Digital Signal Processing

1208 Submissions

[69] viXra:1208.0216 [pdf] submitted on 2012-08-25 00:24:27

Analytical Study on Manual vs. Automated Testing Using with Simplistic Cost Model

Authors: V. N. Maurya, Rajender Kumar
Comments: 13 Pages.

The main objective of this research paper focuses on the importance of automated software testing associate with software testing techniques in software engineering. In which we consider, categorized and enlighten on the software testing using current scenario of testing automation. The solution of this problem leads to the new approach of software development known as software testing in the Information Technology world. Software test automation is the process of automating, the steps of manual test cases using an automated tool or utility to shorten the testing life cycle with respect to time. Regression testing is commonly used to efficiently test the system by systematically selecting the appropriate minimum suite of tests needed to adequately cover the affected change. Common methods of regression testing include rerunning previously run tests and checking whether previously fixed faults have re-emerged.
Category: Digital Signal Processing

[68] viXra:1208.0161 [pdf] submitted on 2012-08-19 02:23:48

Kernel based Object Tracking using Colour Histogram Technique

Authors: Prajna Parimita Dash, Dipti patra, Sudhansu Kumar Mishra, Jagannath Sethi
Comments: 8 Pages.

Object tracking is the process of locating moving objects in the consecutive video frames. Real time object tracking is a challenging problem in the field of computer vision, motion-based recognition, automated surveillance, traffic monitoring, augmented reality, object based video compression etc. In this paper kernel based object tracking using color histogram technique has been applied for different challenging situations. Covariance tracking algorithm has also been applied to the same problem. From the simulation studies it is clear that this two techniques effectively handle various challenges like occlusion, illumination changes etc. Experimental results reveal that the histogram based method is efficient in terms of computation time and covariance tracker is better in terms of detection rate.
Category: Digital Signal Processing

[67] viXra:1208.0160 [pdf] submitted on 2012-08-19 02:24:41

Techniques for Improving Performance in Managed Overlays Network

Authors: Mohanjeet Singh, D.S Dhaliwal, Neeraj Garg, Gurdas Singh
Comments: 7 Pages.

During the last years, overlay networks have become one of the most prominent tools for Internet research and development. With overlay networks networking users, developers and application users can easily design and implement their own communication environment and protocols on top of the Internet. It is network on the top of existing network provide additional services. It is a virtual network of nodes and logical links on the top of existing network but the network defines addressing, routing and service model for communication b/w hosts. Some applications in which overlay networks are distributed systems such as cloud computing, peer-to-peer networks, and client-server applications. It is used in designing own environment like data routing and file sharing management. In this paper we will discuss various parameters which effect the performance of managed overlays.
Category: Digital Signal Processing

[66] viXra:1208.0159 [pdf] submitted on 2012-08-19 02:25:55

Distribution Transformer Random Transient Suppression using Diode Bridge T-type LC Reactor

Authors: Leong Bee Keoh, Mohd Wazir Mustafa, Sazali P. Abdul Karim
Comments: 8 Pages.

A new application of diode bridge T-type LC reactor as the transient suppressor for distribution transformer is presented. The proposed transient suppressor is effective in reducing the peak overvoltage and voltage steepness by a factor of two. The transient suppressor is connected to the upstream of the protected transformer to mitigate transients induced by lightning. The approach developed enables one to construct a simple and low cost transient suppressor with negligible effects on the systems steady state operation. The proposed transient suppressor is numerically tested using simulation package PSCAD.
Category: Digital Signal Processing

[65] viXra:1208.0158 [pdf] submitted on 2012-08-19 02:27:08

Segmentation and Analysis of Microscopic Osteosarcoma Bone Images

Authors: Anand Jatti, S.C.Prasannakumar, Ramakanth Kumar
Comments: 10 Pages.

Characteristics of microscopic osteosarcoma bone cross section images carry essential clues for defining the important features in the bone cross section such as stroma, bone, malignant cell, myxoid matrix, artifact for different age groups and also for age related developments & diseases. The traditional approaches of bone microscopic image analysis rely primarily on manual processes with very limited number of bone samples which is very difficult to get reliable and consistent conclusions. A new method of hybrid technique of image segmentation which uses microscopic images for processing is proposed. This hybrid segmentation technique automates the bone image analysis process and is able to produce reliable results based on qualitative measurements of the features extracted from the microscopic bone images. The study of correlation of bone structural features and age related developments & diseases become feasible from large databases of bone images.
Category: Digital Signal Processing

[64] viXra:1208.0154 [pdf] submitted on 2012-08-18 12:28:32

On Demand Quality of Web Services Using Ranking by Multi Criteria

Authors: N. Rajanikanth, P.Pradeep Kumar, B. Meena
Comments: 7 Pages.

In the Web database scenario, the records to match are highly query-dependent, since they can only be obtained through online queries. Moreover, they are only a partial and biased portion of all the data in the source Web databases. Consequently, hand-coding or offline-learning approaches are not appropriate for two reasons. First, the full data set is not available beforehand, and therefore, good representative data for training are hard to obtain. Second, and most importantly, even if good representative data are found and labeled for learning, the rules learned on the representatives of a full data set may not work well on a partial and biased part of that data set.
Category: Digital Signal Processing

[63] viXra:1208.0153 [pdf] submitted on 2012-08-18 12:51:08

Failure Modes in Embedded Systems and Its Prevention

Authors: Samitha Khaiyum, Y S Kumaraswamy
Comments: 5 Pages.

Systems failures do not occur in a vacuum; while a single event may trigger the failure, investigation often reveals that a history of managerial and technical decisions produce conditions turning a single event into a disaster. At the minimum, investigating case studies provides lessons on what to avoid. By systematic studies of failure, it may be possible to draw general conclusions and improve practice as a whole. Unfortunately, good systems failure studies are rare. Embedded systems failure is a volatile topic and the field is filled with a vast amount of noise, urban myth, and political agendas.
Category: Digital Signal Processing

[62] viXra:1208.0152 [pdf] submitted on 2012-08-18 12:55:38

Lobar Fissure Extraction in Isotropic CT Lung Images - An Application to Cancer Identification

Authors: T.Manikandan, N. Bharathi
Comments: 5 Pages.

The essential organ for respiration and inspiration of human beings are Lungs. It consists of five distinct lobes which are separated by three fissures (the boundaries of lung lobes are the areas containing fissures and having absence of bronchial trees). They are two oblique (left and right) fissures and one horizontal fissure. The left lung consist of left oblique fissure which separates the superior and middle lobes. The right lung consist of right oblique fissure which separates superior and middle lobes and right horizontal fissure which separates middle and inferior lobes. The identification of the lobar fissures in isotropic Computed Tomography (CT) images are very difficult even for the experienced surgeons because of its variable shape and appearance along with low contrast and high noise association with it. Further the fissure thickness is observed to be around 2 pixels (approximately 1.2mm) complicates the fissure identification. The identification of lobar fissure in CT images will be helpful for the surgeon to identify the cancer location before they plan for surgery. The surgical removal of the diseased lung is the final stage for treating the lung cancer. Therefore it is necessary to find the cancer location at the early stage to treat it. This paper presents an automated method to extract the left and right oblique fissures from the CT lung images. The proposed method is implemented in two phases. In the first phase, the fissure region is located. In the second phase, the found lobar fissures are extracted. The obtained results show that the proposed work can help the surgeon to identify the cancer location.
Category: Digital Signal Processing

[61] viXra:1208.0150 [pdf] submitted on 2012-08-18 12:59:29

A New Approach to Spam Mail Detection

Authors: R. Jensi
Comments: 4 Pages.

The ever increasing menace of spam is bringing down productivity. More than 70% of the email messages are spam, and it has become a challenge to separate such messages from the legitimate ones. I have developed a spam identification engine which employs naive Bayesian classifier to identify spam. A new concept-based mining model that analyzes terms on the sentence, document is introduced. . The concept-based mining model can effectively discriminate between non-important terms with respect to sentence semantics and terms which hold the concepts that represent the sentence meaning. The proposed mining model consists of sentence-based concept analysis, document-based concept analysis similarity measure. In this paper, a machine learning approach based on Bayesian analysis to filter spam is described. The filter learns how spam and non spam messages look like, and is capable of making a binary classification decision (spam or non-spam) whenever a new email message is presented to it. The evaluation of the filter showed its ability to make decisions with high accuracy. This cost sensitivity was incorporated into the spam engine and I have achieved high precision and recall, thereby reducing the false positive rates.
Category: Digital Signal Processing

[60] viXra:1208.0149 [pdf] submitted on 2012-08-18 13:00:37

Access Control for Healthcare Data Using Extended XACML-SRBAC Model

Authors: A. A. Abd EL-Aziz, A.kannan
Comments: 4 Pages.

