Version-5 (Sep-Oct 2014)
Version-1 Version-2 Version-3 Version-4 Version-5
- Citation
- Abstract
- Reference
- Full PDF
Abstract: Wireless Sensor Networks has complex and time consuming configuration process. This involves the availability of skilled engineers with good networking knowledge whenever process is performed. One of the sub functionality is to configure the address of the interface. Before routing is enabled verify if the connectivity is established between the two nodes. The key requirement of tactical networks is quick recognition of nodes and fast movement of information. This configuration poses challenge to meet the requirement of tactical networks. We have developed a model that securely automates the process of configuration with minimum steps and assuring security by providing authentication in order to reduce the number of skilled engineers in handling the process in various levels. The outcome is the reduction in the total setup time by ¼ of the actual expected time. The software for enabling TCL scripting is developed which aids in securing configuration process and enable the Wireless Sensor Network nodes to interact with more feasibility.
Keywords: Autonomic Network Architecture, Sensor, Tactical Address Assignment, Wireless Sensor Network, Zebra
[1] Ghazi Bouabene, Christophe Jelger, Christian Tschudin, Stefan Schmid, Ariane Keller and Martin May, The Autonomic Network Architecture (ANA), in IEEE Journal On Selected Areas in Communications, vol. 28, no. 1, pp. 33-39, January 2010.
[2] D Clark, C Partridge, J Ramming and J Wroclawski, A Knowledge Plane for the Internet, in Proceeding of ACM SIGCOMM 2003, pp. 3-10, August 2003, Karlsruhe, Germany.
[3] B Jennings, S Van der Meer, S Balasubramaniam, D Botvich, M Foghlu, W Donnelly and J Strassner, Towards Autonomic Management of Communications Networks, IEEE Communication Magazine, pp. 112– 121, October 2007.
[4] Y Cheng, R Farha, M S Kim, A Leon-Garcia and J W K Hong, A Generic Architecture for Autonomic Service and Network Management, Computer Communications, vol. 29, no. 18, pp. 3691–3709, November 2006.
[5] Kephart and D Chess, The Vision of Autonomic Computing, IEEE Computer, vol. 36, no. 1, pp. 41–50, January 2003
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | An Effectual Approach to Reduce the Noise in ECG |
Country | : | India |
Authors | : | Giritharan Ravichandran |
: | 10.9790/2834-09551016 |
Abstract: Electrocardiogram (ECG) represents electrical activity of human heart. ECG is composite from 5 waves - P, Q, R, S and T. This signal could be measured by electrodes from human body in typical engagement. Signals from these electrodes are brought to simple electrical circuits with amplifiers and analogue – digital converters. Abnormal patterns of ECG may be due to interference from power line which is easily recognizable since interfering voltage in the ECG would have frequency of 60 Hz. This interference due to stray effect of alternating current on the patient or because of alternating current fields produce in the patient cable, and white noise generated by ECG equipment and these artifacts which must be removed otherwise it will convey an incorrect information regarding the patient's heart condition. The work in this paper is the design of FIR digital filters with new Window to remove the interferences or the artifacts and calculated SNR of noiseless ECG and compared with existing windows. Three filters are considered: Low pass, high pass and band reject filters. Each filter is used to filter the raw noisy ECG signal and results are observed and tabulated. In this paper we apply a new windowing technique to improve the SNR of ECG, so as to view the ECG noise-free.
Keywords: Window, Window Functions, Window Coefficients, SNR
[1]. Hand book of biomedical instrumentation – second edition- Khandpur-Tata McGraw-Hill.
[2]. Digital signal processing –Principles, Algorithms, and Applications– John G.Proakis
[3]. Digital signal processing –Ramesh babu.
