Volume-8 (Second International Conference on Emerging Trends in Engineering' 2013)
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Intelligent Learning Of Fuzzy Logic Controllers Via Neural Network And Genetic Algorithm |
Country | : | India |
Authors | : | Mr.suhas Yadav, Prof. S.S.Patil |
Abstract: Design of an efficient fuzzy logic controller involves the optimization of parameters of fuzzy setsand proper choice of rule base. There are several techniques reported in recent literature that use neural network architecture and genetic algorithms to learn and optimize a fuzzy logic controller. This paper develops methodologies to learn and optimize fuzzy logic controller parameters based on neural network and genetic algorithm. The strategies developed have been applied to control an inverted pendulum and results have been compared for three different fuzzy logic controllers developed with the help of iterative learning from operator experience, genetic algorithm and neural network. The results show that Genetic- Fuzzy and Neuro-Fuzzy approaches were able to learn rule base and identify membership function parameters accurately.
Keywords: Fuzzy logic controller; Neural network; Genetic algorithm, Genetic-Fuzzy & Neuro- Fuzzy approaches.
1) Rocco, P., "Stability of PID Control for Industrial Robot Arms", IEEE Transactions on Robotics and Automation, Vol. 12, No. 4, Aug 1996, pp. 606 –614.
2) Luo, G, and Saridis, G., "L-Q Design of PID Controllers for Robot Arms", IEEE Journal of Robotics and Automation, Vol. 1, No. 3, Sep 1985, pp. 152 –159.
3) Zadeh, L. A, "Fuzzy Sets", Information andControl, Vol. 8, 1965, pp. 338-353.
4) Mamdani, E.H. and Assilian, A., "An Experiment in Linguistic Synthesis with a Fuzzy Logic Controller", International Journal of Man Machine Studies, Vol. 7, No. 1, 1975, pp. 1-13.
5) Takagi, T. and Sugeno, M., "Fuzzy Identification of Systems and its Application to Modeling and Control", IEEE Transactions on Systems, Man and Cybernetics, Vol. 15, 1985.
6) Goldberg, D., Genetic Algorithms in Search, Optimization & Machine Learning, Addison Wesley Longman, Inc., 1989.
7) Miachalewicz, Z., Genetic Algorithms + Data Structure = Evolution Programs, Springer Verlag, 1996. 8) Bose, N.K., and Liang, P., "Neural Network Fundamentals with Graphs, Algorithms and Applications", McGraw Hill Inc., 1996.
9) Rumelhart, D.E. and McClelland, J., L.,"Explorations in Parallel Distributed Processing: a Handbook of Models, Programs, andExercises", MIT Press, 1988.
10) Kosko, B., "Neural Networks and Fuzzy Systems: A Dynamical Systems Approach to Machine Intelligence", Prentice Hall, 1992.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Iris Recognition: An emerging biometric technology |
Country | : | India |
Authors | : | Kshamaraj Gulmire, Sanjay Ganorkar |
Abstract: Iris recognition is a well-known biometric technique. The iris recognition is a kind of the biometrics technologies based on the physiological characteristics of human body, compared with the feature recognition based on the fingerprint, palm-print, face and sound etc, the iris has some advantages such as uniqueness, stability, high recognition rate, and non-infringing etc. Iris recognition, which is divided into four steps: segmentation, normalization, feature extraction and matching. We had taken iris images from database CASIA V4.We use Daugman's method using integrodifferential operator for segmentation & the feature extraction algorithm based on principle component analysis(PCA) & independent component analysis(ICA) for a compact iris code. We use these methods to generate optimal basis elements which could represent iris signals efficiently. In practice the coefficient of these methods are used as feature vectors. Then iris feature vectors are encoded into the iris code for storing and comparing individual's iris patterns. The iris recognition is using principal component analysis & independent component analysis can produce spatially globalfeatures. Hamming distance method is used for matching purpose for principle component analysis & independent component analysis.
Keywords - Biometric recognition, ICA, iris localization, image segmentation, iris recognition, PCA
[1]J. G. Daugman, "High Confidence Visual Recognition of Persons by a Test of Statistical Independence", IEEE Trans. Pattern Analysis and Machine Intelligence, vol. 15, pp. 1148-1161, Nov. 1993.
[2]W. Boles, B. Boashash. A human identification technique using images of the iris and wavelet transform. IEEE Transaction on Signal Processing, 1998, 46(4), pp.1185–1188
[3]Lye Wil Liam, Ali Chekima, Liau Chung Fan, "Iris recognition using self-organizing neural network", IEEE 2002.