In the modern health service, data are accessed by doctors and nurses using mobile, Personal Digital Assistants, and other electronic handheld devices. An individual’s health related information is normally stored in a central health repository and it can be accessed only by authorized doctors. However, this Data is prone to be exposed to a number of mobile attacks while being accessed. This paper proposes a framework of using XACML and XML security to support secure, embedded and fine-grained access control policy to control the privacy and data access of health service data accessed through handheld devices. Also we consider one of the models, namely Spatial Role-based access control (SRBAC) and model it using XACML.
Category: Digital Signal Processing

[59] viXra:1208.0148 [pdf] submitted on 2012-08-18 13:02:50

New Algorithm “DRREQ” Applied in AODV Route Discovery Mechanism for Energy Optimization in Mobile Ad hoc Networks

Authors: A.A.Boudhir, M. Bouhorma, M. Ben Ahmed, Elbrak Said
Comments: 6 Pages.

In Mobile Ad hoc Networks, The route discovery mechanism utilize simple flooding method, where a mobile node massively rebroadcasts received route request (RREQ) packets until a route to destination is established. This can cause more retransmissions and thus excessive energy consumption. This work aims to reduce the number of messages RREQ (Route Request), by a new probabilistic and dichotomic method for the discovery of destination. This method can significantly reduce the number of RREQ packets transmitted during route discovery operation. Our simulation analysis can result in significant performance improvements in terms of energy. We propose a new probabilistic algorithm DRREQ (Dichotomic Route Request) which minimize significantly the energy consumption. Extensive simulations have been carried out for evaluation of the performance of our algorithm in different scenarios.
Category: Digital Signal Processing

[58] viXra:1208.0147 [pdf] submitted on 2012-08-18 13:03:56

Pixel Level Satellite Image Fusion Using Component Substitution Partial Replacement

Authors: Asha G, Annes Philip
Comments: 10 Pages.

Image fusion is capable of integrating different imagery to produce more information than can be derived from a single sensor. Preservation of spectral information and enhancement of spatial resolution are regarded as important issues in remote sensing satellite image fusion. In this paper, a component substitution partial replacement is proposed to merge a high-spatial-resolution panchromatic (PAN) image with a multispectral image. This method generates high-/low-resolution synthetic component images by partial replacement and uses statistical ratio-based high-frequency injection. Remote sensing satellite image, such as IKONOS-2 were employed in the evaluation. Experiments showed that this approach can resolve spectral distortion problems and successfully conserve the spatial information of a PAN image. Thus, the fused image obtained from the proposed method gave higher fusion quality than the images from some other methods.
Category: Digital Signal Processing

[57] viXra:1208.0141 [pdf] submitted on 2012-08-18 21:31:11

Representing System Processes using the Actor Model / Processor Net

Authors: Anthony Spiteri Staines
Comments: 11 Pages.

This paper describes the issue that modern systems, being composed of multiple components, have certain processing requirements that need to be properly addressed. Unfortunately very few models and notations provide for the idea of process modeling. For this purpose, separate notations have to be used. This work proposes the use of notations that have a specific focus on process modeling concepts. The solution is to use the Actor Model/ Processor Net. The solution is taken a step further by suggesting the use of Processor Network Patterns. These can be useful for describing and categorizing typical behavior in different types of systems.
Category: Digital Signal Processing

[56] viXra:1208.0140 [pdf] submitted on 2012-08-18 21:32:21

An Evolutionary Algorithm for Mining Association Rules Using Boolean Approach

Authors: G.Ravi Kumar, G.A. Ramachandra, G.Sunitha
Comments: 6 Pages.

Frequent pattern mining is one of the active research themes in data mining. It plays an important role in all data mining tasks such as clustering, classification, prediction, and association analysis. Identifying all frequent patterns is the most time consuming process due to a massive number of patterns generated. A reasonable solution is identifying efficient method to finding frequent patterns without candidate generation. In this paper, we present An Evolutionary algorithm for mining association rules using Boolean approach for mining association rules in large databases of sales transactions. Traditional association rule algorithms adopt an iterative method to discovery, which requires very large calculations and a complicated transaction process. Because of this, a new association rule algorithm is proposed in this paper. This new algorithm scanning the database once and avoiding generating candidate itemsets in computing frequent itemset and adopts a Boolean vector “relational calculus” method to discovering frequent itemsets. Experimental results show that this algorithm can quickly discover frequent itemsets and effectively mine potential association rules.
Category: Digital Signal Processing

[55] viXra:1208.0139 [pdf] submitted on 2012-08-18 21:33:29

Joint Design of Cluster-Based Hierarchical Networking Architecture and Key Management System for Heterogeneous Wireless Sensor Networks

Authors: McKenzie McNeal III, Wei Chen, Sachin Shetty
Comments: 18 Pages.

Current communication protocols used for Wireless Sensor Networks (WSNs) have been designed to be energy efficient, low redundancy in sensed data, and long network lifetime. One major issue that must be addressed is the security of data communication. Due to the limited capabilities of sensor nodes, designing security-based communication protocols present a difficult challenge. Since commonly used encryption schemes require high time complexity and large memory, achieving security for WSNs needs unique approaches. In this paper, we consider a heterogeneous wireless sensor network (HWSN), where while most nodes are resource limited a few nodes can have more energy, stronger processing capability and longer communication range and can be used to relax the resource bottleneck. We propose a joint design approach that can best use the benefit that a HWSN brings. We first design a reconfigurable hierarchical networking architecture, where the HWSN is divided by the high-end nodes into regions, the low-end nodes in each region are divided by clusters, and high-end nodes and cluster heads form a communication/relay backbone. We then design a key management system that uses both public and symmetric key cryptography above the hierarchical networking architecture which requires very small number of security keys. The evaluation and simulation results show that by using the proposed networking architecture and key management scheme only a small amount of keys needs to be preloaded before deployment and stored after key setup to achieve secured communication throughout the entire network.
Category: Digital Signal Processing

[54] viXra:1208.0138 [pdf] submitted on 2012-08-18 21:34:21

Secure Control of Remote Electrical Devices Using Mobile SMS Services

Authors: Kishor T. Mane, G.A. Patil
Comments: 9 Pages.

In this paper an attempt is made to extend the capability of mobile phones for secure control of remote electrical devices using SMS services. The transmission of SMS in GSM network is not secure. It only provides the encryption between Mobile Station to Base Station Controller. The message transmitted between GSM operator networks is not encrypted and hence is not safe. Mobile SMS service has been used for control purposes in various applications; but the control operations seem not to be secured. Therefore, it is desirable to secure SMS by adding suitable cryptographic algorithm so as to perform operations securely on certain crucial remote devices. In this system blowfish algorithm has been enhanced for its suitability to increase the security on the parameters like Avalanche effect, GA, key-size, and others. The results obtained are far better in above terms.
Category: Digital Signal Processing

[53] viXra:1208.0137 [pdf] submitted on 2012-08-18 21:35:49

Computer Viruses in UNIX Environment: Case Study

Authors: Asmaa Shaker Ashoor, Sharad Gore, Vilas Kharat
Comments: 11 Pages.

All of people who don’t know how to use a computer have heard a bout viruses through programs such as hackers and some means like that. There is no doubt that our culture is fascinated by the potential danger of these viruses. Computer virus have become threat to computer users and almost every field in the advance technology industrial nowadays. Know about virus is very necessary for anti-virus researchers as well as operating systems makers. With the development of the open source systems today, computer viruses on these systems should be considered strictly. The goal of this paper is to present my concept of classification virus computer in UNIX environment. This paper provides some subjective comments on some of the most widely known environment and some methods available to protect UNIX today. propose some viruses that can work on this environment and suggest some methods to prevent as well as restrain damages of these viruses.
Category: Digital Signal Processing

[52] viXra:1208.0136 [pdf] submitted on 2012-08-18 21:38:30

Modeling Uml2 Activity Diagram by Using Graph Transformation Systems and Abstract State Machine

Authors: Somayeh Azizi, Vahid Panahi
Comments: 15 Pages.

