By Topic

2005 Annual IEEE India Conference - Indicon

11-13 Dec. 2005

Filter Results

Displaying Results 1 - 25 of 149
  • [Cover]

    Publication Year: 2005, Page(s): C1
    Request permission for commercial reuse | PDF file iconPDF (1673 KB)
    Freely Available from IEEE
  • [Title page]

    Publication Year: 2005, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (331 KB)
    Freely Available from IEEE
  • Copyright page

    Publication Year: 2005, Page(s): ii
    Request permission for commercial reuse | PDF file iconPDF (84 KB)
    Freely Available from IEEE
  • Messages

    Publication Year: 2005, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (529 KB) | HTML iconHTML
    Freely Available from IEEE
  • Messages

    Publication Year: 2005, Page(s): v
    Request permission for commercial reuse | PDF file iconPDF (188 KB) | HTML iconHTML
    Freely Available from IEEE
  • Preface

    Publication Year: 2005, Page(s): vii
    Request permission for commercial reuse | PDF file iconPDF (151 KB) | HTML iconHTML
    Freely Available from IEEE
  • Conference committee

    Publication Year: 2005, Page(s):ix - xii
    Request permission for commercial reuse | PDF file iconPDF (396 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2005, Page(s):xiii - xxiii
    Request permission for commercial reuse | PDF file iconPDF (1028 KB)
    Freely Available from IEEE
  • A Novel Approach Towards Accurate Matching of Parasites

    Publication Year: 2005, Page(s):1 - 5
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2192 KB) | HTML iconHTML

    Pattern recognition is characteristic to all living organisms. The object which is inspected for the "recognition" process is called a pattern. Medical diagnosis is an example of pattern recognition problem. By knowing a "KNOWN" we can eliminate all the "UNKNOWNS" in the parasitic sample. The objective of this work is to match parasites of same type but with approximately different shape. One shou... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design and Construction of an Odour Sensor for Various Biomedical Applications

    Publication Year: 2005, Page(s):6 - 8
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2072 KB) | HTML iconHTML

    This project deals with the construction of electronic device that senses odour and its application in Telesurgery. Of the body's five senses, the sense of Smell is the most mysterious. In the past, gas chromatography and mass spectrometry have been used as sensing systems, although these are usually expensive and time consuming. Today, the development of odour sensor helped to analyze odors and h... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Wavelet Aided SVM Analysis of ECG Signals for Cardiac Abnormality Detection

    Publication Year: 2005, Page(s):9 - 13
    Cited by:  Papers (8)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2136 KB) | HTML iconHTML

    Automatic detection and classification of electrocardiogram (ECG) signals is of great importance for diagnosis of cardiac abnormalities. A method is proposed here to classify different cardiac abnormalities like Cardiomyopathy, Myocardial infarction, Dysrhythmia, Myocardial hypertrophy and Valvular heart disease. Support Vector Machine (SVM) has been used to classify the patterns inherent in the f... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Efficient Secured Lossless Compression of Medical Images - Using Modified Runlength Coding for Character Representation

    Publication Year: 2005, Page(s):14 - 18
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (966 KB) | HTML iconHTML

    Lossless compression schemes with secure transmission play a key role in telemedicine applications that helps in accurate diagnosis and research. Traditional cryptographic algorithms for data security are not fast enough to process vast amount of data. Hence a novel Secured lossless compression approach proposed in this paper is based on reversible integer wavelet transform, SPIHT algorithm, new m... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Speech Enhancement using Source Features and Group Delay Analysis

    Publication Year: 2005, Page(s):19 - 23
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1488 KB) | HTML iconHTML

    A method is proposed for enhancement of speech degraded by background noise and reverberation, which is collected simultaneously over several microphones. Each microphone signal is processed by the Linear Prediction (LP) analysis to extract the Hilbert envelope of the LP residual. The time-delays are estimated and the Hilbert envelopes of the LP residuals from all the microphones are added coheren... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Morphology Based Approach for Car License Plate Extraction

    Publication Year: 2005, Page(s):24 - 27
    Cited by:  Papers (17)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3136 KB) | HTML iconHTML

    Locating the car license plate in an image or video frame of a car is an important step in car license plate recognition/identification applications. This problem poses many challenges like location of license plate from images taken in poor illumination and bad weather condition; plates that are partly obscured by dirt and images that have low contrast. This paper presents a new morphology based ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Improved MAP Estimation of Variance Through Arbitrary Windows For Wavelet Denoising

    Publication Year: 2005, Page(s):28 - 31
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1320 KB) | HTML iconHTML

    For the past two decades wavelet transform has been a promising tool in image processing. Here a novel method for Gaussian noise removal in images is proposed by estimating the signal variance from noisy environment. As wavelet coefficients are correlated with each other the size of the window considered for estimating variance becomes a critical factor. Previously Maximum Likelihood (ML) and Maxi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Improved Technique for Wavelet Transform Based Watermarking in Images