[4]Daugman G. , "How Iris Recognition Works" , IEEE Transaction on Circuits and System for Video Technology , vol . 14, no. I, pp . 21-30,2004. [5]U.M. Chaskar, M.S. Suataone, "A Novel Approach for Iris Recognition", IEEE 2010
[6]Lin Zhonghua, Lu Bibo, "Iris Recognition Method Based on the Coefficients of Morlet Wavelet Transform", IEEE 2010
[7] Jie Wang, Xie Mei, "Iris Feature extraction based on wavelet packet analysis", IEEE 2006.
[8]Tze Weng Ng, Thien Lang Tay, Siak Wang Khor, "Iris Recognition using Rapid Haar Wavelet Decomposition", IEEE 2010. [9]Zhonghua Lin, Bibo Lu, "Iris Recognition Method Based on the Optimized Gabor Filters", IEEE 2010.
[10] L.Masek.(2003)."Recognition of human iris patterns for biometricidentification" Online].Available:http://www.csse.uwa.edu.au/~pk/studentprojects/libor/LiborMasekThesis.pdf
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Mathematical Modeling, Design and Analysis of LLC-T Series Parallel Resonant Converter |
Country | : | India |
Authors | : | TUSHAR T. WAGHMARE, Dr. VITTHAL S. BANDAL |
Abstract: This paper represents a modified LCL-T (inductor inductor capacitor) series parallel resonant converter (SPRC) has been mathematically modeled and validated. The limitations of two element resonant topologies have been removed by adding a third reactive element. The study indicates the mathematical modeling and design of LCL-T SPRC. The proposed approach is expected to provide better voltage regulation for dynamic load conditions. The analysis shows that the output of converter is free from the ripples, and has constant current, regulated output voltage. The analysis is carried out using the state space approach. The study indicates the superiority of SPRC over series or parallel resonant converter. The results show that the output of converter is free from the ripples, constant current, regulated output voltage and these converters can be used for many airborne applications.
Key-Words: - Resonant Converter, ZVS, ZCS, Power Electronics, State Space Analysis.
[2] Deepak S. Gautam and Ashoka K. S. Bhat,―A Comparison of Soft-Switched DC-to-DC Converters for Electrolyzer Application‖, IEEE Transactions On Power Electronics, Vol. 28, No. 1, January 2013
[3] G.S.N.Raju and Seshagirirao Doradla, ―An LCL Resonant converter with PWM Control Analysis, simulation, and Implementation‖, IEEE Transactions On Power Electronics, vol.10, No.2 March 1995.
[4] Bin Gu, Jih-Sheng Lai, Nathan Kees and Cong Zheng, ―Hybrid-Switching Full-Bridge DC–DC Converter With Minimal Voltage Stress of Bridge Rectifier, Reduced Circulating Losses, and Filter Requirement for Electric Vehicle Battery Chargers‖, IEEE Transactions On Power Electronics, Vol. 28, No. 3, March 2013
[5] S. Selvaperumal, C. Christober Asir Rajan, and S. Muralidharan, ―Stability and Performance Investigation of a Fuzzy-Controlled LCL Resonant Converter in an RTOS Environment‖, IEEE Transactions On Power Electronics, Vol. 28, No. 4, April 2013
[6] A.K.S.Bhat, .Analysis and Design of LCL-Type Series Resonant Converter,. IEEE INTELEC, pp172-178, (1994).
[7] Vijayakumar Belaguli, and Ashoka K. S. Bhat, ―Series-Parallel Resonant Converter Operating in Discontinuous Current Mode—Analysis, Design, Simulation, and Experimental Results,‖ IEEE Transactions on Circuits and System—I: Fundamental Theory and Applications, vol. 47, no. 4, April 2000
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | A DISTRIBUTED DATABASE ARCHITECTURE FOR GLOBAL ROAMING IN NEXT-GENERATION MOBILE NETWORKS |
Country | : | India |
Authors | : | Ms.Tejashri H. Mohite, Mr.Patil A. D. ,Ms.Sapana Kishor Soudagar , Ms.Pooja Adgonda Patil |
Abstract: Next-generation wireless systems are envisioned to have an IP-based infrastructure with the support of heterogeneous access technologies. One of the research challenges for next generation all-IP-based wireless systems is the design of intelligent mobility management techniques that take advantage of IP-based technologies to achieve global roaming among various access technologies. Next-generation wireless systems call for the integration and interoperation of mobility management techniques in heterogeneous networks. In this article the current state of the art for mobility management in next generation all-IP-based wireless systems is presented. The previously proposed solutions based on different layers are reviewed, and their qualitative comparisons are given. A new wireless network architecture for mobility management is introduced, and related open research issues are discussed in detail.
