SIP
SIP
Comb-Drive Structure
                                            Mr. Prashant Gupta
                                           prashant_iit@ieee.org
                                 Ideal Institute of Technology, Ghaziabad
Abstract:-         Resonators serve as essential        of resonant frequencies, although only a few may
components in Radio- Frequency (RF) electronics,        be used in practical resonators. The vibrations
forming the backbone of filters and tuned               inside them travel as waves, at an approximately
amplifiers. However, traditional solid state or         constant velocity, bouncing back and forth
mechanic implementations of resonators and              between the sides of the resonator. The oppositely
filters tend to be bulky and power hungry, limiting     moving waves interfere with each other to create a
the versatility of communications, guidance, and        pattern of standing waves in the resonator. If the
avionics      systems.    MicroElectro-Mechanical       distance between the sides is , the length of a
Systems (MEMS) are promising replacements for           round trip is     . In order to cause resonance,
traditional RFcircuit components.                       the phase of a sinusoidal wave after a round trip
In this paper we discuss the MEMS resonator,            has to be equal to the initial phase, so the waves
which is one of the versatile components in the RF      will reinforce. So the condition for resonance in a
circuits, based on one of the promising                 resonator is that the round trip distance,      , be
architecture known as Comb-Drive structure.             equal to an integral number of wavelengths of
                                                        the wave:
Introduction:
A resonator is a device or system that
exhibits resonance or resonant behavior, that is, it    If the velocity of a wave is , the frequency
naturally oscillates at some frequencies, called its
                                                        is           so the resonance frequencies are:
resonant frequencies, with greater amplitude than
at others. The oscillations in a resonator can be
either electromagnetic or mechanical (including
acoustic). Resonators are used to either generate
waves of specific frequencies or to select specific     So the resonant frequencies of resonators,
frequencies from a signal.                              called normal modes, are equally spaced multiples
                                                        (harmonics), of a lowest frequency called
A physical system can have as many resonant             the fundamental frequency. The above analysis
frequencies as it has degrees of freedom; each          assumes the medium inside the resonator is
degree of freedom can vibrate as a harmonic             homogeneous, so the waves travel at a constant
oscillator. Systems with one degree of freedom,         speed, and that the shape of the resonator is
such as a mass on a spring, pendulums, balance          rectilinear. If the resonator is inhomogeneous or
wheels, and LC tuned circuits have one resonant         has a non rectilinear shape, like a circular
frequency. Systems with two degrees of freedom,         drumhead or a cylindrical microwave cavity, the
such       as coupled       pendulums and resonant      resonant frequencies may not occur at equally
transformers can have two resonant frequencies.         spaced multiples of the fundamental frequency.
The vibrations in them begin to travel through the      They       are     then     called overtones instead
coupled harmonic oscillators in waves, from one         of harmonics. There may be several such series of
oscillator to the next. Resonators can be viewed as     resonant frequencies in a single resonator,
being made of millions of coupled moving parts          corresponding to different modes of vibration.
(such as atoms). Therefore they can have millions
                                                                                                          1
MEMS Resonators:-
Mechanical resonators are highly sensitive probes
for physical or chemical parameters which alter         vertical displacement y from its equilibrium
their potential or kinetic energy[1,2]. Silicon         position, mass m and spring constant k = f / y, R is
resonant microsensors for measurement of                the damping coefficient.
pressure, acceleration, and vapor concentration         The angular resonant frequency is given by
have been demonstrated recently, polysilicon
micro-mechanical structures have been resonated
elcctrostatlcally parallel to the plane of the
substrate by means of one or more interdigitated
capacitors (electrostatic combs).                       Folded-Flexure comb drive Microresonator:-
 Some advantages of this approach are                   In the design of Resonator, spring constant played
(1) less damping on the structure, leading to           a vital role. Different types of spring designs have
higher quality factors,                                 been applied in comb-drive actuators.
(2) linearity of the electrostatic-comb drive and
(3) flexibility in the design of the suspension for     1- Clamped–clamped beams,
the resonator                                           2-A crab-leg flexure and
                                                        3- A folded-beam flexure.
For example, folded-beam suspensions can be
fabricated without increased process complexity,         In all these different types of spring design,
which is attractive for releasing residual strain and   folded beam structure is widely used to design a
for achieving large-amplitude vibrations.               Microresonator The folded-flexure electrostatic
                                                        comb drive micromechanical resonator shown in
There are different types of resonator. We only         Figure 1 was first introduced by Tang [4, 5,6].
focus on vibrating resonators.                          This device has been well-researched and is
•Lateral movement                                       commonly        used      for     MEMS        process
–Parallel to substrate                                  characterization. The microresonator consists of a
–Ex.: Folded beam comb-structure                        movable central shuttle mass which is suspended
                                                        by folded-flexure springs on either side. The other
•Vertical movement                                      ends of the folded-flexure springs are fixed to the
–Perpendicular to substrate                             lower layer. The microresonator can be thought
–Ex.: clamped-clamped beam (c-c beam)                   of, as a spring-mass damper system, the damping
–”free-free beam”(f-f beam)                             being provided by the air below and above the
                                                        movable part. By applying a voltage across the
                                                        fixed and movable comb fingers, an electrostatic
                                                        force is produced which sets the mass into motion
Example of simple resonators                            in the x-direction. The microresonator has been
                                                        used in building filters, oscillators and in resonant
Mass and spring. This resonator is used by many         positioning systems. Figure 1 shows the overhead
physicists as the elemental simple mechanical           view of a µresonator which utilizes interdigitated-
resonator, to explain the properties of more            comb finger transduction in a typical bias and
complex resonances and resonators.                      excitation configuration. The resonator consists of
                                                        a finger-supporting shuttle mass suspended above
The governing homogeneous differential equation         the substrate by folded flexures, which are
is                                                      anchored to the substrate at two central points.
                                                        The shuttle mass is free to move in the direction
                                                                                                           2
indicated, parallel to the plane of the silicon
substrate. Folding the suspending beams as shown
provides two main advantages: first, post-
fabrication residual stress is relieved if all beams   where Fe,ζ is the external force (in the x-mode
expand or contract by the same amount; and             this force is generated by the comb drives), rn; is
second, spring stiffening nonlinearity in the          theeffective mass, Bζ is the damping coefficient,
suspension is reduced, since the folding truss is      and k; is the spring constant.
free to move in a direction perpendicular to the       The fundamental frequency of the structure can be
resonator motion. The black areas are the places       obtained from Rayleigh’s Quotient.
where the polysilicon structure is anchored to the
bottom layer.                                          The fundamental resonance frequency of this
                                                       mechanical resonator is, again, determined largely
                                                       by material properties and by geometry, and is
                                                       given by the expression
The preferred direction of motion of the               where µ is the viscosity of air, d is the fixed
microresonator is the x-direction. However, the        spacer gap between the ground plane and the
microresonator structure can vibrate in other          bottom surface of the comb fingers, δ is the
modes. There are the three translation modes           penetration depth of airflow above the structure, g
along x, y and z, three rotational modes about x, y    is the gap between comb fingers, and As, At, Ab,
and z, and oscillation modes due the movement of       and Ac are layout areas for the shuttle, truss
the folded-flexure beams and the comb drive.           beams, flexure beams, and comb finger sidewalls,
Each oscillation mode is described by a lumped         respectively.
