Version-1 (Mar-Apr 2014)
Version-1 Version-2 Version-3 Version-4 Version-5 Version-6 Version-7 Version-8
- Citation
- Abstract
- Reference
- Full PDF
[1] Nitin S. Lingayat and Manoj R. Tarambale, "A Computer Based Feature Extraction of Lung Nodule in Chest X-Ray Image," International Journal of Bioscience, Biochemistry and Bioinformatics vol. 3, no. 6, pp. 624-629, 2013.
[2] Xu XW, Doi K, Kobayashi T, MacMahon H, Giger ML. Development of an improved CAD scheme for automated detection of lung nodules in digital chest images. Medical Physics 1997;24(9):1395–403.
[3] Zhou ZH, Jiang Y, Yang YB, Chen SF. Lung cancer cell identification based on artificial neural network ensembles. Artificial Intelligence in Medicine 2002;24(1):25–36.
[4] Keserci B, Yoshida H. Computerized detection of pulmonary nodules in chest radiographs based on morphological features and wavelet snake model. Medical Image Analysis 2002;6(4):431–47.
[5] Qian W, Zhukov T, Song DS, Tockman MS. Computerized analysis of cellular features and biomarkers for cytologic diagnosis of early lung cancer. Analytical and Quantitative Cytology and Histology 2007;29(2):103–11.
[6] Coppini G, Diciotti S, Falchini M, Villari N, Valli G. Neural networks for computer-aided diagnosis: detection of lung nodules in chest radiograms. IEEE Transactions on Information Technology in Biomedicine 2003;7(4): 344–57.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Automatic Image Registration through Histogram Based Image Segmentation |
Country | : | India |
Authors | : | Mr. Selva Raj K, Mr.R. Poovendran M.E., |
: | 10.9790/2834-09210813 |
[1] A. Z. Arifin and A. Asano, ―Image segmentation by histogram thresh- olding using hierarchical cluster analysis,‖ Pattern Recognit. Lett., vol. 27, pp. 1515–1521, 2006.
[2] Y. Bentoutou, N. Taleb, K. Kpalma, and J. Ronsin, ―An automatic image registration for applications in remote sensing,‖ IEEE Trans. Geosci. Remote Sens., vol. 43, no. 9, pp. 2127–2137, Sep. 2005.
[3] L. G. Brown, ―A survey of image registration techniques,‖ Comput. Surv., vol. 24, no. 4, pp. 325–376, 1992.
[4] J. H. Chang, K. C. Fan, and Y. L. Chang, ―Multi-modal gray-level his- togram modelling and decomposition,‖ Image Vis. Comput., vol. 20, pp. 203–216, 2002.
[5] C. I. Chang, Y. Du, J. Wang, S. M. Guo, and P. D. Thouin, ―Survey and comparative analysis of entropy and relative entropy thresholding techniques,‖ IEE Proc.-Vis. Image Signal Process., vol. 153, no. 6, pp.
837–850, 2006.
- Citation
- Abstract
- Reference
- Full PDF
Abstract:This paper presents E-shape microstrip patch antenna with wideband wireless application. This shape will provide the broad bandwidth which is required in various application like remote sensing, biomedical application, mobile radio, satellite communication etc. The antenna design Probe feed technique is used in the experiment. Parametric study was included to determine affect of design towards the antenna performance. The performance of the designed antenna was analyzed in term of gain, return loss and radiation pattern. The design was optimized to meet the best possible result. The substrates FR4 and Duriod used in this have a dielectric constant of 4.4 and 2.2 respectively . The results show the wideband antenna is able to operate.
Index Terms: E-shape microstrip patch antenna, wideband.
[1]. C. A. Balanis, "Antenna Theory, Analysis and Design" John Wiley & Sons, New York, 1997
[2]. Yang, F.; Xue-Xia Zhang; Xiaoning Ye; Rahmat-Samii, Y.; "Wide- band E-shaped patch antennas for wireless communications," Antennas and Propagation, IEEE Transactions on , vol.49, no.7, pp.1094-1100, Jul 2001
[3]. Hadian, A.M.; Hassani, H.R.; , "Wideband Rectangular Microstrip Patch Antenna with U-Slot," Antennas and Propagation, 2007. EuCAP 2007. The Second European Conference on , vol., no., pp.1- 5, 11-16 Nov. 2007
[4]. B.-K. Ang and B.-K. Chung, "A wideband e-shaped microstrip patch antenna for 5 - 6 GHz wireless communications," Progress In Electromagnetics Research, Vol. 75, 397-407, 2007
[5]. Kumar, G., and K. P. Ray. Broadband Microstrip Antennas. Boston: Artech House, 2003.
