SIP
SIP
SIP
Comb-Drive Structure
Mr. Prashant Gupta
prashant_iit@ieee.org
Ideal Institute of Technology, Ghaziabad
Abstract:- Resonators serve as essential of resonant frequencies, although only a few may
components in Radio- Frequency (RF) electronics, be used in practical resonators. The vibrations
forming the backbone of filters and tuned inside them travel as waves, at an approximately
amplifiers. However, traditional solid state or constant velocity, bouncing back and forth
mechanic implementations of resonators and between the sides of the resonator. The oppositely
filters tend to be bulky and power hungry, limiting moving waves interfere with each other to create a
the versatility of communications, guidance, and pattern of standing waves in the resonator. If the
avionics systems. MicroElectro-Mechanical distance between the sides is , the length of a
Systems (MEMS) are promising replacements for round trip is . In order to cause resonance,
traditional RFcircuit components. the phase of a sinusoidal wave after a round trip
In this paper we discuss the MEMS resonator, has to be equal to the initial phase, so the waves
which is one of the versatile components in the RF will reinforce. So the condition for resonance in a
circuits, based on one of the promising resonator is that the round trip distance, , be
architecture known as Comb-Drive structure. equal to an integral number of wavelengths of
the wave:
Introduction:
A resonator is a device or system that
exhibits resonance or resonant behavior, that is, it If the velocity of a wave is , the frequency
naturally oscillates at some frequencies, called its
is so the resonance frequencies are:
resonant frequencies, with greater amplitude than
at others. The oscillations in a resonator can be
either electromagnetic or mechanical (including
acoustic). Resonators are used to either generate
waves of specific frequencies or to select specific So the resonant frequencies of resonators,
frequencies from a signal. called normal modes, are equally spaced multiples
(harmonics), of a lowest frequency called
A physical system can have as many resonant the fundamental frequency. The above analysis
frequencies as it has degrees of freedom; each assumes the medium inside the resonator is
degree of freedom can vibrate as a harmonic homogeneous, so the waves travel at a constant
oscillator. Systems with one degree of freedom, speed, and that the shape of the resonator is
such as a mass on a spring, pendulums, balance rectilinear. If the resonator is inhomogeneous or
wheels, and LC tuned circuits have one resonant has a non rectilinear shape, like a circular
frequency. Systems with two degrees of freedom, drumhead or a cylindrical microwave cavity, the
such as coupled pendulums and resonant resonant frequencies may not occur at equally
transformers can have two resonant frequencies. spaced multiples of the fundamental frequency.
The vibrations in them begin to travel through the They are then called overtones instead
coupled harmonic oscillators in waves, from one of harmonics. There may be several such series of
oscillator to the next. Resonators can be viewed as resonant frequencies in a single resonator,
being made of millions of coupled moving parts corresponding to different modes of vibration.
(such as atoms). Therefore they can have millions
1
MEMS Resonators:-
Mechanical resonators are highly sensitive probes
for physical or chemical parameters which alter vertical displacement y from its equilibrium
their potential or kinetic energy[1,2]. Silicon position, mass m and spring constant k = f / y, R is
resonant microsensors for measurement of the damping coefficient.
pressure, acceleration, and vapor concentration The angular resonant frequency is given by
have been demonstrated recently, polysilicon
micro-mechanical structures have been resonated
elcctrostatlcally parallel to the plane of the
substrate by means of one or more interdigitated
capacitors (electrostatic combs). Folded-Flexure comb drive Microresonator:-
Some advantages of this approach are In the design of Resonator, spring constant played
(1) less damping on the structure, leading to a vital role. Different types of spring designs have
higher quality factors, been applied in comb-drive actuators.
(2) linearity of the electrostatic-comb drive and
(3) flexibility in the design of the suspension for 1- Clamped–clamped beams,
the resonator 2-A crab-leg flexure and
3- A folded-beam flexure.
For example, folded-beam suspensions can be
fabricated without increased process complexity, In all these different types of spring design,
which is attractive for releasing residual strain and folded beam structure is widely used to design a
for achieving large-amplitude vibrations. Microresonator The folded-flexure electrostatic
comb drive micromechanical resonator shown in
There are different types of resonator. We only Figure 1 was first introduced by Tang [4, 5,6].
focus on vibrating resonators. This device has been well-researched and is
•Lateral movement commonly used for MEMS process
–Parallel to substrate characterization. The microresonator consists of a
–Ex.: Folded beam comb-structure movable central shuttle mass which is suspended
by folded-flexure springs on either side. The other
•Vertical movement ends of the folded-flexure springs are fixed to the
–Perpendicular to substrate lower layer. The microresonator can be thought
–Ex.: clamped-clamped beam (c-c beam) of, as a spring-mass damper system, the damping
–”free-free beam”(f-f beam) being provided by the air below and above the
movable part. By applying a voltage across the
fixed and movable comb fingers, an electrostatic
force is produced which sets the mass into motion
Example of simple resonators in the x-direction. The microresonator has been
used in building filters, oscillators and in resonant
Mass and spring. This resonator is used by many positioning systems. Figure 1 shows the overhead
physicists as the elemental simple mechanical view of a µresonator which utilizes interdigitated-
resonator, to explain the properties of more comb finger transduction in a typical bias and
complex resonances and resonators. excitation configuration. The resonator consists of
a finger-supporting shuttle mass suspended above
The governing homogeneous differential equation the substrate by folded flexures, which are
is anchored to the substrate at two central points.
The shuttle mass is free to move in the direction
2
indicated, parallel to the plane of the silicon
substrate. Folding the suspending beams as shown
provides two main advantages: first, post-
fabrication residual stress is relieved if all beams where Fe,ζ is the external force (in the x-mode
expand or contract by the same amount; and this force is generated by the comb drives), rn; is
second, spring stiffening nonlinearity in the theeffective mass, Bζ is the damping coefficient,
suspension is reduced, since the folding truss is and k; is the spring constant.
free to move in a direction perpendicular to the The fundamental frequency of the structure can be
resonator motion. The black areas are the places obtained from Rayleigh’s Quotient.
where the polysilicon structure is anchored to the
bottom layer. The fundamental resonance frequency of this
mechanical resonator is, again, determined largely
by material properties and by geometry, and is
given by the expression
The preferred direction of motion of the where µ is the viscosity of air, d is the fixed
microresonator is the x-direction. However, the spacer gap between the ground plane and the
microresonator structure can vibrate in other bottom surface of the comb fingers, δ is the
modes. There are the three translation modes penetration depth of airflow above the structure, g
along x, y and z, three rotational modes about x, y is the gap between comb fingers, and As, At, Ab,
and z, and oscillation modes due the movement of and Ac are layout areas for the shuttle, truss
the folded-flexure beams and the comb drive. beams, flexure beams, and comb finger sidewalls,
Each oscillation mode is described by a lumped respectively.
second-order equation of motion. For any
generalized displacement ζ, we can write:
3
and resonator fingers. α is a constant that models
Working Principle:- additional capacitance due to fringing
electricfields. For comb geometries, α =1.2 . Note
To bias and excite the device, a dc-bias voltage that, again, Cn/x is inversely proportional to the
VP is applied to the resonator and its underlying gap distance.
ground plane, while an ac excitation voltage is Linear equations for the spring constants are
applied to one (or more) drive electrodes. A derived using energy methods . A force (or
specific resonance mode may be emphasized by moment) is applied to the free end(s) of the spring
using multiple drive electrodes, placing them at in the direction of interest, and the displacement is
the displacement maxima of the desired mode, calculated symbolically (as a function of the
and applying properly phased drive signals to the design variables and the applied force). In these
electrodes. To avoid unnecessary notational calculations different boundary conditions are
complexity, however, we focus on the case of applied for the different modes of deformation of
fundamental-mode resonance in the present the spring.
discussion. We also assume that the electrodes are When forces (moments) are applied at the end-
concentrated at the center of the beam and that the points of the flexure, the total energy of
beam length is much greater than the electrode deformation, U, is calculated as:
lengths. This allows us to neglect beam
displacement variations across the lengths of the
electrodes due to the beam’s mode shape (i.e., we
may assume that x(y) ~ x for y near the center of
the beam). A more rigorous analysis which
accounts for all of these effects is certainly
possible, but obscures the main points. When an
ac excitation with frequency close to the where, Li is the length of the i’th beam in the
fundamental resonance frequency of the flexure, Mi is the bending momentransmitted
µresonator is applied, the µresonator begins to through beam i, E is the Young’s modulus of the
oscillate, creating a time-varying capacitance material of the beam (polysilicon, in our case) and
between the µresonator and the electrodes. Since Ii is the moment of inertia of beam i, about the
the dc-bias VPn = VP - Vn is effectively applied relevant axis, Ti is the torsion transmitted through
across the time-varying capacitance at port n, a beam i, G is the shear modulus, Ji is the torsion
motional output current arises at port n. constant of beam i, and ξ is the variable along the
length of the beam. The bending moment and the
For this resonator design, the transducer torsion is a linear function of the forces and
capacitors consist of overlap capacitance between moments applied to the end-points of the flexure.
the interdigitated shuttle and electrode fingers. As The displacement of an end-point of the flexure in
the shuttle moves, these capacitors vary linearly any direction ζ is given as:
with displacement. Thus, Cn/x is a constant, given
approximately by the expression
4
equations in terms of the applied forces and
moments and the unknown displacement. Solving The displacement as a function of the driving
the set of equations yields a linear relationship voltage was measured while applying a dc voltage
between the displacement and applied force in the between the rotor (movable set) and a stator
direction of interest. The constant of (stationary set)
proportionality gives the spring constant as a
function of the physical dimensions of the flexure.
The effect of spring mass on resonance frequency
is incorporated in effective masses for each lateral
mode. Effective mass for each mode of interest is
calculated by normalizing the total maximum
kinetic energy of the spring by the maximum
shuttle velocity, Vmax.
Where
x- x direction
m-Mass
k-Spring constant
B- Damping coefficient.
5
Simulation Process:-
Steps for the IntelliSuite Simulator
6
*Capacitance Report
Number of conductors: 2
CAPACITANCE MATRIX, 1e-6 nanofarads*1e-
6
C11 9.334000
C12 -1.037000
C21 -1.037000
C22 2.767000
7
Conclusion and Future Work:- Acknowledgements:
This research work had been carrying out at
In this project we design and simulate a CARE, IIT Delhi under the supervision of Prof.
microresonator based on comb-drive structure Sudhir Chandra CARE, IIT Delhi. I am also
which is introduced by Tang. We design it and grateful to my college Director Dr. G. P. Govil
calculate resonance frequency for different and my Head of the Department Mr. N.P. Gupta
geometry parameters. for his kind hearted support and motivation during
the research work.
There are two types of constraints in comb drive
structure (1-Geometric and 2-Functional) which References:
we have not discuss here left for the future work.
The project work can be extended in a number of
directions. Manufacturing variations need to be 1. S. M. Sze, Semiconductor Sensors, John
incorporated for accurate synthesis results. Wiley & Sons Inc., New York, 1994
2. Ljubisa Ristic, “Sensor Technology and
Fabrication for MEMS resonator is also a big Devices”, Artech House ISBN 0-89006-532-2,
issue which we are not discuss in our work and 1994
left for the future work. 3. G.K. Fedder and T. Mukherjee, "Automated
Optimal Synthesis of Microresonators," Proc 9th Intl.
The spring constant can also be designed by Conf on Solid-State Sensors and Actuators
different styles also left for future work. After (Transducers ’97), Chicago, IL, June 16-19, 1997.
design and calculating the resonance frequency 4. W.C. Tang, T.-C. H. Nguyen, M. W. Judy, and R.
T. Howe, "Electrostatic Comb Drive of Lateral
for different shapes we go for simulation process Polysilicon Resonators," Sensors and Actuators A, 21
and simulate them and get the results which we (1990) 328-31.
shown in the table. 5. X. Zhang and W. C. Tang, "Viscous Air
Damping in Laterally Driven Microresonators,"
From all these work, I would like to conclude Sensors and Materials, v. 7, no. 6, 1995, pp.415-430.
some points which are following. 6. W C Tang, T-C H Nguyen and R T Howe,
Laterally driven polysilicon resonant
To achieve high resonance frequency microstructures, IEEE MicroElectro Mechamal
System Workshop, Salt Luke City, UT,US A ,
–Total spring constant should increase Feb 20-22, 1989, pp 53-59
7. C.T.C. Nguyen, MTT-S 1999
–Or dynamic mass should decrease (http://www.eecs.umich.edu/~ctnguyen/mtt99.p
-(Difficult, since a given number of fingers df)
are needed for electrostatic actuation 8. Andrew Potter, “Fabrication and Modeling
of Piezoelectric RF MEMS Resonators”,
–k and m depend on material choice, layout, Department of Physics and Division Engineering
dimensions – Brown University
•k expresses the spring constant relative to mass 9. Roger T. Howe, “Applications of Silicon
Micromaching to Resonator Fabrication”, 1994
–Frequency can increase by using a material with IEEE International Frequency Control
larger k ratio than Si Symposium
10. Clark T. C. Nguyen, “ Frequency-Selective
MEMS for Miniaturized Communication
Devices”, 1998 IEEE Aerospace Conference, vol
1 ,Snowmass, Colorado
8
CONFERENCE ON “SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM (SPRTOS)” MARCH 26-27 2011
H (z) =
II EXISTING LOOK-AHEAD ALGORITHMS
(6)
The transfer function of Nth-order recursive filter is The total multiplication complexity is (2N+M) and latch
described by complexity is linear in M. extra delay in producing output is
H (z) = = (1) M [11].
The LA algorithm finds the augmented polynomial D (z) B. SCATTERED LOOK-AHEAD ALGORITHM
where
For the M-stage SLA pipelined IIR filters, the denominator
of the transfer function is obtained as
Krishna Raj is Deptt. of Electronics Engg., HBTI, Kanpur-208002,
India, Email: kraj_biet@yahoo.com, (7)
SIP0103-4
CONFERENCE ON “SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM (SPRTOS)” MARCH 26-27 2011
The denominator of the resulted transfer function contains by substituting in (1) [2, 4, 6, and 7]. Similarly, an M-
N scattered terms , …, .[3]The coefficients stage SLA pipelined version of same order recursive filter
can be obtained by solve N (M-1) simultaneous equation. can be produced by substituting in (1) [1, 2, 8].It is
used for high speed modular implementation of stable 2-D
- , where, i=2,…, M- denominator separable IIR filters.
1,M+1,..,tM-1, tM+1,…..,NM-1.
In out In Out In out
Then an equivalent M-stage pipelining of same order
recursive filter can be obtained as [1, 8].
M M M
H (z)
D D D
= (8) D
D M
D D
The total multiplication complexity is (NM+N+1) and
latch complexity is square in M. The extra delay in producing D
output is (NM-N) [11]. If M is power of 2, then using
decomposition technique, the total multiplication and latch
complexity can be further reduced [1].The architecture is D M
shown Fig. 1(b). D
D
(a) (b) (c)
C. Distributed Look Ahead Pipelining Fig: (1) LA pipelined IIR filters (a) CLA realization (b) SLA realization (c)
DLA realization
Pipelining of the following filter transfer function
III COMPARATIVE ANALYSIS
H (z) = Table-1
Delay in Extra
Since must equal original H (z), can also be obtained Pipelining Multiplication
First Delay in
by multiplying. The original filter by an augmentation Methods Complexity
output output
polynomial D (z) both in the numerator and the denominator,
i.e., CLA L+M+N-1 M M
DLA M+ M
Where D (z) = 1+ …………. +
Initialize =-
Table-2
Iterate For i=2 to (M-1)
M=3 M=4 M=6 M=8
Method SLA A SLA DLA SLA DLA SLA DLA
No. of
According to the Distributed Look-Ahead (DLA) MUL
transformation, the M-stage pipelined filter transfer function /adder 6 5 6 5 8 6 8 7
No of
would have the following general form. Latch 10 8 14 10 22 14 30 18
Delay
in 1st
o/p 6 5 8 6 12 8 16 10
(9)
The coefficient of non-recursive portion of pipelined filter IV CONCLUSIONS
are unequally distributed and it can be implemented with
( ) multiplication and recursive portion by The denominator order using DLA , (M + ) is less than the
(L+1) multiplications, hence total multiplications ( order with SLA (NM), and the DLA transformed filter is
and latch complexity is linear in M.CLA and stable, and then the proposed scheme would offer considerable
SLA scheme are special class of DLA scheme. An M-stage hardware savings over SLA. Multiplication and Latch
pipelined version of an order Recursive filter is obtained complexity are less over SLA. Pipeline Delay and hardware
SIP0103-4
CONFERENCE ON “SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM (SPRTOS)” MARCH 26-27 2011
Examples
H (z) =
(b)
1
1
0.8
0.6
Fig: 5 (a) DLA (b) SLA
0.8
0.6 0.4
(Using table1 and tabe2)
Imaginary Part
0.4
0.2
Imaginary Part
0.2 2
0
2
0
-0.2
-0.2
-0.4
-0.4
-0.6
-0.8
-0.6
-0.8
V REFERENCES
-1 -1
-1 -0.5 0 0.5 1
Real Part -1 -0.5 0 0.5 1
Real Part
0.8
Speech, and Signal Processing, vol. 37,no. 7 pp. this issue, pp. 1099-
0.8
0.6
0.6
0.4
1117,july 1989.
0.4
0.2
Imaginary Part
0.2
2
2
0
-0.2
0
-0.2 pipelining IIR filters," in Proc. IEEE ISCAS, 1996, pp. 237-240.
-0.4
-0.6
-0.4
-0.6
[3] Y. C. Lim, "A new approach for deriving scattered coefficients of
-0.8
-1
-0.8
-1
pipelined IIR filters," IEEE Trans. Signal Processing, vol. 43, pp.
-1 -0.5 0
Real Part
0.5 1 -1 -0.5 0
Real Part
0.5 1
2405-2406, 1995.
[4] H.H. Loomis and B Sinha, “High-speed Recursive Digital Filter
(c) Fig:2 (d) Realization”, Circuits, Systems and Signal Processing, vo1.3, pp.
267-294, Sept., 1984.
[5] A. P. Chand, “Low Power CMOS Digital Design,” IEEE J. of
Solid-State Circuits, vol. 27, pp. 473-484, Apr., 1992.
0.8
1 1
0.8
[6] P.M. Kogge, The architecture of Pipelined Computers, New
0.6 0.6
0.4
York, Hemisphere Publishing Corporation, 1981.
[7] Y.C. Lim and B. Liu, “Pipelined Recursive Filter with Minimum
0.4
Imaginary Part
0.2
Imaginary Part
0.2
2
0
-0.6
-0.6
vo1.40, no. 7, pp. 1643-1651, July 1992.
[8] M. A. Soderstrand, K. Chopper and B. Sinha, “Comparison of
-0.8
-0.8
-1
-1
-1 -0.5 0 0.5 1
-1 -0.5 0
Real Part
0.5 1 Real Part
three new techniques for pipelining IIR digital flters,”23rd
ASILOMAR Conjerenceon Signals, Systems & Computers, Pacific
(a) Fig:3 (b) Grove, CA, pp. 439-443, Nov., 1984.
[9] H. B. Voelcker and E:E. Hartquist, “Digital Filtering via Block
Recursion”, IEEE Trans. Audio Electroacoust., Vol.AU-18, pp.169-
176, June, 1970.
1
1
0.8
[10] Yen-Liang chen,Chun-Yu chen,Kai-Yuan Jheng and An-
Yen(Andy)Wu,”A Universal Look-Ahead Algorithm For Pipelining
0.8
0.6
0.6
0.2 0.2
3 2
-0.2
0 0
-0.2
[11] A. K. Shaw and M. Imtiaz, "New Look-Ahead Algorithm for
-0.4
-0.6
-0.4
-0.6
Pipelined Implementation of Recursive Digital Filters,” in Proc.
-0.8
-1
-0.8 IEEE ISCAS, 1996, pp. 3229-323.
-1
-1 -0.5 0 0.5 1
Real Part -1 -0.5 0 0.5 1
Real Part
SIP0103-4
CONFERENCE ON “SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM (SPRTOS)” MARCH 26-27 2011
Fig :( 3) pole-zero plot for SLA (a) M=3 (b) M=4[both stable]
Fig :( 4) pole-zero plot for DLA (a) M=3 (b) M=4[both stable]
SIP0103-4
1
Abstract: This paper proposes a new aspect of comparing the embedded zero blocking coding --- MC-EZBC) [6] [7]. The
two video codecs on the basis of rate-distortion basis. Scalable second video codec is the Ad Hoc Model 2.0 (AH M 2.0)
coding provides a straight forward solution for video coding implementation of the H.264 standard [4][8] which extends
that can serve broad range of applications without the need for the JM 6.1 implementation[9] with a rate control
transcoding. Even though the latest international video -coding
algorithm[10].
standards do not provide ful ly scalable methods, only H.264
provides the best rate-distortion performance. Other than
H.264, the performance on rat e-distortion Motion Compensated
Embedded Zero Block Context (MC-EZBC) coder which is fully III. MATERIALS AND METHODS
scalable.
A. Encoding Process
Keywords—, MC-EZBC, ME/MC sub pixel accuracy, This section describes how the two codecs were configured
temporal level subband coding, YSNR. and used in order to obtai n the bit streams necessary for
performing the various measurements.
I. INTRODUCTION
THE MODERN VIDEO compression coding technologies has TABLE I
been significantly improved for last few years and has Sequences Used In Our Experiment
enabled broadcasting of digital video signal over various Name No. of frames Abbreviation
networks [1]. Also motion compensated wavelet based video Akiyo 300 AK
coding emerged as an important research topic to explore Foreman 300 FO
because of its ability to provi de better quality. MC-EZBC [2]
Hall 300 HA
[3] is one of the codec that encodes the motion information in
a non scalable manner, which results in a reduced coding
efficiency performance at low bit rates. However H.264 [4] is
a non scalable coding technique provides a good quality As input three progressive video sequences were used in
video at substantially lower bit rates than previous standards raw Y Cb Cr 4:2:0 formats. These were downloaded from the
like MPEG-2, H.263, or MPEG-4 Part 2 without increasing Hannover FTP server.
the complexity of design and cost.
In this paper we are performing the analysis on the An overview of the sequences is given i n the Table I. The
joint region of applicability betw een the MC-EZBC and resolutions used are the Common Intermediate Format
H.264 video codec. In MC-EZBC, by using a third and four (CIF, 352 288 ), thus resulting in 3 input video sequences.
level of temporal decomposition of the input video sequence These sequences were encoded by making use of constant bit
thereby obtaining a GOP structure of 8 and 16 frames, and rate coding (CBR). Ten different target bit rates were used:
effect of sub-pixel accurate Motion estimation and both very low and very high bit rates. The bit -rates taken are
compensation, a good comparison with H.264 is achieved in 100, 200, 300,…1000 kbps. At each bit rate, encoding was
terms of Coding Efficiency [5]. performed at 30 frames per second. The detailed settings for
The outline of the paper is as follows. After introducing the different encoding parameters can be found in Table II
the examined compression schemes in section II, an overview and Table III.
of the applied methodology is provided in Section III. Th e
obtained results are described in Section IV while the
conclusions are drawn in Section V. The code of MC-EZBC was downloaded from the MPEG
CVS server. Each input video sequence was encoded once
and then pulled several times in order to get decodable bit
II. Video codec overview streams for all target bit rates. The H.264 bitstreams are
The two video codec that were used in the tests are summed conforming to Baseline and Main Profile. The GOP structure
up in this section. Due to place constraints, the reader is is IBBBP and GOP length is 16.
referred to the references for further information on these
codecs. The first one is a scalable wavelet based video codec
developed by J. Woods et al. (motion compensated
TABLE II
Parameter Settings for the MC-EZBC Compressor
Parameter Value(CIF) Comment B.Quality measurement
-inname akiyo.yuv Name of input file The PSNR-Y is calculated as defined in [11]. In order to get a
containing a sequence of
PSNR value for an entire sequence, the average of the PSNR -
4:2:0
-statname akiyo_tpyrlev3 Name of output file Y values of the individual frames is calculated. This is not
_cif_mv0.stat containing some statistical only one way to get a value for an entire sequence. But
information generated another method could be, for instance, to take the minimum
during encoding of the individual PSNR-Y values (because a video sequence
-start 0 Index number of the first may be evaluated based on the worst part). PSNR is based on
frame (0 means first frame a distance between two images [derived from the metric3
in file)
-last 299 Index number of the last
mean square error (MSE)] and does not take into account any
frame property of the human visual system (HVS).
-size 352 288 176 Size of each input frame.
144 1. pixel width of the IV. EXPERIMENTAL RESULTS
luminance component
In the experiment, the performance of the codec is checked
2. pixel height of the
luminance component on Rate-Distortion basis. It is clear that due to the size of the
3. pixel width of the experiments and place constrai nts, not all results can be
chrominance component presented. A subclass of the re sults is given in Table IV and
4. pixel height of the Table V.
chrominance component
-frame rate 30 Number of input frames
The coding efficiency of MC -EZBC is compared with
per second
-tPyrLev 3 Levels of temporal H.264 with different sequences at different bit rates. MC -
subband decomposition EZBC is a fully scalable coding architecture whi ch utilizes
-searchrange 16 Maximum search range MCTF and wavelet filtering. The software available for
(in pixels) in first
download at the website of CIPR, RPI [7] is used for testing
temporal decomposition
level. The search range is of the video material. On the other hand H.264 has non
doubled with each scalable coding structure and t he entire tests were done on
decomposition LINUX based personal computer (AMD turion 64x2
-maxsearchrange 64 Upper limit for search
processor speed 1.9GHz and RAM 1GB) with Ubuntu 9.04
range
installed and no other software running in the background.
almost all bit rates. It is also observed that H.264 outperforms [9] H.264.AVC Reference Software [Online]. Available:
http://iphome.hhi.de/suehring/tml/download/
well throughout the bitrate for High complexity.
[10] Proposed Draft Description of Rate Control on JVT standard ,
TABLE V
ISO/IECJTC1/SC29/WG11 and ITU -T SG16/Q.6, JVT-document
Subset of Quality Measurements for Video CIF Sequences JVT-F086, Dec. 2002
Bit Rate MC-EZBC H.264
(Kbps) [11] P. Chen. Fully Scalable Subband / Wavelet Coding. PhD Thesis,
Foreman Sequence Foreman Sequence Rensselaer Polytechnic Institute, Troy, New York, May 2003.
100 27.86 30.33
400 34.88 35.73
1000 39.12 39.30
IV. CONCLUSION
In this paper, an overview was given of the rate distortion
performance of the two state of t he art video codec
technologies in terms of YSNR. From the above results it is
clear that the tools that are incorporated in the H.264 standard
outperform MC-EZBC. Although at around 1000 Kbps the
performance of MC-EZBC is comparable with that of H.264
for high complexity sequences.
REFERENCES
[1] M Ghanbari. Standard Codecs: Image Compression to Advanced video
Coding. IEE Telecommunications Series 2003.
[2] S.S. Tsai, motion Information Scalability for Interframe Wavelet Video
Coding, MS Thesis, National Chiao Tung University, Hs inchu,
Tiawan, R.O.C., Jun.2003
[3] S.S. Tsai, motion Information Scalability for Interframe Wavelet Video
Coding, MS Thesis, National Chiao Tung University, Hsinchu,
Tiawan, R.O.C., Jun.2003.
Abstract: Digital filtering technique is implemented using This paper describes the way of implementation of IIR digital
general purpose digital signal processing chips. Audio and special filtering algorithm on field programmable gate arrays
purpose digital filtering algorithms are designed on ASICs for (FPGAs).Recent advancements in FPGA technology have
higher bit rate. This paper describes the implementation of IIR enabled these devices to be applied to a variety of applications
filter algorithms based on field programmable gate arrays traditionally reserved for ASICs. FPGAs are well suited for
(FPGAs). IIR Filter design shows significant reduction in the
data path designs, such as those encountered in digital filtering
computational complexity required to achieve a given frequency
response as compared to FIR filter for the same response. FPGA applications. The advantages of the FPGA approach to digital
based implementation includes higher sampling rates that are filter implementation include higher sampling rates than those
available in traditional DSP chips. It produces a low cost along are available from traditional DSP chips,[2] lower costs than
with flexibility in design in comparison to ASIC. It follows an ASIC for moderate volume applications, and more software
pipeline architecture that gives us the advantages of parallel flexibility than the alternate approaches. In particular, multiple
processing. We have observed and compared the filtering multiply-accumulate (MAC) units may be implemented on a
characteristics of IIR filter of direct form-2 realization using single FPGA, which provides comparable performance to
MATLAB by altering the bit length and also the order. We have general-purpose architectures which have a single MAC unit.
implemented the digital filter in Xilinx Spartan 3E kit using
In comparison to FIR filter[3] IIR filter uses less MAC unit to
VHDL. FPGA architectures are in-system programmable, the
configuration of the device may be changed to implement achieve the same frequency response resulting in lesser
different functionality as per requirement. Our work illustrate memory requirement and less computational complexity for
that the FPGA approach is both flexible superior to traditional IIR filter. The configuration of the FPGA device may be
approaches. changed to implement alternate filtering operations only by
Keywords: ASIC, FPGA, IIR, FIR, VHDL, Pipeline altering the software, such as lattice filters and gradient-based
Architecture, Xilinx Spartan 3E adaptive filters, or entirely different. In our project we have
implemented digital IIR filter using FPGA. IIR systems have
an impulse response function that is non-zero over an infinite
I. INTRODUCTION length of time. This is in contrast to finite impulse response
A filter is used to modify an input signal in order to facilitate (FIR) filters[4], which have fixed-duration impulse responses.
further processing. A digital filter works on a digital input (a To obtain the similar stability IIR filter requires less order
sequence of numbers, resulting from sampling and quantizing compared to FIR filter. IIR Filter is one of the Digital Filters
an analog signal) and produces a digital output. According to that is used mostly in Audio Signals Processing. One good
Dr. U. Meyer-Baese [1], “the most common digital filter is the application of IIR filter technology is the generation and
Linear Time-Invariant (LTI) filter”. Designing an LTI recovery of dual tone multi-frequency (DTMF) signals used
involves arriving at the filter coefficients which, in turn, by Touch-Tone telephones.
represents the impulse response of the IIR filter design. These
coefficients, in linear convolution with the input sequence will The rest of the paper is organized as follows: Section II
result in the desired output. The linear convolution process describes related works and Section III deals with proposed
can be represented as [2]: The most common approaches to architecture. Our scheme is evaluated by results obtained from
the implementation of digital filtering algorithms are generally extensive simulation in Section IV. Finally, we conclude in
implemented on digital signal processing chips for audio Section V.
applications and application-specific integrated circuits
(ASICs) for higher rates.
2
II. RELATED WORKS signal is related to the input signal. We have modeled the
Customized VLSI chips influenced the former and most of the equation as
researches implementing digital filter. The architecture of
these filters are largely determined by the target application.
Typical DSP chips like Texas instrument’s TMS320, Free 1
y[n] = (b0 * x[n] + b0 * x[n −1] + .........bp * x[n − P]
scale’s MSC81xx, Motorola’s 56000, Analog device’s ADSP- a0 (1)
2100 family efficiently performs filtering operations in audio −a1 * y[n −1] − a2 * y[n − 2] − ........... − aQ * y[n − Q])
range. For higher frequency domain, CMOS and Bi-CMOS
technology is used. There are some disputes in the customized
chips. The biggest shortcoming is low flexibility as they are
application specific. Also, lack of adaptability in these chips is Where:
severe. Typical custom approaches do not allow the function
of a device to be modified during the evaluation, for an • is the feed forward filter order
example, fault correction. The FPGA approach is therefore
necessary to provide the designing freedom. Many of the • are the feed forward filter coefficients
popular FPGAs are in-system programmable, which allows
modification of the operation using simple programming. But • is the feedback filter order
for filtering purposes FIR[3] filters have been commonly
used. In • are the feedback filter coefficients
this particular work, IIR filters are implemented as they
require fewer calculations and lesser memory requirement.IIR
filters also outperforms FIRs[5] for narrow transition bands. • is the input signal
They can also provide a better approximation for traditionally
analog systems in digital applications than competing filter • is the output signal.
types.IIR filters are mainly used in audio applications such as
speakers and sound processing functions. In this work, Now from the above equation we modeled the transfer
XILINX SPARTAN 3E series is used for implementing function of IIR filter as
various digital filtering algorithms. XILINX SPARTAN 3E
consists of reconfigurable combinational logic blocks with Y (z ) b + b z −1 + b2 z −2
= H ( z ) = 0 1 −1 (2)
multi input and output, router or switching matrix for X (z ) 1 + a1 z + a 2 z − 2
connection and buffers.
For hardware representation of the digital filter we have
III PROPOSED ARCHITECTURE modeled the transfer function by using adder, multiplier and
delay unit.
IIR filter implementations on FPGA board illustrate that the
x(n) w(n) b0 y(n)
FPGA approach is both flexible and provides performance
+ +
superior to traditional approaches. Because of the
programmability of this technology, the examples in this paper
can be extended to provide a variety of other high z-1
performance IIR filter realizations. Using powerful computer
based software tools to perform redundant calculations in the -a1 w(n-1) b1
filter design process enables a designer to achieve the best + +
design within the shortest time. While implementing a filter
on hardware, the biggest challenge is to achieve specified
system performance at minimum hardware cost. In this paper z-1
we achieve this goal by designing the digital filter which also
gives better noise margin and less ageing effect of -a2 w(n-2) b2
components in comparison to Analog filter. One among the
hurdles is to understand, estimate and overcome where
possible, the effects of using a finite word length to represent
the infinite word length coefficients. Selecting a non Figure 1: Direct Form-2 Structure of Digital Filter
optimized word length[6] can result in the filter transfer A basic IIR filter consist of 3 main blocks-
function being different from what is expected. The effects of (i) Adder (ii) Multiplier (iii) Delay unit
using finite word length representation can be minimized by
analytical or qualitative methods or simply by choosing to A Implementation of Adder
implement higher order filters in cascaded or parallel form
Digitals filters[7] are often described and implemented in We have implemented this system using serial adder. A serial
terms of the difference equation that defines how the output adder is a binary adder that adds the two numbers bit-pair
3
wise. Each bit-pair are added in a single clock pulse. The A. Software Simulation
carry of each pair is propagated to the next pair.
The sampling frequency is chosen as 4 times the stop band
B. Implementation of Multiplier and the filter has a steep transition band with a width of 1000
Hz. These specifications are fed as inputs to the FDA tool in
The multiplier has been configured to perform multiplication
MATLAB R2009a. The tool performs the filter design
of signed numbers in two’s complement notation We have
calculations using double precision floating point numeric
used signed multiplication where a n-bit by n-bit
representation and displays the response of a IIR elliptical low
multiplication takes place and result in a 2*n-bit value.
pass filter of order 6. Figure 2 shows the filter design window
of FDA tool, after completion of the design process.
C. Implementation of Delay Unit
We have used shift register for the purpose of delay. A shift
register is a group of flip-flops set up in a linear fashion with
their inputs and outputs connected together in such a way that
the data is shifted from one device to another when the circuit
is active. (i) A provides the data movement function
(ii). A shift register “shifts” its output once every clock cycle.
PASS BAND STOP BAND
IV SIMULATION RESULT
To check the response of proposed filter we have used Filter
Design and Analysis Tool (FDA Tool) which is a graphical
user interface (GUI) available in the Signal Processing
Toolbox of MATLAB for designing and analyzing filters. It
takes the filter specifications as inputs. Table 1 shows the
specifications of an IIR low pass elliptical filter of order 6.