Graphs and diagrams provide a simple and powerful approach variety of problems that are typical to computer science, for example for activities. In software development visual notation are used for modeling that including activity diagram, class diagram, control flow, graphs and some another diagrams. Models based on these notation can be seen a graph and graph transformation are involved. So Abstract State Machine (ASM) is a modern computation model. ASM based tools are used to academia and industry, albeit on a modest scale. They allow we to give high-level operational semantics to computer artifacts and to write executable specifications of software and hardware at the desired abstraction level. The token flow semantics of UML2 activity diagrams is formally defined using Abstract State Machines and Graph Transformation System. The state of the art in semantics for UML2 activity diagrams covers three distinct approaches: mapping to Petri-nets, using graph transformation rules, or providing pseudo-code. ASM using pseudo- code and graph transformation system using graph transformation rules for determining semantics. A major goal of this paper is ability to determine the correctness behavior and formal semantics of UML2 activity diagram by Graph Transformation System and Abstract state machine.
Category: Digital Signal Processing

[51] viXra:1208.0135 [pdf] submitted on 2012-08-18 21:39:40

A Brief Study on Human Bone Anatomy and Bone Fractures

Authors: N.Umadevi, S.N.Geethalakshmi
Comments: 12 Pages.

The rapid and continuing progress in computerized medical image reconstruction and the associated developments in analysis methods and computer-aided diagnosis have propelled medical imaging as one of the most important sub-fields in scientific imaging. One important area is the fracture detection from x-ray images, where automated tools are used to detect fractures. In order to develop an automated fracture detection system, a clear understanding of human skeletal system, bone and fractures is required. This paper provides description on each of these topics.
Category: Digital Signal Processing

[50] viXra:1208.0134 [pdf] submitted on 2012-08-18 21:40:38

Towards Optimizing Learning Paths in a System e-Learning Adaptive Application of Ant Algorithm (Aco)

Authors: Samir ALLACH, Mohammad ESSAAIDI, Mohamed BEN AHMED
Comments: 11 Pages.

Adaptive E-learning, refers to a training concept in which technology is introduced step by step in all aspects of the business of training. A technique, inspired by the Ant Colony Optimization (ACO), is proposed to optimize the learning path. The proposed platform is modeled by a graph where nodes represent the educational elements (lessons or exercises), and arcs link navigation between them. Each of the arcs is also a value that describes its importance in relation to teaching neighboring arcs. Students are represented by virtual agents (ants) who use these links.
Category: Digital Signal Processing

[49] viXra:1208.0133 [pdf] submitted on 2012-08-18 21:42:29

Scheduling Algorithm for Beacon Safety Message Dissemination in Vehicular Ad-hoc Networks Increasing QoS

Authors: Mohammad Ali azimi, Mohamad reza Ramezanpor
Comments: 9 Pages.

In this paper we address one research challenges in vehicular ad hoc networks (VANETs), Safety message dissemination as follows. We investigate the quality of service for beacon based safety applications in VANETs. We point out the fact that safety applications have some distinctiveness which is not addressed in the current literature. We therefore propose a new metric focusing on the significance of coverage in safety scenarios called effective range which is based on the satisfaction of very restrict quality of service. We also emphasis that beacon based safety applications may tolerate some message loss Beacon safety message dissemination in Vehicular Ad-hoc Networks (VANETs) suffers from poor reliability especially in congested road traffics. The main origin of this problem is CSMA nature of Dedicated Short Range Communications (DSRC) in MAC layer. In this paper, a scheduling algorithm in the application layer is proposed to alleviate the problem. We first divide the road into a number of geographical sections. In each section, we form a cluster between moving vehicles. Then we perform a scheduling algorithm including two levels. In the first level, nonadjacent clusters can transmit at the same time. While the second level of scheduling deals with inside of each cluster in which we implement a TDMA-like approach. Simulation results show that the proposed algorithm improves the reliability in beacon message dissemination. Moreover, the accuracy of the information which each vehicle can obtain from its neighboring vehicles is significantly increased. Thus the proposed scheduling scheme leads to considerable enhancement of the safety level provided by Beacon Safety Messages (BSMs).
Category: Digital Signal Processing

[48] viXra:1208.0132 [pdf] submitted on 2012-08-18 21:43:36

Stuttered Speech: An Acoustic Study

Authors: Virupakashipura Krishna Tara, Kempahanumiah Muniswamappa Ravi Kumar
Comments: 8 Pages.

The purpose of this study is to compare the duration characteristic of individual words and entire Passage in the speech of adults who stutter (S=10) recorded near the onset of their stuttering to those of controlled nonstuttering adults (C=10). Stuttered speech was identified in digital recordings of the clients read speech. The digitized signals were analyzed by means of Cool Edit Pro software. Using visual displays of sound spectrograms, the durations of individual words (including repeated words) in the passage and entire passage duration were analyzed. In this work 80% of data were used for training and remaining 20% for testing over all accuracy.
Category: Digital Signal Processing

[47] viXra:1208.0131 [pdf] submitted on 2012-08-18 21:44:33

The Proposal of a New Image Inpainting Algorithm

Authors: Ouafek Naouel, M. Khiredinne Kholladi
Comments: 7 Pages.

In the domain of image inpainting or retouching, many recent works focus on combining methods of different fields of research in order to obtain more accurate results, and more original images. In this paper we propose a new algorithm that combines three different methods, each one represent a separate field. The first one for the use of artificial intelligence, the second one for the use of the partial differential equation (PDE) and the last one for the use of texture synthesis to reconstruct damages images.
Category: Digital Signal Processing

[46] viXra:1208.0130 [pdf] submitted on 2012-08-18 21:45:40

MS: Multiple Segments with Combinatorial Approach for Mining Frequent Itemsets Over Data Streams

Authors: K Jothimani, S. Antony Selvadoss Thanmani
Comments: 9 Pages.

Mining frequent itemsets in data stream applications is beneficial for a number of purposes such as knowledge discovery, trend learning, fraud detection, transaction prediction and estimation. In data streams, new data are continuously coming as time advances. It is costly even impossible to store all streaming data received so far due to the memory constraint. It is assumed that the stream can only be scanned once and hence if an item is passed, it can not be revisited, unless it is stored in main memory. Storing large parts of the stream, however, is not possible because the amount of data passing by is typically huge. In this paper, we study the problem of finding frequent items in a continuous stream of items. A new frequency measure is introduced, based on a variable window length. We study the properties of the new method, and propose an incremental algorithm that allows producing the frequent itemsets immediately at any time. In our method, we used multiple s egments for handling different size of windows. By storing these segments in a data structure, the usage of memory can be optimized. Our experiments show that our algorithm performs much better in optimizing memory usage and mining only the most recent patterns in very less time.
Category: Digital Signal Processing

[45] viXra:1208.0129 [pdf] submitted on 2012-08-18 21:51:23

Wireless Sensor Network

Authors: Madhav Bokare, Anagha Ralegaonkar
Comments: 7 Pages.

Sensor networks are expected to play an essential role in the upcoming age of pervasive computing. Due to their constraints in computation, memory, and power resources, their susceptibility to physical capture, and use of wireless communications, security is a challenge in these networks. In this paper we just take a glance at the wireless technology and take a tour of wireless sensor networks. This paper gives brief outline related to wireless sensor network and its applications in various fields. Also we have given the software and hardware platforms for wireless sensor network. Also we mentioned the possible attacks on the WSN and their countermeasures. Finally we have pointed out that for designing a sensor network one must build a mechanism which is secure from external attackers.
Category: Digital Signal Processing

[44] viXra:1208.0128 [pdf] submitted on 2012-08-18 21:53:34

Identification of Corneal Aberrations by Using Computer Techniques

Authors: Baki Koyuncu, Pınar Kocabaşoğlu
Comments: 8 Pages.

The objective was to study the relative contributions of optical aberrations of the cornea and determine the irregularities across its surface area. Corneal topographic imaging data is used and corneal aberrations are computed by using corneal height maps. Mathematical modeling of cornea surface is developed by using Zernike polynomials and they are compared with the patient corneas. Simulation techniques are utilized to determine the amount of corrections with respect to an ideal cornea in computer environment.
Category: Digital Signal Processing

[43] viXra:1208.0127 [pdf] submitted on 2012-08-18 21:54:50

Additive Features in Mobile Short Messaging Services with Specific Refrence to Reminders and Formatting

Authors: Niky K. Jain, Kamini H. Solanki
Comments: 8 Pages.