Keywords - next-generation (NG) cellular networks, mobility management, Intersystem roaming.
1] I. F. Akyildiz, J. Mcnair, J. S. M. Ho, H. Uzunalioglu, and W. Wang,―Mobility management in next-generation wireless systems,‖ Proc.IEEE, vol. 87, pp. 1347–1384, Aug. 1999.
[2] B. G. Claybrook, File Management Techniques. New York: Wiley,1983.
[3] I.-R. Chen, T.-M. Chen, and C. Lee, ―Agent-based forwarding strategies for reducing location management cost in mobile networks,‖ACM/Baltzer J. Mobile Netw. Applicat., vol. 6, no. 2, pp. 105–115,2001.
[4] S. Dolev, D. K. Pradhan, and J. L. Welch, ―Modified tree structure for location management in mobile environments,‖Comput. Commun., vol.19, no. 4, pp. 335–345, 1996.
[5] R. Elmasri and S. B. Navathe, Fundamentals of Database Systems, 2nd ed. Menlo Park, CA: Addison-Wesley, 1994.
[6] J. S. M. Ho and I. F. Akyildiz, ―Dynamic hierarchical database architecture for location management in PCS networks,‖ IEEE/ACM Trans.Networking, vol. 5, pp. 646–660, Oct. 1997.
[7] , ―Local anchor scheme for reducing signaling costs in personal communicaations networks,‖ IEEE/ACM Trans. Networking, vol. 4, pp.709–725, Oct. 1996.
[8] R. Jain and Y.-B. Lin, ―An auxiliary user location strategy employing forwarding pointers to reduce network impacts of PCS,‖ ACM-Baltzer J. Wireless Netw., vol. 1, no. 2, pp. 197–210, July 1995.
[9] R. Jain, Y.-B. Lin, C. Lo, and S. Mohan, ―A caching strategy to reduce network impacts of PCS,‖ IEEE J. Select. Areas Commun., vol. 12, pp.1434–1444, Oct. 1994.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Biometric Speech Watermarking Technique in Images using Wavelet Transform |
Country | : | India |
Authors | : | Mr. Vikrant B. Jundale, Prof. S.B. Patil |
Abstract: The enormous development in digital technologies has necessitated the owners to pay great attention in protecting their digital contents. Watermarking is used for content authentication and ownership protection. Biometric traits provide unique means for individual identification. Biometric watermarking refers to the incorporation of biometric in watermarking technology. By embedding biometrics in the host, it formulates a reliable individual identification as biometrics possesses exclusive characteristics that can be hardly counterfeited. In this paper we proposed a method of embedding owner's speech signal. Speech being a biometric data, the watermark signal in this method is expected to be more meaningful and has closer correlation with copyright holder.
Keywords: Watermarking, biometric traits, copyright protection, Authentication.
[1] Haiqing Wang, Xinchu Cui and Zaihui cao, "A Speech based Algorithm For Watermarking Relational Databases," 2008 International symposiums on Information Processing
[2] Mayank Vasta, Richa Sigh, Afzel noore," Feature based RDWT watermarking for multi modal biometric system," Science Direct, Image and vision Computing 27(2009)293-304
[3] R. Motwani, S.Dascalu, and F.Harris Jr, " A voice biometric for 3D models," In proceeding of IEEE International Conference on Computer Engineering and Technology, April 2010.
[4] Nick Bartlow, Nathan Kalka, Bojan Cukic, Arun Ross, "Protecting Iris Images through Asymmetric Digital watermarking," IEEE workshop on Automatic identification Advanced Technologies, 2007.
[5] Vandana Inamdar, Priti Rege, Aarti Bang, "Speech based watermarking of digital images," IEEE International Conference, TENCON 2009, Singapore.