V. CONCLUSION
In wireless communication technology, wireless In this paper proposed a new clocking mechanism for to
communication is effective and convenient for sharing avoid correlation attack on the place of m-rule i.e. majority
information[7]. GSM is a very good example of that wireless rule used by A5/1 stream cipher. Form in different sections as
communication .But this information should be secure means follows. In section 2 description of A5/1 stream cipher is
nobody could interfere like eavesdropper. So, to protect our given. In section 3 correlation attack analysis. In section 4
information cryptography play vital role. However, for sending proposed modified structure of A5/1 key stream generator. At
information mobile station to base station there is air interface last give conclusion.
serious security threat prevention between communicating
parties[10]. Then question arise how to protect while II. DESCRIPTION OF A5/1
communication. For this there is encryption algorithm use in
GSM as A5/x series. These algorithms used to encrypt voice A5/1 is a stream cipher [11] provide key stream so called
and data over GSM link. The various different key stream generator. Made up of three linear feedback shift
implementations A5/0 has no encryption, A5/1 is strong register of length 19, 22, 23 used to generate sequence of
version, A5/2 weaker version targeting market outside Europe binary bits. GSM conversations are in form of frames as length
and at last A5/3 based in block ciphering strong version of 228 bit i.e. 114 for each direction for encrypt/ decrypt
created as part of 3rd generation partnership project (3GPP)[5]. data[4]. A5/1 initialize 64 bit key together with 22 frame
number publicly known. It used linear feedback shift registers
as R1, R2 and R3 to correspondence tap as (13, 16, 17, 18)
In this paper we explore about A5/1 that is also strong
contained by R1, (20, 21) by R2 and (7, 20, 21, 22)
version but exhibit weaker due attack happened on it. A5/1
respectively. Each clocked using rule called as majority rule.
based on stream ciphering[1] that is very fast doing bit by bit Clocking tap considered as A, B, C to correspondence
XOR and getting result. If we take simple encryption we could registers R1, R2 and R3 as R1 (8), R2 (10) and R310). Before
perform by take a plaintext bit XOR with any key that keep register is clocked feedback is calculated by using linear
secret so choose any whatever got that is called cipher text and operator i.e. XOR. The one bit shift to right (discarding the
reverse process is called decryption. rightmost) bit produced by feedback location store leftmost
locations of linear feedback shift registers. This cycle goes up
A5/1 made up using linear feedback shift register. Initial to 64 times. This done on basis of clocking rule that register
value of LFSR is called seed because operation of the register clocked irregularly according to majority rule. Majority rule
is deterministic stream values produced by registers is uses on three clocking bits of LFSR’s A, B, C. Among
clocking bit if one or more is 0, then m=0 whose value match
with m that register will clock. Similarly, if one or more
1
clocking bits is 1, then whose values match with m that will can examine the state of LFSRs mean some of LFSRs bits are
clock. At each clocking LFSR generate one bit which related to the output sequence generated. Linear complexity
combined by linear function. In A5/1, the probability of an should be longer for more security but does not indicate for
individual LFSR being clocked is 3/4. The clocking bit secure one. And further correlation immunity, higher linear
generates bit m defined as using Boolean algebra (A.B (+) B.C complexity by combining the output sequence more non linear
(+) A.C) as shown in figure 1 structure of A5/1 stream cipher manner. So, insecurity arises that output of the combining
and possible cases refer to table 1. function is correlated with output of individual LFSRs due this
correlation attack exist. If observing the output sequence
obtains information about internal state output. Using that
could determine other internal states by this entire stream
cipher generator is broken. Now, come on main point that
A5/1 stream cipher is also using three LFSRs and clocking
taps look strong but cryptographically weak shown by attacks.
In the output of generator equal two output of LFSR2 75%
times, if feedback is known, we can determine the initial bit of
the LFSR2 and generate output sequence then count number of
times LFSR2 output is agrees with output of generator. If two
sequences will agree about 50% times then guess wrong if
agree 75% then guessed right. Similarly, the output sequence
agrees 75% times with LFSR3 using correlation. We could
easily cracked by known plaintext attack.
Figure 1: Structure of A5/1 stream cipher IV. MODIFIED A5/1 STREAM CIPHER
Table 1: Possible cases of A5/1 register to clocked
The new clock control mechanism is proposed to overcome
Clocking bit Clocking bit Register(s) problem of getting probability of 3/4 explained. By proposed
(A,B,C) generated using Clocked concept probability become 1/2 by using modified clock
m-rule controlling unit. Consider three bits as A, B and C of
(0,0,0) 0 R1,R2,R3 respective registers R1, R2 and R3 called as clocking bits .The
structure of proposed A5/ 1 stream cipher as shown in figure 2.
(0,0,1) 0 R1,R2
(0,1,0) 0 R1,R3
(0,1,1) 1 R2,R3
(1,0,0) 0 R2,R3
(1,0,1) 1 R1,R3
(1,1,0) 1 R1,R2
(1,1,1) 1 R1,R2,R3
2
A. Clocking controlling unit V. CONCLUSION
Note, that if compare the possible outcomes to clock [5] A Practical-Time Attack on the A5/3 Cryptosystem Used in Third
registers in table 1 and 2. In table 1 each cycle at least 2 Generation GSM TelephonyOrr Dunkelman, Nathan Keller, and Adi
Shamir.
registers are shifted with 75% probability. This reduced by
50% shown in table 2 where at least one registers shifted. The [6] A précis of the new attacks on GSM encryption Greg Rose,
register bit that got output which is unrelated to state of LFSRs QUALCOMM Australia.
for 6 clock cycles.
3
[7] Communication security in gsm networks petr bouška, martin
drahanský faculty of information technology, brno university of
technology.
[12] http://csrc.nist.gov/groups/ST/toolkit/rng/documentation_software.ht
ml.
4
CONFERENCE ON “SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM (SPRTOS)” MARCH 26-27 2011
Abstract-- Most wireless communication systems for indoor H.B.T.I., Kanpur-24, U.P., (email: kraj_biet@yahoo.com)
positioning and tracking may suffer from different error
sources, including process errors and measurement errors. Information is usually obtained in the form of measurements
State estimation algorithm deals with recovering some desired and the measurements are related to the position of the object
state variables of a dynamic system from available noisy that can be formulated by Bayesian filtering theory. Since
measurements. A correct and accurate state estimation of Kalman filter theory is only applicable for linear systems and
linear or non-linear system can be improved by selecting the
in practice almost all practical dynamic systems (relation
proper estimation technique. Kalman filter algorithms are
often used technique that provides linear, unbiased and between the state and the measurements) are nonlinear. The
minimum variance estimates of an unknown state vectors for most celebrated and widely used nonlinear filtering algorithm
non-linear systems. In this paper we tried to bridge the gap is the extended Kalman filter (EKF), which is essentially a
between the Kalman Filter and its variant i.e. Extended suboptimal nonlinear filter. The key idea of the EKF is using
Kalman Filter (EKF) with their algorithm and performance in the linearized dynamic model to calculate the covariance and
the state estimation of the car moving with a constant force.
gain matrices of the filter. The Kalman filter (KF) and the
Index Terms-- Stochastic filtering, Bayesian filtering, EKF are all widely used in many engineering areas, such as
Adaptive filter, Unscented transform, Digital filters. aerospace, chemical and mechanical engineering. However, it
is well known that both the KF and EKF are not robust against
1. INTRODUCTION modelling uncertainties and disturbances.
SIP0107-1
CONFERENCE ON “SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM (SPRTOS)” MARCH 26-27 2011
In the presence of a random disturbances (white noise) or The Kalman filter is an optimal observer in the sense that it
when few system parameters change, the use of an adaptive produces unbiased and minimum variance estimates of the
and optimal controller turns out necessary [3], [4]. In this states of the system i.e. the expected value of the error
between the filter’s estimate and the true state of the system is
paper we are choosing to use Kalman filter as a controller.
zero and the expected value of the squared error between the
This technique is based on the theory of Kalman's filtering [5], real and estimated states is minimum.
it transforms Kalman's filter into a Kalman controller. 2.1 WEINER FILTER
Simulation results show that the state estimation performance
provided by the robust Kalman filter is higher than that Weiner was as a pioneer in the study of stochastic and noise
provided by the EKF. processes [15] who proposed a class of optimum discrete time
filters during the 1940s and published in 1949. Its purpose is
to reduce the amount of noise present in a signal by
Recently, results on some new types of linear uncertain comparison with an estimation of the desired noiseless signal.
discrete-time systems have also been given. Yang, Wang and The Wiener process (often called as Brownian motion) is one
Hung presented a design approach of a robust Kalman filter of the best known continuous-time stochastic process with
for linear discrete time-varying systems with multiplicative stationary statistical independence increments. The Wiener
noises [7]. Since the covariance matrices of the noises cannot filter uses the mean squared error as a cost function and
be known precisely, Dong and You derived a finite-horizon steepest-descent algorithm for recursively updating the
weights.
robust Kalman filter for linear time-varying systems with
norm-bounded uncertainties in the state matrix, the output The main problem with this algorithm is the requirement of
matrix and the covariance matrices of noises [8]. Based on the known input vector correlation matrix and cross correlation
techniques Zhu, Soh and Xie gave a robust Kalman filter vector between the input and the desired response and
design approach for the linear discretetime systems with unfortunately both are unknown.
measurement delay and norm-bounded uncertainty in the state
matrix [9]. Hounkpevi and Yaz proposed a robust Kalman 2.2 DISCRET KALMAN FILTER
filter for linear discrete-time systems with sensor failures and A state estimate is represented by a probability density
norm-bounded uncertainty in the state matrix [10]. functions (pdf) and the description of full pdf is required for
the optimal (Bayesian) solution but the form of pdf is not
Currently many systems successfully using the Kalman filter restricted and hence it can’t be represented using finite number
algorithms in different diverse areas such as the processing of of parameter [14], [16]. To solve this problem R.E. Kalman
signals in mobile robot, GPS position based on neural network designed an optimal state estimator for linear estimation of the
[11], aerospace tracking [12], [13], underwater sonar and the dynamic systems using state space concept [17], that has the
statistical control of quality. ability to adapt itself to non-stationary environments. It
supports estimations of past, present, and even future states,
In this paper the state of the car has been estimated through and it can do so even when the precise nature of the modeled
Kalman filter and Extended Kalman filter which is moving system is unknown. A set of mathematical equations provides
with a constant force. Dynamic model of the system is very an efficient computational (recursive) means to estimate the
much nonlinear and hence firstly we linearized the nonlinear state of a process, in such a way that minimizes the mean of
system equations using EKF algorithm, secondly we perform the squared error.
the time domain analysis of the dynamic model using
sampling time 10 millisec. The filter is very powerful in several aspects:
SIP0107-2
CONFERENCE ON “SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM (SPRTOS)” MARCH 26-27 2011
… (2)
… (3)
SIP0107-3
CONFERENCE ON “SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM (SPRTOS)” MARCH 26-27 2011
Figure 1. Recursive Updation Procedure for Discrete Kalman Filter (1) Linearized transformations are only reliable if the error
propagation is well approximated by a linear function. If this
2.3 EXTENDED KALMAN FILTER (EKF) condition does not hold, then the linearized approximation
would be extremely poor and hence it causes its estimates to
The extended Kalman filter (EKF) is the nonlinear version of diverge altogether.
the Kalman filter that linearizes the non-linear measurement
and state update functions at the prior mean of the current time (2) The EKF does not guarantee unbiased estimates and also
step and the posterior mean of the previous time step, calculate error covariance matrices that do not necessarily
respectively. represents the true error covariance.
Time Update: We consider a dynamic system i.e. a car with a constant force
moving with a constant acceleration and follow a linear/ non-
(1) Project the state ahead : linear motion. To estimate the state i.e. position, the
continuous time state space model is discretised with a 10
millisec sampling time.
… (4)
3.1 MATHEMATICAL MODELING OF SYSTEM
(2) Project the error covariance ahead:
In a dynamic system, the values of the output signals depend
on both the the past behavior of the system and also on
… (5) instantaneous values of its input signals. The output value at a
given time t can be computed using the measured values of
The time update equations project the state and covariance output at previous two time instants and the input value at a
estimates from the previous time step k-1 to the current time previous time instant.
step k.
Measurement Update:
… (6)
… (7)
Figure 2. Free body diagram of car-model
(3) Update the error covariance:
Horizontal and Vertical motion is govern by the following
… (8) equations:
SIP0107-4
CONFERENCE ON “SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM (SPRTOS)” MARCH 26-27 2011
0.15
Car position
0.1
0.05
-0.05
Figure 2 illustrates the modeled characteristics of the car. The
front and rear suspension are modeled as spring/damper
-0.1
systems. This model include damper nonlinearities such as 0 10 20 30 40 50 60 70 80 90 100
velocity-dependent damping. The vehicle body has pitch and Time (sec)
bounce degrees of freedom. They are represented in the model Figure 3. Comparison of True, Measured & Estimated position with KF
by four states: vertical displacement, vertical velocity, pitch
angular displacement, and pitch angular velocity. The front
difference between true position and measured position
suspension influences the bounce (i.e. vertical degree of 0.1
difference between true position and estimated position
freedom).
4. SIMULATION RESULTS 0
Time True Measured Estimated Error (true - Error (true - Time True Measured Estimated Error (true - Error (true -
(sec) state state (mt) state measured estimated (sec) state state (mt) state measured estimated
(mt) (mt) position) position) (mt) (mt) position) position)
(mt) (mt) (mt) (mt)
SIP0107-5
CONFERENCE ON “SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM (SPRTOS)” MARCH 26-27 2011
1 0.0012 0.0181 0.0010 -0.0169 0.0002 make future state and measurement predictions more accurate
30 0.0186 0.0251 0.022 -0.0065 -0.0034 and therefore improving the accuracy of target positioning and
60 0.746 0.744 0.731 0.0020 0.015
tracking. Further efforts in kalman filter will lead to improved
estimation of signal arrival time and more accurate target
90 0.147 0.189 0.148 -0.042 -0.0010
positioning and tracking.
100 0.1791 0.181 0.183 -0.0019 -0.0039
0.3 This work can be used as theoretical base for further studies in
true position a number of different directions such as tracking system, to
0.25
measured position achieve high computational speed for multi-dimensional state
estimated position
estimation.
0.2
REFERENCES
Car position
0.15
[1] Kalman, R. E.,” A new approach to linear filtering and prediction
problems”, Journal of Basic Engineering Transactions of the
0.1 ASME, Series D, Vol. 82, No. 1, pp. 35-45, 0021- 9223, 1960.
[2] Kalman, R. E. & Bucy R. S.,” New results in linear filtering and
prediction problems”, Journal of Basic Engineering Transactions
0.05
of the ASME, Series D, Vol. 83, No. 3, pp. 95- 108, 0021-9223,
1961.
0 [3] Mudi Rajani, K. & Nikhil Pal, R. ,”A robust self-tuning scheme for
PI and PD type fuzzy controllers”, IEEE transactions on fuzzy
systems, Vol. 7, No. 1, ( February 1999) 2-16, 1999.
-0.05 [4] Zdzislaw, B. ,”Modern control theory”, Springer-Verlag Berlin
0 10 20 30 40 50 60 70 80 90 100
Time (sec) [5] Eubank, R. L.,”A Kalman filter primer”, Taylor & Francis Group,
2006.
Figure 5. Comparison of True, Measured & Estimated position with EKF [6] D. L. Alspach, and H. W. Sorenson, “Nonlinear Baysian
estimation using Gaussian sum approximations,” IEEE Trans.
Automatic Cont., vol. 17, no. 4, pp. 439-448, Aug. 1972.
0.1
difference between true position and measured position [7] Yang, F.; Wang, Z. & Hung, Y. S.,” Robust Kalman filtering for
difference between true position and estimated position discrete time-varying uncertain systems with multiplicative
noises”, IEEE Transactions on Automatic Control, Vol. 47, No. 7,
pp.1179-1183, 0018-9286, 2002.
0.05
[8] Dong, Z. & You, Z. ,” Finite-horizon robust Kalman filtering for
discrete time-varying systems with uncertain-covariance white
noises”, IEEE Signal Processing Letters, Vol.13, No. 8, pp. 493-
496, 1070-9908, 2006.
[9] Zhu, X.; Soh, Y. C. & Xie, L,” Design and analysis of discete-time
error
0
robust Kalman filters. Automatica”, Vol. 38, pp. 1069-1077, 0005-
1098, 2002.
[10] Hounkpevi, F. O. & Yaz, E. E.,” Robust minimum variance linear
-0.05
state estimators for multiple sensors with different failure rates”,
Automatica, Vol. 43, pp. 1274-1280, 0005-1098, 2007.
[11] Wei Wu and Wei Min, “The mobile robot GPS position based on
neural network adaptive Kalman filter”, International Conference
-0.1
on Computational Intelligence and Natural Computing, IEEE, pp.
26-29, 2009
[12] Y. Bar-Shalom and Li X.R., Estimation and Tracking: Principles,
0 10 20 30 40 50 60 70 80 90 100
Techniques, and Software, Artech House, 1993.
Time (sec)
[13] Y. Bar Shalom, X.-R. Li, and T. Kirubarajan, Estimation With
Figure 6. Comparison of Error between true, measured & estimated position Applications to Tracking and Navigation. New York: Wiley, 2001.
[14] Y. C. Ho and R. C. K. Lee, “A Bayesian approach to problems in
value with EKF
stochastic estimation and control,” IEEE Trans. Automatic Cont.,
vol. AC-9, pp. 333-339, Oct. 1964.
[15] P. Maybeck, Stochastic Models, Estimation and Control. New
5. CONCLUSION
York: Academic Press, vol. I, 1979.
[16] S. Haykin, Adaptive Filter Theory. Prentice-Hall, Inc., 1996.
In this paper, a detailed overview of Kalman filter and [17] H. J. Kushner, “Approximations to optimal nonlinear filters,” IEEE
Extended Kalman Filter to improve inadequate statistical Trans. Automatic Cont., AC-12(5), pp. 546-556, Oct. 1967.
models, nonlinearities in the measurement is presented. [18] Sawaragi, Yoshikazu and Katayama, Tohru, “Performance Loss
And Design Method of Kalman Filters For Discrete-time Linear
Simulation results show that the performance of the Extended Systems With Uncertainties”, International Journal of Control,
Kalman filter is higher than that of the Kalman filter and 12:1, 163 — 172, 1970.
conclude that the Kalman filter-based scheme is capable of
effectively estimating the position errors of moving target to
SIP0107-6
CONFERENCE ON “SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM (SPRTOS)” MARCH 26-27 2011
SIP0107-7
CONFERENCE ON “SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM (SPRTOS)” MARCH 26-
27 2011
SIP0108-1
CONFERENCE ON “SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM (SPRTOS)” MARCH 26-
27 2011
SIP0108-10
CONFERENCE ON “SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM (SPRTOS)” MARCH 26-27
2011
SIP0109-1
CONFERENCE ON “SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM (SPRTOS)” MARCH 26-27
2011
generation through the walking steps of film, h is the total transducer height, t is
human being is reviewed and presented the film thickness, and N is the number of
here. The sole of shoe could be constructed film layers in the transducer [6]. The
of piezoelectric materials and every step a piezoelectric polymer power generator and
person took would begin to generate conversion circuit provide over 2 mW of
electricity. This smart mechanism of regulated power at 4.5 V. The transducer is
generation of electricity through shoe sole low cost, ecological, and soft suitable
could then be stored in a battery or used shock absorption inside heel. The design
immediately in personal electronics of electromagnetic generators that can be
devices. integrated within shoe soles is described.
In this way, parasitic energy expended by a
II. LITERATURE REVIEW person while walking can be tapped and
The most common methodology of used to power portable electronic
shoe power generators include dielectric equipment. Designs are based on discrete
elastomers [1] and piezoelectric ceramics permanent magnets and copper wire coils,
[2,3]. The elastomer demonstrated and it is intended to improve performance
significant power output but it required a by applying micro-fabrication
large bias (2 kV) and the heavy technologies. The proposed approach is
construction is likely to negatively affect good in an aspect that voltage level are
the user experience. The power harvesting comparable with piezoelectric generator
shoe reported in [2] and [3] uses however, its complex circuitry is a
piezoelectric ceramic bi-morphs for power constraint. Vibration based generators
harvesting. As piezoelectric materials were using three types of electromechanical
employed, no bias voltage was needed. transducers: electromagnetic [8],
However, a complex PZT/metal bi-morph electrostatic [9], and piezoelectric [10-11]
was required and the power output after have also been presented.
dc/dc conversion and regulation was low In all of these methods, vibrations consist
(<1 mW) [2]. The schematic of of a traveling wave in or on a solid
microstructured piezoelectric polymer film material, and it is often not possible to find
that is used for the power generation as a relative movement within the reach of a
shown in below figure1. small generator. Therefore, one has to
couple the vibration movement to the
generator by means of the inertia of a
seismic mass.
SIP0109-2
CONFERENCE ON “SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM (SPRTOS)” MARCH 26-27
2011
SIP0109-3
CONFERENCE ON “SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM (SPRTOS)” MARCH 26-27
2011
SIP0109-4
CONFERENCE ON ―SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM (SPRTOS)‖ MARCH 26-27 2011
SIP0110-1
CONFERENCE ON ―SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM (SPRTOS)‖ MARCH 26-27 2011
xx [ m] x[n m ]x[n]
n 0 -(6)
II. WINDOW FUNCTIONS
These are the window functions used for spectrum and The sequence x(a) is windowed and autocorrelated and psd
cepstrum analysis.
is calculated by -
[1]
MBH are used for the estimation techniques. Modified
Bartlett-Hanning (MBH) window is extended to the form [1] N 1
jn
xx (f) xx [m]e . –(7)
w(t,α)=α-(4α-2)|t|+(1-α)cos2πt; |t| ≤0.5, 0.5≤α <1.88 -(1) n 0
Blackman window:
IV. CEPSTRUM ANALYSIS
W(n)=.42-.50cos((2πn)/(M-1))+.08cos((4πn)/(M-1)) -(2)
N n 0 Log
-
(5)
TABLE-I(bandwidth of
periodogram[4])
Smooth cepstrum
Fig.2(Welch method)
SIP0110-3
CONFERENCE ON ―SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM (SPRTOS)‖ MARCH 26-27 2011
TABLE-II(bandwidth of
welch[4])
For cepstrum analysis we have taken the voice
samples of two speakers of duration 25 ms each.
And after that we have passed the voice samples
through the low pass filter of cut-off frequency
0.15*pi. We have used low pass filter here to
eliminate the high frequency additive noise and
analyzed the cepstrum of the filtered voice samples
for pitch detection.
Fig.4(Cepstrum Analysis)
VII. CONCLUSION
The aim is to detect and estimate the signal [3]. For the
identification of two different frequency components in a
presence of noise different threshold levels has been taken
starting from -3dB [4]. In periodogram method (Fig.1) -
3dB,-6dB and -15dB of threshold is taken and it is
observed from the results (TABLE-I) that at -3dB two
sinusoidal peaks are not detected and beyond -15dB noise
is detected. Same is the case with autocorrelation PSD
method that at -3db (TABLE-III) no peaks are detected but
we can detect our signals up to -20dB in comparison to
peridogram method. But in the case of Welch method
(TABLE-II), (Fig.2) detection at -3dB is possible i.e. the
minimum threshold to detect the signal. As the Fourier
transform of sinusoidal signal is an impulse so in the Welch
method (TABLE-II) using MBH window, side lobe levels
are more suppressed and width of main become
narrower(tending to an impulse Fig 2) than Hamming and
Blackman windows .
SIP0110-4
CONFERENCE ON ―SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM (SPRTOS)‖ MARCH 26-27 2011
Taking ―HELLO‖ as an iterative voice sample for [5] The Cepstrum Guide: A Guide to Processing by
two speakers, we have estimated the average pitch. It is Donald G. Childers,David P. Skinner and Robert C.
observed that in cepstrum (fig.4) error in pitch detection is Kemerait, PROCEEDINGS OF THE IEEE, VOL. 65,
more than smooth cepstrum (fig. 5). Now, considering 0.4 NO. 10, OCTOBER 1977, pp 1428-1443.
as threshold level we see that the periodicity in smooth
cepstrum is more distinguished and hence pith can easily be [6] Signal Modeling Techniques in Speech Recognition by
detected. This can be further used in voice recognition JOSEPH W. PICONE, SENIOR MEMBER, IEEE,
systems in order to minimize false acceptance rate (FAR) PROCEEDINGS OF THE IEEE, VOL. 81, NO. 9,
and false rejection rate (FRR). SEPTEMBER 1993, pp 1215-1247.
SIP0110-5
CONFERENCE ON ―SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM (SPRTOS)‖ MARCH 26-27 2011
[9] http://en.wikipedia.org/wiki/Cepstrum
[11] http://en.wikipedia.org/wiki/Human_voice
SIP0110-6
1
A 3D APPROACH TO FACE-EXPRESSION
RECOGNITION
Akshay Gupta , Ananya Misra , Hridesh Verma , Garima Chandel-Member IEEE
ABSTRACT: Face recognition has been in expression has become a big challenge in 3D face
research for the last couple of decades. With the recognition systems. In this paper, we propose an
advancement of 3D imaging technology, 3D face approach to tackle this problem, through the
integration of expression recognition and face
recognition emerges as an alternative to overcome
recognition in a system.
the problems inherent to 2D face recognition, i.e.
sensitivity to illumination conditions and positions II. EXPRESSION AND FACE
of a subject. But 3D face recognition still needs to RECOGNITION
tackle the problem of deformation of facial
geometry that results from the expression changes From the psychological point of view, it is still not
of a subject. To deal with this issue, a 3D face known whether facial expression recognition
information aids the recognition of faces by human
recognition framework is proposed in this paper.
beings. It is found that people are slower in
It is combination of three subsystems: expression identifying happy and angry faces than they are in
recognition system, expressional face recognition identifying faces with neutral expression.
system and neutral face recognition system. A The proposed framework involves an initial
system for the recognition of faces with one type assessment of the expression of an unknown face,
of expression (smile) and neutral faces was and uses that assessment to assist the progress of its
recognition. The incoming 3D range image is
implemented and tested on a database of 30
processed by an expression recognition system to
subjects. The results proved the feasibility of this find the most appropriate expression label for it. The
framework. expression labels include the six prototypical
expressions of the faces, which are happiness,
Index Terms- face recognition, databases, neutral sadness, anger, fear, surprise and disgust, plus the
face, smiling face, image acquisition. neutral expression. According to different
expressions, a matching face recognition system is
I. INTRODUCTION then applied. If the expression is recognized as
neutral, then the incoming 3D range image is directly
Mostly the face recognition attempts that have been passed to the neutral expression face recognition
made use of 2D intensity images as the data format system, which uses the features of the probe image to
for processing. In spite of the success reached by 2D directly match those of the gallery images, which are
recognition methods, certain problems still exist. 2D all neutral, to get the closest match. If the expression
face images not only depend on the face of a subject, found is not neutral, then for each of the six
but also depend on imaging factors, such as the expressions, a separate face recognition subsystem
environmental illumination and the orientation of the should be used. The system will find the right face
subject. These variable factors can become the cause through modelling the variations of the face features
of the failure of the 2D face recognition system. With between the neutral face and the face with
the advancement of 3D imaging technology, more expression. Figure 1 shows a simplified version of
attention is given to 3D face recognition, which is this framework. This simplified diagram only deals
robust with respect to illumination variation and with the smiling expression, which is the most
posing orientation. In [1], Bowyer et al. provide a commonly displayed by people publicly.
survey of 3D face recognition technology. Mostly the
3D face recognition systems treat the 3D face surface III. DATA ACQUISITION AND
as a rigid surface. But actually, the face surface is PROCESSING
deformed by different expressions of the subject,
which causes the failure of the systems that treat the To test the approach proposed in this model, a
face as a rigid surface. The involvement of facial database, which includes 30 subjects, was built. In
2
this database, we test the different processing of the generated by contraction of the zygomatic major
two most common expressions, i.e., smiling versus muscle. This muscle lifts the corner of the mouth
neutral. Each subject participated in two sessions of obliquely upwards and laterally, producing a
the data acquisition process, which took place in two
characteristic “smiling expression”. So, the most
different days. In each session, two 3D scans were
acquired with a Polhemus Fastscan scanner. One was distinctive features associated with the smile are the
a neutral expression; the other was a happy (smiling) bulging of the cheek muscle and the uplift of the
expression. The resulting database contains 60 3D corner of the mouth, as shown in Figure 3.
neutral scans and 60 3D smiling scans of 30 subjects. The following steps are followed to extract six
representative features for the smiling expression:-
Figure1- Simplified framework of 3D face recognition Figure 3- Illustration of features of a smiling face versus a
neutral face
The left image in Figure 2 shows an example of the
2. The first feature is the width of the mouth, BE,
3D scans obtained using this scanner, the right image
normalized by the length of AD. Obviously, while
is the 2.5D range image used in the algorithm.
smiling the mouth becomes wider. The first feature
is represented by mw.
3. The second feature is the depth of the mouth (The
difference between the Z coordinates of point B
point C and point E point C) normalized by the
height of the nose to capture the fact that the
smiling expression pulls back the mouth. This
second feature is represented by md.
4. The third feature is the uplift of the corner of the
mouth, compared with the middle of the lower lip
d1 and d2, as shown in the figure, normalized by
the difference of the Y coordinates of point A point
Figure 2- 3D surface (left) and a mesh plot of the converted
range image (right) B and point D point E, respectively and
represented by lc.
IV. EXPRESSION RECOGNITION 5. The fourth feature is the angle of line AB and line
DE with the central vertical profile, represented by
The face expression is a basic mode of nonverbal ag.
communication among people. In [5], Ekman and 6. The last two features are extracted from the
Friesen proposed six primary emotions. Each semicircular areas shown, which are defined by
possesses a distinctive content together with a unique using line AB and line DE as diameters. The
facial expression. These six emotions are happiness, histograms of the range (Z coordinates) of all the
sadness, fear, disgust, surprise and anger. Together points within these two semicircles are calculated.
with the neutral expression, they also form the seven
basic prototypical facial expressions. Figure 4 shows the histograms for the smiling and
In our experiment, we aim to recognize social the neutral faces of the subject in Figure 3. The two
smiles, which were posed by each subject. Smiling is figures in the first row are the histograms of the range
3
values for the left cheek and right cheek of the pattern classification methods are applied to
neutral face image; the two figures in the second row recognize the expression of the incoming faces. The
are the histograms of the range values for the left first method used is a linear discriminant (LDA)
cheek and right cheek of the smiling face image. classifier, which seeks the best set of features to
separate the classes. The other method used is a
support vector machine (SVM).
300
200 V. 3D FACE RECOGNITION
100 Series1
0 A. Neutral face recognition
In our earlier research work, we have found that the
abcde f gh i j central vertical profile and the contour are both
discriminant features for every person. Therefore, for
neutral face recognition, the results of central vertical
200 profile matching and contour matching are combined.
The combination of the two classifiers improves the
Series1 overall performance significantly. The final similarity
0
score for the probe image is the product of ranks for
abcde f gh i j each of the two classifiers (based on the central
vertical profile and contour). The image with the
smallest score in the gallery will be chosen as the
matching face for the probe image.
300
200 B. Smiling face recognition
100 For the recognition of smiling faces we have
Series1
adopted the probabilistic subspace method proposed
0 by B. Moghaddam et al. [8,9]. It is an unsupervised
abcde f gh i j technique for visual learning, which is based on
density estimation in high dimensional spaces using
Eigen decomposition. Using the probabilistic
subspace method, a multi-class classification problem
150 can be converted into a binary classification problem.
100 In the experiment for smiling face recognition,
50 because of the limited number of subjects (30), the
Series1 central vertical profile and the contour are not used
0 directly as vectors in a high dimensional subspace.
ab c de f gh i j Instead, they are down sampled to a dimension of 17
to be used. The dimension of difference in feature
space is set to be 10, which contains approximately
Figure 4- Histogram of range of cheeks (L &R) for 97% of the total variance. The dimension of
neutral (top row), and smiling (bottom row) face.
difference from feature space is 7.
From the above figures, we can see that the range In this case also, the results of central vertical
histograms of the neutral and smiling expressions are profile matching and contour matching are combined,
different. The smiling face tends to have large values improving the overall performance. The final
at the high end of the histogram because of the bulge similarity score for the probe image is the product of
of the cheek muscle. On the other hand, a neutral face ranks for each of the two classifiers. The image with
has large values at the low end of the histogram the smallest score in the gallery will be chosen as the
distribution. Therefore two features can be obtained matching face for the probe image.
from the histogram.
One is called the ‘histogram ratio’, represented by VI. EXPERIMENTS AND RESULTS
hr, the other is called the ‘histogram maximum’,
represented by hm. One gallery and three probe databases were used
for evaluation. The gallery database has 30 neutral
ℎ6 + ℎ7 + ℎ8 + ℎ9 + ℎ10 faces, one for each subject, recorded in the first data
ℎ = acquisition session. Three probe sets are formed as
ℎ1 + ℎ2 + ℎ3 + ℎ4 + ℎ5
follows: Probe set 1: 30 neutral faces acquired in the
hm = i; i = arg {max (h (i))} second session.
Probe set 2: 30 smiling faces acquired in the second
After the six features have been extracted, this session.
becomes a general classification problem. Two Probe set 3: 60 faces, (probe set 1 and probe set 2).
4
Experiment 1: Testing the expression recognition On the other hand, if the incoming faces are
module smiling, then the neutral face recognition algorithm
The leave-one-outout cross validation method is used does not
to test thee expression recognition classifier. Every These experiments emulate a realistic situation in
time, the faces collected from 29 subjects in both data which a mixture of neutral and smiling faces (probe
acquisition sessions are used to train the classifier set 3) must be perform well, only 57% rank one
and the four faces of the remaining subject collected recognition rate is obtained. (Rankone means only
in both sessions are used to test the classifier. Two the face which scores highest is selected from the
classifiers are used. One is the linear discriminant gallery. Rank one recognition rate is the ratio
classifier; the other is a support vector machine between number of faces correctly recognized and
classifier. LDA tries to find the subspace that best the number of probe faces. Rank three ree means three
discriminates different classes by maximizing the highest scored faces instead of one face are selected.)
between class scatter matrix, while minimizing the In contrast, when the smiling face recognition
within-class
class scatter matrix in the projective subspace. algorithm is used to deal with smiling faces, the
Support vector machine is a relatively new recognition rate can be as high as 80%.
technology for classification. It relies on pre- pre
processing the data to represent patterns in a high Experiment 3: Testing a practical scenario
dimension, typically much higher than the original
feature space. With an appropriate nonlinear mapping These
ese experiments emulate a realistic situation in
to a sufficiently high dimension, data from two which a mixture of neutral and smiling faces (probe
categories can always be separated by a hyper plane. set 3) must be recognized. Sub experiment 1
investigates the performance obtained if the
Table 1- expression recognition results expression recognition front end is bypassed, and the
recognition of all the probe faces is attempted with
Method LDA SVM
Expression recognition rate 90.8 92.5 the neutral face recognition module alone. The last
two sub experiments implement the full framework
shown in Figure 1. In 3.2 the expression recognition
Experiment 2: Testing the neutral and smiling is performed with the linear discriminant
discrim classifier,
recognition modules separately while inn 3.3 it is implemented through the support
vector machine approach.
In the first two sub experiments, probe faces are a. Neutral face recognition module used alone:
directly fed to the natural face recognition module. In probe set 3 is used.
the third sub experiment, the leave-one one-out cross b. Integratedd expression and face recognitio
recognition:
validation is used to verify the performance of the probe set 3 is used. (Linear discriminant
smiling face recognition module. classifier for expression recognition.)
recognitio
c. Integrated expression and face recognition:
a. Neutral face recognition: probe set
1.(neutral face recognition module used.) probe set 3 is used.(support vector machine
b. Natural face recognition: probe set 2(neutral for expression recognition.)
face recognition module used.) It can been seen in Figure 6 that if the incoming
c. Smiling face recognition: probe pro set faces include both neutral faces and smiling faces,
2(smiling face recognition module used). the recognition rate can be improved about 10
percent by using the integrated framework proposed
From Figure 5, it can be seen that when the here.
incoming faces are all neutral, the algorithm which
treats all the faces as neutral achieves a very high CONCLUSION
recognition rate.
1.5 The work reported in this paper represents an
rank 1 attempt to acknowledge and account for the presence
1 recognition of expression on 3D face images, towards their
rate improved identification. The method introduced here
0.5 is computationally efficient. Furthermore, this
rank 3
recognition method also yields as a secondary result the
0 information of the expression found in the faces.
rate
a b c Based on these findings we believe that the
acknowledgement of the impactact of expression on 3D
Figure 5 Results of Experiment 2(three sub-experiments)
experiments)
face recognition and the development of systems that
5
1.2
1
rank 1
0.8 recognition
0.6 rate
0.4
rank 3
0.2 recognition
0 rate
a b c
REFERENCES
[3] www.polhemus.com.
