2015 International Conference on Electrical, Electronics, Signals, Communication and Optimization (EESCO)最新文献

筛选
英文 中文
IEEE copyright and consent form IEEE版权和同意表格
Lmi �fI.sE...D, 01T'lMJlL lTD, C�NTR.Hl£f- J5.I6t.N, FoK 230lJ'lDEO
{"title":"IEEE copyright and consent form","authors":"Lmi �fI.sE...D, 01T'lMJlL lTD, C�NTR.Hl£f- J5.I6t.N, FoK 230lJ'lDEO","doi":"10.1109/itec-ap.2014.6940982","DOIUrl":"https://doi.org/10.1109/itec-ap.2014.6940982","url":null,"abstract":"To ensure uniformity of treatment among all contributors, other forms may not be substituted for this form, nor may any wording of the form be changed. This form is intended for original material submitted to the IEEE and must accompany any such material in order to be published by the IEEE. Please read the form carefully and keep a copy for your files.","PeriodicalId":305584,"journal":{"name":"2015 International Conference on Electrical, Electronics, Signals, Communication and Optimization (EESCO)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123797798","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IEEE copyright and consent form IEEE版权和同意表格
H. Xiao, Xiaotao Han
{"title":"IEEE copyright and consent form","authors":"H. Xiao, Xiaotao Han","doi":"10.1109/iot.2012.6402283","DOIUrl":"https://doi.org/10.1109/iot.2012.6402283","url":null,"abstract":"COPYRIGHT TRANSFER The undersigned hereby assigns to The Institute of Electrical and Electronics Engineers, Incorporated (the \"IEEE\") all rights under copyright that may exist in and to: (a) the Work, including any revised or expanded derivative works submitted to the IEEE by the undersigned based on the Work; and (b) any associated written or multimedia components or other enhancements accompanying the Work.","PeriodicalId":305584,"journal":{"name":"2015 International Conference on Electrical, Electronics, Signals, Communication and Optimization (EESCO)","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129159167","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Measurement of length and width of betel leaf by image processing using MATLAB 利用MATLAB进行图像处理,测量槟榔叶的长度和宽度
Dolly Nayak, A. K. Dey, Manisha Sharma
{"title":"Measurement of length and width of betel leaf by image processing using MATLAB","authors":"Dolly Nayak, A. K. Dey, Manisha Sharma","doi":"10.1109/EESCO.2015.7253754","DOIUrl":"https://doi.org/10.1109/EESCO.2015.7253754","url":null,"abstract":"In this paper a simple and effective method for measuring the length and width of betel leaf is propose. A digital scanner is used to take the betel leaf images as samples, therefore the effect of calibration in terms of size and angle of the acquired image sample is negligible. Hundred betel leave of different size were used to validate the estimated parameter by image processing technique against the value measured by manual method. The software developed for the measurement of leaf length and width is based on Pixel counting in MATLAB using image processing techniques. We have observed that this is effective method for Betel leaf dimension measurement. This method is not only simple, inexpensive but also provides high degree of precision.","PeriodicalId":305584,"journal":{"name":"2015 International Conference on Electrical, Electronics, Signals, Communication and Optimization (EESCO)","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126288520","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Geometry preserving image retrieval using normalized scale coding 几何保持图像检索的归一化尺度编码
S. Vyshali, M. Subramanyam, K.Soundara Raajan
{"title":"Geometry preserving image retrieval using normalized scale coding","authors":"S. Vyshali, M. Subramanyam, K.Soundara Raajan","doi":"10.1109/EESCO.2015.7253843","DOIUrl":"https://doi.org/10.1109/EESCO.2015.7253843","url":null,"abstract":"In the area of image retrieval, shape based coding is a simpler and effective approach of image representation. Among various approaches of image representation for shape defining, curvature based coding is an advanced and quite effective way of image coding. In the approach of image representation using curvature coding, the shape is defined by closed contour. Wherein contours are shape representing approach, they may be very large in representation and hence result in resource overhead. To minimize the resource overhead in image retrieval system, a normalized scale contour coding is proposed. This approach preserves the shape description, with reducing number of feature vectors.","PeriodicalId":305584,"journal":{"name":"2015 International Conference on Electrical, Electronics, Signals, Communication and Optimization (EESCO)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133010852","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Performance of fixed and variable step methods in determining unknown source position using TDOA techniques 用TDOA技术确定未知源位置的固定步长和变步长方法的性能
D. E. Chaitanya, G. S. Rao, Ganesh Laveti, K. J. Rani