    Publication Year: 2005, Page(s):32 - 34
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1264 KB) | HTML iconHTML

    This paper proposes an improved wavelet transform based technique for hiding binary watermark images in gray scale cover images. Taking cue from the spread spectrum technique, the proposed method hides data in the two mid-frequency sub bands, randomly choosing between them. Exhaustive simulations show that the proposed simple technique has very good performance in the face of many signal-processin... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Optimization of Single-phase Induction Motor Design using Radial Basis Function Network

    Publication Year: 2005, Page(s):35 - 40
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1904 KB) | HTML iconHTML

    This paper presents a radial basis function (RBF) model for optimal design of single-phase induction motor. The RBF network is a new generation of artificial neural network (ANN) of auto configuring nature and extremely fast training procedure. The induction motor design optimization is formulated as a nonlinear programming problem and Simulated Annealing (SA) is used for arriving at the optimal d... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Colour Image Segmentation Using Fuzzy Clustering Techniques

    Publication Year: 2005, Page(s):41 - 45
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1616 KB) | HTML iconHTML

    Segmentation of an image entails the division or separation of the image into regions of similar attribute. The most basic attribute for segmentation of an image is its luminance amplitude for a monochrome image and color components for a color image. Fuzzy clustering is one of the methods used for image segmentation. This paper describes two fuzzy clustering methods to analyze and segment the col... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • NRC: A Neuro-Rough Classifier for Landmine Detection

    Publication Year: 2005, Page(s):46 - 51
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2592 KB) | HTML iconHTML

    Landmines are a significant barrier to financial, economic and social development in various parts of the world. The demand for dependable, trustworthy intelligent diagnostic systems in the field of landmine detection has been increasing rapidly. Metal detectors used in mine-decontamination, cannot differentiate a mine from metallic debris where the soil contains large quantities of metal scraps a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Artificial Intelligence Techniques Applied to Intrusion Detection

    Publication Year: 2005, Page(s):52 - 55
    Cited by:  Papers (16)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (800 KB) | HTML iconHTML

    Intrusion Detection Systems are increasingly a key part of systems defense. Various approaches to Intrusion Detection are currently being used, but they are relatively ineffective. Artificial Intelligence plays a driving role in security services. This paper proposes a dynamic model Intelligent Intrusion Detection System, based on specific AI approach for intrusion detection. The techniques that a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Distributed Diagnosis in Dynamic Fault Environments for Arbitrary Network Topologies

    Publication Year: 2005, Page(s):56 - 59
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1024 KB) | HTML iconHTML

    This paper has considered the problem of distributed diagnosis in dynamic fault environments for arbitrary network topologies under crash fault assumptions. Heartbeat based mechanisms are used to detect the failure and recovery event at a particular node. A diagnosis algorithm has been simulated and the results are presented. The result shows that failure and recovery events both take a constant t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A New Fast Stream Cipher: MAJE4

    Publication Year: 2005, Page(s):60 - 63
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1424 KB) | HTML iconHTML

    A new fast stream cipher, MAJE4 is designed and developed with a variable key size of 128-bit or 256-bit. The randomness property of the stream cipher is analysed by using the statistical tests. The performance evaluation of the stream cipher is done in comparison with another fast stream cipher called JEROBOAM. The focus is to generate a long unpredictable key stream with better performance, whic... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • MAC Protocol for UWB Based Adhoc Networks

    Publication Year: 2005, Page(s):64 - 67
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2104 KB) | HTML iconHTML

    Ultrawide band (UWB) radio transmission scheme uses extremely low power and low duration pulses resulting in the use of extremely large transmission bandwidth. UWB has several advantages over conventional continuous wave radio communications like support for high data rates over short ranges, robustness to multipath interference and lack of significant fading. This technique based on impulse radio... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Teletraffic Engineering based Flow Admission Control for a DiffServ Network

    Publication Year: 2005, Page(s):68 - 72
    Cited by:  Papers (2)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (904 KB) | HTML iconHTML

    A DiffServ network is capable of providing varying quality of service based on the policies defined for an aggregate. The traffic flows which form the aggregate get monitored. The flow packets which do not confine the policies get dropped. Such policy definitions are prefixed and they do not reflect the current internal state of the network. For this, it is proposed to make use of an endpoint admi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Stability Analysis of First Order Plus Time Delay System under PI & PID Control for Simultaneous Parameter Variation

    Publication Year: 2005, Page(s):73 - 77
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2024 KB) | HTML iconHTML

    This paper deals with a method of estimation of robust dead-time for first order plus time delay (FOPTD) process which does not violate the closed loop stability when Proportional-Integral (PI) parameters and Proportional-Integral-Derivative (PID) parameters as suggested by popular tuning techniques, have been used. Using the Hermite-Biehler Theorem applicable to quasi polynomials, we estimate the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.