Abstract: The existing image coding standards generally degrades at low bit-rates because of the underlying block based Discrete Cosine Transform scheme. Over the past decade, the success of wavelets in solving many different problems has contributed to its unprecedented popularity. Due to implementation constraints scalar wavelets do not posses all the properties such as orthogonality, short support, linear phase symmetry, and a high order of approximation through vanishing moments simultaneously, which are very much essential for signal processing. New class of wavelets called 'Multiwavelets' which posses more than one scaling function overcomes this problem. This paper presents a new image coding scheme based on non linear approximation of multiwavelet coefficients along with multistage vector quantization. The performance of the proposed scheme is compared with the results obtained from scalar wavelets.
Abstract: Reliable secure multicast communication in mobile
adhoc networks is challenging due to its inherent characteristics of
infrastructure-less architecture with lack of central authority, high
packet loss rates and limited resources such as bandwidth, time and
power. Many emerging commercial and military applications require
secure multicast communication in adhoc environments. Hence key
management is the fundamental challenge in achieving reliable
secure communication using multicast key distribution for mobile
adhoc networks. Thus in designing a reliable multicast key
distribution scheme, reliability and congestion control over
throughput are essential components. This paper proposes and
evaluates the performance of an enhanced optimized multicast cluster
tree algorithm with destination sequenced distance vector routing
protocol to provide reliable multicast key distribution. Simulation
results in NS2 accurately predict the performance of proposed
scheme in terms of key delivery ratio and packet loss rate under
varying network conditions. This proposed scheme achieves
reliability, while exhibiting low packet loss rate with high key
delivery ratio compared with the existing scheme.
Abstract: In this paper we present the design of a new encryption scheme. The scheme we propose is a very exible encryption and authentication primitive. We build this scheme on two relatively new design principles: t-functions and fast pseudo hadamard transforms. We recapitulate the theory behind these principles and analyze their security properties and efficiency. In more detail we propose a streamcipher which outputs a message authentication tag along with theencrypted data stream with only little overhead. Moreover we proposesecurity-speed tradeoffs. Our scheme is faster than other comparablet-function based designs while offering the same security level.
Abstract: An adaptive Fuzzy Inference Perceptual model has
been proposed for watermarking of digital images. The model
depends on the human visual characteristics of image sub-regions in
the frequency multi-resolution wavelet domain. In the proposed
model, a multi-variable fuzzy based architecture has been designed to
produce a perceptual membership degree for both candidate
embedding sub-regions and strength watermark embedding factor.
Different sizes of benchmark images with different sizes of
watermarks have been applied on the model. Several experimental
attacks have been applied such as JPEG compression, noises and
rotation, to ensure the robustness of the scheme. In addition, the
model has been compared with different watermarking schemes. The
proposed model showed its robustness to attacks and at the same time
achieved a high level of imperceptibility.
Abstract: This paper presents the enhanced frame-based video coding scheme. The input source video to the enhanced frame-based video encoder consists of a rectangular-size video and shapes of arbitrarily-shaped objects on video frames. The rectangular frame texture is encoded by the conventional frame-based coding technique and the video object-s shape is encoded using the contour-based vertex coding. It is possible to achieve several useful content-based functionalities by utilizing the shape information in the bitstream at the cost of a very small overhead to the bitrate.
Abstract: The cumulative conformance count (CCC) charts are
widespread in process monitoring of high-yield manufacturing.
Recently, it is found the use of variable sampling interval (VSI)
scheme could further enhance the efficiency of the standard CCC
charts. The average time to signal (ATS) a shift in defect rate has
become traditional measure of efficiency of a chart with the VSI
scheme. Determining the ATS is frequently a difficult and tedious
task. A simple method based on a finite Markov Chain approach for
modeling the ATS is developed. In addition, numerical results are
given.
Abstract: Several numerical schemes utilizing central difference
approximations have been developed to solve the Goursat problem.
However, in a recent years compact discretization methods which
leads to high-order finite difference schemes have been used since it
is capable of achieving better accuracy as well as preserving certain
features of the equation e.g. linearity. The basic idea of the new
scheme is to find the compact approximations to the derivative terms
by differentiating centrally the governing equations. Our primary
interest is to study the performance of the new scheme when applied
to two Goursat partial differential equations against the traditional
finite difference scheme.
Abstract: A perfect secret-sharing scheme is a method to distribute a secret among a set of participants in such a way that only qualified subsets of participants can recover the secret and the joint share of participants in any unqualified subset is statistically independent of the secret. The collection of all qualified subsets is called the access structure of the perfect secret-sharing scheme. In a graph-based access structure, each vertex of a graph G represents a participant and each edge of G represents a minimal qualified subset. The average information ratio of a perfect secret-sharing scheme realizing the access structure based on G is defined as AR = (Pv2V (G) H(v))/(|V (G)|H(s)), where s is the secret and v is the share of v, both are random variables from and H is the Shannon entropy. The infimum of the average information ratio of all possible perfect secret-sharing schemes realizing a given access structure is called the optimal average information ratio of that access structure. Most known results about the optimal average information ratio give upper bounds or lower bounds on it. In this present structures based on bipartite graphs and determine the exact values of the optimal average information ratio of some infinite classes of them.
