[69] viXra:1208.0216 [pdf] submitted on 2012-08-25 00:24:27
Authors: V. N. Maurya, Rajender Kumar
Comments: 13 Pages.
The main objective of this research paper focuses on the importance of automated software testing associate
with software testing techniques in software engineering. In which we consider, categorized and enlighten on
the software testing using current scenario of testing automation. The solution of this problem leads to the new
approach of software development known as software testing in the Information Technology world. Software
test automation is the process of automating, the steps of manual test cases using an automated tool or utility to
shorten the testing life cycle with respect to time. Regression testing is commonly used to efficiently test the
system by systematically selecting the appropriate minimum suite of tests needed to adequately cover the
affected change. Common methods of regression testing include rerunning previously run tests and checking
whether previously fixed faults have re-emerged.
Category: Digital Signal Processing
[68] viXra:1208.0161 [pdf] submitted on 2012-08-19 02:23:48
Authors: Prajna Parimita Dash, Dipti patra, Sudhansu Kumar Mishra, Jagannath Sethi
Comments: 8 Pages.
Object tracking is the process of locating moving objects in the
consecutive video frames. Real time object tracking is a challenging problem in the
field of computer vision, motion-based recognition, automated surveillance, traffic
monitoring, augmented reality, object based video compression etc. In this paper
kernel based object tracking using color histogram technique has been applied for
different challenging situations. Covariance tracking algorithm has also been applied
to the same problem. From the simulation studies it is clear that this two techniques
effectively handle various challenges like occlusion, illumination changes etc.
Experimental results reveal that the histogram based method is efficient in terms of
computation time and covariance tracker is better in terms of detection rate.
Category: Digital Signal Processing
[67] viXra:1208.0160 [pdf] submitted on 2012-08-19 02:24:41
Authors: Mohanjeet Singh, D.S Dhaliwal, Neeraj Garg, Gurdas Singh
Comments: 7 Pages.
During the last years, overlay networks have become one of the
most prominent tools for Internet research and development. With overlay
networks networking users, developers and application users can easily design
and implement their own communication environment and protocols on top of
the Internet. It is network on the top of existing network provide additional
services. It is a virtual network of nodes and logical links on the top of existing
network but the network defines addressing, routing and service model for
communication b/w hosts. Some applications in which overlay networks are
distributed systems such as cloud computing, peer-to-peer networks, and
client-server applications. It is used in designing own environment like data routing
and file sharing management. In this paper we will discuss various parameters
which effect the performance of managed overlays.
Category: Digital Signal Processing
[66] viXra:1208.0159 [pdf] submitted on 2012-08-19 02:25:55
Authors: Leong Bee Keoh, Mohd Wazir Mustafa, Sazali P. Abdul Karim
Comments: 8 Pages.
A new application of diode bridge T-type LC reactor as the transient
suppressor for distribution transformer is presented. The proposed transient
suppressor is effective in reducing the peak overvoltage and voltage steepness
by a factor of two. The transient suppressor is connected to the upstream of the
protected transformer to mitigate transients induced by lightning. The approach
developed enables one to construct a simple and low cost transient suppressor
with negligible effects on the systems steady state operation. The proposed
transient suppressor is numerically tested using simulation package PSCAD.
Category: Digital Signal Processing
[65] viXra:1208.0158 [pdf] submitted on 2012-08-19 02:27:08
Authors: Anand Jatti, S.C.Prasannakumar, Ramakanth Kumar
Comments: 10 Pages.
Characteristics of microscopic osteosarcoma bone cross section images carry essential clues for defining the important
features in the bone cross section such as stroma, bone, malignant cell, myxoid matrix, artifact for different age groups and
also for age related developments & diseases. The traditional approaches of bone microscopic image analysis rely primarily
on manual processes with very limited number of bone samples which is very difficult to get reliable and consistent
conclusions. A new method of hybrid technique of image segmentation which uses microscopic images for processing is
proposed. This hybrid segmentation technique automates the bone image analysis process and is able to produce reliable
results based on qualitative measurements of the features extracted from the microscopic bone images. The study of
correlation of bone structural features and age related developments & diseases become feasible from large databases of
bone images.
Category: Digital Signal Processing
[64] viXra:1208.0154 [pdf] submitted on 2012-08-18 12:28:32
Authors: N. Rajanikanth, P.Pradeep Kumar, B. Meena
Comments: 7 Pages.
In the Web database
scenario, the records to match are
highly query-dependent, since they
can only be obtained through online
queries. Moreover, they are only a
partial and biased portion of all the
data in the source Web databases.
Consequently, hand-coding or
offline-learning approaches are not
appropriate for two reasons. First, the
full data set is not available
beforehand, and therefore, good
representative data for training are
hard to obtain. Second, and most
importantly, even if good
representative data are found and
labeled for learning, the rules learned
on the representatives of a full data set
may not work well on a partial and
biased part of that data set.
Category: Digital Signal Processing
[63] viXra:1208.0153 [pdf] submitted on 2012-08-18 12:51:08
Authors: Samitha Khaiyum, Y S Kumaraswamy
Comments: 5 Pages.
Systems failures do not occur
in a vacuum; while a single event may
trigger the failure, investigation often
reveals that a history of managerial and
technical decisions produce conditions
turning a single event into a disaster. At the
minimum, investigating case studies
provides lessons on what to avoid. By
systematic studies of failure, it may be
possible to draw general conclusions and
improve practice as a whole.
Unfortunately, good systems failure studies
are rare. Embedded systems failure is a
volatile topic and the field is filled with a
vast amount of noise, urban myth, and
political agendas.
Category: Digital Signal Processing
[62] viXra:1208.0152 [pdf] submitted on 2012-08-18 12:55:38
Authors: T.Manikandan, N. Bharathi
Comments: 5 Pages.
The essential organ for respiration and
inspiration of human beings are Lungs. It consists of
five distinct lobes which are separated by three fissures
(the boundaries of lung lobes are the areas containing
fissures and having absence of bronchial trees). They
are two oblique (left and right) fissures and one
horizontal fissure. The left lung consist of left oblique
fissure which separates the superior and middle lobes.
The right lung consist of right oblique fissure which
separates superior and middle lobes and right
horizontal fissure which separates middle and inferior
lobes. The identification of the lobar fissures in isotropic
Computed Tomography (CT) images are very difficult
even for the experienced surgeons because of its
variable shape and appearance along with low contrast
and high noise association with it. Further the fissure
thickness is observed to be around 2 pixels
(approximately 1.2mm) complicates the fissure
identification. The identification of lobar fissure in CT
images will be helpful for the surgeon to identify the
cancer location before they plan for surgery. The
surgical removal of the diseased lung is the final stage
for treating the lung cancer. Therefore it is necessary to
find the cancer location at the early stage to treat it.
This paper presents an automated method to extract the
left and right oblique fissures from the CT lung images.
The proposed method is implemented in two phases. In
the first phase, the fissure region is located. In the
second phase, the found lobar fissures are extracted.
The obtained results show that the proposed work can
help the surgeon to identify the cancer location.
Category: Digital Signal Processing
[61] viXra:1208.0150 [pdf] submitted on 2012-08-18 12:59:29
Authors: R. Jensi
Comments: 4 Pages.
The ever increasing menace of spam is bringing down
productivity. More than 70% of the email messages are spam, and
it has become a challenge to separate such messages from the
legitimate ones. I have developed a spam identification engine
which employs naive Bayesian classifier to identify spam. A new
concept-based mining model that analyzes terms on the sentence,
document is introduced. . The concept-based mining model can
effectively discriminate between non-important terms with respect
to sentence semantics and terms which hold the concepts that
represent the sentence meaning. The proposed mining model
consists of sentence-based concept analysis, document-based
concept analysis similarity measure. In this paper, a machine
learning approach based on Bayesian analysis to filter spam is
described. The filter learns how spam and non spam messages
look like, and is capable of making a binary classification decision
(spam or non-spam) whenever a new email message is presented
to it. The evaluation of the filter showed its ability to make
decisions with high accuracy. This cost sensitivity was
incorporated into the spam engine and I have achieved high
precision and recall, thereby reducing the false positive rates.