The exponential growth of the Short Message Service (SMS) use has transformed this service in a widespread tool for social and commercial messaging. It is one of the highly used and well-tried mobile services with global availability within all GSM networks. This paper represents both text formatting features and how the mobile message can be sent at particular date and time to the Short Message Service Centre (SMSC) in advance. Message text is formatted with different looks as done in MS-word which attract the person to use SMS. As a input parameter for text formatting, user have to select the text and give the desire output by selecting different controls. We can add the extra features with formatted text , is sending SMS with particular date and time given by sender. The input parameter for conditionally applied message, will go inside to satisfy the different conditions. If the conditions satisfy it will give desired output and that output will be sent to receiver message mobile number. And on client side we can generate the conditions and the desired solution. Desired input data of the record which satisfy the condition and then it sends to the mobile message automatically and stores all the information into the databases for a particular message. Its input will be stored into a file. Our mobile scripting language supports DSN –less connectivity. It takes the current path of the input file from the storage card or phone memory from where it will stores the information. Controlling of SMS can be done by putting restrictions for particular date and time of mobile message; due to SMS operator for sending mobile message. Our software supports scripting language and database also. Write the message into the body and using DSN-LESS database in the form of record as per the requirements and condition of the columns. In the background the script will take care of database connection.
Category: Digital Signal Processing

[42] viXra:1208.0126 [pdf] submitted on 2012-08-18 21:56:02

QoS Routing for Heterogeneous Mobile Ad Hoc Networks

Authors: Mohammed Abdul Waheed, K Karibasappa
Comments: 5 Pages.

Ad hoc networks which have seen drastic increase in their usage scenarios and convergence of different applications. Efficient routing is very important for mobile ad hoc networks. Existing protocols for ad hoc networks provide little support for QoS and security. In many ad hoc networks, multiple types of nodes do coexist; and some nodes have larger transmission power, higher transmission data rate, better processing capability and are more robust against bit errors and congestion than other nodes. Hence, a heterogeneous network model is more realistic and provides many advantages We present a new routing protocol called QoS routing, which is specifically designed for heterogeneous Mobile Ad Hoc Networks. QoS routing utilizes the more powerful nodes as backbone nodes (B nodes). The routing area is divided into several small, equal-sized cells. One B-node is maintained in each cell, and the routing among B-node is very efficient and simply based on location information and cell structure. A source discovers a route to destination in an on-demand way, and most of the routing activities are among B-nodes. This reduces the number of routing hops and makes the routing more efficient and reliable, since B-nodes have large bandwidth, transmission range, and are more reliable.
Category: Digital Signal Processing

[41] viXra:1208.0125 [pdf] submitted on 2012-08-18 21:57:25

Zernike Moments and Neural Networks for Recognition of Isolated Arabic Characters

Authors: Mustapha Oujaoura, Rachid El Ayachi, Mohamed Fakir, Belaid Bouikhalene, Brahim Minaoui
Comments: 9 Pages.

The aim of this work is to present a system for recognizing isolated Arabic printed characters. This system goes through several stages: preprocessing, feature extraction and classification. Zernike moments, invariant moments and Walsh transformation are used to calculate the features. The classification is based on multilayer neural networks. A recognition rate of 98% is achieved by using Zernike moments.
Category: Digital Signal Processing

[40] viXra:1208.0124 [pdf] submitted on 2012-08-18 21:58:17

Minimizing the Broadcast Routing in the Computer Networks

Authors: Ahmed Younes
Comments: 7 Pages.

In the computer networks, it is necessary for one device in the computer network to send data to all the other devices. In this paper, broadcast routing algorithms that aim to minimize the cost of the routing path are proposed. A minimum cost broadcast routing scheme based on spanning tree algorithm is presented. Thus, we present a genetic algorithm to find the broadcast routing tree of a given network in terms of its links for using it to solve this problem. The algorithm uses the connection matrix of a given network to find the spanning trees, and also is based on the weight of the links to obtain the minimum spanning tree. An example is provided to illustrate the effectiveness of this algorithm over conventional algorithms.
Category: Digital Signal Processing

[39] viXra:1208.0123 [pdf] submitted on 2012-08-18 21:59:26

Non-Destructive Quality Analysis of Indian Gujarat-17 Oryza Sativa SSP Indica(rice) Using Image Processing

Authors: Chetna V. Maheshwari, Kavindra R. Jain, Chintan K. Modi
Comments: 7 Pages.

The Agricultural industry on the whole is ancient so far. Quality assessment of grains is a very big challenge since time immemorial. The paper presents a solution for quality evaluation and grading of Rice industry using computer vision and image processing. In this paper basic problem of rice industry for quality assessment is defined which is traditionally done manually by human inspector. Machine vision provides one alternative for an automated, non-destructive and cost-effective technique. With the help of proposed method for solution of quality assessment via computer vision, image analysis and processing there is a high degree of quality achieved as compared to human vision inspection. This paper proposes a new method for counting the number of Oryza sativa L (rice seeds) with long seeds as well as small seeds using image processing with a high degree of quality and then quantify the same for the rice seeds based on combined measurements.
Category: Digital Signal Processing

[38] viXra:1208.0122 [pdf] submitted on 2012-08-18 22:00:24

Trip Distribution Model for Delhi Urban Area Using Genetic Algorithm

Authors: Shivendra Goel, J.B. Singh, Ashok K. Sinha
Comments: 8 Pages.

As the society evolves it generates transport demand. An estimate of the volume of trips between zones is a necessary step in transportation studies. The classical transportation planning methods are based on simple extrapolation of trends. Some mathematical models like linear programming models have also been used by researchers for estimating traffic generation for future period. This paper presents a model for trip distribution in Delhi Urban Area using Genetic Algorithm. This model has been used for trip distribution in all zones of Delhi Urban Area. This model is applied on the real set of data on passengers trips generated and passengers trips attracted in all zones of Delhi Urban Area, which in turn gives satisfactory results which can be applicable in current and future scenarios. This work analyzes and compares the result of this model with Linear programming model for trip distribution.
Category: Digital Signal Processing

[37] viXra:1208.0121 [pdf] submitted on 2012-08-18 22:01:30

Design and Automation of Security Management System for Industries Based On M2M Technology

Authors: Swathi Bhupatiraju, T J V Subrahmanyeswara Rao
Comments: 8 Pages.

Security Management at the industries is very important requirement, especially at night times. Security people always needed to monitor the industries sites. Somebody should present always in onsite to protect industry from thievery. In this paper an idea of protecting industry is by automating industry security system is presented. The idea developed using ARM processor which is an industry leading embedded processor and a GUI is developed which is very useful for remote monitoring and collecting information. To attain reliability the improvement of the security level with the help of GSM based wireless technology which consists of transmitter (GSM modem) at the site location and receiver is the GSM mobile. Information transmitted by the GSM modem at the plant location will be sent to the respective person’s mobile as a text message.
Category: Digital Signal Processing

[36] viXra:1208.0120 [pdf] submitted on 2012-08-18 22:02:27

A Study on Digital Forensics Standard Operation Procedure for Wireless Cybercrime

Authors: Yun-Sheng Yen, I-Long Lin, Annie Chang
Comments: 14 Pages.

With the increases growth of Internet users and the development of new technologies, current legislations and security has faced difficulties in trying to keep up, hence cybercrime numbers are increased rapidly. Although wireless cybercrime is a new threat, but with the detail tracking and investigation effort, ultimately the professional will find some kind of digital evidence, and its often required to identify and preserve in order to be recognized and restoring the truth, hence the establishment of trainings in digital evidence through to forensic requires immediate implementation, with increase of the standards and knowledge it will strength the competence and credibility of the forensics unit’s professional ability in assistance to fight again all crime.
Category: Digital Signal Processing

[35] viXra:1208.0119 [pdf] submitted on 2012-08-18 22:03:30

Formalization of the Wolof with Nooj: Implementation on the Wolof Dictionary

Authors: Haby Diallo, Alex Corenthin, Claude Lishou
Comments: 17 Pages.

