Abstract: In this paper, low end Digital Signal Processors (DSPs)
are applied to accelerate integer neural networks. The use of DSPs
to accelerate neural networks has been a topic of study for some
time, and has demonstrated significant performance improvements.
Recently, work has been done on integer only neural networks, which
greatly reduces hardware requirements, and thus allows for cheaper
hardware implementation. DSPs with Arithmetic Logic Units (ALUs)
that support floating or fixed point arithmetic are generally more
expensive than their integer only counterparts due to increased circuit
complexity. However if the need for floating or fixed point math
operation can be removed, then simpler, lower cost DSPs can be
used. To achieve this, an integer only neural network is created in
this paper, which is then accelerated by using DSP instructions to
improve performance.
Abstract: There are increasingly plagiarism offences for
students in higher education in the digital educational world. On the
other hand, various and competitive online assessment and
plagiarism detection tools are available in the market. Taking the
University of Glamorgan as a case study, this paper describes and
introduces an institutional journey on electronic plagiarism detection
to inform the initial experience of an innovative tool and method
which could be further explored in the future research. The
comparative study and system workflow for e-plagiarism detection
tool are discussed. Benefits for both academics and students are also
presented. Electronic plagiarism detection tools brought great
benefits to both academics and students in Glamorgan. On the other
hand, the debates raised in such initial experience are discussed.
Abstract: A prototype for audio and video capture and compression in real time on a Linux platform has been developed. It is able to visualize both the captured and the compressed video at the same time, as well as the captured and compressed audio with the goal of comparing their quality. As it is based on free code, the final goal is to run it in an embedded system running Linux. Therefore, we would implement a node to capture and compress such multimedia information. Thus, it would be possible to consider the project within a larger one aimed at live broadcast of audio and video using a streaming server which would communicate with our node. Then, we would have a very powerful and flexible system with several practical applications.
Abstract: A new digital watermarking technique for images that
are sensitive to blocking artifacts is presented. Experimental results
show that the proposed MDCT based approach produces highly
imperceptible watermarked images and is robust to attacks such as
compression, noise, filtering and geometric transformations. The
proposed MDCT watermarking technique is applied to fingerprints
for ensuring security. The face image and demographic text data of
an individual are used as multiple watermarks. An AFIS system was
used to quantitatively evaluate the matching performance of the
MDCT-based watermarked fingerprint. The high fingerprint
matching scores show that the MDCT approach is resilient to
blocking artifacts. The quality of the extracted face and extracted text
images was computed using two human visual system metrics and
the results show that the image quality was high.
Abstract: As the Internet continues to grow at a rapid pace as
the primary medium for communications and commerce and as
telecommunication networks and systems continue to expand their
global reach, digital information has become the most popular and
important information resource and our dependence upon the
underlying cyber infrastructure has been increasing significantly.
Unfortunately, as our dependency has grown, so has the threat to the
cyber infrastructure from spammers, attackers and criminal
enterprises. In this paper, we propose a new machine learning based
network intrusion detection framework for cyber security. The
detection process of the framework consists of two stages: model
construction and intrusion detection. In the model construction stage,
a semi-supervised machine learning algorithm is applied to a
collected set of network audit data to generate a profile of normal
network behavior and in the intrusion detection stage, input network
events are analyzed and compared with the patterns gathered in the
profile, and some of them are then flagged as anomalies should these
events are sufficiently far from the expected normal behavior. The
proposed framework is particularly applicable to the situations where
there is only a small amount of labeled network training data
available, which is very typical in real world network environments.
Abstract: In digital signal processing it is important to
approximate multi-dimensional data by the method called rank
reduction, in which we reduce the rank of multi-dimensional data from
higher to lower. For 2-dimennsional data, singular value
decomposition (SVD) is one of the most known rank reduction
techniques. Additional, outer product expansion expanded from SVD
was proposed and implemented for multi-dimensional data, which has
been widely applied to image processing and pattern recognition.