second-order equation of motion. For any
generalized displacement ζ, we can write:
                                                                                                        3
                                                       and resonator fingers. α is a constant that models
Working Principle:-                                    additional      capacitance     due     to   fringing
                                                       electricfields. For comb geometries, α =1.2 . Note
To bias and excite the device, a dc-bias voltage       that, again, Cn/x is inversely proportional to the
VP is applied to the resonator and its underlying      gap distance.
ground plane, while an ac excitation voltage is        Linear equations for the spring constants are
applied to one (or more) drive electrodes. A           derived using energy methods . A force (or
specific resonance mode may be emphasized by           moment) is applied to the free end(s) of the spring
using multiple drive electrodes, placing them at       in the direction of interest, and the displacement is
the displacement maxima of the desired mode,           calculated symbolically (as a function of the
and applying properly phased drive signals to the      design variables and the applied force). In these
electrodes. To avoid unnecessary notational            calculations different boundary conditions are
complexity, however, we focus on the case of           applied for the different modes of deformation of
fundamental-mode resonance in the present              the spring.
discussion. We also assume that the electrodes are     When forces (moments) are applied at the end-
concentrated at the center of the beam and that the    points of the flexure, the total energy of
beam length is much greater than the electrode         deformation, U, is calculated as:
lengths. This allows us to neglect beam
displacement variations across the lengths of the
electrodes due to the beam’s mode shape (i.e., we
may assume that x(y) ~ x for y near the center of
the beam). A more rigorous analysis which
accounts for all of these effects is certainly
possible, but obscures the main points. When an
ac excitation with frequency close to the              where, Li is the length of the i’th beam in the
fundamental resonance frequency of the                 flexure, Mi is the bending momentransmitted
µresonator is applied, the µresonator begins to        through beam i, E is the Young’s modulus of the
oscillate, creating a time-varying capacitance         material of the beam (polysilicon, in our case) and
between the µresonator and the electrodes. Since       Ii is the moment of inertia of beam i, about the
the dc-bias VPn = VP - Vn is effectively applied       relevant axis, Ti is the torsion transmitted through
across the time-varying capacitance at port n, a       beam i, G is the shear modulus, Ji is the torsion
motional output current arises at port n.              constant of beam i, and ξ is the variable along the
                                                       length of the beam. The bending moment and the
For this resonator design, the transducer              torsion is a linear function of the forces and
capacitors consist of overlap capacitance between      moments applied to the end-points of the flexure.
the interdigitated shuttle and electrode fingers. As   The displacement of an end-point of the flexure in
the shuttle moves, these capacitors vary linearly      any direction ζ is given as:
with displacement. Thus, Cn/x is a constant, given
approximately by the expression
                                                                                                          4
equations in terms of the applied forces and
moments and the unknown displacement. Solving          The displacement as a function of the driving
the set of equations yields a linear relationship      voltage was measured while applying a dc voltage
between the displacement and applied force in the      between the rotor (movable set) and a stator
direction of interest. The constant of                 (stationary set)
proportionality gives the spring constant as a
function of the physical dimensions of the flexure.
The effect of spring mass on resonance frequency
is incorporated in effective masses for each lateral
mode. Effective mass for each mode of interest is
calculated by normalizing the total maximum
kinetic energy of the spring by the maximum
shuttle velocity, Vmax.
                                                       Where
                                                       x- x direction
                                                       m-Mass
                                                       k-Spring constant
                                                       B- Damping coefficient.
                                                                                                     5
Simulation Process:-
Steps for the IntelliSuite Simulator
                                                                                               6
                                                 *Capacitance Report
                                                 Number of conductors: 2
                                                 CAPACITANCE MATRIX, 1e-6 nanofarads*1e-
                                                 6
                                                 C11 9.334000
                                                 C12 -1.037000
                                                 C21 -1.037000
                                                 C22 2.767000
                                                                                                                7
Conclusion and Future Work:-                           Acknowledgements:
                                                       This research work had been carrying out at
In this project we design and simulate a               CARE, IIT Delhi under the supervision of Prof.
microresonator based on comb-drive structure           Sudhir Chandra CARE, IIT Delhi. I am also
which is introduced by Tang. We design it and          grateful to my college Director Dr. G. P. Govil
calculate resonance frequency for different            and my Head of the Department Mr. N.P. Gupta
geometry parameters.                                   for his kind hearted support and motivation during
                                                       the research work.
There are two types of constraints in comb drive
structure (1-Geometric and 2-Functional) which         References:
we have not discuss here left for the future work.
The project work can be extended in a number of
directions. Manufacturing variations need to be       1.   S. M. Sze, Semiconductor Sensors, John
incorporated for accurate synthesis results.           Wiley & Sons Inc., New York, 1994
                                                      2.   Ljubisa Ristic, “Sensor Technology and
Fabrication for MEMS resonator is also a big           Devices”, Artech House ISBN 0-89006-532-2,
issue which we are not discuss in our work and         1994
left for the future work.                             3.    G.K. Fedder and T. Mukherjee, "Automated
                                                        Optimal Synthesis of Microresonators," Proc 9th Intl.
The spring constant can also be designed by             Conf on Solid-State Sensors and Actuators
different styles also left for future work. After       (Transducers ’97), Chicago, IL, June 16-19, 1997.
design and calculating the resonance frequency        4.    W.C. Tang, T.-C. H. Nguyen, M. W. Judy, and R.
                                                        T. Howe, "Electrostatic Comb Drive of Lateral
for different shapes we go for simulation process       Polysilicon Resonators," Sensors and Actuators A, 21
and simulate them and get the results which we          (1990) 328-31.
shown in the table.                                   5.     X. Zhang and W. C. Tang, "Viscous Air
                                                        Damping in Laterally Driven Microresonators,"
From all these work, I would like to conclude           Sensors and Materials, v. 7, no. 6, 1995, pp.415-430.