Category: Digital Signal Processing
[60] viXra:1208.0149 [pdf] submitted on 2012-08-18 13:00:37
Authors: A. A. Abd EL-Aziz, A.kannan
Comments: 4 Pages.
In the modern health service, data are accessed by
doctors and nurses using mobile, Personal Digital Assistants, and
other electronic handheld devices. An individual’s health related
information is normally stored in a central health repository
and it can be accessed only by authorized doctors. However,
this Data is prone to be exposed to a number of mobile attacks
while being accessed. This paper proposes a framework of using
XACML and XML security to support secure, embedded and
fine-grained access control policy to control the privacy and data
access of health service data accessed through handheld devices.
Also we consider one of the models, namely Spatial Role-based
access control (SRBAC) and model it using XACML.
Category: Digital Signal Processing
[59] viXra:1208.0148 [pdf] submitted on 2012-08-18 13:02:50
Authors: A.A.Boudhir, M. Bouhorma, M. Ben Ahmed, Elbrak Said
Comments: 6 Pages.
In Mobile Ad hoc Networks, The route discovery mechanism utilize
simple flooding method, where a mobile node massively rebroadcasts received route
request (RREQ) packets until a route to destination is established. This can cause
more retransmissions and thus excessive energy consumption. This work aims to
reduce the number of messages RREQ (Route Request), by a new probabilistic and
dichotomic method for the discovery of destination. This method can significantly
reduce the number of RREQ packets transmitted during route discovery operation.
Our simulation analysis can result in significant performance improvements in
terms of energy. We propose a new probabilistic algorithm DRREQ (Dichotomic
Route Request) which minimize significantly the energy consumption. Extensive
simulations have been carried out for evaluation of the performance of our
algorithm in different scenarios.
Category: Digital Signal Processing
[58] viXra:1208.0147 [pdf] submitted on 2012-08-18 13:03:56
Authors: Asha G, Annes Philip
Comments: 10 Pages.
Image fusion is capable of integrating different imagery to produce more
information than can be derived from a single sensor. Preservation of spectral
information and enhancement of spatial resolution are regarded as important issues in
remote sensing satellite image fusion. In this paper, a component substitution partial
replacement is proposed to merge a high-spatial-resolution panchromatic (PAN)
image with a multispectral image. This method generates high-/low-resolution
synthetic component images by partial replacement and uses statistical ratio-based
high-frequency injection. Remote sensing satellite image, such as IKONOS-2 were
employed in the evaluation. Experiments showed that this approach can resolve
spectral distortion problems and successfully conserve the spatial information of a
PAN image. Thus, the fused image obtained from the proposed method gave higher
fusion quality than the images from some other methods.
Category: Digital Signal Processing
[57] viXra:1208.0141 [pdf] submitted on 2012-08-18 21:31:11
Authors: Anthony Spiteri Staines
Comments: 11 Pages.
This paper describes the issue that modern systems, being composed
of multiple components, have certain processing requirements that need to be
properly addressed. Unfortunately very few models and notations provide for
the idea of process modeling. For this purpose, separate notations have to be
used. This work proposes the use of notations that have a specific focus on
process modeling concepts. The solution is to use the Actor Model/ Processor
Net. The solution is taken a step further by suggesting the use of Processor
Network Patterns. These can be useful for describing and categorizing typical
behavior in different types of systems.
Category: Digital Signal Processing
[56] viXra:1208.0140 [pdf] submitted on 2012-08-18 21:32:21
Authors: G.Ravi Kumar, G.A. Ramachandra, G.Sunitha
Comments: 6 Pages.
Frequent pattern mining is one of the active research themes in data mining. It plays an important role in all data mining tasks such as
clustering, classification, prediction, and association analysis. Identifying all frequent patterns is the most time consuming process
due to a massive number of patterns generated. A reasonable solution is identifying efficient method to finding frequent patterns
without candidate generation. In this paper, we present An Evolutionary algorithm for mining association rules using Boolean
approach for mining association rules in large databases of sales transactions. Traditional association rule algorithms adopt an
iterative method to discovery, which requires very large calculations and a complicated transaction process. Because of this, a new
association rule algorithm is proposed in this paper. This new algorithm scanning the database once and avoiding generating
candidate itemsets in computing frequent itemset and adopts a Boolean vector “relational calculus” method to discovering frequent
itemsets. Experimental results show that this algorithm can quickly discover frequent itemsets and effectively mine potential
association rules.
Category: Digital Signal Processing
[55] viXra:1208.0139 [pdf] submitted on 2012-08-18 21:33:29
Authors: McKenzie McNeal III, Wei Chen, Sachin Shetty
Comments: 18 Pages.
Current communication protocols used for Wireless Sensor Networks (WSNs) have
been designed to be energy efficient, low redundancy in sensed data, and long network lifetime.
One major issue that must be addressed is the security of data communication. Due to the
limited capabilities of sensor nodes, designing security-based communication protocols present
a difficult challenge. Since commonly used encryption schemes require high time complexity
and large memory, achieving security for WSNs needs unique approaches. In this paper, we
consider a heterogeneous wireless sensor network (HWSN), where while most nodes are
resource limited a few nodes can have more energy, stronger processing capability and longer
communication range and can be used to relax the resource bottleneck. We propose a joint
design approach that can best use the benefit that a HWSN brings. We first design a
reconfigurable hierarchical networking architecture, where the HWSN is divided by the
high-end nodes into regions, the low-end nodes in each region are divided by clusters, and high-end
nodes and cluster heads form a communication/relay backbone. We then design a key
management system that uses both public and symmetric key cryptography above the
hierarchical networking architecture which requires very small number of security keys. The
evaluation and simulation results show that by using the proposed networking architecture and
key management scheme only a small amount of keys needs to be preloaded before deployment
and stored after key setup to achieve secured communication throughout the entire network.
Category: Digital Signal Processing
[54] viXra:1208.0138 [pdf] submitted on 2012-08-18 21:34:21
Authors: Kishor T. Mane, G.A. Patil
Comments: 9 Pages.
In this paper an attempt is made to extend the capability of mobile phones for secure control of remote electrical
devices using SMS services. The transmission of SMS in GSM network is not secure. It only provides the encryption between
Mobile Station to Base Station Controller. The message transmitted between GSM operator networks is not encrypted and hence
is not safe. Mobile SMS service has been used for control purposes in various applications; but the control operations seem not to
be secured. Therefore, it is desirable to secure SMS by adding suitable cryptographic algorithm so as to perform operations
securely on certain crucial remote devices.
In this system blowfish algorithm has been enhanced for its suitability to increase the security on the parameters like
Avalanche effect, GA, key-size, and others. The results obtained are far better in above terms.
Category: Digital Signal Processing
[53] viXra:1208.0137 [pdf] submitted on 2012-08-18 21:35:49
Authors: Asmaa Shaker Ashoor, Sharad Gore, Vilas Kharat
Comments: 11 Pages.
All of people who don’t know how to use a computer have heard a
bout viruses through programs such as hackers and some means like that. There
is no doubt that our culture is fascinated by the potential danger of these
viruses. Computer virus have become threat to computer users and almost every
field in the advance technology industrial nowadays. Know about virus is very
necessary for anti-virus researchers as well as operating systems makers. With
the development of the open source systems today, computer viruses on these
systems should be considered strictly. The goal of this paper is to present my
concept of classification virus computer in UNIX environment. This paper
provides some subjective comments on some of the most widely known
environment and some methods available to protect UNIX today. propose
some viruses that can work on this environment and suggest some methods to
prevent as well as restrain damages of these viruses.
Category: Digital Signal Processing
[52] viXra:1208.0136 [pdf] submitted on 2012-08-18 21:38:30
Authors: Somayeh Azizi, Vahid Panahi
Comments: 15 Pages.
