Abstract: Image Processing is a structure of Signal Processing
for which the input is the image and the output is also an image or
parameter of the image. Image Resolution has been frequently
referred as an important aspect of an image. In Image Resolution
Enhancement, images are being processed in order to obtain more
enhanced resolution. To generate highly resoluted image for a low
resoluted input image with high PSNR value. Stationary Wavelet
Transform is used for Edge Detection and minimize the loss occurs
during Downsampling. Inverse Discrete Wavelet Transform is to get
highly resoluted image. Highly resoluted output is generated from the
Low resolution input with high quality. Noisy input will generate
output with low PSNR value. So Noisy resolution enhancement
technique has been used for adaptive sub-band thresholding is used.
Downsampling in each of the DWT subbands causes information loss
in the respective subbands. SWT is employed to minimize this loss.
Inverse Discrete wavelet transform (IDWT) is to convert the object
which is downsampled using DWT into a highly resoluted object.
Used Image denoising and resolution enhancement techniques will
generate image with high PSNR value. Our Proposed method will
improve Image Resolution and reached the optimized threshold.
Abstract: This paper presents a novel algorithm for secure,
reliable and flexible transmission of big data in two hop wireless
networks using cooperative jamming scheme. Two hop wireless
networks consist of source, relay and destination nodes. Big data has
to transmit from source to relay and from relay to destination by
deploying security in physical layer. Cooperative jamming scheme
determines transmission of big data in more secure manner by
protecting it from eavesdroppers and malicious nodes of unknown
location. The novel algorithm that ensures secure and energy balance
transmission of big data, includes selection of data transmitting
region, segmenting the selected region, determining probability ratio
for each node (capture node, non-capture and eavesdropper node) in
every segment, evaluating the probability using binary based
evaluation. If it is secure transmission resume with the two- hop
transmission of big data, otherwise prevent the attackers by
cooperative jamming scheme and transmit the data in two-hop
transmission.
Abstract: Driver fatigue is an important factor in the increasing
number of road accidents. Dynamic template matching method was
proposed to address the problem of real-time driver fatigue detection
system based on eye-tracking. An effective vision based approach
was used to analyze the driver’s eye state to detect fatigue. The driver
fatigue system consists of Face detection, Eye detection, Eye
tracking, and Fatigue detection. Initially frames are captured from a
color video in a car dashboard and transformed from RGB into YCbCr
color space to detect the driver’s face. Canny edge operator was used
to estimating the eye region and the locations of eyes are extracted.
The extracted eyes were considered as a template matching for eye
tracking. Edge Map Overlapping (EMO) and Edge Pixel Count
(EPC) matching function were used for eye tracking which is used to
improve the matching accuracy. The pixel of eyeball was tracked
from the eye regions which are used to determine the fatigue state of
the driver.
Abstract: This article presents our prototype MASET (Multi
Agents System for E-Tutoring Learners engaged in online
collaborative work). MASET that we propose is a system which
basically aims to help tutors in monitoring the collaborative work of
students and their various interactions. The evaluation of such
interactions by the tutor is based on the results provided by the
automatic analysis of the interaction indicators. This system is
predicated upon the middleware JADE (Java Agent Development
Framework) and e-learning Moodle platform. The MASET
environment is modeled by AUML which allows structuring the
different interactions between agents for the fulfillment and
performance of online collaborative work. This multi-agent system
has been the subject of a practical experimentation based on the
interactions data between Master Computer Engineering and System
students.
Abstract: Due to rapid advancement of powerful image
processing software, digital images are easy to manipulate and
modify by ordinary people. Lots of digital images are edited for a
specific purpose and more difficult to distinguish form their original
ones. We propose a clustering method to detect a copy-move image
forgery of JPEG, BMP, TIFF, and PNG. The process starts with
reducing the color of the photos. Then, we use the clustering
technique to divide information of measuring data by Hausdorff
Distance. The result shows that the purposed methods is capable of
inspecting the image file and correctly identify the forgery.
Abstract: Image segmentation and edge detection is a fundamental section in image processing. In case of noisy images Edge Detection is very less effective if we use conventional Spatial Filters like Sobel, Prewitt, LOG, Laplacian etc. To overcome this problem we have proposed the use of Stochastic Gradient Mask instead of Spatial Filters for generating gradient images. The present study has shown that the resultant images obtained by applying Stochastic Gradient Masks appear to be much clearer and sharper as per Edge detection is considered.