some points which are following.                      6.    W C Tang, T-C H Nguyen and R T Howe,
                                                       Laterally      driven     polysilicon   resonant
To achieve high resonance frequency                    microstructures, IEEE MicroElectro Mechamal
                                                       System Workshop, Salt Luke City, UT,US A ,
–Total spring constant should increase                 Feb 20-22, 1989, pp 53-59
                                                      7.    C.T.C.        Nguyen,      MTT-S      1999
–Or dynamic mass should decrease                       (http://www.eecs.umich.edu/~ctnguyen/mtt99.p
       -(Difficult, since a given number of fingers    df)
are needed for electrostatic actuation                8.     Andrew Potter, “Fabrication and Modeling
                                                       of Piezoelectric RF MEMS Resonators”,
–k and m depend on material choice, layout,            Department of Physics and Division Engineering
dimensions                                             – Brown University
•k expresses the spring constant relative to mass     9.    Roger T. Howe, “Applications of Silicon
                                                       Micromaching to Resonator Fabrication”, 1994
–Frequency can increase by using a material with       IEEE      International     Frequency    Control
larger k ratio than Si                                 Symposium
                                                      10. Clark T. C. Nguyen, “ Frequency-Selective
                                                       MEMS       for     Miniaturized    Communication
                                                       Devices”, 1998 IEEE Aerospace Conference, vol
                                                       1 ,Snowmass, Colorado
                                                                                                           8
          CONFERENCE ON “SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM (SPRTOS)” MARCH 26-27 2011
                                                                    H (z) =
           II   EXISTING LOOK-AHEAD ALGORITHMS
                                                                                                                 (6)
   The transfer function of Nth-order recursive filter is           The total multiplication complexity is (2N+M) and latch
described by                                                        complexity is linear in M. extra delay in producing output is
H (z) =         =                             (1)                   M [11].
The LA algorithm finds the augmented polynomial D (z)               B. SCATTERED LOOK-AHEAD ALGORITHM
where
                                                                        For the M-stage SLA pipelined IIR filters, the denominator
                                                                    of the transfer function is obtained as
Krishna Raj is Deptt. of Electronics Engg., HBTI, Kanpur-208002,
India, Email: kraj_biet@yahoo.com,                                                                               (7)
                                                                                                                       SIP0103-4
          CONFERENCE ON “SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM (SPRTOS)” MARCH 26-27 2011
   The denominator of the resulted transfer function contains      by substituting      in (1) [2, 4, 6, and 7]. Similarly, an M-
N scattered terms           , …,      .[3]The coefficients         stage SLA pipelined version of same       order recursive filter
can be obtained by solve N (M-1) simultaneous equation.            can be produced by substituting           in (1) [1, 2, 8].It is
                                                                   used for high speed modular implementation of stable 2-D
                 -                      , where, i=2,…, M-         denominator separable IIR filters.
1,M+1,..,tM-1, tM+1,…..,NM-1.
                                                                        In             out In                          Out In                      out
   Then an equivalent M-stage pipelining of same           order
recursive filter can be obtained as [1, 8].
                                                                                            M                          M                           M
H (z)
                                                                                            D                          D                           D
=                                                   (8)                                     D
                                                                                            D                          M
                                                                                                                       D                           D
    The total multiplication complexity is (NM+N+1) and
latch complexity is square in M. The extra delay in producing                                                                                      D
output is (NM-N) [11]. If M is power of 2, then using
decomposition technique, the total multiplication and latch
complexity can be further reduced [1].The architecture is                                   D                          M
shown Fig. 1(b).                                                                                                       D
                                                                                                                                                   D
                                                                             (a)                       (b)                     (c)
C. Distributed Look Ahead Pipelining                               Fig: (1) LA pipelined IIR filters (a) CLA realization (b) SLA realization (c)
                                                                   DLA realization
    Pipelining of the following filter transfer function
                                                                                 III        COMPARATIVE ANALYSIS
H (z) =                                                            Table-1
                                                                                                                           Delay in       Extra
Since   must equal original H (z),     can also be obtained             Pipelining              Multiplication
                                                                                                                           First          Delay in
by multiplying. The original filter by an augmentation                  Methods                 Complexity
                                                                                                                           output         output
polynomial D (z) both in the numerator and the denominator,
i.e.,                                                                   CLA                     L+M+N-1                    M              M
                                                                        DLA                                                M+             M
Where D (z) = 1+                    …………. +
Initialize                         =-
                                                                   Table-2
Iterate      For i=2 to (M-1)
                                                                                       M=3             M=4                 M=6              M=8
                                                                             Method    SLA        A    SLA       DLA       SLA      DLA     SLA        DLA
                                                                             No. of
According to the Distributed Look-Ahead (DLA)                                MUL
transformation, the M-stage pipelined filter transfer function               /adder    6          5    6         5         8        6       8          7
                                                                             No of
would have the following general form.                                       Latch     10         8    14        10        22       14      30         18
                                                                             Delay
                                                                             in 1st
                                                                             o/p       6          5    8         6         12       8       16         10
                                                        (9)
   The coefficient of non-recursive portion of pipelined filter                        IV             CONCLUSIONS
are unequally distributed and it can be implemented with
(                 ) multiplication and recursive portion by        The denominator order using DLA , (M + ) is less than the
(L+1) multiplications, hence total multiplications (               order with SLA (NM), and the DLA transformed filter is
              and latch complexity is linear in M.CLA and          stable, and then the proposed scheme would offer considerable
SLA scheme are special class of DLA scheme. An M-stage             hardware savings over SLA. Multiplication and Latch
pipelined version of an     order Recursive filter is obtained     complexity are less over SLA. Pipeline Delay and hardware
                                                                                                                                         SIP0103-4
                                                                           CONFERENCE ON “SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM (SPRTOS)” MARCH 26-27 2011
                                  Examples
                                  H (z) =
                                                                                                                                                                                                                                                                        (b)
                                                   1
                                                                                                                                                1
0.8
                                                                                                                                              0.6
                                                                                                                                                                                                                                                              Fig: 5 (a) DLA (b) SLA
                                         0.8
                                         0.6                                                                                                  0.4
                                                                                                                                                                                                                                                             (Using table1 and tabe2)
                                                                                                                             Imaginary Part
                                         0.4
                                                                                                                                              0.2
                 Imaginary Part
                                         0.2                                                                                                                                                              2
                                                                                                                                                0
                                                                                             2
                                                   0
                                                                                                                                              -0.2
                                    -0.2
                                                                                                                                              -0.4
                                    -0.4
-0.6
                                    -0.8
                                                                                                                                              -0.6
                                                                                                                                              -0.8
                                                                                                                                                                                                                                                         V       REFERENCES
                                                   -1                                                                                           -1
                                                                  -1       -0.5         0          0.5           1
                                                                                     Real Part                                                                            -1         -0.5                0             0.5          1
                                                                                                                                                                                                    Real Part
                                                                                                                                              0.8
                                                                                                                                                                                                                                                Speech, and Signal Processing, vol. 37,no. 7 pp. this issue, pp. 1099-
                                                       0.8
                                                       0.6
                                                                                                                                              0.6
                                                                                                                                              0.4
                                                                                                                                                                                                                                                1117,july 1989.
                                                       0.4
                                                                                                                                              0.2
                                  Imaginary Part
                                                       0.2
                                                                                             2
                                                                                                                                                                                                         2
                                                                                                                                                0
                                                    -0.2
                                                        0
                                                                                                                                              -0.2                                                                                              pipelining IIR filters," in Proc. IEEE ISCAS, 1996, pp. 237-240.