Graphs and diagrams provide a simple and powerful approach variety of problems that are typical to computer
science, for example for activities. In software development visual notation are used for modeling that including
activity diagram, class diagram, control flow, graphs and some another diagrams. Models based on these
notation can be seen a graph and graph transformation are involved.
So Abstract State Machine (ASM) is a modern computation model. ASM based tools are used to academia
and industry, albeit on a modest scale. They allow we to give high-level operational semantics to computer
artifacts and to write executable specifications of software and hardware at the desired abstraction level.
The token flow semantics of UML2 activity diagrams is formally defined using Abstract State Machines and
Graph Transformation System. The state of the art in semantics for UML2 activity diagrams covers three
distinct approaches: mapping to Petri-nets, using graph transformation rules, or providing pseudo-code.
ASM using pseudo- code and graph transformation system using graph transformation rules for determining
semantics. A major goal of this paper is ability to determine the correctness behavior and formal
semantics of UML2 activity diagram by Graph Transformation System and Abstract state machine.
Category: Digital Signal Processing
[51] viXra:1208.0135 [pdf] submitted on 2012-08-18 21:39:40
Authors: N.Umadevi, S.N.Geethalakshmi
Comments: 12 Pages.
The rapid and continuing progress in computerized medical image
reconstruction and the associated developments in analysis methods and
computer-aided diagnosis have propelled medical imaging as one of the most
important sub-fields in scientific imaging. One important area is the fracture
detection from x-ray images, where automated tools are used to detect fractures.
In order to develop an automated fracture detection system, a clear
understanding of human skeletal system, bone and fractures is required. This
paper provides description on each of these topics.
Category: Digital Signal Processing
[50] viXra:1208.0134 [pdf] submitted on 2012-08-18 21:40:38
Authors: Samir ALLACH, Mohammad ESSAAIDI, Mohamed BEN AHMED
Comments: 11 Pages.
Adaptive E-learning, refers to a training concept in which technology
is introduced step by step in all aspects of the business of training.
A technique, inspired by the Ant Colony Optimization (ACO), is proposed to
optimize the learning path. The proposed platform is modeled by a graph where
nodes represent the educational elements (lessons or exercises), and arcs link
navigation between them. Each of the arcs is also a value that describes its
importance in relation to teaching neighboring arcs. Students are represented by
virtual agents (ants) who use these links.
Category: Digital Signal Processing
[49] viXra:1208.0133 [pdf] submitted on 2012-08-18 21:42:29
Authors: Mohammad Ali azimi, Mohamad reza Ramezanpor
Comments: 9 Pages.
In this paper we address one research challenges in vehicular ad hoc
networks (VANETs), Safety message dissemination as follows. We investigate
the quality of service for beacon based safety applications in VANETs. We
point out the fact that safety applications have some distinctiveness which is not
addressed in the current literature. We therefore propose a new metric focusing
on the significance of coverage in safety scenarios called effective range which
is based on the satisfaction of very restrict quality of service. We also emphasis
that beacon based safety applications may tolerate some message loss Beacon
safety message dissemination in Vehicular Ad-hoc Networks (VANETs) suffers
from poor reliability especially in congested road traffics. The main origin of
this problem is CSMA nature of Dedicated Short Range Communications
(DSRC) in MAC layer. In this paper, a scheduling algorithm in the application
layer is proposed to alleviate the problem. We first divide the road into a
number of geographical sections. In each section, we form a cluster between
moving vehicles. Then we perform a scheduling algorithm including two levels.
In the first level, nonadjacent clusters can transmit at the same time. While the
second level of scheduling deals with inside of each cluster in which we
implement a TDMA-like approach. Simulation results show that the proposed
algorithm improves the reliability in beacon message dissemination. Moreover,
the accuracy of the information which each vehicle can obtain from its
neighboring vehicles is significantly increased. Thus the proposed scheduling
scheme leads to considerable enhancement of the safety level provided by
Beacon Safety Messages (BSMs).
Category: Digital Signal Processing
[48] viXra:1208.0132 [pdf] submitted on 2012-08-18 21:43:36
Authors: Virupakashipura Krishna Tara, Kempahanumiah Muniswamappa Ravi Kumar
Comments: 8 Pages.
The purpose of this study is to compare the duration characteristic of individual words
and entire Passage in the speech of adults who stutter (S=10) recorded near the onset of their
stuttering to those of controlled nonstuttering adults (C=10). Stuttered speech was identified in
digital recordings of the clients read speech. The digitized signals were analyzed by means of
Cool Edit Pro software. Using visual displays of sound spectrograms, the durations of individual
words (including repeated words) in the passage and entire passage duration were analyzed. In
this work 80% of data were used for training and remaining 20% for testing over all accuracy.
Category: Digital Signal Processing
[47] viXra:1208.0131 [pdf] submitted on 2012-08-18 21:44:33
Authors: Ouafek Naouel, M. Khiredinne Kholladi
Comments: 7 Pages.
In the domain of image inpainting or retouching, many recent works
focus on combining methods of different fields of research in order to obtain
more accurate results, and more original images. In this paper we propose a new
algorithm that combines three different methods, each one represent a separate
field. The first one for the use of artificial intelligence, the second one for the
use of the partial differential equation (PDE) and the last one for the use of
texture synthesis to reconstruct damages images.
Category: Digital Signal Processing
[46] viXra:1208.0130 [pdf] submitted on 2012-08-18 21:45:40
Authors: K Jothimani, S. Antony Selvadoss Thanmani
Comments: 9 Pages.
Mining frequent itemsets in data stream applications is beneficial
for a number of purposes such as knowledge discovery, trend learning,
fraud detection, transaction prediction and estimation. In data streams,
new data are continuously coming as time advances. It is costly even
impossible to store all streaming data received so far due to the memory
constraint. It is assumed that the stream can only be scanned once and
hence if an item is passed, it can not be revisited, unless it is stored in main
memory. Storing large parts of the stream, however, is not possible because
the amount of data passing by is typically huge. In this paper, we study the
problem of finding frequent items in a continuous stream of items. A new
frequency measure is introduced, based on a variable window length. We
study the properties of the new method, and propose an incremental
algorithm that allows producing the frequent itemsets immediately at any
time. In our method, we used multiple s egments for handling different size
of windows. By storing these segments in a data structure, the usage of
memory can be optimized. Our experiments show that our algorithm
performs much better in optimizing memory usage and mining only the
most recent patterns in very less time.
Category: Digital Signal Processing
[45] viXra:1208.0129 [pdf] submitted on 2012-08-18 21:51:23
Authors: Madhav Bokare, Anagha Ralegaonkar
Comments: 7 Pages.
Sensor networks are expected to play an essential role in the upcoming age of pervasive computing. Due
to their constraints in computation, memory, and power resources, their susceptibility to physical capture, and use of
wireless communications, security is a challenge in these networks. In this paper we just take a glance at the
wireless technology and take a tour of wireless sensor networks. This paper gives brief outline related to wireless
sensor network and its applications in various fields. Also we have given the software and hardware platforms for
wireless sensor network. Also we mentioned the possible attacks on the WSN and their countermeasures. Finally
we have pointed out that for designing a sensor network one must build a mechanism which is secure from external
attackers.
Category: Digital Signal Processing
[44] viXra:1208.0128 [pdf] submitted on 2012-08-18 21:53:34
Authors: Baki Koyuncu, Pınar Kocabaşoğlu
Comments: 8 Pages.
The objective was to study the relative contributions of optical
aberrations of the cornea and determine the irregularities across its surface area.
Corneal topographic imaging data is used and corneal aberrations are computed
by using corneal height maps. Mathematical modeling of cornea surface is
developed by using Zernike polynomials and they are compared with the
patient corneas. Simulation techniques are utilized to determine the amount of
corrections with respect to an ideal cornea in computer environment.