[6] R. Kastantin, D.Stefanoiu, G.Feng, M.Martin and M. Mrayati, " Optimal Wavelets for High Quality Speech Coding," Proc. Of EUSIPCO-94, Europian Association for signal Processing, Edinburgh Scotland, 1994, pp.399-402
[7] I.J.Agbinya," Discrete Wavelet Transform techniques in Speech signal Processing," IEEE TENCON Digital signal Processing Application Proceedings, IEEE, New York 1996, pp 514-519
[8] Chirawat Temi, Somsak Choomchuay and Attasit Lasakul," Robust Image Watermarking Using Multiresolution Analysis of Wavelet," in IEEE proceedings ofISCIT 2005.
[9] Wenwu Zhu, Zixiang Xiong ,and, Ya-Qin zhang," Multiresolution watermarking of images and video," IEEE transactions on circuits and systems for video technology, vol. 1 9, No4, June 1999.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | NEURAL & OPTICAL CHARACTERIZATION RETINAL IMAGE IN THE HUMAN EYE BEYOND THE RESOLUTION LIMIT |
Country | : | India |
Authors | : | Ms.Pooja Adgonda Patil, Ms.Tejashri H. Mohite, Miss. Vaishali V. Jadhav, Mr.Patil A. D. |
Abstract: In a visual search to look at any object that is similar to the target so that it can be recognized and a decision made to end the search. Image processing by the eye is the example of concatentated linear filters followed by a sampling operation. The first filter is optical and is characterized by an optical point-spread function. The second filter is neural and is characterized by the neural point spread function, which is shown to be related to the receptive fields of retinal neurons. Sampling renders the internal " neural image" a discrete signal subject to the effects of aliasing. Conditions responsible for aliasing are formulated in terms of the amount of overlap of retinal samplers. Evidence of aliasing in human vision is presented along with a simulation of an aliased neural image in the peripheral visual field. In this paper, also discussed a new method for locating eye pairs based on valley field detection and measurement of fractal dimensions is proposed. Fractal dimension is an efficient representation of the texture of facial features. Possible eye candidates in an image with a complex background are identified by valley field detection.
Keywords - Nyquist limit, parafoveal region, central and mid-peripheral vision, neural image
1. W.N. Charman, "The retinal image in the human eye," Prog. Retinal Res. 2,1-50, 1983.
2. W.R. Levick , L.N. Thibos, "Receptive fields of cat ganglion cells: classification and construction," Prog. Retinal Res.2, 267-319, 1983.
3. S.L. Polyak, The Retina, Univ. Chicago Press, Chicago, 1941.
4. R.L. De Valois, K.K. De Valois, Spatial Vision, Oxford University Press, New York, 1988.
5. R.N. Bracewell, The Fourier Transform and Its Applications, McGraw-Hill, New York, 2nded., 1978.
6. D.R. Williams, "Aliasing in human foveal vision," Vision Res. 25, 195-205, 1985.
7. L.N. Thibos, D.J. Walsh, F.E. Cheney, "Vision beyond the resolution limit: aliasing in the periphery," Vision Res. 27, 2193-2197, 1987. 8. Thibos, L.N. , Still, D.L., "What limits visual resolution in peripheral vision?" Invest. Ophthal. Vis. Sci 29 (suppl.), 138, 1988.
9. L.N. Thibos, F.E. Cheney, D.J. Walsh, "Retinal limits to the detection and resolution of gratings," J. Opt. Soc. Amer. A4, 1524-1529,1987.
10. K.L. Chan. "Fractal Based Texture Analysis", Singapore ICCS/ISITA '92. Comm. on the Move,Vol.1, pp. 102-106, 1990.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | PREVALENCE EVALUATION OF DIABETIC RETINOPATHY |
Country | : | India |
Authors | : | Ms.Sapana Kishor Soudagar , Dr. Shubhangi B.Patil. Ms.Tejashri H. Mohite, ,Miss. Vaishali V. Jadhav |
Abstract: Diabetic retinopathy is the cause for blindness in the human society. Early detection of it prevents blindness. Image processing techniques can reduce the work of ophthalmologists and the tools used automatically locate the exudates. Proliferative diabetic retinopathy is the most advanced stage of diabetic retinopathy, and is classified by the growth of new blood vessels. These blood vessels are abnormal and fragile, and are susceptible to leaking blood and fluid onto the retina, which can cause severe vision loss. First, vessel-like patterns are segmented by using Ridge Strength Measurement and Watershed lines. The second step is measuring the vessel pattern obtained [5][10]. Many features that are extracted from the blood vessels such as shape, position, orientation, brightness, contrast and line density have been used to quantitative patterns in retinal vasculature. Based on the features extracted, the segment is classified as normal or abnormal by using Support Vector Machine Classifier [6][8]. The obtained accuracy may be sufficient to reduce the workload of an ophthalmologist and to prioritize the patient grading queues.
