Tamper Localization in Wavelet Domain Using Semi- Fragile Watermarking

Size: px
Start display at page:

Download "Tamper Localization in Wavelet Domain Using Semi- Fragile Watermarking"

Transcription

1 Tamper Localzaton n Wavelet Doman Usng Sem- Fragle Watermarkng Sandpbha Mangrolya, Ketk Pathak Departement of Electroncs and Communcaton Engneerng Sarvajank College of Engneerng & Technology, Surat Abstract - Ths paper proposes a novel mage authentcaton scheme n the DWT doman. The scheme uses a sem-fragle atermark to detect and precsely locate malcous tamperng regon n mages. The avelet coeffcents selected for embeddng are randomly permuted th a secret key, achevng hgh securty. A bt of the atermark s embedded n a group of coeffcents by means of quantzaton. The expermental results sho, that our algorthm acheves good mage qualty and hgh tamperng detecton resoluton at a lo atermark payload, compared to block-based authentcaton schemes. The atermark s protected aganst local attacks. We have also conducted experments to demonstrate the robustness of the atermark aganst mld to moderate JPEG compresson. Keyord - Multmeda securty, Dgtal atermarkng, Random permutaton, Image authentcaton I. INTRODUCTION II. Dgtal atermarkng can be classfed nto three dfferent categores: robust, fragle and sem-fragle ater-markng. A robust atermark should be able to resst ntentonal or unntentonal manpulatons, hle a fragle atermark s ntended to be destroyed even after the smallest unntentonal manpulaton. Some mportant applcatons for robust atermarkng are fnger prntng, data mnng and copyrght protecton [1, 2]. The thrd category, sem-fragle atermarkng [3, 4], uses atermarks that have the ablty to resst unntentonal manpulatons caused by common mage processng operatons lke JPEG compresson and are fragle aganst ntentonal, malcous manpulatons. The man applcaton feld of fragle and sem-fragle atermarkng s mage and vdeo content authentcaton. Ths paper focuses on usng a sem-fragle atermark for mage authentcaton. Most of the mage authentcaton technques use a block-based concept n the spatal, Dscrete Cosne Transform (DCT) or avelet doman [5, 6] for detectng the tampered regons n the mage. The orgnal mage s parttoned nto blocks, and each block s embedded th ts on atermark usng a secret key. Hoever, most of these schemes are vulnerable to counterfetng attacks and they cannot dscrmnate beteen ntentonal tamperng and unntentonal mage processng dstortons [7, 8]. In such approaches, the tamper detecton resoluton s lmted to the block sze. Smaller block szes and hgher atermark payloads are necessary to mprove the detecton resoluton, resultng n a consderable degradaton of the mage qualty. A specfc attack aganst mage authentcaton s the collage attack, ntroduced by Hollman and Memon n [9]. Usng ths attack, a counterfeter can combne ndependently authentcated blocks to produce forged content. Ths attack s thus undetectable by conventonal block-based atermarkng technques. The scheme proposed n ths paper focuses on elmnatng the drabacks of block-based schemes, usng a Dscrete Wavelet Transform (DWT) based approach and random permutaton of avelet coeffcents. Our algorthm mproves the tamper detecton localzaton; unlke conventonal block-based methods, the exact tampered regon s detected. The atermark payload s sgnfcantly loered, ncreasng the mage qualty. The algorthm can also dstngush beteen ntentonal tamperng and unntentonal mld to moderate JPEG compresson. Mathematcal morphology can be used to mprove the detecton results [10, 11]. The remander of ths paper s organzed as follos. In Secton 2 e present the proposed mage authentcaton scheme n the avelet doman, shong the block dagrams of the atermark encoder and decoder and detalng the steps of the algorthm. Secton 3 contans the expermental results and performances of the proposed scheme and conclusons are gven n Secton 4. THE PROPOSED IMAGE AUTHENTICATION SCHEME IN THE DWT DOMAIN Ths secton descrbes the proposed mage authentcaton scheme. The block dagram of the atermark encoder s shon n Fg. 1. The atermark embeddng process s descrbed n the follong: 1. The orgnal, gray scale mage s transformed nto the avelet doman usng a 2D-DWT decomposton on L resoluton levels. IJEDR Internatonal Journal of Engneerng Development and Research (.jedr.org) 2878

2 Fgure 1. Block dagram of the atermark encoder 2. The detal avelet coeffcents from the LHn, HLn and HHn Wavelet sub-bands of resoluton level n L are selected. For example, n Fg. 2, the coeffcents of the second Wavelet decomposton are chosen for further processng. Selectng hgher resoluton sub-bands for atermark embeddng gves a better tamperng localzaton, but decreases the reslence of the algorthm to common, unntentonal mage processng operatons. LL3 LH3 HL3 HH3 HL2 HL1 LH2 HH2 LH1 HH1 Fgure 2. Wavelet decomposton on L = 3 resoluton levels 3. The selected avelet coeffcents are concatenated n a 1D vector S and randomly permuted usng a secret key K nto a ne vector S. Ths process assures that coeffcents correspondng to the same spatal locaton ll be separated n S. 4. The sequence S of permuted coeffcents s dvded nto groups of d coeffcents. Parameter d controls the atermark payload of the proposed scheme. A atermark bt ll be embedded n every group of d coeffcents. A smaller group sze ll result n a bgger atermark payload and thus n a hgher degradaton of the mage qualty and a smaller sze of the maxmal localzable tampered area, but ll not decrease the detecton resoluton of the scheme. 5. The atermark, a bnary random sequence, s generated and serves as the authentcaton code. has the same length as the number of avelet coeffcent groups. 6. The eghted mean m of every group of permuted avelet coeffcents s obtaned usng the follong equaton: d j 1 ( ) (1) m c j j 1 Where c (j) denotes the j th coeffcent of group. The eght (-1) j s used to make the scheme more robust to common mage processng operatons that, n most cases, change the entre mage and ould not modfy the eghted mean. m 7. The atermarked mean s obtaned by quantzaton of m to the nearest even or odd quantzaton level accordng to the value of the correspondng atermark bt, usng the follong equaton: m / * mod 2 / / * mod 2 / m Q Q f m Q m Q Q Q f m Q (2) IJEDR Internatonal Journal of Engneerng Development and Research (.jedr.org) 2879

3 here [ ] s the nteger part operator and mod2 s the remander after dvson by For every group of coeffcents, the eghted mean m s changed to the atermarked mean by modfyng the avelet coeffcent s,max(j) th the hghest absolute value. Because of the random permutaton operaton every group should have at least one coeffcent th hgh absolute value. The updatng of s, max(j) s done as follos: ( ) ( ) ( ) ( ( )) ( ) (3) ( ) s the atermarked coeffcent and 1 f x 0 sgn( x) 1 f x 0 9. After updatng the coeffcents th the hghest absolute value from every group, the nverse permutaton s appled usng the secret key K. 10. Fnally, the Inverse 2D-DWT s calculated to obtan the atermarked mage. The block dagram of the atermark decoder and mage authentcaton s shon n Fg. 3. The atermark extracton process and mage authentcaton s descrbed n follong: 1. The atermarked, possbly tampered mage s transformed nto the avelet doman usng 2D-DWT decomposton on L resoluton levels. 2. The detal avelet coeffcents from the LHn, HLn and HHn Wavelet sub-bands are selected for atermark extracton. 3. The selected avelet coeffcents are concatenated. Usng a secret key K, the same random permutaton s performed. 4. The sequence of permuted coeffcents s dvded nto groups of d coeffcents. 5. The eghted mean m of every group of coeffcents s calculated usng Eq. (1). 6. A atermark bt ' ' s extracted from the eghted mean of every group of d coeffcents usng Eq. (5). ( ) (5) m (4) Fgure 3. Block dagram of the atermark decoder and mage authentcaton To authentcate the mage the follong step need to be done: 1. Frst, the orgnal atermark s locally generated. If the extracted atermark matches the orgnal one then the mage s authentc. If not, the follong steps ll determne f the mage as tampered. ' 2. If a bt of the extracted atermark does not match the orgnal one, all coeffcents belongng to group are declared as potentally tampered. 3. All coeffcents are permuted back to ther orgnal poston usng the nverse permutaton th the secret key. The coeffcents declared as potentally tampered should be no spread all over the sub-bands. The actual tampered regons IJEDR Internatonal Journal of Engneerng Development and Research (.jedr.org) 2880