SIP0112-1
CONFERENCE ON “SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM (SPRTOS)” MARCH 26-27 2011
through solving a least squares (LS) approach. For multiple targets both [6] and
problem. The authors of [3] improve the [7] require data association. In [7], the data
performance of [2] by employing the source association is done by Bayes classifier
movement model and refining the updated which is computationally expensive. The
DOAs through a Kalman filter. The authors authors of [8] develop two computationally
of [4] update the DOA estimates of each simple methods for DOA tracking based on
time frame by solving a maximum– recursive expectation and maximization
likelihood (ML) problem of most current (REM) algorithm. These two methods apply
array output. This approach also employs a for both narrowband and wideband signals .
source movement model and refines the From [8], the first method does not work
DOA estimates through a Kalman filter as in properly when two DOAs are crossing , and
[3].The authors of [5] introduce multiple the second method requires a linear DOA
target states (MTS) to describe the target motion model, restricting DOA tracks to
motion ,and the DOA tracking is only straight lines.
implemented through updating the MTS by
maximizing the likelihood function of the Recently,a statistical property,
array output. Whether by LS or ML method, cyclostationarity, which many type of man
whether introducing MTS or other models to made signals in communications such as
describe the target motion , whether using BPSK,FSK,AM exhibit has been exploited
Kalman filter or not ,all these algorithms in DOA estimation[10]-[12].By exploiting
implement the DOA tracking in a way that cyclostationarity, interference and noise that
the order of the estimated DOAs for do not share the same cycle frequency as the
different times or time frames is maintained desired signals or do not exhibit
, thus data association is avoided. Therefore, cyclostationarity can be suppressed ,thus
they are more computationally efficient than performance of DOA estimation is improved
the methods requiring the data association. when the DOA of interference is close to
DOA of desired signal. The
All the above methods are applicable to Cyclostationarity could be exploited to
narrowband signals and they would fail for improve performance of DOA tracking. All
wideband signals .Wideband signals are the DOA tracking algorithms discussed
becoming more and more common previously [1]-[7] assume that the signals
nowdays. Therefore, research work on are stationary but not cyclostationary .Here
developing DOA tracking algorithms that ,a new signal selective DOA tracking
work for wideband sources has been carried algorithm for wideband multiple moving
out[6]-[8].The authors of [6] use focusing sources by exploiting the cyclostationarity
matrices to align steering vectors of different of the signals is proposed .In this algorithm ,
frequency bins to carrier frequency so that the signals emitted by moving sources can
wideband signals can be treated the same be either narrowband or wideband
way as narrowband signals in estimating the cyclostationary. Our algorithm assumes that
DOAs by multiple signal DOAs in each time frame are fixed and
classification(MUSIC)[9].When new data tracks the DOA changes from frame to
arrive ,[6] first updates the focusing matrices frame by exploiting the difference of
and then applies MUSIC to obtain new averaged cyclic cross correlation of the
estimated DOAs. In [7], the authors estimate array output. DOA tracking is initiated by
the DOAs of each time frame by an ML applying once a wideband DOA estimation
SIP0112-9
CONFERENCE ON “SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM (SPRTOS)” MARCH 26-27 2011
SIP0112-9
CONFERENCE ON “SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM (SPRTOS)” MARCH 26-27 2011
deal with the data samples collected during a we can obtain N-1 cross-cyclic correlations
time frame. estimated at the kth time frame,
rαsisj (τ,k)= ∫k si(t + τ/2) sj*(t- τ/2) )e-j2παtdt rαz1zn (τ,k) =∫kz1(t+τ/2)zn*(t- τ/2)) e-j2παtdt
(4)
α
Now let us define the following vectors and = Σi=1 I [ Σp=1 I r spsi (τ-(n-1) Δi(k),k)]. E-
j2π(fo-(α/2))(n-1)Δi(k)
matrices, (9)
SIP0112-9
CONFERENCE ON “SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM (SPRTOS)” MARCH 26-27 2011
SIP0112-9
CONFERENCE ON “SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM (SPRTOS)” MARCH 26-27 2011
filter. Our simulation shows that Kalman 2. Obtain θi^(k) by LS tracking method.
filter refinement further improves DOA Use θi^(k-1│k-1) in place of θi^(k-1).
tracking accuracy and reduces the burden of 3. Obtain Qi^(k-1) and σ2yi (k) from (39) &
selecting optimum ۸(k) in(30). (40).Use Qi^(k-1)as an approximation of
Qi^(k).
4. Calculate Pi^(k│k-1)= F Pi^(k-1│k-1)FH
Define the state of the ith(i=1,…,I) source at
+ Qi^(k).
the kth time frame as,
5. Calculate the Kalman filter gain G(k)=
Pi^(k│k-1) HH/R(k) where
xi(k) = [ θi(k) ]
R(k)= H Pi^(k│k-1) HH + σ2yi (k).
[ θi˙(k) ]
6. Update the state for the kth time frame
[θi˙˙(k)] (31)
by xi^(k│k)= xi^(k│k-1)+ G(k)( θi^(k) - H
xi^(k│k-1)).
xi(k)=Fxi(k-1)+wi(k) (32)
7. Take the first element of xi^(k│k ) as
the refined DOA estimate for the kth time
yi(k)=Hxi(k)+vi(k) (33)
frame, θi^(k│k) .
8. Prepare the next recursion by calculating
F = [ 1 T T2/2 ]
Pi^(k│k)= Pi^(k│k-1) – G(k)H Pi^(k│k-1).
[ 0 1T ]
[001] (34)
4. Simulations
E[wi(j) wiH (k)] = { Qi(k) , j=k }
{ 0, j ≠ k } for
Tracking performance versus SNR.
i=1,…,I (35)
In this simulation, three sources are assumed
to emit three wideband BPSK signals with
H=[100] (36)
raised cosine pulse shaping. Two of them
are SOI with same baud rate 20 MHz and a
ei(k)=xi^(k│k)-Fxi^(k-1│k-1) (37)
same carrier frequency 100 MHz. The other
is interference with a baud rate 6 MHz and a
εi(k)=θi^(k)–Hxi^(k│k-1) (38)
carrier frequency 80 MHz. The cycle
frequency of SOI is 20 MHz, which is
Since both process noise and measurement
assumed to be known. The two SOI are
noise are assumed to be zero mean ,their
coherent. A ULA with 7 antennas with
variance can be estimated by,
equal spacing of c/(2fo+α)= 1.36 m is used.
The subarray size is 6 for SS during
Qi^(k)=1/LΣj=k-L+1kei(j)eiH(j) (39)
initialization .The duration of each time
frame is 0.5s during which 3200 snapshots
σ2yi(k)=1/LΣj=k-L+1kεi(j)εi*(j) (40)
of data samples are obtained. The SNR of
one SOI is 1 db lower than other. The SNR
The steps to estimate DOAs for the kth time
of the interference is 5 db lower than the
frame are as follows:
higher powered SOI. To see how the
performances of the LS method and the
1. Obtain the predicted state by xi^(k│k-1)
Kalman filter method change with SNR, we
= F xi^(k-1│k-1).
SIP0112-9
CONFERENCE ON “SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM (SPRTOS)” MARCH 26-27 2011
vary the SNR of high powered SOI from -5 except that SNR for both SOI are the same
db to 15 db. and there is one more interference with a
baud rate of 6MHz and a carrier frequency
Generally , source crossing poses difficulty 100MHz.whose SNR is also 5 db lower than
for tracking algorithm. The tracking that of SOI.
algorithm fails if the estimation error is so We first assume that the SNR of the SOI is 5
large that the tracks of two crossing sources db and runs both the LS method and Kalman
are switched and lost as shown in fig 1. We filter method 40 times. We assume that SNR
define failure rate as the ratio of number of of SOI is 15 db and runs these two tracking
failed trials to the total number of trials methods both for 40 times again. We plot
,which is 40 in our estimation.Fig2 shows ensemble averages of estimated DOAs by
the failure rates of LS algorithm and Kalman the LS method when SNR is 5 db in fig4.
filter algorithm with respect to SNR.We can Three other plots for the mean of the
see with the usage of a Kalman filter,failure estimated DOAs by the LS method when
rate is lower than that with the LS method SNR is 15 db and by Kalman filter
and at and above 5 db SNR ,Kalman filter methodwhen SNR is 5 db and 15 dbare
method does not fail at all. similar and hence omitted. The comparisons
of the rms errors of the estimated DOAs by
In this simulation ,we also plot the rms error our two algorithms is illustrated in fig 5 and
of the estimated DOA in fig 3. Consider fig6 .for one SOI. It can be seen from these
aspecific value of SNR; we can calculate plots that both methods track the DOAs of
mean squared error of the estimated DOAs the SOI well with Kalman filter method
for each trial of LS algorithm or Kalman outperforming the LS method in accuracy.
filter algorithm. Then, the root of the mean
of the mse obtained through all 40 trials is
what we call rms of estimated DOAs at this
certain SNR. We should note that if the
algorithm fails to track the sources at one
trial ,the mse for that trial will be large,it is
excluded from calculating the final rms. If
we ignore this value by not considering the
failed trial ,the final rms will tend to be
smaller than true value, not reflecting the
tracking failure.From fig3 we see that
Kalman filter method performs better than
the LS method.
SIP0112-9
CONFERENCE ON “SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM (SPRTOS)” MARCH 26-27 2011
SIP0112-9
CONFERENCE ON “SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM (SPRTOS)” MARCH 26-27 2011
SIP0112-9
CONFERENCE ON “SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM (SPRTOS)” MARCH 26-27 2011
SIP0112-9
Bartlett Windowed fast computation of
discrete trigonometric transforms for real-time
data processing
Abhijit Khare, Shubham Varshney, Vikram Karwal
{khareabhijit14, shubham7502909dece}@gmail.com, vikram.karwal@jiit.ac.in
Abstract- Discrete trigonometric transforms (DTT) their powerful bandwidth reduction capability the
namely discrete cosine transform (DCT) and discrete DCT and DST algorithms are widely used for data
sine transform (DST) are widely used transforms in compression. DCT transforms a signal or image
image compression applications. Numerous fast from the spatial domain to the frequency domain,
algorithms for rapid processing of real time data exist where much of the energy lies in the lower
in theory. Windowing is a technique where a portion frequencies coefficients like Discrete Fourier
of the signal is extracted and its transform is Transform (DFT). The main advantage of the DCT
computed. These algorithms form a class of fast
over the DFT is that DCT involves only real
update transform that uses less computation as
compared to computing transform using conventional multiplications. The DCT does a better job of
definition. Different windows such as rectangular, concentrating energy into lower order coefficients
split-triangular and sinusoidal windows have been than the DFT for image data. The DCT is adopted
used in theory to sample the real time sequence and as a standard technique for image compression in
their performance compared. In this research fast JPEG and MPEG standards because of its energy
update algorithm are analytically derived that are compaction property.
capable of windowing the real time data in presence
of Bartlett window. Initially simultaneous update A portion of input signal is extracted using
algorithms are analytically derived and thereafter
windowing [6] and the transform of the windowed
algorithms capable of independently updating DCT
and DST are derived i.e. while computing the DCT contents is computed. These classes of algorithms
updated coefficients no DST coefficients are required already exist in theory and are known as fast update
and vice-versa. The analytically derived algorithms algorithms [2]. Different windows such as
are implemented in C language to test their rectangular, split-triangular, Hamming, Hanning
correctness. and Blackman windows have been used earlier to
sample the real time data and their performance
Keywords— Discrete trigonometric transform, compared [6]. In this paper we have developed
window, fast update
update algorithm in the presence of Bartlett
I. INTRODUCTION window. Initially the algorithms are derived for
simultaneous update of DCT/ DST coefficients, i.e.
we require to compute both the DCT and the DST
In the area of signal processing, transform coefficients to find the updated DCT/ DST
coding [8] provides an efficient way for coefficients. Thereafter algorithms are derived that
transmitting and storing data. The input data establish independence [1] between the DCT and
sequence is divided into suitably sized blocks and DST coefficients. These algorithms lead to easier
thereafter reversible linear transforms are implementation of the update transform as we do
performed. The transformed sequence has much not need to compute both the coefficients
lower degree of redundancy than in the original simultaneously.
signal. Karhunen-Loéve Transform (KLT) [3] has
emerged as a benchmark for Markov-1 type Section I lists the introduction of Discrete
signals. The Discrete Cosine Transform (DCT) trigonometric transforms, windowed update
[4,7] and the Discrete Sine Transform (DST) algorithms and their advantages. Section II lists the
perform quite closely to the ideal KLT and have Bartlett window and DTT definitions.
emerged as the practical alternatives to the ideal Simultaneous Bartlett windowed update algorithms
KLT. are also derived in Section II. In Section III
independent update algorithms are derived. Section
The DCT and DST have wide applications in IV includes the complexity calculations of the
signal and image processing for the purposes of derived algorithms and section V concludes the
pattern recognition, data compression, paper.
communication and several other areas [5]. Due to
II. DCT/DST TYPE-II WINDOWED 1
SIMULTANEOUS UPDATE ALGORITHMS
USING BARTLETT WINDOW
𝑓𝑤 (𝑛𝑒𝑤 ) (𝑥) = 𝑓 𝑥 + 1 𝑤 𝑥 + 1 4 𝑁
+ 𝑁 −𝑓 2
𝛿𝑥,𝑁 −1 + 𝑓 𝑁 𝛿𝑥,𝑁−1 (9)
2
+𝑓 𝑥 + 1 𝑤 𝑥 − 𝑤(𝑥 + 1)
The windowed update version of fw(x) and while performing the windowed DCT update, both
fm(x) for moving DCT/DST for Bartlett window is the coefficients of DCT and DST are required.
represented by equations (6) and (9) respectively. In
equation (6), fw(x+1) represents non-windowed 𝑟𝑘𝜋 𝑟𝑘𝜋
𝐶+ 𝑘 = 𝑐𝑜𝑠 𝐶 𝑘 + 𝑠𝑖𝑛 𝑆(𝑘)
update of fw(x) and the second term fm(new)(x) is a 𝑁 𝑁
correction factor that converts this non-windowed 𝑁−1
update of fw(x) into an update in the presence of the 2
+ 𝑃 −1 𝑘 𝑓 𝑁 + 𝑟 − 1 − 𝑥
window. Similarly in equation (9), fm(x+1) 𝑁 𝑘
𝑥=0
represents non-windowed update of fm(x) and the 2𝑥 + 1 𝑘𝜋
second term converts this into the update in the − 𝑓(𝑟 − 1 − 𝑥) 𝑐𝑜𝑠
2𝑁
presence of the window.
𝑓𝑜𝑟 𝑘 = 0, … … , 𝑁 − 1
Taking DCT-II of equation (6) and equation (9)
yields: where, C+(k) represents the updated DCT
coefficients.
𝐶𝑤 𝑛𝑒𝑤 𝑥 = 𝐶𝑤 𝑥 + 1 + 𝐶𝑚 𝑛𝑒𝑤 𝑥 (10)
Similarly the DST update equation may be derived
𝐶𝑚(𝑛𝑒𝑤 ) = 𝐶𝑚 𝑥 + 1 and is:
𝑁−1
2 4 𝑁 𝑆𝑤 𝑥 = 𝑆𝑤 𝑥 + 1 + 𝑆𝑚 𝑥 (12)
+ 𝑃 −𝑓 𝛿 𝑁 𝑛𝑒𝑤 𝑛𝑒𝑤
𝑁 𝑘 𝑁 2 𝑥, 2 −1
𝑥=0
2𝑥 + 1 𝑘𝜋 𝑆𝑚 (𝑛𝑒𝑤 ) = 𝑆𝑚 𝑥 + 1
+ 𝑓(𝑁)𝛿𝑥,𝑁−1 𝑐𝑜𝑠
2𝑁
𝑁−1
2 4 𝑁 𝑁 − 1 𝑘𝜋
Solving the above equation yields: + 𝑃 −𝑓𝑠𝑖𝑛
𝑁 𝑘𝑁 2 2𝑁
𝑥=0
𝐶𝑚(𝑛𝑒𝑤 ) = 𝐶𝑚 𝑥 + 1 𝑘𝜋
+ 𝑓(𝑁)(−1)𝑘 𝑠𝑖𝑛 (13)
2𝑁
𝑁−1 𝑁
2 4 𝑁 2( 2 − 1) + 1 𝑘𝜋
+ 𝑃 −𝑓 𝑐𝑜𝑠 𝑓𝑜𝑟 𝑘 = 0, … … , 𝑁 − 1
𝑁 𝑘𝑁 2 2𝑁
𝑥=0
Equations (12) and (13) can be used to
2(𝑁 − 1) + 1 𝑘𝜋
+ 𝑓(𝑁)𝑐𝑜𝑠 calculate the simultaneous update of the moving
2𝑁 DST for Bartlett window. Sw(x+1) is the non-
windowed DST update of fw(x) calculated using
𝐶𝑚 𝑛𝑒𝑤 = 𝐶𝑚 𝑥 + 1 DST update equation for rectangular window
which is listed below [2], and Sm(x+1) is the non-
𝑁−1 windowed updated DST of fm(x) calculated using
2 4 𝑁 𝑁 − 1 𝑘𝜋
+ 𝑃 −𝑓 𝑐𝑜𝑠 the same equation. Clearly, it can be seen that
𝑁 𝑘𝑁 2 2𝑁
𝑥=0 while performing the windowed DST update both
2(𝑁 − 1) + 1 𝑘𝜋 the coefficients of DST and DCT are required.
+ 𝑓(𝑁)𝑐𝑜𝑠
2𝑁
𝑟𝑘𝜋 𝑟𝑘𝜋
𝑆+ 𝑘 = 𝑐𝑜𝑠 𝑆 𝑘 − 𝑠𝑖𝑛 𝐶(𝑘)
Therefore, 𝑁 𝑁
𝐶𝑚 = 𝐶𝑚 𝑥 + 1 𝑁−1
𝑛𝑒𝑤 2
+ 𝑃 −1 𝑘 𝑓 𝑁 + 𝑟 − 1 − 𝑥
𝑁−1
𝑁 𝑘
𝑥=0
2 4 𝑁 𝑁 − 1 𝑘𝜋 2𝑥 + 1 𝑘𝜋
+ 𝑃 −𝑓 𝑐𝑜𝑠 − 𝑓(𝑟 − 1 − 𝑥) 𝑠𝑖𝑛
𝑁 𝑘𝑁 2 2𝑁 2𝑁
𝑥=0
𝑘𝜋
+ 𝑓(𝑁)(−1)𝑘 𝑐𝑜𝑠 (11) where, S+(k) represents the updated DST
2𝑁
coefficients.
𝑓𝑜𝑟 𝑘 = 0, … … , 𝑁 − 1
III. DCT/DST TYPE-II WINDOWED INDEPENDENT
Equations (10) and (11) can be used to UPDATE ALGORITHMS USING BARTLETT
calculate the simultaneous update of the moving WINDOW
DCT for Bartlett window. Cw(x+1) is the non-
windowed DCT update of fw(x) calculated using A. Independent Update Algorithm
DCT simultaneous update equation for rectangular
window which is listed below [2], and Cm(x+1) is Above mentioned equations (10) and (11) can
the non-windowed DCT update of fm(x) calculated be used to calculate the independent update of the
using same equation. Clearly, it can be seen that moving DCT-II for Bartlett window. Cw(x+1) is
the non-windowed DCT-II update of fw(x), using window which is listed below [2], and Sm(x+1) is
DCT independent update equation for rectangular the non-windowed DST-II update of fm(x) also
window which is listed below [2], and Cm(x+1) is calculated using the same equation.
the non-windowed DCT-II update of fm(x) also
calculated using the same equation. 𝑟𝑘𝜋
𝑆𝑤 𝑛 + 𝑟, 𝑘 = 2𝑐𝑜𝑠 𝑆 𝑛. 𝑘 − 𝑆 𝑛 − 𝑟, 𝑘
𝑁
𝑟𝑘𝜋
𝐶𝑤 𝑛 + 𝑟, 𝑘 = 2𝑐𝑜𝑠 𝐶 𝑛. 𝑘 − 𝐶 𝑛 − 𝑟, 𝑘 𝑟−1
𝑁 2 𝑟𝑘𝜋
+ 𝑃 𝑠𝑖𝑛 [𝑓 𝑛 − 𝑁 − 𝑥 − 1
𝑟−1
𝑁 𝑘 𝑁
𝑥=0
2 𝑟𝑘𝜋
+ 𝑃𝑘 𝑠𝑖𝑛 [𝑓 𝑛 − 𝑁 − 𝑥 − 1
𝑁 𝑁 2𝑥 + 1 𝑘𝜋
𝑥 =0 − −1 𝑘 𝑓(𝑛 − 𝑥 − 1)] 𝑐𝑜𝑠
2𝑁
2𝑥 + 1 𝑘𝜋
− −1 𝑘 𝑓(𝑛 − 𝑥 − 1)] 𝑠𝑖𝑛 𝑟−1
2𝑁 2 𝑟𝑘𝜋
+ 𝑃 𝑠𝑖𝑛 [ −1 𝑘 𝑓 𝑛 + 𝑟 − 𝑥 − 1
𝑟−1
𝑁 𝑘 𝑁
𝑥=0
2 𝑟𝑘𝜋
+ 𝑃 𝑠𝑖𝑛 [ −1 𝑘 𝑓 𝑛 + 𝑟 − 𝑥 − 1
𝑁 𝑘 𝑁 2𝑥 + 1 𝑘𝜋
𝑥 =0 −𝑓 𝑛 + 𝑟 − 𝑁 − 𝑥 − 1 ]𝑠𝑖𝑛
2𝑁
2𝑥 + 1 𝑘𝜋
−𝑓 𝑛 + 𝑟 − 𝑁 − 𝑥 − 1 ]𝑐𝑜𝑠 𝑟−1
2𝑁 2 𝑟𝑘𝜋
− 𝑃𝑘 𝑐𝑜𝑠 [𝑓 𝑛 − 𝑁 − 𝑥 − 1
𝑟−1
𝑁 𝑁
𝑥=0
2 𝑟𝑘𝜋 2𝑥 + 1 𝑘𝜋
− 𝑃 𝑐𝑜𝑠 [ −1 𝑘 𝑓 𝑛 − 𝑥 − 1 − −1 𝑘 𝑓 𝑛 − 𝑥 − 1 ]𝑠𝑖𝑛
𝑁 𝑘 𝑁 2𝑁
𝑥=0
2𝑥 + 1 𝑘𝜋
−𝑓 𝑛 − 𝑁 − 𝑥 − 1 ]𝑐𝑜𝑠 for k=1,......,N
2𝑁
Similarly the analogous formulae for The correction factor to calculate the
DST-II are obtained by taking DST-II of equations correct value C[f(x-1)w(x-1)] from C[f(x-1)w(x)]
(6) and (9): for DCT update algorithm, and the correct value of
S[f(x-1)w(x-1)] from S[f(x-1)w(x)] are derived here
𝑆𝑤 𝑛𝑒𝑤 𝑥 = 𝑆𝑤 𝑥 + 1 + 𝑆𝑚 𝑛𝑒𝑤 𝑥 (14) for the DST-II update algorithm.
𝑆𝑚 (𝑛𝑒𝑤 ) = 𝑆𝑚 𝑥 + 1 𝑓 𝑥 − 1 𝑤 𝑥 = 𝑓(𝑥 − 1) 𝑤(𝑥) + 𝑤(𝑥 − 1) − 𝑤(𝑥 − 1)
𝑁−1
2 4 𝑁 𝑁 − 1 𝑘𝜋 = 𝑓 𝑥 − 1 𝑤 𝑥 − 1 − 𝑓(𝑥 − 1) 𝑤(𝑥 − 1) − 𝑤(𝑥)
+ 𝑃 −𝑓
𝑠𝑖𝑛
𝑁 𝑘𝑁 2 2𝑁
𝑥=0 = 𝑓 𝑥 − 1 𝑤 𝑥 − 1 − 𝑓(𝑥 − 1)𝑚(𝑥 − 1)
𝑘𝜋
+ 𝑓(𝑁)(−1)𝑘 𝑠𝑖𝑛 (15)
2𝑁
Therefore,
𝑓𝑜𝑟 𝑘 = 0, … … , 𝑁 − 1 𝑓 𝑥 − 1 𝑤 𝑥 − 1 = 𝑓(𝑥 − 1)𝑤(𝑥)
I.INTRO
ODUCTION There are
a different schemes
s presen
nt in the markket
such ass
B
BAYER COLO
OR FILTER ARRAY
A
• Lossy comprression schemee
A Bayerr Filter color array
a usually coated
c over the • JPEG2000
sensors in these camerras to record onlyo one of the
three coolors componen nts at each pixeel location. The So now
w we have to llook the drawbbacks of preseent
resultantt image is referrred to as a CFA image. methodds.
• Encoder
• Decoder
Encoderr:
Let g(m
mk,nk)Є Φg(i,,j) for k=1,2,,3,4 be the foour
ranked candidates of sample g(i,j)
g Э(Sg(i,jj),
Sg(mu,,nu)) <= D D(Sg(i,j), Sg(mv,nv) ) ffor
1<=u<==v<=4
Fig 3: Sttructure of propposed scheme
Green Subimage
S is cooded first and the Non greenn If the directions oof g(i,j) is iddentical to thhe
Subimagge follows baased on greenn subimage as a directioons of all greenn samples in Sg(i,j), pixel (i,j)
reference and To reduuce the spectrral redundancyy, will bee considered in a homogennous region annd
the nonggreen subimaage is processeed in the coloor predictiion of g(i,j) is
differencce domain whereas
w the greeen subimage is
i
processeed in the intenssity domain as a reference foor
the coloor difference content of the nongreenn
subimagge. Both subim mages are proccessed in rasteer
i.e. {w1,w2,w3,w4}= ={1,0,0,0} Elsse the g(i,j) is in
scan seequence withh context maatching basedd
heteroggenous region and
a predicted value
v of g(i,j) iis
predictioon technique to removee the spatiaal
dependeency. The pred diction residuee planes of the
two suubimages aree then entrropy encodedd
sequentiially with our proposed realization scheme
of adaptiive Rice code.
i.e. {w11,w2,w3,w4}=
={5/8,2/8,1/8,0}
IIV. WORKING
G OF THE SC
CHEME
FLOW CHART FO
OR PREDICT
TION ON TH
HE
This prroposed schem me is mainlyy working onn GREEN
N PLANE
Predictioon on the greenn plane and Prrediction on the
Non-greeen plane.
The error
e residue e(i, j) is thenn mapped to a
nonneggative integer aas follows to reshape
r its valuue
distribuution to an expponential one from
f a Laplaciaan
one
Compresssion scheme
The preediction Error of pixel (i, jj) in the CFA
A
image, say e(i, j) is givven by When codinng E(i, j) of green plane is
definedd to be
Image 2 6.188 5.218 4.847
Image 3 6.828 4.525 3.847
Table I
When cooding E(i, j) off non green plaane is defined too If we aalter the values of weighting g factor then w
we
be get impproved results in terms of coompression rattio
and alsoo reduce the biit rates of CFA
A.
VI. EX
XPERIMENTA
AL RESULTS
BITRAT
TE ANALYSIS
S
SIP0201-2
CONFERENCE ON “SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM
(SPRTOS)” MARCH 26-27 2011
SIP0201-3
CONFERENCE ON “SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM
(SPRTOS)” MARCH 26-27 2011
SIP0201-4
CONFERENCE ON “SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM
(SPRTOS)” MARCH 26-27 2011
N 1 [( N L 2 ) / 8 ]
h^(k) = g(i)f(k-i), ŝ (k) = h(0) s(k) +
i o i [( N L 2 ) / 8 ]
k=0,1,…………….N+L-1, i 0
SIP0201-5
CONFERENCE ON “SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM
(SPRTOS)” MARCH 26-27 2011
SIP0201-6
CONFERENCE ON “SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM
(SPRTOS)” MARCH 26-27 2011
non-selective and has only one Eye Diagram for In-Phase Signal
4
path. In 3G systems, we require to
2
transmit data rate as high as
Amplitude
possible. To increase the data 0
Amplitude
0
20
Matched filterdata1
-2
MMSE filter
0 -4
-0.5 0 0.5
Time
Normalized magnitude response(dB)
-20
SIP0201-7
CONFERENCE ON “SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM
(SPRTOS)” MARCH 26-27 2011
0
Table 1. Comparison between
-2 optimal matched filter and
-4
-0.5 0 0.5
MMSE filter with different no. of
Time
taps
Eye Diagram for Quadrature Signal
4
2
Amplitude
-2
5. Conclusion
-4
-0.5 0
Time
0.5 In 3G and beyond 3G system,
higher SIR of the received signal is
Figure 4. Eye diagram of required so that high order
received signal using receiver modulation schemes such as 8-
MMSE filter PSK, 16-QAM can be applied from
which we can achieve high data
SIP0201-8
CONFERENCE ON “SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM
(SPRTOS)” MARCH 26-27 2011
SIP0201-9
CONFERENCE ON “SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM
(SPRTOS)” MARCH 26-27 2011
SIP0201-10
CONFERENCE ON “SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM (SPRTOS)” MARCH 26-27 2011
Abstract- In the present era virtual instrumentation super imposed in the data which comes from the
technique is considered as a separate discipline of field with the help of transducers and data
engineering education. It has replaced the acquisition system. After acquiring data from the
conventional technique of measurement and data field, the signal processing operation is performed.
acquisition and taken the instrumentation In signal processing operation, different noises
experiment in to a new level. With easy to use, which are super imposed in the original process
graphical programming enabled software, supported signal is removed and the signal is amplified so that
by dedicated, easy to use hardware virtual the signal keeps its original traits and the data
instrumentation has transformed the notion of which comes with the signal remains intact. After
engineering education and simulation based the signal processing part, the data is given to a data
experiments. processing algorithm which processes the data and
This paper gives a brief idea of the need and stores the data in a memory unit.
advantages of virtual instrumentation in engineering With the advantage of technology
education and discusses the need of distant personal computers with PCI, PXI/compact PCI,
laboratory in engineering education. It also PCMCIA, USB, IEEE 1394, ISA, VXI, serial and
develops a simple application for signal acquisition, parallel ports are used for data acquisition, test and
analysis and storage. measurement and automation. Personal computers
Keywords- LabVIEW, virtual instrumentation are linked with the real world process with the help
of OPC, DDE protocol and application software is
I. INTRODUCTION used to form a closed loop interaction between the
Acquiring multiple data, the data may be analog real world process, application software and
or discrete in nature from the field or process at personal computing unit. Many of the networking
high speed using multi channel data acquisition technologies that have already been available for a
system, processing the data with the help of a data long time in industrial automation (e.g., standard
processing algorithm and a computing device and and/or proprietary field and control level buses),
displaying the data for the user is the elementary besides having undertaken great improvements in
need of any industrial automation system [1,2,3,4]. the last few years, have also been progressively
Modern day process plants, construction sites, integrated by newly introduced connectivity
agricultural industry [11], petroleum, wireless solutions (Industrial Ethernet, Wireless LAN, etc.).
sensor network [16], power distribution network They have greatly contributed to the technological
[17], refinery industry, renewable energy system renewal of a large number of automation solutions
[10,28] and every other industry where data is of in already existing plants. Obviously, even the
prime importance use wireless data acquisition, data software technologies involved in the
processing and data logging equipments. Acquiring corresponding data exchange processes have been
data from the field with the help of different sensor greatly improved; as an example, today it is
is always challenging. Different kinds of noises are possible to use a common personal computer in
SIP0202-1
CONFERENCE ON “SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM (SPRTOS)” MARCH 26-27 2011
order to implement even complex remote converts the analog signal to the equivalent digital
supervisory tasks of simple as well as highly data. The equivalent digital data is then fed to the
sophisticated industrial plants. computer, which acts both as a controller and
This paper gives an overview of modern day display element.
industrial automation system comprising of data Once data has been acquired, there is a need
acquisition system and data loggers. This paper to store it for current and future reference. Today,
develops a secured data acquisition and analysis alternative methods of data storage embrace both
module using virtual instrumentation concept. With digital computer memory and that old traditional
the help of this system the operator can securely standby-paper. There are two principal areas where
login to the system and perform the desired signal recorders or data loggers are used. Recorders and
acquisition and analysis operation. The system also data loggers are used in measurements of process
stores the relevant data for future reference and variables such as temperature, pressure, flow, pH,
record keeping purpose. humidity; and also used for scientific and
engineering applications such as high-speed testing
II. INDUSTRIAL AUTOMATION SYSTEM (e.g., stress/strain), statistical analyses, and other
Most measurements begin with a transducer, a laboratory or off-line uses where a graphic or
device that converts a measurable physical quantity, digital record of selected variables is desired.
such as temperature, strain, or acceleration, to an Digital computer systems have the ability to
equivalent electrical signal. Transducers are provide useful trend curves on CRT displays that
available for a wide range of measurements, and could be analyzed.
come in a variety of shapes, sizes, and
specifications. Signal conditioning can include III. VIRTUAL INSTRUMENTATION IN DISTANT LAB
amplification, filtering, differential applications, To improve the learning methodology in
isolation, simultaneous sample and hold (SS&H), different discipline in engineering virtual
current-to-voltage conversion, voltage-to-frequency instrumentation is used. This technique is easy to
conversion, linearization and more. use, easy to understand and cost effective. The main
feature is that various simulations can be performed
with the help of programming, which is very
difficult to perform in hardware. State of art virtual
instrumentation system has been reported in
literature which enhances the learning experience of
the students of different discipline. Some of the
discipline where state of art virtual instrumentation
system has been developed are mechanical
engineering [6], power plant training [8],
electronics [9], control system [12], chemical
engineering [14], ultrasonic range measurement
[20], biomedical [21,22], power system [23,24],
electrical machine [25], intelligent control [31].
Figure 1: Block diagram of data acquisition and Laboratories in engineering and applied science
logging have important effects on student learning. Most
Figure 1 shows the schematic diagram of educational institutions construct their own
data acquisition system. Sensor is used to sense the laboratories individually. Alternatively, some
physical parameters from the real world. The output institutions establish laboratories, which can be
of the sensor is provided to the signal conditioning conducted remotely via internet. Different
element. The main purpose of signal conditioning researchers have proposed the concept of distant
element is to remove the noise of the signal and laboratory [7, 18, 19] using internet [27], and using
amplify the signal. The output of the signal intranet [26]. Researchers have proposed different
conditioning system is provided to ADC. The ADC hardware and software architectures for remote
SIP0202-2
CONFERENCE ON “SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM (SPRTOS)” MARCH 26-27 2011
SIP0202-3
CONFERENCE ON “SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM (SPRTOS)” MARCH 26-27 2011
Figure 5: Front panel for time domain analysis of Figure 7: Front panel for analysis of the subset of
the acquired noisy signal signal
Figure 5 shows the time domain These results can be analyzed and logged to a file
representation of the noisy signal where as figure 6 for record keeping and further analysis.
show the frequency domain representation of the
signal. Frequency domain representation involves
the Fourier analysis of the signal. V. CONCLUSIONS
This paper emphasizes on the data acquisition,
supervisory control and data logging aspect of an
industrial process. These areas are of prime
importance for computer control of an industrial
process. The signal is acquired from the filed and
different signal processing and analysis function is
performed on the acquired signal on the selected
portion of the signal. The selected portions of the
signal along with its mathematical values are stored
in a log file for record keeping and future reference
Figure 6: Front panel for frequency domain analysis and analysis.
of the acquired signal In future scope of the paper, a wireless
The third module of the system is the analysis web based data acquisition, data logging and
module. In this analysis module the operator can supervisory control system can be implemented.
select a certain portion of the signal using the The main advantage of wireless web based data
pointer available. The portion of the signal is acquisition system is that any authorized person in
displayed in the subplot and DC value, RMS value, any where in the world can access the real time
average value and mean value of the portion of the process data with the help of internet. The main
signal is displayed. Figure 7 shows the front panel concern area of web based data logging and
for waveform analysis. supervisory control system is the security of data
and authentication of the user. To solve the above
security need a firewall can be implemented.
References
SIP0202-4
CONFERENCE ON “SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM (SPRTOS)” MARCH 26-27 2011
[2] Rik Pintelon, Yves Rolain, M. Vanden [11] Sarang Bhutada, Siddarth Shetty, Rohan
Bossche and J. Schoukens, “Towards an Malye, Vivek Sharma, Shilpa Menon,
Ideal Data Acquisition Channel,” IEEE Radhika Ramamoorthy, “Implementation of
Transactions on Instrumentation and a Fully Automated Greenhouse using
Measurement, vol. 39, no. 1, Feb 1990, pp. SCADA Tool like LabVIEW,” in
116-120. Proceedings of the 2005 IEEE/ASME
[3] Deichert, R.L., Burris, D.P., Luckemeyer, J., International Conference on Advanced
“Development of a High Speed Data Intelligent Mechatronics, Jul 2005, pp. 741-
Acquisition System Based on LabVIEW 746.
and VXI,” in Proceedings of IEEE [12] Samuel Daniels, Dave Harding, Mike
Autotestcon, Sep 1997, pp. 302-307. Collura, “Introducing Feedback Control to
[4] F. Figueroa, S. Griffin, L. Roemer and J. First Year Engineering Students Using
Schmalzel, “A Look into the Future of Data LabVIEW,” in Proceedings of 2005
Acquisition”, IEEE Instrumentation and American Society for Engineering
Measurement Magazine, vol. 2, issue 4, Education Annual Conference &
Dec1999, pp. 23–34. Exposition, 2005, pp. 1-12
[5] A. Ferrero, L. Cristaldi and V. Piuri, [13] Mihaela Lascu and Dan Lascu, “Feature
“Programmable Instruments, Virtual Extraction in Digital Mammography Using
Instruments, and Distributed Measurement LabVIEW,” 2005 WSEAS International
Systems: what is Really Useful, Innovative, Conference on Dynamical Systems and
and Technically Sound”, IEEE Control, Nov 2005, pp. 427-432
Instrumentation and Measurement [14] V M Cristea, A Imre-Lucaci, Z K Nagy and
Magazine, vol. 2, issue 3, Sep 1999, pp. 20– S P Agachi, “E-Tools for Education and
27. Research in Chemical Engineering,”
[6] P. Strachan, A. Oldroyd, M. Stickland, Chemical Bulletin, vol. 50, issue 64, 2005,
“Introducing Instrumentation and Data pp. 14-17
Acquisition to Mechanical Engineers Using [15] Ziad Salem, Ismail Al Kamal, Alaa Al
LabVIEW,” International Journal of Bashar, “A Novel Design of an Industrial
Engineering Education, vol. 16, no. 4, Jan Data Acquisition System,” in Proceedings
2000, pp. 315-326 of International Conference on Information
[7] K K Tan, T H Lee, F M Leu, “Development and Communication Techniques, Apr 2006,
of a Distant Laboratory Using LabVIEW,” pp. 2589-2594.
