2018 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET)最新文献

筛选
英文 中文
Performance Analysis for Mixed Line Rates (MLR) WDM/DWDM Networks Under Various Modulation Techniques 混合线速率(MLR) WDM/DWDM网络在不同调制技术下的性能分析
V. Kumar, Shakrajit Sahu, S. Das
{"title":"Performance Analysis for Mixed Line Rates (MLR) WDM/DWDM Networks Under Various Modulation Techniques","authors":"V. Kumar, Shakrajit Sahu, S. Das","doi":"10.1109/WISPNET.2018.8538684","DOIUrl":"https://doi.org/10.1109/WISPNET.2018.8538684","url":null,"abstract":"In recent years, a rapid growth of new technologies requires communication systems to support higher bit rate and longer distance. The Optical network is one of the best optimal solutions which can satisfy the demand for high data rate. The performance of current optical networks depends on the traffic demands. To minimize the traffic mixed line rate (MLR) optical network is implemented. In a transparent MLR optical network, data transmission is done over different wavelength at different line rates within the same fiber. MLR optical networks with data rate 10/40/100 Gb/s over different wavelength channels is a new networking paradigm. This paper considers various modulation techniques in order to achieve better bit error rates (BER). It also shows that modulation technique has a great role in improving the data rates and quality of transmission.","PeriodicalId":6858,"journal":{"name":"2018 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET)","volume":"20 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2018-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81423220","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Automatic Segmentation of Polyps in Endoscopic Image Using Level-Set Formulation 基于水平集的内镜图像息肉自动分割
Soumayan Dutta, Pradipta Sasmal, M. Bhuyan, Y. Iwahori
{"title":"Automatic Segmentation of Polyps in Endoscopic Image Using Level-Set Formulation","authors":"Soumayan Dutta, Pradipta Sasmal, M. Bhuyan, Y. Iwahori","doi":"10.1109/WISPNET.2018.8538615","DOIUrl":"https://doi.org/10.1109/WISPNET.2018.8538615","url":null,"abstract":"Automatic segmentation of colorectal polyps from endoscopic images forms an interesting challenge in computer vision. The method proposed in this paper intends to segment colorectal polyp (abnormal) regions from normal regions from a given endoscopic image. Due to lack of any regular texture patterns in this kind of images and apparent visual similarity in background and foreground pixels, conventional texture feature extraction and classification methods do not always yield good results. Hence, active contour based method has been explored to automatically segment out probable abnormal region(s). Our aim is to automatically detect the probable polyp region(s) and then verify the results with respect to the ground truth. Due to lack of very definitive edge criteria along the boundaries of a polyp, we used “active contour without edges” instead of classical active contour.","PeriodicalId":6858,"journal":{"name":"2018 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET)","volume":"36 9 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2018-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90650173","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Performance Enhancement of the CSMA/CA MAC Mechanisms Using a Reject Request to Send (RRTS) Message for 3.5 GHz Shared Spectrum Systems 3.5 GHz共享频谱系统中使用拒绝请求发送(RRTS)消息增强CSMA/CA MAC机制的性能
Z. Youssef, Erfan Majeed, M. Mueck, Ingolf Karls, C. Drewes, G. Bruck, P. Jung
{"title":"Performance Enhancement of the CSMA/CA MAC Mechanisms Using a Reject Request to Send (RRTS) Message for 3.5 GHz Shared Spectrum Systems","authors":"Z. Youssef, Erfan Majeed, M. Mueck, Ingolf Karls, C. Drewes, G. Bruck, P. Jung","doi":"10.1109/WISPNET.2018.8538708","DOIUrl":"https://doi.org/10.1109/WISPNET.2018.8538708","url":null,"abstract":"The federal communications commission (FCC) has addressed a three-tiered spectrum access system (SAS) in the so called innovation band (3.5 GHz) which foresees besides the priority access licenses (PAL) an unlicensed spectrum access as general authorized access (GAA). In this context, the SAS assigns the spectrum to the PAL and GAA systems which are citizens broadband radio service devices (CBSDs). Thus, the issue of finding a scheme that achieves an optimal spectrum access among the CBSDs and their nodes in term of maximizing the throughput is addressed. In this paper we present the design and results of a broadcast message termed reject request to send (RRTS) based on the IEEE 802.11 distributed coordination function (DCF) mechanisms for SAS with efficient spectrum access in respect to maximize the system throughput for GAA CBSDs in an unlicensed spectrum. The system improvement shows how the RRTS message can be used in a minimum intrusive way to enhance the system throughput compared with the state-ofthe-art (SoA) DCF scheme. Moreover, the suggested scheme is able to handle a large number of accessing nodes because our scheme is robust against the number of nodes which opens a new perspective for high connection density in a SAS context and beyond 5G.","PeriodicalId":6858,"journal":{"name":"2018 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET)","volume":"88 4 1","pages":"1-8"},"PeriodicalIF":0.0,"publicationDate":"2018-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89386985","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Brief Review of Fuzzy Logic and Its Usage Towards Counter-Security Issues 模糊逻辑及其在反安全问题中的应用综述