Category: Digital Signal Processing
[43] viXra:1208.0127 [pdf] submitted on 2012-08-18 21:54:50
Authors: Niky K. Jain, Kamini H. Solanki
Comments: 8 Pages.
The exponential growth of the Short Message Service (SMS) use has
transformed this service in a widespread tool for social and commercial
messaging. It is one of the highly used and well-tried mobile services with
global availability within all GSM networks. This paper represents both text
formatting features and how the mobile message can be sent at particular date
and time to the Short Message Service Centre (SMSC) in advance. Message
text is formatted with different looks as done in MS-word which attract the
person to use SMS. As a input parameter for text formatting, user have to select
the text and give the desire output by selecting different controls. We can add
the extra features with formatted text , is sending SMS with particular date and
time given by sender. The input parameter for conditionally applied message,
will go inside to satisfy the different conditions. If the conditions satisfy it will
give desired output and that output will be sent to receiver message mobile
number. And on client side we can generate the conditions and the desired
solution. Desired input data of the record which satisfy the condition and then it
sends to the mobile message automatically and stores all the information into
the databases for a particular message. Its input will be stored into a file. Our
mobile scripting language supports DSN –less connectivity. It takes the current
path of the input file from the storage card or phone memory from where it will
stores the information. Controlling of SMS can be done by putting restrictions
for particular date and time of mobile message; due to SMS operator for
sending mobile message. Our software supports scripting language and
database also. Write the message into the body and using DSN-LESS database
in the form of record as per the requirements and condition of the columns. In
the background the script will take care of database connection.
Category: Digital Signal Processing
[42] viXra:1208.0126 [pdf] submitted on 2012-08-18 21:56:02
Authors: Mohammed Abdul Waheed, K Karibasappa
Comments: 5 Pages.
Ad hoc networks which have seen drastic increase in their usage scenarios and convergence of different
applications. Efficient routing is very important for mobile ad hoc networks. Existing protocols for ad hoc networks provide little
support for QoS and security. In many ad hoc networks, multiple types of nodes do coexist; and some nodes have larger
transmission power, higher transmission data rate, better processing capability and are more robust against bit errors and
congestion than other nodes. Hence, a heterogeneous network model is more realistic and provides many advantages
We present a new routing protocol called QoS routing, which is specifically designed for heterogeneous Mobile Ad Hoc
Networks. QoS routing utilizes the more powerful nodes as backbone nodes (B nodes). The routing area is divided into
several small, equal-sized cells. One B-node is maintained in each cell, and the routing among B-node is very efficient and
simply based on location information and cell structure. A source discovers a route to destination in an on-demand way, and
most of the routing activities are among B-nodes. This reduces the number of routing hops and makes the routing more
efficient and reliable, since B-nodes have large bandwidth, transmission range, and are more reliable.
Category: Digital Signal Processing
[41] viXra:1208.0125 [pdf] submitted on 2012-08-18 21:57:25
Authors: Mustapha Oujaoura, Rachid El Ayachi, Mohamed Fakir, Belaid Bouikhalene, Brahim Minaoui
Comments: 9 Pages.
The aim of this work is to present a system for recognizing isolated
Arabic printed characters. This system goes through several stages:
preprocessing, feature extraction and classification. Zernike moments, invariant
moments and Walsh transformation are used to calculate the features. The
classification is based on multilayer neural networks. A recognition rate of 98%
is achieved by using Zernike moments.
Category: Digital Signal Processing
[40] viXra:1208.0124 [pdf] submitted on 2012-08-18 21:58:17
Authors: Ahmed Younes
Comments: 7 Pages.
In the computer networks, it is necessary for one device in the computer network to
send data to all the other devices. In this paper, broadcast routing algorithms that aim to minimize
the cost of the routing path are proposed. A minimum cost broadcast routing scheme based on
spanning tree algorithm is presented. Thus, we present a genetic algorithm to find the broadcast
routing tree of a given network in terms of its links for using it to solve this problem. The algorithm
uses the connection matrix of a given network to find the spanning trees, and also is based on the
weight of the links to obtain the minimum spanning tree. An example is provided to illustrate the
effectiveness of this algorithm over conventional algorithms.
Category: Digital Signal Processing
[39] viXra:1208.0123 [pdf] submitted on 2012-08-18 21:59:26
Authors: Chetna V. Maheshwari, Kavindra R. Jain, Chintan K. Modi
Comments: 7 Pages.
The Agricultural industry on the whole is ancient so far. Quality assessment of grains is a very big
challenge since time immemorial. The paper presents a solution for quality evaluation and grading of Rice industry using
computer vision and image processing. In this paper basic problem of rice industry for quality assessment is defined which is
traditionally done manually by human inspector. Machine vision provides one alternative for an automated, non-destructive
and cost-effective technique. With the help of proposed method for solution of quality assessment via computer vision,
image analysis and processing there is a high degree of quality achieved as compared to human vision inspection. This
paper proposes a new method for counting the number of Oryza sativa L (rice seeds) with long seeds as well as small
seeds using image processing with a high degree of quality and then quantify the same for the rice seeds based on
combined measurements.
Category: Digital Signal Processing
[38] viXra:1208.0122 [pdf] submitted on 2012-08-18 22:00:24
Authors: Shivendra Goel, J.B. Singh, Ashok K. Sinha
Comments: 8 Pages.
As the society evolves it generates transport demand. An estimate of the volume of
trips between zones is a necessary step in transportation studies. The classical transportation
planning methods are based on simple extrapolation of trends. Some mathematical models like
linear programming models have also been used by researchers for estimating traffic generation
for future period. This paper presents a model for trip distribution in Delhi Urban Area using
Genetic Algorithm. This model has been used for trip distribution in all zones of Delhi Urban
Area. This model is applied on the real set of data on passengers trips generated and passengers
trips attracted in all zones of Delhi Urban Area, which in turn gives satisfactory results which
can be applicable in current and future scenarios. This work analyzes and compares the result of
this model with Linear programming model for trip distribution.
Category: Digital Signal Processing
[37] viXra:1208.0121 [pdf] submitted on 2012-08-18 22:01:30
Authors: Swathi Bhupatiraju, T J V Subrahmanyeswara Rao
Comments: 8 Pages.
Security Management at the industries is very important requirement, especially at night times. Security people
always needed to monitor the industries sites. Somebody should present always in onsite to protect industry from thievery. In
this paper an idea of protecting industry is by automating industry security system is presented. The idea developed using
ARM processor which is an industry leading embedded processor and a GUI is developed which is very useful for remote
monitoring and collecting information.
To attain reliability the improvement of the security level with the help of GSM based wireless technology which
consists of transmitter (GSM modem) at the site location and receiver is the GSM mobile. Information transmitted by the
GSM modem at the plant location will be sent to the respective person’s mobile as a text message.
Category: Digital Signal Processing
[36] viXra:1208.0120 [pdf] submitted on 2012-08-18 22:02:27
Authors: Yun-Sheng Yen, I-Long Lin, Annie Chang
Comments: 14 Pages.
With the increases growth of Internet users and the development of
new technologies, current legislations and security has faced difficulties in
trying to keep up, hence cybercrime numbers are increased rapidly. Although
wireless cybercrime is a new threat, but with the detail tracking and
investigation effort, ultimately the professional will find some kind of digital
evidence, and its often required to identify and preserve in order to be
recognized and restoring the truth, hence the establishment of trainings in
digital evidence through to forensic requires immediate implementation, with
increase of the standards and knowledge it will strength the competence and
credibility of the forensics unit’s professional ability in assistance to fight again
all crime.
Category: Digital Signal Processing
[35] viXra:1208.0119 [pdf] submitted on 2012-08-18 22:03:30
Authors: Haby Diallo, Alex Corenthin, Claude Lishou
Comments: 17 Pages.