- Citation
- Abstract
- Reference
- Full PDF
Abstract:Test and measurement instruments such as oscilloscopes and multimeters are the traditional hardware tools. Students in engineering curriculum, when exposed to these instruments, often come across a multitude of equipments such as voltmeters, ammeters, oscilloscopes and even simple things like calculator. Even after the touch screen based smart phone revolution, most of the engineering colleges in India continue the tradition of introducing the students to a decade old instruments. The aim is to design and develop a portable device called Super-Scope which is ALL-IN-ONE electronics lab equipment that has multiple functionalities needed by a modern day engineering student for their practical experiments in electronics and computer labs that would replace the existing plethora of instruments. The device is a fully operated from touch screen using touch buttons and menus.
Key words: Oscilloscopes, Multimeters, Super-Scope, Ammeters
[1]. J. d. J. Rangel-Magdaleno, J. R. Rivera-Guillen, R. d. J. Romero-Troncoso, and R. A. Osornio- Rios. (2011). FPGA-Matlab-based open core for three-time controllers in automatic control applications. Comput. Appl. Eng. Educ. [Online]. Available: http://dx.doi.org/10.1002/ cae.20526.
[2]. E. Monmasson, L. Idkhajine, and M. W. Naouar, "FPGA-based controllers," IEEE Ind. Electron. Mag., vol. 5, no. 1, pp. 14–26, 2011.
[3]. D. V. Pop, M. E. Auer, and D. G. Zutin, "New solution for remote design and test of digital systems with the Altera MAX CPLD Laboratory within the iLab Shared Architecture," in Proc.Remote Eng. Virtual Instrum. (REV) 2011,
[4]. Brasov, Romania.
[5]. P. Zenzerovic and V. Sucic, "Remote laboratory for microcontroller systems design," in Proc. Int. Conv. Inf. Commun. Technol., Electron. Microelectron. (MIPRO), 2011, pp. 1685–1688.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Effective Optimization of Video Transmission in WLAN |
Country | : | India |
Authors | : | Nagesh V, K.A. Dattreya M.E, M.B.A, (Ph.D) |
: | 10.9790/2834-09212428 |
Abstract:The prevalence of high-definition (HD) cameras, televisions, Blu-Ray players, and DVD recorders means that almost all video content is now captured and recorded digitally and much of it in HD. MPEG-2, H.264/AVC, and VC-1 are the most popular codecs in use today, and these rely on decorrelating trans- forms, motion estimation, intra prediction, and variable-length entropy coding (VLC) to achieve good picture quality at high compression ratios . Alongside the need for efficient video compression, there is a critical requirement for error resilience, in particular in association with wireless networks which are characterized by highly dynamic variations in error rate and bandwidth .
[1] Chau-Wai Wong and Wan-Chi Siu (2010) Comments on "2-D Order-16 Integer Transforms for HD Video Coding" IEEE Transactions On Circuits And Systems For Video Technology, Vol. X, No. X, pp.1-5.
[2] J. Dong, K. N. Ngan, C.-K. Fong, and W.-K. Cham,(2009) "2-D order-16 integer transforms for HD video coding," IEEE Trans. Circuits Syst. Video Technol., vol. 19, no. 10, pp. 1462–1474.
[3] J. Dong, K. N. Ngan, C.-K. Fong, and W.-K. Cham,(2009) "2-D order-16 Video Technol., vol.19, no. 10, pp. 1462–1474.
[4] T. Fischer, (1986) "A pyramid vector quantizer," IEEE Trans. Inf. Theory,vol. 32, no. 4, pp.568–583.
[5] T. Fischer, (1989) "Geometric source coding and vector quantization," IEEE Trans. Inf. Theory, vol. 35, no. 1, pp. 137–145.