Abstract: Multimedia security is an incredibly significant area of concern. The paper aims to discuss a robust image watermarking scheme, which can withstand geometric attacks. The source image is initially moment normalized in order to make it withstand geometric attacks. The moment normalized image is wavelet transformed. The first level wavelet transformed image is segmented into blocks if size 8x8. The product of mean and standard and standard deviation of each block is computed. The second level wavelet transformed image is divided into 8x8 blocks. The product of block mean and the standard deviation are computed. The difference between products in the two levels forms the watermark. The watermark is inserted by modulating the coefficients of the mid frequencies. The modulated image is inverse wavelet transformed and inverse moment normalized to generate the watermarked image. The watermarked image is now ready for transmission. The proposed scheme can be used to validate identification cards and financial instruments. The performance of this scheme has been evaluated using a set of parameters. Experimental results show the effectiveness of this scheme.
Abstract: Discrete Wavelet Transform (DWT) has demonstrated
far superior to previous Discrete Cosine Transform (DCT) and
standard JPEG in natural as well as medical image compression. Due
to its localization properties both in special and transform domain,
the quantization error introduced in DWT does not propagate
globally as in DCT. Moreover, DWT is a global approach that avoids
block artifacts as in the JPEG. However, recent reports on natural
image compression have shown the superior performance of
contourlet transform, a new extension to the wavelet transform in two
dimensions using nonseparable and directional filter banks,
compared to DWT. It is mostly due to the optimality of contourlet in
representing the edges when they are smooth curves. In this work, we
investigate this fact for medical images, especially for CT images,
which has not been reported yet. To do that, we propose a
compression scheme in transform domain and compare the
performance of both DWT and contourlet transform in PSNR for
different compression ratios (CR) using this scheme. The results
obtained using different type of computed tomography images show
that the DWT has still good performance at lower CR but contourlet
transform performs better at higher CR.
Abstract: This manuscript presents a fast blind signature scheme
with extremely low computation for users. Only several modular additions
and multiplications are required for a user to obtain and verify
a signature in the proposed scheme. Comparing with the existing
ones in the literature, the scheme greatly reduces the computations
for users.
Abstract: A numerical study is made of laminar, unsteady flow
behind a rotationally oscillating circular cylinder using a recently
developed higher order compact (HOC) scheme. The stream function
vorticity formulation of Navier-Stokes (N-S) equations in cylindrical
polar coordinates are considered as the governing equations. The
temporal behaviour of vortex formation and relevant streamline
patterns of the flow are scrutinized over broad ranges of two
externally specified parameters namely dimensionless forced
oscillating frequency Sf and dimensionless peak rotation rate αm for
the Reynolds-s number Re = 200. Excellent agreements are found
both qualitatively and quantitatively with the existing experimental
and standard numerical results.
Abstract: This paper investigates the problem of automated defect
detection for textile fabrics and proposes a new optimal filter design
method to solve this problem. Gabor Wavelet Network (GWN) is
chosen as the major technique to extract the texture features from
textile fabrics. Based on the features extracted, an optimal Gabor filter
can be designed. In view of this optimal filter, a new semi-supervised
defect detection scheme is proposed, which consists of one real-valued
Gabor filter and one smoothing filter. The performance of the scheme
is evaluated by using an offline test database with 78 homogeneous
textile images. The test results exhibit accurate defect detection with
low false alarm, thus showing the effectiveness and robustness of the
proposed scheme. To evaluate the detection scheme comprehensively,
a prototyped detection system is developed to conduct a real time test.
The experiment results obtained confirm the efficiency and
effectiveness of the proposed detection scheme.
Abstract: This work aims to reduce the read power consumption
as well as to enhance the stability of the SRAM cell during the read
operation. A new 10-transisor cell is proposed with a new read
scheme to minimize the power consumption within the memory core.
It has separate read and write ports, thus cell read stability is
significantly improved. A 16Kb SRAM macro operating at 1V
supply voltage is demonstrated in 65 nm CMOS process. Its read
power consumption is reduced to 24% of the conventional design.
The new cell also has lower leakage current due to its special bit-line
pre-charge scheme. As a result, it is suitable for low-power mobile
applications where power supply is restricted by the battery.
Abstract: The rate of nitrate adsorption by a nitrate selective ion
exchange resin was investigated in a well-stirred batch experiments.
The kinetic experimental data were simulated with diffusion models including external mass transfer, particle diffusion and chemical
adsorption. Particle pore volume diffusion and particle surface diffusion were taken into consideration separately and simultaneously
in the modeling. The model equations were solved numerically using the Crank-Nicholson scheme. An optimization technique was
employed to optimize the model parameters. All nitrate concentration
decay data were well described with the all diffusion models. The
results indicated that the kinetic process is initially controlled by external mass transfer and then by particle diffusion. The external
mass transfer coefficient and the coefficients of pore volume diffusion and surface diffusion in all experiments were close to each
other with the average value of 8.3×10-3 cm/S for external mass
transfer coefficient. In addition, the models are more sensitive to the
mass transfer coefficient in comparison with particle diffusion. Moreover, it seems that surface diffusion is the dominant particle
diffusion in comparison with pore volume diffusion.
