Abstract: In this paper, a novel multipurpose audio watermarking
algorithm is proposed based on Vector Quantization (VQ) in Discrete
Cosine Transform (DCT) domain using the codeword labeling and
index-bit constrained method. By using this algorithm, it can fulfill the
requirements of both the copyright protection and content integrity
authentication at the same time for the multimedia artworks. The
robust watermark is embedded in the middle frequency coefficients of
the DCT transform during the labeled codeword vector quantization
procedure. The fragile watermark is embedded into the indices of the
high frequency coefficients of the DCT transform by using the
constrained index vector quantization method for the purpose of
integrity authentication of the original audio signals. Both the robust
and the fragile watermarks can be extracted without the original audio
signals, and the simulation results show that our algorithm is effective
with regard to the transparency, robustness and the authentication
requirements
Abstract: Digital signature is a useful primitive to attain the integrity and authenticity in various wire or wireless communications. Proxy signature is one type of the digital signatures. It helps the proxy signer to sign messages on behalf of the original signer. It is very useful when the original signer (e.g. the president of a company) is not available to sign a specific document. If the original signer can not forge valid proxy signatures through impersonating the proxy signer, it will be robust in a virtual environment; thus the original signer can not shift any illegal action initiated by herself to the proxy signer. In this paper, we propose a new proxy signature scheme. The new scheme can prevent the original signer from impersonating the proxy signer to sign messages. The proposed scheme is based on the regular ElGamal signature. In addition, the fair privacy of the proxy signer is maintained. That means, the privacy of the proxy signer is preserved; and the privacy can be revealed when it is necessary.
Abstract: We describe an effective method for image encryption
which employs magnitude and phase manipulation using carrier
images. Although it involves traditional methods like magnitude and
phase encryptions, the novelty of this work lies in deploying the
concept of carrier images for encryption purpose. To this end, a
carrier image is randomly chosen from a set of stored images. One
dimensional (1-D) discrete Fourier transform (DFT) is then carried
out on the original image to be encrypted along with the carrier
image. Row wise spectral addition and scaling is performed between
the magnitude spectra of the original and carrier images by randomly
selecting the rows. Similarly, row wise phase addition and scaling is
performed between the original and carrier images phase spectra by
randomly selecting the rows. The encrypted image obtained by these
two operations is further subjected to one more level of magnitude
and phase manipulation using another randomly chosen carrier image
by 1-D DFT along the columns. The resulting encrypted image is
found to be fully distorted, resulting in increasing the robustness
of the proposed work. Further, applying the reverse process at the
receiver, the decrypted image is found to be distortionless.
Abstract: Skin color can provide a useful and robust cue
for human-related image analysis, such as face detection,
pornographic image filtering, hand detection and tracking,
people retrieval in databases and Internet, etc. The major
problem of such kinds of skin color detection algorithms is
that it is time consuming and hence cannot be applied to a real
time system. To overcome this problem, we introduce a new
fast technique for skin detection which can be applied in a real
time system. In this technique, instead of testing each image
pixel to label it as skin or non-skin (as in classic techniques),
we skip a set of pixels. The reason of the skipping process is
the high probability that neighbors of the skin color pixels are
also skin pixels, especially in adult images and vise versa. The
proposed method can rapidly detect skin and non-skin color
pixels, which in turn dramatically reduce the CPU time
required for the protection process. Since many fast detection
techniques are based on image resizing, we apply our
proposed pixel skipping technique with image resizing to
obtain better results. The performance evaluation of the
proposed skipping and hybrid techniques in terms of the
measured CPU time is presented. Experimental results
demonstrate that the proposed methods achieve better result
than the relevant classic method.