4 III. should have a hgh densty of flagged coeffcents. The other flagged coeffcents should be solated and dstrbuted lke random nose. They are false postves and can be clamed as authentc. 4. For a selected resoluton level n e ll have three sub-bands, LHn, HLn and HHn, th flagged and non-flagged coeffcents. We ll construct a bnary authentcaton matrx A of the same sze as the selected sub-bands. A(x,y) = 1 f there s a flagged coeffcent at the same poston (x,y) n any of the HL, LH, or HH selected sub-bands. 5. The solated 1 bts n the authentcaton matrx A ll be removed through flterng. 6. Locatons ncorrectly flagged as tampered are further elmnated by successve eroson and dlaton, usng a dsk of radus R pxels and a square of sze S x S as structural elements. The 1 bts n the fltered and eroded authentcaton matrx should no correctly ndcate the tampered locatons. 7. The flagged postons n A are then mapped back to the spatal doman to ndcate the actual tampered locatons. The senstvty of the tamperng detecton can be adapted by selectng the quantzaton step sze Q, choosng the flter sze n step 5 and the sze of the structural element used for eroson and dlaton n step 6 of the authentcaton process. A larger Q ll ncrease the senstvty, but ll decrease the perceptual qualty of the atermarked mage. A larger flter or a bgger structural element for eroson and dlaton ll reduce the senstvty, but ll also reduce the probablty of false alarms as a result of common mage processng operatons. A trade-off has to be found for specfc applcatons. RESULTS AND ANALYSIS To determne the performances of the proposed mage authentcaton scheme for several mages of dfferent szes ere used. We have evaluated our algorthms n terms of mage qualty, localzaton capablty of the tamperng. Table 1 shos the mage qualty and decodng results of the proposed method for dfferent choces of the avelet resoluton level n for atermark embeddng, quantzaton step sze Q and group sze d, here PSNR s the mean Peak Sgnal to Nose Rato. The PSNR values are above 40 db, except Q=12 (d = 4), Q =16 (d = 4 and d = 8) and Q =20 (d =4, d = 8 and d = 12), here small dstorton are also vsble n the atermarked mages. Quantzaton Level (Q) Table 1 Mean PSNR values for the atermarked mages Image of lena.jpg Image of cameraman.tf Coeffcent N = 1 N = 2 N = 1 N = 2 group sze (d) (PSNR) (PSNR) (PSNR) (PSNR) In Fg. 4 e compare our technque th avelet decomposton level n = 1 and d = 4, d = 8, d = 12 and d = 16. We also measure the PSNR value on dfferent quantzaton level. We can see that our approach acheves very hgh mage qualty th respect to ncreasng group sze (d) and decreasng quantzaton level (Q). IJEDR Internatonal Journal of Engneerng Development and Research (.jedr.org) 2881

5 Fgure III. Graph for qualty of the atermarked mages for dfferent group szes. Next, e test the capacty of our approach to detect the tamperng. For ths purpose, n the mage n Fg.5a shos the orgnal nput mage and Fg.5b shos the atermarked mage. Frst e embed the atermark n the frst Wavelet decomposton level (n = 1), usng groups of d = 8 avelet coeffcents and the quantzaton step sze Q =8. Fg.5c shos the potentally tampered locatons n the mage before refnng the authentcaton result through flterng. (a) (b) (c) (d) IJEDR Internatonal Journal of Engneerng Development and Research (.jedr.org) 2882

6 (e) (f) IV. Fgure 5. (a) orgnal mage, (b) atermarked mage after dong random permutaton and addng atermark bt (c) authentcated mage before flterng for n =1, d = 8 and Q = 8, (d) authentcated mage after flterng and mathematcal morphology operatons for n =1, d = 8 and Q = 8, (e) authentcated mage before flterng for n =2, d = 8 and Q = 8, (f) authentcated mage after flterng and mathematcal morphology operatons for n = 2, d = 8 and Q = 8. Then, e flter the authentcaton matrx th a cross shaped bnary flter of sze F = 5. The fltered authentcaton matrx s then successvely eroded usng a dsk of radus R = 1 and a square of sze 3 x 3 as structural elements. Fg. 5d shos the refned authentcaton result after flterng and eroson operatons. In Fg. 5e and f e depct the authentcaton results before and after refnement usng the follong parameters: n =2, d = 8 and Q = 8. CONCLUSION In ths paper e have proposed a ne mage authentcaton scheme usng a sem-fragle atermark that can detect and locate malcous tamperng n mages. The embeddng and extracton of the authentcaton atermark s done n the DWT doman. Our technque acheves hgh mage qualty and hgh tamperng detecton resoluton at a lo atermark payload usng random permutaton of the avelet coeffcents before embeddng, the atermark s also protected aganst local attacks. REFERENCES [1] R.O. Preda, D.N. Vzreanu, Robust avelet-based vdeo atermarkng scheme for copyrght protecton usng the human vsual system, Journal of Electronc Imagng, vol. 20, pp , [2] R.O. Preda, D.N. Vzreanu, A robust dgtal atermarkng scheme for vdeo copyrght protecton n the avelet doman, Measurement, Measurement, vol. 43, pp , [3] Preda, R.O.; Vzreanu, D.N., "Blnd Watermarkng Capacty Analyss of MPEG2 Coded Vdeo," 8th Internatonal Conference on Telecommuncatons n Modern Satellte, Cable and Broadcastng Servces, pp. 465,468, Sept [4] A. Pva, F. Bartoln, R. Caldelly, Self recovery authentcaton of mages n DWT doman, Internatonal Journal of Image and Graphcs, vol. 5, pp , [5] C.-T. L, H. S, Wavelet-based fragle atermarkng scheme for mage authentcaton, Journal of Electronc Imagng, vol. 16, pp. 1-9, [6] A.H. Ouda, M.R. El-Sakka, Localzaton and securty enhancement of blockbased mage authentcaton, IEEE Internatonal Conference on Image Processng, vol. 1, pp , September 2005 [7] C. Fe, D. Kundur, R.H. Kong, Analyss and desgn of secure atermark-based authentcaton systems, IEEE Transactons on Informaton Forenscs and Securty, vol. 1, pp , 2006 [8] L.P. Frere, P. Comesana, J.R.T. Pastorza, F.P. Gonzalez, Watermarkng securty: a survey, LNCS Transactons on Data Hdng and Multmeda Securty, vol. 1, pp , [9] M. Hollman, N. Memon, Counterfetng attacks on oblvous block-se ndependent nvsble atermarkng schemes, IEEE Transactons Image Processng, vol. 9, pp , [10] D. N Vzreanu, S. Halunga, G. Marghescu, Morphologcal skeleton decomposton nterframe nterpolaton method, Journal of Electronc Imagng, vol. 19, pp. 1-3, [11] R. M Udrea, D.N. Vzreanu, Iteratve generalzaton of morphologcal skeleton, Journal of Electronc Imagng, vol. 16, pp. 1-3, IJEDR Internatonal Journal of Engneerng Development and Research (.jedr.org) 2883

