A Novel DCT-based Approach for Secure Color Image Watermarking
|
|
- Ralph Fletcher
- 6 years ago
- Views:
Transcription
1 A Novel DCT-based Aroach for Secure Color Image Watermarkng Narges Ahmd Amrkabr Unversty of Technology Reza Safabakhsh Amrkabr Unversty of Technology Abstract In ths aer, focusng on vsually meanngful color mage atermarks, e construct a ne dgtal atermarkng scheme based on the Dscrete Cosne transformaton. The roosed method uses the senstvty of human eyes to adatvely embed a atermark n a color mage. In addton, to revent tamerng or unauthorzed access, a ne atermark ermutaton functon s roosed, hch causes a structural nose over the extracted atermark. Also, e have roosed a rocedure to elmnate ths nose to decrease false ostves and false negatves n the extracted atermark. The exermental results sho that embeddng the color atermark adated to the orgnal mage roduces the most mercetble and the most robust atermarked mage under geometrc and valumetrc attacks.. Introducton The rad evoluton of the Internet technology makes the transmsson of dgtal multmeda content easer. So, dgtal atermarkng technques are roosed for coyrght rotecton or onersh dentfcaton of dgtal meda. A dgtal atermarkng technque must meet the follong three requrements: Imercetblty: Accordng to the Human Vsual System (HVS) arameters, the atermark embedded n the dgtal mage should be ercetually nvsble to human eyes. Robustness: The embedded atermark must be dffcult (hoefully mossble) to detect or delete, and any attack should result n severe degradaton n fdelty. Securty: The securty of the atermarkng system reles on the use of secret keys knon exclusvely by the coyrght oner. All the arameters usng n embeddng rocess can be a art of secret key. These keys are requred n the extracton rocess. In general, there s a tradeoff beteen the atermark embeddng strength (the atermark robustness) and qualty (the atermark nvsblty). Increased robustness requres a stronger embeddng, hch n turn ncreases the vsual degradaton of the mages. The roosed atermarkng scheme adots a color mage as the atermark so human eyes can easly verfy the extracton of ths vsually meanngful atermark. In general, a color mage can rovde more ercetual nformaton [].e. suffcent evdence aganst any llegal coyrght nvason. In sectons and 3, e ll descrbe the roosed embeddng and extracton rocesses. Secton 5 gves the exermental results. We have evaluated robustness and nvsblty of the roosed scheme and comared them to those of Tsa's [], s [,5], Frdrch's [3, 6] and 's [4] methods under varous attacks such as JPEG lossy comresson, medan flterng and crong.. Embeddng Process As shon n Fg., the roosed rocess embeds an M M color atermark mage W n an N N orgnal mage X usng secret keys K for better securty. All the relatons used n the embeddng rocess are nvertble. The follong aragrahs descrbe the model brefly. Y X W Secret keys (K) IDCT RGB YIQ Yˆ X Y Permutaton Yˆ DCT Embeddng aa DCT Fgure. The roosed embeddng rocess Intally, the orgnal mage X s converted to the NTSC color sace. One of the man advantages of the NTSC color sace s that the grayscale nformaton s searated from color data; as a result, the same sgnal can be used for both color and black-and-hte mages. Then the orgnal mage lumnance comonent Y s dvded nto non-overlang 8 8-xels blocks, and each block s ndeendently transformed to frequency doman reresentaton through D-DCT. W Frequency selecton Ŵ Ŷ mf Adataton Unt HVS Proceedngs of the Internatonal Conference on Informaton Technology: Codng and Comutng (ITCC 4)
2 A beneft of such a scheme s that f the mages are stored as comressed JPEG bt streams, the atermark can be nserted drectly nto the artally decomressed bt stream...mddle -frequency coeffcents selecton DCT concentrates the sgnal energy n the lo-frequency bands. So, embeddng the atermark n loer frequences roduces more robust atermarked mages th loer qualty. Hence, to meet both the nvsblty and robustness requrements, mddle-frequency coeffcents of the transformed blocks are selected n a zgzag order to embed the dgtal atermark n. The total number of selected coeffcents n each block, denoted as t, s determned by Eq. () []. t = ( 8M / N ) The frst coeffcent s selected randomly usng a secret key K as the seed of a seudo-random number generator (PRNG). All the selected coeffcents comose a transformed M M mageŷ mf. Furthermore, by usng a seed value K, the oston of each coeffcent n the related block n Ŷ mf s selected... Permutaton of the atermark For gettng more securty and more robustness W must be shuffled before embeddng nto X []. Usng a random ermutaton ll add a nose to the extracted atermark (Fg. 6). Here, e roose a D ermutaton functon that generates a structural nose over the extracted atermark that can be modeled (Fg. 8). Consequently, e roose a ost-rocessng algorthm to elmnate ths nose. Ths algorthm ll be descrbed n secton 3. The roosed ermutaton functon s nsred from automorhsm. A one-arameter automorhsm s as follos [8]: = j k3 mod M 3 k + j It means that each xel at coordnates (, j) of the atermark mage s moved to (, j ) usng Eq. (). The number of transformatons erformed on the atermark mage (K 4 )and k 3 are ket as secret keys. In the mage ermutaton alcatons, ths functon s erodc th erod R. The erod deends only uon the arameters k 3 [, M-] and M. Fgure shos the erodc roerty of the ermutaton here arameters of Eq. () are k 3 = and M=8. It shos that for these arameters the erod s equal to 96. () () (c) Fgure. Permuted atermark after tmes th Eq. (), here a) =, b) =5, and c) =96.3. Adatng atermark to the orgnal mage For more securty and mercetblty, the atermark strength must deend on the ntensty values of the DCT coeffcents of the orgnal mage. In ths ay, the atermark sgnal ll be strengthened n large DCT values, and attenuated n small ones. Ths adataton rocedure s fulflled through the follong stes: ) Snce the number of blocks n both the atermark mage and the orgnal mages must be equal, the ermuted atermark s dvded nto non-overlang nxn blocks, here n = 8M / N. Then each block s DCT transformed ndvdually to obtan Ŵ. ) A block-based mean s calculated over Ŵ usng Eq. (3). ( M / n ) f ( ) ( ) ˆ = W = (3) ( M / n ) here reresents the block number and W ˆ ( ) s the th block n Ŵ, and f () s an nxn matrx used for the eghted averagng. The result ( Ŵ ) s an nxn matrx. 3) Usng Eq. (5), Each block n Ŵ s normalzed and then adated to Ŷ mf by multlyng t by Yˆ mf hch s the mean of all coeffcents n Ŷ mf. ( ) a = Yˆ mf (4).4. Inserton rocess A good vsual model should rovde the maxmum atermark strength and sze that can be nserted thout vsual dstortons. We roose Eq. (5) for embeddng the adated atermark n a Ŷ mf. ˆ ˆ aa ( ) = Ymf ( ) + α W a ( ), α (5) Here, reresents the current block number, and α s calculated va HVS arameters to meet nvsblty and robustness requrements. Consequently, a one-to-one relacement of each coeffcent n th the corresondng one n Ŷ s aa erformed to obtan Ŷ. Ths rocedure needs the secret Proceedngs of the Internatonal Conference on Informaton Technology: Codng and Comutng (ITCC 4)