Keywords - Diabetic Retinopathy, Microaneurysm , Vasculature ,Watershed Transformation Disc., Optic
[1] Keith A. Goatman, Alan D. Fleming, Sam Philip, Graeme J. Williams, John A. Olson, and Peter F. Sharp, "Detection of New Vessels on the Optic Disc Using Retinal Photographs,"IEEE Trans. Med. Imag., vol. 30, no. 4,pp.972-979,April 2011.
[2] M. Niemeijer, B. V. Ginneken, J. Staal, M. S. A. Suttorp-Schulten, and M. D. Abramoff, "Automatic detection of red lesions in digital color fundus photographs," IEEE Trans. Med. Imag., vol. 24, no. 5, pp. 584–592, May 2005.
[3] J. H. Hipwell, F. Strachan, J. A. Olson, K. C. McHardy, P. F. Sharp, and J. V. Forrester, "Automated detection of microaneurysms in digital red-free photographs: A diabetic retinopathy screening tool," Diabetic Med., vol. 17, pp. 588–594, 2000.
[4] T. Walter, P. Massin, A. Erginay, R. Ordonez, C. Jeulin, and J. C. Klein, "Automatic detection of microaneurysms in color fundus images," Med. Image Anal., vol. 11, pp. 555–566, 2007.
[5] A. D. Fleming, S. Philip, K. A. Goatman, J. A. Olson, and P. F. Sharp,"Automated detection of exudates for diabetic retinopathy screening," Phys. Med. Biol., vol. 52, pp. 7385–7396, 2007.
[6] C. I. Sánchez, M. García, A. Mayo, M. I. López, and R. Hornero, "Retinal image analysis based on mixture models to detect hard exudates," Med. Image Anal., vol. 13, pp. 650–658, 2009.
[7] M. Niemeijer, B. V. Ginneken, S. R. Russel, M. S. A. Suttorp-Schulten, and M. D. Abramoff, "Automated detection and differentiation of drusen, exudates and cotton-wool spots in digital color fundus photographs for diabetic retinopathy diagnosis," Investigate Ophthalmol. Vis.Sci., vol. 48, pp. 2260–2267, 2007.
[8] C. I. Sánchez, M. García, A. Mayo, M. I. López, and R. Hornero, "Retinal image analysis based on mixture models to detect hard exudates," Med. Image Anal., vol. 13, pp. 650–658, 2009.
[9] A. D. Fleming, K. A. Goatman, S. Philip, G. J.Williams, G. J. Prescott, G. S. Scotland, P. McNamee, G. P. Leese, W. Wykes, P. F. Sharp, and J. A. Olson, "The role of haemorrhage and exudate detection in automated grading of diabetic retinopathy," Br. J. Ophthalmol., vol. 94, no. 6, pp. 706–711, 2010.
[10] T. Walter, J. C. Klein, P. Massin, and A. Erginay, "A contribution of image processing to the diagnosis of diabetic retinopathy-detection of exudates in color fundus images of the human retina," IEEE Trans. Med. Imag., vol. 21, no. 10, pp. 1236–1243, Oct. 2002.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | DIGITAL WATERMARKING TECHNOLOGIES |
Country | : | India |
Authors | : | Mrs.M.U.Phutane , K.D.Salunke |
Abstract: This report introduces the basic concepts in digital watermarking. Common watermarking technologies are reviewed. Some experiment results are provided as well.
Index Terms:- Digital watermarking, copyright protection
[2] A. Bors and I. Pitas, "Image watermarking using DCT domain constraints." in Proc. IEEE. Int. Conf. Image Processing, Lausanne, Switzerland, Sept. 1996, pp. 231-234
[3] R.C. Gonzalez, R.E. Woods, "Digital Image Processing", Upper Saddle River, New Jersey, Prentice Hall, Inc., 2002
[4] Perez-Gonzalez, F.; Hernandez, J.R.;" A tutorial on digital watermarking" Security Technology, 1999. Proceedings. IEEE 33rd Annual 1999 International Carnahan Conference on. Oct. 1999 Page(s):286 - 292
[5] Ingemar J. Cox, Matthew L. Miller, Jeffrey A. Bloom "Digital Watermarking" Morgan Kaufmann Publishers ISBN: 1-55860-714-5