2018 26th Signal Processing and Communications Applications Conference (SIU)

2-5 May 2018

Filter Results

Displaying Results 1 - 25 of 709
  • Superpixel based spectral classification of hyperspectral images in different color spaces

    Publication Year: 2018, Page(s):1 - 4
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (383 KB)

    In this paper, superpixel based spectral classification of hyperspectral images are compared using different color spaces. The effective use of spatial and spectral information by using superpixel-based approaches increases classification performance of hyperspectral data. SLIC superpizel algorithm is applied to color images obtained using different datasets. Support vector machine (SVM) is used a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • YUV based automatic colour calibration for NAO robots

    Publication Year: 2018, Page(s):1 - 4
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (931 KB) | HTML iconHTML

    A challenge in real time application of NAO soccer robots is in colour calibration. Many tasks such as localisation and goal detection rely on robustness of colour calibration. In this paper a robust and accurate YUV colour space based automatic colour calibration technique is proposed. First the specific set of frames from the NAO's camera has been analysed in order to define average values for d... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Physical layer security over cascaded Rayleigh fading channels

    Publication Year: 2018, Page(s):1 - 4
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (280 KB)

    In this letter, physical layer secrecy/security performance analysis has been investigated over cascaded fading channels where the fading effects are worse than those in the cellular communication channels like Rayleigh and Nakagami-m. Analytic results are derived for the double Rayleigh fading channel model. As the analysis are evaluated, first the closed-form expression of the probability of the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Decision tree based android malware detection system

    Publication Year: 2018, Page(s):1 - 4
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (310 KB)

    Developments in mobile device technology are driving mobile malware development especially on popular operating system platforms such as Android. Defensive software developed for malware is limited due to insufficient understanding of the features of malicious software and inaccessible on time to relevant examples. In this study, Android malware and detection methods were investigated. In this wor... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A new approach for discriminating the acoustic signals: Largest area parameter (LAP)

    Publication Year: 2018, Page(s):1 - 4
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (362 KB)

    Feature extraction of sound signals is essential for the performance of applications such as pattern and voice recognition etc. In this study, a method based on a novel feature is proposed to separate pathological human voice signals from healthy ones as well as to separate subgroups of pathological voices from each other. The voices are examined in time-frequency domain. Their differences obtaine... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A restaurant recommendation system for Turkish based on user conversations

    Publication Year: 2018, Page(s):1 - 4
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (499 KB)

    Recommendation systems have recently been used in many fields. This study describes a restaurant recommendation system which is developed specifically for data that is collected from chat messages typed in Turkish. The proposed system aims to recommend best matching places to a group of users in a chat environment analyzing their conversations. To achieve this goal, a rule-based approach which com... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Decomposition of optical reflections via polarization techniques

    Publication Year: 2018, Page(s):1 - 4
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (927 KB)

    Polarization provides more detailed description of the light than its power. For this reason, polarized images contain more information than conventional images. It contributes finding of additional solutions for various problems such as object detection, classification, orientation angle detection of objects and acquisition of 3D shapes of objects in the computer vision. In order to obtain linear... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A comparative study on the estimation of noise standard deviation using DATE and truncation thresholds

    Publication Year: 2018, Page(s):1 - 4
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (808 KB)

    D-dimensional amplitude trimmed estimator (DATE) is used for estimating the noise standard deviation in data that can be modelled as a signal in additive white Gaussian noise. Truncation thresholds are a pair of amplitude thresholds that are used for spike detection in extracellular neural recordings. Noise standard deviation is estimated as a byproduct of the computation of the truncation thresho... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance criteria based comparative analysis of indoor localization technologies

    Publication Year: 2018, Page(s):1 - 4
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (95 KB)

    Since the 20th century, location-based systems have become increasingly widespread due to technological advancements. In this respect, developments have been made in the 20th century to ensure that outdoor locational information can be obtained accurately and precisely. In recent years, GPS systems are widely used for outdoor localization. With the increasing use of smartphones and wireless system... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Controlling a robot with extraocular muscles using EEG device

    Publication Year: 2018, Page(s):1 - 4
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (763 KB)

    This paper proposes a system to control the motion of a robot with the extraocular muscles using Mindwave Neurosky EEG Headset, which has one channel (two electrodes). Extraocular muscles are six muscles that control the movement of the eye and one muscle that controls the eyelid elevation. The electrophysiological signals are consumed from the Fp1 sensor location of the brain to analyze the extra... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A novel fetal ECG signal compression method: Variance and neighboring based data compression

    Publication Year: 2018, Page(s):1 - 4
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (768 KB)

    Graphs of ECG signals in time domain have an important place in the diagnosis of heart diseases. ECG (fetal ECG-FECG) signals from fetuses also reveal heart problems, particularly changes in ST interval, that the baby experiences before birth. The rapid, reliable and cost-effective transmission of health data through telemedicine applications is increasing when the distance between health service ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Rule based assessment of hearing-impaired children's facial expressions

    Publication Year: 2018, Page(s):1 - 4
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (624 KB)

    In this study, the facial data of the adults and the hearing-impaired children have been analysed and compared by rule-based facial expression recognition methods. 68 face points have been selected for calculation. Then using these points, the angle between the upper and down lips, the length of the corner of the lip, the angle between the eyebrows and the nose, and the angle of the aperture of th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Partition of medical signals with a two band adaptive filter bank

    Publication Year: 2018, Page(s):1 - 4
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (517 KB)