3 keys K and K, and the zgzag attern to fnd the exact lace of each coeffcent. If the amltude of such atermarkng scheme ( α ) s ncreased to thart flterng attacks for a robustness, the atermark may become vsble. The just notceable dfference threshold (JND) α can be used to determne the maxmum amount of the atermark sgnal that can be tolerated at each regon n the mage thout affectng ts vsual qualty. In an mage-deendent adataton, α s calculated based on HVS roertes: frequency senstvty, lumnance senstvty and contrast maskng. We ll sho that α s ndeendent from the orgnal mage. Fnally, an 8 8 nverse-dct s aled to Yˆ to obtan NTSC format of the atermarked mage ( Y ). Consequently, th a color sace converson the atermarked mage ( X ll be obtaned. 3. Extracton Process The detecton rocess roosed n ths aer s dected n Fg. 3. The recovered atermark W ~ s extracted from the ossbly dstorted mage X ~ usng the orgnal magex and the secret keys. Secret keys (K) X ~ YIQ Y DCT Yˆ Frequency selecton Inverse W ~ Post -rocess Fgure 3. The roosed extracton rocess Intally, the attacked atermarked mage X ~ s converted to the NTSC color sace and then dvded nto non-overlang 8 8 blocks, and each block s DCT transformed ndeendently to obtan Y ˆ. After extractng t coeffcents from each block n Y ˆ, reverse adataton ll be aled to obtan W ~ W ~ IDCT ~ Inverse W Adataton ~ W aa W ˆ aa and W ~, resectvely. Next, the nverse DCT can be aled to each n n block n W ~ to obtan the satal-doman atermark mage W ~. Fnally, functon s erformed (R-K 4 ) tmes over W ~ to obtan the embedded atermark (W ~ ). A more relable detecton rocess has loer false ostves and false negatves n the extracted atermark. So, e roose a ost-rocessng rocedure to obtan a X hgher qualty atermark, esecally for human eyes. The roosed extracton scheme decreases both false negatves and false ostves. 4. Evaluaton Process By usng W ~ and the regstered atermark W, the arbtrator can verfy the onersh of the orgnal mage. The evaluaton of the atermarked mage nvsblty s calculated th Masked Peak Sgnal to Nose Rato (MPSNR) that s a ercetual qualty metrc that exlots the contrast senstvty and maskng henomena of the HVS and s based on a mult-channel model of the human satal vson [7]. Mc MPSNR ( vdb) = log( ) (6) MSE here MSE s the Mean Squared-Error beteen X and X. Values of X are beteen and Mc. The extracted atermark robustness s evaluated by Normalzed Correlaton () rato beteen W andw ~ [7]. In comarng to atermarkng systems, the system th hgher MPSNR value has better vsual qualty, and under an assumed attack, the system th hgher value s more robust [7]. 5. Exermental Results In our exerments, a RGB-color Mnature (Mornng Star mnature, anted by Mahmud Farshchan) th 5 5 xels, and a 56-color atermark (Mahmud Farshchan's hoto) th 8 8 xels are used. After erformng the roosed scheme, the MPSNR value of the atermarked mage (Fg. 4) s equal to 57.9vdB, hch ndcates a hgher qualty atermarked mage n terms of human vsual system. The value of the extracted atermark form an unattacked atermarked mage s equal to ;.e. no degradaton n the extracted atermark. In Tsa's method vsual qualty s 39.65dB and value s 9. Fgure 4. Watermarked mage, MPSNR=57.9 vdb Extracted atermark, = As shon n Fg. 5, for α <. the embeddng strength arameter α ncreases, the nvsblty decreases and the robustness ncreases. But for α >., hgher Proceedngs of the Internatonal Conference on Informaton Technology: Codng and Comutng (ITCC 4)
4 values for α results n less robust atermarked mage. On the other hand, based on the HVS, an MPSNR value hgher than 3 s sutable [7]. So, e selected α =. hch results n MPSNR=57.9vdB and = for an assumed attack such as 75% crong over the atermarked mage. The roosed system as also tested th dfferent orgnal mages and th ths secfc atermark. The results ere the same as above; so the vsual qualty of the roosed scheme s ndeendent of the orgnal mage. 5.. The ost rocessng unt advantages The roosed scheme has been tested usng a PRNG for atermark ermutaton, and an assumed attack such as mage crong to sho the benefts of ost-rocessng. Images shon n Fgs. 6 and 6 are a atermarked mage after 75% crong and addtve-nose attacks, resectvely. Fgs. 6(c) and 6(e) are the extracted atermarks, usng seudo-random atermark ermutaton thout ost-rocessng. Fgs. 6(d) and 6(f) are the extracted atermarks usng seudo-random atermark ermutaton and ost-rocessng. Accordng to the calculated ratos for each extracted atermark, t s obvous that erformng ost-rocessng over an extracted atermark mroves qualty of the oututs,.e. less false ostves and false negatves n the extracted atermark. As shon n Fg. 7, usng the embeddng rocess th seudo-random ermutaton, the vsual qualty of a ostrocessed atermark (Rost) s hgher than that of the atermark thout ost-rocessng (Rand) n the extracton algorthm. It shos that even usng seudorandom atermark, the robustness of the roosed scheme s better than Tsa's method. So, usng ost-rocessng mroves the vsual qualty of the extracted atermark. 5.. ermutaton advantages In Fg. 7, the robustness of a seudo-random ermutaton atermark (Rost) and a D ermutaton () are beng comared under varous mage crong ratos. Ths fgure shos that usng ermutaton mroves the atermark robustness and removng addtve nose after atermark extracton mroves the extracted atermark qualty. Fg. 8 shos the extracted atermark from a 75% croed atermarked mage (Fg. 6). Comarng Fg. 6(d) and Fg. 8, although the values are close to each other, the ercetual qualty mrovement s notceable Robustness aganst attacks Fgure 9 llustrates that the value ll only slghtly decrease even for the hghest JPEG lossy comresson ratos. Qualty Embeddng strength MPSNR Fgure 5. Embeddng strength ( α ) versus vsual qualty (MPSNR*.) and robustness () n the roosed embeddng rocess (c) (d) (e) (f) Fgure 6. Usng seudo-random ermutaton n the embeddng rocess, 75% croed atermarked mage, nosy atermarked mage, (c) extracted atermark from a, =5, (d) c after ost-rocessng, =9, (e) extracted atermark from b, =, (f) e after ostrocessng, = Croed to N% of orgnal mage Tsa Rost Rand Fgure 7. Comarson of robustness beteen the roosed scheme (), Tsa's method, seudo-random ermutaton thout ost-rocessng (Rand) and seudorandom ermutaton th ost-rocessng (Rost) aganst an assumed attack (mage crong) Fgure 8. Extracted atermark usng ermutaton n the embeddng rocess thout ost-rocessng, =6, th ost-rocessng, = Proceedngs of the Internatonal Conference on Informaton Technology: Codng and Comutng (ITCC 4)