However, the multi-dimensional outer product expansion has behavior
of great computation complex and has not orthogonally between the
expansion terms. Therefore we have proposed an alterative method,
Third-order Orthogonal Tensor Product Expansion short for 3-OTPE.
3-OTPE uses the power method instead of nonlinear optimization
method for decreasing at computing time. At the same time the group
of B. D. Lathauwer proposed Higher-Order SVD (HOSVD) that is
also developed with SVD extensions for multi-dimensional data.
3-OTPE and HOSVD are similarly on the rank reduction of
multi-dimensional data. Using these two methods we can obtain
computation results respectively, some ones are the same while some
ones are slight different. In this paper, we compare 3-OTPE to
HOSVD in accuracy of calculation and computing time of resolution,
and clarify the difference between these two methods.
Abstract: We present a simplified equalization technique for a
π/4 differential quadrature phase shift keying ( π/4 -DQPSK) modulated
signal in a multipath fading environment. The proposed equalizer is
realized as a fractionally spaced adaptive decision feedback equalizer
(FS-ADFE), employing exponential step-size least mean square
(LMS) algorithm as the adaptation technique. The main advantage of
the scheme stems from the usage of exponential step-size LMS algorithm
in the equalizer, which achieves similar convergence behavior
as that of a recursive least squares (RLS) algorithm with significantly
reduced computational complexity. To investigate the finite-precision
performance of the proposed equalizer along with the π/4 -DQPSK
modem, the entire system is evaluated on a 16-bit fixed point digital
signal processor (DSP) environment. The proposed scheme is found
to be attractive even for those cases where equalization is to be
performed within a restricted number of training samples.
Abstract: Advent enhancements in the field of computing have
increased massive use of web based electronic documents. Current
Copyright protection laws are inadequate to prove the ownership for
electronic documents and do not provide strong features against
copying and manipulating information from the web. This has
opened many channels for securing information and significant
evolutions have been made in the area of information security.
Digital Watermarking has developed into a very dynamic area of
research and has addressed challenging issues for digital content.
Watermarking can be visible (logos or signatures) and invisible
(encoding and decoding). Many visible watermarking techniques
have been studied for text documents but there are very few for web
based text. XML files are used to trade information on the internet
and contain important information. In this paper, two invisible
watermarking techniques using Synonyms and Acronyms are
proposed for XML files to prove the intellectual ownership and to
achieve the security. Analysis is made for different attacks and
amount of capacity to be embedded in the XML file is also noticed.
A comparative analysis for capacity is also made for both methods.
The system has been implemented using C# language and all tests are
made practically to get the results.
Abstract: In the management of industrial waste, conversion from the use of paper invoices to electronic forms is currently under way in developed countries. Difficulties in such computerization include the lack of synchronization between the actual goods and the corresponding data managed by the server. Consequently, a system which utilizes the incorporation of a QR code in connection with the waste material has been developed. The code is read at each stage, from discharge until disposal, and progress at each stage can be easily reported. This system can be linked with Japanese public digital authentication service of waste, taking advantage of its good points, and can be used to submit reports to the regulatory authorities. Its usefulness was confirmed by a verification test, and put into actual practice.
Abstract: This paper examines the implementation of RC5 block cipher for digital images along with its detailed security analysis. A complete specification for the method of application of the RC5 block cipher to digital images is given. The security analysis of RC5 block cipher for digital images against entropy attack, bruteforce, statistical, and differential attacks is explored from strict cryptographic viewpoint. Experiments and results verify and prove that RC5 block cipher is highly secure for real-time image encryption from cryptographic viewpoint. Thorough experimental tests are carried out with detailed analysis, demonstrating the high security of RC5 block cipher algorithm.