Harikrishna Pillutla, Amuthan Arjunan
{"title":"A Brief Review of Fuzzy Logic and Its Usage Towards Counter-Security Issues","authors":"Harikrishna Pillutla, Amuthan Arjunan","doi":"10.1109/WISPNET.2018.8538555","DOIUrl":"https://doi.org/10.1109/WISPNET.2018.8538555","url":null,"abstract":"Nowadays, most of the world’s population has become much dependent on computers for banking, healthcare, shopping, and telecommunication. Security has now become a basic norm for computers and its resources since it has become inherently insecure. Security issues like Denial of Service attacks, TCP SYN Flooding attacks, Packet Dropping attacks and Distributed Denial of Service attacks are some of the methods by which unauthorized users make the resource unavailable to authorized users. There are several security mechanisms like Intrusion Detection System, Anomaly detection and Trust model by which we can be able to identify and counter the abuse of computer resources by unauthorized users. This paper presents a survey of several security mechanisms which have been implemented using Fuzzy logic. Fuzzy logic is one of the rapidly developing technologies, which is used in a sophisticated control system. Fuzzy logic deals with the degree of truth rather than the Boolean logic, which carries the values of either true or false. So instead of providing only two values, we will be able to define intermediate values.","PeriodicalId":6858,"journal":{"name":"2018 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET)","volume":"153 8 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2018-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83130854","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Significance of Feature Selection for Acoustic Modeling in Dysarthric Speech Recognition 困难语音识别中声学建模特征选择的意义
Jerin Baby Mathew, Jonie Jacob, Karun Sajeev, Jithin Joy, R. Rajan
{"title":"Significance of Feature Selection for Acoustic Modeling in Dysarthric Speech Recognition","authors":"Jerin Baby Mathew, Jonie Jacob, Karun Sajeev, Jithin Joy, R. Rajan","doi":"10.1109/WISPNET.2018.8538531","DOIUrl":"https://doi.org/10.1109/WISPNET.2018.8538531","url":null,"abstract":"In this paper, a comparative study of various feature extraction methods is carried out on dysarthric speech. Dysarthric speech is difficult to recognize and thus pose challenges that normal speech does not. Since various features can be used to model phonemes in hidden Markov model (HMM) based recognition system, which feature is suitable for the task specified is a topic to be addressed.Dysarthric speech becomes unintelligible due to the improper coordination of articulators. In this paper, recognition results are compared using mel-frequency cepstral coefficients (MFCC), perceptual linear prediction (PLP), filter bank and reflection coefficients feature sets. The performance is analyzed using TORGO database. Phonemes are grouped for the analysis. Our study shows that MFCC and PLP gave better results than filter bank and reflection coefficients for dysarthric speech analysis.","PeriodicalId":6858,"journal":{"name":"2018 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET)","volume":"62 1","pages":"1-4"},"PeriodicalIF":0.0,"publicationDate":"2018-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80726272","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Accelerated Feature Descriptor Matching in Images Using Threshold Accepting 使用阈值接受加速图像特征描述符匹配
Savinu T. Vijay, P.N. Poumami
{"title":"Accelerated Feature Descriptor Matching in Images Using Threshold Accepting","authors":"Savinu T. Vijay, P.N. Poumami","doi":"10.1109/WISPNET.2018.8538461","DOIUrl":"https://doi.org/10.1109/WISPNET.2018.8538461","url":null,"abstract":"The process of matching two visual descriptions of images is a major task in Computer Vision. This matching is generally done using Exhaustive search (Brute-Force) and Nearest Neighbor search which has been proved computationally expensive in some cases. This paper proposes a heuristic method to perform feature descriptor matching. The heuristic approach applied here works based on a combinatorial optimization algorithm called Threshold Accepting. The experiments performed suggest that the proposed algorithm can produce better results within a minimum number of iterations than existing algorithms.","PeriodicalId":6858,"journal":{"name":"2018 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET)","volume":"45 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2018-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76931082","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Automatic Segmentation of Exudates in Retinal Images 视网膜图像中渗出物的自动分割
S. Bharkad
{"title":"Automatic Segmentation of Exudates in Retinal Images","authors":"S. Bharkad","doi":"10.1109/WISPNET.2018.8538644","DOIUrl":"https://doi.org/10.1109/WISPNET.2018.8538644","url":null,"abstract":"This paper presents a new technique for segmentation of exudates in fundus images. This technique is based on Discrete Wavelet Transform (DWT) and histogram based thresholding procedure. In this work, Optic Disc (OD) is eliminated using DWT from original green component image prior segmentation of exudates. This step aids to avoid the misclassification of exudates region. Histogram based threshold calculation procedure is introduced for segmentation of bright regions in green component image. Hard exudates are obtained after masking the OD region in segmented bright regions of the green component image. This technique was evaluated on images from DIARETDB0 and DIARETDB1 databases. The average sensitivity, specificity and accuracy achieved by proposed method are 0.7890, 0.9972 and 0.9964 respectively. Comparison with existing methods offered in the literature shows that the performance of proposed approach is significant.","PeriodicalId":6858,"journal":{"name":"2018 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET)","volume":"31 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2018-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75355066","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Iterative Detection for MIMO Systems Associated with Polar Codes 基于极化码的MIMO系统迭代检测