This paper introduces the NooJ module for the Wolof language and the implemented electronic dictionary. the linguistic resources used are common usage dictionaries including Arame Fall’s and Jean Léopold Diouf’s dictionaries, as well as the Wolof lexicon available at CLAD (Centre de linguistique Appliquée de Dakar). The present work will first focus on the socio-linguistic situation of the Wolof language while describing its alphabet before, in a second part, introducing the complex morphology of this language. The third part will be devoted to explaining how the core of the dictionary has been constructed and describing the flexional and derivation rules used to implement it in NooJ. Finally, the first results achieved with NooJ will be presented.
Category: Digital Signal Processing

[34] viXra:1208.0118 [pdf] submitted on 2012-08-18 22:04:29

Non Destructive Quality Evaluation of Nicotiana Tabacum Using Off-Line Machine Vision

Authors: Latesh N. Patel, Kavindra R. Jain, Hitesh B. Shah, Chintan K. Modi
Comments: 7 Pages.

A number of techniques have been proposed in the past for automatic quality evaluations of pre-processed tobacco using image processing. Although some studies have aimed to evaluate the quality of processed tobacco. There is no automatic system that is capable of evaluating the processed tobacco. This paper proposes a new method for counting the number of normal Chewing tobacco (Nicotiana tabacum) as well as foreign elements using machine vision. By proposed method a quality evaluation of processed chewing tobacco can be done which would be very beneficial for the purpose of its quality which is ready to be eat product.
Category: Digital Signal Processing

[33] viXra:1208.0117 [pdf] submitted on 2012-08-18 22:05:25

Mapclim System :Early Warning Mechanisms to Climate Change in Africa

Authors: Alassane Diop, Antoine Goundjo
Comments: 11 Pages.

This work is carried out within the framework of the implementation of innovative technological applications to facilitate the resolution of development issues raised by climate changes. It describes the architecture used for the design of MapClim, a free system of access intended for the collection, systematic monitoring and diffusion of the data with the creation of capacities of community and national answer. Thus, it enables to establish a permanent waking state and to take fast and efficient actions in favour of the adaptation to the climate change. Our article, in the light of data, indicators and process charts, presents the results on the effects of the climate change in West Africa.
Category: Digital Signal Processing

[32] viXra:1208.0116 [pdf] submitted on 2012-08-19 00:03:54

Future Research Directions in Skyline Computation

Authors: R.D. Kulkarni, B.F. Momin
Comments: 11 Pages.

The purpose of this paper is to put focus on the current trends in the area of skyline computation which is a computational trend related to database research community and also to highlight the further research directions in the same. In recent years, the skyline queries or skyline computations have been used in many advanced applications such as location based queries originated from the mobile phones. Although the concept of skyline computation originated from centralized database environment, as the application needs grew, the concept has been applied successfully to modern computational environments like distributed networks, real time systems, mobile ad hoc networks etc. This paper aims at unfolding the various recent methodologies used till now, for the skyline computation and then highlights the future research directions in this area.
Category: Digital Signal Processing

[31] viXra:1208.0115 [pdf] submitted on 2012-08-19 00:04:55

Information Retrieval in Intelligent Systems: Current Scenario & Issues

Authors: Sudhir Ahuja, Rinkaj Goyal
Comments: 8 Pages.

Web space is the huge repository of data. Everyday lots of new information get added to this web space. The more the information, more is demand for tools to access that information. Answering users’ queries about the online information intelligently is one of the great challenges in information retrieval in intelligent systems. In this paper, we will start with the brief introduction on information retrieval and intelligent systems and explain how swoogle, the semantic search engine, uses its algorithms and techniques to search for the desired contents in the web. We then continue with the clustering technique that is used to group the similar things together and discuss the machine learning technique called Self-organizing maps [6] or SOM, which is a data visualization technique that reduces the dimensions of data through the use of self-organizing neural networks. We then discuss how SOM is used to visualize the contents of the data, by following some lines of algorithm, in the form of maps. So, we could say that websites or machines can be used to retrieve the information that what exactly users want from them.
Category: Digital Signal Processing

[30] viXra:1208.0114 [pdf] submitted on 2012-08-19 00:05:53

Encoding Time Reduction Method for the Wavelet Based Fractal Image Compression

Authors: Jyoti Bhola, Simarpreet Kaur
Comments: 8 Pages.

In this paper we show the two implementations of fractal (Pure-fractal and Wavelet fractal image compression algorithms) which have been applied on the images in order to investigate the compression ratio and corresponding quality of the images using peak signal to noise ratio (PSNR). And in this paper we also set the threshold value for reducing the redundancy of domain blocks and range blocks, and then to search and match. By this, we can largely reduce the computing time. In this paper we also try to achieve the best threshold value at which we can achieve optimum encoding time
Category: Digital Signal Processing

[29] viXra:1208.0113 [pdf] submitted on 2012-08-19 00:07:02

Depth-Wise Segmentation of 3D Images Using Entropy

Authors: S. S. Mirkamali, P. Nagabhushan
Comments: 9 Pages.

Recent advances in 3D modeling and depth estimation of objects have created many opportunities for multimedia computing. Using depth information of a scene enables us to propose a brand new segmentation method called Depth-Wise segmentation. Unlike the conventional image segmentation problems which deal with surface-wise decomposition, the depth-wise segmentation is a problem of slicing an image containing 3D objects in a depth-wise sequence. The proposed method uses entropy of a depth image to characterize the edges of objects in a scene. Later, obtained edges are used to find Line-Segments. By linking the line-segments based on their object and layer numbers, Objects-Layers are achieved. To test the proposed segmentation algorithm, we use syntactic images of some 3D scenes and their depth maps. The experiment results show that our method gives good performance.
Category: Digital Signal Processing

[28] viXra:1208.0112 [pdf] submitted on 2012-08-19 00:08:13

Single Machine Scheduling Problem under Fuzzy Processing Time and Fuzzy Due Dates

Authors: Vikas S. Jadhav, V. H. Bajaj
Comments: 8 Pages.

In this paper, we propose n-jobs to be processed on Single Machine Scheduling Problem (SMSP) involving fuzzy processing time and fuzzy due dates. The different due dates for each job be considered which meet the demand of customer with more satisfaction level. The main objective of this paper is the total penalty cost to be minimum in the schedule of the jobs on the single machine. This cost is composed of the total earliness and the total tardiness cost. Here, an algorithm is developed using Average High Ranking Method (AHRM) which minimizes the total penalty cost due to earliness (lateness) of jobs in fuzzy environment. Finally, numerical example is given to illustrate proposed method.
Category: Digital Signal Processing

[27] viXra:1208.0111 [pdf] submitted on 2012-08-19 00:09:18

An Analysis of Packet Fragmentation Attacks vs. Snort Intrusion Detection System

Authors: Tian Fu, Te-Shun Chou
Comments: 12 Pages.

When Internet Protocol (IP) packets travel across networks, they must meet size requirements defined in the network’s Maximum Transmission Unit (MTU). If the packet is larger than the defined MTU, then it must be divided into smaller pieces, which are known as fragments. Attackers can exploit this process for their own purposes by attacking the systems. Packet fragmentation attacks have caused problems for Intrusion Detection Systems (IDSs) for years. In this paper, Snort IDS was tested. VMware virtual machines were used as both the host and victim. Other tools were also implemented in order to generate attacks against the IDS. The experiment results show the performance of Snort IDS when it was being attacked, and the ability of Snort to detect attacks in different ways.
Category: Digital Signal Processing

[26] viXra:1208.0107 [pdf] submitted on 2012-08-19 00:19:13

Simulation Study For Performance Comparison in Hierarchical Network With CHG Approach in MANET

Authors: Anzar ahamd, R. Gowri, S.C.Gupta
Comments: 14 Pages.

The implementation of MANET for commercial purposes is not an easy task. Unlike other wireless technologies such as cellular networks, MANET face more difficult problems concerning management functions, routing and scalability . As a solution to these complications, clustering schemes are proposed for MANET in order to organize the network topology in a hierarchical manner. Many clustering techniques have been developed. Clustering is a method which aggregates nodes into groups . These groups are contained by the network and they are known as clusters. By Increasing network capacity and reducing the routing overhead through clustering brings more efficiency and effectiveness to scalability in relation to node numbers and the necessity for high mobility. The manager node,in clustering has responsibility for many functions such as cluster maintenance, routing table updates, and the discovery of new routes within the network. The other node named as gateway node communicate to the other cluster . In this paper we remove the cluster head (CH) and given a new approach in which cluster head and gateway will be same and that node is known as cluster head gateway (CHG) ,in which all the responsibilities of cluster head and gateway will be perform by the Cluster head gateway(CHG) itself . By applying this approach we reduce of overheads and improve the over all performance of the network while throughput will be same in both condition with the help of Exata simulation.
Category: Digital Signal Processing

[25] viXra:1208.0106 [pdf] submitted on 2012-08-19 00:22:16

Object Detection in a Fixed Frame

Authors: Debjyoti Bagchi, Dipaneeta Roy Chowdhury, Satarupa Das
Comments: 9 Pages.