                                                    -0.4
                                                    -0.6
                                                                                                                                              -0.4
                                                                                                                                              -0.6
                                                                                                                                                                                                                                                [3] Y. C. Lim, "A new approach for deriving scattered coefficients of
                                                    -0.8
                                                        -1
                                                                                                                                              -0.8
                                                                                                                                               -1
                                                                                                                                                                                                                                                pipelined IIR filters," IEEE Trans. Signal Processing, vol. 43, pp.
                                                                   -1       -0.5        0
                                                                                     Real Part
                                                                                                  0.5        1                                                            -1         -0.5              0
                                                                                                                                                                                                    Real Part
                                                                                                                                                                                                                      0.5           1
                                                                                                                                                                                                                                                2405-2406, 1995.
                                                                                                                                                                                                                                                [4] H.H. Loomis and B Sinha, “High-speed Recursive Digital Filter
                                                                           (c)                                        Fig:2                                                                                       (d)                           Realization”, Circuits, Systems and Signal Processing, vo1.3, pp.
                                                                                                                                                                                                                                                267-294, Sept., 1984.
                                                                                                                                                                                                                                                [5] A. P. Chand, “Low Power CMOS Digital Design,” IEEE J. of
                                                                                                                                                                                                                                                Solid-State Circuits, vol. 27, pp. 473-484, Apr., 1992.
                              0.8
                                       1                                                                                                                             1
                                                                                                                                                                   0.8
                                                                                                                                                                                                                                                [6] P.M. Kogge, The architecture of Pipelined Computers, New
                              0.6                                                                                                                                  0.6
                                                                                                                                                                   0.4
                                                                                                                                                                                                                                                York, Hemisphere Publishing Corporation, 1981.
                                                                                                                                                                                                                                                [7] Y.C. Lim and B. Liu, “Pipelined Recursive Filter with Minimum
                              0.4
                                                                                                                                                 Imaginary Part
                                                                                                                                                                   0.2
Imaginary Part
                              0.2
                                                                                                                                                                                                              2
                                                                                                                                                                     0
                         -0.6
                                                                                                                                                                   -0.6
                                                                                                                                                                                                                                                vo1.40, no. 7, pp. 1643-1651, July 1992.
                                                                                                                                                                                                                                                [8] M. A. Soderstrand, K. Chopper and B. Sinha, “Comparison of
                                                                                                                                                                   -0.8
                         -0.8
                                                                                                                                                                    -1
                                  -1
                                                                                                                                                                               -1           -0.5          0             0.5             1
                                                             -1          -0.5         0
                                                                                   Real Part
                                                                                                 0.5     1                                                                                             Real Part
                                                                                                                                                                                                                                                three new techniques for pipelining IIR digital flters,”23rd
                                                                                                                                                                                                                                                ASILOMAR Conjerenceon Signals, Systems & Computers, Pacific
                                                                        (a)                                          Fig:3                                                                                            (b)                       Grove, CA, pp. 439-443, Nov., 1984.
                                                                                                                                                                                                                                                [9] H. B. Voelcker and E:E. Hartquist, “Digital Filtering via Block
                                                                                                                                                                                                                                                Recursion”, IEEE Trans. Audio Electroacoust., Vol.AU-18, pp.169-
                                                                                                                                                                                                                                                176, June, 1970.
                                                   1
                                                                                                                                                                      1
                                                                                                                                                                    0.8
                                                                                                                                                                                                                                                [10] Yen-Liang chen,Chun-Yu chen,Kai-Yuan Jheng and An-
                                                                                                                                                                                                                                                Yen(Andy)Wu,”A Universal Look-Ahead Algorithm For Pipelining
                                      0.8
                                                                                                                                                                    0.6
                                      0.6
                                      0.2                                                                                                                           0.2
                                                                                         3                                                                                                                        2
                                  -0.2
                                                   0                                                                                                                  0
                                                                                                                                                                   -0.2
                                                                                                                                                                                                                                                [11] A. K. Shaw and M. Imtiaz, "New Look-Ahead Algorithm for
                                  -0.4
                                  -0.6
                                                                                                                                                                   -0.4
                                                                                                                                                                   -0.6
                                                                                                                                                                                                                                                Pipelined Implementation of Recursive Digital Filters,” in Proc.
                                  -0.8
                                               -1
                                                                                                                                                                   -0.8                                                                         IEEE ISCAS, 1996, pp. 3229-323.
                                                                                                                                                                     -1
                                                              -1          -0.5        0          0.5     1
                                                                                   Real Part                                                                                    -1           -0.5           0                 0.5           1
                                                                                                                                                                                                         Real Part
                                                                                                                                                                                                                                                                                                       SIP0103-4
        CONFERENCE ON “SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM (SPRTOS)” MARCH 26-27 2011
Fig :( 3) pole-zero plot for SLA (a) M=3 (b) M=4[both stable]
Fig :( 4) pole-zero plot for DLA (a) M=3 (b) M=4[both stable]
                                                                                             SIP0103-4
                                                                                                                                     1
Abstract: This paper proposes a new aspect of comparing the             embedded zero blocking coding --- MC-EZBC) [6] [7]. The
two video codecs on the basis of rate-distortion basis. Scalable        second video codec is the Ad Hoc Model 2.0 (AH M 2.0)
coding provides a straight forward solution for video coding            implementation of the H.264 standard [4][8] which extends
that can serve broad range of applications without the need for         the JM 6.1 implementation[9] with a rate control
transcoding. Even though the latest international video -coding
                                                                        algorithm[10].
standards do not provide ful ly scalable methods, only H.264
provides the best rate-distortion performance. Other than
H.264, the performance on rat e-distortion Motion Compensated
Embedded Zero Block Context (MC-EZBC) coder which is fully                            III. MATERIALS AND METHODS
scalable.
                                                                         A. Encoding Process
  Keywords—, MC-EZBC, ME/MC sub pixel accuracy,                          This section describes how the two codecs were configured
temporal level subband coding, YSNR.                                     and used in order to obtai n the bit streams necessary for
                                                                         performing the various measurements.
                       I. INTRODUCTION
THE MODERN VIDEO compression coding technologies has                                                 TABLE I
been significantly improved for last few years and has                                    Sequences Used In Our Experiment
enabled broadcasting of digital video signal over various                         Name            No. of frames       Abbreviation
networks [1]. Also motion compensated wavelet based video                         Akiyo                300                   AK
coding emerged as an important research topic to explore                         Foreman               300                   FO
because of its ability to provi de better quality. MC-EZBC [2]
                                                                                   Hall                300                   HA
[3] is one of the codec that encodes the motion information in
a non scalable manner, which results in a reduced coding
efficiency performance at low bit rates. However H.264 [4] is
a non scalable coding technique provides a good quality                   As input three progressive video sequences were used in
video at substantially lower bit rates than previous standards          raw Y Cb Cr 4:2:0 formats. These were downloaded from the
like MPEG-2, H.263, or MPEG-4 Part 2 without increasing                 Hannover FTP server.
the complexity of design and cost.