Abstract: In the current decade, wireless sensor networks are
emerging as a peculiar multi-disciplinary research area. By this
way, energy efficiency is one of the fundamental research themes
in the design of Medium Access Control (MAC) protocols for
wireless sensor networks. Thus, in order to optimize the energy
consumption in these networks, a variety of MAC protocols are
available in the literature. These schemes were commonly evaluated
under simple network density and a few results are published on
their robustness in realistic network-s size. We, in this paper, provide
an analytical study aiming to highlight the energy waste sources in
wireless sensor networks. Then, we experiment three energy efficient
hybrid CSMA/CA based MAC protocols optimized for wireless
sensor networks: Sensor-MAC (SMAC), Time-out MAC (TMAC)
and Traffic aware Energy Efficient MAC (TEEM). We investigate
these protocols with different network densities in order to discuss
the end-to-end performances of these schemes (i.e. in terms of energy
efficiency, delay and throughput). Through Network Simulator (NS-
2) implementations, we explore the behaviors of these protocols with
respect to the network density. In fact, this study may help the multihops
sensor networks designers to design or select the MAC layer
which matches better their applications aims.
Abstract: The efficiency of an image watermarking technique depends on the preservation of visually significant information. This is attained by embedding the watermark transparently with the maximum possible strength. The current paper presents an approach for still image digital watermarking in which the watermark embedding process employs the wavelet transform and incorporates Human Visual System (HVS) characteristics. The sensitivity of a human observer to contrast with respect to spatial frequency is described by the Contrast Sensitivity Function (CSF). The strength of the watermark within the decomposition subbands, which occupy an interval on the spatial frequencies, is adjusted according to this sensitivity. Moreover, the watermark embedding process is carried over the subband coefficients that lie on edges where distortions are less noticeable. The experimental evaluation of the proposed method shows very good results in terms of robustness and transparency.
Abstract: A new Feed-Forward/Feedback Generalized
Minimum Variance Pole-placement Controller to incorporate the
robustness of classical pole-placement into the flexibility of
generalized minimum variance self-tuning controller for Single-Input
Single-Output (SISO) has been proposed in this paper. The design,
which provides the user with an adaptive mechanism, which ensures
that the closed loop poles are, located at their pre-specified positions.
In addition, the controller design which has a feed-forward/feedback
structure overcomes the certain limitations existing in similar poleplacement
control designs whilst retaining the simplicity of
adaptation mechanisms used in other designs. It tracks set-point
changes with the desired speed of response, penalizes excessive
control action, and can be applied to non-minimum phase systems.
Besides, at steady state, the controller has the ability to regulate the
constant load disturbance to zero. Example simulation results using
both simulated and real plant models demonstrate the effectiveness of
the proposed controller.
Abstract: With the popularity of the multi-core and many-core architectures there is a great requirement for software frameworks which can support parallel programming methodologies. In this paper we introduce an Eclipse toolkit, JConqurr which is easy to use and provides robust support for flexible parallel progrmaming. JConqurr is a multi-core and many-core programming toolkit for Java which is capable of providing support for common parallel programming patterns which include task, data, divide and conquer and pipeline parallelism. The toolkit uses an annotation and a directive mechanism to convert the sequential code into parallel code. In addition to that we have proposed a novel mechanism to achieve the parallelism using graphical processing units (GPU). Experiments with common parallelizable algorithms have shown that our toolkit can be easily and efficiently used to convert sequential code to parallel code and significant performance gains can be achieved.
Abstract: In this paper, a worm-like micro robot designed for inpipe
application with intelligent active force control (AFC) capability
is modelled and simulated. The motion of the micro robot is based on
an impact drive mechanism (IDM) that is actuated using piezoelectric
device. The trajectory tracking performance of the modelled micro
robot is initially experimented via a conventional proportionalintegral-
derivative (PID) controller in which the dynamic response of
the robot system subjected to different input excitations is
investigated. Subsequently, a robust intelligent method known as
active force control with fuzzy logic (AFCFL) is later incorporated
into the PID scheme to enhance the system performance by
compensating the unwanted disturbances due to the interaction of the
robot with its environment. Results show that the proposed AFCFL
scheme is far superior than the PID control counterpart in terms of
the system-s tracking capability in the wake of the disturbances.