[6] H. Hadizadeh and I. Bajic, (2011) "Burst-loss-resilient packetization of video," IEEE Trans. Image Process., vol. 20, no. 11, pp. 3195–3206.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Modeling of Bio-Inspired Self-Repairing Digital System |
Country | : | India |
Authors | : | M.Aarthi, Dr.S.Karthigailakshmi,M.E,Ph.D., |
: | 10.9790/2834-09212936 |
Abstract:Self-repairing digital system have recently emerged as the most promising alternative for fault-tolerant systems. However, such systems are still impractical in many cases, particularly due to the complex rerouting process that follows cell replacement. They lose efficiency when the circuit size increases, due to the extra hardware in addition to the functional circuit and the un utilization of normal operating hardware for fault recovery. Hence, the system inspired by endocrine cellular communication, that simplifies the rerouting process is proposed.
[1] W. C. Carter, "Fault-tolerant computing: An introduction and a viewpoint,"IEEE Trans. Comput., vol. 22, no. 3, pp. 225–229, Mar.
1973.
[2] C. Ortega and A. Tyrrell, "Design of a basic cell to construct embryonicarrays," IEE Proc. Comput. Digital Tech., vol. 145, no. 3,
pp. 242–248,May 1998.
[3] X. Zhang, G. Dragffy, A. G. Pipe, N. Gunton, and Q. M. Zhu, "Areconfigurable self-healing embryonic cell architecture," in Proc.
ERSA,Jun. 2003, pp. 134–140.
[4] D. Mange, E. Sanchez, A. Stauffer, G. Tempesti, P. Marchal, andC. Piguet, "Embryonics: A new methodology for designing
fieldprogrammablegate arrays with self-repair and self-replicating properties,"IEEE Trans. Very Large Scale Integr. (VLSI) Syst.,
vol. 6, no. 3,pp. 387–399, Sep. 1998.
[5] D. Mange, S. Durand, E. Sanckez, A. Stauffer, G. Tempesti, P. Marchal,and C. Piguet, "A new paradigm for developing digital
systems based ona multi-cellular organization," in Proc. IEEE Int. Symp. Circuits Syst.,vol. 3. Apr.–May 1995, pp. 2193–2196.
[6] W. Barker, D. M. Halliday, Y. Thoma, E. Sanchez, G. Tempesti, andA. M. Tyrrell, "Fault tolerance using dynamic reconfiguration
on thePOEtic tissue," IEEE Trans. Evol. Comput., vol. 11, no. 5, pp. 666–684,Oct. 2007.
- Citation
- Abstract
- Reference
- Full PDF
Abstract:It is used to separate background from main structures in images, drawings, and paintaings .images consists of main structure and the texture. our new relative total variation method which will be presented in this paper is used to eliminate the complete texture based on different properties between the texture and structure. .By performing the no of iterations we can get the effective structure. This is also used to extracting the boundries of the image by varying the values of the different parameters. We propose new algorithm which capture the essential difference of these two types of visual forms, and develop an efficient optimization system to extract main structures. The new variation measures are validated on millions of sample patches. Our approach finds a number of new applications to manipulate, render, and reuse the immense number of "structure with texture" images and drawings that were traditionally difficult to be edited properly.,
Keywords: texture, structure, smoothing, total variation, relative total variation,
[1] ARBELAEZ, P., MAIRE, M., FOWLKES, C., AND MALIK, J. 2011. Contour detection and hierarchical image segmentation. IEEE Trans. Pattern Anal. Mach. Intell. 33, 5, 898–916. ARNHEIM, R. 1956. Art and Visual Perception: A Psychology of the Creative Eye. University of California Press.
[2] AUJOL, J.-F., GILBOA, G., CHAN, T. F., AND OSHER, S. 2006. Structure-texture image decomposition - modeling, algorithms, and parameter selection. International Journal of Computer Vision
[3] AVIDAN, S., AND SHAMIR, A. 2007. Seam carving for contentaware image resizing. ACM Trans. Graph. 26, 3, 10. CANNY, J. 1986. A computational approach to edge detection. IEEE Trans. Pattern Anal. Mach. Intell. 8, 6, 679–698. DURAND, F., AND DORSEY, J. 2002. Fast bilateral filtering for the display of high-dynamic-range images. ACM Trans. Graph.