5 Fgure shos the robustness of the roosed scheme under varous medan-flter szes n comarson to that of other methods. Exerments sho that the atermark s successfully extracted from the atermarked mage even f the mage undergoes more than once blurrng attack. On the average, the roosed method s the most robust system under medan flter attack. Furthermore, the values do not decrease hen sze of the flter ncreases. As shon n Fg., the roosed scheme s the most robust method aganst mage crong attack. 6. Conclusons In ths aer, e roosed a ne block DCT-based dgtal atermarkng scheme, hch nserts an adated coloratermark n the mddle-frequency coeffcents of the orgnal color mage transform. The roosed adatve embeddng rocedure mroved robustness and nvsblty of the atermarked mage. Image-deendent adatatons not only take the advantage of HVS frequency senstvty, but also rely on adatng the atermark to local mage roertes n order to rovde maxmum erformance n terms of robustness, hle satsfyng the nvsblty constrant. For gettng hgher securty and hgher robustness, a D erodc ermutaton functon has been descrbed hch mroved robustness and ercetual qualty of the extracted atermark. Consequently, to decrease both false ostves and false negatves n the extra cted atermark, a ost-rocessng algorthm as roosed hch mroved the vsual qualty of the extracted atermark. The vsual qualty of the roosed scheme as ndeendent of the orgnal mage. The exermental results shoed that the roosed scheme as the most robust method, esecally for hgher lossy comresson ratos. Also, on the average, t as the most robust system under blurrng attacks. Indeed, the atermarked mage robustness dd not decrease hen blurrng ncreased due to larger flter sze. In addton, the roosed scheme as the most robust method under mage crong attacks. 7. References [] C-S Tsa, C-C Chang, T-S Chen, and M -H Chen, Dstrbuted multmeda databases: Technques and Alcatons, Natonal Chung Chang Unversty, and Natonal Tachung Insttute of Technology, Taan,. [] I.J., J. Klan, T. Leghton, and T. Shamoon, Secure sread sectrum atermarkng for multmeda, IEEE Trans. on Image Processng, Vol. 6, No., 997, [3] J. Frdrch, Combng lo-frequency and sread sectrum atermarkng, SPIE Symosum on Otcal Scence Engneerng and Instrumentaton, San Dego, USA, July 998. [4] E. and J. Zhao, Toards robust and hdden mage coyrght labelng, IEEE Internatonal Worksho on Non- Lnear Sgnal and Image Processng, Neos Marmaras, Greece, June 995, [5] I.J. and M.L. Mller, Robust dgtal atermarkng, Unted States Patent, atent number 67879, August,. [6] J. Frdrch, Image atermarkng for tamer detecton, IEEE Internatonal Conf. On Image Processng (ICIP 98), Vol., 998, [7] M. Kutter and F.A.P. Pettcolas, Far evaluaton methods for mage atermarkng systems, Journal of Electronc Imagng, Vol. 9, No. 4, October, [8] G. Voyatzs and I. Ptas, Chaotc mxng of dgtal mages and alcatons to atermarkng, Euroean Conf. on Multmeda Alcatons, Servces and Technques (ECMAST 96), Vol., 996, [9] R.B. Wolfgang, C.I. Podlchuk, and E.J. Del, Percetual atermarks for dgtal mages and vdeo, IEEE roc., Vol. 87, No. 7, July 999, JPEG comresson qualty Tsa Frdrch Proosed method Fgure 9. Comarson of robustness beteen the roosed scheme and other methods aganst JPEG lossy comresson attack NxN medan flter Tsa Frdrch Prosed method Fgure. Comarson of robustness beteen roosed scheme and other methods aganst blurrng attack Croed to N% of orgnal mage Tsa Frdrch Fgure. Comarson of robustness beteen roosed scheme and other methods aganst mage crong attack Proceedngs of the Internatonal Conference on Informaton Technology: Codng and Comutng (ITCC 4)
Robust Block Selection for Watermarking Video Streams
Proceedngs of the World Congress on Engneerng 8 Vol I WCE 8, July - 4, 8, London, U.K. Robust Block Selecton for Watermarkng Vdeo Streams Tamás Polyák, Gábor Fehér Abstract In ths paper a robust vdeo atermarkng
More informationTamper Localization in Wavelet Domain Using Semi- Fragile Watermarking
Tamper Localzaton n Wavelet Doman Usng Sem- Fragle Watermarkng Sandpbha Mangrolya, Ketk Pathak Departement of Electroncs and Communcaton Engneerng Sarvajank College of Engneerng & Technology, Surat Abstract
More informationIMAGE AUTHENTICATION AND RECOVERY USING WAVELET-BASED DUAL WATERMARKING
U.P.B. Sc. Bull., Seres C, Vol. 77, Iss. 4, 015 ISSN 86-3540 IMAGE AUTHENTICATION AND RECOVERY USING WAVELET-BASED DUAL WATERMARKING Radu Ovdu PREDA 1, Ioana MARCU, Amela CIOBANU 3 In ths paper a novel
More informationAn Efficient Blind Watermarking Method based on Significant Difference of Wavelet Tree Quantization using Adaptive Threshold
Internatonal Journal of Electroncs and Electrcal Engneerng Vol., No., June 3 An Effcent Blnd ng Method based on Sgnfcant Dfference of Wavelet Tree Quantzaton usng Adaptve Threshold Then Huynh The Unversty
More informationCONTOURLET TRANSFORM BASED WATERMARKING FOR COLOUR IMAGES
he Internatonal Journal of Multmeda & Its Applcatons (IJMA) Vol.3, No.1, February 211 CONOURLE RANSFORM BASED WAERMARKING FOR COLOUR IMAGES Dnesh Kumar 1 and Vjay Kumar 2 1 Department of Computer Scence
More informationA New Statistical Detector for CT-Based Multiplicative Image Watermarking Using the t Location-Scale Distribution
9th Internatonal Conference on Informaton and Knowledge Technology (IKT 07) October 8 & 9, 07, Amrkabr Unversty of Technology A ew Statstcal Detector for CT-Based Multplcatve Image Watermarkng Usng the
More informationChaotic Filter Bank for Computer Cryptography
Chaotc Flter Bank for Computer Cryptography Bngo Wng-uen Lng Telephone: 44 () 784894 Fax: 44 () 784893 Emal: HTwng-kuen.lng@kcl.ac.ukTH Department of Electronc Engneerng, Dvson of Engneerng, ng s College
More informationBLIND COMPRESSED IMAGE WATERMARKING FOR NOISY COMMUNICATION CHANNELS
BLIND COMPRESSED IMAGE WATERMARKING FOR NOISY COMMUNICATION CHANNELS Jonathan Me Carnege Mellon Unversty Department of Electrcal & Computer Engneerng Pttsburgh, PA 523 jme@cmu.edu Scott Pudlewsk Lncoln
More informationAdaptively Weighted Sub-Directional Two-Dimensional Linear Discriminant Analysis for Face Recognition
Adatvely Weghted Su-Drectonal To-Dmensonal Lnear Dscrmnant Analyss for Face Recognton Muhammad Khurram Khan ABSTRACT dscrmnant analyss (AWSDLDA) s roosed n ths aer. AWSDLDA can extract the drectonal features
More informationInverse Halftoning Method Using Pattern Substitution Based Data Hiding Scheme
Proceedngs of the World Congress on Engneerng 2011 Vol II, July 6-8, 2011, London, U.K. Inverse Halftonng Method Usng Pattern Substtuton Based Data Hdng Scheme Me-Y Wu, Ja-Hong Lee and Hong-Je Wu Abstract
More informationIEEE Communications Society /04/$20.00 (c) 2004 IEEE I. INTRODUCTION II. TIMING ACQUISITION IN MC-CDMA UPLINK
esgn of lot sgnal for MC-CMA ulnk systems yunseok Yu * and Yong-an Lee ** * Modem System Lab. Modem R& eam Samsung Electroncs Co. L elecommuncaton R& center elecommuncaton etork Suon 44-74 Korea ** School
More informationProposed Approach for Improving Bluetooth Networks Security through SVD Audio Watermarking
Proposed pproach for Improvng Bluetooth Netorks Securty through SVD udo Watermarkng M.. M. El-Bendary,. Haggag Dept. of Electroncs echnology, Faculty of Industral Educaton, Helan Unversty. Caro, Egypt.