    Medical signal processing is often used to detect diseases. Segmentation, filtering, categorization are basic operations in this field. In this study; a two-band quadrature mirror orthogonal filter bank structure is used to emphasize and extract signals like QRS wave from electrocardiography, evoked potential from electroencephalography signal. One branch of the filter bank is adopted to filter ou... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Generic Toolbox for Underwater Acoustic Modelling (GT-Aqua) and performance analysis

    Publication Year: 2018, Page(s):1 - 4
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (1663 KB)

    This work describes the capability, design and performance of Generic Toolbox for Underwater Acoustic Modelling. GT-Aqua is a standalone software tool which analyses underwater acoustic propagation with the help of various propagation models. GT-Aqua provides generic source definition and allows user to define detailed underwater environment model. With ray tracing algorithms, system illustrates h... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mobile service experience prediction using machine learning methods

    Publication Year: 2018, Page(s):1 - 4
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (166 KB)

    With the introduction of 4.5G, mobile operators have focused their efforts, infrastructure investments, tariffs and advertisements on the improvement of mobile data rates and services. Mobile services provided by mobile operators are influenced by various factors like the regional coverage of the operator, usage traffic, time and weather conditions. As a result, there may be differences between th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Gain enhancement of antipodal vivaldi antenna

    Publication Year: 2018, Page(s):1 - 4
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (1698 KB)

    Due to the broadband requirements in the field of communication, Ultra-Wide Band antennas have become popular nowadays. In this study, an antipodal Vivaldi antenna with UWB and compact design was investigated for X band applications. The antenna features have been developed using Defective Ground Surfaces (DGS) and dielectric lenses. The Vivaldi antenna was designed in the CST Microwave Studio Env... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An application on the mission planning of UAV swarm

    Publication Year: 2018, Page(s):1 - 4
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (464 KB)

    Within the scope of this work, a combat intelligence, surveillance and attack scenario is designed. Solutions to the problem of planning for unmanned aerial vehicles (UAV), which function in a host of possible enemy elements in a given area, have been produced. The solution of this problem includes; general mission planning, and the creation of mission partitioning algorithms for each UAV, as well... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Phenology recognition using deep learning: DeepPheno

    Publication Year: 2018, Page(s):1 - 4
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (486 KB)

    Accurate and autonomous real time plant phenotyping is an essential part of modern crop monitoring and agricultural technologies. Since environmental conditions highly affect a plant's growth, accurate monitoring of phenology can a lot of information that can be used for accelerating crop production. In this paper, a deep learning architecture is utilized to recognize and classify phenological sta... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Radio frequency planning & verification for remote energy monitoring: A LoRaWAN case study

    Publication Year: 2018, Page(s):1 - 4
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (467 KB)

    This study investigates potential applicability of LoRa technology in power distribution and monitoring. A testbed has been set up at Dudullu Industrial Zone as a pilot study. Theoretical radio frequency planning has been performed and compared with field measurements in order to scrutinize applicability of this technology to remote energy monitoring. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Facial feature representation and face recognition with Neighborhood-based Binary Patterns

    Publication Year: 2018, Page(s):1 - 4
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (839 KB)

    This paper presents a study based on the facial feature representation and facial image recognition using the Neighborhood-based Binary Patterns (NBP). Images can be represented as binary code sequences and classified with the related method which is successful in representation of textural features, robust to gray level color changes and can be invariant to the rotation. In proposed study, face i... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fast and efficient implementations of Cascade protocol

    Publication Year: 2018, Page(s):1 - 4
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (286 KB)

    In this work, new methods are presented to increase efficiency and speed performances of Cascade protocol version which is presented by Yan and his friends. The computer simulations based results show that the suggested protocol is both more efficient and faster than the original one. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Bitcoin movement prediction with text mining

    Publication Year: 2018, Page(s):1 - 4
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (113 KB)

    In the last few years, Bitcoin is one of the most discussed and popular topic in financial system. This article aims to predict Bitcoin movement by using Machine Learning and Text Mining models. Many models have been used to this end, including the most popular models in financial prediction; Artificial Neural Network (ANN), Support Vector Machine (SVM) and Logistic Regression (LR). In addition to... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Data clustering based on FCM and WOA

    Publication Year: 2018, Page(s):1 - 4
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (369 KB)

    In this article, we have proposed a new hybrid clustering algorithm based on Fuzzy C Means (FCM) and Whale Optimization Algorithm (WOA) using chaotic map. The random selection of the initial cluster centers in the FCM algorithm is a disadvantage for the algorithm. To reduce this disadvantage, the BOA algorithm, which is improved performance with chaotic maps, is used to optimize the initial cluste... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Hybrid FCM-WOA data clustering algorithm

    Publication Year: 2018, Page(s):1 - 4
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (408 KB)

    In this work, we propose a hybrid clustering algorithm that integrates Fuzzy C-Means (FCM) and Whale Optimization Algorithm (WOA) using the Chebshev distance function. The FCM algorithm uses Euclidean distance to measure the similarity between the data. To avoid the existing disadvantages of the Euclidean distance, all distances in the FCM algorithm is calculated with the Chebsyhev distance functi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Data hiding using shuffle algorithm and LSB method

    Publication Year: 2018, Page(s):1 - 4
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (913 KB)

    With the development of technology, secret communication with audio, image and video files has become important. In this case, encryption and steganography play a major role. While encryption deals with uncatchable of message content, steganography deals with failure to understand the existence of the messages used for secret communication. Because of these features steganography and encryption ar... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.