This paper presents an approach to the detection of objects in a fixed frame. In this approach, an acoustic sensor is used for detecting any change in the surrounding of a fixed frame, i.e. detecting the entry of a foreign object. If it so happens, then the sensor sends a signal to the system which is processed. If the sampling result crosses the fixed threshold then the camera is switched on. It clicks a snapshot and then again is switched off. With this snapshot, we operate frame difference against an initially stored snapshot of the fixed frame. Based on the difference, we determine the nature and type of the foreign object.
Category: Digital Signal Processing

[24] viXra:1208.0105 [pdf] submitted on 2012-08-19 00:23:26

Semantic web based Sensor Planning Services (SPS) for Sensor Web Enablement (SWE)

Authors: P.Udayakumar, M.Indhumathi
Comments: 15 Pages.

The Sensor Planning Service (SPS) is service model to define the web service interface for requesting user driven acquisitions and observation. It’s defined by the Open Geospatial Consortium (OGC) Sensor Web Enablement (SWE) group to provide standardized interface for tasking sensors to allow to defining, checking, modifying and cancelling tasks of sensor and sensor data. The goal of Sensor Planning Service (SPS) of OGC – SWE is standardize the interoperability between a client and a server collection management environment. The Sensor Planning Service (SPS) is need to automate complex data flow in a large enterprises that are depend on live & stored data from sensors and multimedia equipment. The obstacle are faced in Sensor Planning Service (SPS) are (I) Observation from sensor at the right time and right place will be problem, (II) acquisition information(data) that are collected at a specific time and specific place will be problem. The above two obstacle are accomplished and obtained by the web based semantic technology in order to provide & apply the ontology based semantic rule to user driven a acquisitions and observation of Sensor Planning Service (SPS). The novelty of our approach is by adding the semantic rule to Sensor Planning Service model in SWE and we implemented Sensor Planning Service (SPS) with semantic knowledge based to achieve high standardized service model for Sensor Planning Service (SPS) of OGC – SWE.
Category: Digital Signal Processing

[23] viXra:1208.0104 [pdf] submitted on 2012-08-19 00:24:39

High Reliable Secure Data Collection Using Complexity Exchanging Code Key Method Addressing Protocol in Wireless Sensor Network

Authors: V.jayaraj, M.Indhumathi
Comments: 12 Pages.

A Wireless Sensor Network (WSN) is emerging field in Information and communication technology. In WSN data transmission and data collection are unsecure because of sensor node Incompatibility. So providing security to Sensor network is very important. The key based Mechanism is secure data collection and it’s mainly used to guarantee data confidentiality. Range pair wise key is largely used due to the necessary of data encryption and decryption between each pair range of communication node. Fixed key mechanism difficult for the attacker to detect the regularity of the randomly generated key chain function in privacy homomorphism (PH).PH means no intermediate node to encrypt and decrypt only direct collect and aggregate data for encryption and decryption. It is special key based scheme. It’s totally based on beta distribution and some statistical tool using key code method by using Complexity exchanging code key method addressing protocol. We show how to reduce significant attacks and secure data collection on wireless sensor network.
Category: Digital Signal Processing

[22] viXra:1208.0103 [pdf] submitted on 2012-08-19 00:36:00

Performance Imrovement of a Navigataion System Using Partial Reconfiguration

Authors: S.S.Shriramwar, N.K.Choudhari
Comments: 8 Pages.

Dynamic Partial Reconfiguration (DPR) of FPGAs presents many opportunities for application design flexibility, enabling tasks to dynamically swap in and out of the FPGA without entire system interruption. In this thesis, we have implemented a line follower robot for the white line as well as for black line, both these modules are programmed in VHDL. The robot are made to run for white line and it will dynamically reconfigure the FPGA in the run-time for the black line or vice-versa. This design includes two modules one is static and the other is partially reconfigurable regions (PRR) which is a dynamic region. The controllers are the static modules used for controlling the flow of data to and from the reconfigurable modules to the external world (host environment) through busmacros. Whereas white line and black line modules are designed as dynamic modules.
Category: Digital Signal Processing

[21] viXra:1208.0102 [pdf] submitted on 2012-08-19 00:37:09

Enhancing Data Security in Medical Information System Using the Watermarking Techniques and Oracle Secure File LOBs

Authors: Said Aminzou, Brahim ER-RAHA, Youness Idrissi Khamlichi, Mustapha Machkour, Karim Afdel
Comments: 10 Pages.

In this paper, we propose an efficient digital watermarking scheme to strengthen the security level already present in the database management system and to avoid illegal access to comprehensive content of database including patient‘s information. Doctors diagnose medical images by seeing Region of Interest (ROI). A ROI of a medical image is an area including important information and must be stored without any distortion. If a medical image is illegally obtained or if its content is changed, it may lead to wrong diagnosis. We substitute the part out of ROI of LSB bitplane of the image with the patient data and a binary feature map. This latter is obtained by extracting edges of the resized image to the quarter of its size using Laplacian operator. This image is directly integrated into the database. The edge map and invariant moments are used to check the integrity of the image.
Category: Digital Signal Processing

[20] viXra:1208.0100 [pdf] submitted on 2012-08-19 01:49:41

Modified TCP Peach Protocol for Satellite based Networks

Authors: Mohanchur Sarkar, K.K.Shukla, K.S.Dasgupta
Comments: 20 Pages.

TCP has become the de-facto protocol standard for congestion control in the existing terrestrial Internet. But it was designed keeping in mind low Round Trip Time and low channel error rates typically experienced in a wired network. In this paper we have considered TCP Protocol variants like Tahoe, Reno, New Reno, SACK, FACK, Vegas, Westwood and Peach. TCP Peach is found to be better than the other TCP Protocol variants in case of satellite based networks but its performance also degrades when the packet error probability is high and in cases where there are multiple packet losses in the same window. In this paper a modification has been suggested to the existing PEACH protocol and the modified PEACH Protocol is tested to provide performance improvement especially in the cases where the packet error rate is very high. The modified Peach Protocol has been implemented in the ns2 Simulator and evaluated considering a Geo Satellite Network with varying channel conditions with all other TCP variants.
Category: Digital Signal Processing

[19] viXra:1208.0099 [pdf] submitted on 2012-08-19 01:50:28

TSRD-RL Algorithm Based Secured Route Discovery for Manet with Improved Route Lifetime

Authors: S. Priyadarsini
Comments: 16 Pages.

Ad hoc network is collections of wireless mobile devices with limited broadcast range and resources, and no fixed infrastructure. The critical issue for routing in mobile ad hoc network is how to discover a secured path with longest route lifetime and also with minimum node computation. The mobility nature, power constraint of the node and the security attacks of malicious nodes cause frequent path failure. This path failure causes frequent route discovery which affects both the routing protocol performance as well as the node computation overhead. So we propose an efficient Trust based Multipath Route Discovery with improved Route Lifetime algorithm to provide trust based solution for the Security attacks which affects the routing protocol performance. We implement the proposed algorithm in AODV and the performance is evaluated. Our protocol improves the network performance and reduces the computation overhead by avoiding frequent route discovery since we select secured stable multi paths with longest life time. With the help of network simulator we can prove that our proposed protocol performs better than the existing stability-based routing protocols with improved packet delivery ratio.
Category: Digital Signal Processing

[18] viXra:1208.0098 [pdf] submitted on 2012-08-19 01:51:18

A Novel Fuzzy Logic Solar (PV) - Grid/DG Powered Pump Controller for Efficient Water Management

Authors: San deep, Sushil Kumar Singh, P. Aditya Vardhan, Prasun Anand, S.N. Singh
Comments: 8 Pages.