          In this paper we are performing the analysis on the              An overview of the sequences is given i n the Table I. The
joint region of applicability betw een the MC-EZBC and                  resolutions used are the Common Intermediate Format
H.264 video codec. In MC-EZBC, by using a third and four                (CIF, 352  288 ), thus resulting in 3 input video sequences.
level of temporal decomposition of the input video sequence             These sequences were encoded by making use of constant bit
thereby obtaining a GOP structure of 8 and 16 frames, and               rate coding (CBR). Ten different target bit rates were used:
effect of sub-pixel accurate Motion estimation and                      both very low and very high bit rates. The bit -rates taken are
compensation, a good comparison with H.264 is achieved in               100, 200, 300,…1000 kbps. At each bit rate, encoding was
terms of Coding Efficiency [5].                                         performed at 30 frames per second. The detailed settings for
   The outline of the paper is as follows. After introducing            the different encoding parameters can be found in Table II
the examined compression schemes in section II, an overview             and Table III.
of the applied methodology is provided in Section III. Th e
obtained results are described in Section IV while the
conclusions are drawn in Section V.                                        The code of MC-EZBC was downloaded from the MPEG
                                                                        CVS server. Each input video sequence was encoded once
                                                                        and then pulled several times in order to get decodable bit
                     II. Video codec overview                           streams for all target bit rates. The H.264 bitstreams are
The two video codec that were used in the tests are summed              conforming to Baseline and Main Profile. The GOP structure
up in this section. Due to place constraints, the reader is             is IBBBP and GOP length is 16.
referred to the references for further information on these
codecs. The first one is a scalable wavelet based video codec
developed by J. Woods et al. (motion compensated
                                 TABLE II
              Parameter Settings for the MC-EZBC Compressor
Parameter              Value(CIF)         Comment                        B.Quality measurement
-inname                akiyo.yuv          Name of input file            The PSNR-Y is calculated as defined in [11]. In order to get a
                                          containing a sequence of
                                                                        PSNR value for an entire sequence, the average of the PSNR -
                                          4:2:0
-statname              akiyo_tpyrlev3     Name of output file           Y values of the individual frames is calculated. This is not
                       _cif_mv0.stat      containing some statistical   only one way to get a value for an entire sequence. But
                                          information      generated    another method could be, for instance, to take the minimum
                                          during encoding               of the individual PSNR-Y values (because a video sequence
-start                 0                  Index number of the first     may be evaluated based on the worst part). PSNR is based on
                                          frame (0 means first frame    a distance between two images [derived from the metric3
                                          in file)
-last                  299                Index number of the last
                                                                        mean square error (MSE)] and does not take into account any
                                          frame                         property of the human visual system (HVS).
-size                  352 288 176        Size of each input frame.
                       144                1. pixel width of the                         IV. EXPERIMENTAL RESULTS
                                          luminance component
                                                                          In the experiment, the performance of the codec is checked
                                          2. pixel height of the
                                          luminance component           on Rate-Distortion basis. It is clear that due to the size of the
                                          3. pixel width of the         experiments and place constrai nts, not all results can be
                                          chrominance component         presented. A subclass of the re sults is given in Table IV and
                                          4. pixel height of the        Table V.
                                          chrominance component
-frame rate            30                 Number of input frames
                                                                           The coding efficiency of MC -EZBC is compared with
                                          per second
-tPyrLev               3                  Levels     of     temporal    H.264 with different sequences at different bit rates. MC -
                                          subband decomposition         EZBC is a fully scalable coding architecture whi ch utilizes
-searchrange           16                 Maximum search range          MCTF and wavelet filtering. The software available for
                                          (in pixels) in first
                                                                        download at the website of CIPR, RPI [7] is used for testing
                                          temporal decomposition
                                          level. The search range is    of the video material. On the other hand H.264 has non
                                          doubled      with      each   scalable coding structure and t he entire tests were done on
                                          decomposition                 LINUX based personal computer (AMD turion 64x2
-maxsearchrange        64                 Upper limit for search
                                                                        processor speed 1.9GHz and RAM 1GB) with Ubuntu 9.04
                                          range
                                                                        installed and no other software running in the background.
almost all bit rates. It is also observed that H.264 outperforms               [9]   H.264.AVC        Reference      Software    [Online].       Available:
                                                                                     http://iphome.hhi.de/suehring/tml/download/
well throughout the bitrate for High complexity.
                                                                               [10] Proposed Draft Description of Rate Control on JVT standard ,
                                 TABLE V
                                                                                    ISO/IECJTC1/SC29/WG11 and ITU -T SG16/Q.6, JVT-document
         Subset of Quality Measurements for Video CIF Sequences                     JVT-F086, Dec. 2002
  Bit Rate           MC-EZBC                          H.264
  (Kbps)                                                                       [11] P. Chen. Fully Scalable Subband / Wavelet Coding. PhD Thesis,
                 Foreman Sequence             Foreman Sequence                      Rensselaer Polytechnic Institute, Troy, New York, May 2003.
       100               27.86                        30.33
       400               34.88                        35.73
      1000               39.12                        39.30
                       IV. CONCLUSION
In this paper, an overview was given of the rate distortion
performance of the two state of t he art video codec
technologies in terms of YSNR. From the above results it is
clear that the tools that are incorporated in the H.264 standard
outperform MC-EZBC. Although at around 1000 Kbps the
performance of MC-EZBC is comparable with that of H.264
for high complexity sequences.
                             REFERENCES
[1]   M Ghanbari. Standard Codecs: Image Compression to Advanced video
      Coding. IEE Telecommunications Series 2003.
[2]   S.S. Tsai, motion Information Scalability for Interframe Wavelet Video
      Coding, MS Thesis, National Chiao Tung University, Hs inchu,
      Tiawan, R.O.C., Jun.2003
[3]   S.S. Tsai, motion Information Scalability for Interframe Wavelet Video
      Coding, MS Thesis, National Chiao Tung University, Hsinchu,
      Tiawan, R.O.C., Jun.2003.