This paper introduces the NooJ module for the Wolof language and
the implemented electronic dictionary. the linguistic resources used are
common usage dictionaries including Arame Fall’s and Jean Léopold Diouf’s
dictionaries, as well as the Wolof lexicon available at CLAD (Centre de
linguistique Appliquée de Dakar).
The present work will first focus on the socio-linguistic situation of the Wolof
language while describing its alphabet before, in a second part, introducing the
complex morphology of this language. The third part will be devoted to
explaining how the core of the dictionary has been constructed and describing
the flexional and derivation rules used to implement it in NooJ. Finally, the first
results achieved with NooJ will be presented.
Category: Digital Signal Processing
[34] viXra:1208.0118 [pdf] submitted on 2012-08-18 22:04:29
Authors: Latesh N. Patel, Kavindra R. Jain, Hitesh B. Shah, Chintan K. Modi
Comments: 7 Pages.
A number of techniques have been proposed in the past for automatic quality evaluations of
pre-processed tobacco using image processing. Although some studies have aimed to evaluate the quality of
processed tobacco. There is no automatic system that is capable of evaluating the processed tobacco. This paper
proposes a new method for counting the number of normal Chewing tobacco (Nicotiana tabacum) as well as
foreign elements using machine vision. By proposed method a quality evaluation of processed chewing tobacco
can be done which would be very beneficial for the purpose of its quality which is ready to be eat product.
Category: Digital Signal Processing
[33] viXra:1208.0117 [pdf] submitted on 2012-08-18 22:05:25
Authors: Alassane Diop, Antoine Goundjo
Comments: 11 Pages.
This work is carried out within the framework of the implementation
of innovative technological applications to facilitate the resolution of
development issues raised by climate changes. It describes the architecture used
for the design of MapClim, a free system of access intended for the collection,
systematic monitoring and diffusion of the data with the creation of capacities
of community and national answer. Thus, it enables to establish a permanent
waking state and to take fast and efficient actions in favour of the adaptation to
the climate change. Our article, in the light of data, indicators and process
charts, presents the results on the effects of the climate change in West Africa.
Category: Digital Signal Processing
[32] viXra:1208.0116 [pdf] submitted on 2012-08-19 00:03:54
Authors: R.D. Kulkarni, B.F. Momin
Comments: 11 Pages.
The purpose of this paper is to put focus on the current trends in the area of skyline
computation which is a computational trend related to database research community and also
to highlight the further research directions in the same. In recent years, the skyline queries or
skyline computations have been used in many advanced applications such as location based
queries originated from the mobile phones. Although the concept of skyline computation
originated from centralized database environment, as the application needs grew, the concept
has been applied successfully to modern computational environments like distributed networks,
real time systems, mobile ad hoc networks etc. This paper aims at unfolding the various recent
methodologies used till now, for the skyline computation and then highlights the future research
directions in this area.
Category: Digital Signal Processing
[31] viXra:1208.0115 [pdf] submitted on 2012-08-19 00:04:55
Authors: Sudhir Ahuja, Rinkaj Goyal
Comments: 8 Pages.
Web space is the huge repository of data. Everyday lots of new
information get added to this web space. The more the information, more is
demand for tools to access that information. Answering users’ queries about the
online information intelligently is one of the great challenges in information
retrieval in intelligent systems.
In this paper, we will start with the brief introduction on information retrieval
and intelligent systems and explain how swoogle, the semantic search engine,
uses its algorithms and techniques to search for the desired contents in the web.
We then continue with the clustering technique that is used to group the similar
things together and discuss the machine learning technique called
Self-organizing maps [6] or SOM, which is a data visualization technique that
reduces the dimensions of data through the use of self-organizing neural
networks. We then discuss how SOM is used to visualize the contents of the
data, by following some lines of algorithm, in the form of maps. So, we could
say that websites or machines can be used to retrieve the information that what
exactly users want from them.
Category: Digital Signal Processing
[30] viXra:1208.0114 [pdf] submitted on 2012-08-19 00:05:53
Authors: Jyoti Bhola, Simarpreet Kaur
Comments: 8 Pages.
In this paper we show the two implementations of fractal
(Pure-fractal and Wavelet fractal image compression algorithms) which have been
applied on the images in order to investigate the compression ratio and
corresponding quality of the images using peak signal to noise ratio (PSNR).
And in this paper we also set the threshold value for reducing the redundancy
of domain blocks and range blocks, and then to search and match. By this,
we can largely reduce the computing time. In this paper we also try to achieve
the best threshold value at which we can achieve optimum encoding time
Category: Digital Signal Processing
[29] viXra:1208.0113 [pdf] submitted on 2012-08-19 00:07:02
Authors: S. S. Mirkamali, P. Nagabhushan
Comments: 9 Pages.
Recent advances in 3D modeling and depth estimation of objects have
created many opportunities for multimedia computing. Using depth information
of a scene enables us to propose a brand new segmentation method called
Depth-Wise segmentation. Unlike the conventional image segmentation problems
which deal with surface-wise decomposition, the depth-wise segmentation is a
problem of slicing an image containing 3D objects in a depth-wise sequence. The
proposed method uses entropy of a depth image to characterize the edges of
objects in a scene. Later, obtained edges are used to find Line-Segments. By
linking the line-segments based on their object and layer numbers,
Objects-Layers are achieved. To test the proposed segmentation algorithm, we use
syntactic images of some 3D scenes and their depth maps. The experiment
results show that our method gives good performance.
Category: Digital Signal Processing
[28] viXra:1208.0112 [pdf] submitted on 2012-08-19 00:08:13
Authors: Vikas S. Jadhav, V. H. Bajaj
Comments: 8 Pages.
In this paper, we propose n-jobs to be processed on Single Machine
Scheduling Problem (SMSP) involving fuzzy processing time and fuzzy due dates. The
different due dates for each job be considered which meet the demand of customer with
more satisfaction level. The main objective of this paper is the total penalty cost to be
minimum in the schedule of the jobs on the single machine. This cost is composed of the
total earliness and the total tardiness cost.
Here, an algorithm is developed using Average High Ranking Method (AHRM) which
minimizes the total penalty cost due to earliness (lateness) of jobs in fuzzy environment.
Finally, numerical example is given to illustrate proposed method.
Category: Digital Signal Processing
[27] viXra:1208.0111 [pdf] submitted on 2012-08-19 00:09:18
Authors: Tian Fu, Te-Shun Chou
Comments: 12 Pages.
When Internet Protocol (IP) packets travel across networks, they must
meet size requirements defined in the network’s Maximum Transmission Unit
(MTU). If the packet is larger than the defined MTU, then it must be divided into
smaller pieces, which are known as fragments. Attackers can exploit this process for
their own purposes by attacking the systems. Packet fragmentation attacks have
caused problems for Intrusion Detection Systems (IDSs) for years. In this paper,
Snort IDS was tested. VMware virtual machines were used as both the host and
victim. Other tools were also implemented in order to generate attacks against the
IDS. The experiment results show the performance of Snort IDS when it was being
attacked, and the ability of Snort to detect attacks in different ways.
Category: Digital Signal Processing
[26] viXra:1208.0107 [pdf] submitted on 2012-08-19 00:19:13
Authors: Anzar ahamd, R. Gowri, S.C.Gupta
Comments: 14 Pages.
The implementation of MANET for commercial purposes
is not an easy task. Unlike other wireless technologies such as cellular
networks, MANET face more difficult problems concerning
management functions, routing and scalability . As a solution to these
complications, clustering schemes are proposed for MANET in order to
organize the network topology in a hierarchical manner. Many
clustering techniques have been developed. Clustering is a method
which aggregates nodes into groups . These groups are contained by the
network and they are known as clusters. By Increasing network
capacity and reducing the routing overhead through clustering brings
more efficiency and effectiveness to scalability in relation to node
numbers and the necessity for high mobility. The manager node,in clustering has responsibility for many functions such as cluster
maintenance, routing table updates, and the discovery of new routes
within the network. The other node named as gateway node
communicate to the other cluster . In this paper we remove the cluster
head (CH) and given a new approach in which cluster head and
gateway will be same and that node is known as cluster head gateway
(CHG) ,in which all the responsibilities of cluster head and gateway
will be perform by the Cluster head gateway(CHG) itself . By applying
this approach we reduce of overheads and improve the over all
performance of the network while throughput will be same in both
condition with the help of Exata simulation.