More informationSide-Match Vector Quantizers Using Neural Network Based Variance Predictor for Image Coding
Sde-Match Vector Quantzers Usng Neural Network Based Varance Predctor for Image Codng Shuangteng Zhang Department of Computer Scence Eastern Kentucky Unversty Rchmond, KY 40475, U.S.A. shuangteng.zhang@eku.edu
More informationA High-Sensitivity Oversampling Digital Signal Detection Technique for CMOS Image Sensors Using Non-destructive Intermediate High-Speed Readout Mode
A Hgh-Senstvty Oversamplng Dgtal Sgnal Detecton Technque for CMOS Image Sensors Usng Non-destructve Intermedate Hgh-Speed Readout Mode Shoj Kawahto*, Nobuhro Kawa** and Yoshak Tadokoro** *Research Insttute
More informationMobile Node Positioning in Mobile Ad Hoc Network
Moble Node Postonng n Moble Ad Hoc Networ G.Lu, R.M.Edwards, C.Ladas The Unversty of Sheffeld Abstract: Many Ad Hoc networ rotocols and alcatons assume that the locaton of moble nodes can be obtaned by
More informationA Robust Feature Extraction Algorithm for Audio Fingerprinting
A Robust Feature Extracton Algorthm for Audo Fngerprntng Janpng Chen 1, Tejun Huang 2 1 Insttute of Computng Technology, Chnese Academy of Scences, Bejng 100190, Chna 2 Key Laboratory of Machne Percepton(Mnstry
More informationThe Pilot Alignment Pattern Design in OFDM Systems
The Plot Algnment Pattern Desgn n OFDM Systems *, Yong Chan Lee, Won Chol Jang, 3 Un Kyong Choe, Gyong Chol Leem,3 College of Comuter Scence, Km Il Sung Unversty, D.P.R.K Emal: leeyongchan@yahoo.com Emal:
More informationDegree Distribution Optimization in Raptor Network Coding
2 IEEE Internatonal Symosum on Informaton Theory Proceedngs Degree Dstrbuton Otmzaton n Rator Network Codng Nkolaos Thomos and Pascal Frossard Sgnal Processng Laboratory (LTS4) Swss Federal Insttute of
More informationMulti-focus Image Fusion Using Spatial Frequency and Genetic Algorithm
0 IJCSNS Internatonal Journal of Computer Scence and Network Securty, VOL.8 No., February 008 Mult-focus Image Fuson Usng Spatal Frequency and Genetc Algorthm Jun Kong,, Kayuan Zheng,, Jngbo Zhang,,*,,
More informationAn Iterative Parameters Estimation Method for Hyperbolic Frequency Modulated Signals with Colored Noise
An Iteratve Parameters Estmaton Method for Hyerbolc Freuency Modulated Sgnals wth Colored Nose Shua Yao and Shlang Fang Abstract Ths aer resents an teratve method for estmatng the startng freuency and
More informationReduction of Neural Network Training Time Using an Adaptive Fuzzy Approach in Real Time Applications
Internatonal Journal of Informaton and Electroncs Engneerng, Vol., No. 3, May Reducton of Neural Network Tranng Tme Usng an Adatve Fuzzy Aroach n Real Tme Alcatons Hamdreza Rashdy Kanan and Mahd Yousef
More informationRejection of PSK Interference in DS-SS/PSK System Using Adaptive Transversal Filter with Conditional Response Recalculation
SERBIAN JOURNAL OF ELECTRICAL ENGINEERING Vol., No., November 23, 3-9 Rejecton of PSK Interference n DS-SS/PSK System Usng Adaptve Transversal Flter wth Condtonal Response Recalculaton Zorca Nkolć, Bojan
More informationWalsh Function Based Synthesis Method of PWM Pattern for Full-Bridge Inverter
Walsh Functon Based Synthess Method of PWM Pattern for Full-Brdge Inverter Sej Kondo and Krt Choesa Nagaoka Unversty of Technology 63-, Kamtomoka-cho, Nagaoka 9-, JAPAN Fax: +8-58-7-95, Phone: +8-58-7-957
More informationA NOVEL MUSIC BEAT DETECTION ALGORITHM BASED ON PERIODICITY OF ENERGY FLUX. Ajit V. Rao
A NOVEL MUSIC BEAT DETECTION ALGORITHM BASED ON PERIODICITY OF ENERGY FLUX Pradee J. Undergraduate Student Deartment of Electroncs and Communcaton, NITK, Surathkal 575 025. radeejraman@yahoo.com Ajt V.
