S. Acharjee, N. Dey, D. Biswas, P. Maji, S. S. Chaudhuri
{"title":"An efficient motion estimation algorithm using division mechanism of low and high motion zone","authors":"S. Acharjee, N. Dey, D. Biswas, P. Maji, S. S. Chaudhuri","doi":"10.1109/IMAC4S.2013.6526402","DOIUrl":"https://doi.org/10.1109/IMAC4S.2013.6526402","url":null,"abstract":"Motion Estimation involves the most computation as compared to other processes in the entire video compression process. The challenge is to reduce the computation cost and computation time to calculate motion vector compared to Full Search algorithm for motion vector estimation. In this paper, it is proposed to implement an algorithm which will find finer estimation of motion for higher motion zone and take less time in computing motion vector for less movement zone.","PeriodicalId":403064,"journal":{"name":"2013 International Mutli-Conference on Automation, Computing, Communication, Control and Compressed Sensing (iMac4s)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121955608","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Sandeep S. Udmale, V. Sambhe, R. Tajanpure, Archana Wasule
{"title":"BHP saving mechanisms — An approach to improve performance of Optical Burst Switched network","authors":"Sandeep S. Udmale, V. Sambhe, R. Tajanpure, Archana Wasule","doi":"10.1109/IMAC4S.2013.6526486","DOIUrl":"https://doi.org/10.1109/IMAC4S.2013.6526486","url":null,"abstract":"To cope up with high speed demands of internet traffic, Optical Networks seems to be optimistic solution for Next Generation High Speed Network. An Optical Burst Switching (OBS) technology of Wavelength Division Multiplexing (WDM) has proved itself to satisfy current demands of the internet traffic. In OBS network, key concern is to reduce burst dropping probability and it is depend on different factors like burst size, offset time and scheduling algorithms used to schedule the bursts. It is observed that the burst dropping probability is directly proportional to number of Burst Header Packets (BHPs) dropped in an OBS network. This paper introduced the increase in control channel approach to control BHP dropping probability with the help of extensive simulation on NS2. Simulation result shows that the dropping probability decreases with increase in number of control channel.","PeriodicalId":403064,"journal":{"name":"2013 International Mutli-Conference on Automation, Computing, Communication, Control and Compressed Sensing (iMac4s)","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116968134","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Designing and comparative study of parameters affecting Helix performance at 1420MHz","authors":"T. Sharma, H. Vasu","doi":"10.1109/IMAC4S.2013.6526430","DOIUrl":"https://doi.org/10.1109/IMAC4S.2013.6526430","url":null,"abstract":"The paper addresses a study of various parameters which effects the performance of a Helix antenna. A conducting wire in form of screw threads forms a Helix. Helix antenna is used in the field of space sciences due to its high directivity and gain. This paper optimizes the performance of a monofliar Helix antenna which is used as a feed at a frequency of 1420 MHz. The frequency of operation is 1420MHz with a wavelength of 0.211 meters. Theoretical simulations of helix are carried out using Numerical Electromagnetic Code, Version 2 software which is numeric code based on method of moments. Helix antenna is fabricated and optimized to a beam width of 80° so that it can fit into aerospace antenna communication systems. Radiation properties, including far-field patterns, gain, axial ratio, VSWR, return loss are computed for frequency of 1420 MHz. All theoretical studies of helix antenna are carried out using NEC-2 (Numerical Electromagnetic Code, Version 2.0) software, which is a numerical code based on the method of moments. The measurements conducted in paper were limited to far-field patterns only. A comparative study of variation in performance of Helix with respect to varying parameters is also carried out using simulation process and by comparing various results appropriate parameters are selected and thereby fabricated. The helix with low fabrication cost makes this antenna very attractive to mobile and satellite communications and aerospace applications.","PeriodicalId":403064,"journal":{"name":"2013 International Mutli-Conference on Automation, Computing, Communication, Control and Compressed Sensing (iMac4s)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126799107","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Singularity detection in fingerprint image using orientation consistency","authors":"G. C. Zacharias, P. Lal","doi":"10.1109/IMAC4S.2013.6526398","DOIUrl":"https://doi.org/10.1109/IMAC4S.2013.6526398","url":null,"abstract":"In spite of the fact that a fingerprint image may suffer from problems like noises and distortions, estimating