International Journal of Engineering [16] Aditya N. Das, Frank L. Lewis, Dan O.
Education, vol. 16, no. 3, 2000, pp. 273-282 Popa, “Data-logging and Supervisory
[8] Amit Chaudhuri, Amitava Akuli and Abhijit Control in Wireless Sensor Networks,” in
Auddy, “Virtual Instrumentation Systems- Proceedings of 7th ACIS international
Some Developments in Power Plant conference on software engineering,
Training and Education,” IEEE ACE, Dec Artificial Intelligence, Networking and
2002 Parallel Distributed Computing (SNDP’06),
[9] Melanie L Higa, Dalia M Tawy and Susan 2006, pp. 1-12
M Lord, “An Introduction to LabVIEW [17] K. S Swarup and P. Uma Mahesh,
Exercise for an Electronic Class,” 32nd “Computerized Data Acquisition for Power
ASEE/IEEE Frontiers in Education System Automation,” in Proceedings of
Conference, Nov 2002, T1D-13-T1D-16 Power India Conference, Jun 2006, pp. 1-7.
[10] Recayi Pecen, M.D Salim, Ayhan Zora, “A [18] Francesco Adamo, Filippo Attivissimo,
LabVIEW Based Instrumentation System Giuseppe Cavone, Nicola Giaquinto,
for a Wind-Solar Hybrid Power Station,” “SCADA/HMI Systems in Advanced
Journal of Industrial Technology, vol. 20, Educational Courses,” IEEE Transactions
no. 3, Jun-Aug 2004. on Instrumentation and Measurement, vol.
SIP0202-5
CONFERENCE ON “SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM (SPRTOS)” MARCH 26-27 2011
56, no. 1, Feb 2007, pp. 4-10. Based on LabVIEW DSC Module and
[19] Vu Van Tan, Dae-Seung Yoo, Myeong-Jae Matlab/Simulink,” in Proceedings of The
Yi, “A Novel Framework for Building Ninth International Conference on
Distributed Data Acquisition and Electronic Measurement & Instruments,
Monitoring System,” Journal of Software, Aug 2009, pp. 1-547-1-552.
vol.2, no.4, Oct 2007, pp. 70-79 [29] Hiram E Ponce, Dejanira Araiza and Pedro
[20] A Hammad, A Hafez, M T Elewa, “A Ponce, “A Neuro-Fuzzy Controller for
LabVIEW Based Experimental Platform for Collaborative Applications in Robotics
Ultrasonic Range Measurements,” DSP Using LabVIEW,” Applied Computational
Journal, vol. 6, issue 2, Feb 2007, pp. 1-8 Intelligence and Soft Computing, Hindawi
[21] Shekhar Sharad, “A Biomedical Publishing Corporation, vol. 2009, 2009, pp.
Engineering Start Up Kit for LabVIEW,” 1-9
Americal Society f Engineering Education, [30] Akif Kutlu, Kubilay Tasdelen, “Remote
2008 Electronic Experiments Using LabVIEW
[22] Steve Warren and James DeVault, “A Bio Over Controller Area Network,” Scientific
Signal Acquisition and Conditioning Board Research and Essays, vol. 5(13), Jul 2010,
as a Cross-Course Senior Design Project,” pp. 1754-1758
in Proceedings of 38th ASEE/IEEE Frontiers [31] Pedro Ponce Cruz, Aruto Molina Gutierre,
in Education Conference, 2008, pp. S3C1- “LabVIEW for Intelligent Control Research
S3C6 and Education,” 4th IEEE International
[23] S K Bath, Sanjay Kumra, “Simulation and Conference on E-Learning in Industrial
Measurement of Power Waveform Electronics, Nov 2010, pp. 47-54
Distortion Using LabVIEW,” IEEE [32] David McDonald, “Work In Progress
International Power Modulators and High Introductory LabVIEW Real Time Data
Voltage Conference, May 2008, pp. 427- Acquisition Laboratory Activities,” ASEE
434 North Central Sectional Conference, Mar
[24] Nikunja K Swain, James A Anderson and 2010, pp. 1B-1-1B-6
Raghu B. Korrapati, “Study of Electrical
Power Systems using LabVIEW VI
Modules,” in Proceedings of 2008 IAJC-
IJME International Conference, 2008
[25] M. Usama Sadar, “Synchronous Generator
Simulation Using LabVIEW,” World
Academy of Science, Engineering and
Technology, 39, 2008, pp. 392-400
[26] Muhammad Noman Ashraf, Syed Annus
Bin Khalid, Muhammad Shahrukh Ahmed,
Ahmed Munir, “Implementation of Intranet-
SCADA using LabVIEW based Data
Acquisition and Management,” in
Proceedings of International Conference on
Computing, Engineering and Information,
2009, pp. 244-249.
[27] Zafer Aydogmus, Omur Aydogmus, “A
Web-Based Remote Access Laboratory
Using SCADA,” IEEE Transactions on
Education, vol. 52, no. 1, Feb 2009.
[28] Li Nailu, Lv Yuegang, Xi Peiyu, “A Real
Time Simulation System of Wind Power
SIP0202-6
CONFERENCE ON “SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM (SPRTOS)” MARCH 26-27 2011
SIP0203-1
CONFERENCE ON “SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM (SPRTOS)” MARCH 26-27 2011
frequency, thus they are orthogonal over the significantly by the ICI generated by the
interval (0,Ts). Then, the N symbols are mapped subcarrier l +1. In considering a further reduction
to bins of an inverse fast Fourier transform of ICI, the ICI cancellation demodulation scheme
(IFFT). The IFFT bins correspond to the is used. In this scheme, signal at the (k +1)
orthogonal sub-carriers in the OFDM symbol. subcarrier is multiplied by"-1" and then added to
Thus, the OFDM symbol is expressed as the one at the k subcarrier. Then, the resulting data
sequence is used for making symbol decision.
2). ICI Cancelling Modulation
The ICI self-cancellation scheme requires that the
transmitted signals be constrained such that
where the Xm’s are the baseband symbols on each X(1) = -X(0), X(3) = -X(2),......., X(N -1) = -X(N -
sub-carrier. The analog time-domain signal is 2) using this assignment of transmitted symbols
obtained using digital to analog(D/A) converter. allows the received signal on subcarriers k and
This discrete signal is demodulated using an N- k+1 to be written as
point Fast Fourier Transform (FFT) operation at
the receiver. The demodulated symbol is
-40
-70
0 20 40 60 80 100 120
the complex baseband representation of the N Fig.1 Comparison of |S(l-k)|, |S`(l-k)|, and |S``(l-k)| for N = 128 and
modulated sub carriers. As the broadband channel ε = 0.4
has been decomposed into N parallel sub 3) ICI Canceling Demodulation
channels.Each sub channel needs an. These blocks ICI modulation introduces redundancy in the
are called Frequency Domain Equalizers received signal since each pair of subcarriers
(FEQ).The bits on the transmitter are received at transmit only one data symbol. This
high data rates at receiver. redundancy can be exploited to improve the
system power performance, while it surely
III. ICI SELF CANCELLATION SCHEME
decreases the bandwidth efficiency. To take
A. Self-Cancellation
ICI self-cancellation is a scheme that was
advantage of this redundancy, the received
introduced by Zhao and Sven-Gustav Häggman[1] signal at the (k + 1)th subcarrier, where k is
in order to combat and suppress ICI in OFDM. even, is subtracted from the kth subcarrier.
The input data is modulated into group of
subcarriers with coefficients such that the ICI
signals so generated within that group cancel each
other.Thus it is called self-cancellation method.
1) Cancellation Method
The data pair (X ,- X ) is modulated on to two
adjacent subcarriers (l,l +1) . The ICI signals
generated by the subcarrier l will be cancelled out
SIP0203-2
CONFERENCE ON “SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM (SPRTOS)” MARCH 26-27 2011
Real(S(l-k))
|S(l-k)|
0.4 0.1
0.2 0
OFDM system is calculated. As expected, the CIR
0
0 5 10 15
-0.1
0 5 10 15 is greatly improved using the ICI selfcancellation
Subcarrier index k Subcarrier index k
-0.5
0 5 10 15
Subcarrier index k
At the receiver
SIP0203-3
CONFERENCE ON “SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM (SPRTOS)” MARCH 26-27 2011
SIP0203-4
CONFERENCE ON “SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM (SPRTOS)” MARCH 26-27 2011
SIP0203-5
CONFERENCE ON “SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM (SPRTOS)” MARCH 26-27 2011
SIP0203-6
CONFERENCE ON “SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM (SPRTOS)” MARCH 26-27 2011
sudhakarsingh86@gmail.com
SIP0204-1
CONFERENCE ON “SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM (SPRTOS)” MARCH 26-27 2011
consists three stages, (i) Image matching using public security systems, and virtual reality
templates. (ii) Object detection. (iii) Then interfaces. Detection and tracking of moving
implementation of PSO technique. object like car and people are more concerned,
especially flexible and robust tracking
In this paper proposed PSO based algorithms under dynamic environments, where
algorithm is better which gives better result as lightening condition may change and occlusions
compare to conventional algorithm. may happen. The general process of object
detection consists of two steps. The first step is
II. LITERATURE REVIEW building models. The second step is according to
F. Ackermann [1] proposed an image matching the prior knowledge of the interested objects, the
algorithm based on least squares window feature model is built up to describe the target
matching. Several common object detection and object and separate it from other objects and
tracking methods are surveyed in [2], such as backgrounds. And since most images are noisy,
point detectors , background subtraction [7], In statistic information are usually adopted to
fact, color is one of the most widely used quantify features. The second step is to find a
features to represent the object appearance for particular region in the image; called area of
detection and tracking [5]. Most of object interest (AOI), which either can best fit the
detection and tracking methods used pre- object model or has the highest similarity with
specified models for object representation. W. the model. Many algorithms developed recently
Forstner [3] proposed a feature based in this area relate to human face detection and
correspondence algorithm for image matching A recognition due to its potential applications in
W Gruent [4]. The Adaptive Least Squares security and surveillance. Yet, generic, reliable,
Correlation is a very potent and flexible and fast human face detection was, until very
technique for all kinds of data matching recently, impossible to achieve in real-time. The
problems, J. Bala, K.[5]. They address the concepts involved in object detection, object
problem of crafting visual routines for detection recognition, and object tracking often overlap.
tasks. C.F.Olson [6] in image matching Each of these computer vision techniques tries to
applications such as tracking and stereo achieve the following: Object Tracking:
matching. Kwan-Ho Lin, Kin-Man [8] new dynamically locates objects by determining their
method for locating object based on valley field position in each frame. Object Detection and
detection and measurement of fractal Recognition has made significant progress in the
dimensions. Yaakov Hel-Or [10] a novel last few years. Many algorithms developed
approach to pattern matching is proposed in recently in this area relate to human face
which time complexity is reduced by two orders detection and recognition due to its potential
of magnitude compared to traditional applications in security and surveillance.
approaches. Kun Peng, Liming Chen [9] IV. TEMLATE MATCHING BASED ON
presented a robust eye detection algorithm for CROSS CORRELATION
gray intensity images.
Template matching is a popular method
III. OBJECT DETECTION for pattern recognition. It is defined below:
Object detection attempts to determine Definition: Let I be an image of dimension m×n
the existence of specific object in an image and, and T be another image of dimension p×q such
if object is present, then it determines the that p<m and q<n then template matching is
location, size and shape of that object. In defined as a search method which finds out the
computer vision, object detection and tracking is portion in I of size p×q where T has the
an active research area which has attracted maximum cross correlation coefficient with it.
extensive attentions from multi-disciplinary The normalized cross correlation coefficient is
fields, and it has wide applications in many defined as:
fields like service robots, surveillance systems,
SIP0204-2
CONFERENCE ON “SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM (SPRTOS)” MARCH 26-27 2011
SIP0204-3
CONFERENCE ON “SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM (SPRTOS)” MARCH 26-27 2011
SIP0204-4
CONFERENCE ON “SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM (SPRTOS)” MARCH 26-27 2011
SIP0204-5
CONFERENCE ON “SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM (SPRTOS)” MARCH 26-27 2011
SIP0204-6
CONFERENCE ON “SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM (SPRTOS)” MARCH 26-27 2011
SIP0204-7
1
Abstract--- In this paper, we carry out a Primarily, thresholding are of two types – Bi-level
comparative study of the efficacy of wavelets and Multi-level [1].
belonging to Daubechies and Coiflet family in
achieving image segmentation through a fast Bi-level thresholding consists of two values – one
statistical algorithm.The fact that wavelets below the threshold and another above it. While in
belonging to Daubechies family optimally capture Multilevel thresholding, different values are assigned
the polynomial trends and those of Coiflet family between different ranges of threshold levels. Various
satisfy mini-max condition, makes this thresholding techniques have been categorized on the
comparison interesting. In the context of the basis of histogram shape, clustering, entropy and
prseent algorithm, it is found that the object attributes [2].
performance of Coiflet wavelets is better, as
compared to Daubechies wavelet. Wavelet Transform is very significant tool in the
field of image processing. The wavelet transform of
Keywords: Peak Signal to Noise Ratio, an image comprises four components –
Segmentation, Standard deviation, Thresholding, Approximation, Horizontal, Vertical and Diagonal.
Weighted mean. The process is recursively used in approximation
component of wavelet transform for farther
Madhur Srivastava is final year B.TECH student in the
Department of Electronics and Communication Engineering at
decomposition of image until only one coefficient is
Jaypee University of Engineering and Technology, Guna, India; left in approximation part [3-5].
e-mail: madhur.manas@gmail.com
Yashwant Yashu is final year B.TECH student in the As is well known, Daubechies family are useful in
Department of Electronics and Communication Engineering at
Jaypee University of Engineering and Technology, Guna, India;
extracting polynomial trends through their low-pass
e-mail: yashwantyashu.jiet@gmail.com coefficients satisfying vanishing moments conditions:
Satish K. Singh is Assistant Professor in the Department of
Electronics and Communication Engineering at Jaypee University
of Engineering and Technology, Guna, India e-mail:
satish432002@gmail.com
x n j.k dx 0 (1)
Prasanta K. Panigrahi is Professor in the Department of Physics
at Indian Institute of Science Education and Research, Kolkata, This is due to the fact that, the wavelets of
India; (Phone No. +91-9748918201) e-mail:
pprasanta@iiserkol.ac.in
error in extracting local features is minimized in this basis set. Hence, it is worth comparing behavior of
T
H
R Component R Component
A H R
E
S
H
G Component O
G Component
B Component
V D L
D
I B Component
N
G
the corresponding wavelet at low-pass coefficients from the perspective of the proposed algorithm.
Table 1. PSNR and size of reconstructed images using different Daubechies and Coiflet wavelets.
Lenna 3 PSNR(dB) 34.45 35.19 35.52 35.71 34.50 35.23 35.48 35.61 35.69
Size(kB) 36.2 36.5 36.3 36.2 36.4 36.2 36.4 36.3 36.3
5 PSNR(dB) 36.41 37.13 37.41 37.53 36.5 37.19 37.42 37.54 37.62
Size(kB) 36.2 36.5 36.3 36.3 36.3 36.3 36.4 36.4 36.4
7 PSNR(dB) 36.79 37.5 37.74 37.88 36.84 37.53 37.76 37.89 37.97
Size(kB) 36.2 36.5 36.3 36.3 36.3 36.3 36.4 36.4 36.4
Baboon 3 PSNR(dB) 25.92 26.31 26.29 26.19 25.94 26.20 26.29 26.33 26.36
Size(kB) 74.4 74.2 74.2 74.3 74.4 74.4 74.3 74.3 74.2
5 PSNR(dB) 27.06 27.56 27.44 27.40 27.13 27.41 27.50 27.55 27.58
Size(kB) 74.4 74.1 74.2 74.2 74.3 74.2 74.2 74.2 74.1
3
7 PSNR(dB) 27.18 27.70 27.57 27.53 27.27 27.53 27.62 27.67 27.71
Size(kB) 74.3 74.1 74.1 74.1 74.2 74.2 74.1 74.2 74.1
Pepper 3 PSNR(dB) 30.63 33.87 31.61 31.25 31.48 31.63 31.70 31.75 31.77
Size(kB) 39.9 39.8 40.3 40.4 40.1 40.3 40.3 40.2 40.2
5 PSNR(dB) 34.12 35.83 34.61 34.30 33.98 34.41 34.55 34.60 34.62
Size(kB) 39.5 39.7 39.6 39.6 39.6 39.6 39.7 39.7 39.7
7 PSNR(dB) 34.56 36.26 34.92 34.58 34.25 34.73 34.88 34.93 34.95
Size(kB) 39.5 39.8 39.5 39.6 39.6 39.6 39.6 39.6 39.7
Fig. 2 Plot of PSNR vs Threshold levels thresholded using different wavelets of Lenna image
3. S.G. Mallat, A Wavelet Tour of Signal 6. M. Srivastava, P. Katiyar, Y. Yashu, S.K. Singh,
Processing. New York: Academic (1999). P.K. Panigrahi,” A Fast Statistical Method for
4. Daubechies, Ten Lectures on Wavelets, Vol. 61 Multilevel Thresholding in Wavelet Domain,”
of Proc. CBMS-NSF Regional Conference unpublished.
Series in Applied Mathematics, Philadelphia, PA:
SIAM (1992).
5. J.S. Walker,” A Primer on Wavelets and Their
Scientific Applications,” 2nd ed. Chapman &
Hall/CRC Press, Boca Raton, FL, 2008.
Analysis of Signals in Fractional Fourier Domain
Ajmer Singh, Student of Lovely Professional University(LPU)-India, Nikesh Bajaj, Asst. Prof., ECE Dept.(LPU)
ajmersingh155-2006@lpu.in, nikesh.14730@lpu.co.in
∞ !
"
Figure 1: Time- frequency plane for FRFT.
∞
# $% & ' In this paper, we use the Digital Computation method of
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%# $% ' the FRFT which is given in [7].
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%# $% ' (
Fα(u) called as the α- order FRFT of signal f(t). Where α III. ANALYSIS OF DIFFERENT SIGNALS
= Aл/2, and ‘A’ is a real number and is called the order of We always store our information or data in some type of
the FRFT, which is in interval [-2, 2] and can be extended to memory space, that set of information or data is known as
any real number according to A+4k = A. Where k is any signal. There are some basic signals like Rectangular pulse,
integer like [….-3, -2, -1, 0, 1, 2, 3,….], and A can be any Sine wave, Gaussian signals. These signals are basically use
fractional value in interval [-2, 2].
for signal processing. In signal processing there are different
Some basic properties of FRFT are:
types of transform techniques which are used to analysis the
1
frequency spectrum of the signals. Because the frequency domains shows the FRFT results for rectangular pulse at α =
spectrum tells more about the signal behavior as compare to л/10, л/5, 3л/10, and 2л/5.
the time domain representation. Two FRFDs for rectangular pulse at α=0 and α= л/2 are
But the FRFT tell about the signal representations in time ordinary time and frequency domains respectively. By taking
domain and frequency domain while using the different a look on figure 2(a) to 2(e) any one can easily understand
FRFT operator Fα(u), where α = 0; give the time domain the concept that how an rectangular pulse become a sinc
representation and α = л/2; give the frequency domain function in frequency domain, without any mathamaticaly
representation. Also 0 < α < л/2 give the intermediates expression. We can also see how much these domains are
domain which are known as α–domains. These domains are correlated to each other. But not tell the actual value of
not giving any exact information about the time / frequency correlation cofficent. To analysis this in figure 3 there are
component. But gives some mixed information about that. two graphs first one of which tells about the normalized
correlation value of α-domain signal to the time domain
So, in this section we are going to discuss about the
signal and second one tells about the normalized correlation
variation of some signals with variation in α-domain.
value of α-domain to (α-1)-domain. For the better results we
A. Analysis of Rectangular pulse in FRFD take 90 domains at 90 different values of A between 0 < A <
The rectangular pulse (also known as the rectangle 1.
function, rectangular function, gate function, or unit pulse) is In figure 3(a) and 3(b) where the α = 0 correlation
defined as: coefficent has the maxium value is 1. It proof that the FRFT
at α = 0 give the actual time domain signal or no rotation.
)* %%%%%%%%%$%++ , - But when there is a small change of 1° (one degree) in α
%%%%%%%%%%%%%% %.%%%%%%%%$%++ / - value the correlation coefficent give the minimum value
quite different from time domain signal but still correlate up
And FT of a rectangular function is defined as: to 95%, and so on. In figure 3(b) we can see that when 1° <
α < 45° then the α-domain signal is highly corrrelated to the
01)*2 345%-6-
previous α-domain, an simillar result for 45°< α < 90°.
Correlation of α domain signal to time domain signal
Now, let us discuss an example for rectangular pulse in 1
FRFD and discuss results. In figure 2 we shows the results
1 1.5 0.95
MAX(Correlation)
0.8
1
0.6 0.9
0.5
0.4
0
0.2
0.85
0 -0.5
-30 -20 -10 0 10 20 30 -30 -20 -10 0 10 20 30
0.99
-0.5 -0.5
MAX(Correlation)
1
1 0.97
0.5
0.5
0.96
0 0
0.95
-0.5
-30 -20 -10 0 10 20 30
-0.5
-30 -20 -10 0 10 20 30 0 20 40 60 80 100
(e) A=0.8/α=2л/5 (f) A=1/α=л/2 value of α in degrees
Figure 2: FRFT of rectangular pulse for different values of angle α/A. (b)
solid line: real part. Dashed line: imaginary part. Figure 3: Correlation results for rectangular pulse.
2
electrical engineering and many other fields. It’s most basic is not correlated to TD signal, for these domains the
form as x(t) known as a function of time (t) is defined as: correlation coefficient values tends to zero.
7 8 345 ( 9
In figure 5(b) the correlation results for α-domain to (α-1)
domain are shows. When 1°< α < 90°, these domain are
equally correlated to each other. But very less correlated to
Where M is the amplitude of the sine wave, f is the TD signal
Correlation of α domain signal to time domain signal
frequency component, t is time and θ is the phase, specifies 1.4
where in its cycle the oscillation begins at t = 0.
1.2
Now, let discuss the results for Sine wave in FRFD. In
figure 4 we shows the results for six α’s values, out of which 1
MAX(Correlation)
figure 4(a) for α = 0; which shows the Sine wave in time 0.8
domain and figure 4(f) for α = л/2; which shows the
spectrum of Sine wave that is impulse function, rest of the 0.6
four domains shows the FRFT results for Sine wave at α = 0.4
л/10, л/5, 3л/10, and 2л/5.
0.2
As similar to the results discuss in section 3(A), now in
figure 4 shows the six α-domains for Sine wave out of which 0
0 20 40 60 80 100
two domains are identical to the ordinary time domain and value of α in degrees
frequency domain, which are in figure 4(a) and 4(b) (a)
respectively. Rest four figures 4(b), 4(c), 4(d) and 4(e) Correlation of α domain signal to (α -1) domain signal
1.02
shows the results for FRFT of Sine wave at different value
of α. The correlation results for Sine wave in the α-domain 1.01
with the TD signal, and with the (α-1)-domain signal are
MAX(Correlation)
1
shown in figure 5(a) and 5(b) respectively.
0.99
1 1.5
1 0.98
0.5
0.5
0.97
0 0
0.96
-0.5 0 20 40 60 80 100
-0.5 value of α in degrees
-1
(b)
-1 -1.5 Figure 5: Correlation results for Sine wave in α-domain.
0 20 40 60 80 100 0 20 40 60 80 100
7
-0.5 -0.5 -
-1 -1
-1.5 -1.5 As we discuss two type of signals in section 3(a) and 3(b)
0 20 40 60 80 100 0 20 40 60 80 100
which are Rectangular pulse and Sine wave respectively.
(c) A=0.4/α=л/5 (d) FRFT
A=0.6/α=3л/10
of Sine Wave A= 1 The third point of interest is Gaussian signal. Because
2 5
Gaussian functions are widely used in statistics where they
1.5
describe the normal distributions, in signal processing where
1
they serve to define Gaussian filters, and many more
0.5
application they have.
0 0 At last, by taking an example of Gaussian signal to
-0.5 compute the FRFT for analysis it in FRFDs. In figure 6 we
-1 show six different FRFDs for Gaussian signal. Out of which
-1.5 two domains are again identical to TD and FD. And rest four
-2 -5
domains are intermediate domains of TD and FD.
0 20 40 60 80 100 0 20 40 60 80 100 For Gaussian signals the Fourier transform is again a
(e) A=0.8/α=2л/5 (f) A=1/α=л/2 Gaussian signals. Now if we have a look from 6(a) to 6(f)
Figure 4: FRFT of Sine wave for different values of angle α/A. solid then the variation from TD to FD is easily understandable.
line: real part. Dashed line: imaginary part.
Our point of interest is that how FRFD signals are correlated
In figure 5(a) it is clear that when 1° < α <10° then the α- to each other. For this in figure 7 we have two plots which
domain signal for sine wave is somehow correlated to the show the correlation of α-domain signal with TD signal and
with (α-1)-domain signal in figure 7(a) and 7(b) respectively.
TD signal. But when 10° < α < 90° then the α-domain signal
3
By analyzing these three signals in FRFDs. It is clear that
1 1.5
the α-domain signal are highly correlated to the (α-1)-
0.8 1 domain. That can understand from figure 3(b), 5(b) and 7(b).
These figures show that for the interval 1° < α < 90° these
0.6 0.5
signals are similar to each other. And by taking a look to
0.4 0 figure 2(b) to 2(e), 4(b) to 4(e) and 6(b) to 6(e), we can
realized that the FRFDs signal are just scaled version of the
0.2 -0.5
previous FRFD.
0 -1
-100 -50 0 50 100 -100 -50 0 50 100
0
1 REFERENCES
-0.5
0 [1] V. Namias, “The fractional order Fourier transform and its
-1 application to quantum mechanics,” J. Inst. Math. Applicat., vol. 25,
-1.5 -1 pp. 241–265, 1980.
-100 -50 0 50 100 -100 -50 0 50 100
[2] A. C. McBride and F. H. Kerr, “On Namias’ fractional Fourier
(e) A=0.8/α=2л/5 (f) A=1/α=л/2 transforms,” IMA J. Appl. Math., vol. 39, pp. 159–175, 1987.
Figure 6: FRFT of Sine wave for different values of angle α/A. solid [3] H. M. Ozaktas, B. Barshan, D. Mendlovic, and L. Onural,
line: real part. Dashed line: imaginary part. “Convolution, filtering, and multiplexing in fractional Fourier
domains and their relationship to chirp and wavelet transforms,” J.
Correlation of α domain signal to time domain signal Opt. Soc. Amer. A, vol. 11, pp. 547–559, Feb. 1994.
1.1 [4] R. G. Dorsch, A. W. Lohmann, Y. Bitran, and D. Mendlovic, “Chirp
filtering in the fractional Fourier domain,” Appl. Opt., vol. 33, pp.
1
7599–7602, 1994.
0.9 [5] A. W. Lohmann and B. H. Soffer, “Relationships between the
Radon–Wigner and fractional Fourier transforms,” J. Opt. Soc. Amer.
MAX(Correlation)
0 20 40 60 80 100
Ajmer Singh (M’22) was born in Punjab, India. He is
value of α in degrees
pursuing the master’s degree in signal processing from
(a) Lovely Professional University, Punjab, India, in 2011.
Correlation of α domain signal to (α -1) domain signal Currently, he is doing dissertation under the supervision
1.0005
of Mr. Nikesh Bajaj, the assistant professor of electronic
1
department. Research interests include different aspects
of FRFD filter designing.
0.9995
MAX(Correlation)
0.999
Nikesh Bajaj received his bachelor degree in Electronics
0.9985 & Telecommunication from Institute of Electronics And
Telecommunication Engineers. And he received his
0.998 master degree in Communication & Information System
from Aligarh Muslim University, India. Now, he is
0.9975
working in LPU as Asst. Professor, Department of ECE.
Research interests include Cryptography, Cryptanalysis,
0.997
0 20 40 60 80 100 and Signal & Image Processing.
value of α in degrees
(b)
Figure 7: Correlation results for Gaussian signal in α-domain.
4
Parzen-Cos6 (πt) combinational window family based QMF bank
Narendra Singh (*) and Rajiv Saxena,
Jaypee University of Engineering and Technology, Raghogarh, Guna (MP)
(*) Corresponding Author: narendra_biet@rediffmail.com ; narendra.singh@jiet.ac.in
1
can be significantly reduced by appropriate choice
of smoothing function w (n). Hence, a filter p (n) of
order N is of the form [15-17]-
p n hid n w n (3)
hid n
sin( c (n 0.5 N ))
, 0 n N-1 (2)
(n 0.5 N )
2
Table 1: Window Functions with Filter Design Equations
Sr. Name of window Expression for
No Expression for Window Window variable Window shape parameter
. function
1. Blackman window w n 0.42 0.5 cos 2 n M 0.08 cos 4 n M
for M n M
n
a=8.15414,b= - a = 1.82892, b= - 0.027548,
1 24 1 2 , n N 4
N N 0.236709,c=0.00218617 c = .00157699
l ( n) 3
n
2 1 2 , N 4 n N 2
N for 51.25<ATT≤68.69 for 43.6 < ATT ≤ 49.44
d (n) cos 6 ( n / N ), n N 2 a=21.269,b= -0.605789,c=0.00434808 a = 1.67702, b = 0.0450505,
c = 0.00000
for 57.48<ATT≤38.69
a = -8.60006, b= 0.477004,
c = -0.00355655
3
4. OPTIMIZATION ALGORITHM designed using windowing technique. With each
iteration, fc of p(n) and reconstruction error (error)
The amplitude distortion in reconstructed is computed, which is also the objective function. If
signal can be minimized by optimization the error increases in comparison to previous
techniques. The gradient based iterative iteration (prev-error), step size (step) is halved and
optimization algorithm is described in this section. the search direction (dir) is reversed. This step size
and direction is used to re-compute fc for new
a. Objective Function prototype filter. The optimization process is halted
when the error of the current iteration is within the
To get the high-quality reconstructed output y(n), specified tolerance (depicted as t-error), which is
the frequency response of low pass prototype filter, initialized before the optimization process begins or
H(ej2πf), must satisfy the following [13]- when prev-error equals error [26].
j 2 f Fs 4 2
Fs / 4 (5)
2 f 2
|H e | |H e | 1, for 0 f
4
Table 2: Performance of QMF filter at 50 dB stop-band attenuation
5. CONCLUSION References
1. Johnston, J. D.: A filter family designed for
A simple algorithm for designing the low pass use in quadrature mirror filter banks. In:
prototype filters for QMF banks has been used to Proceedings of IEEE International
optimize the reconstruction error by varying the Conference Acoustics, Speech and Signal
filter cut-off frequency. Prototype filters designed Processing, Denver, 291–294(1980)
using high SLFOR combinational window, Kaiser 2. Bellanger, M.G., Daguet, J.L.: TDM-FDM
window and Blackman window functions have been transmultiplexer: Digital Poly phase and
compared. Combinational window functions provide FFT. IEEE Trans. Commun. 22(9) ,1199-
better far-end rejection of the stop-band energy. This 1204 (1974)
feature helps to reduce the aliasing energy leak into a 3. Vetterly,M.: Prefect transmultiplexers. In:
sub-band from that of the signal in the other sub- Proceedings of IEEE International
band.
5
Conference on Acoustics, Speech, and Signal image filter banks. IEEE Trans. Signal
Processing, vol. 4, 2567- 2570 (1986). Process. , 46 (6), 1275-1281(1998)
4. Gu, G., Badran, E.F.: Optimal design for 16. Goh, C. K., Lim, Y. C.: An efficient
channel equalization via the filter bank algorithm to design weighted minimax PR
approach. IEEE Trans. Signal Process.52 QMF banks. IEEE Trans. Signal
(2),536-544 (2004) Process.47(12), 3303-3314)(1999)
5. Esteban, D., Galand, C.: Application of 17. Chen, C.K., Lee J.H.: Design of quadrature
quadrature mirror filter to split band voice mirror filters with linear phase in frequency
coding schemes. In: Proceedings of IEEE domain. IEEE Trans Circuits System, 39 (9),
International Conference on Acoustics, 593-605(1992)
Speech, and Signal Processing (ASSP), 191- 18. Lin, Yuan-Pei, Vaidyanathan, P. P.: A Kaiser
195(1977) window approach for the design of prototype
6. Crochiere, R.E.: Sub–band coding. Bell Syst. filters of cosine modulated filterbanks. IEEE
Tech. J., 9, 1633-1654(1981) Signal Processing Lett., 5, 132–134 (1998).
7. Vrtterli, M.: Multidimensional sub-band 19. Saxena, R.: Synthesis and characterization of
coding: Some theory and algorithm, Signal new window families with their applications,
Process 6, 97- 112(1984) Ph. D. Thesis, Electronics and Computer
8. Woods,J.W.,Neil,S.D.O.:Sub-band coding of Engineering Department, University of
images. IEEE Trans Acoustic. Speech and Roorkee, Roorkee, India (1997).
Signal Process. (ASSP)-34 (10), 1278- 20. Sharma, S. N., Saxena, R., Jain, A.: FIR
1288(1986) digital filter design with Parzen and cos6 (πt)
9. Liu,Q.G.,Champagne,B.,Ho,D.K.C.:Simple combinational window family, Proc. Int.
design of over sampled uniform DFT filter Conf. Signal Processing, Beijing, China,
banks with application to sub-band acoustic IEEE Press, 92–95 (2002).
echo cancellation. Signal Process, 80(5),831- 21. Sharma, S. N., Saxena, R., Saxena, S. C.:
847(2000) Design of FIR filters using variable window
10. Crochiere,R.E., Rabiner , L. R.: Multirate families – A comparative study, J. Indian
digital signal processing. Prentice– Inst. Sci., 84, 155–161 (2004).
Hall(1983) 22. DeFatta, D. J., Lucas J. G., Hodgkiss, W. S.
11. Creusere, C.D., Mitra, S.K.: A simple Digital signal processing: A system design
method for designing highquality prototype approach, Wiley (1988).
filters for M band pseudo QMF banks. IEEE 23. Gautam, J. K., Kumar, A., Saxena, S.C.:
Trans. Signal Process. 43(4), 1005–1007 WINDOWS: A tool in signal processing.
(1995) IETE Tech. Rev., vol. 12(3), 217-226
12. Mitra, S.K.: Digital signal processing: A (1995).
computer based Approach, TMH, 24. Paulo, S. R. Diniz, Eduardo A. B. da Silva
ch.7&10(2001) and Sergio L. Netto.: Digital signal
13. Vaidyanathan, P.P.: Multirate systems and processing: System, analysis and design,
filter banks. Prentice- Hall, Englewood Cambridge University Press (2003).
Cliffs, NJ (1993) 25. Hooke, R., Jeaves, T.: Direct search solution
14. Jain, V.K., Crochiere,R.E.: Quadrature of numerical and statistical problems, J.
mirror filter design in time domain. IEEE Assoc. Comp. Machines, 8, 212–229 (1961).
Trans, Acoustic,. Speechand Signal Process. 26. Jain, A., Saxena, R., Saxena, S.C.: An
ASSP- 329 (4), 353-361(1984) improved and simplified design of cosine
15. H. Xu, W.S. Lu, A. Antoniou, “An improved modulated pseudo-QMF filter banks. Digit.
method for design of FIR quadrature mirror Signal Process. 16(3), 225–232 (2006).