[4] Structure Extraction from Texture via Relative Total Variation • 139:9 ACM Transactions on Graphics, Vol. 31, No. 6, Article Publication Date: November 2012
- Citation
- Abstract
- Reference
- Full PDF
Abstract:In this paper for improving the security of data transmission we are introducing triple key chaotic encryption technique .In addition to this authentication method based on secret sharing technique with a data repair capability is being introduced. Using Shamir secret sharing scheme shares arebeing created from the authentication signal generated for each block of document image alongwith the binarized block content As many shares as possible are generated by properly choosing the involved parameters.PNG image is formed by combiningalpha channel plane with original image.To yield atransparent stego image the computed share values are mapped in to a range of alpha channel values near to their maximum value of 255 during the embedding process.authentication of the document image can be changed by an intruder by superimposing ,painting or adding noise to the image.image is marked as tampered if there is a mismatch between the authentication signal of the current block and that extracted from the shares embedded in alpha channel plane.reparing of data is being done by applying reverse Shamir scheme by collecting shares from the unmarked block.
Keywords: Atuthentication,Secret sharing,Encryption
[1] Y. Lee, H. Kim, and Y. Park, "A new data hiding scheme for binary image authentication with small image distortion," Information Sci., vol. 179, no. 22, pp. 3866–3884, Nov. 2009.
[2] Y. Lee, J. Hur, H. Kim, Y. Park and H. Yoon, "A new binary image authentication scheme with small distortion and low false negative rates," IEICE Trans. on Communications, vol. E90-B, no. 11, Nov. 2007.
[3] H. Yang and A. C. Kot, "Pattern-based data hiding for binary images authentication by connectivity-preserving," IEEE Trans. on Multimedia, vol. 9, no. 3, pp. 475–486, April 2007.
[4] H. Yang and A. C. Kot, "Binary image authentication with tampering localization by embedding cryptographic signature and block identifier," IEEE Signal Processing Letters, vol. 13, no. 12, pp. 741–744, Dec. 2006.
[5] M. Wu and B. Liu, "Data hiding in binary images for authen- tication and annotation," IEEE Trans.on Multimedia, vol. 6, no. 4, pp. 528–538, Aug. 2004.
[6] W. H. Tsai, "Moment-preserving thresholding: a new approach," Computer Vision, Graphics, and Image Processing, vol. 29, no. 3, pp. 377-393, 1985.
[7] A. Shamir, "How to share a secret," Communication of ACM, vol. 22, pp. 612–613, 1979.
- Citation
- Abstract
- Reference
- Full PDF
Abstract:In order to have reliable communications, channel coding is often employed. Turbo code as a powerful coding technique has been widely studied and used in communication systems. Turbo code decoder algorithm is studied in details in this paper. The performance of Turbo code used in IS-2000 Code Division Multiple Access (CDMA) reverse or forward link under Additive White Gaussian Noise (AWGN) and slow fading channels is evaluated. The bit error rates (BER) of Turbo code at low signal-to-noise ratio (SNR) are obtained by simulations. Index terms: IS-2000 CDMA, RSC encode, Interleaver, Output puncturing, Fading, AWGN channel, Rayleigh fading channel, Uncorrelated Rayleigh fading generator, Correlated Rayleigh fading generator
[1] G. Berrou, A.Glavieuc, and P.Thitmajshima, "Near Shannon limit error-correcting coding: Turbo codes," in Proc. 1993, Int. Conf.
Com., Geneva, Switzerland, May 1993
[2] L.R.Bahl, J.Cocke, F.Jelinek, and J.Racic, "Optimal decoding of linear codes for minimizing symbol error rate," IEEE Trans,
Information Theory, Vol. IT-20, pp.284-287, 1974.