[4]. Mitov I. P; ―A method for reduction of power line interference in the ECG‖. Medical Engineering Physics, vol. 26, no. 10, pages 879-887,December,2004
[5]. Sarkar, N. (2003): Elements of digital signal Processing: Khanna Publishers, Delhi India.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Implementation of Hybrid Model Image Fusion Algorithm |
Country | : | India |
Authors | : | S.Sridhar , V. Lokesh Raju , P. Sirish Kumar |
: | 10.9790/2834-09551722 |
Abstract: This paper represents Hybrid model image fusion algorithm based on combination of pyramid method and Wavelet method .To improve the Quality of output image an Algorithm is proposed by using Laplacian pyramid and Gradient pyramid methods from pyramid method and, Haar wavelet from Wavelet method. This algorithm creates new images for further image processing applications like Enhancement, Segmentation, etc. This Algorithm has several applications in Intelligent robots, Manufacturing industry Military and Remote sensing applications, etc. This algorithm was accessed based on the development of some Image quality metrics like Mean square error, Peak signal to noise ratio, etc.
Keywords: Image fusion, laplacian pyramid, Gradient pyramid, Haar wavelet
[1] M.PRADEEP "Implementation of image fusion algorithm using MATLAB ( LAPLACIAN PYRAMID)‟, IEEE conference on Automation, Computing, Communication, Control and Compressed sensing, at Kottam March 2013
[2] Z.Wang, A.A.Bovik, H.R.Sheikh; ‟Image quality assessment from error visibility to structural similarity‟ IEEE transactions on image processing vol.13,no.4,apr 2004.
[3] J Zeng,A Sayedelank,I Gilmore,P Frazier,M chouika,‟REVIEW OF IMAGE FUSION ALGORIYHMS FOR UNCONSTRAINED OUTDOOR SCENES",proceedings of the 8th international confrrence on signal processing,volume2,pagesv16-20,2006.
[4] Farhad Samadzadegn,"FusionTtechniques in Remote Sensing".http://www.igf.uniosnabrueck.de/mitarbeiter/schiewe/papers/43.pdf.
- Citation
- Abstract
- Reference
- Full PDF
Abstract: Design of ARM based Enhanced Event Data Recorder & Evidence Collecting System using GPS and different sensors. This proposed design provides information related to vehicle speed and position on real time basis and status about temperature of engine, front obstacle detection and alcohol detection. This information collected by ARM7 processors using module and sensors which are connected to the processor and also gives all the collected data to the monitoring station. The system can record the data in real time which can help people to analyze the fault protection at extreme conditions design in Event Data Recorder which displays the messages on LCD. It can also be used to analyze the accident easily and to settle many disputes related to car accident such as investigation, vehicle maintenance, insurance settlement, crash litigation, driver performance.
Index Terms: ARM7 processor, event data recorder, GPS, GSM module
[1]. Yoshiyuki Tanaka, Naoki Yamada, Toshio Tsuji, Takamasa Suetomi, "Vehicle Active Steering Control System Based on Human Mechanical Impedance Properties of the Arms" IET International transport system conference 2014.
[2]. Bing-Fei Wu, Ying-Han Chen, Chung-Hsuan Yeh, "Driving behaviour based event data recorder" IET International transport system conference 2013 ,pp.361-367.
[3]. Saurabh S. Chakole, Asstt. Prof. Vivek R. Kapur, Asst. Prof. Y. A. Suryawanshi, "ARM Hardware Platform for Vehicular Monitoring and Tracking" , 2013 International Conference on Communication Systems and Network Technologies, Nagpur, India, page no.757-761.
[4]. Yu-Kung Chen,Tsung Hsien, " Sky recognisation for Driving-view images", National science council. 2013 pp. 4799-3080
[5]. Chetan Patil, Yashwant Marathe, Kiran Amoghimath, Suman David S, "Low cost black box for cars" National institute of technology Karnataka Surathkal, Texas instruments India Educator's conference 2013 pp. 463-474
- Citation
- Abstract
- Reference
- Full PDF
Abstract: One of the challenging issues for OFDM (Orthogonal Frequency Division Multiplexing) systems are its PAPR. Proposed review and analysis of various OFDM PAPR reduction methods are based on computational, complexity, spectral spillage and performance. Our aim is a non linear companding technique is proposed to reduce high PAPR of OFDM. Which can use companding for Peak to Average Power Ration control is explored for linking a nonlinear transmit power amplifier with OFDM. In this article analyses the improvement in Bit Error Rate and overall system performance by employing non linear companding technique for PAPR reduction in Digital Video Broadcasting system.