More informationComparison of Current-Source and Voltage-Source Shunt Active Power Filters for Harmonic Compensation and Reactive Power Control
J. G. Pnto, Bruno Exosto, Vtor Montero, L. F. C. Montero, Carlos Couto, João L. Afonso, Comarson of Current and Voltage Shunt Actve Power Flters for Harmonc Comensaton and Reactve Power Control, 8th Annual
More informationSpread Spectrum based M-ary Modulated Robust Image Watermarking
54 IJCSS Internatonal Journal of Computer Scence and etwor Securty, VOL.7 o., October 27 Spread Spectrum based M-ary Modulated Robust Image atermarng T. S. Das, V. H. Manar 2 and S. K. Sarar 3, Dept. of
More informationGAME THEORY AND INTERFERENCE AVOIDANCE IN DECENTRALIZED NETWORKS
GAME TEORY AD ITERFERECE AVOIDACE I DECETRALIZED ETWORS Rekha Menon, (MPRG Vrgna Tech, Blacksburg, VA, USA, rmenon@vt.edu) Dr. Allen B. Macenze, (Electrcal and Comuter Engneerng Deartment, Vrgna Tech)
More informationComplexity-Optimized Low-Density Parity-Check Codes for Gallager Decoding Algorithm B
Comlexty-Otmzed Low-Densty Party-Check Codes for Gallager Decodng Algorthm B We Yu, Masoud Ardakan, Benjamn Smth, Frank Kschschang Electrcal and Comuter Engneerng Det. Unversty of Toronto Toronto, Ontaro
More informationA Novel and Secure technique for image. Steganography using DWT
Internatonal Journal of Computer Technology and Electroncs Engneerng (IJCTEE) Volume 3 Issue 5 October 2013 A Novel and Secure technque for mage Abstract: Steganography s the art and scence of hdng nformaton
More informationThe Application of Interpolation Algorithms in OFDM Channel Estimation
The Applcaton of Interpolaton Algorthms n OFDM Estmaton Xjun ZHANG 1,, Zhantng YUAN 1, 1 School of Electrcal and Informaton Engneerng, Lanzhou Unversty of Technology, Lanzhou, Gansu 730050, Chna School
More informationResearch of Dispatching Method in Elevator Group Control System Based on Fuzzy Neural Network. Yufeng Dai a, Yun Du b
2nd Internatonal Conference on Computer Engneerng, Informaton Scence & Applcaton Technology (ICCIA 207) Research of Dspatchng Method n Elevator Group Control System Based on Fuzzy Neural Network Yufeng
More informationThe Clock-Aided Method for GPS Receiver Positioning in an Urban Environment
Internatonal Journal of Comuter and Electrcal Engneerng, Vol. 3, No. 3, June The Cloc-Aded Method for GPS Recever Postonng n an Urban Envronment Yunlong Teng, Ybng Sh, and Zh Zheng Abstract As the sgnals
More informationAutomatic Level Difficulty Adjustment in Platform Games Using Genetic Algorithm Based Methodology
Automatc Level Dffculty Adjustment n Platform Games Usng Genetc Algorthm Based Methodology Nrach Watcharasatharornong Deartment of Comuter Engneerng Faculty of Engneerng Chulalongkorn Unversty Payatha
More informationAutomatic Tuning of Model Predictive Control Using Particle Swarm Optimization
Automatc Tunng of Model Predctve Control Usng Partcle Swarm Otmzaton Rohe Suzuk Fukko Kawa Hdeuk Ito Chkash Nakazawa Yoshkazu Fukuama Etaro Aosh Keo Unverst 3-- Hosh Kohoku-ku Yokohama 3-5 Jaan Fuj Electrc
More informationMinimal K-Covering Set Algorithm based on Particle Swarm Optimizer
87 JOURAL OF ETWORKS, VOL. 8, O., DECEMBER 3 Mnmal K-Coverng Set Algorthm based on Partcle Swarm Otmzer Yong Hu Chongqng Water Resources and Electrc Engneerng College, Chongqng, 46, Chna Emal: huyong969@63.com
More informationOPTIMAL PERMUTATION CORRECTION BY MULTIOBJECTIVE GENETIC ALGORITHMS
OPTIMAL PERMUTATION CORRECTION BY MULTIOBJECTIVE GENETIC ALGORITHMS Dorothea Kolossa, Bert-Uwe Köhler, Markus Conrath, Renhold Orglmester Berln Unversty of Technology, Insttute of Electroncs, Enstenufer
More informationPerformance Analysis of Multi User MIMO System with Block-Diagonalization Precoding Scheme
Performance Analyss of Mult User MIMO System wth Block-Dagonalzaton Precodng Scheme Yoon Hyun m and Jn Young m, wanwoon Unversty, Department of Electroncs Convergence Engneerng, Wolgye-Dong, Nowon-Gu,
More informationGamma Correction and Absolute Coordinate Residual Compensation for Triangular Patterns Phase Shifting Profilometry
nternatonal Journal of Multmeda and Ubqutous Engneerng Vol.9, o. (014),.177-186 htt://dx.do.org/10.1457/jmue.014.9..18 Gamma orrecton and Absolute oordnate Resdual omensaton for rangular Patterns Phase
More informationImproving Automatic Age Estimation Algorithms using an Efficient Ensemble Technique
Internatonal Journal of Machne earnng and Comutng, Vol., No., Arl 0 Imrovng Automatc Age Estmaton Algorthms usng an Effcent Ensemble Technque Alreza Keshavarz Choobeh Abstract The age s one of the most
More informationUncertainty in measurements of power and energy on power networks
Uncertanty n measurements of power and energy on power networks E. Manov, N. Kolev Department of Measurement and Instrumentaton, Techncal Unversty Sofa, bul. Klment Ohrdsk No8, bl., 000 Sofa, Bulgara Tel./fax:
More informationTo: Professor Avitabile Date: February 4, 2003 From: Mechanical Student Subject: Experiment #1 Numerical Methods Using Excel
To: Professor Avtable Date: February 4, 3 From: Mechancal Student Subject:.3 Experment # Numercal Methods Usng Excel Introducton Mcrosoft Excel s a spreadsheet program that can be used for data analyss,
More informationThe Performance Improvement of BASK System for Giga-Bit MODEM Using the Fuzzy System
Int. J. Communcatons, Network and System Scences, 10, 3, 1-5 do:10.36/jcns.10.358 Publshed Onlne May 10 (http://www.scrp.org/journal/jcns/) The Performance Improvement of BASK System for Gga-Bt MODEM Usng
More informationDetermination of the Multi-slot Transmission in Bluetooth Systems with the Estimation of the Channel Error Probability
Determnaton of the Mult-slot Transmsson n Bluetooth Systems wth the Estmaton of the Channel Error Probablty K Won Sung and Chae Y. Lee Det. of Industral Engneerng, KAIST, 373-1 Kuseong Dong, Taejon, Korea
More informationEfficient Large Integers Arithmetic by Adopting Squaring and Complement Recoding Techniques
The th Worshop on Combnatoral Mathematcs and Computaton Theory Effcent Large Integers Arthmetc by Adoptng Squarng and Complement Recodng Technques Cha-Long Wu*, Der-Chyuan Lou, and Te-Jen Chang *Department
More informationSIR-Based Power Control Algorithms in CDMA Networks
Global Journal of Comuter Scence and Technology Network, Web & Securty Volume 13 Issue 10 Verson 1.0 Year 2013 Tye: Double Blnd Peer Revewed Internatonal Research Journal Publsher: Global Journals Inc.
