{"title":"Foreground segmentation using GMM combined temporal differencing","authors":"Vandta Tiwari, Deepak Chaudhary, Varan Tiwari","doi":"10.1109/COMPTELIX.2017.8004007","DOIUrl":"https://doi.org/10.1109/COMPTELIX.2017.8004007","url":null,"abstract":"Various computer vision applications like biometric identification, analysis of traffic, face detection techniques, video analysis, and surveillance require the use of moving object identification as a fundamental step. A lot of efforts have been made in the past to find approaches which can detect motion but most methods are limited to particular situations and are not applicable everywhere. This paper proposes another, more robust approach towards object detection using Gaussian Mixture Model for background subtraction and temporal differencing for foreground segmentation that provides a promising result with the application of morphological operations and filtering. The GMM approach is a multimodal approach that faces the constraint of outlier pixels because of sudden illumination changes and commonage pixels among object and background. Other limitations of GMM include its learning rate and the number of models. This paper includes use of GMM and information about temporal gradient using temporal differencing for object detection. By use of adaptive GMM along with temporal differencing methods and filtering in post processing results in successful and robust object detection. This paper also compares the approach we have taken to other approaches by comparing the results obtained using a standard video dataset.","PeriodicalId":6917,"journal":{"name":"2017 International Conference on Computer, Communications and Electronics (Comptelix)","volume":"11 suppl_2 1","pages":"426-430"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83250726","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Saturating core Magnetic Current Sensor for high Direct Current measurements in space applications","authors":"S. V, S. D., U. Raju, Venkata Pujitha B","doi":"10.1109/COMPTELIX.2017.8003937","DOIUrl":"https://doi.org/10.1109/COMPTELIX.2017.8003937","url":null,"abstract":"With satellite power level increasing, the requirement to measure higher Direct Current (DC) has become critical. This paper gives details of two Magnetic Current Sensor (MCS) approaches for high DC measurements. These current sensors are based on saturating core concept to avoid loss of information at high currents due to magnetic fold-back which occurs in conventional techniques [2]. The two approaches of MCS presented are: unidirectional, for measuring currents in one direction and bidirectional, for measuring currents in both the directions using single core for each method. Both the concepts are explained in detail with block schematic, timing equations, B-H curve and practical waveforms.","PeriodicalId":6917,"journal":{"name":"2017 International Conference on Computer, Communications and Electronics (Comptelix)","volume":"2010 3","pages":"53-58"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91429417","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Secure and efficient key delivery in VANET using cloud and fog computing","authors":"Sanya Chaba, Rahul Kumar, Rohan Pant, M. Dave","doi":"10.1109/COMPTELIX.2017.8003932","DOIUrl":"https://doi.org/10.1109/COMPTELIX.2017.8003932","url":null,"abstract":"The article proposes the design of the framework for vehicular ad hoc networks (VANET) for delivery of the authentication keys with minimum delay amongst vehicles having high mobility using fog and cloud computing. We propose to introduce fog computing to extend cloud computing by introducing an intermediate fog layer between mobile devices and cloud thus producing a number of advantages. Since the keys are provided directly from an intermediate layer, the latency is considerably reduced. In addition, the number of messages exchanged between vehicle and other elements of the VANET reduces in comparison to the existing approaches. Consequently, the resultant system is highly efficient. The design is implemented and validated using Omnetpp for single and multi vehicle system.","PeriodicalId":6917,"journal":{"name":"2017 International Conference on Computer, Communications and Electronics (Comptelix)","volume":"264 1","pages":"27-31"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83953034","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design and implementation of a Brain Computer Interface for stress management using LabVIEW","authors":"Ankita Tiwari, R. Tiwari","doi":"10.1109/COMPTELIX.2017.8003955","DOIUrl":"https://doi.org/10.1109/COMPTELIX.2017.8003955","url":null,"abstract":"In this paper a system design is introduced which contain a LabVIEW model which checks the status of brain with the help of analyzing the EOG is the method for measurement of cornea retinal potentials at standard time, it is existing between the front and back portion of eye. Electroencephalography (EEG) is also being analyzed at the time of detection where the Alpha and Theta waves are considered. Here we are elaborating our work for maintaining the system more precise because in old system the model was based on the only analysis of EEG waves. A microcontroller is also connected with it to respond on the required time and a GSM modem is interfaced here to send the information of stress in the form of SMS or call alert of the predefined subject. The development of this type of system is not only convenient but also it is portable and affordable.","PeriodicalId":6917,"journal":{"name":"2017 International Conference on Computer, Communications and Electronics (Comptelix)","volume":"42 1","pages":"152-157"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86984092","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design of low complexity Universal Bi-quadratic Filters using Current Feedback Amplifier","authors":"K. Kumar, S. Nanda","doi":"10.1109/COMPTELIX.2017.8004016","DOIUrl":"https://doi.org/10.1109/COMPTELIX.2017.8004016","url":null,"abstract":"Universal Bi-quadratic Filters (UBF) are popular because of its versatility in realizing any type of filter desired by the user. This manuscript deals with designing low complexity voltage mode UBF using Current Feedback Amplifier (CFA). Three new circuits are reported. The attractive features of these circuits include: employment of grounded capacitors, orthogonal adjustment of frequency response parameters and absence of constraints related to the input signals. The proposed circuits implement the design of high-pass, low-pass filters of resonance frequency 100kHz with Q-factor 1. It also implements band-pass filter of resonance frequency 100kHz with bandwidth 10kHz and Q-factor 1. Notch filter of rejection frequency 100kHz and Q-factor 