Abstract: In the past decade, the use of digital image correlation
(DIC) techniques has increased significantly in the area of
experimental mechanics, especially for materials behavior
characterization. This non-contact tool enables full field displacement
and strain measurements over a complete region of interest. The DIC
algorithm requires a random contrast pattern on the surface of the
specimen in order to perform properly. To create this pattern, the
specimen is usually first coated using a white matt paint. Next, a
black random speckle pattern is applied using any suitable method. If
the applied paint coating is too thick, its top surface may not be able
to exactly follow the deformation of the specimen, and consequently,
the strain measurement might be underestimated. In the present
article, a study of the influence of the paint thickness on the strain
underestimation is performed for different strain levels. The results
are then compared to typical paint coating thicknesses applied by
experienced DIC users. A slight strain underestimation was observed
for paint coatings thicker than about 30μm. On the other hand, this
value was found to be uncommonly high compared to coating
thicknesses applied by DIC users.
Abstract: The system for analyzing and eliciting public
grievances serves its main purpose to receive and process all sorts of
complaints from the public and respond to users. Due to the more
number of complaint data becomes big data which is difficult to store
and process. The proposed system uses HDFS to store the big data
and uses MapReduce to process the big data. The concept of cache
was applied in the system to provide immediate response and timely
action using big data analytics. Cache enabled big data increases the
response time of the system. The unstructured data provided by the
users are efficiently handled through map reduce algorithm. The
processing of complaints takes place in the order of the hierarchy of
the authority. The drawbacks of the traditional database system used
in the existing system are set forth by our system by using Cache
enabled Hadoop Distributed File System. MapReduce framework
codes have the possible to leak the sensitive data through
computation process. We propose a system that add noise to the
output of the reduce phase to avoid signaling the presence of
sensitive data. If the complaints are not processed in the ample time,
then automatically it is forwarded to the higher authority. Hence it
ensures assurance in processing. A copy of the filed complaint is sent
as a digitally signed PDF document to the user mail id which serves
as a proof. The system report serves to be an essential data while
making important decisions based on legislation.
Abstract: When neck pain is associated with pain, numbness, or
weakness in the arm, shoulder, or hand, further investigation is
needed as these are symptoms indicating pressure on one or more
nerve roots. Evaluation necessitates a neurologic examination and
imaging using an MRI/CT scan. A degenerating disc loses some
thickness and is less flexible, causing inter-vertebrae space to narrow.
A radiologist diagnoses an Intervertebral Disc Degeneration (IDD) by
localizing every inter-vertebral disc and identifying the pathology in
a disc based on its geometry and appearance. Accurate localizing is
necessary to diagnose IDD pathology. But, the underlying image
signal is ambiguous: a disc’s intensity overlaps the spinal nerve
fibres. Even the structure changes from case to case, with possible
spinal column bending (scoliosis). The inter-vertebral disc
pathology’s quantitative assessment needs accurate localization of the
cervical region discs. In this work, the efficacy of multilevel set
segmentation model, to segment cervical discs is investigated. The
segmented images are annotated using a simple distance matrix.
Abstract: This paper introduces a video sharing platform based
on WiFi, which consists of camera, mobile phone and PC server. This
platform can receive wireless signal from the camera and show the live
video on the mobile phone captured by camera. In addition, it is able to
send commands to camera and control the camera’s holder to rotate.
The platform can be applied to interactive teaching and dangerous
area’s monitoring and so on. Testing results show that the platform can
share the live video of mobile phone. Furthermore, if the system’s PC
server and the camera and many mobile phones are connected
together, it can transfer photos concurrently.
Abstract: In this paper, we are interested in the problem of
finding similar images in a large database. For this purpose we
propose a new algorithm based on a combination of the 2-D
histogram intersection in the HSV space and statistical moments. The
proposed histogram is based on a 3x3 window and not only on the
intensity of the pixel. This approach overcome the drawback of the
conventional 1-D histogram which is ignoring the spatial distribution
of pixels in the image, while the statistical moments are used to
escape the effects of the discretisation of the color space which is
intrinsic to the use of histograms. We compare the performance of
our new algorithm to various methods of the state of the art and we
show that it has several advantages. It is fast, consumes little memory
and requires no learning. To validate our results, we apply this
algorithm to search for similar images in different image databases.