{"title":"Performance of fixed and variable step methods in determining unknown source position using TDOA techniques","authors":"D. E. Chaitanya, G. S. Rao, Ganesh Laveti, K. J. Rani","doi":"10.1109/EESCO.2015.7253778","DOIUrl":"https://doi.org/10.1109/EESCO.2015.7253778","url":null,"abstract":"Determination of real time position information is one of the primary concerns of modern Electronic Warfare systems. The time difference of arrival (TDOA) techniques used for location determination make use of the method of hyperbolic multilateration. The techniques which are analyzed in this paper vary in the step length that they use. Two iterative methods are considered for the purpose of study. While one is a fixed step method, the other makes use of variable step length. This paper discusses the performance of both the techniques on the basis of their computation time which is reflected in the number of iterations needed for simulation. An error analysis is also carried out for various combinations of errors in TDOA values.","PeriodicalId":305584,"journal":{"name":"2015 International Conference on Electrical, Electronics, Signals, Communication and Optimization (EESCO)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116299555","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Real time video processing and object detection on android smartphone android智能手机上的实时视频处理和目标检测
S. Chaudhari, S. Patil
{"title":"Real time video processing and object detection on android smartphone","authors":"S. Chaudhari, S. Patil","doi":"10.1109/EESCO.2015.7254003","DOIUrl":"https://doi.org/10.1109/EESCO.2015.7254003","url":null,"abstract":"As Smartphone is getting more potent, can do more superior stuffs that previous required a computer. For employing the high processing power of Smartphone is mobile computer vision, the ability for a device to capture; process; analyze; understanding of images. For mobile computer vision, Smartphone must be faster and real time. In this study two applications have been developed on Android platform using OpenCV and core library called as CamTest with own implemented algorithms. Efficiency of two Android applications have been compared and found that OpenCV performs faster than CamTest. The results of examining the best object detection algorithm with reverence to efficiency shows that FAST algorithm has the finest blend of speed and object detection performance. Next projected object recognition system using FAST algorithm, which uses SVM, BPNN for training and validation of object in real time. The application detects the object perfectly with recognition time around 2 ms using SVM and 1 ms using BPNN.","PeriodicalId":305584,"journal":{"name":"2015 International Conference on Electrical, Electronics, Signals, Communication and Optimization (EESCO)","volume":"119 10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130131906","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Mathematical modelling and simulation of steam power plant 蒸汽电厂数学建模与仿真
V. Patel, V. Patel, K. Chatterjee
{"title":"Mathematical modelling and simulation of steam power plant","authors":"V. Patel, V. Patel, K. Chatterjee","doi":"10.1109/EESCO.2015.7253648","DOIUrl":"https://doi.org/10.1109/EESCO.2015.7253648","url":null,"abstract":"This paper present the simulation modeling of 500MW of coal fired power plant of that use as a thermal power generation for increasing the electrical output of a coal-fired power plant. Initially, a detailed model of a coal-fired power plant is designed to calculate energy and efficiency of its components. This model predicts useful heat input and thermal losses that occur in the power plant. Thermodynamic models are based on the first law of thermodynamics using balance equations for each component in the power plant making certain assumptions performance is evaluated in design conditions; each component is modelled as a single control volume at steady-state conditions; pressure drops on the lines are not considered; gland steam is neglected; negligible changes in fluid state between the outlet of one component and the inlet of the next are assumed; kinetic and potential energy are neglected.","PeriodicalId":305584,"journal":{"name":"2015 International Conference on Electrical, Electronics, Signals, Communication and Optimization (EESCO)","volume":"606 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116074111","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 56
Sub-optimal joint equalization and decoding approach for SC-FDE SC-FDE的次优联合均衡与解码方法
O. Ravinder, M. Raju, M. Ramakrishna, G. Ramesh
{"title":"Sub-optimal joint equalization and decoding approach for SC-FDE","authors":"O. Ravinder, M. Raju, M. Ramakrishna, G. Ramesh","doi":"10.1109/EESCO.2015.7253727","DOIUrl":"https://doi.org/10.1109/EESCO.2015.7253727","url":null,"abstract":"Single Carrier Frequency Domain Equalization (SC-FDE) is suitable for high data rate transmission over severely time dispersive channels due to the frequency domain implementation of the receiver. In this paper we are propose to use jointly a low complexity Turbo equalizer and Turbo decoder in SC-FDE, Turbo equalizer consist of feed forward filter and feedback filters are in frequency domain (FD). And the decoder is Soft input Soft output (SISO) Max-Log-MAP (Maximum a posteriori probability) decoder. For the equalizer and decoder, the sub-optimal values of filter co-efficients and parameters are designed respectively to maximize SINR, finally the performance gain is improved. The filter co-efficients are derived on Matched filter (MF) criteria. In the simulation results we will show that the Soft decisions are powerful than the Hard decisions. All the decoder Algorithms are compared in terms of BER and showing that the performance gain of Max-Log-MAP decoder is superior than all decoders with slight complexity but there is a tradeoff between performance and complexity. For equalizer, as the number of iterations are increases the performance is improved, we will show the performance for the iterations of maximum 8 for the code length of N=1024.","PeriodicalId":305584,"journal":{"name":"2015 International Conference on Electrical, Electronics, Signals, Communication and Optimization (EESCO)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133712541","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A feasibility analysis of decentralized solar power using RETScreen in Odisha 奥里萨邦RETScreen分散式太阳能发电可行性分析
