2015 Fifth International Conference on Advances in Computing and Communications (ICACC)最新文献

筛选
英文 中文
Design and Performance Analysis of a High Speed MAC Using Different Multipliers 采用不同乘法器的高速MAC设计与性能分析
Priyanka Mavuri, B. Velan
{"title":"Design and Performance Analysis of a High Speed MAC Using Different Multipliers","authors":"Priyanka Mavuri, B. Velan","doi":"10.1109/ICACC.2015.95","DOIUrl":"https://doi.org/10.1109/ICACC.2015.95","url":null,"abstract":"The multiply and Accumulate unit consists of a multiplier unit for multiplication and the product of multiplier is added up with previous result by using an adder. The result of a MAC unit is stored in an Accumulator. MAC is one of the part of digital processing systems. By reducing the delay of multiplier and adder, the overall delay of MAC unit can be reduced. In this paper the MAC unit is designed using different multipliers and adders. The comparative study of different multipliers and adders has been shown. The multipliers used were Vedic multiplier (based on Urdhava Tiryagbhyam sutra) and Wallace tree multiplier. The adders used were Kogge stone adder and Carry look ahead adder. The efficiency of MAC is observed through reduced delay and lesser hardware complexity. The synthesis and simulation was done by Xilinx software and ISim simulator.","PeriodicalId":368544,"journal":{"name":"2015 Fifth International Conference on Advances in Computing and Communications (ICACC)","volume":"496 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133970774","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Linear Antenna Array Synthesis to Reduce the Interference in the Side Lobe Using Continuous Genetic Algorithm 利用连续遗传算法合成线性天线阵列以减少旁瓣干扰
S. Banerjee, V. Dwivedi
{"title":"Linear Antenna Array Synthesis to Reduce the Interference in the Side Lobe Using Continuous Genetic Algorithm","authors":"S. Banerjee, V. Dwivedi","doi":"10.1109/ICACC.2015.23","DOIUrl":"https://doi.org/10.1109/ICACC.2015.23","url":null,"abstract":"Sidelobes in the radiation pattern causes degradation of actual signal and hence antenna power efficiency. This paper discusses the problem of interference suppression by reducing the side lobe. Synthesis of linear antenna array using Continuous Genetic Algorithm is done to search for the optimum amplitude weights to minimize the maximum side lobe level. It has been demonstrated that side lobe level is reduced effectively by this technique. The simulated results shows an improved directivity, reduction in the first side lobe and fast convergence. This shows the effectiveness of this technique.","PeriodicalId":368544,"journal":{"name":"2015 Fifth International Conference on Advances in Computing and Communications (ICACC)","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124322305","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Ring Partition and DWT Based Perceptual Image Hashing with Application to Indexing and Retrieval of Near-Identical Images 基于环分割和DWT的感知图像哈希及其在近同图像索引和检索中的应用
Govindaraj P, Sandeep R
{"title":"Ring Partition and DWT Based Perceptual Image Hashing with Application to Indexing and Retrieval of Near-Identical Images","authors":"Govindaraj P, Sandeep R","doi":"10.1109/ICACC.2015.90","DOIUrl":"https://doi.org/10.1109/ICACC.2015.90","url":null,"abstract":"The perceptual image hashing function maps an input image to a fixed size short binary string called the perceptual hash. The perceptual image hashing has been used for image authentication, image tamper detection and digital watermarking applications. In this paper, the perceptual hash value is generated using ring partition and Discrete Wavelet Transform (DWT). An rotation-invariant secondary image is constructed using ring-partition technique. Then, the DWT is applied on the secondary image using the various mother wavelets, to generate a final hash value. The perceptual hash was used to index and retrieve near-identical images from the database. The precision-recall curves are used to evaluate the performance of the application. The experiments shows that the proposed hashing algorithm is robust against content-preserving operations like image rotation, image scaling, Gaussian low-pass filtering, JPEG compression, brightness adjustment, and gamma correction.","PeriodicalId":368544,"journal":{"name":"2015 Fifth International Conference on Advances in Computing and Communications (ICACC)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125182686","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Interactive Gesture Based Cataract Surgery Simulation 基于交互式手势的白内障手术模拟
Akshay Jayakumar, Beenamol Mathew, N. Uma, Prema Nedungadi