Water-management is an interdisciplinary field concerned with the management and optimum utilization of water. The consumption of water is increasing due to rapid growth of population. Further due to ecological changes, the open reservoir systems water storage and its availability is shrinking every year. Thus underground source of water has become the major source of water pumped through submersible pump at domestic end. On the other end, excessive and continuous use of water through this pump may lead to depletion of water table. In order to avoid this, an optimal control system for water-management has been proposed in the present project work. This has been achieved by control ling the operational time of a solar water pump in an optimal way. An efficient fuzzy model has been proposed in simulation environment to develop such an adaptive control system and its implementation in a residential building has been studied.
Category: Digital Signal Processing

[17] viXra:1208.0097 [pdf] submitted on 2012-08-19 01:52:17

Design and Development of Simple Low Cost Rectangular Microstrip Antenna for Multiband Operation

Authors: Nagraj Kulkarni, S. N. Mulgi, S. K. Satnoor
Comments: 7 Pages.

This paper presents the design and development of simple low cost rectangular microstrip antenna for multiband operation. By incorporating U-slot of optimum geometry and open stubs at two opposite corners on the rectangular radiating patch the antenna operates between 1.815 to 9.01 GHz at different frequency bands with a virtual size reduction of 44.84% and gives broadside radiation characteristics at each operating band. By placing U-slot and open stubs at the corners, the copper area of the patch is reduced to 8.50%, when compared to the copper area of conventional rectangular microstrip antenna designed for the same frequency. The experimental and simulated results are in good agreement with each other. The design concept of antenna IS given and experimental results are discussed. The proposed antenna may find applications in mobile, WLAN, WiMax and SAR.
Category: Digital Signal Processing

[16] viXra:1208.0096 [pdf] submitted on 2012-08-19 01:53:22

Concealing Encrypted Messages using DCT in JPEG Images

Authors: Rita Chhikara, Sunil Kumar
Comments: 4 Pages.

Steganography is an important area of research in recent years involving a number of applications. It is the science of embedding information into the cover image viz., text, video, and image (payload) without causing statistically significant modification to the cover image. The modern secure image steganography presents a challenging task of transferring the embedded information to the destination without being detected. In this paper we present an image based steganography that combines Discrete Cosine Transform (DCT), and compression techniques with LSB techniques on raw images to enhance the security of the payload. Initially the cover-image is transformed from spatial domain to the frequency domain using DCT. The image is then quantized. and LSB technique is used to insert in pixels specified according to a range.
Category: Digital Signal Processing

[15] viXra:1208.0095 [pdf] submitted on 2012-08-19 01:54:10

A New Current-Mode Sigma Delta Modulator

Authors: Ebrahim Farshidi
Comments: 10 Pages.

In this paper, a alternative structure method for continuous time sigma delta modulator is presented. In this modulator for implementation of integrators in loop filter second generation current conveyors are employed. The modulator is designed in CMOS technology and features low power consumption (<2.8mW), low supply voltage (±1.65), wide dynamic range (>65db), and with 180khZ bandwidth. Simulation results confirm that this design is suitable for data converters.
Category: Digital Signal Processing

[14] viXra:1208.0094 [pdf] submitted on 2012-08-19 01:56:48

Diode Bridge T-type LC Reactor as Transformer Inrush Current Limiter

Authors: Mohd Wazir Mustafa, Leong Bee Keoh, Sazali P. Abdul Karim
Comments: 10 Pages.

An improvement inrush current limiter (ICL) is presented to form a highly effective inrush filter which further reduce the inrush current peaks and ripple voltage. The proposed ICL is constructed using a diode bridge and T-type LC reactor consisting of two inductors and one capacitor. The proposed ICL is connected at each phase of the primary winding of three phase transformer. The line current is rectified by the diode bridge and the increase in inrush current is limited by the T-type LC reactor. The proposed ICL is effective in reducing the peak inrush current by 80% more compared to single inductor type reactor. The potential of resonance take place in T-type reactor is completely avoided since the LC filter resonant frequency is very low while the lowest frequency the LC filter will ever see is well above is resonant point. The proposed ICL is numerically tested using simulation package PSCAD.
Category: Digital Signal Processing

[13] viXra:1208.0093 [pdf] submitted on 2012-08-19 01:58:06

Cascaded Multilevel Inverter for Photovoltaic Systems With PI Control

Authors: Shantanu Chatterjee, S Mallika
Comments: 15 Pages.

Use of renewable Energy such as solar, wind, water, nuclear energy etc is of huge demand in recent era. Converters used in Photovoltaic Systems have two stages: a boost up chopper and a PWM inverter. But this integration of these two stages have certain problems like decrease in efficiency, problem in interaction between the stages and also problem in MPPT(i.e Maximum Power Point Tracking) etc. So the Total energy which is produced is not utilized fully rather only a part of it can be utilized fruitfully. So in this paper we have proposed a novel use of Cascaded H-Bridge Multilevel Inverter Tropology in integrations with PV module controlled by a PI controller. The usefulness of this tropology is in the use of fully controlled PI controller and the increase in system performance. All the Gate Pulses to the IGBT switches are provided by the FPGA (Field Programmable Gate Array) kit. The detailed discussion and performance of the whole system alone with the block diagram and basic designing is discussed in this paper. Simulated Results and comparison is also done in this paper. This System provide a results in more efficiency and specially in low or medium power application. Detailed harmonic discussion is also done here in this paper.
Category: Digital Signal Processing

[12] viXra:1208.0092 [pdf] submitted on 2012-08-19 01:59:02

Performance Analysis of Extended Channel Models for MIMO LTE SC-FDMA Uplink Systems

Authors: P.Balasundaram, Nilkantha Chakraborty
Comments: 11 Pages.

Long Term Evolution (LTE) is the latest standard proposed by the 3GPP towards 4G. This paper uses an accurate perform analysis of complete uplink LTE study. Multiple input multiple output (MIMO) techniques have gathered much attention in recent years as a way to improve drastically the performance of wireless mobile communications. Simulated Results compare different channel estimation techniques showing significant difference among them, such as Extended Pedestrian A, Extended Vehicular A, Extended typical urban , High Speed Train Condition(HSTC) are considered and the measurement data is compared for the Localized and Distributed SC-FDMA mapping methods. From the results, we find that Localized SC-FDMA outperforms Distributed SC-FDMA in terms of SNR and BER .
Category: Digital Signal Processing

[11] viXra:1208.0091 [pdf] submitted on 2012-08-19 02:01:58

Ber Performance of Ofdm System with 16-Qam and Varying Length of Guard Interval

Authors: Amandeep Singh Sappal, Parneet Kaur
Comments: 8 Pages.

Orthogonal frequency division multiplexing scheme being spectrally efficient is used in modern communication systems. To achieve error free communication guard interval is inserted using cyclic prefix and zero padding. The Bit Error Rate (BER) performance for orthogonal frequency division multiplexing (OFDM) system with 16-QAM and varying length of guard interval (GI) is presented.
Category: Digital Signal Processing

[10] viXra:1208.0089 [pdf] submitted on 2012-08-19 02:03:38

Comparison of Sensitivity and Nonlinear Optimization Methods for Transmission Network LTCs Setting

Authors: F. Karbalaei, M. Ranjbar, M. Kavyani
Comments: 6 Pages.

This paper compares the sensitivity method with a proposed nonlinear optimization method for setting of transmission network load tap changers (LTCs) as a preventive action for voltage instability. The aim of preventive actions is to increase voltage stability margin. In contrast to emergency actions, preventive ones implemented when the power system is stable. Thus, in calculation of a preventive action, in addition to increase stability margin, its effects on current operating point of the system must be considered. The sensitivity method is a linearized based method that uses the sensitivity of the loadability margin with respect to tap values. In the proposed optimization method, the tap values are calculated using optimal powerflow model. Two groups of variables are used in optimization problem: one group is related to base case (current operating point) and the other is related to the voltage stability boundary. By this work, the preventive actions do not cause undesirable changes in the system current variables.
Category: Digital Signal Processing

[9] viXra:1208.0088 [pdf] submitted on 2012-08-19 02:05:12

Real Time Hand Gesture Recognition Using Sift

Authors: Pallavi Gurjal, Kiran Kunnur
Comments: 15 Pages.