More informationDigital Transmission
Dgtal Transmsson Most modern communcaton systems are dgtal, meanng that the transmtted normaton sgnal carres bts and symbols rather than an analog sgnal. The eect o C/N rato ncrease or decrease on dgtal
More informationRobust Filter Design based on Generalized Maximum-Likelihood Estimation
Robust Flter Desgn based on Generalzed Maxmum-Lkelhood Estmaton STEFA LEISCHER, ROBERT KLISKI, HOLGER HUTZELMA, RUDI KORR Fraunhofer Insttute for Communcaton Systems Hansastr. 3, 8686 Munch GERMAY Abstract:
More informationPRACTICAL, COMPUTATION EFFICIENT HIGH-ORDER NEURAL NETWORK FOR ROTATION AND SHIFT INVARIANT PATTERN RECOGNITION. Evgeny Artyomov and Orly Yadid-Pecht
68 Internatonal Journal "Informaton Theores & Applcatons" Vol.11 PRACTICAL, COMPUTATION EFFICIENT HIGH-ORDER NEURAL NETWORK FOR ROTATION AND SHIFT INVARIANT PATTERN RECOGNITION Evgeny Artyomov and Orly
More informationEvaluate the Effective of Annular Aperture on the OTF for Fractal Optical Modulator
Global Advanced Research Journal of Management and Busness Studes (ISSN: 2315-5086) Vol. 4(3) pp. 082-086, March, 2015 Avalable onlne http://garj.org/garjmbs/ndex.htm Copyrght 2015 Global Advanced Research
More informationControl of Nonlinear Industrial Processes Using Fuzzy Wavelet Neural Network Based on Genetic Algorithm
Internatonal Journal of Research n Engneerng and Scence (IJRES) ISSN (Onlne): 2320-9364, ISSN (Prnt): 2320-9356 www.res.org Volume 2 Issue 5 ǁ May 2014 ǁ PP.01-06 Control of Nonlnear Industral Processes
More informationDISTINCT IMAGE FUSION METHODS FOR LANDSLIDE INFORMATION ENHANCEMENT
DISTINCT IMAGE FUSION METHODS FOR LANDSLIDE INFORMATION ENHANCEMENT J.Wang a,b, a *, J.X.Zhang, Z.J.Lu a a Insttute of Photogrammetry & Remote Sensng, CASM, Bejng, Chna - stecsm@publc.bta.net.cn b Department
More informationRecognition of Low-Resolution Face Images using Sparse Coding of Local Features
Recognton of Low-Resoluton Face Images usng Sparse Codng of Local Features M. Saad Shakeel and Kn-Man-Lam Centre for Sgnal Processng, Department of Electronc and Informaton Engneerng he Hong Kong Polytechnc
More informationImproving Device-to-Device Communication Performance in 5G Networks through Joint Power Control and Resource Allocation
Internatonal Journal of Communcatons htt://www.aras.org/aras/ournals/oc Imrovng Devce-to-Devce Communcaton Performance n 5G Networks through Jont Power Control and Resource Allocaton HWANG-CHENG WANG 1,
More informationBattery-aware Static Scheduling for Distributed Real-time Embedded Systems
Battery-aware Statc Schedulng for Dstrbuted Real-tme Embedded Systems Jong Luo and Nraj K. Jha Deartment of Electrcal Engneerng Prnceton Unversty, Prnceton, NJ, 08544 {jongluo, jha}@ee.rnceton.edu Abstr
More informationTarget Response Adaptation for Correlation Filter Tracking
Target Response Adaptaton for Correlaton Flter Tracng Adel Bb, Matthas Mueller, and Bernard Ghanem Image and Vdeo Understandng Laboratory IVUL, Kng Abdullah Unversty of Scence and Technology KAUST, Saud
More informationSteganography in JPEG2000 Compressed Images
824 IEEE Transactons on Consumer Electroncs, Vol. 49, No. 4, NOVEMBER 2003 Steganography n JPEG2000 Compressed Images Po-Chy Su and C.-C. Jay Kuo, Fellow, IEEE Abstract Informaton hdng n JPEG2000 compressed
More informationA Method for Monitoring the Underground Mining Position Based on the Blasting Source Location
0.78/msr-0-0009 MEASUREMENT SCIENCE REVIEW, Volume, No., 0 A Method for Montorng the Underground Mnng oston Based on the Blastng Source Locaton Xu-zh Meng,, Zong-sheng Wang, Zeng-zh Zhang, Feng-qan Wang
More informationA Novel GNSS Weak Signal Acquisition Using Wavelet Denoising Method
A Novel GNSS Weak Sgnal Acquston Usng Wavelet Denosng Method Jn Tan, Lu Yang, BeHang Unversty, P.R.Chna BIOGRAPHY Jn Tan s a post-doctor n School of Electronc and Informaton Engneerng, BeHang Unversty,
More informationantenna antenna (4.139)
.6.6 The Lmts of Usable Input Levels for LNAs The sgnal voltage level delvered to the nput of an LNA from the antenna may vary n a very wde nterval, from very weak sgnals comparable to the nose level,
More informationLow Sampling Rate Technology for UHF Partial Discharge Signals Based on Sparse Vector Recovery
017 nd Internatonal Semnar on Appled Physcs, Optoelectroncs and Photoncs (APOP 017) ISBN: 978-1-60595-5-3 Low Samplng Rate Technology for UHF Partal Dscharge Sgnals Based on Sparse Vector Recovery Qang
More informationChain Codes. Shape Representation and Description. Signatures. Polygonal Approximations
Shae Reresentaton and Descrton Reresentaton Matchng or comarng reresentatons for shae recognton Invarance wth resect to nusance arameters Image codng Descrton Classf shaes based on a descrtor Invarance
More informationLearning Ensembles of Convolutional Neural Networks
Learnng Ensembles of Convolutonal Neural Networks Lran Chen The Unversty of Chcago Faculty Mentor: Greg Shakhnarovch Toyota Technologcal Insttute at Chcago 1 Introducton Convolutonal Neural Networks (CNN)
More informationNATIONAL RADIO ASTRONOMY OBSERVATORY Green Bank, West Virginia SPECTRAL PROCESSOR MEMO NO. 25. MEMORANDUM February 13, 1985
NATONAL RADO ASTRONOMY OBSERVATORY Green Bank, West Vrgna SPECTRAL PROCESSOR MEMO NO. 25 MEMORANDUM February 13, 1985 To: Spectral Processor Group From: R. Fsher Subj: Some Experments wth an nteger FFT
More informationTEMPERATURE PREDICTION IN TIMBER USING ARTIFICIAL NEURAL NETWORKS
TEMPERATURE PREDICTION IN TIMBER USING ARTIFICIAL NEURAL NETWORKS Paulo Cachm ABSTRACT: Neural networks are a owerful tool used to model roertes and behavour of materals n many areas of cvl engneerng alcatons.