Index-terms: Bit Error Rate (BER), DVB-T, OFDM, PAPR.
[1] T. Hwang, C. Yang, G. Wu, S. Li, and G. Y. Lee, "OFDM and its wireless application: A survey," IEEE Trans. Veh. Technol., vol. 58, no. 4, pp. 1673–1694, May 2009.
[2] Tao Jiang, Wenbing Yao, Peng Guo, Yonghua Song, and Daiming Qu Two Novel Nonlinear Companding Schemes With Iterative Receiver to Reduce PAPR in Multi-Carrier Modulation Systems IEEE TRANSACTIONS ON BROADCASTING, VOL. 52, NO. 2, JUNE 2006
[3] X.B Wang T.T Tjhung and C. S Ng, ―Reduction of peak to average power ratio of OFDM system using companding technique,‖ IEEE Trans broadcasting vol 45, no 3, pp 303-307, sept 1999.
[4] T. Jiang, W. D. Xiang, P. C. Richardson, D. M. Qu, and G. X. Zhu, ―On the nonlinear companding transform for reduction in PAPR of MCM signals,‖ IEEE Trans. Wireless communications, vol. 6, no. 6, pp. 2017–2021, Jun. 2007.
[5] H. Nikookar and K. S. Lidsheim, ―Random phase updating algorithm for OFDM transmission with low PAPR,‖ IEEE Trans. Broadcasting, vol. 48, no. 2, pp. 123–128, Jun. 2002.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Person identification through emotions using violas Jones algorithm |
Country | : | India |
Authors | : | Dolly Reney , Dr.Neeta Tripathi |
: | 10.9790/2834-09554045 |
Abstract: This paper presents an algorithm to identify a person through his emotional state using neural network which are completed in two phase, first is database creation in which we take user image and an audio file as an input, and add the features to the database. This is done by the code named createDatabase.m in MATLAB. Second is evaluation of Database where the system evaluates the parameters and compares the same with the database and the best matching person and emotion are fetched and displayed at the output using KNN classifier.
Keyword: MATLAB, KNN CLASSIFIER,CREATEDATABASE.M
[1] Lindasalwa Muda, Mumtaj Begam and I. Elamvazuthi, Voice Recognition Algorithms using Mel Frequency Cepstral Coefficient (MFCC) and Dynamic Time Warping (DTW) Techniques, JOURNAL OF COMPUTING, VOLUME 2, ISSUE 3, MARCH 2010.
[2] Freund, Yoav and Schapire, Robert E. "A decision-theoretic generalization of online learning and an application to boosting", Journal of Computer and System Sciences, No 55, 1997
[3 ] Paul Viola and Michael Jones. Robust real-time face detection. International Journal of Computer Vision, 57:137{154, 2004.
[4] Crow, F, "Summed-area tables for texture mapping", in Proceedings of SIGGRAPH,18(3):207-212, 1984
[5] Lien hart, R. and Maydt, J., "An extended set of Haar-like features for rapid object Detection", ICIP02, pp. I: 900-903, 2002
- Citation
- Abstract
- Reference
- Full PDF
Abstract: Motivation for the Real time vision based security system arises due to increasing crime activity now a days, which includes intrusion in high security areas where the presence of an unauthorized personis unacceptable. The paper carries out research on the low cost implementation of a system for change detection in a closed monitored area. This paper presents a vision based security system that includes a Linux based target board, web-camera and indicators to alert the concerned user. This work is successfully developed on embedded target platform board comprising of a Broadcom multimedia processor BCM2835 based on ARM11 embedded processor core as the hardware and the software is implemented on the Linux kernel by porting cross-compiled OpenCV, GPU and GUI libraries as well as UVC drivers for USB camera. An image is captured from a web-camera at random intervals and using change-detection technique i.e.image subtraction, thresholding and morphological operations the final image with major blob is produced. The area of the major blob is derived by calculating mean of pixel array elements. These values of cross section area are compared with calculated values. If derived values fall in the range of theoretical values, it can be identified as human intrusion.These ranges of theoretical values (the average cross sectional area of human) are defined in Anthropology theory. This system has been tested for different environments, such asan experimental closed monitored area, and achieves over 86% detection rate at 5-6 frames/s processing speed.