6
Annexure 1
or
|prev-error| =|error|
Stop
No
|prev-error| |error|
Is No
|error| >|m-error|
Yes
step =step/2
dir=-dir
7
Performance Analysis of Sub Carrier Spacing Offset in
Orthogonal Frequency Division Multiplexing System
Shivaji Sinha, Member IETE, Rachna Bhati, Dinesh Chandra, Member IEEE & IETE
email:shivaji2006@gmail.com, dinesshc@yahoo.co.in, rachna.bhati1988@gmail.com
Department of Electronics & Communication Engineering, JSSATE Noida
Abstract — A very important aspect in OFDM is time in oscillators at the modulator and the demodulator.
and frequency synchronization. In particular, frequency These frequency errors cause a frequency offset
synchronization is the basis of the orthogonality between comparable to the frequency spacing, thus lowering the
frequencies. Loss in frequency synchronization is caused overall SNR [3].
due to Doppler shift because of large number of
frequencies closely spaced next to each other in OFDM II. OFDM SYSTEM IMPLEMENTATION
frame. So the intersymbol interference (ISI) and Inter
Carrier Interference(ICI) are also produced. This paper
In OFDM, a frequency-selective channel is subdivided
presents the effects of frequency offset error in OFDM
system introduced by the fading sensitive channel.
into narrower flat fading channels. Although the
Performance of the OFDM system is evaluated using r.m.s. frequency responses of the channels overlap with each
value of error across all subcarriers for different values of other as shown in Figure 1, the impulse responses are
the subcarrier spacing, SNR degradation and received orthogonal at the carriers, because the nulls of the each
signal constellation in Matlab environment. The impulse response coincides with the maximum values of
performance is compared under various conditions of another impulse response and thus the channels can be
noise variance and frequency Offset. separated [3].
I. INTRODUCTION
1
prevent ISI. At the receiver, the cyclic prefix is re- The areas, colored with yellow, show the ICI. When the
moved, because it contains no information symbols. centers of adjacent subcarriers are shifted because of the
After the serial-to-parallel (S/P) conversion, the frequency offset, the adjacent subcarriers nulls are also
received data in the time domain (ym) are converted to shifted from the center of the other subcarrier. The
the frequency domain (Ym) using the fast Fourier received signal contains samples from this shifted
transform (FFT) algorithm. subcarrier, leading to ICI [6]. The destructive effects of
the frequency offset can be corrected by estimating the
frequency offset itself and applying proper correction.
This calls for the development of a frequency
synchronization algorithm. Three types of algorithms
are used for frequency synchronization: algorithms that
use pilot tones for estimation (data-aided), algorithms
that process the data at the receiver (blind), and
algorithms that use the cyclic prefix for estimation
[4 ][5].
Among these algorithms, blind techniques are
Fig 2. OFDM System attractive because they do not waste bandwidth to
transmit pilot tones . However, they use less information
III. FREQUENCY OFFSET & FREQUNCY at the expense of added complexity and degraded
SYNCHRONIZATION ALGORITHM performance [6]. The degradation of the SNR, Dfreq,
caused by the frequency offset, is approximated as
The first source of frequency Offset is relative motion
between transmitter & receiver (Doppler or Frequency
drift) and is given by ..….(3)
Where is the frequency offset, T is the symbol
……..(2)
duration in seconds , Eb is the energy per bit of the
Where fc is carrier frequency & v is relative velocity
OFDM signal and N0 is the one-sided noise power
between Transmitter & Reciver. While second source is
spectrum density (PSD) [6][7] .
frequency errors in oscillator.. Single-carrier systems
are more sensitive to timing offset errors while OFDM
IV. SIMULATION PARAMETERS
generally exhibits good performance in the presence of
First we have analyzed the impact of frequency offset
timing errors. In practice, the frequency, which is the
resulting in Inter Carrier Interference (ICI) while
time derivative of the phase, is never perfectly constant,
receiving an OFDM modulated symbol. The analysis is
thereby causing ICI in OFDM receivers. One of the
accompanied by Matlab simulation.
destructive effects of frequency offset is loss of
orthogonality. The loss of orthogonality causes the ICI TABLE 1
as shown in Figure 3.
R.M.S. ERROR RELATED PARAMETERS
PARAMETERS VALUES
FFT Size 64
No. of Data Subcarriers 52
No. of bits per OFDM
52
symbol
No. of symbols 1
Modulation Scheme BPSK
2
We have generated an OFDM symbol with all Error magnitude with frequency offset
10
subcarriers BPSK modulated then added frequency theory at Eb/No=20 db
simulation at Eb/No=20 db
offset with Gaussian noise of unit variance & zero mean 0
Error, dB
-20
This is repeated for different values of frequency offset.
The parameters are listed in Table 1. -30
IFFT/FFT period
3.2(1/ ) s -40
Preamble duration
16 s -50
-0.6 -0.4 -0.2 0 0.2 0.4 0.6
Signal duration BPSK_OFDM freqency offset/subcarrier spacing
symbol 4(TGI+TFFT) s
Fig 5. Energy Magnitude with frequency Offset at Eb/No=30db
Guard interval (GI) duration
0.8(TFFT /4) s
Figure 6 shows the calculated degradation of the SNR
Modulation Scheme QPSK
-7
10
17 db
-8
10 15 db
V. RESULTS ANALYSIS 10 db
-9 5 db
10
SNR degradation (Dfreq) in dB
3
due to the frequency offset. For smaller SNR values, the When compared to Figure 8 in figure 9, it can be seen
degradation is less than for bigger SNR values as shown that the received signal with 0.5% frequency offset
in Figure 6. In order to study the SNR degradation in value for the same 0.002 noise variance is more
OFDM systems we have examined the received signal distorted than the received signal with 0.3% frequency
with no frequency offset. In this case, the data were sent offset.
by two of the carriers. We have generated 512 random
The simulation results reveal that the distortion in the
QPSK signals as data. We send data using only two of
received signal is increased. which is set to zero as
the subcarriers, and the other subcarriers have no data.
shown in figure 9 & figure 10. The effects of the
Figure 7 shows that for no frequency offset & noise
frequency offset can also be observed when, data are
variance (ideal condition), there is no ICI and no
sent with every subcarrier, except one.
interference between the data and the other zeros
1.5
1.5
1
1
0.5
0.5
imaginel
imaginel
0
0
-0.5
-0.5
-1
-1
-1.5
-1.5
-1.5 -1 -0.5 0 0.5 1 1.5
-1.5 -1 -0.5 0 0.5 1 1.5 real
real
Fig 9. Received signal constellation with 0.5% frequency offset
0.8
0.6
0.4
1.5
0.2
Imaginel axis
1
0
0.5 -0.2
-0.4
imaginel
0
-0.6
-0.5 -0.8
-1
-1 -1 -0.8 -0.6 -0.4 -0.2 0 0.2 0.4 0.6 0.8 1
Real axis
-1.5
Fig 10. Received signal at the zero subcarrier with no
-1.5 -1 -0.5 0 0.5 1 1.5 frequency offset
real
[5] Jan-Jaap van de Beek, Magnus Sandelland Per Ola B.rjesson, “ML
0.1
Estimation of Time and Frequency Offset in OFDM Systems,” In
0
IEEE Transactions on Signal Processing, vol. 45, no. 7, pp. 1800-
Imaginary
Fig 11. Received signal at the zero subcarrier with 0.4% and 0.6%
IX. AUTHOR’S BIOGRAPHY
frequency off-set
1.Shivaji Sinha is Asst. Prof. in J.S.S. Academy of Technical
VI. CONCLUSION Education, Noida since Oct. 2003. He is member of IETE. He has
done his B. Tech from G.B. Pant Engg. College Pauri, Garhwal in
Simulation results demonstrated the distortive effects of Electronics & Communication Engineering & M. Tech in VLSI
frequency offset on OFDM signals; frequency offset design from U.P. Technical University.
affects symbol groups equally. Additionally, it was seen
that an increase in frequency offset resulted in a
2. Rachan Bhati is a student of B. Tech Final Year in JSS Aademy of
corresponding increase in these distortive effects and
Technical Education.
caused degradation in the SNR of individual OFDM
symbols.
3. Dinesh Chandra is Head & Professor in deptt. of Electronics &
VIII. REFERENCES
[1] Md. Amir Ali Hasan, Faiza Nabita, Imtiaz Ahmed Amith
Khandakar “Analytical Evaluation of Timing Offset error in OFDM
5
CONFERENCE ON “SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM (SPRTOS)” MARCH 26-27
2011
(such as at the QRS peak) and discards every alternate reconstruction of ECG data; and a measure of error loss,
sample [6]. The data reduction algorithms are often measured as the percent mean-square difference
empirically designed to achieve good reduction (PRD) [5]. The PRD is calculated as follows:
without causing significant distortion error.
SIP0301-2
CONFERENCE ON “SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM (SPRTOS)” MARCH 26-27
2011
SIP0301-4
CONFERENCE ON “SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM (SPRTOS)” MARCH 26-27
2011
SIP0301-5
CONFERENCE ON “SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM (SPRTOS)” MARCH 26-27 2011
Abstract:- Data security to ensure authorized access of bit-wise exclusive-OR (XOR) [2]. BIT is a field that has
information and fast delivery to a variety of end users with caught the interest of many researchers. The ability of using
guaranteed Quality of Services (QoS) are important topics of BIT approaches in various fields has been proven. Clark [6]
current relevance. In data security, cryptology is introduced to hopes for those who do research in BIT especially related to
guarantee the safety of data, whereby it is divided into ants, swarm and Artificial Neural Network, to examine the
cryptography and cryptanalysis. Cryptography is a technique application of those techniques in cryptology. He also states
to conceal information by means of encryption and decryption that a good place to start is on classical cipher cryptanalysis or
while cryptanalysis is used to break the encrypted information Boolean function design. This paper is organized as follows:
using some methods. Biological Inspired techniques (BIT) are first, we review simple substitution cipher, columnar
a method that takes ideas from biology to be used in transposition cipher and permutation cipher which are types of
cryptography. BIT is a field that has been widely used in many classical cipher, in Section 2. In Section 3, some biological
computer applications such as pattern recognition, computer inspired techniques employed are explained and the use of
and network security and optimization. Some examples of BIT these approaches in cryptography is reviewed in Section 4.
approaches are genetic algorithm (GA), ant colony and Finally, conclusions are given in Section 5.
artificial neural network (ANN). GA and ant colony have been 2 Classical Ciphers
successfully applied in cryptanalysis of classical ciphers. Classical ciphers are often divided into substitution ciphers
Therefore, this paper will review these techniques and explore and transposition ciphers. There are many types of these
the potential of using BIT in cryptanalysis. ciphers. In this paper, we focus on simple substitution cipher
Keywords: Cryptanalysis, Genetic Algorithm, Artificial and two types of transposition cipher namely columnar
neural network, Ant Colony. transposition cipher and permutation cipher. The ciphers are
1 Introduction vulnerable to cipher text-only attacks by using frequency
There are many cryptographic algorithms (cipher) that have analysis.
been developed for information security purposes such as the Basically, a simple substitution cipher is a technique of
Data Encryption Standard (DES), Advanced Encryption replacing each character with another character. The mapping
Standard (AES) and Rivest-Shamir-Adleman (RSA). These function of replacing the characters is represented by the key
are some examples of a modern cipher. The foundation of the used. For this purpose of study, white spaces are ignored while
algorithms, especially block ciphers, is mainly based on the other special characters like comma and apostrophe are
concepts of a classical cipher such as substitution and removed. Example 1 shows a simple substitution cipher:
transposition. For instance, DES uses only three simple Alphabet: A B C D E F G H I J K L M N O P Q R S T U V
operator namely substitution, permutation (transposition) and WXYZ
SIP0303-1
CONFERENCE ON “SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM (SPRTOS)” MARCH 26-27 2011
Key: M N F Q Y A J G R Z K B H S L C I V U D O W T E P can also be written in group of five characters. Using the same
X plaintext and key of the previous example, the cipher text of
Example 1 the permutation cipher is produced as depicted in example 3 as
Plain Text: - KAMLA NEHRU INSTITUTE OF follows:
TECHNOLOGY Key: - plain text order: - 1 2 3 4 5 6 7
Cipher text: - KMHBM SYGVO RSUDRDODY LA Cipher text order: - 4 7 2 6 1 3 5
DYFGSLBLJP Order: - 1234567 1234567 1234567 1234567 1234567
The idea of a transposition cipher is to alter the position of a Example 3
character to another position. In columnar transposition cipher, Plain text: KAMLANE HRUINST ITUTEOF TECHNOL
the plaintext is written into a table of fixed number of GYPQRSX
columns. The number of columns depends on the length of the Cipher Text: - LEANK MAITR SHUNT FTOIU EHLEO
key. The key represents the order of columns that will become TCNQX YSGPR (P, O, R, S, X, are dummy variable)
the cipher text. We only consider 26 characters in the In both simple substitution and transposition cipher, there are
alphabet, so all special characters are removed. For example, same disadvantage which regards to the frequency of
the plaintext “KAMLA NEHRU INSTITUTE OF characters. Based on the Example 1, the character K is
TECHNOLOGY” with the key “4726135” is transformed to replaced with K, A with M and so forth. Therefore, the
cipher text by inserting it into a table as shown in the example frequency of each character in the plaintext will be exactly the
in Example 2. same as the frequency of its corresponding cipher text
character. Hence, the encryption algorithm preserves the
4 7 2 6 1 3 5 frequency of characters of the plaintext in the cipher text
K A M L A N E because it merely replaces one character with another. Still,
H R U I N S T the frequency of characters depends on the length of the text
I T U T E O F and probably, some characters are not even used in plaintext.
T E C H N O L As shown in the above example, the character P, Q and R are
Four dummy alphabets (here, P, Q, R and S) are added for simple substitution cipher. Analyses were done by using
complete the rectangle and the cipher text can be written in frequency of single character (unigram), double character
group of five characters [4]. So the cipher text of this cipher is (bigram), triple character (trigram) and so on (n-grams). The
“KHITO ARTEG MUUCY LITHP ANENQ NSOOR technique used to compare candidate keys to the simple
The permutation cipher operates by rearranging each character the cipher text with the language of the text. In the effort of
in a plaintext block by block based on a key. The size of the attacking the transposition cipher, the multiple anagramming
block is the same as the length of the key and the cipher text attack can be used. The cipher text is written into a table
SIP0303-2
CONFERENCE ON “SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM (SPRTOS)” MARCH 26-27 2011
which the number of columns represents the length of the key. will further explore the usage of this algorithm in
For columnar cipher, the cipher text is written into the table cryptanalysis in Section 4.
column by column from left to right while in permutation 3.2 Ant Colony Optimization
cipher, the cipher text is written row by row from top to Ant colony optimization is inspired by the pheromones trail
bottom. After that, the columns are rearranged to form laying and following behavior of real ants which use
readable plaintext in every row. pheromones as a communication medium. This approach was
3 Biological Inspired Techniques proposed for solving hard combinatorial optimization
BIT is a method that takes ideas from biology to be used in problems [9]. An important aspect of ant colonies is the
computing. It relies heavily on the fields of biology, computer collective action of many ants result in the location of the
science and mathematics. Some of BIT approaches are GA, shortest path between a food source and a nest. Standard ant
artificial neural network (ANN), DNA, Cellular Automata, ant colony optimization (ACO) algorithm contains probabilistic
colony, particle swarm optimization and membrane transition rule, goodness evolution and pheromone updating
computing. Four of these techniques namely GA, ant colony [6]. In cryptanalysis, ACO algorithm has been applied in
and ANN, Cellular automata describe later in this section. breaking transposition cipher and block cipher. Cryptanalysis
3.1 Genetic Algorithm of transposition cipher published in [6] is reviewed in Section
Genetic Algorithm (GA) is a technique that is used to optimize 4 of this paper.
searching process and was introduced by Holland in 1975 [5]. 3.3 Artificial Neural Network
This algorithm is based on natural selection in the biological Artificial Neural Networks (ANN) can be defined as
sciences [7]. There are several processes in GA namely computational systems inspired by theoretical immunology,
selection, mating and mutation. In the beginning of the cycle, observed immune functions, principles and mechanisms in
a set of random population is created as the first generation. order to solve problems [8]. ANN can be divided to
Elements that make up the population are the potential population-based algorithm such as negative selection and
solution to the problem. The population is represented by clonal selection algorithm and network-based algorithm such
strings. Then, pairs of strings are selected based on a certain as continuous and discrete immune networks. ANN has been
criteria called a fitness function. These pairs are known as applied to a wide variety of application areas such as pattern
parents and will be mated to produce children. The children recognition and classification, optimization, data analysis,
are then mutated based on a mutation rate because not all computer security and robotic [8]. Hart and Timmis et. l.
children are mutated. After the mutation process, a new set of categorized these application areas and some others into three
population is formed (the next generation). The cycle major categories namely learning, anomaly detection and
continues until some stopping condition is met such as a optimization. In optimization, most of the papers published are
maximum number of generations. This algorithm has been based on the application of clonal selection principle using the
successfully applied in cryptanalysis of classical and modern algorithm such as Clonalg, opt-AINET and B-cell algorithm.
ciphers such as simple substitution, polyalphabetic, De Castro & Von Zuben [8] proposed a computational
transposition, knapsack, rotor machine, RSA and TEA. We implementation of the clonal selection algorithm (it is now
SIP0303-3
CONFERENCE ON “SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM (SPRTOS)” MARCH 26-27 2011
called Clonalg). The authors compared their algorithm‟s Classical cipher was successfully attacked using various
performance with GA for multi-modal optimization and argue metaheuristic techniques. Metaheuristic is a heuristic method
that their algorithm was capable of detecting a high number of for solving a very general class of computational problems.
sub-optimal solutions, including the global optimum of the Therefore, this technique is commonly used in combinatorial
function being optimized. Castro [8] extended this work by optimization problems. Some of metaheuristic techniques that
using immune network metaphor for multi-modal were successfully applied in the cryptanalysis of classical
optimization. Clonal selection has also been used in cipher are genetic algorithm, simulated annealing, tabu search
optimization of dynamic functions. The result is compared , ant colony optimization and hill climbing. In this paper, we
with evolution strategies (ES) algorithm. The comparison is will review BIT techniques that have been successfully
based on time and performance and shows that clonal applied in cryptanalysis of classical ciphers (simple
selection is better than ES in small dimension problems. substitution and transposition cipher). Spillman et al have
However, in higher dimension, ES outperformed the clonal published their paper on the cryptanalysis of simple
selection in time and performance. Other than that, somr substitution cipher using genetic algorithm in 1993. The paper
author applied the Clonalg in a scheduling problem, with the is an early work done by using GA in cryptanalysis and it is a
name clonal selection algorithm for examination timetabling good choice for re-implementation and comparison [4]. In [4],
(CSAET). The research shows that CSAET is successful in the authors review some idea about genetic algorithm before
solving problems related to scheduling. From the comparison they show the steps on how the algorithm is applied in the
performed between CSAET with GA and memetic algorithm, cryptanalysis. The aim of the attack is to find the possible key
CSAET produced quality output as good as those algorithms. values based on frequency of characters in the cipher text. The
Therefore, literature shows that ANN is capable of producing key is sorted from the most frequent to the least frequent
good results in various fields especially regarding characters in the English language. In the selection process,
optimization. It is hoped that ANN will also find its way in pairs of keys (parents) are randomly selected from the
cryptanalysis. population (contains a set of keys that is randomly generated
3.4 Cellular Automata for the first generation) based on fitness function. The fitness
A cellular automaton is a decentralized computing model function compares unigram and bigram frequencies characters
providing an excellent platform for performing complex in the known language with the corresponding frequencies in
computation with the help of only local information. Nandi et the cipher text. Keys with higher fitness value have more
al. presented an elegant low cost scheme for CA based cipher chance of being selected. Mating is done by combining each
system design. Both block ciphering and stream ciphering of the pairs of parents to produce a pair of children. The
strategies designed with programmable cellular automata children are formed by comparing every element (character) in
(PCA) have been reported. Recently, an improved version of each pair of parents. After that, one character in the key can be
the cipher system has been proposed. change with a randomly selected character based on a
4 BIT in cryptanalysis mutation rate in the mutation process. The selection, mating
and mutation processes continue until a stopping criterion is
SIP0303-4
CONFERENCE ON “SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM (SPRTOS)” MARCH 26-27 2011
met. Another paper published in 1993 utilizing genetic transposition cipher which involves differing heuristics,
algorithm in cryptanalysis was by Matthews. However, the processing time and success criteria. The comparison shows
paper is focuses on transposition cipher. The attack is known that the ACS algorithm can decrypt cryptograms which are
as GENALYST. The attack finds the correct key length and significantly shorter than other methods due to the use of
correct permutation of the key of a transposition cipher. dictionary heuristics in addition to bigrams.
Matthews uses a list containing ten bigram and trigram yang 5 Conclusion
that have been given weight values to calculate the fitness. For This paper reviews works on cryptanalysis of classical ciphers
instance, the trigram „THE‟ and „AND‟ are given a score of using BIT approaches. The types of classical ciphers involved
„+5‟ while „HE‟ and „IN‟ are given a score of „+1‟. Matthews are the simple substitution and transposition cipher while GA
also give „-5‟ score for the trigram of „EEE‟. This is because, and ant colony optimization is the techniques used. GA has
although „E‟ is very common in English, but a word been applied to both ciphers but only transposition cipher was
containing a sequence of three „E‟s is very uncommon in found to have been implemented using ant colony. ANN is
normal English text. Higher fitness values have more chance also discovered to be a promising approach to be employed in
of being selected. After the selection process has been done, cryptanalysis based on its ability to solve optimization
mating is performed using a position-based crossover method. problems. Therefore, the application of ANN in cryptanalysis
Then, the mutation process is applied. There are two possible should be further studied,
mutation types that can be applied. First, randomly swap two References
elements and second, shift forward all elements by a random [1] Rsa from wikipedia. http://en.wikipedia.org/wiki/RSA.
number of places. The experiment was done by using [2]. A. Menezes, P. van Oorschot, and S. Vanstone. Handbook
population size of 20, 25 generations and crossover decreases of Applied Cryptography. CRC Press, New York, NY, 1997.
from 8.0 to 0.5. The result shows that GENALYST is [3] S. Nandi, B. K. Kar, and P. Pal Chaudhuri. Theory and
successful in breaking the cipher with key lengths of 7 and 9. applications of cellular automata in cryptography. IEEE
Ant colony optimization has also been successfully Transactions on Computers, 43(12):1346–1357,1994.
implemented in the cryptanalysis of transposition cipher 4]. Lin, Feng-Tse, & Kao, Cheng-Yan. (1995). A genetic
published in [8]. The paper uses specific ant algorithm named algorithm for ciphertext-only attack in cryptanalysis. In IEEE
Ant Colony System (ACS) with known success on the International Conference on Systems, Man and Cybernetics,
Traveling Salesman Problem (TSP), to break the cipher. The 1995, (pp. 650-654, vol. 1).
authors used the bigram adjacency score, Adj(I,J) to define the [5]. Holland, J. H. (1975). Adaptation in natural and artificial
average probability of the bigram created by juxtaposing systems. Ann Arbor: The University of Michigan Press.
columns I and J. The score will be higher for two correctly [6]. Clark, J. A. (2003) Invited Paper. Natured- Inspired
aligned columns. Other than that, they also used dictionary Cryptography: Past, Present and Future. IEEE Conference on
heuristic, Dict(M) for the recognition of plaintext. The authors Evolutionary Computation 2003. Special Session on
also made a comparison between the results produced by ACS Evolutionary Computation and Computer Security. Canberra.
with the result of previous metaheuristic techniques in
SIP0303-5
CONFERENCE ON “SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM (SPRTOS)” MARCH 26-27 2011
[7]Goldberg, D., (1989) Genetic Algorithms in Search, [15] Schmidt, T.; Rahnama, H.; Sadeghian, A. , A review of
Optimization, and Machine Learning. Reading MA: Addison- applications of artificial neural networks in cryptosystems ,
Wesley. Automation Congress, 2008. WAC 2008. World , Page(s): 1 –
[8].de Castro, L. N. (2002) Immune, Swarm and Evolutionary 6
Algorithms Part I: Basic Models. International Conference on [16] Godhavari, T.; Alamelu, N.R.; Soundararajan,
Neural Information Processing Vol. 3 pp 1464-1468. R.,Cryptography Using Neural Network ,INDICON, 2005
[9]. S.N.Sivanandam · S.N.Deepa “Introduction to Genetic Annual IEEE , Page(s): 258 - 261
Algorithms, Springer-Verlag Berlin Heidelberg 2008. [17] R. Spillman, M. Janssen, B. Nelson, and M. Kepner. Use
[10] Xu Xiangyang, The block cipher for construction of S- of a genetic algorithm in the cryptanalysis of simple
boxes based on particle swarm optimization, 2nd International substitution ciphers. Cryptologia, 1993,17(1):31–44.
Conference on Networking and Digital Society (ICNDS), [18] Diffie, W. and Hellman, M. (1976). New Directions in
2010 , Page(s): 612 - 615 Cryptography. IEEE Transactions on Information Theory,
[11] Uddin, M.F.; Youssef, A.M, Cryptanalysis of Simple 22(6): 644-654.
Substitution Ciphers Using Particle Swarm Optimization”, [19] Tarek Tadros, Abd El Fatah Hegazy, and Amr Badr
IEEE Congress on Evolutionary Computation, 2006. Page(s): ,Genetic Algorithm for DES Cryptanalysis,IJCSNS
677 – 680 International Journal of Computer Science and Network
[12] Mohammad Faisal Uddin; Amr M. Youssef , An Security, VOL.10 No.5, May 2010
Artificial Life Technique for the Cryptanalysis of Simple [20]Forrest, S., Perelson, A. S. Allen, L. and Cherukuri, R.
Substitution Ciphers , Canadian Conference on Electrical and (1994). Self-nonself Discrimination in A Computer.
Computer Engineering, 2006, Page(s): 1582 - 1585 Proceedings of IEEE Symposium on Research in Security and
[13] Khan, S.; Shahzad, W.; Khan, F.A. , Cryptanalysis of Privacy, Los Alamos, CA. IEEE Computer Society Press.
Four-Rounded DES Using Ant Colony Optimization [21] Stallings, W. (2003). Cryptography and Network
rd
,International Conference on Information Science and Security: Principles and Practices, 3 Edition. Upper Saddle
Applications (ICISA), 2010 , Page(s): 1 - 7 River, New Jersey: Prentice Hall.
[14] Ghnaim, W.A.-E.; Ghali, N.I.; Hassanien, A.E., Known- [22] Spillman, R. (1993). Cryptanalysis of Knapsack Ciphers
ciphertext cryptanalysis approach for the Data Encryption Using Genetic Algorithms. Cryptologia, XVII(4):367-377.
Standard technique, International Conference on Computer [23] Clark, J.A. (2003). Nature-Inspired Cryptography: Past,
Information Systems and Industrial Management Applications Present and Future. In Proceedings of Conference on
(CISIM), 2010 , Page(s): 600 - 603 Evolutionary Computation, 8-12 December. Canberra,
[14] AbdulHalim, M.F.; Attea, B.A.; Hameed, S.M., A binary Australia.
Particle Swarm Optimization for attacking knapsacks Cipher [24] Clark, A. (1998). Optimization Heuristics for Cryptology.
Algorithm ,International Conference on Computer and Ph.D. Dissertation, Faculty of Information Technology,
Communication Engineering ,2008. Page(s): 77 - 81 Queensland University of Technology, Australia.
SIP0303-6
CONFERENCE ON “SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM (SPRTOS)” MARCH 26-27 2011
[25] Bagnall, A.J. (1996). The Applications of Genetic Annual Workshop on Selected Areas in Cryptography, Aug.
Algorithms in Cryptanalysis. M.Sc. Thesis. School of 11-12, SAC 1997.
Information System, University of East Anglia. [34] Millan, W., Clark, A. and Dawson, E. (1998). Heuristic
[26] Dimovski, A., Gligoroski, D. (2003). Attack on the Design of Cryptographically Strong Balanced Boolean
Polyalphabetic Substitution Cipher Using a Parellel Genetic Functions. Advances in Cryptology – EUROCRYPT ‟98,
Algorithm. Technical Report, Swiss-Macedonian Scientific LNCS 1403, 489-499, Springer-Verlag, Berlin Heidelberg.
Cooperation through SCOPES Project, March 2003, Ohrid, [35] Dimovski, A., Gligoroski, D. (2003). Generating Highly
Macedonia. NonLinear Boolean Functions Using a Genetic Algorithm. In
st
[27] Dimovski, A., Gligoroski, D. (2003). Attacks on Proceedings of 1 Balcan Conference on Informatics,
Transposition Cipher Using Optimization Heuristics. In November, Thessaloniki, Greece.
Proceedings of ICEST 2003, October, Sofia, Bulgaria.
[28] Morelli, R.A. and Walde, R.E. (2003). A Word-Based
Genetic Algorithm for Cryptanalysis of Short Cryptograms.
Proceedings of the 2003 Florida Artificial Intelligence
.
Research Symposium (FLAIRS – 2003), pp. 229-233.
[29] Morelli, R.A., Walde, R.E., Servos, W. (2004). A Study
of Heuristic Search Algorithms for Breaking Short
Cryptograms. International Journal of Artificial Intelligence
Tools (IJAIT), Vol. 13, No. 1, pp. 45-64, World Scientific
Publishing Company.
[30] Servos, W. (2004). Using Genetic Algorithm to Break
Alberti Cipher. Journal of Computing Science in Colleges,
Vol. 19(5): 294-295.
[31] Hernandez, J.C., Sierra, J.M., Isasi, P., Ribagorda, A.
(2002). Genetic Cryptanalysis of Two Rounds TEA. ICCS
2002, LNCS 2331, 1024 – 1031, Springer-Verlag Berlin
Heidelberg.
[32] Ali, H. and Al-Salami, M. (2004). Timing Attack
Prospect for RSA Cryptanalysis Using Genetic Algorithm
Technique. The International Arab Journal of Information
Technology, 1(1).
[33] Millan, W., Clark, A. and Dawson, E. (1997). Smart Hill
th
Climbing Finds Better Boolean Functions. Proceedings of. 4
SIP0303-7
CONFERENCE ON ―SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM (SPRTOS)‖ MARCH 26-27 2011
Abstract— The aim of this study is to motor impairments (severe cerebral palsy,
detect eye movement (left to right) from head trauma and spinal injuries) may use
Electroencephalograph (EEG) signal. such a BCI system as an alternative form of
Four electrodes of EEG in the frontal communication by mental activity [1]. Using
area were used. The statistical features improved measurement devices, computer
were extracted from the four channels of power, and software, multidisciplinary
frontal channel. These features were then research teams in medicine,
fed into a classifier based on the linear psychophysiology, medical engineering, and
discriminator function. The most information technology are investigating and
prominent features for the classification realizing new noninvasive methods to
of left and right movements were monitor and even control human physical
identified. These features were then functions.
interfaced with computer so that cursor
movement can be controlled. Electrodes In a bigger picture – there can be devices
are placed along the scalp following the that would allow severely disabled people to
10-20 International System of Electrode function independently. For a quadriplegic,
Placement. Recorded data was filtered, something as basic as controlling a computer
windowed and analysed in order to cursor via mental commands would
extract features. Four different classifiers represent a revolutionary improvement in
were used. Best results were found in quality of life. With an EEG or implant in
support vector machine (SVM) and linear place, the subject would visualize closing his
classifiers each of which gave the average or her eyes or moving eyes from left to right
accuracy of 90%. and vice versa [2]. The software can learn
eye movement through training, using
repeated trials. Subsequently, the classifier
Keywords: BCI, Eye movement, EEG.
may be used to instruct the closure/opening
I. INTRODUCTION of eye. A similar method is used to
manipulate a computer cursor, with the
A brain-computer interface (BCI) subject thinking about forward, left, right
provides an alternative communication and back movements of the cursor [3]. With
channel between the human brain and a enough practice, users can gain enough
computer by using pattern recognition control over a cursor to draw a circle, access
methods to convert brain waves into control computer programs and control a television.
signals. Patients who suffer from severe It could theoretically be expanded to allow
SIP0304-1
CONFERENCE ON ―SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM (SPRTOS)‖ MARCH 26-27
2011
users to "type" with their thoughts. This can The term ―Brain-Computer Interface‖ first
be achieved by controlling cursor movement appeared in scientific literature in the 1970's,
on a computer screen through EEG signals though the idea of hooking up the mind to
from brain, specifically, generated due to computers was nothing new [5]. Currently,
eye movement. The signals can be analysed the systems are ―open loop‖ and responds to
by different methods. user‘s thoughts only. The ―closed loop‖
systems are aimed to be developed that can
Traditional analysis methods, such as the give feedback to user as well.
Fourier Transform and autoregressive
modelling are not suitable for non-stationary In order to meet the requirements of the
signals. Recently, wavelets have been used growing technology expansion, some kind of
in numerous applications for a variety of standardization was required not only for the
purposes in various fields. It is a logical way guidance of future researchers but also for
to represent and analyse a non-stationary the validation and checking of new
signal with variable sized region windows developments with other systems, thus a
and to provide local information. In the general purpose system was developed
Fourier Transform (FT), the time called BCI2000 which made analysis of
information is lost and in short Term Fourier brain siganl recording easy by defining the
Transform (STFT) there is limited time output formats and operating protocols to
frequency resolution. Even though basic facilitate the researchers in developing any
filters can be used for decomposition of type of application. This made it easier to
desired bands, ideal filters are never realised extract specific features of brain activity and
in practice, which results in aliasing effects. translate them into device control signals
However, wavelet analysis enables perfect [7]..
decomposition of the desired bands, which
helps us to obtain better features [4]. III. OUR METHODOLOGY
In this paper different features are used The procedure in this study was to initially
for training the classifier for eye movement acquire EEG data. The stored data was then
in left and right directions. A time-frequency pre-processed to remove artifacts.
analysis was applied to the EEG signals Subsquently features were extracted in the
from different channels, to determine clean EEG and used for classification. Thus
combination of features and channels that methodology is shown in Fig. 1.
yielded the best classification performance.
SIP0304-2
CONFERENCE ON ―SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM (SPRTOS)‖ MARCH 26-27
2011
A.Experimental Setup and Data Acquisition BrainTech software. EEG of the frontal lobe
The subject was seated on wooden armchair channels for subject 1 is illustrated in Fig. 3.
and legs were rested on wooden footrest Frontal lobe channels
(wooden items should be used so as to fp1f3
reduce interference) with eyes closed. The fp1f7
1500 fp2f4
subject was instructed to avoid speaking and fp2f7
to avoid body movement in order to ensure
Amplitude
1000
relaxed body. EEG data were recorded using
a Brain Tech clarityTM system [9] with the 500
electrodes positioned according to the
standard 10-20 system in the biomedical 0
-10
Right to -20
left Relax
movement -30
-40
0 20 40 60 80 100 120 140
Frequency (Hz)
Fig. 4: Power Spectral Density of FP1F3
Left to
Relax right
IIR second order notch filter with the
movement quality factor (or Q factor) of 3.91 was used
to remove the undesired frequency
Fig. 2 Sequence followed during experimental recording components.
Signal after removing the artifacts of 4
channels stacked over one another is shown
B. Data Processing in Fig. 5.
SIP0304-3
CONFERENCE ON ―SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM (SPRTOS)‖ MARCH 26-27
2011
0
IV. RESULTS AND DISCUSSIONS
-500
0 100 200 300 400 500
For each frame of EEG, four features were
Fig. 5: Signal Plot of filtered Frontal lobe associated calculated namely, variance, mean, skewness
channels
EEG by nature is non stationary signal. So it and cross correlation. The seperabrability
was fragmented into frames so that it can be provided by each feature was individually
assumed stationary for small segment. EEG tested. The best three features were
data is divided into frames of 1s duration i.e. subsequently used as an input to the
frame size of 256 samples. classifier. Four classifiers were used in this
work. The classifiers results are illustrated in
Table 1.For each movement of LTR and
C. Feature extraction RTL 20 seconds (20 frames) of data were
collected. From these 20 frames 15 frames
Feature extraction is the process of
were used for training and rest 5 are used for
discarding the irrelevant information to the
testing for both movements.
possible extent and representing relevant data
in a compact and meaningful form. Two eye
Table 1: Percentage accuracy of classification for eye
movements were recorded: right to left
movements
(RTL), left to right (LTR).Standard statistical
parameters such as mean, variance, Classifier RTL LTR
skewness, cross-correlation were calculated
for all the channels in each movement type. SVM 80 100
SIP0304-4
CONFERENCE ON ―SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM (SPRTOS)‖ MARCH 26-27
2011
20
.