More informationOptimal Placement of PMU and RTU by Hybrid Genetic Algorithm and Simulated Annealing for Multiarea Power System State Estimation
T. Kerdchuen and W. Ongsakul / GMSARN Internatonal Journal (09) - Optmal Placement of and by Hybrd Genetc Algorthm and Smulated Annealng for Multarea Power System State Estmaton Thawatch Kerdchuen and
More informationFFT Spectrum Analyzer
THE ANNUAL SYMPOSIUM OF THE INSTITUTE OF SOLID MECHANICS SISOM 22 BUCHAREST May 16-17 ----------------------------------------------------------------------------------------------------------------------------------------
More informationPerformance Analysis of the Weighted Window CFAR Algorithms
Performance Analyss of the Weghted Wndow CFAR Algorthms eng Xangwe Guan Jan He You Department of Electronc Engneerng, Naval Aeronautcal Engneerng Academy, Er a road 88, Yanta Cty 6400, Shandong Provnce,
More informationChess players fame versus their merit
Ths artcle s ublshed n Aled Economcs Letters htt://www.tandfonlne.com/do/full/0.080/350485.05.0435 Chess layers fame versus ther mert M.V. Smkn and V.P. Roychowdhury Deartment of Electrcal Engneerng, Unversty
More informationA Current Differential Line Protection Using a Synchronous Reference Frame Approach
A Current Dfferental Lne rotecton Usng a Synchronous Reference Frame Approach L. Sousa Martns *, Carlos Fortunato *, and V.Fernão res * * Escola Sup. Tecnologa Setúbal / Inst. oltécnco Setúbal, Setúbal,
More informationPhasor Representation of Sinusoidal Signals
Phasor Representaton of Snusodal Sgnals COSC 44: Dgtal Communcatons Instructor: Dr. Amr Asf Department of Computer Scence and Engneerng York Unversty Handout # 6: Bandpass odulaton Usng Euler dentty e
More informationSTUDY OF MATRIX CONVERTER BASED UNIFIED POWER FLOW CONTROLLER APPLIED PI-D CONTROLLER
Journal of Engneerng Scence and Technology Specal Issue on Appled Engneerng and Scences, October (214) 3-38 School of Engneerng, Taylor s Unversty STUDY OF MATRIX CONVERTER BASED UNIFIED POWER FLOW CONTROLLER
More informationSPATIAL QUALITY EVALUATION OF FUSION OF DIFFERENT RESOLUTION IMAGES
Jun L SPATIAL QUALITY EVALUATION OF FUSION OF DIFFERENT RESOLUTION IMAGES Jun L Laval Unversty, Canada COPL, Physcs department Jl@phy.ulaval.ca KEY WORDS: Image Fuson, Evaluaton, Spatal Qualty, Blur Parameter,
More informationOVER-SAMPLING FOR ACCURATE MASKING THRESHOLD CALCULATION IN WAVELET PACKET AUDIO CODERS
OVER-SAMPLING FOR ACCURATE MASKING THRESHOLD CALCULATION IN WAVELET PACKET AUDIO CODERS Ferdnan Snaga #, Elathamby Ambkarajah # and Andrew P. Bradley* # School of Electrcal Engneerng and Telecommuncatons
More informationDirect Sequence Spread Spectrum (DSSS)
Drect Sequence Spread Spectrum (DSSS) DS-SS DS-SS uses sequences for spectrum spreadng and phase modulaton Modulaton s bnary SK (BSK) or quaternary SK (QSK) Message BSK - - - - QSK BSK Bt hase Dr. Cesar
More informationPROTECTING INTELLECTUAL RIGHTS: DIGITAL WATERMARKING IN THE WAVELET DOMAIN
PROTECTING INTELLECTUAL RIGHTS: DIGITAL WATERMARKING IN THE WAVELET DOMAIN Crstan V. SERDEAN 1, Martn TOMLINSON 1, Graham J. WADE 2 and Adran M. AMBROZE 1 1 Unversty of Plymouth, Unted Kngdom and 2 The
More informationResource Allocation Optimization for Device-to- Device Communication Underlaying Cellular Networks
Resource Allocaton Optmzaton for Devce-to- Devce Communcaton Underlayng Cellular Networks Bn Wang, L Chen, Xaohang Chen, Xn Zhang, and Dacheng Yang Wreless Theores and Technologes (WT&T) Bejng Unversty
More informationA Comparison of Two Equivalent Real Formulations for Complex-Valued Linear Systems Part 2: Results
AMERICAN JOURNAL OF UNDERGRADUATE RESEARCH VOL. 1 NO. () A Comparson of Two Equvalent Real Formulatons for Complex-Valued Lnear Systems Part : Results Abnta Munankarmy and Mchael A. Heroux Department of
More informationA Novel MIMO-OFDM Scheme Based on Modulation Diversity for IEEE ac Standard
ACCESS 01 : he hrd nternatonal Conference on Access Networks A Novel MMO-OFDM Scheme Based on Modulaton Dversty for EEE 80.11ac Standard Wu Zhanj, Gao Xang, L Yunzhoun Bejng Unversty of Post & elecommuncatons,
More informationImpact of Interference Model on Capacity in CDMA Cellular Networks. Robert Akl, D.Sc. Asad Parvez University of North Texas
Impact of Interference Model on Capacty n CDMA Cellular Networks Robert Akl, D.Sc. Asad Parvez Unversty of North Texas Outlne Introducton to CDMA networks Average nterference model Actual nterference model
More informationStudy on Conflict Detection Method with Downlink Aircraft Parameters
Study on Conflct Detecton Method wth Downlnk Arcraft Parameters Atsush SENOGUCHI, and Yutaka FUKUDA Ar Traffc Management Dvson Electronc Navgaton Research Insttute Tokyo, Jaan senoguch@enr.go.j, fukuda@enr.go.j
More informationDigital Compensation of Amplifier Nonlinearities in the Receiver of a Wireless System
Dgtal Comensaton of Amlfer Nonlneartes n the Recever of a Wreless System Cedrc Dehos* and Tm C. W. Schen * CEA-LETI MINATEC, 7 rue des Martyrs, 8 05 Grenoble CEDEX 9, France, Tel. +-8-7868, cedrc.dehos@cea.fr
More informationCombined Independent Component Analysis and Kalman Filter Based Real-Time Digital Video Stabilization
Internatonal Journal of Sgnal Processng Systems Vol. 1, No. 2 December 2013 Combned Independent Component Analyss and Kalman Flter Based Real-Tme Dgtal Vdeo Stablzaton Hassaan S. Quresh, Syed A. Jabr,
More informationDTIC DTIC. 9o o FILE COPY NATIONAL COMMUNICATIONS SYSTEM TECHNICAL INFORMATION BULLETIN 87-8 PULSE CODE MODULATION FOR GROUP 4 FACSIMILE
DTC FLE COPY NCS TB 87-8 NATONAL COMMUNCATONS SYSTEM q. nm TECHNCAL NFORMATON BULLETN 87-8 N NTRANSFORM CODNG AND DFFERENTAL Qz PULSE CODE MODULATON FOR GROUP 4 FACSMLE DTC ELECTE JUL 10]1! l AUGUST 1987
More informationNOISE ESTIMATION USING STANDARD DEVIATION OF THE FREQUENCY MAGNITUDE SPECTRUM FOR MIXED NON-STATIONARY NOISE
DOI: 10.1917/jct.015.0178 ESTIMATION USING STANDARD DEVIATION OF THE FREQUENCY MAGNITUDE SPECTRUM FOR MIXED NON-STATIONARY A. Indumath 1 and E. Chandra 1 Department of Master of Computer Applcatons, Dr.