Abstract: The development of wearable sensing technologies is a great challenge which is being addressed by the Proetex FP6 project (www.proetex.org). Its main aim is the development of wearable sensors to improve the safety and efficiency of emergency personnel. This will be achieved by continuous, real-time monitoring of vital signs, posture, activity, and external hazards surrounding emergency workers. We report here the development of carbon dioxide (CO2) sensing boot by incorporating commercially available CO2 sensor with a wireless platform into the boot assembly. Carefully selected commercially available sensors have been tested. Some of the key characteristics of the selected sensors are high selectivity and sensitivity, robustness and the power demand. This paper discusses some of the results of CO2 sensor tests and sensor integration with wireless data transmission
Abstract: This paper presents an adaptive nonlinear position
controller with velocity constraint, capable of combining the
input-output linearization technique and Lyapunov stability theory.
Based on the Lyapunov stability theory, the adaptation law of the
proposed controller is derived along with the verification of the overall
system-s stability. Computer simulation results demonstrate that the
proposed controller is robust and it can ensure transient stability of
BLDCM, under the occurrence of a large sudden fault.
Abstract: In this paper, a method to detect multiple ellipses is presented. The technique is efficient and robust against incomplete ellipses due to partial occlusion, noise or missing edges and outliers. It is an iterative technique that finds and removes the best ellipse until no reasonable ellipse is found. At each run, the best ellipse is extracted from randomly selected edge patches, its fitness calculated and compared to a fitness threshold. RANSAC algorithm is applied as a sampling process together with the Direct Least Square fitting of ellipses (DLS) as the fitting algorithm. In our experiment, the method performs very well and is robust against noise and spurious edges on both synthetic and real-world image data.
Abstract: An effective approach for unbalanced three-phase
distribution power flow solutions is proposed in this paper. The
special topological characteristics of distribution networks have been
fully utilized to make the direct solution possible. Two matrices–the
bus-injection to branch-current matrix and the branch-current to busvoltage
matrix– and a simple matrix multiplication are used to
obtain power flow solutions. Due to the distinctive solution
techniques of the proposed method, the time-consuming LU
decomposition and forward/backward substitution of the Jacobian
matrix or admittance matrix required in the traditional power flow
methods are no longer necessary. Therefore, the proposed method is
robust and time-efficient. Test results demonstrate the validity of the
proposed method. The proposed method shows great potential to be
used in distribution automation applications.
Abstract: This paper describes the application of a model
predictive controller to the problem of batch reactor temperature
control. Although a great deal of work has been done to improve
reactor throughput using batch sequence control, the control of the
actual reactor temperature remains a difficult problem for many
operators of these processes. Temperature control is important as
many chemical reactions are sensitive to temperature for formation of
desired products. This controller consist of two part (1) a nonlinear
control method GLC (Global Linearizing Control) to create a linear
model of system and (2) a Model predictive controller used to obtain
optimal input control sequence. The temperature of reactor is tuned
to track a predetermined temperature trajectory that applied to the
batch reactor. To do so two input signals, electrical powers and the
flow of coolant in the coil are used. Simulation results show that the
proposed controller has a remarkable performance for tracking
reference trajectory while at the same time it is robust against noise
imposed to system output.
Abstract: In this paper, frequency offset (FO) estimation schemes
robust to the non-Gaussian noise environments are proposed for
orthogonal frequency division multiplexing (OFDM) systems. First,
a maximum-likelihood (ML) estimation scheme in non-Gaussian
noise environments is proposed, and then, the complexity of the
ML estimation scheme is reduced by employing a reduced set of
candidate values. In numerical results, it is demonstrated that the
proposed schemes provide a significant performance improvement
over the conventional estimation scheme in non-Gaussian noise
environments while maintaining the performance similar to the
estimation performance in Gaussian noise environments.