Sambeet Mishra, P. Tripathy, S. M. Ali
{"title":"A feasibility analysis of decentralized solar power using RETScreen in Odisha","authors":"Sambeet Mishra, P. Tripathy, S. M. Ali","doi":"10.1109/EESCO.2015.7253739","DOIUrl":"https://doi.org/10.1109/EESCO.2015.7253739","url":null,"abstract":"Since from the dawn of mankind, necessity gives birth to technology. PV is the most promising source of renewable energy in India. The need of PV technologies in the present day is unavoidably necessary, as these help the consumers to maintain sustainability, by providing innovative PV technology options and more subsidies by the government. This will help the future generations enjoy their right to clean environment and can consume energy as per their needs. Although the Renewable energy sources are accompanied with certain constraints as unreliability, unavailability and discontinuous generation; great deals of research works are being carried out on solar energy to produce electricity, which can suffice the disadvantages mentioned above. Solar PV technologies hold quite remarkable commitment for Bhubaneswar, India which has a high insolation of 4.5–5 kWh/m2/day as per the data collected from Ministry of New and Renewable Energy, Government of India, for about 300 sunny days per year in India. Solar PV technologies are commercially feasible and produce technologically mature products which have existed in the country for many years. But still, the market share of solar energy fails to fulfil the expectations of the people [1]. Hence, keeping in mind the way a consumer thinks while buying a product, it can be said that if the solar products were a little less expensive along with the uninterrupted maintenance services offered by the companies, the willingness of people to go for the solar products would have been more [2]. Nevertheless, in rural areas, light is usually unavailable and if it does, the prime focus is given to incandescent light used for household lighting instead of fluorescent. System reliability, economy and environmental issues are major three issues for decentralised electrification. So, the need of the hour is to overcome these constraints by the implementation of RETScreen software. This software provides [2] the user with a broad range of options for assessing the technical, financial and environmental suitability for an investment in a 'clean energy' project. It integrates a number of databases to assist the site assessor, including a global database of climatic conditions obtained from 4,700 groundbased stations and NASA's satellite data [3].","PeriodicalId":305584,"journal":{"name":"2015 International Conference on Electrical, Electronics, Signals, Communication and Optimization (EESCO)","volume":"293 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115214903","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Scanning tool for the detection of images embedded with malicious programs 扫描工具,用于检测嵌入恶意程序的图像
Robert T. R. Shoniwa, Geogen George
{"title":"Scanning tool for the detection of images embedded with malicious programs","authors":"Robert T. R. Shoniwa, Geogen George","doi":"10.1109/EESCO.2015.7253960","DOIUrl":"https://doi.org/10.1109/EESCO.2015.7253960","url":null,"abstract":"Nowadays, malware is being deployed onto victim systems in an increasingly diverse number of ways. One of these methods involves the passive propagation of malware by embedding in JPEG images which goes on to highlight that even simple images can be manipulated maliciously by criminals. The aim of this paper is comprised of two main aspects. The first involves the development of an embedding module which exploits this vulnerability as a proof-of-concept. Its primary purpose will be the pipelining of a Remote Access Trojan into an image file through steganography and obfuscation of the payload. The second aspect will involve developing a corresponding steganalysis tool to scan, detect and notify the user of the presence of a malicious program in either one or a set of selected images. It will also give a brief summarized analysis of the detected payload. Ultimately, this will act as a proof-of-concept highlighting the need to consider images as a potential attack vector and then also offer a corresponding solution to this problem.","PeriodicalId":305584,"journal":{"name":"2015 International Conference on Electrical, Electronics, Signals, Communication and Optimization (EESCO)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115566578","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信