Abstract: A novel adaptive fuzzy trajectory tracking algorithm of Stewart platform based motion platform is proposed to compensate path deviation and degradation of controller-s performance due to actuator torque limit. The algorithm can be divided into two parts: the real-time trajectory shaping part and the joint space adaptive fuzzy controller part. For a reference trajectory in task space whenever any of the actuators is saturated, the desired acceleration of the reference trajectory is modified on-line by using dynamic model of motion platform. Meanwhile an additional action with respect to the difference between the nominal and modified trajectories is utilized in the non-saturated region of actuators to reduce the path error. Using modified trajectory as input, the joint space controller incorporates compute torque controller, leg velocity observer and fuzzy disturbance observer with saturation compensation. It can ensure stability and tracking performance of controller in present of external disturbance and position only measurement. Simulation results verify the effectiveness of proposed control scheme.
Abstract: Cellular automata have been used for design of cryptosystems. Recently some secret sharing schemes based on linear memory cellular automata have been introduced which are used for both text and image. In this paper, we illustrate that these secret sharing schemes are vulnerable to dishonest participants- collusion. We propose a cheating model for the secret sharing schemes based on linear memory cellular automata. For this purpose we present a novel uniform model for representation of all secret sharing schemes based on cellular automata. Participants can cheat by means of sending bogus shares or bogus transition rules. Cheaters can cooperate to corrupt a shared secret and compute a cheating value added to it. Honest participants are not aware of cheating and suppose the incorrect secret as the valid one. We prove that cheaters can recover valid secret by removing the cheating value form the corrupted secret. We provide methods of calculating the cheating value.
Abstract: In this paper a special kind of buffer management policy is studied where the packet are preempted even when sufficient space is available in the buffer for incoming packets. This is done to congestion for future incoming packets to improve QoS for certain type of packets. This type of study has been done in past for ATM type of scenario. We extend the same for heterogeneous traffic where data rate and size of the packets are very versatile in nature. Typical example of this scenario is the buffer management in Differentiated Service Router. There are two aspects that are of interest. First is the packet size: whether all packets have same or different sizes. Second aspect is the value or space priority of the packets, do all packets have the same space priority or different packets have different space priorities. We present two types of policies to achieve QoS goals for packets with different priorities: the push out scheme and the expelling scheme. For this work the scenario of packets of variable length is considered with two space priorities and main goal is to minimize the total weighted packet loss. Simulation and analytical studies show that, expelling policies can outperform the push out policies when it comes to offering variable QoS for packets of two different priorities and expelling policies also help improve the amount of admissible load. Some other comparisons of push out and expelling policies are also presented using simulations.
Abstract: power-line networks are promise infrastructure for
broadband services provision to end users. However, the network
performance is affected by stochastic channel changing which is due
to load impedances, number of branches and branched line lengths. It
has been proposed that multi-carrier modulations techniques such as
orthogonal frequency division multiplexing (OFDM), Multi-Carrier
Spread Spectrum (MC-SS), wavelet OFDM can be used in such
environment. This paper investigates the performance of different
indoor topologies of power-line networks that uses MC-SS
modulation scheme.It is observed that when a branch is added in the
link between sending and receiving end of an indoor channel an
average of 2.5dB power loss is found. In additional, when the branch
is added at a node an average of 1dB power loss is found.
Additionally when the terminal impedances of the branch change
from line characteristic impedance to impedance either higher or
lower values the channel performances were tremendously improved.
For example changing terminal load from characteristic impedance
(85 .) to 5 . the signal to noise ratio (SNR) required to attain the
same performances were decreased from 37dB to 24dB respectively.
Also, changing the terminal load from channel characteristic
impedance (85 .) to very higher impedance (1600 .) the SNR
required to maintain the same performances were decreased from
37dB to 23dB. The result concludes that MC-SS performs better
compared with OFDM techniques in all aspects and especially when
the channel is terminated in either higher or lower impedances.
Abstract: The purpose of this study is to derive optimal shapes of
a body located in viscous flows by the finite element method using the
acoustic velocity and the four-step explicit scheme. The formulation
is based on an optimal control theory in which a performance function
of the fluid force is introduced. The performance function should be
minimized satisfying the state equation. This problem can be transformed
into the minimization problem without constraint conditions
by using the adjoint equation with adjoint variables corresponding to
the state equation. The performance function is defined by the drag
and lift forces acting on the body. The weighted gradient method
is applied as a minimization technique, the Galerkin finite element
method is used as a spatial discretization and the four-step explicit
scheme is used as a temporal discretization to solve the state equation
and the adjoint equation. As the interpolation, the orthogonal basis
bubble function for velocity and the linear function for pressure
are employed. In case that the orthogonal basis bubble function is
used, the mass matrix can be diagonalized without any artificial
centralization. The shape optimization is performed by the presented
method.