Category: Digital Signal Processing
[25] viXra:1208.0106 [pdf] submitted on 2012-08-19 00:22:16
Authors: Debjyoti Bagchi, Dipaneeta Roy Chowdhury, Satarupa Das
Comments: 9 Pages.
This paper presents an approach to the detection of objects in a
fixed frame. In this approach, an acoustic sensor is used for detecting any
change in the surrounding of a fixed frame, i.e. detecting the entry of a foreign
object. If it so happens, then the sensor sends a signal to the system which is
processed. If the sampling result crosses the fixed threshold then the camera is
switched on. It clicks a snapshot and then again is switched off. With this
snapshot, we operate frame difference against an initially stored snapshot of the
fixed frame. Based on the difference, we determine the nature and type of the
foreign object.
Category: Digital Signal Processing
[24] viXra:1208.0105 [pdf] submitted on 2012-08-19 00:23:26
Authors: P.Udayakumar, M.Indhumathi
Comments: 15 Pages.
The Sensor Planning Service (SPS) is service model to define the web service
interface for requesting user driven acquisitions and observation. It’s defined by the Open
Geospatial Consortium (OGC) Sensor Web Enablement (SWE) group to provide standardized
interface for tasking sensors to allow to defining, checking, modifying and cancelling tasks of
sensor and sensor data. The goal of Sensor Planning Service (SPS) of OGC – SWE is standardize
the interoperability between a client and a server collection management environment. The Sensor
Planning Service (SPS) is need to automate complex data flow in a large enterprises that are
depend on live & stored data from sensors and multimedia equipment. The obstacle are faced in
Sensor Planning Service (SPS) are (I) Observation from sensor at the right time and right place
will be problem, (II) acquisition information(data) that are collected at a specific time and specific
place will be problem. The above two obstacle are accomplished and obtained by the web based
semantic technology in order to provide & apply the ontology based semantic rule to user driven a
acquisitions and observation of Sensor Planning Service (SPS). The novelty of our approach is by
adding the semantic rule to Sensor Planning Service model in SWE and we implemented Sensor
Planning Service (SPS) with semantic knowledge based to achieve high standardized service
model for Sensor Planning Service (SPS) of OGC – SWE.
Category: Digital Signal Processing
[23] viXra:1208.0104 [pdf] submitted on 2012-08-19 00:24:39
Authors: V.jayaraj, M.Indhumathi
Comments: 12 Pages.
A Wireless Sensor Network (WSN) is emerging field in Information
and communication technology. In WSN data transmission and data collection are
unsecure because of sensor node Incompatibility. So providing security to Sensor
network is very important. The key based Mechanism is secure data collection and
it’s mainly used to guarantee data confidentiality. Range pair wise key is largely used
due to the necessary of data encryption and decryption between each pair range of
communication node. Fixed key mechanism difficult for the attacker to detect the
regularity of the randomly generated key chain function in privacy homomorphism
(PH).PH means no intermediate node to encrypt and decrypt only direct collect and
aggregate data for encryption and decryption. It is special key based scheme. It’s
totally based on beta distribution and some statistical tool using key code method by
using Complexity exchanging code key method addressing protocol. We show how to
reduce significant attacks and secure data collection on wireless sensor network.
Category: Digital Signal Processing
[22] viXra:1208.0103 [pdf] submitted on 2012-08-19 00:36:00
Authors: S.S.Shriramwar, N.K.Choudhari
Comments: 8 Pages.
Dynamic Partial Reconfiguration (DPR) of FPGAs presents many
opportunities for application design flexibility, enabling tasks to dynamically
swap in and out of the FPGA without entire system interruption. In this thesis,
we have implemented a line follower robot for the white line as well as for black
line, both these modules are programmed in VHDL. The robot are made to run
for white line and it will dynamically reconfigure the FPGA in the run-time for
the black line or vice-versa. This design includes two modules one is static and
the other is partially reconfigurable regions (PRR) which is a dynamic region.
The controllers are the static modules used for controlling the flow of data to and
from the reconfigurable modules to the external world (host environment)
through busmacros. Whereas white line and black line modules are designed as
dynamic modules.
Category: Digital Signal Processing
[21] viXra:1208.0102 [pdf] submitted on 2012-08-19 00:37:09
Authors: Said Aminzou, Brahim ER-RAHA, Youness Idrissi Khamlichi, Mustapha Machkour, Karim Afdel
Comments: 10 Pages.
In this paper, we propose an efficient digital watermarking scheme
to strengthen the security level already present in the database management
system and to avoid illegal access to comprehensive content of database
including patient‘s information. Doctors diagnose medical images by seeing
Region of Interest (ROI). A ROI of a medical image is an area including
important information and must be stored without any distortion. If a medical
image is illegally obtained or if its content is changed, it may lead to wrong
diagnosis. We substitute the part out of ROI of LSB bitplane of the image with
the patient data and a binary feature map. This latter is obtained by extracting
edges of the resized image to the quarter of its size using Laplacian operator.
This image is directly integrated into the database. The edge map and invariant
moments are used to check the integrity of the image.
Category: Digital Signal Processing
[20] viXra:1208.0100 [pdf] submitted on 2012-08-19 01:49:41
Authors: Mohanchur Sarkar, K.K.Shukla, K.S.Dasgupta
Comments: 20 Pages.
TCP has become the de-facto protocol standard for congestion
control in the existing terrestrial Internet. But it was designed keeping in mind
low Round Trip Time and low channel error rates typically experienced in a
wired network. In this paper we have considered TCP Protocol variants like
Tahoe, Reno, New Reno, SACK, FACK, Vegas, Westwood and Peach. TCP
Peach is found to be better than the other TCP Protocol variants in case of
satellite based networks but its performance also degrades when the packet
error probability is high and in cases where there are multiple packet losses in
the same window. In this paper a modification has been suggested to the
existing PEACH protocol and the modified PEACH Protocol is tested to
provide performance improvement especially in the cases where the packet
error rate is very high. The modified Peach Protocol has been implemented in
the ns2 Simulator and evaluated considering a Geo Satellite Network with
varying channel conditions with all other TCP variants.
Category: Digital Signal Processing
[19] viXra:1208.0099 [pdf] submitted on 2012-08-19 01:50:28
Authors: S. Priyadarsini
Comments: 16 Pages.
Ad hoc network is collections of wireless mobile devices with
limited broadcast range and resources, and no fixed infrastructure. The critical
issue for routing in mobile ad hoc network is how to discover a secured path
with longest route lifetime and also with minimum node computation. The
mobility nature, power constraint of the node and the security attacks of
malicious nodes cause frequent path failure. This path failure causes frequent
route discovery which affects both the routing protocol performance as well as
the node computation overhead. So we propose an efficient Trust based
Multipath Route Discovery with improved Route Lifetime algorithm to provide
trust based solution for the Security attacks which affects the routing protocol
performance. We implement the proposed algorithm in AODV and the
performance is evaluated. Our protocol improves the network performance
and reduces the computation overhead by avoiding frequent route discovery
since we select secured stable multi paths with longest life time. With the help
of network simulator we can prove that our proposed protocol performs
better than the existing stability-based routing protocols with improved packet
delivery ratio.
Category: Digital Signal Processing
[18] viXra:1208.0098 [pdf] submitted on 2012-08-19 01:51:18
Authors: San deep, Sushil Kumar Singh, P. Aditya Vardhan, Prasun Anand, S.N. Singh
Comments: 8 Pages.