Abstract: Control of commutation of switched reluctance (SR)
motor has been an area of interest for researchers for sometime now
with mixed successes in addressing the inherent challenges. New
technologies, processing schemes and methods have been adopted to
make sensorless SR drive a reality. There are a number of
conceptual, offline, analytical and online solutions in literature that
have varying complexities and achieved equally varying degree of
robustness and accuracies depending on the method used to address
the challenges and the SR drive application. Magnetic coupling is
one such challenge when using active probing techniques to
determine rotor position of a SR motor from stator winding. This
paper studies the effect of back-of-core saturation on the detected
rotor position and presents results on measurement made on a 4-
phase SR motor. The results shows that even for a four phase motor
which is excited one phase at a time and using the electrically
opposite phase for active position probing, the back-of-core
saturation effects should not be ignored.
Abstract: This paper describes a new method for affine parameter
estimation between image sequences. Usually, the parameter
estimation techniques can be done by least squares in a quadratic
way. However, this technique can be sensitive to the presence
of outliers. Therefore, parameter estimation techniques for various
image processing applications are robust enough to withstand the
influence of outliers. Progressively, some robust estimation functions
demanding non-quadratic and perhaps non-convex potentials adopted
from statistics literature have been used for solving these. Addressing
the optimization of the error function in a factual framework for
finding a global optimal solution, the minimization can begin with
the convex estimator at the coarser level and gradually introduce nonconvexity
i.e., from soft to hard redescending non-convex estimators
when the iteration reaches finer level of multiresolution pyramid.
Comparison has been made to find the performance of the results
of proposed method with the results found individually using two
different estimators.
Abstract: In this paper, a joint source-channel coding (JSCC) scheme for time-varying channels is presented. The proposed scheme uses hierarchical framework for both source encoder and transmission via QAM modulation. Hierarchical joint source channel codes with hierarchical QAM constellations are designed to track the channel variations which yields to a higher throughput by adapting certain parameters of the receiver to the channel variation. We consider the problem of still image transmission over time-varying channels with channel state information (CSI) available at 1) receiver only and 2) both transmitter and receiver being informed about the state of the channel. We describe an algorithm that optimizes hierarchical source codebooks by minimizing the distortion due to source quantizer and channel impairments. Simulation results, based on image representation, show that, the proposed hierarchical system outperforms the conventional schemes based on a single-modulator and channel optimized source coding.
Abstract: This article presents a computationally tractable probabilistic model for the relation between the complex wavelet coefficients of two images of the same scene. The two images are acquisitioned at distinct moments of times, or from distinct viewpoints, or by distinct sensors. By means of the introduced probabilistic model, we argue that the similarity between the two images is controlled not by the values of the wavelet coefficients, which can be altered by many factors, but by the nature of the wavelet coefficients, that we model with the help of hidden state variables. We integrate this probabilistic framework in the construction of a new image registration algorithm. This algorithm has sub-pixel accuracy and is robust to noise and to other variations like local illumination changes. We present the performance of our algorithm on various image types.
Abstract: The purpose of this work is to present a method for
rigid registration of medical images using 1D binary projections
when a part of one of the two images is missing. We use 1D binary
projections and we adjust the projection limits according to the
reduced image in order to perform accurate registration. We use the
variance of the weighted ratio as a registration function which we
have shown is able to register 2D and 3D images more accurately and
robustly than mutual information methods. The function is computed
explicitly for n=5 Chebyshev points in a [-9,+9] interval and it is
approximated using Chebyshev polynomials for all other points. The
images used are MR scans of the head. We find that the method is
able to register the two images with average accuracy 0.3degrees for
rotations and 0.2 pixels for translations for a y dimension of 156 with
initial dimension 256. For y dimension 128/256 the accuracy
decreases to 0.7 degrees for rotations and 0.6 pixels for translations.