymptotically tight in the number of users. In this paper, we first derive a structural property that any optimal decentralized power control scheme must follow, and use this property to suggest a modified power control scheme. Numerical results suggest that the scheme we propose outperforms the existing ones.","PeriodicalId":302718,"journal":{"name":"2015 Twenty First National Conference on Communications (NCC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129092980","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Data-driven pause prediction for speech synthesis in storytelling style speech","authors":"Parakrant Sarkar, K. S. Rao","doi":"10.1109/NCC.2015.7084924","DOIUrl":"https://doi.org/10.1109/NCC.2015.7084924","url":null,"abstract":"In the storyteller speech, pauses plays a significant role in introducing suspense and climax. Pauses are used to emphasize keywords, emotion-salient words and separate the phrases in the utterance. The objective of this work is to predict the position and duration of the pauses in the synthesized speech from the text-to-speech system. We analyzed the pause patterns in storyteller speech and classified the pauses into three different categories, that is, short, medium and long pauses. A data driven three stage pause prediction model is proposed. In the first stage, the model is built properly to identify the pause position within an utterance using a set of word-level features. In the second stage, the pauses are classified into three different categories using a set of syllable-level features. In the final stage, a regression predictor is trained to predict the pause duration for each category. We conducted both objective and subjective tests to evaluate the proposed method. The subjective evaluation showed that subjects are perceiving a noticeable difference in the synthesized speech using the proposed method.","PeriodicalId":302718,"journal":{"name":"2015 Twenty First National Conference on Communications (NCC)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115860047","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Secondary outage analysis of amplify-and-forward cognitive relays with direct link and primary interference","authors":"Subhajit Majhi, S. Kalamkar, Adrish Banerjee","doi":"10.1109/NCC.2015.7084907","DOIUrl":"https://doi.org/10.1109/NCC.2015.7084907","url":null,"abstract":"The use of cognitive relays is an emerging and promising solution to overcome the problem of spectrum underutilization while achieving the spatial diversity. In this paper, we perform an outage analysis of the secondary system with amplify-and-forward relays in a spectrum sharing scenario, where a secondary transmitter communicates with a secondary destination over a direct link as well as the best relay. Specifically, under the peak power constraint, we derive a closed-form expression of the secondary outage probability provided that the primary outage probability remains below a predefined value.We also take into account the effect of primary interference on the secondary outage performance. Finally, we validate the analysis by simulation results.","PeriodicalId":302718,"journal":{"name":"2015 Twenty First National Conference on Communications (NCC)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121483419","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Shashi Ranjan, Pravjyot Singh Deogun, Mahima Mehta, P. Rathod, N. Akhtar, A. Karandikar
{"title":"A self-configured vertical handover algorithm for LTE and WLAN interworking","authors":"Shashi Ranjan, Pravjyot Singh Deogun, Mahima Mehta, P. Rathod, N. Akhtar, A. Karandikar","doi":"10.1109/NCC.2015.7084912","DOIUrl":"https://doi.org/10.1109/NCC.2015.7084912","url":null,"abstract":"Offloading mobile data traffic to Wireless Local Area Network (WLAN) is one of the widely accepted solution to improve the achievable capacity in cellular networks. In this paper, we propose a Signal-to-Interference-plus-Noise Ratio (SINR) based novel HandOver (HO) procedure to facilitate the Long Term Evolution (LTE)-WLAN interworking. We illustrate the significance of other handover parameters in addition to SINR in achieving improved system performance. Furthermore, we propose a self-configured vertical HO algorithm which determines an optimal configuration of these mobility parameters. We have obtained the results by performing extensive simulations in ns-3, which we have enhanced to support LTE-WLAN interworking as per the Third Generation Partnership Project (3GPP) standard.","PeriodicalId":302718,"journal":{"name":"2015 Twenty First National Conference on Communications (NCC)","volume":"147 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114054211","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Sniper localization using passive acoustic measurements over an ad-hoc sensor array","authors":"Pratyush Sinha, Sudhir Kumar, R. Hegde","doi":"10.1109/NCC.2015.7084859","DOIUrl":"https://doi.org/10.1109/NCC.2015.7084859","url":null,"abstract":"Sniper localization has become a very critical problem in modern day land warfare. A gunshot leaves many physical signatures which can be utilized to trace the direction and origin of it. Audio signals are by far the most reliable and affordable such signatures and have been utilized for the said task. In this paper, the characteristic shape of shock-wave waveforms along with Time of Arrival (ToA) information about shock-waves and muzzle blasts are used to find the trajectory and origin of the bullet. A three-dimensional geometry has been considered and the system has been designed to perform under constraints such as asynchronous sensors, weak muzzle detection and sensor self-location errors. The system presented here is applied on a set of data generated using a supersonic projectile. The current approach is shown to be an improvement over existing shock-wave based methods. The robustness of the system to measurement errors has also been analyzed.","PeriodicalId":302718,"journal":{"name":"2015 Twenty First National Conference on Communications (NCC)","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122496693","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Rate-distortion function for finite block codes: analysis of symmetric binary hamming problem","authors":"Srinivas R. Avasarala, S. Jana, P. Akella","doi":"10.1109/NCC.2015.7084928","DOIUrl":"https://doi.org/10.1109/NCC.2015.7084928","url":null,"abstract":"Shannon's rate-distortion theory provides an asymptotic analysis, where delays are allowed to grow unbounded. In practice, real-time applications, such as video streaming and network storage, are subject to certain maximum delay. Accordingly, it is imperative to develop a finite-delay framework for analyzing the rate-distortion limit. In this backdrop, we propose an intuitive generalization of Shannon's asymptotic operational framework to finite block codes. In view of the extreme complexity of such framework, we obtain insight by specializing to the symmetric binary hamming problem. Even upon such specialization, the proposed framework is computationally so intensive that accurate evaluation of the finite-delay rate-distortion function is practical only upto a block length of three. In order to obtain further insight, we then propose a lower-complexity lower bound, based on the partition function of natural numbers, whose computation is practical upto a block length of six. Finally, using a simple combinatorial argument, we propose an upper bound to localize the desired rate-distortion function between our lower and upper bounds.","PeriodicalId":302718,"journal":{"name":"2015 Twenty First National Conference on Communications (NCC)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123905859","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
K. Vupparaboina, R. R. Tamboli, P. M. Shenu, S. Jana
{"title":"Laser-based detection and depth estimation of dry and water-filled potholes: A geometric approach","authors":"K. Vupparaboina, R. R. Tamboli, P. M. Shenu, S. Jana","doi":"10.1109/NCC.2015.7084929","DOIUrl":"https://doi.org/10.1109/NCC.2015.7084929","url":null,"abstract":"In secondary Indian roads, one often encounters potholes which can be either dry or water-filled. Accordingly, to ensure safe driving, it is imperative to detect potholes and estimate their depths in either condition. In this paper, we develop a physics-based geometric framework, where such detection and depth-estimation can be accomplished using suitable laser. Specifically, we relate dry pothole depth to measured optical deviation using simple ray optics. Further, we use Snell's law of refraction to obtain a quartic equation, and its appropriate real root to relate water-filled pothole depth to the corresponding optical deviation. Here we take into account diminishing resolu- tion with increasing distance from the camera. We conclude by experimentally validating our method.","PeriodicalId":302718,"journal":{"name":"2015 Twenty First National Conference on Communications (NCC)","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115477897","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}