Water-management is an interdisciplinary field concerned with the
management and optimum utilization of water. The consumption of water is
increasing due to rapid growth of population. Further due to ecological changes,
the open reservoir systems water storage and its availability is shrinking every
year. Thus underground source of water has become the major source of water
pumped through submersible pump at domestic end. On the other end, excessive
and continuous use of water through this pump may lead to depletion of water
table. In order to avoid this, an optimal control system for water-management
has been proposed in the present project work. This has been achieved by
control ling the operational time of a solar water pump in an optimal way. An
efficient fuzzy model has been proposed in simulation environment to develop
such an adaptive control system and its implementation in a residential building
has been studied.
Category: Digital Signal Processing
[17] viXra:1208.0097 [pdf] submitted on 2012-08-19 01:52:17
Authors: Nagraj Kulkarni, S. N. Mulgi, S. K. Satnoor
Comments: 7 Pages.
This paper presents the design and development of simple low cost
rectangular microstrip antenna for multiband operation. By incorporating U-slot of
optimum geometry and open stubs at two opposite corners on the rectangular
radiating patch the antenna operates between 1.815 to 9.01 GHz at different
frequency bands with a virtual size reduction of 44.84% and gives broadside
radiation characteristics at each operating band. By placing U-slot and open stubs
at the corners, the copper area of the patch is reduced to 8.50%, when compared to
the copper area of conventional rectangular microstrip antenna designed for the
same frequency. The experimental and simulated results are in good agreement
with each other. The design concept of antenna IS given and experimental results
are discussed. The proposed antenna may find applications in mobile, WLAN,
WiMax and SAR.
Category: Digital Signal Processing
[16] viXra:1208.0096 [pdf] submitted on 2012-08-19 01:53:22
Authors: Rita Chhikara, Sunil Kumar
Comments: 4 Pages.
Steganography is an important area of research in recent years involving a number of applications. It is the science of embedding
information into the cover image viz., text, video, and image (payload) without causing statistically significant modification to the
cover image. The modern secure image steganography presents a challenging task of transferring the embedded information to the
destination without being detected. In this paper we present an image based steganography that combines Discrete Cosine Transform
(DCT), and compression techniques with LSB techniques on raw images to enhance the security of the payload. Initially the
cover-image is transformed from spatial domain to the frequency domain using DCT. The image is then quantized. and LSB technique is
used to insert in pixels specified according to a range.
Category: Digital Signal Processing
[15] viXra:1208.0095 [pdf] submitted on 2012-08-19 01:54:10
Authors: Ebrahim Farshidi
Comments: 10 Pages.
In this paper, a alternative structure method for continuous time
sigma delta modulator is presented. In this modulator for implementation of
integrators in loop filter second generation current conveyors are employed.
The modulator is designed in CMOS technology and features low power
consumption (<2.8mW), low supply voltage (±1.65), wide dynamic range
(>65db), and with 180khZ bandwidth. Simulation results confirm that this
design is suitable for data converters.
Category: Digital Signal Processing
[14] viXra:1208.0094 [pdf] submitted on 2012-08-19 01:56:48
Authors: Mohd Wazir Mustafa, Leong Bee Keoh, Sazali P. Abdul Karim
Comments: 10 Pages.
An improvement inrush current limiter (ICL) is presented to form a
highly effective inrush filter which further reduce the inrush current peaks and
ripple voltage. The proposed ICL is constructed using a diode bridge and
T-type LC reactor consisting of two inductors and one capacitor. The proposed
ICL is connected at each phase of the primary winding of three phase
transformer. The line current is rectified by the diode bridge and the increase in
inrush current is limited by the T-type LC reactor. The proposed ICL is
effective in reducing the peak inrush current by 80% more compared to single
inductor type reactor. The potential of resonance take place in T-type reactor is
completely avoided since the LC filter resonant frequency is very low while the
lowest frequency the LC filter will ever see is well above is resonant point. The
proposed ICL is numerically tested using simulation package PSCAD.
Category: Digital Signal Processing
[13] viXra:1208.0093 [pdf] submitted on 2012-08-19 01:58:06
Authors: Shantanu Chatterjee, S Mallika
Comments: 15 Pages.
Use of renewable Energy such as solar, wind, water, nuclear energy etc is of huge demand in recent era. Converters used in
Photovoltaic Systems have two stages: a boost up chopper and a PWM inverter. But this integration of these two stages have certain problems
like decrease in efficiency, problem in interaction between the stages and also problem in MPPT(i.e Maximum Power Point Tracking) etc. So
the Total energy which is produced is not utilized fully rather only a part of it can be utilized fruitfully. So in this paper we have proposed a
novel use of Cascaded H-Bridge Multilevel Inverter Tropology in integrations with PV module controlled by a PI controller. The usefulness
of this tropology is in the use of fully controlled PI controller and the increase in system performance. All the Gate Pulses to the IGBT
switches are provided by the FPGA (Field Programmable Gate Array) kit. The detailed discussion and performance of the whole system alone
with the block diagram and basic designing is discussed in this paper. Simulated Results and comparison is also done in this paper. This
System provide a results in more efficiency and specially in low or medium power application. Detailed harmonic discussion is also done here
in this paper.
Category: Digital Signal Processing
[12] viXra:1208.0092 [pdf] submitted on 2012-08-19 01:59:02
Authors: P.Balasundaram, Nilkantha Chakraborty
Comments: 11 Pages.
Long Term Evolution (LTE) is the latest standard proposed by the 3GPP towards 4G. This paper uses an accurate perform
analysis of complete uplink LTE study. Multiple input multiple output (MIMO) techniques have gathered much attention in recent years as a
way to improve drastically the performance of wireless mobile communications. Simulated Results compare different channel estimation
techniques showing significant difference among them, such as Extended Pedestrian A, Extended Vehicular A, Extended typical urban , High
Speed Train Condition(HSTC) are considered and the measurement data is compared for the Localized and Distributed SC-FDMA mapping
methods. From the results, we find that Localized SC-FDMA outperforms Distributed SC-FDMA in terms of SNR and BER .
Category: Digital Signal Processing
[11] viXra:1208.0091 [pdf] submitted on 2012-08-19 02:01:58
Authors: Amandeep Singh Sappal, Parneet Kaur
Comments: 8 Pages.
Orthogonal frequency division multiplexing scheme being spectrally efficient is
used in modern communication systems. To achieve error free communication guard interval is
inserted using cyclic prefix and zero padding. The Bit Error Rate (BER) performance for
orthogonal frequency division multiplexing (OFDM) system with 16-QAM and varying length
of guard interval (GI) is presented.
Category: Digital Signal Processing
[10] viXra:1208.0089 [pdf] submitted on 2012-08-19 02:03:38
Authors: F. Karbalaei, M. Ranjbar, M. Kavyani
Comments: 6 Pages.
This paper compares the sensitivity method with a proposed nonlinear optimization method for setting of transmission network load tap
changers (LTCs) as a preventive action for voltage instability. The aim of preventive actions is to increase voltage stability margin. In contrast to
emergency actions, preventive ones implemented when the power system is stable. Thus, in calculation of a preventive action, in addition to increase
stability margin, its effects on current operating point of the system must be considered. The sensitivity method is a linearized based method that
uses the sensitivity of the loadability margin with respect to tap values. In the proposed optimization method, the tap values are calculated using
optimal powerflow model. Two groups of variables are used in optimization problem: one group is related to base case (current operating point) and
the other is related to the voltage stability boundary. By this work, the preventive actions do not cause undesirable changes in the system current
variables.
Category: Digital Signal Processing
[9] viXra:1208.0088 [pdf] submitted on 2012-08-19 02:05:12
Authors: Pallavi Gurjal, Kiran Kunnur
Comments: 15 Pages.
The objective of the gesture recognition is to identify and distinguish
the human gestures and utilizes these identified gestures for applications in
specific domain. In this paper we propose a new approach to build a real time
system to identify the standard gesture given by American Sign Language, or
ASL, the dominant sign language of Deaf Americans, including deaf
communities in the United States, in the English-speaking parts of Canada, and
in some regions of Mexico. We propose a new method of improvised scale
invariant feature transform (SIFT) and use the same to extract the features. The
objective of the paper is to decode a gesture video into the appropriate
alphabets.