core and delta points (singular points) is crucial for most of the automatic fingerprint identification system (AFIS). Singular points have wide range of uses in AFIS which include fingerprint alignment and classification. This paper presents a simple method to locate singular points from fingerprint images using orientation consistency measure. Since consistency of the orientation field is minimum in singular regions, this method will find the local minimum to accurately detect the singular points. Core and delta points are distinguished by using the orientation field change. Experimental results show that our proposed algorithm can detect singular points effectively.","PeriodicalId":403064,"journal":{"name":"2013 International Mutli-Conference on Automation, Computing, Communication, Control and Compressed Sensing (iMac4s)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117257128","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Impact of GOP size on individual and combined scalability in H.264/SVC","authors":"N. Shah, U. Dalal","doi":"10.1109/IMAC4S.2013.6526484","DOIUrl":"https://doi.org/10.1109/IMAC4S.2013.6526484","url":null,"abstract":"H.264/SVC (Scalable Video Coding) enables the transmission and decoding of partial bit streams to provide video services with lower temporal or spatial resolutions or reduced fidelity while retaining a reconstruction quality that is high relative to the rate of the partial bit streams. Hence, in comparison to H.264/AVC (Advanced Video Coding) SVC provides functionalities such as graceful degradation in lossy transmission environments as well as bit rate, format, and power adaptation. These functionalities provide enhancements to transmission and storage applications and demands appropriate encoding parameters. SVC has achieved significant improvements in coding efficiency with an increased degree of supported scalability relative to the scalable profiles of prior video coding standards. This paper provides an analysis of scalability based on GOP (Group of Picture) in scalable format to achieve reasonably better coding efficiency with best quality.","PeriodicalId":403064,"journal":{"name":"2013 International Mutli-Conference on Automation, Computing, Communication, Control and Compressed Sensing (iMac4s)","volume":"140 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133070888","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Optimization of incremental optical encoder pulse processing","authors":"N. Johnson, K. J. Mohan, K. E. Janson, J. José","doi":"10.1109/IMAC4S.2013.6526510","DOIUrl":"https://doi.org/10.1109/IMAC4S.2013.6526510","url":null,"abstract":"Incremental optical encoder is one of the commonly used transducer, used for angular velocity and position estimation. Unfortunately both period and frequency counting methods that are frequently employed for angular velocity estimation, using incremental optical encoder signals are affected by the quantization errors. This paper proposes a Simulink based method, to estimate the angular velocity of a moving system with minimized quantization error inherent in the conventional period counting technique. This is done through frequency division of encoder pulses. The algorithm model is integrated with the Simulink model of incremental encoder for performance evaluation. Accuracy and Percentage error for different ranges of angular velocity is studied, for both conventional period counting and proposed method.","PeriodicalId":403064,"journal":{"name":"2013 International Mutli-Conference on Automation, Computing, Communication, Control and Compressed Sensing (iMac4s)","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133536454","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A rough set approach to identify content and navigational pages at a website","authors":"Justin Jose, P. Lal","doi":"10.1109/IMAC4S.2013.6526377","DOIUrl":"https://doi.org/10.1109/IMAC4S.2013.6526377","url":null,"abstract":"Web Usage Mining also known as Web Log Mining provides immense information about user traffic and behavior at a web site. In a web site, the users may spend different time for viewing different pages. The aim of this paper is to identify the content and navigational pages in a web site based on rough set approach to identify potential pages. Identifying content pages is useful in target advertising which may bring increased revenue to the advertisers. The reference length on each page also leads to the discovery of most preferred content by a user. We also intend to see whether the content pages varies with time.","PeriodicalId":403064,"journal":{"name":"2013 International Mutli-Conference on Automation, Computing, Communication, Control and Compressed Sensing (iMac4s)","volume":"88 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134100274","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Boolean Algebra based effective