1 is also implemented. Comparative results achieved with theoretical computation of the resonance frequency and quality factor matches with that achieved with implementation of the circuits on LTSPICE.","PeriodicalId":6917,"journal":{"name":"2017 International Conference on Computer, Communications and Electronics (Comptelix)","volume":"8 1","pages":"472-477"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88238934","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design and development of an I-slot antenna for dual-band applications","authors":"Purnima K. Sharma, P. Bhattacharya","doi":"10.1109/COMPTELIX.2017.8004029","DOIUrl":"https://doi.org/10.1109/COMPTELIX.2017.8004029","url":null,"abstract":"In the present work, a dual band Microstrip patch antenna is designed, fabricated and tested. The proposed antenna consists of an I-slot in a rectangular patch over a partial ground which operates at higher order TM02 mode. The presented design is suitable for 3G and WLAN applications as it produces dual beams at 1.9GHz and 5.7GHz respectively. Return loss, VSWR and radiation pattern are obtained and analyzed using HFSS. Antenna is tested and measured results are also analyzed.","PeriodicalId":6917,"journal":{"name":"2017 International Conference on Computer, Communications and Electronics (Comptelix)","volume":"57 1","pages":"541-544"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89984725","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design and analysis of L-slots with rectangular slot multiband microstrip rectangular patch antenna","authors":"K. Mehra, Anuj Jain","doi":"10.1109/COMPTELIX.2017.8004031","DOIUrl":"https://doi.org/10.1109/COMPTELIX.2017.8004031","url":null,"abstract":"In this paper, performance of a rectangular microstrip patch antenna fed by microstrip line has been designed to operate for multiband applications. It consists of a rectangular patch with four L-slots at the corners and one rectangular-slot in the center. The antenna has designed using FR-4 lossy substrate material with relative permittivity εr is 4.3 and thickness of 1.6mm. Simulation has realized by using CST microwave studio software and the results shows that the antenna resonates at the frequencies of 2.4GHz, 3.8GHz, 4.9GHz, 6.5GHz, 7.2GHz and 8.1GHz.","PeriodicalId":6917,"journal":{"name":"2017 International Conference on Computer, Communications and Electronics (Comptelix)","volume":"374 1","pages":"549-552"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80535854","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Shadow removal for umbrageous information recovery in aerial images","authors":"Vertika Jain, A. Khunteta","doi":"10.1109/COMPTELIX.2017.8004028","DOIUrl":"https://doi.org/10.1109/COMPTELIX.2017.8004028","url":null,"abstract":"The undesirable local change in the illumination intensity observed in a captured image often due to some opaque object hindering the light path is termed as shadow. Apart from resisting the image to deliver the high quality content, it also reduces the efficiency of various next level image processing applications such as object detection, feature extraction etc. This paper proposes a method to recoup a shadow recovered image. The method involves the detection of shadow which also includes morphological filtering to rule out the ambiguities and then eliminating the detected shadow. This paper adopts Gamma correction technique for shadow removal. The experimental results verify the efficiency of this method by comparing it with two other methods. The parameter Structural Similarity Index Metric is also used to gauge the accuracy of the three methods.","PeriodicalId":6917,"journal":{"name":"2017 International Conference on Computer, Communications and Electronics (Comptelix)","volume":"1 1","pages":"536-540"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89688216","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A resilient and seamless rekeying scheme based on random key distribution for WSN","authors":"Priyanka Ahlawat, M. Dave","doi":"10.1109/COMPTELIX.2017.8003987","DOIUrl":"https://doi.org/10.1109/COMPTELIX.2017.8003987","url":null,"abstract":"Wireless sensor networks are often placed in hostile and unattended areas, making the nodes exposed to many attacks. Node capture is one of the prominent attack in such networks. Whenever, a node is captured, its keys have to be revoked from the network by means of rekeying. We aim to optimize the problem of key revocation and rekeying by reducing the communication and computation overhead. An attack algorithm is presented from an adversarial view point, compromising of capturing cost and traveling cost. It is used to compute the destructive rank of each node which ultimately finds the set of vulnerable nodes of the network. Each communicating node determine a backup key for future node revocation and automatically switches to it, to avoid the reconfiguration of the shared key. The keys of vulnerable nodes are bypassed during the generation of the backup link keys. It is shown that proposed scheme has high level of security as well as reduced communication overhead during rekeying process. The proposed attack is also compared with random attack and found that it is improved in terms of route compromise ratio and energy cost.","PeriodicalId":6917,"journal":{"name":"2017 International Conference on Computer, Communications and Electronics (Comptelix)","volume":"35 1","pages":"321-327"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89913111","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Medical images texture analysis: A review","authors":"Shahabaz, D. Somwanshi, A. Yadav, R. Roy","doi":"10.1109/COMPTELIX.2017.8004009","DOIUrl":"https://doi.org/10.1109/COMPTELIX.2017.8004009","url":null,"abstract":"The abstract texture analysis is a popular compression test for finding texture properties of images. Above 35 IEEE research papers were reviewed related to texture analysis; papers were published in between 1992 to 2016. From those papers analyzed in depth and extracted common findings, strengths, weaknesses, gaps and also a comparison between suggested techniques. These suggested methods were used to compute a variety of texture features (parameters) based on image histogram, co-occurrence, and run-length matrices. In this paper, the problems of texture analysis such as segmentation, and classification were discussed. From this paper, the researcher will get an idea for their future work in texture analysis.","PeriodicalId":6917,"journal":{"name":"2017 International Conference on Computer, Communications and Electronics (Comptelix)","volume":"112 1","pages":"436-441"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79295526","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}