The objective of the gesture recognition is to identify and distinguish the human gestures and utilizes these identified gestures for applications in specific domain. In this paper we propose a new approach to build a real time system to identify the standard gesture given by American Sign Language, or ASL, the dominant sign language of Deaf Americans, including deaf communities in the United States, in the English-speaking parts of Canada, and in some regions of Mexico. We propose a new method of improvised scale invariant feature transform (SIFT) and use the same to extract the features. The objective of the paper is to decode a gesture video into the appropriate alphabets.
Category: Digital Signal Processing

[8] viXra:1208.0087 [pdf] submitted on 2012-08-19 02:06:06

Numerical Modeling of Series Resistance of Millimeter- wave DDR IMPATTs

Authors: Aritra Acharyya1, J. P. Banerjee
Comments: 10 Pages.

This paper describes a computer-based method to calculate the parasitic positive series resistance of millimeter-wave packaged DDR IMPATT devices from high-frequency small-signal conductance-susceptance characteristics. The series resistance of the device can be obtained at the threshold condition when the small-signal conductance of the packaged device just becomes negative and the susceptance becomes positive. Series resistance values are determined for two DDR Silicon IMPATT diodes designed to operate at W-band near 94 GHz window frequency using the method developed by the author’s.
Category: Digital Signal Processing

[7] viXra:1208.0086 [pdf] submitted on 2012-08-19 02:08:46

Capacity Analysis of Adaptive Transmission Techniques over TWDP Fading Channel

Authors: Bhargabjyoti Saikia, Rupaban Subadar
Comments: 11 Pages.

Expressions for the single-user capacity have been presented for different power and rate adaptive transmission techniques over Two Wave Diffuse Power [TWDP] fading channels. Different power and rate adaptation techniques available in the literature have been considered in these analyses. A study of the effect of fading parameters on the channel capacity of different techniques has been presented. Also the results have been verified against the known special case results.
Category: Digital Signal Processing

[6] viXra:1208.0085 [pdf] submitted on 2012-08-19 02:14:17

Design of DE Optimized SSSC-Based Facts Controller

Authors: S.C.Swain, Srikanta Mahapatra, Sidhartha Panda, Susmita Panda
Comments: 16 Pages.

Power-system stability improvement by a static synchronous series compensator (SSSC)-based controller is studied in this paper. Conventionally, the lead-lag structure was used to modulate the injected voltage. But, in this paper PI, PID, PIDD structures are proposed to modulate the injected voltage. The design problem of the proposed controller is formulated as an optimization problem and Differential Evolution Algorithm is used to find out the optimal controller parameters. Different disturbances are applied to the single-machine infinite bus system and multi-machine infinite bus system and the performances of the conventional structure and the proposed structure are evaluated and compared. Only remote signals with required time delays are taken into account in this paper. The simulation results are presented and compared with a modern heuristic optimization technique under various loading conditions and disturbances to show the effectiveness of the proposed approach.
Category: Digital Signal Processing

[5] viXra:1208.0084 [pdf] submitted on 2012-08-19 02:15:35

A New Algorithm for TCSC- Based Controller Design by Using Differential Evolution Method

Authors: A.K.Baliarsingh, N.R.Samal, D.P.Dash, S.Panda
Comments: 8 Pages.

Design of an optimal controller requires the optimization of differential evolution performance measures that are often no commensurable and competing with each other. Being a population based approach; Differential Evolution (DE) is well suited to solve designing problem of TCSC – based controller. This paper investigates the application of DE-based multi-objective optimization technique for the design of a Thyristor Controlled Series Compensator (TCSC)-based supplementary damping controller. The designing objective is to improve the power system stability with minimum control effort. The proposed technique is applied to generate Pareto set of global optimal solutions to the given multi-objective optimization problem. Further, a fuzzy-based membership value assignment method is employed to choose the best compromise solution from the obtained Pareto solution set. Simulation results are presented to show the effectiveness and robustness of the proposed approach.
Category: Digital Signal Processing

[4] viXra:1208.0083 [pdf] submitted on 2012-08-19 02:16:22

Hybrid Algorithm for Detection of High Impedance Arcing Fault in Overhead Transmission System

Authors: Abdulhamid.A. Abohagar, Mohd.Wazir.Mustafa, Nasir A. Al-geelani
Comments: 18 Pages.

High impedance fault (HIF) is a long standing problem which known by very complex phenomena, because of its distinctive characteristics asymmetry and nonlinearity behavior. Besides that, arc is the most serious problem which is mostly associated with high impedance fault, this arc is considered as a source of human life risks and fire hazardous, and additionally result in property damage. From the point of few, detection and discrimination of high impedance fault still remain challenging of protection engineers. In this paper new of high impedance model is introduced and combination of wavelet transform and neural network is presented to detect high impedance fault. Discrete wavelet transform (DWT) is used as feature extraction which extracts useful information from distorted current signal that generated from transmission system network under effect of high impedance fault. In order to improve training convergence and to reduce the number of input to neural network, coefficients of wavelet is calculated and used as input for training back propagation neural network. Multi-layer back propagation neural network (BP-NN) is used as classifier for high impedance fault and discriminate it from such events like capacitor switching and load switching etc.
Category: Digital Signal Processing

[3] viXra:1208.0082 [pdf] submitted on 2012-08-18 08:58:40

A Cryptosystem for XML Documents

Authors: A. A. Abd EL-Aziz, A.kannan
Comments: 3 Pages.

In this paper, we propose a cryptosystem (encrypting/decryption) for XML data using Vigenere cipher algorithm and EL Gamal cryptosystem. Such a system is designed to achieve some of security aspects such as confidentiality, authentication, integrity, and non-repudiation. We used XML data as an experimental work. Since, we have used Vigenere cipher which is not monoalphabetic, then the number of possible keywords of length m in a Vigenere Cipher is 26 m, so even for relatively small values of m, an exhaustive key search would require a long time.
Category: Digital Signal Processing

[2] viXra:1208.0081 [pdf] submitted on 2012-08-18 09:00:01

Interband Alias-Free Subband Adaptive Filtering with Critical Sampling

Authors: K.Sreedhar
Comments: 10 Pages.

Adaptive Filtering is an important concept in the field of signal processing and has numerous applications in fields such as speech processing and communications. An Adaptive filter is a filter that self-adjusts its transfer function according to an optimizing algorithm. Because of the complexity of the optimizing algorithms, most adaptive filters are digital filters that perform digital signal processing and adapt their performance based on the input signal. An adaptive filter is often employed in an environment of unknown Statistics for various purposes such as system identification, inverse modeling for channel equalization, adaptive prediction, and interference canceling. Knowing nothing about the environment, the filter is initially set to an arbitrary condition and updated in a step-by-step manner toward an optimum filter setting. For updating, the least mean-square algorithm is often used for its simplicity and robust performance. However, the LMS algorithm exhibits slow convergence when used with an ill-conditioned input such as speech and requires a high computational cost, especially when the system to be identified has a long impulse response. To overcome the limitations of a conventional full band adaptive filtering, various sub band adaptive filtering (SAF) structures have been proposed. Properly designed, an SAF will converge faster at a lower computational cost than a full band structure. However, its design should consider the following two facts: the inter band aliasing introduced by the down sampling process degrades its performance, and the filter bank in the SAF introduces additional computational overhead and system delay. In this project, a critically sampled SAF structure that is almost Alias-free is proposed to reap all the benefits of using an SAF. Since the proposed SAF is performed using subbands that is almost alias-free, there is little inter band aliasing error at the output. In each sub band, the inter band aliasing is obtained using a bandwidth-increased linear-phase FIR analysis filter, whose pass band has almost-unit magnitude response in the subband interval, and is then subtracted from the sub band signal. This aliasing cancellation procedure, however, causes the spectral dips of the sub band signals. These spectral dips can be reduced by using a simple FIR filter. Simulations show that the proposed structure converges faster than both an equivalent full band structure at lower computational complexity and recently proposed SAF structures for a colored input. The analysis is done using MATLAB, a language of technical computing, widely used in Research, Engineering and scientific computations.
Category: Digital Signal Processing

[1] viXra:1208.0080 [pdf] submitted on 2012-08-18 09:02:02

Storing XML Documents and XML Policies in Relational Databases

Authors: A. A. Abd EL-Aziz, A.kannan
Comments: 4 Pages.

In this paper, We explore how to support security models for XML documents by using relational databases. Our model based on the model in [6], but we use our algorithm to store the XML documents in relational databases.
Category: Digital Signal Processing