Keywords: ARM11, Motion Detection, Morphology, OpenCV,Random Image Update.
[1] John See, Student Member, IEEE, and Sze-Wei Lee, Member, IEEE-" An Integrated Vision-based Architecture for Home Security System"
[2] Donabel D. Abuan Alexander C. Abad, Jose B. Lazaro Jr., and Elmer P. Dadios, De La Salle University – "Security Systems for Remote Farm" Journal of Automation and Control Engineering Vol. 2, No. 2, June 2014.
[3] Ren C. Luo, IEEE Fellow, Te Y. Hsu, Tung Y. Lin, National Chung Cheng University "The Development of Intelligent Home Security Robot" Proceedings of the 2005 IEEE International Conference on Mcchatronics July 10-12,2005, Taipei, Taiwan.
[4] QusayIdreesSarhan, Department of Computer Sciences, University of Duhok, Duhok, Iraq. "An Integrated Real-Time Vision Based Home Security System" International Journal of Advancements in Research & Technology, Volume 2, Issue 5, M ay-2013.
[5] Gary Bradski and Adrian Kaehler,LearningOpenCV( O`REILLY Publications)
[6] [Online] "OpenCV Reference Manual v2.1"at www.opencv.org
- Citation
- Abstract
- Reference
- Full PDF
Abstract: The optimum resource apportionment standpoint is studied for non-real-time users CDMA (code division multiple access) overturn link. A resource apportionment standpoint of concern includes channel coding, out strectching gain control and power allocation under the conventional receive operation. The restriction in the optimization include peak transmit power of the mobile station, total received power at the base station and QoS in the form of minimum SINR (Signal-to- Interference-plus- Noise-Ratio) for each user. The coding and flattening gain control can be share from the power apportionment strategy. Our results show that the optimal power allotment standpoint depends on the purpose function: avaricious standpoint is optimal to maximize the sum of throughput from each user, whereas a fair standpoint is optimal to maximize the product of throughput from each user. A unified approach is taken to derive the optimal policies, and it can also be applied to other power apportionment problems in CDMA (code division multiple access) reverse link. Numerical results of the channel volume which can be held are presented for both objectives along with the effect of QoS constraints Code division multi access, information rates land(arrive on the ground, alight) mobile radio cellular systems, nonlinear programming resource (source of wealth) management.
[1]. Optimal resource allocation in multi-service CDMA Network."IEEE Trans. Wirless communication.
[2]. J. walrand, "fair pir to pir window based congestion control ,IEEE networking.
[3]. CDMA: principal of spread spectrum communication Addison- Wesley 1995.
[4]. Power control and capcity of spread wirless network 1987- Dec.1999.
[5]. Data throughput of CDMA – HDR a high data rate personal communication wirless system, may 2000,pp-1854-1858.
[6]. Wirless network Evolation 3G upper Saddle River, prentice hall 2002.
- Citation
- Abstract
- Reference
- Full PDF
Abstract: Data compression is very much useful in the process of image and video transmission in a network as it reduces the size of the data and thereby saves the storage space required. Video compression technique is having many applications and they include digital TV, DVD, Blu-Ray disk etc. High Efficiency Video Coding is an advanced compression scheme which is a block based compression method in which the compression is applied to the images by considering the block of images. The data during acquisition and transmission are having noise contamination and this noise degrades the quality of the data so this noise should be efficiently removed and retain the quality of the data. SURE-LET algorithm is used to reduce the noise added to the video. This algorithmic rule is based on an image domain minimization of an estimate of mean square error(Stein's Unbiased Risk Estimate) and therefore the denoising method will be expressed as a linear combination of elementary denoising processes. The resulting data will be noise free and will be of improved quality.
Keywords: Blu-Raydisk,Compression,HighEfficiencyVideoCoding,meansquareerror,SURE-LET
[1]. T. Wiegand, G. J. Sullivan, G. Bjøntegaard, and A. Luthra, "Overview of the H.264/AVC video coding standard," IEEE Trans. Circuits Syst. Video Technol., vol. 13, no. 7, pp. 560–576, Jul.