Abstract: It is necessary to incorporate technological advances
achieved in the field of engineering into dentistry in order to enhance
the process of diagnosis, treatment planning and enable the doctors to
render better treatment to their patients. To achieve this ultimate goal
long distance collaborations are often necessary. This paper discusses
the various collaborative tools and their applications to solve a few
burning problems confronted by the dentists. Customization is often
the solution to most of the problems. But rapid designing,
development and cost effective manufacturing is a difficult task to
achieve. This problem can be solved using the technique of digital
manufacturing. Cases from 6 major branches of dentistry have been
discussed and possible solutions with the help of state of art
technology using rapid digital manufacturing have been proposed in
the present paper. The paper also entails the usage of existing tools in
collaborative and digital manufacturing area.
Abstract: Digital watermarking is a way to provide the facility of secure multimedia data communication besides its copyright protection approach. The Spread Spectrum modulation principle is widely used in digital watermarking to satisfy the robustness of multimedia signals against various signal-processing operations. Several SS watermarking algorithms have been proposed for multimedia signals but very few works have discussed on the issues responsible for secure data communication and its robustness improvement. The current paper has critically analyzed few such factors namely properties of spreading codes, proper signal decomposition suitable for data embedding, security provided by the key, successive bit cancellation method applied at decoder which have greater impact on the detection reliability, secure communication of significant signal under camouflage of insignificant signals etc. Based on the analysis, robust SS watermarking scheme for secure data communication is proposed in wavelet domain and improvement in secure communication and robustness performance is reported through experimental results. The reported result also shows improvement in visual and statistical invisibility of the hidden data.
Abstract: In this paper, a robust statistics based filter to remove salt and pepper noise in digital images is presented. The function of the algorithm is to detect the corrupted pixels first since the impulse noise only affect certain pixels in the image and the remaining pixels are uncorrupted. The corrupted pixels are replaced by an estimated value using the proposed robust statistics based filter. The proposed method perform well in removing low to medium density impulse noise with detail preservation upto a noise density of 70% compared to standard median filter, weighted median filter, recursive weighted median filter, progressive switching median filter, signal dependent rank ordered mean filter, adaptive median filter and recently proposed decision based algorithm. The visual and quantitative results show the proposed algorithm outperforms in restoring the original image with superior preservation of edges and better suppression of impulse noise
Abstract: Self-sensing estimates the air gap within an electro
magnetic path by analyzing the bearing coil current and/or voltage
waveform. The self-sensing concept presented in this paper has been
developed within the research project “Active Magnetic Bearings
with Supreme Reliability" and is used for position sensor fault
detection.
Within this new concept gap calculation is carried out by an alldigital
analysis of the digitized coil current and voltage waveform.
For analysis those time periods within the PWM period are used,
which give the best results. Additionally, the concept allows the
digital compensation of nonlinearities, for example magnetic
saturation, without degrading signal quality. This increases the
accuracy and robustness of the air gap estimation and additionally
reduces phase delays.
Beneath an overview about the developed concept first
measurement results are presented which show the potential of this
all-digital self-sensing concept.
Abstract: This research analyzes factors affecting the success of
Litecoin Value within Thailand and develops a guideline for selfreliance
for effective business implementation. Samples in this study
included 119 people through surveys. The results revealed four main
factors affecting the success as follows: 1) Future Career training
should be pursued in applied Litecoin development. 2) Didn't grasp
the concept of a digital currency or see the benefit of a digital
currency. 3) There is a great need to educate the next generation of
learners on the benefits of Litecoin within the community. 4) A great
majority didn't know what Litecoin was.
The guideline for self-reliance planning consisted of 4 aspects: 1)
Development planning: by arranging meet up groups to conduct
further education on Litecoin and share solutions on adoption into
every day usage. Local communities need to develop awareness of
the usefulness of Litecoin and share the value of Litecoin among
friends and family. 2) Computer Science and Business Management
staff should develop skills to expand on the benefits of Litecoin
within their departments. 3) Further research should be pursued on
how Litecoin Value can improve business and tourism within
Thailand. 4) Local communities should focus on developing Litecoin
awareness by encouraging street vendors to accept Litecoin as
another form of payment for services rendered.