M. Diouf, I. Diop, I. Dioum, K. Tall, S. M. Farssi
{"title":"Iterative Detection for MIMO Systems Associated with Polar Codes","authors":"M. Diouf, I. Diop, I. Dioum, K. Tall, S. M. Farssi","doi":"10.1109/WISPNET.2018.8538462","DOIUrl":"https://doi.org/10.1109/WISPNET.2018.8538462","url":null,"abstract":"The tools of information theory (error correcting codes) are exploited to improve the detection of MIMO channels. In particular, we use the polar codes, which currently represent the first and only code family to reach Shannon's two limits on channel and source coding. Our proposal consists in using a medium-length polar encoding, a detection minimizing the mean squared error by successive interference cancellation (MMSE- SIC) and a Successive Cancellation (SC) decoder.To improve the reliability of the information over the iterations, we added an iterative (turbo-equalization) process between the SC decoder and the MMSE-SIC detector. We have shown that the association of the SC decoder with the MMSE-SIC detector can reduce the Bit Error Rate (BER) instead of Believe Propagation (BP) decoding. This has increased the diversity and the ability to correct.","PeriodicalId":6858,"journal":{"name":"2018 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET)","volume":"36 1","pages":"1-7"},"PeriodicalIF":0.0,"publicationDate":"2018-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72724016","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Modified TEEN for Handling Inconsistent Cluster Size Problem in WSN WSN中处理簇大小不一致问题的改进TEEN
Gunjan, P. Maheshwari, A. Sharma
{"title":"Modified TEEN for Handling Inconsistent Cluster Size Problem in WSN","authors":"Gunjan, P. Maheshwari, A. Sharma","doi":"10.1109/WISPNET.2018.8538464","DOIUrl":"https://doi.org/10.1109/WISPNET.2018.8538464","url":null,"abstract":"WSN is a network technology which is currently in use in many existing and latest applications. Among the major problems in Wireless Sensor Networks, Energy Conservation is of utmost importance since batteries used in the sensor devices are not replaceable. There are number of cluster based routing protocols such as LEACH, TEEN, SEP proposed which handle these issues. This paper introduces an extension to TEEN protocol, a reactive homogeneous protocol. Modified TEEN (MTEEN) handles hotspot problem and the problem of load balancing in existing WSN routing algorithms. On the basis of our simulation carried on MATLAB, it is found that the proposed algorithm outperforms LEACH and TEEN in network lifetime.","PeriodicalId":6858,"journal":{"name":"2018 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET)","volume":"52 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2018-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77242520","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Performance Analysis of Different Spatial Domain Methods for Traffic Control Using Image Processing: A LabVIEW Approach 基于图像处理的不同空间域交通控制方法的性能分析:LabVIEW方法
G. Mallikharjuna Rao, P. Srinivas
{"title":"Performance Analysis of Different Spatial Domain Methods for Traffic Control Using Image Processing: A LabVIEW Approach","authors":"G. Mallikharjuna Rao, P. Srinivas","doi":"10.1109/WISPNET.2018.8538569","DOIUrl":"https://doi.org/10.1109/WISPNET.2018.8538569","url":null,"abstract":"In this paper, we present a scheme for performance analysis of spatial domain methods, namely, Laplacian, Arbitrary, Sobel and Prewitt operator methods for traffic control using an image processing with LabVIEW approach, including timing constraints are used to control the signal along the crossroad signal posts. In this paperwork, the reference image and the real-time image captured from the camera is loaded in the image acquisition of LabVIEW. To process the acquired image, four different methods of kernels namely Arbitrary, Laplacian, Prewitt and Sobel methods are used to obtain an edge detection image. The edge detection images have stored and captured images are compared and the Root Mean Square Error is calculated to estimate the timing constraints to operate the traffic signal lights on a four-lane dynamically. LabVIEW graphical programming tools are used for the development of the scheme and simulation results are shown. Finally, the performance of the four methods analyzed using an image quality metric RMSE value to estimate the time in order to allow the vehicles in a particular direction and dynamically to switch them on and off control from one particular direction to another.","PeriodicalId":6858,"journal":{"name":"2018 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET)","volume":"45 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2018-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85786765","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信