Abstract: Digital filtering technique is implemented using            This paper describes the way of implementation of IIR digital
general purpose digital signal processing chips. Audio and special   filtering algorithm on field programmable gate arrays
purpose digital filtering algorithms are designed on ASICs for       (FPGAs).Recent advancements in FPGA technology have
higher bit rate. This paper describes the implementation of IIR      enabled these devices to be applied to a variety of applications
filter algorithms based on field programmable gate arrays            traditionally reserved for ASICs. FPGAs are well suited for
(FPGAs). IIR Filter design shows significant reduction in the
                                                                     data path designs, such as those encountered in digital filtering
computational complexity required to achieve a given frequency
response as compared to FIR filter for the same response. FPGA       applications. The advantages of the FPGA approach to digital
based implementation includes higher sampling rates that are         filter implementation include higher sampling rates than those
available in traditional DSP chips. It produces a low cost along     are available from traditional DSP chips,[2] lower costs than
with flexibility in design in comparison to ASIC. It follows         an ASIC for moderate volume applications, and more software
pipeline architecture that gives us the advantages of parallel       flexibility than the alternate approaches. In particular, multiple
processing. We have observed and compared the filtering              multiply-accumulate (MAC) units may be implemented on a
characteristics of IIR filter of direct form-2 realization using     single FPGA, which provides comparable performance to
MATLAB by altering the bit length and also the order. We have        general-purpose architectures which have a single MAC unit.
implemented the digital filter in Xilinx Spartan 3E kit using
                                                                     In comparison to FIR filter[3] IIR filter uses less MAC unit to
VHDL. FPGA architectures are in-system programmable, the
configuration of the device may be changed to implement              achieve the same frequency response resulting in lesser
different functionality as per requirement. Our work illustrate      memory requirement and less computational complexity for
that the FPGA approach is both flexible superior to traditional      IIR filter. The configuration of the FPGA device may be
approaches.                                                          changed to implement alternate filtering operations only by
    Keywords: ASIC, FPGA, IIR, FIR, VHDL, Pipeline                   altering the software, such as lattice filters and gradient-based
Architecture, Xilinx Spartan 3E                                      adaptive filters, or entirely different. In our project we have
                                                                     implemented digital IIR filter using FPGA. IIR systems have
                                                                     an impulse response function that is non-zero over an infinite
                       I. INTRODUCTION                               length of time. This is in contrast to finite impulse response
A filter is used to modify an input signal in order to facilitate    (FIR) filters[4], which have fixed-duration impulse responses.
further processing. A digital filter works on a digital input (a     To obtain the similar stability IIR filter requires less order
sequence of numbers, resulting from sampling and quantizing          compared to FIR filter. IIR Filter is one of the Digital Filters
an analog signal) and produces a digital output. According to        that is used mostly in Audio Signals Processing. One good
Dr. U. Meyer-Baese [1], “the most common digital filter is the       application of IIR filter technology is the generation and
Linear Time-Invariant (LTI) filter”. Designing an LTI                recovery of dual tone multi-frequency (DTMF) signals used
involves arriving at the filter coefficients which, in turn,         by Touch-Tone telephones.
represents the impulse response of the IIR filter design. These
coefficients, in linear convolution with the input sequence will     The rest of the paper is organized as follows: Section II
result in the desired output. The linear convolution process         describes related works and Section III deals with proposed
can be represented as [2]: The most common approaches to             architecture. Our scheme is evaluated by results obtained from
the implementation of digital filtering algorithms are generally     extensive simulation in Section IV. Finally, we conclude in
implemented on digital signal processing chips for audio             Section V.
applications and application-specific integrated circuits
(ASICs) for higher rates.
                                                                                                                                           2
                      II. RELATED WORKS                              signal is related to the input signal. We have modeled the
Customized VLSI chips influenced the former and most of the          equation as
researches implementing digital filter. The architecture of
these filters are largely determined by the target application.
Typical DSP chips like Texas instrument’s TMS320, Free                       1
                                                                     y[n] =     (b0 * x[n] + b0 * x[n −1] + .........bp * x[n − P]
scale’s MSC81xx, Motorola’s 56000, Analog device’s ADSP-                     a0                                                      (1)
2100 family efficiently performs filtering operations in audio       −a1 * y[n −1] − a2 * y[n − 2] − ........... − aQ * y[n − Q])
range. For higher frequency domain, CMOS and Bi-CMOS
technology is used. There are some disputes in the customized
chips. The biggest shortcoming is low flexibility as they are
application specific. Also, lack of adaptability in these chips is   Where:
severe. Typical custom approaches do not allow the function
of a device to be modified during the evaluation, for an                 •             is the feed forward filter order
example, fault correction. The FPGA approach is therefore
necessary to provide the designing freedom. Many of the                  •          are the feed forward filter coefficients
popular FPGAs are in-system programmable, which allows
modification of the operation using simple programming. But              •          is the feedback filter order
for filtering purposes FIR[3] filters have been commonly
used. In                                                                 •          are the feedback filter coefficients
this particular work, IIR filters are implemented as they
require fewer calculations and lesser memory requirement.IIR
filters also outperforms FIRs[5] for narrow transition bands.            •               is the input signal
They can also provide a better approximation for traditionally
analog systems in digital applications than competing filter             •               is the output signal.
types.IIR filters are mainly used in audio applications such as
speakers and sound processing functions. In this work,                   Now from the above equation we modeled the transfer
XILINX SPARTAN 3E series is used for implementing                        function of IIR filter as
various digital filtering algorithms. XILINX SPARTAN 3E
consists of reconfigurable combinational logic blocks with              Y (z )            b + b z −1 + b2 z −2
                                                                               = H ( z ) = 0 1 −1                                    (2)
multi input and output, router or switching matrix for                  X (z )             1 + a1 z + a 2 z − 2
connection and buffers.
                                                                         For hardware representation of the digital filter we have
                 III PROPOSED ARCHITECTURE                           modeled the transfer function by using adder, multiplier and
                                                                     delay unit.
IIR filter implementations on FPGA board illustrate that the
                                                                      x(n)                             w(n)            b0            y(n)
FPGA approach is both flexible and provides performance
                                                                                   +                                        +
superior to traditional approaches. Because of the
programmability of this technology, the examples in this paper
can be extended to provide a variety of other high                                                     z-1
performance IIR filter realizations. Using powerful computer
based software tools to perform redundant calculations in the                               -a1          w(n-1)       b1
filter design process enables a designer to achieve the best                       +                                        +
design within the shortest time. While implementing a filter
on hardware, the biggest challenge is to achieve specified
system performance at minimum hardware cost. In this paper                                             z-1
we achieve this goal by designing the digital filter which also
gives better noise margin and less ageing effect of                                         -a2          w(n-2)        b2
components in comparison to Analog filter. One among the
hurdles is to understand, estimate and overcome where
possible, the effects of using a finite word length to represent
the infinite word length coefficients. Selecting a non                       Figure 1: Direct Form-2 Structure of Digital Filter
optimized word length[6] can result in the filter transfer           A basic IIR filter consist of 3 main blocks-
function being different from what is expected. The effects of           (i) Adder (ii) Multiplier (iii) Delay unit
using finite word length representation can be minimized by
analytical or qualitative methods or simply by choosing to           A Implementation of Adder
implement higher order filters in cascaded or parallel form
     Digitals filters[7] are often described and implemented in      We have implemented this system using serial adder. A serial
terms of the difference equation that defines how the output         adder is a binary adder that adds the two numbers bit-pair
                                                                                                                                    3
wise. Each bit-pair are added in a single clock pulse. The             A. Software Simulation
carry of each pair is propagated to the next pair.