Abstract: Distributed applications deployed on LEO satellites
and ground stations require substantial communication between
different members in a constellation to overcome the earth
coverage barriers imposed by GEOs. Applications running on LEO
constellations suffer the earth line-of-sight blockage effect. They
need adequate lab testing before launching to space. We propose
a scalable cloud-based network simulation framework to simulate
problems created by the earth line-of-sight blockage. The framework
utilized cloud IaaS virtual machines to simulate LEO satellites
and ground stations distributed software. A factorial ANOVA
statistical analysis is conducted to measure simulator overhead on
overall communication performance. The results showed a very low
simulator communication overhead. Consequently, the simulation
framework is proposed as a candidate for testing LEO constellations
with distributed software in the lab before space launch.
Abstract: Hybrid electric vehicles can reduce pollution and
improve fuel economy. Power-split hybrid electric vehicles (HEVs)
provide two power paths between the internal combustion engine
(ICE) and energy storage system (ESS) through the gears of an
electrically variable transmission (EVT). EVT allows ICE to operate
independently from vehicle speed all the time. Therefore, the ICE can
operate in the efficient region of its characteristic brake specific fuel
consumption (BSFC) map. The two-mode powertrain can operate in
input-split or compound-split EVT modes and in four different fixed
gear configurations. Power-split architecture is advantageous because
it combines conventional series and parallel power paths. This
research focuses on input-split and compound-split modes in the
two-mode power-split powertrain. Fuzzy Logic Control (FLC) for an
internal combustion engine (ICE) and PI control for electric machines
(EMs) are derived for the urban driving cycle simulation. These
control algorithms reduce vehicle fuel consumption and improve ICE
efficiency while maintaining the state of charge (SOC) of the energy
storage system in an efficient range.
Abstract: Advance in techniques of image and video processing has enabled the development of intelligent video surveillance systems. This study was aimed to automatically detect moving human objects and to analyze events of dual human interaction in a surveillance scene. Our system was developed in four major steps: image preprocessing, human object detection, human object tracking, and motion trajectory analysis. The adaptive background subtraction and image processing techniques were used to detect and track moving human objects. To solve the occlusion problem during the interaction, the Kalman filter was used to retain a complete trajectory for each human object. Finally, the motion trajectory analysis was developed to distinguish between the interaction and non-interaction events based on derivatives of trajectories related to the speed of the moving objects. Using a database of 60 video sequences, our system could achieve the classification accuracy of 80% in interaction events and 95% in non-interaction events, respectively. In summary, we have explored the idea to investigate a system for the automatic classification of events for interaction and non-interaction events using surveillance cameras. Ultimately, this system could be incorporated in an intelligent surveillance system for the detection and/or classification of abnormal or criminal events (e.g., theft, snatch, fighting, etc.).
Abstract: A sensory network consists of multiple detection
locations called sensor nodes, each of which is tiny, featherweight
and portable. A single path routing protocols in wireless sensor
network can lead to holes in the network, since only the nodes
present in the single path is used for the data transmission. Apart
from the advantages like reduced computation, complexity and
resource utilization, there are some drawbacks like throughput,
increased traffic load and delay in data delivery. Therefore, multipath
routing protocols are preferred for WSN. Distributing the traffic
among multiple paths increases the network lifetime. We propose a
scheme, for the data to be transmitted through a dominant path to
save energy. In order to obtain a high delivery ratio, a basic route
reconstruction protocol is utilized to reconstruct the path whenever a
failure is detected. A basic reconstruction routing (BRR) algorithm is
proposed, in which a node can leap over path failure by using the
already existing routing information from its neighbourhood while
the composed data is transmitted from the source to the sink. In order
to save the energy and attain high data delivery ratio, data is
transmitted along a multiple path, which is achieved by BRR
algorithm whenever a failure is detected. Further, the analysis of
how the proposed protocol overcomes the drawback of the existing
protocols is presented. The performance of our protocol is compared
to AOMDV and energy efficient node-disjoint multipath routing
protocol (EENDMRP). The system is implemented using NS-2.34.