REFERENCES
10
-15 -10 -5 0 5 10 15 20
1. The "10-20 System of Electrode Placement‖
http://faculty.washington.edu/chudler/1020.html
Fig. 6: Plot of Classifier in Signal Space
2. Y. U. Khan,(2010) ‘Imagined wrist movement classification in
single trial EEG for brain computer interface using wavelet
packet‘, Int. J. Biomedical Engineering and Technology, Vol. 4,
No. 2, pp169-180.
A linear classifier classifying both eye
movements is shown in Fig. 6. 3. Daniel, J. Szafir (2009-10) ‗Non-Invasive BCI through EEG ―An
Exploration of the Utilization of electroencephalography to Create
Variance of FP2F4 Thought-Based Brain-Computer Interfaces‖.
1000
RTL 4. Wolpaw, J.R., Birbaumer, N., McFarland, D.J., Pfurtscheller, G.,
LTR Vaughan, T.M. (2002): Brain–computer interfaces for
800
communication and control. Clinical Neurophys. pp767–791
V. CONCLUSIONS
SIP0304-5
CONFERENCE ON “SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM (SPRTOS)” MARCH 26-27 2011
SIP0333-1
CONFERENCE ON “SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM (SPRTOS)” MARCH 26-27 2011
SIP0333-2
CONFERENCE ON “SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM (SPRTOS)” MARCH 26-27 2011
A. Fuzzification
In this system we are considering the atrial and
ventricular heart rates, QRS complex width and
PR interval values as the input linguistic variables,
which are passed to the inference engine.
Based on the rule base and linguistic variables,
the fuzzy system output is obtained.
Fig.2 Internet based system
B. Defuzzification
B. LABVIEW The defuzzified values are the risk levels high
LabVIEW is a graphical programming language risk, medium risk, low risk which are obtained
developed by National instruments. Programming according to the weights of fuzzy variables.
with LabVIEW gives a vivid picture of data flow by C. Relation between input and output variables
the graphical representation in blocks. labview is The relationship between input and output is
used here for getting the ECG waveform and also shown by a 3-Dimensional figure 4. shown below
for analyzing the parameters like PR interval, QRS
width, heart rates which are later passed to the fuzzy
system.
LabVIEW offers modular approach and parallel
computing , which makes easier for developing
complex systems. Debugging tools like probes,
Highlight execution are handy in analyzing where
actually the error occurred.
C. Fuzzy system
Fuzzy controllers are the widely employed as they
are efficient controllers when working with the Fig 4. Relation between input and output
vague values. A Fuzzy controller has a rule base in
“IF-THEN” fashion, which is used for identification D. Fuzzy Rules
of the risk level of disease using the weight. In this Fuzzy system we are using the centre of
A Fuzzy system is generally given by Fig 3. area method as the fuzzificaton method. The rule
base of the fuzzy system consists of rules in the
form of “If-Then”. The risk levels are dependent on
the number of conditions are met by the input
variables for the respective cardiac disorder. As
there is no particular rule of identifying the
arrhythmia based on heart rate, since it can differ
from patient to patient and so this system thus is
more accurate in determining the arrhythmia since it
is not based only on heart rate.
SIP0333-3
CONFERENCE ON “SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM (SPRTOS)” MARCH 26-27 2011
Fuzzy rule base is acts like a database of rules for IV. RESULTS
selecting the output, basing on the input quantities. This system is able to measure the arrhythmias
Some of the rules are:- accurately and also publish it online.
1. IF 'PR interval' IS 'Normal' AND 'vHR' IS
'30,40' AND 'aHR' IS '60,75' THEN 'First Degree
Block' IS 'No ' ALSO 'Third Degree block' IS
'Medium Risk'
2. IF 'PR interval' IS 'Normal' AND 'vHR' IS '30,40'
AND 'aHR' IS '75,90' THEN 'First Degree Block' IS
'No ' ALSO 'Third Degree block' IS 'Medium Risk'
3. IF 'PR interval' IS 'Normal' AND 'vHR' IS '30,40'
AND 'aHR' IS '90,100' THEN 'First Degree Block'
IS 'No ' ALSO 'Third Degree block' IS 'High Risk'.
4. IF 'vHR' IS '150,180' AND 'QRS Width' IS
'Narrow QRS' THEN 'Ventricular Tachycardia at' IS
'Low risk' ALSO 'Junctional Tachycardia at' IS 'Low
Risk' ALSO 'Supra Ventricular Tachy at' IS 'High
Risk'
5. IF 'vHR' IS '180,210' AND 'QRS Width' IS
'Normal QRS' THEN 'Ventricular Tachycardia at' IS
'Low risk' ALSO 'Junctional Tachycardia at' IS
'High Risk' ALSO 'Supra Ventricular Tachy at' IS Fig 5. Block Diagram for extracting
'Low Risk' ECG waveform
SIP0333-4
CONFERENCE ON “SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM (SPRTOS)” MARCH 26-27 2011
Above figure 6. Shows the block diagram of [1] N.Noury and P.Pilichowski,”A telematic system
risk level detection , we show how we called the tool for home health care,”-in proc. IEEE 14th
fuzzy system into the main panel for diagnosing and Annu.Int.conf.EMBS, Paris, oct.1992, PP.1175-
risk level indication. 1177
Fig 7 shows the Front panel which is developed [2] Zhenyu Guo and John c.Moulder “An internet
from the fuzzy system ,and is sent to the doctor based Telemedicine system”IEEE transactions, pp.
using web publishing tool for the second advice 2000
.System also have a database to save the details of
[3].Volodymyr Hrusha, Olexandr Osolinskiy,
patient like Name, Age, Sex, Symptoms which can
used for the next time.. Pasquale Daponte, Domenico Grimaldi”Distributed
Web-based Measurement system” IEEE Workshop
on Intelligent Data and Advanced Computing
System Technology and Applications pp, on 5-7
2005
1. Acquisition and Analysis System of the ECG
Signal Based on LabVIEW by Lina Zhang,
Xinhua Jiang.
2. QRS DETECTION USING A FUZZY NEURAL
NETWORK Kevin P. Cohen, Willis J.
Tompkins, Adrianus Djohan, John G. Webster
and Yu H. Hu.
3. Classification of ECG Arrhythmias using Type-2
Fuzzy
Clustering Neural Network
4. Robust techniques for remote real time
arrhythmias classification system
5. ECG Arrhythmia Detection Using Fuzzy
Classifiers by
S. Zarei Mahmoodabadi ,A. Ahmadian, M. D.
Abolhassani, J. Alireazie P. Babyn
6. Discrimination of Cardiac Arrhythmias Using a
Fuzzy Rule-Based Method by E Chowdhury,
Fig 7. Front panel LC Ludeman.
7. Automated ECG Rhythm Analysis Using Fuzzy
Reasoning by W Zong, D Jiang.
V. CONCLUSION
8. Fuzzy Classification of Intra-Cardiac
In this way we had developed a fuzzy Arrhythmias by Jodie Usher, Duncan Campbell,
system with good accuracy in determining the Jitu Vohra, Jim Cameron.
cardiac disorders with risk levels when compared
to the normal system considering the atrial and
ventricular heart rates, QRS complex width and
PR interval values as the input linguistic variables
using labVIEW. This report is successfully sent to
the doctors system using web publising tool for the
second advice.
REFERENCES:-
SIP0333-5
CONFERENCE ON “SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM (SPRTOS)” MARCH 26-27 2011
Abstract— Image searching is one of the fascinating The initial techniques which are used are based on the
topics for the advanced research since the 1990s. As fast textual annotation of the images. Using the text
there is advancement in the computer and network descriptions, images can be organized by topical or
technologies coupled with relatively cheap high volume semantic hierarchies to facilitate easy navigation and
data storage devices have brought tremendous growth in browsing based on standard Boolean queries. Content
the amount of digital images, hence the development of Based Image Retrieval is one of the major approaches of
pattern recognition is also increases exponentially. Pattern image retrieval that has drawn significant attention in the
recognition is the act of taking in raw data and classifying past decade, which uses visual contents to search images
it into predefined categories using statistical and empirical from large scale image database according to users
methods. Content based image retrieval (CBIR) is one of interests Low Level image features such as color, texture,
the widely used applications of pattern recognition for shape and structure are extracted from images. Relevant
finding images from vast and un-annotated image images are retrieved based on the similarity of their image
database. In CBIR images are indexed on the basis of features. Examples of some of the prominent systems are
low-level features, such as color, texture, and shape, QBIC, Photobook, and NETRA. In this paper we discuss
which can automatically be derived from the visual the different algorithms used to extract the different
content of the images. The paper discusses techniques and features of an image. In this paper we also discuss the
algorithm that are used to extract these image features future advancement of the Context Based Image Retrieval
from the visual content of the images & the advancement techniques, how can be it beneficial in different fields.
which can be done using the CBIR. The various similarity We also discuss the futuristic approaches to attain this
measures are used to identify the closely associated technique in more advanced way.
patterns. These methods compute the distance between
the features generated for different patterns and identify
the closely related patterns and these patterns are then 1. Image Retrieval
generated as the result. This paper unfolds a novel
application using context based image retrieval for search A recent study of literature in image indexing and
the detailed description of an image without knowing a retrieval has been conducted based on 100 papers from
single word about it. This paper also proposes algorithms Web of Science. Two major research approaches, text-
to create such a utility. based (description-based) and content-based, were
identified. It appears that researchers in the information
science community focus on the text-based approach
Keywords: Context Based Image Retrieval, Image
while researchers in computer science focus on the
Searching.
content-based approach. Text-based image retrieval
INTRODUCTION (TBIR) makes use of the text descriptors to retrieve
relevant images. Some recent studies found that text
descriptors such as time, location, events, objects,
SIP0401-1
CONFERENCE ON “SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM (SPRTOS)” MARCH 26-27 2011
formats, aboutness of image content, and topical terms are Barbara (UCSB) [5, 6]. NETRA supports features of
most helpful to users. The advantage of this approach was color, texture, shape, and spatial information of
that it enabled widely approved text information retrieval segmented image regions to region-based search. Images
systems to be used for visual retrieval systems. are segmented to homogenous regions. Using the region
as the basic unit, users can submit queries based on
1.1. Content-based image retrieval features that combine regions of multiple images. For
example, a user may compose queries such as retrieve all
In CBIR, the images are indexed by features that are images that contain regions having color of a region of
derived directly from the images. The features are always image A, texture of a region of image B, shape of a region
consistent with the image and they are extracted and of image C.
analyzed automatically by means of computer processing,
instead of manual annotation. Due to the difficulty of
automatic object recognition, information extracted from 1.1.1 Image features
images in CBIR is rather low level, such as colors,
textures, shapes, structure and combinations of the above. One of the main foci in CBIR is the means for extraction
A number of representative generic CBIR systems have of the features of the images and evaluation of the
been developed in the last ten years. These systems have similarity measurement between the features. Image
been implemented in different environments, some of features refer to the characteristics which describe the
which are Web based while some are GUI-based contents of an image. In this paper, image features are
applications. QBIC, Photobook, and NETRA are the most confined to visual features that are derived from an image
prominent examples. directly. There have been extensive studies of various
sorts of visual feature. The simplest form of visual feature
QBIC is developed at the IBM Almaden Research Centre is directly based on pixel values of the image. However,
[1, 2, 3]. It is the first commercial CBIR application and these types of visual feature are very sensitive to noise,
plays an important role in the evolution of CBIR systems. brightness, hue and saturation changes, and are not
The QBIC system supports low level image features of invariant to spatial transformations such as translation and
average color, color histogram, color layout, texture and rotations. As a result, CBIR systems that are based on
shape. Additionally, users can provide pictures or draw pixel values do not generally have satisfactory results.
sketches as example images in query. The visual queries Much of the research in this area has placed the emphasis
can also be combined with textual keyword predicates. on computing useful characteristics from images using
Photobook [4], developed at the MIT Media Lab. It is a image processing and computer vision techniques.
tool for performing queries on image databases based on Usually, general purpose features in CBIR have included
image content. It works by comparing features associated Text, color, texture, shape and Layout.
with images, not the images themselves. These features
are in turn the parameter values of particular models fitted Color representations
to each image. These models are commonly color,
texture, and shape, though Photobook will work with Color histogram is the standard representation of color
features from any model. Features are compared using feature in CBIR system, initially investigated by Swain
one out of a library of matching algorithms that and Ballard. The histograms of intensity values are used
Photobook provides. It is a set of interactive tools for to represent the color distribution. This captures the
searching and querying images. It is divided into three global chromatic information of an image and is invariant
specialized systems, namely Appearance Photobook (face under translation and rotation about the view axis. Despite
images), Texture Photobook, and Shape Photobook, changes in view, change in scale, and occlusion, the
which can also be used in combination. The features are histogram changes only slightly. A Color histogram H
compared by using one of the matching algorithms. These (M) of image M is a 1-D discrete function representing
include Euclidean, Mahalanobis, divergence, vector space the
angle, histogram, Fourier peak, and wavelet tree Probabilities of occurrence of colors in images, which, is
distances, as well as any linear combination of those typically defined as:
previously discussed.
NETRA is a prototype image retrieval system that has H (M) = [ ]
been developed at them University of California, Santa
SIP0401-2
CONFERENCE ON “SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM (SPRTOS)” MARCH 26-27 2011
= k= 1, 2, 3 …. , n [Equation 1]
Where N is the number of pixels in image M and is the
number of pixels with image value k. The division
G (x, y) = ( ) × exp [- ( ) + 2 jWx]
normalizes the histogram such that:
= G( )
Texture representations
a > 1; m, n are integers
Many texture features have been investigated in the past,
including the conventional pyramid-structured wavelet Given an image with luminance, I (m, n), Gabor
transform (PWT) features, tree-structured wavelet decomposition can be obtained by multiplying the
transform (TWT) features, the multi-resolution luminance by the magnitude of the Gabor wavelet:
simultaneous autoregressive model (MR-SAR) features
and the Gabor wavelet features. Experiments have been
| |= I ( )
conducted and have found that the Gabor features [7, 8]
produce the best performance. The computation of Gabor [Equation 4]
features is given as follows. A two dimensional Gabor
function can be formulated as: The mean and standard deviation of the magnitude of the
transform coefficient are used to represent the texture
feature for classification and retrieval purposes:
SIP0401-3
CONFERENCE ON “SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM (SPRTOS)” MARCH 26-27 2011
(A) First of all filter out all the unuseful words like
preposition, adjective etc. from the whole text.
And then apply the given algorithms for assigning the
priority to remaining words.
APPLICATION BASED ON CONTEXT BASED (B) Now we have an Image and some words which
IMAGE RETRIEVAL AND WORKING PROCEDURE contain the top priority from each page.
(C) I upload an image to search the related images and its
The one of the future advancement of the CBIR is to description.
develop a platform for the users on which someone (D) The Context Based Image Searching is done to find
upload a image, query processor calculate the distance the related images.
between the images of the database & according to the (E) After searching, the words are also collected along
closeness of the images(distance between the images) it with the related images of the desired Image.
shows the related results for that image. Let suppose I am (F) Now one more filtering algorithm is apply for finding
a noob for Egypt and walking into the streets of Cairo. I the exact keyword related to that image, the frequency of
saw a monument, and I am eager to know about that then each word is calculated from the different results.
I just capture the image of it and upload on an application (G) Now we assign the top priority to the word which
of my mobile. The application processed the query image contains the highest frequency.
SIP0401-4
CONFERENCE ON “SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM (SPRTOS)” MARCH 26-27 2011
ACKNOWLEDGMENTS
REFERENCES
SIP0401-5
CONFERENCE ON “SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM (SPRTOS)” MARCH
26-27 2011
S.N. Panda,
Department of Physics,
Gunupur College, Gunupur,
Orissa, India
SIP0402-1
CONFERENCE ON “SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM (SPRTOS)” MARCH 26-27
2011
= x(m) sin z
N 2 sin (n m) z cos z
x(n) Equations (4) and (5) show that no
n m 1 sin (n m 1) z
N
complex multiplication is required during
= x(m) sin z 2 cos z x(n) sin (n m) z the recursive computation. Equation (5) is a
n m 1 discrete time recursive transfer function of
N
x(n) sin (n m 1) z finite duration input sequence, x(n), n = N,
n m 2 N-1, …,2,1. As a consequence, X(k) is
N
obtained as the output of a finite impulse
= x(m) sin z 2 cos z x(n) sin (n m) z response system. Fig. 1 shows the recursive
n m
N structure with the input sequence in reverse
x(n) sin (n m 1) z order for the realisation of X(k).
n m 2
SIP0402-2
CONFERENCE ON “SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM (SPRTOS)” MARCH 26-27
2011
Input sequence
x(1), …, x(n-1), x(n)
Z-1
sin k
2N Output X(k)
x(1), …, x(n-
2 cos k
1), x(n)
N
-1 x(1), …, x(n-
Z-1
1), x(n)
III. COMPARISONS WITH RELATED WORKS proposed algorithm are compared with the
corresponding parameters based on the other
The proposed approach requires N methods.
multiplications per point, and (2N-2)
additions per point for the realisation of N Table III gives the comparison of the
length DST. computation complexities of the proposed
algorithm with other algorithms found in the
In Tables I and II, the number of related research works.
multipliers and the number of adders in the
TABLE I
COMPARISON OF THE NUMBER OF MULTIPLIERS REQUIRED BY DIFFERENT ALGORITHMS
TABLE II
COMPARISON OF THE NUMBER OF ADDERS REQUIRED BY DIFFERENT ALGORITHMS
SIP0402-3
CONFERENCE ON “SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM (SPRTOS)” MARCH 26-27
2011
TABLE III
COMPUTATION COMPLEXITIES
of multiplications of additions
Proposed algorithm N 2N-2
[13] (3/4) N log2N - N + 3 (7/4) N log2N - 2N + 3
[14,16,20,23] (1/2) N log2N (3/2) N log2N - N + 1
[15,24,25] N log2N /2 + 1 3 N log2 N / 2 -N +1
[18] (1/2) N log2N + (1/4) N-1 (3/2) N log2N + (1/2) N-2
[21] 2(N+3)(N-1) / N 2(2N-1)(N-1) / N
[22] (N+1)(N-1) / N (2N+1)(N-1) / N
[26] if N is even 2N-3 3N+2
[26] if N is odd 2(N-1) 3N+4
IV. SYSTOLIC ARCHITECTURE and the rest (N-1) output are obtained in
subsequent (N-1) time-steps. However,
The structure of the proposed linear successive sets of N-point DSTs are obtained
systolic array for computation of N-point in every N time-steps. Each PE of the linear
DST is shown in Fig. 2. It consists of (N+1) array comprises of one multiplier and two
locally connected processing elements (PEs) adders, while the last PE contains one adder
of which the first N PEs are identical. The and one multiplier. The duration of the cycle
recurrence relation given by (3) is period is T = TM + 2TA, where TM and TA are,
implemented in the first N PEs, while the respectively, the times involved in
last PE computes the DST components. performing one multiplication and one
Function of each of the first N PEs is shown addition in the PE. This architecture requires
in Fig. 3 and that of the last PE is shown in N multiplications per point and (2N-2)
Fig. 4. One sample of the input data is fed to additions per point for realisation of N-point
each PE, one time-step staggered with DST. The hardware - and time-complexities
respect to the input of previous PE in the of the proposed systolic realisation along
reverse order i.e, i th input sample is fed to with those of the existing structures [27] -
(N+1-i) th PE in (N+1-i) th time-step. The [31] are listed in Table IV.
first output is obtained after (N+1) time steps
SIP0402-4
CONFERENCE ON “SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM (SPRTOS)” MARCH 26-27 2011
x(n-1)
x(n) 0
2 cosz
(N-1) TH N TH V1 (N+1) TH
0 1ST PE 2ND PE OUTPUT
PE PE PE [S]
V2
0
SIP0402-5
CONFERENCE ON “SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM (SPRTOS)” MARCH 26-27
2011
xin
ain aout
bin PE bout
cin cout
aout =ain
bout = xin + ain bin - cin
cout = bin
xin = Input sample
TABLE IV
HARDWARE - AND TIME-COMPLEXITIES OF PROPOSED STRUCTURE AND THE EXISTING SYSTOLIC STRUCTURES
FOR THE DST / DCT
Average Computation
Structures Multipliers Adders Cycle-Time (T)
- Time
Pan and Park [27] N 2N TM + TA NT/2
SIP0402-6
CONFERENCE ON “SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM (SPRTOS)” MARCH 26-27
2011
[2] H.B. Kekre and J.K. Solanka, [11] W.H. Chen, C.H. Smith and S.C.
“Comparative performance of various Fralick, “A fast computational
trigonometric unitary transforms for algorithm for the discrete cosine
transform image coding,” Int. J. transform”, IEEE Trans.
Electron., vol. 44, pp 305-315, 1978. Communicat., vol. COM-25, no. 9,
pp. 1004-1009, Sep. 1977.
[3] A.K. Jain, “A sinusoidal family of
unitary transforms,” IEEE Trans. Patt. [12] P. Yip and K.R. Rao, “A fast
Anal. Machine Intell., vol. PAMI-I, pp computational algorithm for the
356-365, September 1979. discrete sine transform”, IEEE Trans.
Commun., vol. COM-28, pp. 304-
[4] Z. Wang and B. Hunt, “The discrete W 307, Feb. 1980.
transform,” Applied Math Computat.,
vol. 16, pp 19-48, January 1985. [13] Z. Wang, “Fast algorithms for the
discrete W transform and for the
[5] S. Poornachandra, V. Ravichandran and discrete Fourier transform”, IEEE
N.Kumarvel, “Mapping of discrete Trans. Acoust., Speech, Signal
cosine transform (DCT) and discrete Processing, vol. ASSP-32, pp. 803-
sine transform (DST) based on 816, Aug. 1984.
symmetries” IETE Journal of Research,
Vol. 49, no. 1, pp 35-42, January- [14] P. Yip and K.R. Rao, “Fast
February 2003. decimation-in-time algorithms for a
family of discrete sine and cosine
[6] S. Cheng, “Application of the sine transforms”, Circuits, Syst., Signal
transform method in time of flight Processing, vol. 3, pp. 387-408,
positron emission image reconstruction 1984.
algorithms,” IEEE Trans. BIOMED.
SIP0402-7
CONFERENCE ON “SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM (SPRTOS)” MARCH 26-27
2011
[15] H.S. Hou, “A fast recursive Electronics Letters, vol. 30, no. 3,
algorithm for computing the discrete Feb. 1994.
cosine transform”, IEEE Trans.
Acoust., Speech, Signal Processing, [23] Peizong Lee and Fang-Yu Huang,
vol. ASSP-35, no. 10, pp. 1455- “Restructured recursive DCT and
1461, Oct. 1987. DST algorithms”, IEEE Transactions
on Signal Processing,” vol. 42, no.
[16] O. Ersoy and N.C. Hu, “A unified 7, pp. 1600-1609, July 1994.
approach to the fast computation of
all discrete trigonometric
transforms,” in Proc. IEEE Int. Conf. [24] V. Britanak, “On the discrete cosine
Acoust., Speech, Signal Processing, computation”, Signal Process., vol.
pp. 1843-1846, 1987. 40, no. 2-3, pp. 183-194, 1994.
[17] H.S. Malvar, “Corrections to fast [25] C.W. Kok, “Fast algorithm for
computation of the discrete cosine computing discrete cosine
transform and the discrete hartley transform”, IEEE Trans. Signal
transform,” IEEE Trans. Acoust., Process., vol. 45, pp. 757-760, Mar.
Speech, Signal Processing, vol. 36, 1997.
no. 4, pp. 610-612, Apr. 1988.
[26] V. Kober, “Fast recursive algorithm
[18] P. Yip and K.R. Rao, “The for sliding discrete sine transform”,
decimation-in-frequency algorithms Electronics Letters, vol. 38, no. 25,
for a family of discrete sine and pp. 1747-1748, Dec. 2002.
cosine transforms”, Circuits, Syst.,
Signal Processing, vol. 7, no. 1, pp. [27] S.B. Pan and R.H. Park, “Unified
3-19, 1988. systolic array for computation of
DCT / DST / DHT”, IEEE Trans.
[19] A. Gupta and K.R. Rao, “A fast Circuits Syst. Video Technol., vol. 7,
recursive algorithm for the discrete no. 2, pp.413-419, April 1997.
sine transform” IEEE Transactions
on Acoustics, Speech and Signal [28] W.H. Fang and M.L. Wu, “Unified
Processing, vol. 38, no. 3, pp. 553- fully-pipelined implementations of
557, March, 1990. one- and two-dimensional real
discrete trigonometric trnasforms”,
[20] Z. Cvetković and M.V. Popović, IEICE Trans. Fund. Electron.
“New fast recursive algorithms for Commun. Comput. Sci., vol. E82-A,
the computation of discrete cosine no. 10, pp. 2219-2230, Oct. 1999.
and sine transforms”, IEEE Trans.
Signal Processing, vol. 40, no. 8, pp. [29] D.F. Chiper, M.N.S. Swamy, M.O.
2083-2086, Aug. 1992. Ahmad, and T. Stouraitis, “A systolic
array architecture for the discrete
[21] J. Caranis, “A VLSI architecture for sine transform”, IEEE trans. Signal
the real time computation of discrete Process., vol. 50, no. 9, pp. 2347 -
trigonometric transform”, J. VLSI 2354, Sept. 2002.
Signal Process., no. 5, pp. 95-104,
1993. [30] P.K. Meher, “A new convolutional
formulation of the DFT and efficient
[22] L.P. Chau and W.C. Siu, “Recursive systolic implementation”, in Proc.
algorithm for the discrete cosine IEEE Int. Region 10 Conf.
transform with general lengths”, (TENCON’05), pp. 1462-1466, Nov.
2005.
SIP0402-8
CONFERENCE ON “SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM (SPRTOS)” MARCH 26-27
2011
SIP0402-9
CONFERENCE ON “SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM (SPRTOS)” MARCH 26-27
2011
Abstract: This paper presents a new approach Edge detection is an important task in image
to edge detection using wavelet transforms. processing. It is a main tool in pattern
First, we briefly introduce the development of recognition, image segmentation, and scene
wavelet analysis. Then, some major classical analysis. An edge detector is basically a high
edge detectors are reviewed and interpreted pass filter that can be applied to extract the
with continuous wavelet transforms. The edge points in an image. This topic has
classical edge detectors work fine with high- attracted many researchers and many
quality pictures, but often are not good enough achievements have been made [14]-[20]. In
for noisy pictures because they cannot this paper, we will explain the mechanism of
distinguish edges of different significance. The edge detectors from the point of view of
proposed wavelet based edge detection wavelets and develop a way to construct edge
algorithm combines the coefficients of wavelet detection filters using wavelet transforms.
transforms on a series of scales and Many classical edge detectors have
significantly improves the results. Finally, a been developed over time. They are based on
cascade algorithm is developed to implement the principle of matching local image segments
the wavelet based edge detector. with specific edge patterns. The edge
detection is realized by the convolution with a
Keywords: wavelet transform, canny edge set of directional derivative masks [21]. The
detector, sobel edge detector, noise.
popular edge detection operators are Roberts,
INTRODUCTION Sobel, Prewitt, Frei-Chen, and Laplacian
An edge in an image is a contour
operators ( [17], [18], [21], [22] ). They are all
across which the brightness of the image
defined on a 3 by 3 pattern grid, so they are
changes abruptly. In image processing, an
efficient and easy to apply. In certain situations
edge is often interpreted as one class of
where the edges are highly directional, some
singularities. In a function, singularities can be
edge detector works especially well because
characterized easily as discontinuities where
their patterns fit the edges better.
the gradient approaches infinity. However,
image data is discrete, so edges in an image Noise and its influence on edge detection
often are defined as the local maxima of the However, classical edge detectors
gradient. This is the definition we will use here. usually fail to handle images with strong noise,
SIP0403-1
CONFERENCE ON “SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM (SPRTOS)” MARCH 26-27
2011
SIP0403-2
CONFERENCE ON “SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM (SPRTOS)” MARCH 26-27
2011
The edge pattern of this edge detector makes A 3×3 sub image b of an image f may
it especially sensitive to edges with a slope be thought of as a vector in R . For example,
9
Sobel edge detector The edge patterns are shown in fig. 1.4
images in the edge space are typical edge signal-to-noise ratio but also decreases the
patterns with different directions; the other sub localization by the same factor. This suggests
images resemble lines and blank space. maximizing the product of the two. So the
Therefore, the angle θE is small when the sub object function is defined as:
SIP0403-4
CONFERENCE ON “SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM (SPRTOS)” MARCH 26-27
2011
In many applied areas like digital signal processing, obtained from Vj+1 by a dilation of factor 2. V0 is
time-frequency analysis is critical. That is, we want spanned by a function φ that satisfies
to know the frequency properties of a function in a
local time interval. Engineers and mathematicians
developed analytic methods that were adapted to (1.6)
these problems, therefore avoiding the inherent
difficulties in classical Fourier analysis. For this Equation (1.6) is called the “two-scale equation”,
purpose, Dennis Gabor introduced a “sliding- and it plays an essential role in the theory of
window” technique. He used a Gaussian function g wavelet bases.
as a “window” function, and then calculated the
Fourier transform of a function in the “sliding Edge detector using wavelets
window”. The analyzing function is Now that we have talked briefly about the
development of edge detection techniques and
wavelet theories, we next discuss how they are
The Gabor transform is useful for time-frequency
related. Edges in images can be mathematically
analysis. The Gabor transform was later
defined as local singularities. Until recently, the
generalized to the windowed Fourier transform in
Fourier transforms was the main mathematical tool
which g is replaced by a “time local” function
for analyzing singularities. However, the Fourier
called the “window” function. However, this
transform is global and not well adapted to local
analyzing function has the disadvantage that the
singularities. It is hard to find the location and
spatial resolution is limited by the fixed size of the
spatial distribution of singularities with Fourier
Gaussian envelope [13]. In 1985, Yves Meyer
transforms. Wavelet analysis is a local analysis, it
([23], [24]) discovered that one could obtain
is especially suitable for time-frequency analysis
orthonormal bases for L2(R) of the type
[1], which is essential for singularity detection.
This was a major motivation for the study of the
wavelet transform in mathematics and in applied
domains. With the growth of wavelet theory, the
and that the expression
wavelet transforms have been found to be
remarkable mathematical tools to analyze the
singularities including the edges, and further, to
for decomposing a function into these orthonormal detect them effectively. This idea is similar to that
wavelets converged in many function spaces. of John Canny [4]. The Canny approach selects a
Themost preeminent books on wavelets are those Gaussian function as a smoothing function θ; while
ofMeyer ([23], [24]) and Daubechies. Meyer the wavelet-based approach chooses a wavelet
focuses on mathematical applications of wavelet function to be θ0. Mallat, Hwang, and Zhong ( [5],
theory in harmonic analysis; Daubechies gives a [6] ) proved that the maxima of the wavelet
thorough presentation of techniques for transform modulus can detect the location of the
constructing wavelet bases with desired properties, irregular structures. Further, a numerical procedure
along with a variety of methods for mathematical to calculate their Lipschitz exponents has been
signal analysis [14]. A particular example of an provided. One and two-dimensional signals can be
orthonormal wavelet system was introduced by reconstructed, with a good approximation, from the
Alfred Haar. However, the Haar wavelets are local maxima of their wavelet transform modulus.
discontinuous and therefore poorly localized in The wavelet transform characterizes the local
frequency. Stéphane Mallat made a decisive step in regularity of signals by decomposing signals into
the theory of wavelets in 1987 when he proposed a elementary building blocks that arewell localized
fast algorithm for the computation of wavelet both in space and frequency. This not only explains
coefficients. He proposed the pyramidal schemes the underlying mechanism of classical edge
that decompose signals into subbands. These detectors, but also indicates a way of constructing
techniques can be traced back to the 1970s when optimal edge detectors under specific working
they were developed to reduce quantization noise. conditions.
The framework that unifies these algorithms and
the theory of wavelets is the concept of a multi-
resolution analysis (MRA). AnMRA is an Results:
increasing sequence of closed, nested subspaces
Multiscale edge detection
{Vj}j∈ Z that tends to L2(R) as j increases. Vj is
SIP0403-5
CONFERENCE ON “SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM (SPRTOS)” MARCH 26-27
2011
Wavelet filters of large scales are method gives more continuous and precise
more effective for removing noise, but at the edges. Table 1 shows that the SNR of the
same time increase the uncertainty of the edges obtained by the multiscale wavelet
location of edges. Wavelet filters of small transform is significantly higher than others.
scales preserve the exact location of edges,
but cannot distinguish between noise and real
edges. We can use the coefficients of the
wavelet transform across scales to measure
the local Lipschitz regularity. That is, when the
scale increases, the coefficients of the wavelet (a) (b) (c)
transformare likely to increase where the Fig. 1.5: Edge detection for Lena image: (a) The
Lipschitz regularity is positive, but they are Lena image; (b) Edges by the Canny edge detector;
(c) Edges by the multiscale edge detection using
likely to decrease where the Lipschitz
wavelet transform
regularity is negative. We know that locations
with lower Lipschitz regularities are more likely
to be details and noise. As scale increases,
the coefficients of the wavelet transform
increase for step edges, but decrease for Dirac
and fractal edges. So we can use a larger-
scale wavelet at positions where the wavelet
transform decreases rapidly across scales to
remove the effect of noise, while using a
smaller-scale wavelet at positions where the
wavelet transform decreases slowly across (a)
scale to preserve the precise position of the
edges. Using the cascade algorithm in, we can
observe the change of the wavelet transform
coefficient between each adjacent scales, and
(b) (c)
distinguish different kind of edges. Then we
can keep the scales small for locations with
positive Lipschitz regularity and increase the
scales for locations with negative Lipschitz
regularity. Fig. 1.5 shows that for a image (d) (e)
without noise, the result of our method is Fig. 1.6: Edge detection for a block image with
similar to that of Canny’s edge detection. For noise: (a) A block image (SNR=10db); (b) Edges by
images with white noise in Fig. 1.6 – 1.10, our the Sobel edge detector; (c) Edges by Canny edge
SIP0403-6
CONFERENCE ON “SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM (SPRTOS)” MARCH 26-27
2011
(c) (d)
Fig. 1.8: Edge detection for a bridge image with
noise: (a) Bridge image (SNR=30db); (b) Edges by
the Sobel edge detector; (c) Edges by Canny edge
(a) (b) detection with adjusted variance; (d) Edges by
multi-level edge detection using wavelet
(c) (d)
Fig. 1.7: Edge detection for a Lena image with
noise: (a) Lena image (SNR=30db); (b) Edges by
the Sobel edge detector; (c) Edges by Canny edge (a) (b)
detection with adjusted variance; (d) Edges by
multi-level edge detection using wavelets
(c) (d)
Fig. 1.9: Edge detection for a pepper image with
noise: (a) Pepper image (SNR=10db); (b) Edges by
the Sobel edge detector; (c) Edges by Canny edge
detection with adjusted variance; (d) Edges by
multi-level edge detection using wavelet
SIP0403-7
CONFERENCE ON “SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM (SPRTOS)” MARCH 26-27
2011
SIP0403-8
CONFERENCE ON “SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM (SPRTOS)” MARCH 26-27
2011
SIP0403-9
CONFERENCE ON “SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM (SPRTOS)” MARCH 26-27 2011
II DCT, which is widely, used in practice for implemented in four steps. In first step
speech and image compression applications as adjustment of local brightness is achieved. Local
part of various standards [7]. Equation (1) brightness is adjusted by mapping the DC
represents two dimensional DCT where C(k,l) coefficients of each sub block of Y(u,v) using a
represents transformed DCT coefficients for the monotonically increasing function ψ(x) [8]
input image x(m,n) assuming a square image of which is shown in fig.1. While mapping the
size (N×N). coefficients, DC coefficient is treated separately
as compared to rest of the AC coefficients.
N 1N 1
(2m 1) k (2n 1) l
C (k , l ) (k ) (l ) x(m, n) cos cos Mapping function for DC coefficient is
m 0n 0
2N 2N
0 k, l N 1
Y 0, 0
(1) DC 8
y mapped Ymax (2)
where Ymax
1 2 where
0 and k l
N N
for 1 k , l N 1 p1
x
n1 1 0 x m
m
Contrast of an image is defined using as change x
p2
in luminance with respect to surrounding to x m
n 1 n ,m x 1
luminance of surround. Hence contrast can be 1 m
thought of as the ratio between standard and 0 m n 1; p1 , p 2 0
deviation (σ) to mean (µ) value of the image.