{"title":"Interactive Gesture Based Cataract Surgery Simulation","authors":"Akshay Jayakumar, Beenamol Mathew, N. Uma, Prema Nedungadi","doi":"10.1109/ICACC.2015.20","DOIUrl":"https://doi.org/10.1109/ICACC.2015.20","url":null,"abstract":"India's medical education domain is one of the largest in the world. Medical Simulation aims to provide a medically accurate simulation that benefits the medical students to learn and understand any medical cases. Medical Simulations facilitates students with interactive learning and real-time feedback which does not risk the patient's life. Simulations can be performed any number of time until they have build their knowledge base and confidence in the given medical case. We propose a medically realistic cataract surgery simulation developed with a game engine. The users will be able to interact and use the on screen elements using hand gestures. A Motion recognition device captures every hand movement of the users and the simulation responds accordingly to provide feedback in real-time. Every movement is accurately tracked in the simulation and has a significant outcome on the subject based on the type of simulation. The simulated medical procedures for cataract surgery include using Surgical Tools, Surgical Procedures, Artificial Lens Implantation etc. Medical Simulation is being designed to provide an easy to use learning environment to replicate the clinical scenarios and allow features such as interactively practicing and providing feedbacks for medical skills development.","PeriodicalId":368544,"journal":{"name":"2015 Fifth International Conference on Advances in Computing and Communications (ICACC)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116789223","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Modified Iterative Reconstruction Algorithm for Spiral MRI 螺旋MRI改进迭代重建算法
Anju George, Ajay Kumar
{"title":"Modified Iterative Reconstruction Algorithm for Spiral MRI","authors":"Anju George, Ajay Kumar","doi":"10.1109/ICACC.2015.83","DOIUrl":"https://doi.org/10.1109/ICACC.2015.83","url":null,"abstract":"The MRI imaging is an efficient tool for disease diagnosis, and the features of the taken image has much importance. The reconstruction of such images needs much attention. The main limitation of MRI imaging is its long scan time. The time taken for acquisition can be reduced by non Cartesian acquisition. Spiral MRI is a non Cartesian MRI imaging and is less affected by motion and flow artifacts. Still, reconstruction of images from non-Cartesian MRI data will suffer from reconstruction errors and in-homogeneity artifacts. This will adversely affect the disease diagnosis. Algorithms like conjugate phase method, Field map calculating Methods, iterative Next Neighbor re-gridding algorithms etc were proposed for solving such issues. Among these, iterative Next Neighbor re-gridding algorithm proved efficient. The main focus of this paper is on efficient reconstruction of spiral MRI image with an improved Iterative next neighbor algorithm which will result in comparatively better picture quality.","PeriodicalId":368544,"journal":{"name":"2015 Fifth International Conference on Advances in Computing and Communications (ICACC)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116226022","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Compact Band Notched UWB Filter for Wireless Communication Applications 用于无线通信应用的紧凑型带陷波超宽带滤波器
C. J. Bindu, B. Paul, S. Mridula, P. Mohanan
{"title":"Compact Band Notched UWB Filter for Wireless Communication Applications","authors":"C. J. Bindu, B. Paul, S. Mridula, P. Mohanan","doi":"10.1109/ICACC.2015.91","DOIUrl":"https://doi.org/10.1109/ICACC.2015.91","url":null,"abstract":"The paper presents an ultra wide band filter using asymmetrical interdigital coupled line with a transmission notch at the WLAN band. The lower side transmission zero can be conveniently tuned by stepped impedance resonators of proper dimensions. The frequency notch for WLAN band is introduced by two half wavelength open ring resonators etched on the ground plane. The attenuation in lower and upper stopbands is controlled by the use of series capacitors and Defected Ground Structures respectively. The insertion loss in the passband is improved by circular apertures in the ground plane. Measured frequency response of the fabricated filter shows good agreement with simulated results.","PeriodicalId":368544,"journal":{"name":"2015 Fifth International Conference on Advances in Computing and Communications (ICACC)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115165013","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
CPW Fed Wideband Printed Antenna for Wireless Communications 用于无线通信的CPW馈电宽带印刷天线
M. S. Nishamol, V. Sarin, S. M. Nair, M. P. Jayakrishnan, P. Mohanan, K. Vasudevan
{"title":"CPW Fed Wideband Printed Antenna for Wireless Communications","authors":"M. S. Nishamol, V. Sarin, S. M. Nair, M. P. Jayakrishnan, P. Mohanan, K. Vasudevan","doi":"10.1109/ICACC.2015.9","DOIUrl":"https://doi.org/10.1109/ICACC.2015.9","url":null,"abstract":"A simple radiating structure for achieving omni-directional radiation pattern from a monopole antenna fed by a CPW feed is presented. The proposed antenna has a 2:1 VSWR bandwidth of 76% from 2.7GHz to 5.7GHz. Hence it is suitable for WLAN 5.2(5.15-5.35GHz) band, WiMAX 2.5/3.5(2.5-2.69GHz, 3.4-3.69GHz) bands, HiperLAN2 (5.47-5.725 GHz) and HiSWaNa (5.15-5.25GHz) wireless application bands. The simulated and measured reflection characteristics of the antenna along with the radiation patterns and gain are presented and discussed.","PeriodicalId":368544,"journal":{"name":"2015 Fifth International Conference on Advances in Computing and Communications (ICACC)","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124764152","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Steganographic Technique Using Secure Adaptive Pixel Pair Matching for Embedding Multiple Data Types in Images 基于安全自适应像素对匹配的图像多数据类型嵌入隐写技术