IMAGE AUTHENTICATION AND RECOVERY USING WAVELET-BASED DUAL WATERMARKING

IMAGE AUTHENTICATION AND RECOVERY USING WAVELET-BASED DUAL WATERMARKING U.P.B. Sc. Bull., Seres C, Vol. 77, Iss. 4, 015 ISSN 86-3540 IMAGE AUTHENTICATION AND RECOVERY USING WAVELET-BASED DUAL WATERMARKING Radu Ovdu PREDA 1, Ioana MARCU, Amela CIOBANU 3 In ths paper a novel

More information

Robust Block Selection for Watermarking Video Streams

Robust Block Selection for Watermarking Video Streams Proceedngs of the World Congress on Engneerng 8 Vol I WCE 8, July - 4, 8, London, U.K. Robust Block Selecton for Watermarkng Vdeo Streams Tamás Polyák, Gábor Fehér Abstract In ths paper a robust vdeo atermarkng

More information

An Efficient Blind Watermarking Method based on Significant Difference of Wavelet Tree Quantization using Adaptive Threshold

An Efficient Blind Watermarking Method based on Significant Difference of Wavelet Tree Quantization using Adaptive Threshold Internatonal Journal of Electroncs and Electrcal Engneerng Vol., No., June 3 An Effcent Blnd ng Method based on Sgnfcant Dfference of Wavelet Tree Quantzaton usng Adaptve Threshold Then Huynh The Unversty

More information

CONTOURLET TRANSFORM BASED WATERMARKING FOR COLOUR IMAGES

CONTOURLET TRANSFORM BASED WATERMARKING FOR COLOUR IMAGES he Internatonal Journal of Multmeda & Its Applcatons (IJMA) Vol.3, No.1, February 211 CONOURLE RANSFORM BASED WAERMARKING FOR COLOUR IMAGES Dnesh Kumar 1 and Vjay Kumar 2 1 Department of Computer Scence

More information

Side-Match Vector Quantizers Using Neural Network Based Variance Predictor for Image Coding

Side-Match Vector Quantizers Using Neural Network Based Variance Predictor for Image Coding Sde-Match Vector Quantzers Usng Neural Network Based Varance Predctor for Image Codng Shuangteng Zhang Department of Computer Scence Eastern Kentucky Unversty Rchmond, KY 40475, U.S.A. shuangteng.zhang@eku.edu

More information

Inverse Halftoning Method Using Pattern Substitution Based Data Hiding Scheme

Inverse Halftoning Method Using Pattern Substitution Based Data Hiding Scheme Proceedngs of the World Congress on Engneerng 2011 Vol II, July 6-8, 2011, London, U.K. Inverse Halftonng Method Usng Pattern Substtuton Based Data Hdng Scheme Me-Y Wu, Ja-Hong Lee and Hong-Je Wu Abstract

More information

A Novel and Secure technique for image. Steganography using DWT

A Novel and Secure technique for image. Steganography using DWT Internatonal Journal of Computer Technology and Electroncs Engneerng (IJCTEE) Volume 3 Issue 5 October 2013 A Novel and Secure technque for mage Abstract: Steganography s the art and scence of hdng nformaton

More information

BLIND COMPRESSED IMAGE WATERMARKING FOR NOISY COMMUNICATION CHANNELS

BLIND COMPRESSED IMAGE WATERMARKING FOR NOISY COMMUNICATION CHANNELS BLIND COMPRESSED IMAGE WATERMARKING FOR NOISY COMMUNICATION CHANNELS Jonathan Me Carnege Mellon Unversty Department of Electrcal & Computer Engneerng Pttsburgh, PA 523 jme@cmu.edu Scott Pudlewsk Lncoln

More information

PRACTICAL, COMPUTATION EFFICIENT HIGH-ORDER NEURAL NETWORK FOR ROTATION AND SHIFT INVARIANT PATTERN RECOGNITION. Evgeny Artyomov and Orly Yadid-Pecht

PRACTICAL, COMPUTATION EFFICIENT HIGH-ORDER NEURAL NETWORK FOR ROTATION AND SHIFT INVARIANT PATTERN RECOGNITION. Evgeny Artyomov and Orly Yadid-Pecht 68 Internatonal Journal "Informaton Theores & Applcatons" Vol.11 PRACTICAL, COMPUTATION EFFICIENT HIGH-ORDER NEURAL NETWORK FOR ROTATION AND SHIFT INVARIANT PATTERN RECOGNITION Evgeny Artyomov and Orly

More information

A High-Sensitivity Oversampling Digital Signal Detection Technique for CMOS Image Sensors Using Non-destructive Intermediate High-Speed Readout Mode

A High-Sensitivity Oversampling Digital Signal Detection Technique for CMOS Image Sensors Using Non-destructive Intermediate High-Speed Readout Mode A Hgh-Senstvty Oversamplng Dgtal Sgnal Detecton Technque for CMOS Image Sensors Usng Non-destructve Intermedate Hgh-Speed Readout Mode Shoj Kawahto*, Nobuhro Kawa** and Yoshak Tadokoro** *Research Insttute

More information

A New Statistical Detector for CT-Based Multiplicative Image Watermarking Using the t Location-Scale Distribution

A New Statistical Detector for CT-Based Multiplicative Image Watermarking Using the t Location-Scale Distribution 9th Internatonal Conference on Informaton and Knowledge Technology (IKT 07) October 8 & 9, 07, Amrkabr Unversty of Technology A ew Statstcal Detector for CT-Based Multplcatve Image Watermarkng Usng the

More information

Proposed Approach for Improving Bluetooth Networks Security through SVD Audio Watermarking

Proposed Approach for Improving Bluetooth Networks Security through SVD Audio Watermarking Proposed pproach for Improvng Bluetooth Netorks Securty through SVD udo Watermarkng M.. M. El-Bendary,. Haggag Dept. of Electroncs echnology, Faculty of Industral Educaton, Helan Unversty. Caro, Egypt.

More information

Improved Error Detection in the JPEG2000 Codec

Improved Error Detection in the JPEG2000 Codec Improved Error Detecton n the JPEG2000 Codec Farzad Zargar, Member, IEEE, Al Sefdpour, M. Shahram Mon, Member, IEEE, and Mohammad Ghanbar, Fellow, IEEE Abstract the Segmentaton symbol s an error reslence

More information

Spread Spectrum based M-ary Modulated Robust Image Watermarking

Spread Spectrum based M-ary Modulated Robust Image Watermarking 54 IJCSS Internatonal Journal of Computer Scence and etwor Securty, VOL.7 o., October 27 Spread Spectrum based M-ary Modulated Robust Image atermarng T. S. Das, V. H. Manar 2 and S. K. Sarar 3, Dept. of

More information

A Novel DCT-based Approach for Secure Color Image Watermarking

A Novel DCT-based Approach for Secure Color Image Watermarking A Novel DCT-based Aroach for Secure Color Image Watermarkng Narges Ahmd Amrkabr Unversty of Technology n_ahmd@ce.aut.ac.r Reza Safabakhsh Amrkabr Unversty of Technology safa@ce.aut.ac.r Abstract In ths

More information

Calculation of the received voltage due to the radiation from multiple co-frequency sources