The greater the value of standard deviation more ymax is the maximum brightness value of the
is the contrast. image before transforming using DCT. There
are various monotonic increasing functions
3. THE PROPOSED ALGORITHM
available in the literature [4] and [7]. No single
Image in RGB format space is converted into Y-
function is best suitable for all the images for
Cb-Cr color space to find out luminance and
enhancement purpose. We choose ψ(x) as its
chromatic component individually. Then Y, Cb,
value can be modified using four parameters
Cr component is split into (8×8) sub blocks
such as m, n, p1, p2. We varied the values for m,
respectively. Then for each sub block DCT-II is
n, p1, p2 and choose m = n = 0.5 and p1=1.8 and
computed separately to obtain Y(u,v), Cb(u,v)
p2= 0.8 for best performance. As Y component
and Cr(u,v) respectively, where Y(u,v), Cb(u,v)
represents the luminance component hence only
and Cr(u,v) represents the block transformed
this component is mapped to alter its brightness
DCT coefficients and the first element of each
leaving behind the Cb and Cr component
DCT transformed coefficient Y(0,0), Cb(0,0)
unaltered. In the second step adjustment of local
and Cr(0,0) represents DC component and rest
contrast is achieved by scaling the DC and AC
are AC component. Each sub block after
coefficients of normalized Y(u,v), Cb(u,v) and
computing its DCT coefficient is normalized by
Cr(u,v). The scale factor „s‟ is defined as the
a factor of 8. The proposed algorithm is
ratio between mapped DC coefficient for each
SIP0404-2
CONFERENCE ON “SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM (SPRTOS)” MARCH 26-27 2011
normalized sub block (8×8) of Y(u,v) to the value of standard deviation which is image
original DC coefficient. As DC component dependent and to be decided based on the
gives the information about mean of brightness amount of blocking artifact removal. Each
distribution of each sub block hence it is used to normalized 8×8 sub block of Y(u,v), Cb(u,v)
compute the scale factor„s‟. Assuming 8 bit and Cr(u,v) are subdivided into four 4×4 sub
representation while scaling overflow of gray blocks. and the scale factor „s‟ is recomputed
values may occur beyond 255 which is taken through the earlier mentioned steps of this
care by limiting the scale factor depending upon algorithm. Only those sub blocks will be scaled
the image. In the third step preservation of color where threshold condition is met leaving
is achieved through scaling of normalized behind the remaining sub blocks unaltered.
Cb(u,v) and Cr(u,v) component through the Then corresponding sub blocks of Y, Cb and Cr
same scale factor „s‟ corresponding to each is scaled through the new scale factor in order to
normalized sub block of Y(u,v). Since the remove the artifacts. Finally image is
mapping from RGB to Y-Cb-Cr is non linear reconstructed in spatial domain by combing Y,
and Cb, Cr depends on Y hence while scaling Cb and Cr components.
the color component DC coefficients has to be
treated separately. 4. QUALITY ASSESMENT
Simulation is performed on various images
using MATLAB. As the proposed algorithm is
based on DCT so for assessing quality PSNR
and SNR is not a suitable option as prior
information regarding the type of distortion is
not available with us. We have used no-
Similarly for normalized Cr(u,v) is to be scaled reference perceptual quality assessment for
JPEG compressed images [9] where quality
using the above mentioned procedure. Finally
metric that incorporates human visual system
blocking artifacts are suppressed. As this characteristics which do not require the input
algorithm is developed around type–II DCT image for computing the quality. Based upon
hence blocking artifacts are visible in the this a quality score is obtained which reflects the
processed image because of discontinuities in amount of blocking artifact removal and
gray values. There are several methods available distortion removal due to non linear mapping. If
to minimize the blocking artifacts but they are the quality score is nearer to 10 it reflects the
best quality image and 1 represents worst
computationally exhaustive. We have proposed
quality image. Wang et al. [9] suggested no
a simple method to minimize blocking artifacts reference quality metric for computing the
and at the same time it requires less quality of JPEG image. The computation of this
computation. For this purpose standard metric is described in [9] where they have cited
deviation (σ) is computed for each normalized the website which contains the MATLAB code
sub block of Y(u,v). When (σ) represents a large for computing the quality score. We have used
value then it is concluded that corresponding the same MATLAB code for evaluation of
quality and called as quality score. Quality score
sub block contains a large variation of gray
obtained for different images is tabulated in
values which results in blocking artifacts. If table 1.
threshold where threshold represents threshold
Table 1. Quality Score
SIP0404-3
CONFERENCE ON “SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM (SPRTOS)” MARCH 26-27 2011
Before After
artifact artifact
removal removal
(c) (d)
SIP0404-4
CONFERENCE ON “SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM (SPRTOS)” MARCH 26-27 2011
ACKNOWLEDGMENT
The authors acknowledge the DST-TIFAC
CORE on “3G/4G Communication
Technologies” received by National Institute of
(a) (b) Science and Technology from Department of
Science & Technology (DST), Government of
India.
REFERENCES
[1] Gonzalez, Rafael C. and Woods, Richard E.
Digital Image Processing, Pearson, Prentice
(c) Hall, Third edition, 2008.
[2] Aghagolzadeh, S. and Erosy, O. K.
Fig 4.(a) Image_3 (b) enhanced image by “Transform image enhancement,” Opt. Eng.,
scaling all components including Cb and Cr (c) vol.31, pp.614-626, Mar.1992.
enhanced image with blocking artifacts removal [3] Tang, J., Peli, E., and Acton, S. “Image
enhancement using a contrast measure in the
compressed domain,” IEEE Signal Process.
Lett. Vol.10, pp.289-292, Oct. 2003.
[4] Lee, S. “An efficient content – based image
enhancement in the compressed domain
using retinex theory,” IEEE Trans. Circuits
(a) (b)
Syst. Video Technol., vol. 17,no. 2, pp. 199-
213, feb.2007.
[5] Wang, Z. “Fast algorithms for the discrete w
transform for the discrete fourier transform,”
IEEE Trans. On ASSP, vol. 32. No. 4. pp.
803-816, Aug. 1984.
(c)
[6] Martucci, S.A. “Symmetric convolution and
Fig 5.(a)Image_4 (b) enhanced image by scaling the discrete sine and cosine transforms.”
all components including Cb and Cr (c) IEEE Trans. On signal Processing, vol.42,
enhanced image with blocking artifacts removal no. 5, pp.1038-4051, May. 1994.
[7] Rao, K. and Huang, J. “Techniques and
standards for image, video, and audio
CONCLUSION coding,” Prentice Hall, Upper Saddle River,
In this paper, we have presented a simple NJ. 1996.
method for enhancing the color image in [8] De, T.K. “A simple programmable S-
compressed format by scaling luminance and function for digital image processing,” in
chromatic components using less computational Proc. 4th IEEE Region 10th Int. Conf.,
overhead. Quality score is computed which Bombay, India, pp. 573-576.Nov.1989.
proves the performance of proposed method. [9] Wang, Z., Sheikh, H.R. and Bovik, A.C.
The proposed algorithm can be implemented on “No-reference perceptual quality assessment
any image processing hardware.
SIP0404-5
CONFERENCE ON “SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM (SPRTOS)” MARCH 26-27 2011
of JPEG compressed images,” in Proc. Int. vol. 1. pp. 477-480, Sep. 2002.
Conf. Image Processing, Rochester, NY,
SIP0404-6
CONFERENCE ON “SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM (SPRTOS)” MARCH 26-27 2011
Abstract—Processing of multimedia data acquires large Existing correlation in neighboring pixels causes the
transmission bandwidth and storage capacity. Reduction in redundant information in images. So less correlated
these parameters introduces the concept of data compression.
For achieving the better compression without degrading the representation of image required. Two fundamental
image quality, data compression techniques become the components of compression are redundancy and
challenge for the researchers. Numerous image coding irrelevancy reduction. Redundancy reduction aims at
techniques i.e. subband coding, EZW, SPIHT, EBCOT,
removing duplication from the signal source
wavelet transform coding have been presented. In this paper
performance comparison of these coding techniques is (image/video). Irrelevancy reduction omits parts of the
presented. signal that will not be noticed by the signal receiver,
Keywords—Wavelet transform, EBCOT, SPIHT, EZW, namely the Human Visual System (HVS). In general, three
subband coding, JPEG types of redundancy can be identified. Image compression
research aims at reducing the number of bits needed to
I. INTRODUCTION represent an image by removing the spatial and spectral
redundancies as much as possible.
Uncompressed multimedia (audio and video) data
a. Spatial Redundancy; correlation between
requires considerable storage capacity and transmission
neighboring pixel values.
bandwidth. Despite rapid progress in mass-storage density,
b. Spectral Redundancy; correlation between
processor speeds, and digital communication system
different color planes or spectral bands.
performance, demand for data storage capacity and data-
c. Temporal Redundancy; correlation between
transmission bandwidth continues to outstrip the
adjacent frames in a sequence of images (in video
capabilities of available technologies. The recent growth of
applications).
data intensive multimedia-based web applications have not
In lossless compression schemes, the reconstructed
only sustained the need for more efficient ways to encode
image, after compression, is numerically identical to the
signals and images but have made compression of such
original image. An image reconstructed following lossy
signals central to storage and communication technology.
compression contains degradation relative to the original.
For still image compression, the `Joint Photographic
Often this is because the compression scheme completely
Experts Group' or JPEG standard has been established by
discards redundant information. However, lossy schemes
ISO (International Standards Organization) and IEC
are capable of achieving much higher compression. Under
(International Electro-Technical Commission). The
normal viewing conditions, no visible loss is perceived. In
performance of these coders generally degrades at low bit-
predictive coding, information already sent or available is
rates mainly because of the underlying block-based
used to predict future values, and the difference is coded.
Discrete Cosine Transform (DCT) scheme. More recently,
Since this is done in the image or spatial domain, it is
the wavelet transform has emerged as a cutting edge
relatively simple to implement and is readily adapted to
technology, within the field of image compression.
local image characteristics. Transform coding, on the other
Wavelet-based coding provides substantial improvements
hand, first transforms the image from its spatial domain
in picture quality at higher compression ratios. The large
representation to a different type of representation using
storage space, large transmission bandwidth, and long
some well-known transform and then codes the
transmission time is required for image, audio, and video
transformed values. This method provides greater data
data. At the present state of technology, the only solution
compression compared to predictive methods, although at
is to compress multimedia data before its storage and
the expense of greater computation.
transmission, and decompress it at the receiver for play
back. III. COMPRESSION TECHNIQUES
SIP0405-1
CONFERENCE ON “SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM (SPRTOS)” MARCH 26-27 2011
In subband coding [4], an image is decomposed into The Fourier Transform separates the waveform into a
asset of band-limited components, called subbands, which sum of sinusoids of different frequencies and identifies
can be resembled to reconstruct the original image without their respective amplitudes. Thus it gives us a frequency-
error. Each subband is generated by band pass filtering the amplitude representation of signal. In STFT [6], non-
input. Since the bandwidth of the resulting subbands is stationary signal is divided into small portions, which are
smaller than that of the original image, the subbands can assumed to be stationary. This is done using a window
be downsampled without loss of information. function of chosen width, which is shifted and multiplied
Reconstruction of the original image is accomplished by with the signal to obtain the small stationary signals. The
upsampling, filtering, and summing the individual Fourier Transform is then applied to each of these portions
subbands. Fig.1 shows the principal components of a two- to obtain the STFT of the signal. The problem with STFT
band subband coding and decoding system. The input of goes back to the Heisenberg uncertainty principle which
the system is a 1-D, band-limited discrete-time signal x(n) states that it is impossible for one to obtain which
for n= 0,1,2....; the output sequence x‟(n) is formed frequencies exist at which time instance, but, one can
through the decomposition of x(n) into y0(n) and y1(n) via obtain the frequency bands existing in a time interval. This
analysis filters g0(n) and g1(n). Filter h0(n) is a low pass gives rise to the resolution issue where there is a trade-off
filter whose output is an approximation of x(n); filter h1(n) between the time resolution and frequency resolution. To
is a high pass filter whose output is high frequency or assume stationarity, the window is supposed to be narrow,
detail part of x(n). All the filters Are selected in such a which results in a poor frequency resolution, i.e., it is
way so that the input can be reconstructed perfectly such difficult to know the exact frequency components that
that x‟(n) = x(n). exist in the signal; only the band of frequencies that exist is
obtained. If the width of the window is increased,
ho(n) 2 2 go(n) frequency resolution improves but time resolution
x‟(n)
becomes poor, i.e., it is difficult to know what frequencies
x(n)
occur at which time intervals. Once the window function
h1(n) 2 g1(n) is decided, the frequency and time resolutions are fixed for
2
all frequencies and all times.
SIP0405-2
CONFERENCE ON “SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM (SPRTOS)” MARCH 26-27 2011
having N components, for example, is expressed by an N x 1. A discrete wavelet transforms which provides a
N matrix. compact multiresolution representation of the
The generic form for a1-D wavelet transform is shown image.
in Fig.3. Here a signal is passed through a low pass and 2. Zero tree coding which provides a compact
high pass filter, h and g, respectively, then downsampled multiresolution representation of significance
by a factor of 2, constituting one level of transform. maps, which indicates the position of significant
Multiple levels or scales of the wavelet transform are made coefficients. Zero trees allow the successful
by repeating the filtering and decimation on low pass prediction of insignificant coefficients across
branch outputs only. The process is typically carried out scales to be efficiently represented as a part of
for a finite number of levels K, and the resulting growing trees.
coefficients, di1 (n), i {1,....K} and dk0(n), and are called 3. Successive Approximation which provides a
wavelet coefficients. compact multiprecision representation of the
significant coefficients and facilitates the
d10(n) dk0(n) embedding algorithm.
h 2 h 2
4. Adaptive multilevel arithmetic coding which
provides a fast and efficient method for entropy
g 2 g 2
coding string of symbols, and requires no pre-
d11(n) dk1(n)
stored tables.
5. The algorithm runs sequentially and stops
Fig.3. Generic form of 1-D wavelet transforms
whenever a target bit rate is met.
The 1-D wavelet transform can be extended to a 2-D
A significant map defined as an indication of whether
wavelet transform using separable wavelet filters. With
a particular coefficient was zero or nonzero (i.e.,
separable filters the 2-D transform can be computed by
significant) relative to a given quantization level. The
applying a 1-D transform to all the rows of input, and then
EZW algorithm [2] determined a very efficient way to
repeating on all of the columns. Fig.4 shows an example of
code significance maps not by coding the location of the
three-level (k=3) 2-D wavelet expansion, where k
significant coefficients, but rather by coding the location of
represents the highest level of the decomposition of the
the zeros. It was found experimentally that zeros could be
wavelet transform.
predicted very accurately across different scales in the
wavelet transform. Defining a wavelet coefficient as
LL2 HL2
insignificant with respect to a threshold T if |x | < T, the
HL1 EZW algorithm hypothesized that “if a wavelet coefficient
LH2 HH at a coarse scale is insignificant with respect to a given
2
threshold T, then all wavelet coefficients of the same
orientation in the same spatial location at finer scales are
LH1 HH likely to be insignificant with respect to T.” Recognizing
1 that coefficients of the same spatial location and frequency
orientation in the wavelet decomposition can be compactly
Fig.4 Three-level 2-D wavelet expansion
described using tree structures, the EZW called the set of
insignificant coefficients, or coefficients that are quantized
d. Embedded Zero tree Wavelet (EZW) Compression to zero using threshold T, zero-trees.
In octave-band wavelet decomposition each
coefficient in the high-pass bands of the wavelet transform
has four coefficients corresponding to its spatial position in
the octave band above in frequency. Because of this very
structure of the decomposition, encoding of coefficients
required to achieve better compression results. Lewis and
Knowles [5] in 1992 were the first to introduce a tree-like
data structure to represent the coefficients of the octave
decomposition. Later, in 1993 Shapiro [2] called this
structure zero tree of wavelet coefficients, and presented
his elegant algorithm for entropy encoding called
Embedded Zero tree Wavelet (EZW) algorithm. EZW
algorithm contains the following features
SIP0405-3
CONFERENCE ON “SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM (SPRTOS)” MARCH 26-27 2011
Fig.5 Tree structure of wavelet transform algorithm. They also present a scheme for progressive
Consider the tree structures on the wavelet transform transmission of the coefficient values that incorporates the
shown in Fig.5. In the wavelet decomposition, coefficients concepts of ordering the coefficients by magnitude and
that are spatially related across scale can be compactly transmitting the most significant bits first. SPIHT uses a
described using these tree structures. With the exception of uniform scalar quantizer and claim that the ordering
the low resolution approximation (LL1) and the highest information made this simple quantization method more
frequency bands (HL1, LH1, and HH1) each parent efficient than expected. An efficient way to code the
coefficient at level i of the decomposition spatially ordering information is also proposed. Results from the
correlates to 4 (child) coefficients at level i -1of the SPIHT coding algorithm in most cases surpass those
decomposition which are at the same frequency obtained from EZQ algorithm.
orientation. For the LLk band, each parent coefficient f. Scalable Image Compression with EBCOT
spatially correlates with 3 child coefficients, one each in This algorithm is based on independent Embedded
the HLk, LHk, and HHk bands. The standard definitions of Block Coding with Optimized Truncation of the embedded
ancestors and descendants in the tree follow directly from bit-streams (EBCOT). EBCOT algorithm [1] uses a
these parent- child relationships. A coefficient is part of a wavelet transform to generate the subband coefficients
zero-tree if it is zero and if all of its descendants are zero which are then quantized and coded. Although the usual
with respect to the threshold T. It is also a zero-tree root if dyadic wavelet decomposition is typical, other "packet"
is not part of another zero-tree starting at a coarser scale. decompositions are also supported and occasionally
Zero-trees are very efficient for coding since by declaring preferable. Scalable compression refers to the generation
only one coefficient a zero-tree root, a large number of of a bit-stream which contains embedded subsets, each of
descendant coefficients are automatically known to be which represents an efficient compression of the original
zero. The compact representation, coupled with the fact image at a reduced resolution or increased distortion. A
that zero-trees occur frequently, especially at low bit rates, key advantage of scalable compression is that the target
make zero-trees efficient for coding position information. bit-rate or reconstruction resolution need not be known at
EZW implements successive approximation the time of compression. Another advantage of practical
quantization through a multipass scanning of the wavelet significance is that the image need not be compressed
coefficients using successively decreasing thresholdsT0, multiple times in order to achieve a target bit-rate, as is
T1,T2 ,.... . The initial threshold is set to the value of T 0 = common with the existing JPEG compression standard.
2[log2 xmax], where xmax is the largest wavelet coefficient. Rather than focusing on generating a single scalable bit-
Each scan of wavelet coefficients is divided into two stream to represent the entire image, EBCOT partitions
passes: dominant and subordinate. The dominant pass each subband into relatively small blocks of samples and
establishes a significance map of the coefficients relative generates a separate highly scalable bit-stream to represent
to the current threshold Ti. Thus, coefficients which are each so-called code-block. The algorithm exhibits state-of-
significant on the first dominant pass are known to lie in the-art compression performance while producing a bit-
the interval [T0 ,2T0 ) , and can be represented with the stream with an unprecedented feature set, including
reconstruction value of (3T 0/2). The dominant pass resolution and SNR scalability together with a random
essentially establishes the most significant bit of binary access property. The algorithm has modest complexity and
representation of the wavelet coefficient, with the binary is extremely well suited to applications involving remote
weights being relative to the thresholds Ti. browsing of large compressed images.
e. Set Partitioning in Hierarchical Trees (SPIHT) IV. PERFORMANCE COMPARISION
Said and Pearlman [3], offered an alternative
explanation of the principles of operation of the EZW
algorithm to better understand the reasons for its excellent
performance. According to them, partial ordering by
magnitude of the transformed coefficients with a set
partitioning sorting algorithm, ordered bit plane
transmission of refinement bits, and exploitation of self-
similarity of the image wavelet transform across different
scales of an image are the three key concepts in EZW. In
addition, they offer a new and more effective
implementation of the modified EZW algorithm based on
set partitioning in hierarchical trees, and call it the SPIHT
SIP0405-4
CONFERENCE ON “SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM (SPRTOS)” MARCH 26-27 2011
45
PSNR (Lena) ideas found in the EZW algorithm. The wavelet coders are
much closer to the EZW algorithm than to the subband
40
coding. SPIHT became very popular since it was able to
35 achieve equal or better performance than EZW without
30 having to use an arithmetic encoder. The reduction in
SC
25 complexity from eliminating the arithmetic encoder is
WT
significant. Another technique, EBCOT algorithm, has
20 EZW been chosen as the basis of the JPEG 2000 standard. The
15 SPIHT performance comparison of these techniques has been
10 EBCOT discussed in the previous section. By comparing the EZW,
5 subband coding and other techniques, because of the
multiresolution property and its performance of the lossy
0
0.0625 0.125 0.25 0.5 1
wavelet image coding technique have matured
significantly and provides a very strong basis for the new
Fig.6 (a) PSNR results for LENA JPEG 2000 coding standard.
PSNR (Barbara)
40
35
VI. REFRENCES
30
[1] Taubman, D. „High Performance Scalable Image
25 Compression with EBCOT‟, IEEE Tran. IP, Mar. 1999
EZW
20 [2] Shapiro, J. M. „Embedded Image Coding Using Zerotrees of
SPIHT
Wavelet Coefficients‟, IEEE Trans. SP, vol. 41, no. 12, Dec.
15 EBCOT 1993, pp. 3445-3462.
10 [3] Said, A. and Pearlman, W. A. „A New, Fast and Efficient
Image Codec Based on Set Partitioning in Hierarchical
5
Trees‟, IEEE Trans. CSVT, vol. 6, no. 3, June 1996, pp. 243-
0 250,
0.0625 0.125 0.25 0.5 1 [4] Woods, J. W. and O'Neil, S. D. „Subband Coding of Images‟
IEEE Trans. ASSP, vol. 34, no. 5, October 1986, pp. 1278-
Fig.6 (b) PSNR results for BARBARA
128
[5] Lewis, A. S. and Knowles, G. „Image Compression Using
the 2-D Wavelet Transform‟, IEEE Trans. IP, vol. 1, no. 2,
V. CONCLUSION April 1992, pp. 244-250.
A number of coding techniques have been proposed [6] Gonzalez, R.C. and Woods, R.E., Digital Image Processing,
since the introduction of the EZW algorithm. A common 2nd edition, Pearson Education, 2004, pp. 409 – 510.
characteristic of these techniques is that they use the basic
SIP0405-5
CONFERENCE ON ―SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM (SPRTOS)‖ MARCH 26-27 2011
SIP0406-1
CONFERENCE ON ―SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM (SPRTOS)‖ MARCH 26-27 2011
merge
Split
K
K
(b ) Inverse transforms.
(a) Forward transformation.
Fig 2 Lifting based DWT&IDWT.
SIP0406-2
CONFERENCE ON ―SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM (SPRTOS)‖ MARCH 26-27 2011
The inverse DWT can be derived by traversing The architecture proposed by Lian, et al. in [2]
above steps in the reverse direction, first scaling the consists of two pipeline stages, with three pipeline
low-pass and high-pass sub band inputs by K and registers, R1, R2 and R3. In the (9, 7) type filtering
1/K respectively, and then applying the dual and operation, intermediate data (R3) generated after
primal lifting steps after reversing the signs of the first two lifting steps (Phase 1) are folded back
coefficients in and and finally the inverse to R1 (as shown in Fig.5) for computation of the
lazy transform by up-scaling the output before last two lifting steps (phase 2). The architecture can
merging them into a single reconstructed stream as be reconfigured so that computation of two phases
shown in Fig.2 (b) can be interleaved by selection of appropriate data
3. Lifting Architecture for 1D DWT by the multiplexors. As a result, two delay registers
(D) are needed in each lifting step in order to
The data dependencies in the lifting scheme can be properly schedule the data in each phase. Based on
explained with the help of an example of DWT the phase of interleaved computation, the
filtering with four factors (or four lifting steps). coefficient for multiplier M1 is either α or γ, and
The four lifting steps correspond to four stages as similarly the coefficient for multiplier M2 is β or δ
shown in Fig. 3. The intermediate results generated .The hardware utilization of this architecture is
in the first two stages for the first two lifting steps always 100%. Note that for the (5, 3) type filter
are subsequently processed to produce the high- operation, folding is not required.
pass (HP) outputs in the third stage, followed by
the low-pass (LP) outputs in the fourth stage. (9, 7) 3.3 MAC Based Programmable Architecture [3]
filter is an example of a filter that requires four
lifting steps. For the DWT filters requiring only A programmable architecture that implements the
two factors, such as the (5, 3) filter, the data dependencies represented in Fig.3 using four
intermediate two stages can simply be bypassed MACs (Multiply and Accumulate) and nine
registers has been proposed by Chang et al. in [3].
3.1 Direct Mapped Architecture The algorithm is executed in two phases as shown
in Fig. 6 The data-flow of the proposed architecture
A direct mapping of the data dependency diagram can be explained in terms of the register allocation
into a pipelined architecture was proposed by Liu of the nodes. The computation and allocation of the
et al. in [7] and described in Fig .4 the architecture registers in phase 1 are done in the following order.
is designed with 8 adders (A1–A8), 4 multipliers
(M1–M4), 6 delay elements (D) and 8 pipeline R0 s2i-1 ; R2 s2i
registers (R). There are two input lines to the R3 R0 + α (R1+R2);
architecture: one that inputs even samples (s2i) and R4 R1 +β (R5+R3);
the other one that inputs odd samples (s2i+1). There R8 R5 + γ (R6+R4);
are four pipeline stages in the architecture. In the Output LP R6+δ (R7+R8);
first pipeline stage, adder A1computes s2i + s2i+1and Output HP R8
adder A2 computes α (s2i+s2i-2)+s2i-1 The output of
A2 corresponds to the intermediate results Similarly, the computation and register allocation
generated in the first stage of Fig3. The output of in phase 2 are done in the following order.
adder A4 in the second pipeline stage corresponds
to the intermediate results generated in the second R0 s2i+1; R1 s2i+2;
stage of Fig.3. Continuing in this fashion, adder A6 R5 R0+ α (R2+R1);
in the third pipeline stage produces the high-pass R6 R2 + β (R3+R5);
output samples, and adder A8 in the fourth pipeline Output LP R4 +γ (R8+R7);
stage produces the low-pass output samples. For Output HP R7
lifting schemes that require only 2 lifting steps, As a result, two samples are input per phase and
such as the(5,3) filter, the last two pipeline stages two samples (LP and HP) are output at the end of
need to be bypassed causing the hardware every phase. For 2D DWT implementation, the
utilization to be only 50% or less. Also, for a output samples are also stored into a temporary
single read port memory, the odd and even samples buffer for filtering in the vertical dimension.
are read serially in alternate clock cycles and
buffered. This slows down the overall pipelined 3.4 Flipping Architecture [1]
architecture by 50% as well.
While conventional lifting-based architectures
3.2 Folded Architecture require fewer arithmetic operations, they
sometimes have long critical paths. For instance,
The pipelined architecture in Fig.4 can be further the critical path of the lifting-based architecture for
improved by carefully folding the last two pipeline the (9, 7) filter is 4Tm + 8Ta while that of the
convolution implementation is Tm + 4Ta.
stages into the first two stages as shown in Fig.5 .
SIP0406-3
CONFERENCE ON ―SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM (SPRTOS)‖ MARCH 26-27 2011
input s0 s1 s2 s3 s4 s5 s6 s7 s8
First stage α α α α α α α α
Second stage β β β β β β β β
γ γ γ γ γ γ γ γ 1/K
HP output HP
δ δ δ δ δ δ δ δ
K
LP output LP
Fig.3 Data dependency diagram for lifting of filters with four factors
LP
s2i
D R1 A4 R2 D R3 A8 R4
A1
A5
s2i-2+s2 M2 M4
β δ
α M1
γ
M3
D A3 A7
D HP
s2i+1
D A2 R1 A6
R2 D R3 R4
s2i-1 α (s2i+s2i-2)+s2i-1
Input
R1 D D R2 A4 R3
Even R
β, δ M4
K
A1 M2 1/K
α, γ
M1
A3 M3
R
Odd A2 R2 D D R3
R1
SIP0406-4
CONFERENCE ON ―SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM (SPRTOS)‖ MARCH 26-27 2011
One way of improving this is by pipelining which critical path. . The critical path is now Tm + 5Ta.
results in a significant increase in the number of The minimum critical path of Tm can be achieved
registers. For instance, to pipeline the lifting-based by 5 pipelining stages using 11 pipelining registers
(9,7) filter such that the critical path is Tm + 2Ta, 6 (not shown in the figure). Detailed hardware
additional registers are required. C.T. Huang,[1] analysis of lossy (9, 7), integer (9, 7) and (6, 10)
proposed a very efficient way of solving the timing filters have been included in [1]. Furthermore,
accumulation problem The basic idea is to remove since the flipping transformation Changes the
the multiplications along the critical path by scaling round-off noise considerably, techniques to address
the remaining paths by the inverse of the multiplier precision d noise problems have also been
coefficients. Fig.7 (a)–(b) describes how scaling at addressed in [1].
each level can reduce the multiplications in the
Input R1 R0 R2 R0 R1 R0 R2 R0 R1
First stage R3 R5 R3 R5
Second stage R4 R6 R4 R6 R4
HP output R7 R8 R7 R8 1/K HP
LP output
K LP
Fig. 6 Data-flow and registers allocation of the MAC based architecture
z-1 z-1
1/α 1/α
α α z-1 1
1/α z-1
1/β 1/β
β β z-1 1
z-1
1/β
1/γ 1/γ
γ γ z-1 1
z-1
1/γ
1 1/δ 1/δ
δ δ
1/δ
HP LP 1/K K
HP LP
Fig 7 A flipping architecture [1]. (a) Original architecture, (b) Scaling the coefficients to reduce the number of
multiplications .
SIP0406-5
CONFERENCE ON ―SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM (SPRTOS)‖ MARCH 26-27 2011
However, the conventional lifting scheme adopts We can compare the performances of different
the serial operation to process these intermediate architecture on the basis of hardware requirement
data; thus, the critical path latency is very long. We and critical path latency. The hardware complexity
know that the way of processing the intermediate has been described in terms of data path
data determines the hardware scale and critical path components. Comparison of different architecture
latency of the implementing architecture. Since shown in table I
some intermediate data are on different paths, we
can calculate them in parallel. With this parallel
operation, the critical path latency is reduced, and
the number of registers is decreased. Therefore it is
called as efficient folded. The critical path latency
is reduces up to Tm+Ta.
Flipping+ 4 8 11 Tm complex 2
5stage input/output
pipeline
5. Conclusion Reference
In this paper, we presented comparison of the [1] C.T. Huang, P.C. Tseng, and L.G. Chen,
existing lifting based implementations of 1- ―Flipping Structure: An Efficient VLSI
dimensional Discrete Wavelet Transform. We Architecture for Lifting-Based Discrete Wavelet
briefly described the principles behind the lifting Transform,‖ in IEEE Transactions on Signal
scheme in order to better understand the different Processing, 2004, pp. 1080–1089.
implementation styles and structure. We provided a [2] C.J Lian, K.F. Chen, H.H. Chen, and L.G.
systematic derivation of each architecture and Chen, ―Lifting Based Discrete Wavelet Transform
evaluated them with respect to their hardware and Architecture for JPEG2000,‖ in IEEE International
timing requirements.
SIP0406-6
CONFERENCE ON ―SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM (SPRTOS)‖ MARCH 26-27 2011
SIP0406-7
CONFERENCE ON “SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM (SPRTOS)” MARCH 26-27 2011
Abstract-The de-noising of an image corrupted by tend to blur edges and other fine image
salt and pepper has been a classical problem in details. Therefore nonlinear filters [1, 2] are
image processing. In the last decade, various
modified median filtering schemes have been
most preferred over linear filters due to their
developed, under various signal/noise models, to improved filtering performance in terms of
deliver improved performance over traditional noise suppression and edge preservation.
methods. In this paper a simple method called The standard median (SM) filter [3] is the
Inerpolate Median Filter (IMF) is proposed to one of the most robust nonlinear filters,
restore the images corrupted by salt and pepper
noise. The proposed method works better in
which exploits the rank-order information of
preserving image details by suppressing noise. The pixel intensities within filtering window.
experimental results show that the proposed This filter is very popular due to its edge
algorithm outperforms the conventional Median preserving characteristics and its simplicity
filter and other algorithms like mimum- in implementation. Various modifications of
maximumum exclusive mean filter (MMEM),
Adaptive median filtering(AMF) in terms of signal
the SM filter have been introduced, such as
to noise ratio. the weighted median (WM) [4] filter. By
incorporating noise detection mechanism
into the conventional median filtering
Key words- Image de-noising, Interpolate median approach, the filters like switching median
filter, nonlinear filter, salt & pepper noise
filters [5, 6] had shown significant
I. INTRODUCTION performance improvement. The median
filter, as well as its modifications and
An image is often corrupted by noise generalizations[7] are typically implemented
during its acquisition and transmission. invariably across an image. Examples
Image de-noising is used to reduce the noise include the mimum-maximumum exclusive
while retaining the important features in the mean filter (MMEM)[8], Florencio‟s [9],
image. Always there exists a tradeoff Adaptive median filter(AMF)[10]These
between the removed noise and the blurring filters have demonstrated excellent
in the image. The intensity of impulse noise performance but the main drawbacks of all
has the tendency of being either relatively these filters are, they are prone to edge
high or relatively low, which will degrade jitters in the cases where noise density is
the image quality. Therefore image de- high, large widow size results in blurred
noising is used as preprocessing to edge images and significant computational
detection, image segmentation and object complexity. To solve this problem, a
recognition etc. modified median filter algorithm called
A variety of filtering techniques has been Interpolate Median filter that employs
proposed for enhancing images degraded by Interpolated search in determining the
noise. The classical linear digital image desired central pixel value is proposed.
filters, such as averaging lowpass filters,
SIP0407-1
CONFERENCE ON “SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM (SPRTOS)” MARCH 26-27 2011
The paper is organized as follows: Section considered with the middle pixel value. The
II gives brief review of mean and median median filter, especially with larger window
filtering. The new approach, The Interpolate size destroys the fine image details due to its
Median filter technique is explained in
rank ordering process. Figure1. illustrates an
section III. Experimental results are
presented in section IV. Finally in section V, example calculation.
we give the conclusion.
Neighborhood values: 115, 119, 120, 123,
II MEAN & MEDIAN FILTERING 124, 125, 126, 127, 150
MEAN FILTER Median value: 124
Mean filtering is a simple and easy to
implement method of smoothing images, i.e.
it reduces the amount of intensity variation 110 125 125 130 140
between one pixel and the next. It is often 123 124 126 127 136
used to reduce noise in images.
The idea of mean filtering is simply to 114 120 150 125 134
replace each pixel value in an image with
118 115 119 123 134
the mean (`average') value of its neighbors,
including itself. The drawback of this 111 116 111 120 131
algorithm is, it has the effect of eliminating
pixel values which are unrepresentative of Fig. 1. Calculating the median value of a 3x3 pixel
their surroundings. With salt and pepper neighborhood. The central pixel value of 150 is rather
noise, image gets smoothed with a 3×3 unrepresentative of the surrounding pixels and is
replaced with the median value: 124
mean filter. Since the shot noise pixel values
are often very different from the surrounding
values, they tend to significantly distort the III INTERPOTATE MEDIAN FILTER
pixel average calculated by the mean filter.
The Interpolate Median filter method
MEDIAN FILTER considers each pixel in the image in turn and
The median filter is normally used to looks at its neighbors to decide whether or
reduce noise in an image like the mean not it is representative of its surroundings.
filter; however, it does well in preserving Instead of replacing the pixel value with the
useful details in the image. Unlike the mean median of neighboring pixel values, it
filter, the median filter considers each pixel replaces it with the interpolation of those
in the image and instead of simply replacing values.
the pixel value with the mean of neighboring
The interpolation is calculated by first
pixel values; it is replaced with the median
sorting all pixel values from surrounding
of those values. The median is calculated by
neighborhood into numerical order and then
first sorting all the pixel values from the
replacing the pixel being considered with
surrounding neighborhood into numerical
the interpolation pixel value. The calculation
order and then replacing the pixel being
of interpolation value is derived from the
SIP0407-2
CONFERENCE ON “SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM (SPRTOS)” MARCH 26-27 2011
Interpolation search technique used for levels Table 1, illustrates the PSNRs of the
searching the elements. We can also call it a six de-noising methods. The peak signal-to-
Non- linear filter or order-static filter noise ratio (PSNR) in decibels (dB), is
because there response is based on the defined as
ordering or ranking of the pixels contained
within the mask. The advantages of this 2552
filter over mean and median filter are, it PSNR 10 log (dB) (3)
MSE
gives more robust average than both the
methods, for some pixels in the
neighborhood; it creates new pixel values 1 m1n1 2
with MSE I (i, j ) K (i, j ) (4)
like mean filter and for some it will not mn i 0 j 0
create new pixel value like median filter, It
has the characteristics of both filters.
where I and K being the original image and
denoised image, respectively. Figure 2,
The algorithm uses the fallowing formula shows the original test images used for
experiments and Figure 3, shows the Lena
Key (a[l ]) a[h]) / 2 image corrupted by salt and pepper noise by
(1)
20% (dB).