Category: Digital Signal Processing
[8] viXra:1208.0087 [pdf] submitted on 2012-08-19 02:06:06
Authors: Aritra Acharyya1, J. P. Banerjee
Comments: 10 Pages.
This paper describes a computer-based method to calculate the
parasitic positive series resistance of millimeter-wave packaged DDR IMPATT
devices from high-frequency small-signal conductance-susceptance
characteristics. The series resistance of the device can be obtained at the
threshold condition when the small-signal conductance of the packaged device
just becomes negative and the susceptance becomes positive. Series resistance
values are determined for two DDR Silicon IMPATT diodes designed to
operate at W-band near 94 GHz window frequency using the method developed
by the author’s.
Category: Digital Signal Processing
[7] viXra:1208.0086 [pdf] submitted on 2012-08-19 02:08:46
Authors: Bhargabjyoti Saikia, Rupaban Subadar
Comments: 11 Pages.
Expressions for the single-user capacity have been presented for
different power and rate adaptive transmission techniques over Two Wave
Diffuse Power [TWDP] fading channels. Different power and rate adaptation
techniques available in the literature have been considered in these analyses. A
study of the effect of fading parameters on the channel capacity of different
techniques has been presented. Also the results have been verified against the
known special case results.
Category: Digital Signal Processing
[6] viXra:1208.0085 [pdf] submitted on 2012-08-19 02:14:17
Authors: S.C.Swain, Srikanta Mahapatra, Sidhartha Panda, Susmita Panda
Comments: 16 Pages.
Power-system stability improvement by a static
synchronous series compensator (SSSC)-based controller is studied in this
paper. Conventionally, the lead-lag structure was used to modulate the injected
voltage. But, in this paper PI, PID, PIDD structures are proposed to modulate
the injected voltage. The design problem of the proposed controller is
formulated as an optimization problem and Differential Evolution Algorithm is
used to find out the optimal controller parameters. Different disturbances are
applied to the single-machine infinite bus system and multi-machine infinite bus
system and the performances of the conventional structure and the proposed
structure are evaluated and compared. Only remote signals with required time
delays are taken into account in this paper. The simulation results are presented
and compared with a modern heuristic optimization technique under various
loading conditions and disturbances to show the effectiveness of the proposed
approach.
Category: Digital Signal Processing
[5] viXra:1208.0084 [pdf] submitted on 2012-08-19 02:15:35
Authors: A.K.Baliarsingh, N.R.Samal, D.P.Dash, S.Panda
Comments: 8 Pages.
Design of an optimal controller requires the optimization of
differential evolution performance measures that are often no
commensurable and competing with each other. Being a population
based approach; Differential Evolution (DE) is well suited to solve
designing problem of TCSC – based controller. This paper investigates
the application of DE-based multi-objective optimization technique for
the design of a Thyristor Controlled Series Compensator (TCSC)-based
supplementary damping controller. The designing objective is to
improve the power system stability with minimum control effort. The
proposed technique is applied to generate Pareto set of global optimal
solutions to the given multi-objective optimization problem. Further, a
fuzzy-based membership value assignment method is employed to
choose the best compromise solution from the obtained Pareto solution
set. Simulation results are presented to show the effectiveness and
robustness of the proposed approach.
Category: Digital Signal Processing
[4] viXra:1208.0083 [pdf] submitted on 2012-08-19 02:16:22
Authors: Abdulhamid.A. Abohagar, Mohd.Wazir.Mustafa, Nasir A. Al-geelani
Comments: 18 Pages.
High impedance fault (HIF) is a long standing problem which
known by very complex phenomena, because of its distinctive
characteristics asymmetry and nonlinearity behavior. Besides that, arc is
the most serious problem which is mostly associated with high
impedance fault, this arc is considered as a source of human life risks
and fire hazardous, and additionally result in property damage. From the
point of few, detection and discrimination of high impedance fault still
remain challenging of protection engineers. In this paper new of high
impedance model is introduced and combination of wavelet transform
and neural network is presented to detect high impedance fault. Discrete
wavelet transform (DWT) is used as feature extraction which extracts
useful information from distorted current signal that generated from
transmission system network under effect of high impedance fault. In
order to improve training convergence and to reduce the number of input
to neural network, coefficients of wavelet is calculated and used as input
for training back propagation neural network. Multi-layer back
propagation neural network (BP-NN) is used as classifier for high
impedance fault and discriminate it from such events like capacitor
switching and load switching etc.
Category: Digital Signal Processing
[3] viXra:1208.0082 [pdf] submitted on 2012-08-18 08:58:40
Authors: A. A. Abd EL-Aziz, A.kannan
Comments: 3 Pages.
In this paper, we propose a cryptosystem
(encrypting/decryption) for XML data using Vigenere cipher algorithm and EL Gamal cryptosystem. Such a system is designed to achieve some of security aspects
such as confidentiality, authentication,
integrity, and non-repudiation. We used XML data as an experimental work. Since, we have used Vigenere cipher which is not
monoalphabetic, then the number of possible keywords of length
m in a Vigenere Cipher is 26 m, so even for relatively small
values of m, an exhaustive key search would require a long time.
Category: Digital Signal Processing
[2] viXra:1208.0081 [pdf] submitted on 2012-08-18 09:00:01
Authors: K.Sreedhar
Comments: 10 Pages.
Adaptive Filtering is an important concept in the field of signal processing and has numerous applications in fields
such as speech processing and communications. An Adaptive filter is a filter that self-adjusts its transfer function according to
an optimizing algorithm. Because of the complexity of the optimizing algorithms, most adaptive filters are digital filters that
perform digital signal processing and adapt their performance based on the input signal. An adaptive filter is often employed in
an environment of unknown Statistics for various purposes such as system identification, inverse modeling for channel
equalization, adaptive prediction, and interference canceling. Knowing nothing about the environment, the filter is initially set
to an arbitrary condition and updated in a step-by-step manner toward an optimum filter setting. For updating, the least
mean-square algorithm is often used for its simplicity and robust performance. However, the LMS algorithm exhibits slow
convergence when used with an ill-conditioned input such as speech and requires a high computational cost, especially when
the system to be identified has a long impulse response. To overcome the limitations of a conventional full band adaptive
filtering, various sub band adaptive filtering (SAF) structures have been proposed. Properly designed, an SAF will converge
faster at a lower computational cost than a full band structure. However, its design should consider the following two facts: the
inter band aliasing introduced by the down sampling process degrades its performance, and the filter bank in the SAF
introduces additional computational overhead and system delay. In this project, a critically sampled SAF structure that is
almost Alias-free is proposed to reap all the benefits of using an SAF. Since the proposed SAF is performed using subbands
that is almost alias-free, there is little inter band aliasing error at the output. In each sub band, the inter band aliasing is
obtained using a bandwidth-increased linear-phase FIR analysis filter, whose pass band has almost-unit magnitude response in
the subband interval, and is then subtracted from the sub band signal. This aliasing cancellation procedure, however, causes the
spectral dips of the sub band signals. These spectral dips can be reduced by using a simple FIR filter. Simulations show that the
proposed structure converges faster than both an equivalent full band structure at lower computational complexity and recently
proposed SAF structures for a colored input. The analysis is done using MATLAB, a language of technical computing, widely
used in Research, Engineering and scientific computations.
Category: Digital Signal Processing
[1] viXra:1208.0080 [pdf] submitted on 2012-08-18 09:02:02
Authors: A. A. Abd EL-Aziz, A.kannan
Comments: 4 Pages.
In this paper, We explore how to support security
models for XML documents by using relational databases. Our
model based on the model in [6], but we use our algorithm to
store the XML documents in relational databases.
Category: Digital Signal Processing