Calculation of the received voltage due to the radiation from multiple co-frequency sources Rec. ITU-R SM.1271-0 1 RECOMMENDATION ITU-R SM.1271-0 * EFFICIENT SPECTRUM UTILIZATION USING PROBABILISTIC METHODS Rec. ITU-R SM.1271 (1997) The ITU Radocommuncaton Assembly, consderng a) that communcatons

More information

Efficient Large Integers Arithmetic by Adopting Squaring and Complement Recoding Techniques

Efficient Large Integers Arithmetic by Adopting Squaring and Complement Recoding Techniques The th Worshop on Combnatoral Mathematcs and Computaton Theory Effcent Large Integers Arthmetc by Adoptng Squarng and Complement Recodng Technques Cha-Long Wu*, Der-Chyuan Lou, and Te-Jen Chang *Department

More information

Steganography in JPEG2000 Compressed Images

Steganography in JPEG2000 Compressed Images 824 IEEE Transactons on Consumer Electroncs, Vol. 49, No. 4, NOVEMBER 2003 Steganography n JPEG2000 Compressed Images Po-Chy Su and C.-C. Jay Kuo, Fellow, IEEE Abstract Informaton hdng n JPEG2000 compressed

More information

Chaotic Filter Bank for Computer Cryptography

Chaotic Filter Bank for Computer Cryptography Chaotc Flter Bank for Computer Cryptography Bngo Wng-uen Lng Telephone: 44 () 784894 Fax: 44 () 784893 Emal: HTwng-kuen.lng@kcl.ac.ukTH Department of Electronc Engneerng, Dvson of Engneerng, ng s College

More information

New Wavelet Based Performance Analysis and Optimization of Scalable Joint Source/Channel Coder (SJSCC & SJSCCN) for Time-Varying Channels.

New Wavelet Based Performance Analysis and Optimization of Scalable Joint Source/Channel Coder (SJSCC & SJSCCN) for Time-Varying Channels. Internatonal Research Journal of Engneerng and Technology (IRJET) e-issn: 2395-0056 Volume: 02 Issue: 09 DEC-205 p-issn: 2395-0072 www.rjet.net New Wavelet Based Performance Analyss and Optmzaton of Scalable

More information

To: Professor Avitabile Date: February 4, 2003 From: Mechanical Student Subject: Experiment #1 Numerical Methods Using Excel

To: Professor Avitabile Date: February 4, 2003 From: Mechanical Student Subject: Experiment #1 Numerical Methods Using Excel To: Professor Avtable Date: February 4, 3 From: Mechancal Student Subject:.3 Experment # Numercal Methods Usng Excel Introducton Mcrosoft Excel s a spreadsheet program that can be used for data analyss,

More information

Performance Analysis of Multi User MIMO System with Block-Diagonalization Precoding Scheme

Performance Analysis of Multi User MIMO System with Block-Diagonalization Precoding Scheme Performance Analyss of Mult User MIMO System wth Block-Dagonalzaton Precodng Scheme Yoon Hyun m and Jn Young m, wanwoon Unversty, Department of Electroncs Convergence Engneerng, Wolgye-Dong, Nowon-Gu,

More information

FFT Spectrum Analyzer

FFT Spectrum Analyzer THE ANNUAL SYMPOSIUM OF THE INSTITUTE OF SOLID MECHANICS SISOM 22 BUCHAREST May 16-17 ----------------------------------------------------------------------------------------------------------------------------------------

More information

A Novel GNSS Weak Signal Acquisition Using Wavelet Denoising Method

A Novel GNSS Weak Signal Acquisition Using Wavelet Denoising Method A Novel GNSS Weak Sgnal Acquston Usng Wavelet Denosng Method Jn Tan, Lu Yang, BeHang Unversty, P.R.Chna BIOGRAPHY Jn Tan s a post-doctor n School of Electronc and Informaton Engneerng, BeHang Unversty,

More information

DISTINCT IMAGE FUSION METHODS FOR LANDSLIDE INFORMATION ENHANCEMENT

DISTINCT IMAGE FUSION METHODS FOR LANDSLIDE INFORMATION ENHANCEMENT DISTINCT IMAGE FUSION METHODS FOR LANDSLIDE INFORMATION ENHANCEMENT J.Wang a,b, a *, J.X.Zhang, Z.J.Lu a a Insttute of Photogrammetry & Remote Sensng, CASM, Bejng, Chna - stecsm@publc.bta.net.cn b Department

More information

Multi-focus Image Fusion Using Spatial Frequency and Genetic Algorithm

Multi-focus Image Fusion Using Spatial Frequency and Genetic Algorithm 0 IJCSNS Internatonal Journal of Computer Scence and Network Securty, VOL.8 No., February 008 Mult-focus Image Fuson Usng Spatal Frequency and Genetc Algorthm Jun Kong,, Kayuan Zheng,, Jngbo Zhang,,*,,

More information

A study of turbo codes for multilevel modulations in Gaussian and mobile channels

A study of turbo codes for multilevel modulations in Gaussian and mobile channels A study of turbo codes for multlevel modulatons n Gaussan and moble channels Lamne Sylla and Paul Forter (sylla, forter)@gel.ulaval.ca Department of Electrcal and Computer Engneerng Laval Unversty, Ste-Foy,

More information

The Application of Interpolation Algorithms in OFDM Channel Estimation

The Application of Interpolation Algorithms in OFDM Channel Estimation The Applcaton of Interpolaton Algorthms n OFDM Estmaton Xjun ZHANG 1,, Zhantng YUAN 1, 1 School of Electrcal and Informaton Engneerng, Lanzhou Unversty of Technology, Lanzhou, Gansu 730050, Chna School

More information

Recognition of Low-Resolution Face Images using Sparse Coding of Local Features

Recognition of Low-Resolution Face Images using Sparse Coding of Local Features Recognton of Low-Resoluton Face Images usng Sparse Codng of Local Features M. Saad Shakeel and Kn-Man-Lam Centre for Sgnal Processng, Department of Electronc and Informaton Engneerng he Hong Kong Polytechnc

More information

Comparative Analysis of Reuse 1 and 3 in Cellular Network Based On SIR Distribution and Rate

Comparative Analysis of Reuse 1 and 3 in Cellular Network Based On SIR Distribution and Rate Comparatve Analyss of Reuse and 3 n ular Network Based On IR Dstrbuton and Rate Chandra Thapa M.Tech. II, DEC V College of Engneerng & Technology R.V.. Nagar, Chttoor-5727, A.P. Inda Emal: chandra2thapa@gmal.com

More information

Optimizing a System of Threshold-based Sensors with Application to Biosurveillance

Optimizing a System of Threshold-based Sensors with Application to Biosurveillance Optmzng a System of Threshold-based Sensors wth Applcaton to Bosurvellance Ronald D. Frcker, Jr. Thrd Annual Quanttatve Methods n Defense and Natonal Securty Conference May 28, 2008 What s Bosurvellance?