                                                                      The sampling frequency is chosen as 4 times the stop band
B. Implementation of Multiplier                                       and the filter has a steep transition band with a width of 1000
                                                                      Hz. These specifications are fed as inputs to the FDA tool in
The multiplier has been configured to perform multiplication
                                                                      MATLAB R2009a. The tool performs the filter design
of signed numbers in two’s complement notation We have
                                                                      calculations using double precision floating point numeric
used signed multiplication where a n-bit by n-bit
                                                                      representation and displays the response of a IIR elliptical low
multiplication takes place and result in a 2*n-bit value.
                                                                      pass filter of order 6. Figure 2 shows the filter design window
                                                                      of FDA tool, after completion of the design process.
C. Implementation of Delay Unit
We have used shift register for the purpose of delay. A shift
register is a group of flip-flops set up in a linear fashion with
their inputs and outputs connected together in such a way that
the data is shifted from one device to another when the circuit
is active. (i) A provides the data movement function
 (ii). A shift register “shifts” its output once every clock cycle.
                                                                                   PASS BAND                  STOP BAND
                    IV SIMULATION RESULT
To check the response of proposed filter we have used Filter
Design and Analysis Tool (FDA Tool) which is a graphical
user interface (GUI) available in the Signal Processing
Toolbox of MATLAB for designing and analyzing filters. It
takes the filter specifications as inputs. Table 1 shows the
specifications of an IIR low pass elliptical filter of order 6.
V. CONCLUSION
   In    wireless     communication      technology,     wireless            In this paper proposed a new clocking mechanism for to
communication is effective and convenient for sharing                     avoid correlation attack on the place of m-rule i.e. majority
information[7]. GSM is a very good example of that wireless               rule used by A5/1 stream cipher. Form in different sections as
communication .But this information should be secure means                follows. In section 2 description of A5/1 stream cipher is
nobody could interfere like eavesdropper. So, to protect our              given. In section 3 correlation attack analysis. In section 4
information cryptography play vital role. However, for sending            proposed modified structure of A5/1 key stream generator. At
information mobile station to base station there is air interface         last give conclusion.
serious security threat prevention between communicating
parties[10]. Then question arise how to protect while                                        II. DESCRIPTION OF A5/1
communication. For this there is encryption algorithm use in
GSM as A5/x series. These algorithms used to encrypt voice                   A5/1 is a stream cipher [11] provide key stream so called
and data over GSM link. The various different                             key stream generator. Made up of three linear feedback shift
implementations A5/0 has no encryption, A5/1 is strong                    register of length 19, 22, 23 used to generate sequence of
version, A5/2 weaker version targeting market outside Europe              binary bits. GSM conversations are in form of frames as length
and at last A5/3 based in block ciphering strong version                  of 228 bit i.e. 114 for each direction for encrypt/ decrypt
created as part of 3rd generation partnership project (3GPP)[5].          data[4]. A5/1 initialize 64 bit key together with 22 frame
                                                                          number publicly known. It used linear feedback shift registers
                                                                          as R1, R2 and R3 to correspondence tap as (13, 16, 17, 18)
  In this paper we explore about A5/1 that is also strong
                                                                          contained by R1, (20, 21) by R2 and (7, 20, 21, 22)
version but exhibit weaker due attack happened on it. A5/1
                                                                          respectively. Each clocked using rule called as majority rule.
based on stream ciphering[1] that is very fast doing bit by bit           Clocking tap considered as A, B, C to correspondence
XOR and getting result. If we take simple encryption we could             registers R1, R2 and R3 as R1 (8), R2 (10) and R310). Before
perform by take a plaintext bit XOR with any key that keep                register is clocked feedback is calculated by using linear
secret so choose any whatever got that is called cipher text and          operator i.e. XOR. The one bit shift to right (discarding the
reverse process is called decryption.                                     rightmost) bit produced by feedback location store leftmost
                                                                          locations of linear feedback shift registers. This cycle goes up
     A5/1 made up using linear feedback shift register. Initial           to 64 times. This done on basis of clocking rule that register
value of LFSR is called seed because operation of the register            clocked irregularly according to majority rule. Majority rule
is deterministic stream values produced by registers is                   uses on three clocking bits of LFSR’s A, B, C. Among
                                                                          clocking bit if one or more is 0, then m=0 whose value match
                                                                          with m that register will clock. Similarly, if one or more
                                                                      1
clocking bits is 1, then whose values match with m that will            can examine the state of LFSRs mean some of LFSRs bits are
clock. At each clocking LFSR generate one bit which                     related to the output sequence generated. Linear complexity
combined by linear function. In A5/1, the probability of an             should be longer for more security but does not indicate for
individual LFSR being clocked is 3/4. The clocking bit                  secure one. And further correlation immunity, higher linear
generates bit m defined as using Boolean algebra (A.B (+) B.C           complexity by combining the output sequence more non linear
(+) A.C) as shown in figure 1 structure of A5/1 stream cipher           manner. So, insecurity arises that output of the combining
and possible cases refer to table 1.                                    function is correlated with output of individual LFSRs due this
                                                                        correlation attack exist. If observing the output sequence
                                                                        obtains information about internal state output. Using that
                                                                        could determine other internal states by this entire stream
                                                                        cipher generator is broken. Now, come on main point that
                                                                        A5/1 stream cipher is also using three LFSRs and clocking
                                                                        taps look strong but cryptographically weak shown by attacks.
                                                                        In the output of generator equal two output of LFSR2 75%
                                                                        times, if feedback is known, we can determine the initial bit of
                                                                        the LFSR2 and generate output sequence then count number of
                                                                        times LFSR2 output is agrees with output of generator. If two
                                                                        sequences will agree about 50% times then guess wrong if
                                                                        agree 75% then guessed right. Similarly, the output sequence
                                                                        agrees 75% times with LFSR3 using correlation. We could
                                                                        easily cracked by known plaintext attack.
               Figure 1: Structure of A5/1 stream cipher                             IV. MODIFIED A5/1 STREAM CIPHER
           Table 1: Possible cases of A5/1 register to clocked
                                                                           The new clock control mechanism is proposed to overcome
       Clocking bit         Clocking bit              Register(s)       problem of getting probability of 3/4 explained. By proposed
         (A,B,C)          generated using             Clocked           concept probability become 1/2 by using modified clock
                              m-rule                                    controlling unit. Consider three bits as A, B and C of
          (0,0,0)                 0                    R1,R2,R3         respective registers R1, R2 and R3 called as clocking bits .The
                                                                        structure of proposed A5/ 1 stream cipher as shown in figure 2.