Abstract: Memory forensic is important in digital investigation.
The forensic is based on the data stored in physical memory that
involve memory management and processing time. However, the
current forensic tools do not consider the efficiency in terms of
storage management and the processing time. This paper shows the
high redundancy of data found in the physical memory that cause
inefficiency in processing time and memory management. The
experiment is done using Borland C compiler on Windows XP with
512 MB of physical memory.
Abstract: Increase in using internet makes some problems that
one of them is "internet anxiety". Internet anxiety is a type of anxious
that people may feel during surfing internet or using internet for their
educational purpose, blogging or streaming to digital libraries. The
goal of this study is evaluating of internet anxiety among the
management students. In this research Ealy's internet anxiety
questionnaire, consists of positive and negative items, is completed
by 310 participants. According to the findings, about 64.7% of them
were equal or below to mean anxiety score (50). The distribution of
internet anxiety scores was normal and there was no meaningful
difference between men-s and women's anxiety level in this sample.
Results also showed that there is no meaningful difference of internet
anxiety level between different fields of study in Management. This
evaluation will help managers to perform gap analysis between the
existent level and the desired one. Future work would be providing
techniques for abating human anxiety while using internet via human
computer interaction techniques.
Abstract: A generalized Digital Modulation Identification algorithm for adaptive demodulator has been developed and presented in this paper. The algorithm developed is verified using wavelet Transform and histogram computation to identify QPSK and QAM with GMSK and M–ary FSK modulations. It has been found that the histogram peaks simplifies the procedure for identification. The simulated results show that the correct modulation identification is possible to a lower bound of 5 dB and 12 dB for GMSK and QPSK respectively. When SNR is above 5 dB the throughput of the proposed algorithm is more than 97.8%. The receiver operating characteristics (ROC) has been computed to measure the performance of the proposed algorithm and the analysis shows that the probability of detection (Pd) drops rapidly when SNR is 5 dB and probability of false alarm (Pf) is smaller than 0.3. The performance of the proposed algorithm has been compared with existing methods and found it will identify all digital modulation schemes with low SNR.
Abstract: The fuzzy technique is an operator introduced in order
to simulate at a mathematical level the compensatory behavior in
process of decision making or subjective evaluation. The following
paper introduces such operators on hand of computer vision
application.
In this paper a novel method based on fuzzy logic reasoning
strategy is proposed for edge detection in digital images without
determining the threshold value. The proposed approach begins by
segmenting the images into regions using floating 3x3 binary matrix.
The edge pixels are mapped to a range of values distinct from each
other. The robustness of the proposed method results for different
captured images are compared to those obtained with the linear Sobel
operator. It is gave a permanent effect in the lines smoothness and
straightness for the straight lines and good roundness for the curved
lines. In the same time the corners get sharper and can be defined
easily.
Abstract: Malaysia is aggressive in promoting the usage of ICT
to its mass population through the support by the government
policies and programs targeting the general population. However,
with the uneven distribution of the basic telecommunication
infrastructure between the urban and rural area, cost for being
“interconnected" that is considered high among the poorer rural
population and the lack of local contents that suit the rural population
needs or lifestyles, it is still a challenge for Malaysia to achieve its
Vision 2020 Agenda moving the nation towards an information
society by the year 2020. Among the existing programs that have
been carried out by the government to encourage the usage of ICT by
the rural population is “Kedaikom", a community telecenter with the
general aim is to engage the community to get exposed and to use the
ICT, encouraging the diffusion of the ICT technology to the rural
population. The research investigated by using a questionnaire
survey of how Kedaikom, as a community telecenter could play a
role in encouraging the rural or underserved community to use the
ICT. The result from the survey has proven that the community
telecenter could bridge the digital divide between the underserved
rural population and the well-accessed urban population in Malaysia.
More of the rural population, especially from the younger generation
and those with higher educational background are using the
community telecenter to be connected to the ICT.