More information

antenna antenna (4.139)

antenna antenna (4.139) .6.6 The Lmts of Usable Input Levels for LNAs The sgnal voltage level delvered to the nput of an LNA from the antenna may vary n a very wde nterval, from very weak sgnals comparable to the nose level,

More information

LSPIHT Algorithm for ECG Data Compression and Transmission for Telemedicine Applications

LSPIHT Algorithm for ECG Data Compression and Transmission for Telemedicine Applications Dhaa Unv. J. Sc. 60(1): 31-36, 2012 (January) LSPIHT Algorthm for ECG Data Compresson and Transmsson for Telemedcne Applcatons Tahmna Zebn, Eramul Faroo, Syeda Znath Aman and Shahda Rafque Department of

More information

Fast Code Detection Using High Speed Time Delay Neural Networks

Fast Code Detection Using High Speed Time Delay Neural Networks Fast Code Detecton Usng Hgh Speed Tme Delay Neural Networks Hazem M. El-Bakry 1 and Nkos Mastoraks 1 Faculty of Computer Scence & Informaton Systems, Mansoura Unversty, Egypt helbakry0@yahoo.com Department

More information

NATIONAL RADIO ASTRONOMY OBSERVATORY Green Bank, West Virginia SPECTRAL PROCESSOR MEMO NO. 25. MEMORANDUM February 13, 1985

NATIONAL RADIO ASTRONOMY OBSERVATORY Green Bank, West Virginia SPECTRAL PROCESSOR MEMO NO. 25. MEMORANDUM February 13, 1985 NATONAL RADO ASTRONOMY OBSERVATORY Green Bank, West Vrgna SPECTRAL PROCESSOR MEMO NO. 25 MEMORANDUM February 13, 1985 To: Spectral Processor Group From: R. Fsher Subj: Some Experments wth an nteger FFT

More information

High Speed, Low Power And Area Efficient Carry-Select Adder

High Speed, Low Power And Area Efficient Carry-Select Adder Internatonal Journal of Scence, Engneerng and Technology Research (IJSETR), Volume 5, Issue 3, March 2016 Hgh Speed, Low Power And Area Effcent Carry-Select Adder Nelant Harsh M.tech.VLSI Desgn Electroncs

More information

A Robust Feature Extraction Algorithm for Audio Fingerprinting

A Robust Feature Extraction Algorithm for Audio Fingerprinting A Robust Feature Extracton Algorthm for Audo Fngerprntng Janpng Chen 1, Tejun Huang 2 1 Insttute of Computng Technology, Chnese Academy of Scences, Bejng 100190, Chna 2 Key Laboratory of Machne Percepton(Mnstry

More information

Multi-Level Halftoning by IGS Quantization

Multi-Level Halftoning by IGS Quantization Journal of Sgnal and Informaton Processng, 2013, 4, 351-358 Publshed Onlne ovember 2013 (http://www.scrp.org/journal/jsp) http://dx.do.org/10.4236/jsp.2013.44044 351 Mult-Level Halftonng by IGS Quantzaton

More information

MEDICAL IMAGE WATERMARKING WITH PSNR OPTIMIZATION IN WAVELET DOMAIN BASED ON BAT ALGORITHM

MEDICAL IMAGE WATERMARKING WITH PSNR OPTIMIZATION IN WAVELET DOMAIN BASED ON BAT ALGORITHM Journal of Theoretcal and Appled Informaton Technology 2005-2015 JATIT & LLS. All rghts reserved. ISSN: 1992-8645 www.jatt.org E-ISSN: 1817-3195 MEDICAL IMAGE WATERMARKING WITH PSNR OPTIMIZATION IN WAVELET

More information

Estimation of Critical Performance and Optimization of Scalable Joint Source/Channel Coder (SJSCC) For Time Varying Channels

Estimation of Critical Performance and Optimization of Scalable Joint Source/Channel Coder (SJSCC) For Time Varying Channels Proceedngs of the Internatonal MultConference of Engneers and Computer Scentsts 8 Vol II IMECS 8, 9- March, 8, Hong ong Estmaton of Crtcal Performance and Optmzaton of Scalable Jont Source/ Coder (SJSCC)

More information

THE USE OF CONVOLUTIONAL CODE FOR NARROWBAND INTERFERENCE SUPPRESSION IN OFDM-DVBT SYSTEM

THE USE OF CONVOLUTIONAL CODE FOR NARROWBAND INTERFERENCE SUPPRESSION IN OFDM-DVBT SYSTEM THE USE OF CONVOLUTIONAL CODE FOR NARROWBAND INTERFERENCE SUPPRESSION IN OFDM-DVBT SYSTEM Azura Abdullah, Muhammad Sobrun Jaml Jamal, Khazuran Abdullah, Ahmad Fadzl Ismal and An Lza Asnaw Department of

More information

29. Network Functions for Circuits Containing Op Amps

29. Network Functions for Circuits Containing Op Amps 9. Network Functons for Crcuts Contanng Op Amps Introducton Each of the crcuts n ths problem set contans at least one op amp. Also each crcut s represented by a gven network functon. These problems can

More information

Review: Our Approach 2. CSC310 Information Theory

Review: Our Approach 2. CSC310 Information Theory CSC30 Informaton Theory Sam Rowes Lecture 3: Provng the Kraft-McMllan Inequaltes September 8, 6 Revew: Our Approach The study of both compresson and transmsson requres that we abstract data and messages

More information

Image analysis using modulated light sources Feng Xiao a*, Jeffrey M. DiCarlo b, Peter B. Catrysse b, Brian A. Wandell a

Image analysis using modulated light sources Feng Xiao a*, Jeffrey M. DiCarlo b, Peter B. Catrysse b, Brian A. Wandell a Image analyss usng modulated lght sources Feng Xao a*, Jeffrey M. DCarlo b, Peter B. Catrysse b, Bran A. Wandell a a Dept. of Psychology, Stanford Unversty, CA 9435, USA b Dept. of Electrcal Engneerng,

More information

The Performance Improvement of BASK System for Giga-Bit MODEM Using the Fuzzy System

The Performance Improvement of BASK System for Giga-Bit MODEM Using the Fuzzy System Int. J. Communcatons, Network and System Scences, 10, 3, 1-5 do:10.36/jcns.10.358 Publshed Onlne May 10 (http://www.scrp.org/journal/jcns/) The Performance Improvement of BASK System for Gga-Bt MODEM Usng

More information

Robust Filter Design based on Generalized Maximum-Likelihood Estimation

Robust Filter Design based on Generalized Maximum-Likelihood Estimation Robust Flter Desgn based on Generalzed Maxmum-Lkelhood Estmaton STEFA LEISCHER, ROBERT KLISKI, HOLGER HUTZELMA, RUDI KORR Fraunhofer Insttute for Communcaton Systems Hansastr. 3, 8686 Munch GERMAY Abstract:

More information

Design and Implementation of DDFS Based on Quasi-linear Interpolation Algorithm

Design and Implementation of DDFS Based on Quasi-linear Interpolation Algorithm Desgn and Implementaton of DDFS Based on Quas-lnear Interpolaton Algorthm We Wang a, Yuanyuan Xu b and Hao Yang c College of Electroncs Engneerng, Chongqng Unversty of Posts and Telecommuncatons, Chongqng

More information

Rejection of PSK Interference in DS-SS/PSK System Using Adaptive Transversal Filter with Conditional Response Recalculation

Rejection of PSK Interference in DS-SS/PSK System Using Adaptive Transversal Filter with Conditional Response Recalculation SERBIAN JOURNAL OF ELECTRICAL ENGINEERING Vol., No., November 23, 3-9 Rejecton of PSK Interference n DS-SS/PSK System Usng Adaptve Transversal Flter wth Condtonal Response Recalculaton Zorca Nkolć, Bojan

More information

Walsh Function Based Synthesis Method of PWM Pattern for Full-Bridge Inverter

Walsh Function Based Synthesis Method of PWM Pattern for Full-Bridge Inverter Walsh Functon Based Synthess Method of PWM Pattern for Full-Brdge Inverter Sej Kondo and Krt Choesa Nagaoka Unversty of Technology 63-, Kamtomoka-cho, Nagaoka 9-, JAPAN Fax: +8-58-7-95, Phone: +8-58-7-957