and efficient asymmetric key cryptography algorithm: BAC algorithm","authors":"N. Kumar, Pankaj Gupta, M. Sahu, M. A. Rizvi","doi":"10.1109/IMAC4S.2013.6526417","DOIUrl":"https://doi.org/10.1109/IMAC4S.2013.6526417","url":null,"abstract":"The Internet was born of academic efforts to share information; it never strove for high security measures. It plays important role in becoming people online, this mode is easy and effective but dangerous too in terms of data hacking and cracking by unauthorized persons. It is needed that while using Internet data must be secured and personal. Encryption can be used to protect data in transit, for example data being transferred via network (e.g. the Internet, e-commerce), mobile telephones, wireless microphones, wireless intercom systems, Bluetooth devices and bank automatic teller machines. Encrypting data in transit also helps to secure it as it is often difficult to physically secure all access to networks. Encryption, by itself, can protect the confidentiality of messages, but other techniques are still needed to protect the integrity and authenticity of a message; for example, verification of a message authentication codes (MAC) or a digital signature. Standards and cryptographic software and hardware to perform encryption are widely available, but successfully using encryption to ensure security may be a challenging problem. A single slip-up in system design or execution can allow successful attacks. Sometimes an adversary can obtain unencrypted information without directly undoing the encryption. In this paper an attempt is made to develop new encryption and decryption algorithm and implemented in Java, it gives very encouraging results in small as well as in large data files.","PeriodicalId":403064,"journal":{"name":"2013 International Mutli-Conference on Automation, Computing, Communication, Control and Compressed Sensing (iMac4s)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129951795","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
V. Bhateja, S. Urooj, A. Pandey, A. Lay-Ekuakille, M. Misra
{"title":"Improvement of masses detection in digital mammograms employing non-linear filtering","authors":"V. Bhateja, S. Urooj, A. Pandey, A. Lay-Ekuakille, M. Misra","doi":"10.1109/IMAC4S.2013.6526445","DOIUrl":"https://doi.org/10.1109/IMAC4S.2013.6526445","url":null,"abstract":"Computer aided detection of mammographic masses can be improved to a greater extent employing non-linear filters for image enhancement. The present work proposes a truncated Volterra filter combination to provide contrast enhancement as well as texture based processing of masses in digital mammograms. Noteworthy improvement in visualization of masses has been observed in the simulation results carried out on cases from DDSM database. The improved performance of the proposed filtering approach is well supported with calculated values of objective evaluation parameters.","PeriodicalId":403064,"journal":{"name":"2013 International Mutli-Conference on Automation, Computing, Communication, Control and Compressed Sensing (iMac4s)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126619314","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Progressive visual cryptography with watermarking for meaningful shares","authors":"P. V. Jithi, A. T. Nair","doi":"10.1109/IMAC4S.2013.6526443","DOIUrl":"https://doi.org/10.1109/IMAC4S.2013.6526443","url":null,"abstract":"Progressive Visual Cryptography (PVC) is a special encryption technique which can be utilized to recover the secret image gradually by superimposing more and more shares. If we only have a few pieces of shares, we could get an outline of the secret image; by increasing the number of the shares being stacked, the details of the hidden information can be revealed progressively. PVC using unexpanded shares regenerates images of high quality. But this method is insecure as the shares generated are noise like images and have more interest of hackers as they treat them as critical information in the transmission. If the random looking shares are enveloped into some meaningful images the interest of hackers can be reduced. In the proposed method, a digital watermarking technique is used to generate meaningful shares. The secret image shares are watermarked with different cover images and are transmitted. At the receiving side the cover images are extracted from the shares and stacked one by one which reveals the secret image progressively. This scheme provides a more efficient way to hide images in different meaningful shares providing high security and recovered image with high contrast.","PeriodicalId":403064,"journal":{"name":"2013 International Mutli-Conference on Automation, Computing, Communication, Control and Compressed Sensing (iMac4s)","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124873514","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}