IV EXPERIMENTAL RESULTS
Table 1. PSNR Performance of Different Algorithms [9] T. Sun and Y. Neuvo, “Detail-preserving median
for Lena image corrupted with salt and pepper noise based filters in image processing,” Pattern
Recognit. Lett., vol. 15, no. 4, pp. 341–347,
Algorithm Noise Density in dB Apr.1994.
[10] A. Sawant, H. Zeman, D. Muratore, S. Samant,
10% 20% 30% and F. DiBianka, “An adaptive median filter
MF(3x3) 31.19 28.48 25.45 algorithm to remove impulse noise in X-ray and
MF(5x5) 29.45 28.91 28.43 CT images and speckle in ultrasound
images,” Proc.SPIE vol. 3661,pp. 1263–1274,
MMEM [8] 30.28 29.63 29.05 Feb. 1999.
Florencio‟s [9] 33.69 32.20 30.95
AMF(5x5) [10] 30.11 28.72 27.84
IMF(Proposed) 33.86 30.59 25.75
V CONCLUSION
REFERENCES
SIP0407-4
CONFERENCE ON “SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM (SPRTOS)” MARCH 26-27 2011
Abstract: The rapid development of technologies and steady using a simple metric and the images are compared with one
growing amounts of digital information highlight the need of another based on those extracted features. These three features
developing an accessing system. Content-based image indexing are integrated into one method to improve the retrieval
and retrieval has been an emerging research area from the last efficiency. Those images which have similar features would
few decades. In this, the project approaches content based image
have similar content as well. Focus of this project is on
retrieval using low level features such as color, shape and texture
to investigate samples of blood cells through the images to aid medical diagnosis in which CBIR can be used to detect the
diagnosing disease by identifying similar cases in a medical disease by identifying similar cases in a medical database.
database. Medical images are classified in terms of diseases and
by using query image the relevant image is retrieved along with II. PROPOSED METHOD
the classification of disease. The histogram of red, green, and Content-based Image Retrieval (CBIR) consists of
blue color components is analyzed. The wavelet decomposition is retrieving the most visually similar images to a given query
also used to analyze texture. In addition, morphological image from a database of images. CBIR from medical image
operations such as opening and closing are applied to analyze databases does not aim to replace the physician by predicting
object shape. Lastly, color, texture, and shape in image retrieval
the disease of a particular case but to assist him/her in
are integrated in order to increase the retrieval accuracy.
diagnosis. The visual characteristics of a disease carry
Keywords: Text Based Image Retrieval (TBIR), Content Based diagnostic information and oftentimes visually similar images
Image Retrieval (CBIR) correspond to the same disease category. By consulting the
output of a CBIR system, the physician can gain more
I. INTRODUCTION confidence in his/her decision or even consider other
In today world the word knowledge has exchanged its possibilities.
meaning with the information and hence to the data. In However, due to the existence of a large number of
addition to it the rapid development of technologies in digital medical image acquisition devices, medical images are
field and computing hardware makes the digital acquisition of distinct and require a specific design of CBIR systems. The
information to be more in demand and popular. goals of medical information systems have been defined to
Consequently many digital images are being captured and deliver the needed information at the right time, the right place
stored such as medical images, architectural and engineering to the right person in order to improve the quality and
images, advertising, design and fashion images, etc., and as a efficiency of care processes. In the medical domain, images
result large image databases are being created and used in from the same disease class as the query image must be
many applications. However, the focus of our study is on retrieved in order to help the doctor in diagnosis. The images
medical images in this work. A large number of medical in the medical database are labeled by a specialist to ensure
images in digital format are generated by hospitals and that they are less subjective than those of the generic CBIR.
medical institutions every day. So, how to make use of this Figure 1 represents the framework of the CBIR system. This
huge amount of images effectively becomes a challenging level of retrieval is based on the primitive features. The
problem. following are some of the primitive features such as
In order to overcome this problem the most common
approach that had been used previously for image retrieval Color
from a database was Text Based Image Retrieval (TBIR). Texture
But later introduced image retrieval based on content Shape or the spatial location of image element.
which is known as Content Based Image Retrieval (CBIR). In
TBIR, all medical images are labeled with text which is A. COLOR ANALYSIS
manmade and may be different for individuals for the similar Color is one of the most important features that make the
images. Another drawback of TBIR is that all images image recognition possible by human. It is a property that
especially medical images are difficult to be described by text. depends on the reflection of light to the eye and the processing
Drawback of TBIR can be overcome by CBIR. of that information in the brain. Color will be used every day
In CBIR, the features from images are extracted using to differentiate objects, places, etc. where colors are defined in
different methods. The features include color, texture and three dimensional color spaces such as RGB (Red, Green, and
shape. Color histogram is the main method to represent the Blue), HSV(Hue, Saturation, and Value) or HSB (Hue,
color information of the image. A method called the pyramid- Saturation, and Brightness). Most image formats use the RGB
structured wavelet transform for texture classification is used. color space to store information. Most image formats such as
The number of oval objects in the query image is calculated
SIP0427-1
CONFERENCE ON “SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM (SPRTOS)” MARCH 26-27 2011
JPEG, BMP, GIF, use the RGB color space to store Where considering the samples a and b, n is the number
information. of partitions, and ai, bi are the number of members of samples
a and b in the ith partition. The Bhattacharya coefficient will
range from 0 to 1 where 1 represents the completely similar
image and 0 indicates that there is no similarity in two images
[9].
B) TEXTURE ANALYSIS:
A texture is a measure of the variation of the intensity of a
surface, quantifying properties such as smoothness, coarseness
and regularity. The most popular representation of texture is
Wavelet Transform.A method called the pyramid-structured
wavelet transform for texture classification is used. It
decomposes sub-signals in the low frequency channels
recursively. It is mainly trivial for textures with dominant
frequency channels. For this reason, it is mostly suitable for
signals consisting of components with information
concentrated in lower frequency channels. Since most of the
information exists in lower sub band of the image due to the
natural image properties, the pyramid-structured wavelet
Figure: 1 Proposed CBIR System transform is highly sufficient. Using the pyramid structured
wavelet transform, [6] the texture image is decomposed into
The RGB color space is defined as a unit cube with red,
four sub images, in low-low, low-high, high-low and high-
green, and blue axes. Thus, a vector with three co-ordinates
high sub-bands. At this point, the energy level of each sub-
represents the color in this space which represents black when
band is calculated which is the first level decomposition. In
all of them set to zeros and represents white when all three
this study, fifth level decomposition is obtained by using the
coordinates are set to 1.
low-low sub-band for further decomposition. The reason for
1) Algorithm for Color Analysis:
this is the basic assumption that the energy of an image is
i. Color histograms of query image and images in a
concentrated in the low-low band. For this reason the wavelet
database are calculated and put them into two
function used is the Daubechies wavelet.
different vectors.
1) Algorithm for Texture Analysis:
ii. Use this vector to calculate Bhattacharya
i. Decompose the image using pyramid –
coefficient of query image with each image in
structures Wavelet Transform (till fifth level
data base.
decomposition).
iii. The Bhattacharya coefficient is 1 for completely
ii. Build a histogram of the transformed image
similar image and 0 indicates that there is no
coefficients in each sub band.
similarity in two images. It ranges from 0 to 1.
iii. Calculate signature Vector for each image by
In CBIR, color histogram is the main method to represent
concatenation of these histograms.
the color information of the image. A color histogram is a type
iv. Compute L1- distance using equation 2 of Query
of bar graph, where each bar represents a particular color of
image with all images in data base.
the color space being used. A histogram is a probability
In order to characterize the image texture at different
density function. It represents discrete frequency distribution
scales, the distribution of the wavelet coefficients in each sub
for a grouped dataset, which includes different discrete values
band of such decomposition is characterized by an image
that are grouped into a number of intervals [12]. An image
signature. An image signature is defined by building a
histogram refers to the probability density function of the
histogram of the transformed image coefficients in each sub
image intensities. This is extended for color images to capture
band. As images are decomposed with a pyramidal scheme on
the intensities of the three-color channels.
Nl levels, they consist of 3 * Nl + 1 sub bands: there are 3 sub
In this project the color histograms of query image and
bands of details at each scale l <= Nl (lHH, lHL and lLH) plus
images in a database are calculated and put them into two
an approximation (NlLL), 3*Nl+1 histograms are thus built.
different vectors and compare them using Bhattacharya
The signature is a vector formed by the concatenation of these
coefficient. The Bhattacharya coefficient is an approximate
histograms. The distance used to compare two images Im1
measurement of the amount of overlap between two statistical
and Im2 based on the L1-distance between histograms or 2
samples. The coefficient can be used to determine the relative
signatures.
closeness of the two samples being considered.
n
The distance measure is given
BhattacharyaCoeff ( ai bi) (1)
i 1
SIP0427-2
CONFERENCE ON “SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM (SPRTOS)” MARCH 26-27 2011
3 Nl 1 III. RESULT
d (Im1 , Im2 ) t ( H t1 H t2 ) (2) In our classification system, the ground truth database is
t 1 made of 25 blood cell images with two different
NB classifications. Classification is based on type of disease i.e.,
Ht1 Ht2 Ht1 ( j ) Ht2 ( j ) sickle cell disease and cancer disease.
j 1 Sickle Cell disease is hereditary Blood disease
n
H ( j ) the value of the jth bin of the ith is normalized resulting from a single amino acid mutation of the red
Where t
blood cells. A blood condition of anemia. People with
sickle cell disease have red blood cells that contain
t t 1 3 Nl 1
histogram of image n and is a set of tunable mostly hemoglobin S, an abnormal type of
weights. hemoglobin. Sometimes these red blood cells become
crescent shaped "sickle shaped".
C) SHAPE ANALYSIS Cancer of the myeloid line of blood cells,
Shape may be defined as the characteristic surface characterized by the rapid growth of abnormal white
configuration of an object; an outline or contour. It permits an blood cells.
object to be distinguished from its surroundings by its outline. In order to increase the accuracy of retrieval result in
1) Algorithm for cell geometry analysis: the proposed system, the result of color, texture and cell
i. Convert the image to black and white in order to geometric are combined so that only images which are
prepare for boundary tracing using common in all the above three feature extraction will be
bwboundaries and threshold the image. shown as final result. The advantages of this system are
ii. Remove the noise. high accuracy and precision as well as simplicity of the
iii. Find the boundaries. algorithm.
iv. Determine number of oval objects in Query Query image is blood cell sample image of patient for
image and all the images in database. diagnose of disease. Search result shows type of disease
Based on the domain in this project which is blood cell patient is suffering from. If patient is not suffering from
images, the number of round objects in the image needs to be these two diseases then result will be shown as patient is
determined; to achieve this Convert the image to black and not suffering.
white in order to prepare for boundary tracing using
bwboundaries function in MATLAB.
Then morphological operator such as opening is used to
remove the small connected objects which do not belong to
the objects of interest. The result of area and perimeter of an
object inside each image is used to form a simple metric
indicating the roundness of an object using the following
formula:
4 area (3)
Metric
P Perim eter 2
SIP0427-3
CONFERENCE ON “SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM (SPRTOS)” MARCH 26-27 2011
REFERENCES
[1] “Old fashion text-based image retrieval uses FCA” by Ahamd, I.;
Taek-Sueng Jang, published in Image Processing, 2003.ICIP
2003.Proceedings.2003 International Conference on Image Processing.
[2] “ Content based medical image retrieval based on pyramid structure
wavelet” by Aliaa.A.A.Youssif*, A.A.Darwish an R.A.Mohamed
published in IJCSNS International Journal of Computer Science and
Network Security, VOL.10 No.3, March 2010
[3] “Content-based image retrieval from large medical databases” by Kak,
A. Pavlopoulou, C. published in 3D Data Processing Visualization and
Transmission, 2002,Proceedings in First International Symposium.
[4] “An Adaptive, Knowledge-Driven Medical Image Search for Interactive
Diffuse Parenchymal Lung Disease Quantification” by Yimo Tao,
Xiang Sean Zhou.
[5] “WEB-BASED MEDICAL IMAGE RETRIEVAL SYSTEM” by Ivica
Dimitrovski, Dejan Gorgevik, Suzana Loskovska.
[6] Paper on “Wavelet Optimization for Content-Based Image Retrieval in
Medical Database “by G. Quellec M. Lamard, G. Cazuguel B.
Cochener, C. Roux.
[7] “Application of Wavelet Transform and its Advantage Compared to
Fourier Transform” by M. Sifuzzaman1, M.R. Islam1 and M.Z Ali
Journal of Physical Sciences, Vol. 13, 2009, 121-134.
[8] “Automatic Detection of Red Blood Cells in Hematological Images Using
Polar Transformation and Run-length Matrix” by S. H. Rezatofighi*, A.
Roodaki, R. A. Zoroofi R. Sharifian H. Soltanian-Zadeh published in
ICSP2008 Proceedings. ( 978-1-4244-2179-4/08/$25.00 ©2008 IEEE)
[9] “Content-based Image Retrieval for Blood Cells” by Mohammad Reza
Zare, Raja Noor Ainon, Woo Chaw Seng, published in 2009 Third Asia
International Conference on Modelling & Simulation.
[10] “Digital Image Search & Retrieval uses FFT Sectors of Color Images”
by H. B. Kekre, Dhirendra Mishra published in International Journal on
Computer Science and Engineering.
[11] “Content Based Image Retrieval using Contourlet Transform” by
Ch.Srinivasa rao ,S. Srinivas kumar , B.N.Chatterji in ICGST-GVIP
Journal, Volume 7, Issue 3, November 2007.
[12] Paper on “Discrete Wavelet Transforms: Theory and Implementation
“by Tim Edwards.
[13] “A Content-Based Retrieval System for Blood Cells Images” by Woo
Chaw Seng and Seyed Hadi Mirisaee in 2009 International Conference
on Future Computer and Communication.
[14] “A CBIR METHOD BASED ON COLOR-SPATIAL FEATURE” by
Zhang Lei, Lin Fuzong, Zhang Bo.
SIP0427-4
1
AUDIO +
Abhay Kumar
Research Scholar at Associated Electronics Research Foundation, Phase-II Noida (U.P.)
abhay.2t@gmail.com
Abstract--AUDIO+ is an electronic device that Very low distortion, low noise, and wide bandwidth
alter how a musical instrument or other audio provide superior performance in high quality audio
source sounds and can be best termed as a applications.
“Digital Effect Processor”. Some effects subtly
"colour" a sound, while others transform it LM1036 of the National Instruments is a DC
dramatically. Effects can be used during live controlled tone (bass/treble), volume and balance
performances (typically with keyboard, electric circuit for stereo applications in car radio, TV and
guitar or bass) or in the studio i.e. the faithful audio systems. An additional control input allows
reproduction of the sound signals is heard when loudness compensation to be simply effected.
AUDIO+ is used in the audio line.
III. DRV134
AUDIO+ has a unique quality to modify the
sound signals and make it soothing to every DRV134 is a differential output amplifiers that
human ear. The device is provided with the convert a single-ended input to a balanced output
control panel of “Volume”, “Bass”, “Treble” and pair. These balanced audio drivers consist of high
“Balance” to make it desirable for ear sensitive performance op amps with on-chip precision
to high and low frequency sound. AUDIO+ is resistors. They are fully specified for high
easy to use portable device with single signal performance audio applications, including low
input/output port and an internal power supply distortion (0.0005% at 1 kHz). Wide output voltage
with batteries. swing and high output drive capability allow use in
a wide variety of demanding applications. They
Keywords: Digital audio players, Digital signal easily drive the large capacitive loads associated
processors, Mixed analog digital integrated circuits, with long audio cables. Laser-trimmed matched
Digital filters, Equalizers, Digital controls. resistors provide optimum output common-mode
rejection (typically 68dB), especially when
I. INTRODUCTION compared to circuits implemented with op amps and
discrete precision resistors. In addition, high slew
rate (15V/μs) and fast settling time (2.5μs to 0.01%)
AUDIO+ is all about the musical sound box, which
ensure excellent dynamic response. The DRV134
can take the raw mp3, mpeg data and process it has excellent distortion characteristics. Noise is
digitally. What is interesting that it can sample and below 0.003% throughout the audio frequency range
play many sound formats starting from sampling under various output conditions. The gain of 6dB is
rate of 8 kHz to 96 kHz which is more than enough seen at the output of the differential amplifier.
to play any sound format. It improves Sound quality
with significant reduction of noise and Dolby sound
effects.
V. LM1036
1.50
Output
0.00
-1.50
-3.00
0.00 10.00 20.00 30.00 40.00 50.00
Input voltage (V)
T 30.00u
Output noise (V/Hz?)
20.00u
10.00u
0.00
1 10 100 1k 10k 100k 1M The above diagram shows that how the balanced
Frequency (Hz) output can be amplified and two channels can be
made using INA137 (Gain=1/2) and INA134
(Gain=1).
Fig 7: Noise analysis of DRV 134
0.00
The AUDIO+ has a great advantage in audio
system and audio communication. That’s why an
-1.50
opportunity to use in digital communication and
VOIP phone.
X. REFRENCES
-3.00
0.00 25.00 50.00 75.00 100.00 1) Software support and information about the digital speakers
Input voltage (V) reveal from: Texas Instrument ( www.TI.com)
Fig 11: DC analysis of DRV 134 with INA 2137 2) Audio www.ti.com/audio
3) Data Converters dataconverter.ti.com
4) DSP dsp.ti.com
5) Digital Control www.ti.com/digitalcontrol
The above fig 11 shows that the output voltage
6) Clocks and Timers www.ti.com/clocks
range between 200mVrms to 2Vrms and the sampling 7) Logic logic.ti.com
frequency of 8 kHz to 96 kHz. 8) Power Mgmt power.ti.com
9) Microcontrollers microcontroller.ti.com
VIII. CONCLUSION 10) Hardware support from: Farnell India (http://in.farnell.com/)
11) Audio codec www.ti.com/tlv320aic3101.pdf
AUDIO+ maintains the originality of five major 12) Audio digital processor www.ti.com/tas3103.pdf
components of sound signals: 13) Audio line driver www.ti.com/drv134.pdf
14) Input amplifier www.ti.com/ina2134.pdf
a. Pitch: the frequency of sound signals. 15) Voltage regulator www.ti.com/tps62007.pdf,
Low frequencies (Bass): Make www.ti.com/tps74801.pdf, www.ti.com/tps74701.pdf,
16) Control IC www.national.com
the sound powerful.
Midrange frequencies: Give
sound its energy. Human being
are more sensitive to midrange
frequencies.
High frequencies (Treble): Give
sounds its presence and life like
quality and lets us feel that we
are close to sound source.
CONFERENCE ON “SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM (SPRTOS)” MARCH 26-27 2011
amplitude at a rate of 12 dB per octave – the structures such as the oral cavity, nasal
measure between each harmonic . cavity, velum, epiglottis, tongue, etc.
The reason pitch differs between sexes is the When air flows through the laryngeal tract,
size, mass, and tension of the laryngeal tract the air vibrates at the pitch frequency
which includes the vocal folds and the formed by the laryngeal tract as mentioned
glottis (the spaces between and behind the above. Then the air flows through the
vocal folds). Just before puberty, the supralaryngeal tract, which begins to
fundamental frequency, or pitch, of the reverberate at particular frequencies
human voice is about 250 Hz, and the vocal determined by the diameter and length of the
fold length is about 10.4 mm. After puberty cavities in the supralaryngeal tract. These
the human body grows to its full adult size, reverberations are called “resonances” or
changing the dimensions of the larynx area. “formant frequencies”. In speech,
The vocal fold length in males increases to resonances are called formants. So, those
about 15-25 mm while female’s vocal fold harmonics of the pitch that are closest to the
length increases to about 13-15 mm. These formant frequencies of the vocal tract will
increases in size correlate to decreased become amplified while the others are
frequencies coming from the vocal folds. In attenuated
males, the average pitch falls between 60
and 120 Hz, and the range of a female’s INTRODUCTION- Most signal processing
pitch can be found between 120 and 200 Hz. involves processing a signal without concern
Females have a higher pitch range than for the quality or information content of that
males because the size of their larynx is signal. In speech processing, speech is
smaller. However, these are not the only processed on a frame by-frame basis usually
differences between male and female speech only with the concern that the frame is either
patterns . speech or silence The usable speech frames
can be defined as frames of speech that
FORMANT FREQUENCIES contain higher information content
When sound is emitted from the human compared to unusable frames with reference
mouth, it passes through two different to a particular application. We have been
systems before it takes its final form. The
first system is the pitch generator, and the Similarity
next system modulates the pitch harmonics
created by the first system. Scientists call the
Reference
first system the laryngeal tract and the model Identification
Input Feature Maximum
second system the supralaryngeal/vocal (Speaker #1) result
speech extraction selection
tract. The supralaryngeal tract consists of (Speaker ID)
SIP0502-2
Similarity
Reference
model
(Speaker #N)
CONFERENCE ON “SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM (SPRTOS)” MARCH 26-27 2011
investigating a speaker identification system speech utterance. System identifies the user
to identify usable speech frames. We then by comparing the codebook of speech
determine a method for identifying those utterance with those of the stored in the
frames as usable using a different approach. database and lists, which contain the most
However, knowing how reliable the likely speakers, could have given that
information is in a frame of speech can be speech utterance.
very important and useful.
This is where usable speech detection and
extraction can play a very important role.
The usable speech frames can be defined as
frames of speech that contain higher
information content compared to unusable
frames with reference to a particular
application. We have been investigating a
speaker identification system to identify At the highest level, all speaker recognition
usable speech frames .We then determine a systems contain two main modules (refer to
method for identifying those frames as Figure 1): feature extraction and feature
usable using a different approach. matching. Feature extraction is the process
that extracts a small amount of data from the
PARADIGMS OF SPEECH voice signal that can later be used to
RECONGITION represent each speaker. Feature matching
involves the actual procedure to identify the
1. Speaker Recognition - Recognize which unknown speaker by comparing extracted
of the population of subjects spoke a given features from his/her voice input with the
utterance. ones from a set of known speakers.
2. Speaker verification -Verify that a given
speaker is one who he claims to be. System
prompts the user who claims to be the
Verification
Input Feature result
speaker to provide ID. System verifies user Similarity Decision
by comparing codebook of given speech speech extraction (Accept/Reject)
utterance with that given by user. If it
matches the set threshold then the identity
claim of the user is accepted otherwise Reference
rejected. Speaker ID Threshold
3. Speaker identification - detects a
model
particular speaker from a known population.
(#M) (Speaker #M)
The system prompts the user to provide
SIP0502-3
CONFERENCE ON “SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM (SPRTOS)” MARCH 26-27 2011
REFERENCES
SIP0502-7
Modeling of FBAR Resonator and Simulation using APLAC
Deepak kumar, Navaid Z.Rizvi,Rajesh Mishra
Gautam Buddha University,Greater Noida
dkumar.gbu@gmail.com
Abstract
as compared to silicon and furthermost the
This Paper focuses on the analysis of the
cost of quartz wafers is significantly higher
Film Bulk Acoustic Wave Resonator
than that of silicon.[1-7]
(FBAR) comprising of Zinc Oxide (ZnO)
FBAR Devices
piezoelectric thin film sandwiched
FBAR stands for Film Bilk Acoustic
between two metal electrodes of gold (Au)
Resonator FBAR is a break through
and located on a silicon substrate with a
resonator technology being developed by
low stress silicon nitride (Si3N4)
Agilent technologies.Thus the technology
supporting membrane for high frequency can be used to create the essential
wireless application. The film bulk frequency shooing elements found in
acoustic wave technology is a promising modern wireless systems, including filters,
technology for manufacturing miniaturized duplexers and resonators for oscillators.
high performance filters for Giga Hertz [1-3]
range. Why FBAR
Keywords: FBAR, Quartz crystal, APLAC. The rapid growth of wireless mobile
telecommunication system leads to
Quartz Crystal increase in demand for high frequency
Crystal Quartz is the most important oscillators, filters and duplexers capable of
resonator material presently available. It operating in GHz frequency band range.
has been used for 50 years, and thus Conventionally Liquid Crystal, microwave
growth, characterization, and fabrication ceramic resonators, transmission lines and
techniques are quite mature. Its low SAW devices have been used as high
coupling is usually not a disadvantage frequency band devices. Although they
when it is used for frequency control provide high performance at reasonable
applications. For reasonable values of price but they are large in size to be able to
transducer areas, the resistance falls in the integrate in wireless application. SAW
10 –20 ohm range at 5 to 20MHz. This have better electrical performances and
range is ideal for oscillator circuits. Its Q is smaller in size but they had relatively poor
some what lower than that of ferroelectric sensitivity to temperature, high insertion
materials, but at lower frequencies it is losses and limited power handling.
more than adequate, and because the To cope with these limitations FBAR
stoichmetery of the crystal quartz is simple devices have been developed and can
and its growth technology well easily replace these devices in higher
established, there are a few crystal defects frequency for wireless communication
and the attenuation has frequency squared applications.A thin film bulk acoustic
dependence. Only when very high wave resonator consists basically of a thin
frequencies or wide inductive regions are piezoelectric layer sandwiched between
required do designers look beyond quartz. two electrodes. In such a resonator a
So at higher frequencies e.g. at GHz we mechanical wave is piezoelectrically is
cannot use quartz and FBAR and Saw excited in response to an electric field
devices are used which are much smaller applied between the electrodes. The
in size. Quartz also have disadvantage that propagation direction of this acoustic wave
it has the limits of the integration with the is perpendicular to the surface of the
mechanical structure and integrated circuit resonator. For a standing wave situation to
CONFERENCE ON “SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM (SPRTOS)” MARCH 26-27 2011
SIP0503-1
prevail, the acoustic energy has to be In an LFE-FBAR, the applied electric
reflected back at the boundaries of the field is in y-direction, and the shear
resonator. This reflectivity can be achieved acoustic wave (excited by the lateral
by two means, either an air-interface or an electric field) propagates in z-direction.
acoustic mirror. Piezoelectric thin films
convert electrical energy into mechanical One Dimensional Acoustic-Wave
energy and vice versa. Film Bulk Acoustic Equation:
Resonator (FBAR) consists of a The fundamental wave equation related to
piezoelectric thin film sandwiched by two the longitudinal acoustic-wave generation
metal layers. A resonance condition occurs and propagation for one dimensional case
if the thickness of piezoelectric thin film is
(d) is equal to an integer multiple of a half
of the wavelength (λres). The fundamental
resonant frequency (Fres=1/ λres) is then (1)
inversely proportional to the thickness of
the piezoelectric material used, and is
equal to Va/2d where Va is an acoustic Where T, S, c and mo are the mechanical
velocity at the resonant frequency (Fig. 1). stress, the mechanical strain, the stiffness
elastic constant and the mass density of the
material, respectively.
CONFERENCE ON “SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM (SPRTOS)” MARCH 26-27 2011
SIP0503-2
The following equivalent circuit models Using boundary conditions :
are used widely for FBAR electrical V = -v2sin[k(z+d/2)]+v1sin[k(d/(2-z))]/sin(kd)
modeling. (15)
1. Mason equivalent circuit model By evaluating the above equations Mason
2. Redwood equivalent circuit model model of a piezoelectric transducer
3. KLM equivalent circuit model (resonator) is obtained.
In this paper the Mason three Port
Equivalent circuit model have been used.
CONFERENCE ON “SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM (SPRTOS)” MARCH 26-27 2011
SIP0503-3
Why APLAC
With the help of APLAC Circuit Obtained and taken values in the
simulation and design tool, any RF or simulation are given in table.1:
analog circuit can be easily simulated with Table.1
a wide range of analysis methods. Ar Thi S S fp fs k Q F
Moreover, optimization, tuning and a ea ck 21 11 eff O
2
Monte Carlo statistical feature (for design (F nes Mi Mi M
yield) are available with every analysis B s n n
methods. Through APLAC it is possible to A of
easily simulate miniaturized structures and R) Zn
complex system. Device models developed O
for large devices are inapplicable when 45 1.2 - - 2.5 2.6 0. 1 3
nano-scale physical phenomena enter into u um 6 0. 93 21 0 5 9
2
play. m 1 3 GH GH 2 0 0
d d z z 6 0
Simulation Results B B 0
Firstly simulated a ZnO FBAR structure in
Aplac8.1 version. The FBAR is having lay
an upper and bottom electrode of Au and a
membrane layer of Si3N4 for support.
Then calculated the resonance frequency
analytically and then analyzed the
simulated result which is approximately
the same.
CONFERENCE ON “SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM (SPRTOS)” MARCH 26-27 2011
SIP0503-4
It also analyzed the influence of different
ZnO FBAR Area 45usq.m d=1.2um piezoelectric films and electrode materials
APLAC 8.10 Student version FOR NON-COMMERCIAL USE ONLY
on the characteristics of a thin film bulk
1.00 180.00
acoustic resonator (FBAR). The results
dB PHASE
confirm that the material properties and
0.63 90.00 thicknesses of piezoelectric film play a
significant role in determining the
0.25 0.00 performance of FBAR, and influence such
characteristics such as Resonance
-0.13 -90.00 frequency, the bandwidth and the insertion
loss. Since the results demonstrate that the
-0.50 -180.00 thicknesses of each of the layers within the
1.500G 1.875G 2.250G 2.625G 3.000G acoustic wave path, and by the resonance
f/Hz area, the potential exists to tune the
MagdB(S(1,1)) Pha(S(1,1)) characteristics of the FBAR by specifying
Figure.6 .FBAR Resonator S (1, 1) appropriate geometric parameters during
the FBAR design stage.
0.5 2.0
-0.5 -2.0
CONFERENCE ON “SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM (SPRTOS)” MARCH 26-27 2011
SIP0503-5
Conclusion
AlN FBAR Area=45um d=1.2um Result shows that the resonant frequency
APLAC 8.10 Student version FOR NON-COMMERCIAL USE ONLY of the FBAR depends upon the particular
-18.00 180.00 choice of the piezoelectric material. It also
dB PHASE demonstrated that the FBAR performance
-28.50 90.00 is influenced by the physical dimensions
of the device, including the thickness of
-39.00 0.00 the piezoelectric film, electrode,
membrane layer, and by the resonance area
-49.50 -90.00 size. It is possible to calculate the effective
coupling coeffient, Q factor and figure of
merit. In this way it is possible to specify
-60.00 -180.00 suitable parameter values, which will
3.500G 3.875G 4.250G 4.625G 5.000G
optimize the design of the FBAR, and
f/Hz
which can be used in designing FBAR
MagdB(S(2,1)) Pha(S(2,1))
devices that will operate within a specified
Figure.9 AlN FBAR Resonator S21 frequency range.
Refrences
(1)K.M Lakin and G.R Kline and K.T
AlN FBAR Area=45um d=1.2um
APLAC 8.10 Student version FOR NON-COMMERCIAL USE ONLY
MCArron,” High –Q microwave acoustic
0.50 180.00 resonators and filters,” IEEE transactions
dB PHASE microwave theory and techniques,vol.41.
0.18 90.00 (2) S.V Krishnaswamy , J. Rosenbaum ,S.
Horwitz ,C.Vale and R.A. Moore ,” Film
-0.15 0.00 Bulk acoustic wave resonator technology
,” Proceedings of the IEEE ultrasonic
-0.48 -90.00 Symposium, Honolulu, HI, USA, 1990.
(3)P.J Yoon GW,” Fabrication of ZnO-
-0.80 -180.00 based film bulk acoustic resonator devices
3.500G 3.875G 4.250G 4.625G 5.000G
using W/SiO2 multilayer reflector,”
f/Hz
MagdB(S(1,1)) Pha(S(1,1)) Electronics letters, vol.36 (16).
(4)K.M.Lakin and J.S. Wang,”UHF
Figure.10 AlN FBAR Resonator S11 composite bulk wave resonator” Ultrasonic
Symposium ,1990.
(5)W.P Mason, Physical Acoustic
AlN FBAR Area=45um d=1.2um Principles and Methods, Vol.1A,
APLAC 8.10 Student version FOR NON-COMMERCIAL USE ONLY Academic press, New York.
(6) G. G. Fattinger, J. Kaitila, R. Aigner,
0.5 2.0
W. Nessler,” Single-to-balanced Filters for
Mobile Phones using Coupled Resonator
BAW Technology”,IEEE International
Ultrasonics, Ferroelectrics and Frequency
Control Symposium, 2004.
(7)K. M. Lakin, “Thin film resonator
-0.5 -2.0 technologies”, IEEE Trans. UFFC,vol.52,
pp. 707-716, May 2005.
0.0 0.2 1.0 5.0 (8)F. Constantinescu. M. Nitescu, A. G.
Im(S(1,1)) Im(S(2,1)) Gheorghe, “New circuit models for power
Figure.11 Smith Chart showing S (2, 1) BAW resonators “, in Proc. .ICCSC
and S(1,1) Shanghai, China, pp.176-179,2008.
CONFERENCE ON “SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM (SPRTOS)” MARCH 26-27 2011
SIP0503-6
CONFERENCE ON “SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM (SPRTOS)” MARCH 26-27 2011
SIP0506-1
CONFERENCE ON “SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM (SPRTOS)” MARCH 26-27 2011
receiver. Having only two copies of records made (CFB). The basic DVP algorithm is capable of
it impossible for the wrong receiver to decrypt the 2.36 x 1021 different "keys" based on a key length
signal. To implement the system, the army of 32 bits." The extremely high amount of
contracted Bell Laboratories and they developed a possible keys associated with the early DVP
system called SIGSALY. With SIGSALY, ten algorithm, makes the algorithm very robust and
channels were used to sample the frequency gives the user a high level of security. As with any
spectrum from 250 Hz to 3 kHz and two channels voice encryption system, the encryption key is
were allocated to sample voice pitch and required to decrypt the signal with a special
background hiss. In the time of SIGSALY, the decryption algorithm[2].
transistor had not been developed and the digital
sampling was done by circuits using the model OVERVIEW OF THE PROPOSED SPEECH
III.
2051 Thyratron vacuum tube. Each SIGSALY SCRAMBLING TECHNIQUE
terminal used 40 racks of equipment weighing 55 Speech inversion is a very common method of
tons and filled a large room. This equipment speech scrambling, probably because its the
included radio transmitters and receivers and large cheapest. Speech inversion works be taking a
phonograph turntables. The voice was keyed to signal and turning it 'inside out', reversing the
two 16-inch vinyl phonograph records that signal around a pre-set frequency. Speech
contained a Frequency Shift Keying (FSK) audio inversion can be broken down into three types,
tone. The records were played on large precise base-band inversion (also called 'phase
turntables in synch with the voice transmission[1]. inversion'), variable-band inversion (or 'rolling
phase inversion') and split band inversion. Images
From the introduction of voice encryption to
will be used to help clarify what different
today, encryption techniques have evolved
inversion systems do.
drastically. Digital technology has effectively
replaced old analog methods of voice encryption
and by using complex algorithms; voice
encryption has become much more secure and
efficient. One relatively modern voice encryption
method is Sub-band coding. With Sub-band
Coding, the voice signal is split into multiple
frequency bands, using multiple bandpass filters
that cover specific frequency ranges of interest.
The output signals from the bandpass filters are
then lowpass translated to reduce the bandwidth,
which reduces the sampling rate. The lowpass
signals are then quantized and encoded using
Fig 1: The non-scrambled sound wave
special techniques like, Pulse Code
Modulation (PCM). After the encoding stage, the
signals are multiplexed and sent out along the Base band inversion inverts the signal around
communication network. When the signal reaches a pre-set frequency that never changes. Because
the receiver, the inverse operations are applied to of this, base-band inversion is useless. Because
the signal to get it back to its original state. the inverting frequency never changes, running
Motorola developed a voice encryption system the frequency through another inverter set on the
called Digital Voice Protection (DVP) as part of same frequency unscrambles it. Descrambling
their first generation of voice encryption baseband inversion is simple. Take the scrambled
techniques. "DVP uses a self-synchronizing input and re-invert it around the same inversion
encryption technique known as cipher feedback point used to scramble it.
SIP0506-2
CONFERENCE ON “SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM (SPRTOS)” MARCH 26-27 2011
SIP0506-3
CONFERENCE ON “SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM (SPRTOS)” MARCH 26-27 2011
.
Fig 4: SEU-8201 Voice Encryption System
SIP0506-4
CONFERENCE ON “SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM (SPRTOS)” MARCH 26-27 2011
SIP0506-5