More informationInternational Steering Committee:
14 th Internatonal Worksho on ROBOTICS IN ALPE-ADRIA-DANUBE REGION RAAD'05 BUCHAREST ROMANIA : MAY 6-8 005 Internatonal Steerng Commttee: G. Belforte Poltecnco d Torno Italy J. F. Bto Centre of Robotcs
More informationArchive of SID. Channel Capacity Analysis of Spread Spectrum Audio Watermarking. M. Khademi
KHADEMI: CHAEL CAPACITY AALYSIS OF SPREAD SPECTRUM AUDIO WATERMARKIG Channel Capacty Analyss of Spread Spectrum Audo Watermarkng M. Khadem Abstract In ths paper, nformaton-theoretc analyss of spread spectrum
More informationWe assume a two-layered model, and a P wave is excited in the upper layer.
3.4 Crtcal angle We assume a two-layered model, and a P wave s ected n the uer layer. When a P wave mnges on a horontal boundary, the ncdence angle for the transmtted P wave n the second medum s gven by
More informationFast Code Detection Using High Speed Time Delay Neural Networks
Fast Code Detecton Usng Hgh Speed Tme Delay Neural Networks Hazem M. El-Bakry 1 and Nkos Mastoraks 1 Faculty of Computer Scence & Informaton Systems, Mansoura Unversty, Egypt helbakry0@yahoo.com Department
More informationUnfalsified Adaptive Control with Online Optimization to a ph Neutralization Process
Research Artcle Unfalsfed Adatve Control wth Onlne Otmzaton to a H Neutralzaton Process anet Wonghong Deartment of Electrcal Engneerng, Faculty of Engneerng, Kasetsart Unversty, S Racha Camus, S Racha,
More informationSpace Time Equalization-space time codes System Model for STCM
Space Tme Eualzaton-space tme codes System Model for STCM The system under consderaton conssts of ST encoder, fadng channel model wth AWGN, two transmt antennas, one receve antenna, Vterb eualzer wth deal
More informationCooperative Collision Avoidance between Multiple Mobile Robots
Cooeratve Collson Avodance between Multle Moble Robots Atsush Fujmor,* Masato Teramoto Deartment of Mechancal Engneerng Shzuoka Unversty 3-5-1, Johoku, Hamamatsu 432-8561, Jaan e-mal: a-fujmor@eng.shzuoka.ac.j
More informationCamera Calibration and Performance Evaluation of Depth From Defocus (DFD)
Please verfy that () all pages are present, () all fgures are acceptable, (3) all fonts and specal characters are correct, and (4) all text and fgures ft wthn the margn lnes shown on ths revew document.
More informationUSE OF GPS MULTICORRELATOR RECEIVERS FOR MULTIPATH PARAMETERS ESTIMATION
Rdha CHAGGARA, TeSA Chrstophe MACABIAU, ENAC Erc CHATRE, STNA USE OF GPS MULTICORRELATOR RECEIVERS FOR MULTIPATH PARAMETERS ESTIMATION ABSTRACT The performance of GPS may be degraded by many perturbatons
More informationA Fuse-Before-Track Approach to Target State Estimation Using Passive Acoustic Sensors
4th Internatonal Conference on Informaton Fuson Chcago Illnos USA July 5-8 A Fuse-Before-rac Aroach to arget State Estmaton Usng Passve Acoustc Sensors Chrs Kreucher and Ben Shao Integrty Alcatons Incororated
More informationPOWER-DISTORTION OPTIMIZATION FOR WIRELESS IMAGE/VIDEO SOFTCAST BY TRANSFORM COEFFICIENTS ENERGY MODELING WITH ADAPTIVE CHUNK DIVISION
POWER-DISTORTION OPTIMIZATION FOR WIRELESS IMAGE/VIDEO SOFTCAST BY TRANSFORM COEFFICIENTS ENERGY MODELING WITH ADAPTIVE CHUNK DIVISION Ruqn Xong 1, Feng Wu, Xaopeng Fan 3, Chong Luo, Swe Ma 1, Wen Gao
More informationNew Wavelet Based Performance Analysis and Optimization of Scalable Joint Source/Channel Coder (SJSCC & SJSCCN) for Time-Varying Channels.
Internatonal Research Journal of Engneerng and Technology (IRJET) e-issn: 2395-0056 Volume: 02 Issue: 09 DEC-205 p-issn: 2395-0072 www.rjet.net New Wavelet Based Performance Analyss and Optmzaton of Scalable
More informationApplication of Intelligent Voltage Control System to Korean Power Systems
Applcaton of Intellgent Voltage Control System to Korean Power Systems WonKun Yu a,1 and HeungJae Lee b, *,2 a Department of Power System, Seol Unversty, South Korea. b Department of Power System, Kwangwoon
More informationResearch on Peak-detection Algorithm for High-precision Demodulation System of Fiber Bragg Grating
, pp. 337-344 http://dx.do.org/10.1457/jht.014.7.6.9 Research on Peak-detecton Algorthm for Hgh-precson Demodulaton System of Fber ragg Gratng Peng Wang 1, *, Xu Han 1, Smn Guan 1, Hong Zhao and Mngle
More informationAn Automatic Weight-Based High Dynamic Range Imaging Syntheses with Multiple Different Exposed Low Dynamic Range Images
49 An Automatc Weght-Based Hgh Dynamc Range Imagng Syntheses wth Multple Dfferent Exposed Low Dynamc Range Images 1 Jun-You Chen and 2 Chen-Chung Lu Abstract 1. Introducton Hgh dynamc range (HDR) magng
More informationFPGA Implementation of Ultrasonic S-Scan Coordinate Conversion Based on Radix-4 CORDIC Algorithm
IACSIT Internatonal Journal of Engneerng and Technology, Vol. 7, No. 3, June 25 FPGA Implementaton of Ultrasonc S-Scan Coordnate Converson Based on Radx-4 CORDIC Algorthm Ruobo Ln, Guxong Lu, and Wenmng
More information