More information

PROTECTING INTELLECTUAL RIGHTS: DIGITAL WATERMARKING IN THE WAVELET DOMAIN

PROTECTING INTELLECTUAL RIGHTS: DIGITAL WATERMARKING IN THE WAVELET DOMAIN PROTECTING INTELLECTUAL RIGHTS: DIGITAL WATERMARKING IN THE WAVELET DOMAIN Crstan V. SERDEAN 1, Martn TOMLINSON 1, Graham J. WADE 2 and Adran M. AMBROZE 1 1 Unversty of Plymouth, Unted Kngdom and 2 The

More information

Performance Comparison of Product Codes and Cubic Product Codes using FRBS for Robust Watermarking

Performance Comparison of Product Codes and Cubic Product Codes using FRBS for Robust Watermarking Internatonal Journal of Computer Informaton Systems and Industral Management Applcatons. ISSN 250-7988 Volume 8 (206) pp. 057-066 MIR Labs, www.mrlabs.net/jcsm/ndex.html Performance Comparson of Product

More information

Analysis and Characterization of JPEG 2000 Standard for Imaging Devices

Analysis and Characterization of JPEG 2000 Standard for Imaging Devices S. Battato et al.: Analyss and Characterzaton of JPEG 2 Standard for Imagng Devces Analyss and Characterzaton of JPEG 2 Standard for Imagng Devces S. Battato 1, A. R. Bruna 2, A. Buem 2 and A. Castorna

More information

Application of Intelligent Voltage Control System to Korean Power Systems

Application of Intelligent Voltage Control System to Korean Power Systems Applcaton of Intellgent Voltage Control System to Korean Power Systems WonKun Yu a,1 and HeungJae Lee b, *,2 a Department of Power System, Seol Unversty, South Korea. b Department of Power System, Kwangwoon

More information

Low Sampling Rate Technology for UHF Partial Discharge Signals Based on Sparse Vector Recovery

Low Sampling Rate Technology for UHF Partial Discharge Signals Based on Sparse Vector Recovery 017 nd Internatonal Semnar on Appled Physcs, Optoelectroncs and Photoncs (APOP 017) ISBN: 978-1-60595-5-3 Low Samplng Rate Technology for UHF Partal Dscharge Sgnals Based on Sparse Vector Recovery Qang

More information

Digital Transmission

Digital Transmission Dgtal Transmsson Most modern communcaton systems are dgtal, meanng that the transmtted normaton sgnal carres bts and symbols rather than an analog sgnal. The eect o C/N rato ncrease or decrease on dgtal

More information

A Current Differential Line Protection Using a Synchronous Reference Frame Approach

A Current Differential Line Protection Using a Synchronous Reference Frame Approach A Current Dfferental Lne rotecton Usng a Synchronous Reference Frame Approach L. Sousa Martns *, Carlos Fortunato *, and V.Fernão res * * Escola Sup. Tecnologa Setúbal / Inst. oltécnco Setúbal, Setúbal,

More information

Time-frequency Analysis Based State Diagnosis of Transformers Windings under the Short-Circuit Shock

Time-frequency Analysis Based State Diagnosis of Transformers Windings under the Short-Circuit Shock Tme-frequency Analyss Based State Dagnoss of Transformers Wndngs under the Short-Crcut Shock YUYING SHAO, ZHUSHI RAO School of Mechancal Engneerng ZHIJIAN JIN Hgh Voltage Lab Shangha Jao Tong Unversty

More information

Double-lock for image encryption with virtual optical wavelength

Double-lock for image encryption with virtual optical wavelength Double-lock for mage encrypton wth vrtual optcal wavelength Xang Peng Natonal Laboratory of Precson Measurement Technology and Instrumentaton, Tanjn Unversty, 30007 Tanjn, Chna Lngfeng Yu, and Llong Ca

More information

Error Probability of RS Code Over Wireless Channel

Error Probability of RS Code Over Wireless Channel Internatonal Journal of Electroncs Engneerng, 3 (), 11, pp. 99 33 Serals Publcatons, ISS : 973-7383 Error Probablty of RS Code Over Wreless Channel Mohammad Aftab Alam Khan 1 & Mehwash Farooq 1 1 Department

More information

Range-Based Localization in Wireless Networks Using Density-Based Outlier Detection

Range-Based Localization in Wireless Networks Using Density-Based Outlier Detection Wreless Sensor Network, 010,, 807-814 do:10.436/wsn.010.11097 Publshed Onlne November 010 (http://www.scrp.org/journal/wsn) Range-Based Localzaton n Wreless Networks Usng Densty-Based Outler Detecton Abstract

More information

Figure.1. Basic model of an impedance source converter JCHPS Special Issue 12: August Page 13

Figure.1. Basic model of an impedance source converter JCHPS Special Issue 12: August Page 13 A Hgh Gan DC - DC Converter wth Soft Swtchng and Power actor Correcton for Renewable Energy Applcaton T. Selvakumaran* and. Svachdambaranathan Department of EEE, Sathyabama Unversty, Chenna, Inda. *Correspondng

More information

POWER-DISTORTION OPTIMIZATION FOR WIRELESS IMAGE/VIDEO SOFTCAST BY TRANSFORM COEFFICIENTS ENERGY MODELING WITH ADAPTIVE CHUNK DIVISION

POWER-DISTORTION OPTIMIZATION FOR WIRELESS IMAGE/VIDEO SOFTCAST BY TRANSFORM COEFFICIENTS ENERGY MODELING WITH ADAPTIVE CHUNK DIVISION POWER-DISTORTION OPTIMIZATION FOR WIRELESS IMAGE/VIDEO SOFTCAST BY TRANSFORM COEFFICIENTS ENERGY MODELING WITH ADAPTIVE CHUNK DIVISION Ruqn Xong 1, Feng Wu, Xaopeng Fan 3, Chong Luo, Swe Ma 1, Wen Gao

More information

Research of Dispatching Method in Elevator Group Control System Based on Fuzzy Neural Network. Yufeng Dai a, Yun Du b

Research of Dispatching Method in Elevator Group Control System Based on Fuzzy Neural Network. Yufeng Dai a, Yun Du b 2nd Internatonal Conference on Computer Engneerng, Informaton Scence & Applcaton Technology (ICCIA 207) Research of Dspatchng Method n Elevator Group Control System Based on Fuzzy Neural Network Yufeng

More information

DVB-T/H Digital Television Transmission and its Simulation over Ricean and Rayleigh Fading Channels

DVB-T/H Digital Television Transmission and its Simulation over Ricean and Rayleigh Fading Channels DVB-T/H Dgtal Televson Transmsson and ts Smulaton over Rcean and Raylegh Fadng Channels Ladslav Polák, Tomáš Kratochvl Department of Rado Electroncs, Brno Unversty of Technology, Purkyňova 118, 612 Brno,

More information

communications are increasingly used in a way that they are scrambling and the combination of scrambling frequency and time domain.

communications are increasingly used in a way that they are scrambling and the combination of scrambling frequency and time domain. Journal of Advances n Computer Research Quarterly pissn: 2345-606x eissn: 2345-6078 Sar Branch, Islamc Azad Unversty, Sar, I.R.Iran (Vol. 7, No. 3, August 2016), Pages: 67-76 www.jacr.ausar.ac.r Audo Sgnal

More information

RC Filters TEP Related Topics Principle Equipment

RC Filters TEP Related Topics Principle Equipment RC Flters TEP Related Topcs Hgh-pass, low-pass, Wen-Robnson brdge, parallel-t flters, dfferentatng network, ntegratng network, step response, square wave, transfer functon. Prncple Resstor-Capactor (RC)