[3] S.Benedetto, D.Divsalar, G.Montorsi, and F.Pollara"A soft input soft-output Maximum A Posteriori (MAP) module to decode
parallel and serial concatenated codes" TDA progress report 42-127, November 15, 1996
[4] Robert J. McEliece, Fellow, IEEE, David J. C. MacKay, and Jung-Fu Cheng Turbo Decoding as an Instance of Pearl's "Belief
Propagation" Algorithm IEEE Journal on selected areas in communication, Vol. 16, No. 2, February 1998
[5] Stephan ten Brink, Member, IEEE "Convergence Behavior of Iteratively Decoded Parallel Concatenated Codes" IEEE Transaction
on Communications, Vol. 49, No. 10, October 2001
[6] Claude. Berrou, member IEEE and Alian Glavieux "near optimum error correcting coding and decoding: Turbo-Co
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Design of a Beat Frequency Oscillator Metal Detector |
Country | : | Malaysia |
Authors | : | Aqeel Mahmood Jawad, Haider Mahmood Jawad, Goh Chin Hock |
: | 10.9790/2834-09215662 |
Abstract: This paper discusses the design,construction,and simulation of a beat frequency oscillator metal detector. Over the years, it has become an important issue to limit, the entry of people into certain places with weapons or instruments of harm and destruction.in this paper is a design of an effective means of detecting dangerous weapons made of metal in order to reduce crime rate in the society. It uses the principle of electromagnetic induction and adopts a digital beat frequency technique. The system uses a search coil to detect metallic objects at a close range and gives a visual, auditory and vibratory indication once the metallic object is detected. The search coil forms part of an LC oscillation circuit. The activation frequency of the LC oscillator is primarily determined by the value of involved inductor and capacitor. In case an inductance is altered, the frequency does not remain the same by changing its value through the introduction of a metallic object.
Keywords: Metal;Detector; Oscillator; BFO; Frequency.,
[1] Carin, L.: (2001), Special Issue on Landmine and UXO Detection, IEEE Transactions on Geoscience and Remote Sensing, Vol. 39 No 6.
[2] Daniels, D.;(2001), Cespedes E.: Special Issue UXO and Mine Detection, Subsurface Sensing Technologies and Applications (SSTA), Vol. 2 Issue 3.
[3] Aubrey Lee Kozak, (2003), Underwater Metal Detection Using Video Image Processing Techniques to Determine Location, Thesis. Available from World Wide Web http://www.giscogeo.com/pages/giscomtl.html
[4] SEIGENFELD, A.. ATMID – TECHNOLOGIE –und SCHALTUNGSBESCHREIBUNG.(2003). 55 s.
[5] MACDONALD, J., et al. Alternatives for landmine detection. [s.l.] RAND, (2004). 336s. Available from World Wide Webhttp://demining.jrc.it/aris/events/mine99/program/P155-160/MINE99PO.htm.
- Citation
- Abstract
- Reference
- Full PDF
Abstract:Automated teller machines (ATMs) are well known devices typically used by individuals to carry out a variety of personal and business financial transactions and/or banking functions. ATMs have become very popular with the public for their availability and general user sociability. ATMs are now found in several locations having a regular or high volume of customer traffic. For instance, ATMs are typically found in restaurants, superstores, Convenience stores, shopping mall, schools, gas stations, hotels, work locations, banking centers, airports, entertaining establishments, transport facilities and a myriad of other locations. This has added new competences and features, though most of the time, the executions are registered and networking is not always possible. Yet there is an increasing demand for advanced banking, where appliances respond automatically to changing environmental conditions and can be easily controlled through one common device. This paper offerings a possible solution whereby the user controls devices by employing a central Field Programmable Gate Array (FPGA) controller to which the devices and sensors are interfaced. Control is transferred to the FPGA from a mobile phone through its GSM interface. ATMs are typically available to consumers on a continuous basis such that consumers have the ability to carry out their ATM financial transactions and/or banking functions at any time of the day and on any day of the week.
Keywords: FPGA, GSM, Face reorganization, SIM, ATM
[1] M. Ejiri, T. Uno, M. Mese and S. Ikeda, "A Process for Detecting Defects in Complicated Patterns," Computer Graphics and Image Processing, Vol.2, No.3-4, 1973, pp. 326-339.
[2] S. Kashioka, M. Ejiri and Y. Sakamoto, "A Transistor Wire-Bonding System Utilizing Multiple Local Pattern Matching Techniques," IEEE Trans. on SMC, Vol.SMC-6, No.8, Oct. 1977, pp. 562-570.
[3] H. Yoda, Y. Ohuchi, Y. Taniguchi and M. Ejiri, "An Automatic Wafer Inspection System Using Pipelined Image Processing Techniques," IEEE Trans. on PAMI, Vol. PAMI-10, No.10, 1988, pp.4-16.
[4] M. Ejiri, H. Yoda, H.Sakou and Y. Sakamoto, "Knowledge-Directed Inspection for Complex Multilayered Patterns," Machine Vision and Applications, vol.2, no.3, 1989, pp.155-166.
[5] D. Barbara, "Mobile computing and databases - a survey", IEEE Transaction on Knowledge and Data Engineering, vol. 11, no.I, pp.