The simulation results show that the proposed protocol has high
delivery ratio with low energy consumption.
Abstract: This paper presents an approach for the classification of
an unstructured format description for identification of file formats.
The main contribution of this work is the employment of data mining
techniques to support file format selection with just the unstructured
text description that comprises the most important format features for
a particular organisation. Subsequently, the file format indentification
method employs file format classifier and associated configurations to
support digital preservation experts with an estimation of required file
format. Our goal is to make use of a format specification knowledge
base aggregated from a different Web sources in order to select file
format for a particular institution. Using the naive Bayes method,
the decision support system recommends to an expert, the file format
for his institution. The proposed methods facilitate the selection of
file format and the quality of a digital preservation process. The
presented approach is meant to facilitate decision making for the
preservation of digital content in libraries and archives using domain
expert knowledge and specifications of file formats. To facilitate
decision-making, the aggregated information about the file formats is
presented as a file format vocabulary that comprises most common
terms that are characteristic for all researched formats. The goal is to
suggest a particular file format based on this vocabulary for analysis
by an expert. The sample file format calculation and the calculation
results including probabilities are presented in the evaluation section.
Abstract: Designing cost-efficient, secure network protocols for
Wireless Sensor Networks (WSNs) is a challenging problem because
sensors are resource-limited wireless devices. Security services such
as authentication and improved pairwise key establishment are
critical to high efficient networks with sensor nodes. For sensor
nodes to correspond securely with each other efficiently, usage of
cryptographic techniques is necessary. In this paper, two key
predistribution schemes that enable a mobile sink to establish a
secure data-communication link, on the fly, with any sensor nodes.
The intermediate nodes along the path to the sink are able to verify
the authenticity and integrity of the incoming packets using a
predicted value of the key generated by the sender’s essential power.
The proposed schemes are based on the pairwise key with the mobile
sink, our analytical results clearly show that our schemes perform
better in terms of network resilience to node capture than existing
schemes if used in wireless sensor networks with mobile sinks.
Abstract: Model transformation, as a pivotal aspect of Modeldriven
engineering, attracts more and more attentions both from
researchers and practitioners. Many domains (enterprise engineering,
software engineering, knowledge engineering, etc.) use model
transformation principles and practices to serve to their domain
specific problems; furthermore, model transformation could also be
used to fulfill the gap between different domains: by sharing and
exchanging knowledge. Since model transformation has been widely
used, there comes new requirement on it: effectively and efficiently
define the transformation process and reduce manual effort that
involved in. This paper presents an automatic model transformation
methodology based on semantic and syntactic comparisons, and
focuses particularly on granularity issue that existed in transformation
process. Comparing to the traditional model transformation
methodologies, this methodology serves to a general purpose: crossdomain
methodology. Semantic and syntactic checking
measurements are combined into a refined transformation process,
which solves the granularity issue. Moreover, semantic and syntactic
comparisons are supported by software tool; manual effort is replaced
in this way.
Abstract: This paper focuses on a critical component of the
situational awareness (SA), the control of autonomous vertical flight
for vectored thrust aerial vehicle (VTAV). With the SA strategy, we
proposed a neural network motion control procedure to address the
dynamics variation and performance requirement difference of flight
trajectory for a VTAV. This control strategy with using of NARMAL2
neurocontroller for chosen model of VTAV has been verified by
simulation of take-off and forward maneuvers using software
package Simulink and demonstrated good performance for fast
stabilization of motors, consequently, fast SA with economy in
energy can be asserted during search-and-rescue operations.
Abstract: In this paper, we present a model-based regression test
suite reducing approach that uses EFSM model dependence analysis
and probability-driven greedy algorithm to reduce software regression
test suites. The approach automatically identifies the difference
between the original model and the modified model as a set of
elementary model modifications. The EFSM dependence analysis is
performed for each elementary modification to reduce the regression
test suite, and then the probability-driven greedy algorithm is adopted
to select the minimum set of test cases from the reduced regression test
suite that cover all interaction patterns. Our initial experience shows
that the approach may significantly reduce the size of regression test
suites.