[2]. A. Vetro, T. Wiegand, and G.J. Sullivan, "Overview of the Stereo and Multiview Video Coding Extensions of the H.264/MPEG-4 AVC standard", Proceedings of the IEEE, Special Issue on "3D Media and Displays", vol. 99, issue 4, pp. 626-642, Apr. 2011.
[3]. Glenn Van Wallendael,Sebastian Van Leuven,Jan De Cock,Fons Bruls,and Rik Van de Walle,"3D Video Compression Based on High Efficiency Video Coding"IEEE Trans. Circuits Syst. Video Technol., pp. 137–145, Mar. 2012.
[4]. T. Wiegand, B. Bross, W.-J. Han, J.-R. Ohm, and G. J. Sullivan, "WD3: Working Draft 3 of High-Efficiency Video Coding", 5th JCT- VC Meeting, Geneva, CH, 16-23 March, 2011.
[5]. Thierry Blu, Senior Member, IEEE, and Florian Luisier"The SURE-LET Approach to Image Denoising",IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 16, NO. 11, NOVEMBER 2007.
- Citation
- Abstract
- Reference
- Full PDF
Abstract: The WiMAX system effectively supports wide variety of broadband wireless access technologies, which including high speed internet and multimedia access with high Quality of service (QoS) requirements. Real time services such as VoIP are becoming popular and are major revenue earners for network service providers. However, there are still many challenges that need to be addressed to provide a steady and good quality voice connection over the best effort WiMAX network .To support flexibility, efficiency and various requirements of QoS over a range of different applications and environments several provisioning and mechanisms are provided .This research paper investigates the performance of VoIP traffic over WiMAX networks, the impact of various voice codec schemes and statistical distribution for VoIP over WiMAX has been investigated in detail. Through various simulation experiments under realistic networking scenarios, this study provides an insight into the VoIP performance in the WIMAX networks. The simulations results indicate that better choice of voice codec's and statistical distribution have significant impact on VoIP performance in the WiMAX networks and Performance of selected parameters will be done using the network simulator OPNET Modeler
[1]. IEEE Standard for Local and Metropolitan Area Networks Part 16: Air Interface for Fixed Broadband Wireless Access Systems, IEEE Standard 802.16-2001 Working Group Std., 2002.
[2]. E. Halepovic, M. Ghaderi and C. Williamson, "Multimedia application performance on a WiMAX network," in Proc. Of Annual Multimedia Computing and Networking Symposium,2009 [3] I. Adhicandra, "Measuring data and voip traffic in wimax networks," Arxiv Preprint arXiv:1004.4583, 2010.
[3]. A.P. Markopoulou, F.A. Tobagi, and M.J. Karam, "Assessment of VoIP Quality over Internet Backbones," Proc. IEEE INFOCOM '02, vol. 1, pp. 150-159, 2002.
[4]. B. L. Dang, Y. Zhao, V. Prasad, I. Niemegeers, "Performance study of scheduling algorithms for WiMAX networks", OPNETWORK 2007.
[5]. C. Boutremans, G. Iannaccone, and C. Diot, "Impact of Link Failures on VoIP Performance," Proc. 12th Int'l Workshop Network and Operating Systems Support for Digital Audio and Video, pp. 63-71, 2002.
- Citation
- Abstract
- Reference
- Full PDF
Abstract: This study adopted a simulation based network performance analysis to investigate the effects of the application of different voice encoder schemes on QoS of VoIP system ,deployed with UMTS network Through different network simulation experiments using realistic network scenarios in OPNET environment, the results indicated that the choice of suitable voice encoder scheme with a small number of voice frame size per packet have a significant impact over VoIP traffic performance when deployed with UMTS access technology the VoIP over UMTS network model has been developed, where a VoIP server development is connected in the UMTS model the QoS factors will be controlled and managed to ensure good quality in VoIP call , the design of layered coding and multiple description coding is employed to address the bandwidth fluctuations and packet loss problems in the wireless network and to further enhance the error resilience, this research provided an in depth network performance comparative analysis of VoIP over UMTS using performance parameters which indicate QoS such as end to end packet loss ,throughput ,end to end delay ,uplink traffic sent ,uplink traffic received voice ,downlink traffic sent ,downlink traffic received, voice packet delay, average in voice packet end to end delay by using the GSM ,G729A Codec's in frames (20, 30 ms). The obtained simulation experiment results indicated that choice of suitable codec scheme can affect the QoS of VoIP traffic over UMTS network.