More information

Performance Analysis of the Weighted Window CFAR Algorithms

Performance Analysis of the Weighted Window CFAR Algorithms Performance Analyss of the Weghted Wndow CFAR Algorthms eng Xangwe Guan Jan He You Department of Electronc Engneerng, Naval Aeronautcal Engneerng Academy, Er a road 88, Yanta Cty 6400, Shandong Provnce,

More information

Evaluate the Effective of Annular Aperture on the OTF for Fractal Optical Modulator

Evaluate the Effective of Annular Aperture on the OTF for Fractal Optical Modulator Global Advanced Research Journal of Management and Busness Studes (ISSN: 2315-5086) Vol. 4(3) pp. 082-086, March, 2015 Avalable onlne http://garj.org/garjmbs/ndex.htm Copyrght 2015 Global Advanced Research

More information

Graph Method for Solving Switched Capacitors Circuits

Graph Method for Solving Switched Capacitors Circuits Recent Advances n rcuts, ystems, gnal and Telecommuncatons Graph Method for olvng wtched apactors rcuts BHUMIL BRTNÍ Department of lectroncs and Informatcs ollege of Polytechncs Jhlava Tolstého 6, 586

More information

Encoder and Decoder Side Global and Local Motion Estimation for Distributed Video Coding

Encoder and Decoder Side Global and Local Motion Estimation for Distributed Video Coding Encoder and Decoder Sde Global and Local Moton Estmaton for Dstrbuted Vdeo Codng Frederc Dufaux, Touradj Ebrahm MultMeda Sgnal Processng Group Ecole Polytechnque Fédérale de Lausanne (EPFL) CH-1015 Lausanne,

More information

Multi-transmitter aperture synthesis with Zernike based aberration correction

Multi-transmitter aperture synthesis with Zernike based aberration correction Mult-transmtter aperture synthess wth Zerne based aberraton correcton Bahadr Guntur,, Davd J Rabb, 2 and Douglas F Jameson 2 Lousana State Unversty, Dept of Electrcal & Computer Engneerng, Baton Rouge,

More information

Archive of SID. Channel Capacity Analysis of Spread Spectrum Audio Watermarking. M. Khademi

Archive of SID. Channel Capacity Analysis of Spread Spectrum Audio Watermarking.   M. Khademi KHADEMI: CHAEL CAPACITY AALYSIS OF SPREAD SPECTRUM AUDIO WATERMARKIG Channel Capacty Analyss of Spread Spectrum Audo Watermarkng M. Khadem Abstract In ths paper, nformaton-theoretc analyss of spread spectrum

More information

Motion Vector Recovery for Real-Time H.264 Video Streams

Motion Vector Recovery for Real-Time H.264 Video Streams Internatonal J. of Recent Trends n Engneerng and Technology, Vol., No., May 2 Moton Vector Recovery for Real-Tme H.264 Vdeo Streams Kavsh Seth, Tummala Rajesh, V. Kamakot 2, and S. Srnvasan Dept. of Electrcal

More information

SPATIAL QUALITY EVALUATION OF FUSION OF DIFFERENT RESOLUTION IMAGES

SPATIAL QUALITY EVALUATION OF FUSION OF DIFFERENT RESOLUTION IMAGES Jun L SPATIAL QUALITY EVALUATION OF FUSION OF DIFFERENT RESOLUTION IMAGES Jun L Laval Unversty, Canada COPL, Physcs department Jl@phy.ulaval.ca KEY WORDS: Image Fuson, Evaluaton, Spatal Qualty, Blur Parameter,

More information

Delay Constrained Fuzzy Rate Control for Video Streaming over DVB-H

Delay Constrained Fuzzy Rate Control for Video Streaming over DVB-H Delay Constraned Fuzzy Rate Control for Vdeo Streamng over DVB-H Mehd Rezae, Moncef Gabbouj, 3 med Bouazz,, Tampere Unversty of Technology, 3 Noka Research Center, Tampere, Fnland mehd.rezae@tut.f, moncef.gabbouj@tut.f,

More information

Uncertainty in measurements of power and energy on power networks

Uncertainty in measurements of power and energy on power networks Uncertanty n measurements of power and energy on power networks E. Manov, N. Kolev Department of Measurement and Instrumentaton, Techncal Unversty Sofa, bul. Klment Ohrdsk No8, bl., 000 Sofa, Bulgara Tel./fax:

More information

A Heuristic Speech De-noising with the aid of Dual Tree Complex Wavelet Transform using Teaching-Learning Based Optimization

A Heuristic Speech De-noising with the aid of Dual Tree Complex Wavelet Transform using Teaching-Learning Based Optimization ISSN (Prnt) : 39-863 ISSN (Onlne) : 975-44 D. Yugandhar et al. / Internatonal Journal of Engneerng and Technology (IJET) A Heurstc Speech De-nosng wth the ad of Dual Tree Complex Wavelet Transform usng

More information

IIR Filters Using Stochastic Arithmetic

IIR Filters Using Stochastic Arithmetic IIR Flters Usng Stochastc Arthmetc Naman Saraf, Ka Bazargan, avd J Llja, and Marc Redel epartment of Electrcal and Computer Engneerng Unversty of Mnnesota, Twn Ctes Mnneapols, MN, USA {saraf012, ka, llja,

More information

A New Type of Weighted DV-Hop Algorithm Based on Correction Factor in WSNs

A New Type of Weighted DV-Hop Algorithm Based on Correction Factor in WSNs Journal of Communcatons Vol. 9, No. 9, September 2014 A New Type of Weghted DV-Hop Algorthm Based on Correcton Factor n WSNs Yng Wang, Zhy Fang, and Ln Chen Department of Computer scence and technology,

More information

Generalized Multiple ROI Prioritization in JPEG2000 for Natural Images

Generalized Multiple ROI Prioritization in JPEG2000 for Natural Images Ompraash Rajanar et al, / (IJCSIT) Internatonal Journal of Computer Scence and Informaton Technologes, Vol. 6 (), 015, 1636-164 Generalzed Multple ROI Prortzaton n JPEG000 for Natural Images Ompraash Rajanar

More information

MTBF PREDICTION REPORT

MTBF PREDICTION REPORT MTBF PREDICTION REPORT PRODUCT NAME: BLE112-A-V2 Issued date: 01-23-2015 Rev:1.0 Copyrght@2015 Bluegga Technologes. All rghts reserved. 1 MTBF PREDICTION REPORT... 1 PRODUCT NAME: BLE112-A-V2... 1 1.0

More information

Hardware Design of Filter Bank-Based Narrowband/Wideband Interference Canceler for Overlaid TDMA/CDMA Systems

Hardware Design of Filter Bank-Based Narrowband/Wideband Interference Canceler for Overlaid TDMA/CDMA Systems Hardware Desgn of Flter anased arrowband/deband Interference Canceler for Overlad TDMA/CDMA Systems Toyoau Ktano Kaunor Hayash Htosh Masutan and Shnsue Hara Graduate School of Engneerng Osaa Unversty YamadaOa

More information

ANNUAL OF NAVIGATION 11/2006

ANNUAL OF NAVIGATION 11/2006 ANNUAL OF NAVIGATION 11/2006 TOMASZ PRACZYK Naval Unversty of Gdyna A FEEDFORWARD LINEAR NEURAL NETWORK WITH HEBBA SELFORGANIZATION IN RADAR IMAGE COMPRESSION ABSTRACT The artcle presents the applcaton