T. Edwina Alias, Dominic Mathew, Abraham Thomas
{"title":"Steganographic Technique Using Secure Adaptive Pixel Pair Matching for Embedding Multiple Data Types in Images","authors":"T. Edwina Alias, Dominic Mathew, Abraham Thomas","doi":"10.1109/ICACC.2015.60","DOIUrl":"https://doi.org/10.1109/ICACC.2015.60","url":null,"abstract":"Steganography is one of the newly emerging area of development in the field of signal processing. It is the technique of hiding the fact that communication is even taking place, by hiding information in any other information. In this paper, a secure data-hiding method is proposed for hiding multiple datatypes such as text, image and audio within images by Secure Adaptive Pixel Pair Matching(SAPPM) which can be effectively used for colour images as well as gray scale images. The secret message is encrypted using a pseudo random sequence, which is generated according to the secret key given by the user. The encrypted secret message is hidden in cover image using SAPPM algorithm. Compared with previous methods like Least Significant Bit(LSB) substituition, simple Diamond Encoding(DE) and APPM, the proposed method provides a much more stronger algorithm which incorporates cryptography along with steganography, and always have a lower distortion.","PeriodicalId":368544,"journal":{"name":"2015 Fifth International Conference on Advances in Computing and Communications (ICACC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131380549","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Novel Approach for Car License Plate Detection Based on Vertical Edges 一种基于垂直边缘的车牌检测新方法
Ashwathy Dev
{"title":"A Novel Approach for Car License Plate Detection Based on Vertical Edges","authors":"Ashwathy Dev","doi":"10.1109/ICACC.2015.62","DOIUrl":"https://doi.org/10.1109/ICACC.2015.62","url":null,"abstract":"License plate can be used for identifying vehicle since it is unique for each vehicle. In this paper proposes a fast technique for identifying the vehicle licenseplate. Here first the input image is binarized by adaptive thresholding and then image is enhanced by unwanted-line elimination algorithm (ULEA). Then on applying VEDA vertical edges of the image is detected. Then number of possible candidate license plate region is extracted out of which original LP is detected.","PeriodicalId":368544,"journal":{"name":"2015 Fifth International Conference on Advances in Computing and Communications (ICACC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130233030","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Computing Privacy Risk and Trustworthiness of Users in SNSs sns中用户隐私风险与可信度的计算
Akansha Pandey, A. C. Irfan, K. Kumar, S. Venkatesan
{"title":"Computing Privacy Risk and Trustworthiness of Users in SNSs","authors":"Akansha Pandey, A. C. Irfan, K. Kumar, S. Venkatesan","doi":"10.1109/ICACC.2015.50","DOIUrl":"https://doi.org/10.1109/ICACC.2015.50","url":null,"abstract":"The immense growth of Social Networking Sites (SNSs) has provided fast interactions with strangers, friends and people known in person. This has increase the religious, political and social possibilities for maintaining virtually every type of significant bonds or groups. The personal information used while interacting on social networking sites is an asset for every user profile that may be traded intentionally by a third party for its benefits. Privacy of users is completely based on their awareness of how much of their personal information could be shared without risk. Moreover, users do not give much importance to the privacy risk arising by their information sharing activities. With the rise in different online crimes and malicious behaviors, it is necessary to evaluate the reliability of a profile user. The objective of this paper is to present a method for computing the trust value and privacy risk of users in online social networking sites by integrating basic trust parameters like personal information, recommendations, followings, and customized privacy settings. This will help other users in social network to check whether a person is trustworthy, before accepting him/her in their network. We used real-world data collected from Facebook for calculating and demonstrating the proposed trust model.","PeriodicalId":368544,"journal":{"name":"2015 Fifth International Conference on Advances in Computing and Communications (ICACC)","volume":"60 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130371976","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信