Keywords: VOIP, OPNET, CODEC, UMTS, QOS, Delay, Throughput
[1]. Qinqing Zhang Mooi Choo Chuah, Design and Performance of 3G Wireless Networks and wireless LANS.: Springer Science-l-Business Media, Inc., 2006.
[2]. 3GPP. Technical Speci_cation Group Services and System Aspects - Policy and charging control architecture (Release 9). TS 23.303, March 2009.
[3]. Tasuka, "VoIP with SIP."
[4]. J. Cumming, "SIP market overview," 2003.
[5]. G. americas, "Why SIP-I: a switching core protocol recommendation for GSM/UMTS operators," 2007.
[6]. J. W. Seo, et al., "A study on the application of an AMR speech codec to VoIP," 2001.
- Citation
- Abstract
- Reference
- Full PDF
Abstract: Handover is a very important process in any mobile communication network because it allows the call continuation with high mobility and to supply Quality of Service (QoS) to the users. However the handover increases the signaling load in the network and increase the mobile battery consumption. Location based service offered a great opportunity for application development in the mobile field. In this paper Location-Based Knowledge Handover Optimization algorithm (LBKHO) is proposed, the location based knowledge is used to improve the network performance by reducing the number of handover request, which reduces the signaling load in the network. From our the simulation results show that the proposed algorithm (LBKHO) has reduced the number of handover requests and the number of failed handovers, and when compared with the model (Adaptive Handover Initialization Region) proposed in a previous study,
[1]. [1] A. Sgora and D. D. Vergados, "Handoff prioritization and decision schemes in wireless cellular networks: a survey," vol. 11, no. 4,October 2009.
[2]. P. Patnaik, "Fuzzy assisted handoff algorithm for micro and macro cellular system," Master, National Institute of Technology, Department of Electronics & Communication Engineering National Institute of Technology, Rourkela Orissa, India, may 2010.
[3]. S. A. Mawjoud, "Simulation of handoff techniques in mobile cellular networks," vol. 15, no. 4, December 2007, pages 31-39.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Development of Artificial Neural Network for body composition Analysis |
Country | : | India |
Authors | : | Nitin V Jadhav, Prof. U.R.Bagal |
: | 10.9790/2834-0955100107 |
Abstract: Artificial Neural networks (ANN) are finding many uses in the medical diagnosis applications. Different diseases such as acquired immuno deficiency syndrome (AIDS), malnutrition, cardiovascular diseases, osteoporosis are related to body composition topologies such as fat mass (FM), fat free mass (FFM), total body water (TBW), bone mineral contents (BMC) and bone mineral density (BMD). Due to heterogeneous complexity of medical data classification and analysis needs Artificial Intelligence (AI) based technique to manipulate data. Many e-health system especially ANN uses AI methods to improve diagnostic process. Currently many body composition measurement systems in their applications elderly.
[1] Abdul Basit Shaikh et.al, "Artificial Neural Network: A Tool for Diagnosing Osteoporosis", RJRS, vol. 3(2), pp. 87-91, 2014, [online] Available: www.isca.in
[2] Psaltis, D., A. Sideris et.al, "A Multilayered Neural Network Controller," IEEE Control Systems Magazine, vol. 8, No. 2, pp. 17-21, 1988
[3] Xiong Xin et.al. "BP Neural Network principle and MATLAB Simulation", pp. 1-6, Wuhan University, China
[4] Vidushi Sharma et al., "A Comprehensive Study of Artificial Neural Networks," IJARCSSE, vol.2, no. 10, pp. 278-284, 2012