More information

Hierarchical Generalized Cantor Set Modulation

Hierarchical Generalized Cantor Set Modulation 8th Internatonal Symposum on Wreless Communcaton Systems, Aachen Herarchcal Generalzed Cantor Set Modulaton Smon Görtzen, Lars Schefler, Anke Schmenk Informaton Theory and Systematc Desgn of Communcaton

More information

Research on Peak-detection Algorithm for High-precision Demodulation System of Fiber Bragg Grating

Research on Peak-detection Algorithm for High-precision Demodulation System of Fiber Bragg Grating , pp. 337-344 http://dx.do.org/10.1457/jht.014.7.6.9 Research on Peak-detecton Algorthm for Hgh-precson Demodulaton System of Fber ragg Gratng Peng Wang 1, *, Xu Han 1, Smn Guan 1, Hong Zhao and Mngle

More information

Measurements of protection ratios and overload thresholds for broadcast TV receivers

Measurements of protection ratios and overload thresholds for broadcast TV receivers Report ITU-R BT.2215 (5/211) Measurements of protecton ratos and overload thresholds for broadcast TV recevers BT Seres Broadcastng servce (televson) Rep. ITU-R BT.2215 Foreord The role of the Radocommuncaton

More information

Robust Image Transmission Performed by SPIHT and Turbo-Codes

Robust Image Transmission Performed by SPIHT and Turbo-Codes SERBIAN JOURNAL OF ELECTRICAL ENGINEERING Vol. 5, No.2, November 2008, 353-360 Robust Image Transmsson Performed by SPIHT and Turbo-Codes Abdelmounam Moulay Lakhdar, Rachda Mélan 2, Malka Kandouc 2 Abstract:

More information

OVER-SAMPLING FOR ACCURATE MASKING THRESHOLD CALCULATION IN WAVELET PACKET AUDIO CODERS

OVER-SAMPLING FOR ACCURATE MASKING THRESHOLD CALCULATION IN WAVELET PACKET AUDIO CODERS OVER-SAMPLING FOR ACCURATE MASKING THRESHOLD CALCULATION IN WAVELET PACKET AUDIO CODERS Ferdnan Snaga #, Elathamby Ambkarajah # and Andrew P. Bradley* # School of Electrcal Engneerng and Telecommuncatons

More information

HIGH PERFORMANCE ADDER USING VARIABLE THRESHOLD MOSFET IN 45NM TECHNOLOGY

HIGH PERFORMANCE ADDER USING VARIABLE THRESHOLD MOSFET IN 45NM TECHNOLOGY Internatonal Journal of Electrcal, Electroncs and Computer Systems, (IJEECS) HIGH PERFORMANCE ADDER USING VARIABLE THRESHOLD MOSFET IN 45NM TECHNOLOGY 1 Supryo Srman, 2 Dptendu Ku. Kundu, 3 Saradndu Panda,

More information

A Novel UWB Imaging System Setup for Computer- Aided Breast Cancer Diagnosis

A Novel UWB Imaging System Setup for Computer- Aided Breast Cancer Diagnosis A Novel UWB Imagng System Setup for Computer- Aded Breast Cancer Dagnoss Xang He, Ja L, Chenxng Wu Electrcal and Computer Engneerng Oakland Unversty, OU Rochester, I 48309, U.S.A xhe2@oakland.edu, l4@oakland.edu,

More information

International Journal of Scientific & Engineering Research, Volume 4, Issue 11, November-2013 ISSN

International Journal of Scientific & Engineering Research, Volume 4, Issue 11, November-2013 ISSN Internatonal Journal of Scentfc & Engneerng Research, Volume 4, Issue, November-203 ISSN 2229-558 33 COMPARATIVE STUDY OF HUFFMAN CODING, SBAC AND CABAC USED IN VARIOUS VIDEO CODING STANDARS AND THEIR

More information

Multiscale PCA based Quality Controlled Denoising of Multichannel ECG Signals

Multiscale PCA based Quality Controlled Denoising of Multichannel ECG Signals Multscale PCA based Qualty Controlled enosng of Multchannel ECG Sgnals L. N. Sharma, S. anadapat, and A. Mahanta Abstract Multscale Prncpal Component Analyss (MSPCA) s appled for qualty controlled denosng

More information

Retinal Blood Vessel Classification Based on Color and Directional Features in Fundus Images

Retinal Blood Vessel Classification Based on Color and Directional Features in Fundus Images nd Iranan Conference on Bomedcal Engneerng(ICBME 05), Iranan Research Organzaton for Scence and Technology (IROST), Tehran, Iran, 5-7 November 05 Retnal Blood Vessel Classfcaton Based on Color and Drectonal

More information

Parameter Free Iterative Decoding Metrics for Non-Coherent Orthogonal Modulation

Parameter Free Iterative Decoding Metrics for Non-Coherent Orthogonal Modulation 1 Parameter Free Iteratve Decodng Metrcs for Non-Coherent Orthogonal Modulaton Albert Gullén Fàbregas and Alex Grant Abstract We study decoder metrcs suted for teratve decodng of non-coherently detected

More information

Space Time Equalization-space time codes System Model for STCM

Space Time Equalization-space time codes System Model for STCM Space Tme Eualzaton-space tme codes System Model for STCM The system under consderaton conssts of ST encoder, fadng channel model wth AWGN, two transmt antennas, one receve antenna, Vterb eualzer wth deal

More information

Resource Allocation Optimization for Device-to- Device Communication Underlaying Cellular Networks

Resource Allocation Optimization for Device-to- Device Communication Underlaying Cellular Networks Resource Allocaton Optmzaton for Devce-to- Devce Communcaton Underlayng Cellular Networks Bn Wang, L Chen, Xaohang Chen, Xn Zhang, and Dacheng Yang Wreless Theores and Technologes (WT&T) Bejng Unversty

More information

SECURE multimedia data transmission across Internet can. A Channel-Dependent Statistical Watermark Detector for Color Images

SECURE multimedia data transmission across Internet can. A Channel-Dependent Statistical Watermark Detector for Color Images Ths artcle has been accepted for publcaton n a future ssue of ths journal, but has not been fully edted. Content may change pror to fnal publcaton. Ctaton nformaton: DOI.9/TMM.8.85447, IEEE Transactons

More information

THEORY OF YARN STRUCTURE by Prof. Bohuslav Neckář, Textile Department, IIT Delhi, New Delhi. Compression of fibrous assemblies

THEORY OF YARN STRUCTURE by Prof. Bohuslav Neckář, Textile Department, IIT Delhi, New Delhi. Compression of fibrous assemblies THEORY OF YARN STRUCTURE by Prof. Bohuslav Neckář, Textle Department, IIT Delh, New Delh. Compresson of fbrous assembles Q1) What was the dea of fbre-to-fbre contact accordng to van Wyk? A1) Accordng to

More information

Learning Ensembles of Convolutional Neural Networks

Learning Ensembles of Convolutional Neural Networks Learnng Ensembles of Convolutonal Neural Networks Lran Chen The Unversty of Chcago Faculty Mentor: Greg Shakhnarovch Toyota Technologcal Insttute at Chcago 1 Introducton Convolutonal Neural Networks (CNN)

More information

THE GENERATION OF 400 MW RF PULSES AT X-BAND USING RESONANT DELAY LINES *

THE GENERATION OF 400 MW RF PULSES AT X-BAND USING RESONANT DELAY LINES * SLAC PUB 874 3/1999 THE GENERATION OF 4 MW RF PULSES AT X-BAND USING RESONANT DELAY LINES * Sam G. Tantaw, Arnold E. Vleks, and Rod J. Loewen Stanford Lnear Accelerator Center, Stanford Unversty P.O. Box

More information