          (0,0,1)                 0                     R1,R2
          (0,1,0)                 0                     R1,R3
          (0,1,1)                 1                     R2,R3
          (1,0,0)                 0                     R2,R3
          (1,0,1)                 1                     R1,R3
          (1,1,0)                 1                     R1,R2
          (1,1,1)                 1                    R1,R2,R3
                                                                    2
 A. Clocking controlling unit                                                                                V. CONCLUSION
   Note, that if compare the possible outcomes to clock                             [5]   A Practical-Time Attack on the A5/3 Cryptosystem Used in Third
registers in table 1 and 2. In table 1 each cycle at least 2                              Generation GSM TelephonyOrr Dunkelman, Nathan Keller, and Adi
                                                                                          Shamir.
registers are shifted with 75% probability. This reduced by
50% shown in table 2 where at least one registers shifted. The                      [6] A précis of the new attacks on GSM encryption Greg Rose,
register bit that got output which is unrelated to state of LFSRs                       QUALCOMM Australia.
for 6 clock cycles.
                                                                               3
  [7] Communication security in gsm networks petr bouška, martin
      drahanský faculty of information technology, brno university of
      technology.
  [12] http://csrc.nist.gov/groups/ST/toolkit/rng/documentation_software.ht
       ml.
                                                                                4
    CONFERENCE ON “SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM (SPRTOS)” MARCH 26-27 2011
   Abstract-- Most wireless communication systems for indoor             H.B.T.I., Kanpur-24, U.P., (email: kraj_biet@yahoo.com)
positioning and tracking may suffer from different error
sources, including process errors and measurement errors.                Information is usually obtained in the form of measurements
State estimation algorithm deals with recovering some desired            and the measurements are related to the position of the object
state variables of a dynamic system from available noisy                 that can be formulated by Bayesian filtering theory. Since
measurements. A correct and accurate state estimation of                 Kalman filter theory is only applicable for linear systems and
linear or non-linear system can be improved by selecting the
                                                                         in practice almost all practical dynamic systems (relation
proper estimation technique. Kalman filter algorithms are
often used technique that provides linear, unbiased and                  between the state and the measurements) are nonlinear. The
minimum variance estimates of an unknown state vectors for               most celebrated and widely used nonlinear filtering algorithm
non-linear systems. In this paper we tried to bridge the gap             is the extended Kalman filter (EKF), which is essentially a
between the Kalman Filter and its variant i.e. Extended                  suboptimal nonlinear filter. The key idea of the EKF is using
Kalman Filter (EKF) with their algorithm and performance in              the linearized dynamic model to calculate the covariance and
the state estimation of the car moving with a constant force.
                                                                         gain matrices of the filter. The Kalman filter (KF) and the
 Index Terms-- Stochastic filtering, Bayesian filtering,                 EKF are all widely used in many engineering areas, such as
Adaptive filter, Unscented transform, Digital filters.                   aerospace, chemical and mechanical engineering. However, it
                                                                         is well known that both the KF and EKF are not robust against
                 1.                 INTRODUCTION                         modelling uncertainties and disturbances.
                                                                                                                               SIP0107-1
       CONFERENCE ON “SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM (SPRTOS)” MARCH 26-27 2011
In the presence of a random disturbances (white noise) or          The Kalman filter is an optimal observer in the sense that it
when few system parameters change, the use of an adaptive          produces unbiased and minimum variance estimates of the
and optimal controller turns out necessary [3], [4]. In this       states of the system i.e. the expected value of the error
                                                                   between the filter’s estimate and the true state of the system is
paper we are choosing to use Kalman filter as a controller.
                                                                   zero and the expected value of the squared error between the
This technique is based on the theory of Kalman's filtering [5],   real and estimated states is minimum.
it transforms Kalman's filter into a Kalman controller.                                 2.1 WEINER FILTER
Simulation results show that the state estimation performance
provided by the robust Kalman filter is higher than that           Weiner was as a pioneer in the study of stochastic and noise
provided by the EKF.                                               processes [15] who proposed a class of optimum discrete time
                                                                   filters during the 1940s and published in 1949. Its purpose is
                                                                   to reduce the amount of noise present in a signal by
Recently, results on some new types of linear uncertain            comparison with an estimation of the desired noiseless signal.
discrete-time systems have also been given. Yang, Wang and         The Wiener process (often called as Brownian motion) is one
Hung presented a design approach of a robust Kalman filter         of the best known continuous-time stochastic process with
for linear discrete time-varying systems with multiplicative       stationary statistical independence increments. The Wiener
noises [7]. Since the covariance matrices of the noises cannot     filter uses the mean squared error as a cost function and
be known precisely, Dong and You derived a finite-horizon          steepest-descent algorithm for recursively updating the
                                                                   weights.
robust Kalman filter for linear time-varying systems with
norm-bounded uncertainties in the state matrix, the output         The main problem with this algorithm is the requirement of
matrix and the covariance matrices of noises [8]. Based on the     known input vector correlation matrix and cross correlation
techniques Zhu, Soh and Xie gave a robust Kalman filter            vector between the input and the desired response      and
design approach for the linear discretetime systems with           unfortunately both are unknown.
measurement delay and norm-bounded uncertainty in the state
matrix [9]. Hounkpevi and Yaz proposed a robust Kalman                             2.2 DISCRET KALMAN FILTER
filter for linear discrete-time systems with sensor failures and   A state estimate is represented by a probability density
norm-bounded uncertainty in the state matrix [10].                 functions (pdf) and the description of full pdf is required for
                                                                   the optimal (Bayesian) solution but the form of pdf is not
Currently many systems successfully using the Kalman filter        restricted and hence it can’t be represented using finite number
algorithms in different diverse areas such as the processing of    of parameter [14], [16]. To solve this problem R.E. Kalman
signals in mobile robot, GPS position based on neural network      designed an optimal state estimator for linear estimation of the
[11], aerospace tracking [12], [13], underwater sonar and the      dynamic systems using state space concept [17], that has the
statistical control of quality.                                    ability to adapt itself to non-stationary environments. It
                                                                   supports estimations of past, present, and even future states,
In this paper the state of the car has been estimated through      and it can do so even when the precise nature of the modeled
Kalman filter and Extended Kalman filter which is moving           system is unknown. A set of mathematical equations provides
with a constant force. Dynamic model of the system is very         an efficient computational (recursive) means to estimate the
much nonlinear and hence firstly we linearized the nonlinear       state of a process, in such a way that minimizes the mean of
system equations using EKF algorithm, secondly we perform          the squared error.
the time domain analysis of the dynamic model using
sampling time 10 millisec.                                         The filter is very powerful in several aspects:
                                                                                                                      SIP0107-2
       CONFERENCE ON “SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM (SPRTOS)” MARCH 26-27 2011
… (2)
… (3)
                                                                                                                               SIP0107-3
        CONFERENCE ON “SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM (SPRTOS)” MARCH 26-27 2011
    Figure 1. Recursive Updation Procedure for Discrete Kalman Filter   (1) Linearized transformations are only reliable if the error
                                                                        propagation is well approximated by a linear function. If this
       2.3        EXTENDED KALMAN FILTER (EKF)                          condition does not hold, then the linearized approximation
                                                                        would be extremely poor and hence it causes its estimates to
The extended Kalman filter (EKF) is the nonlinear version of            diverge altogether.
the Kalman filter that linearizes the non-linear measurement
and state update functions at the prior mean of the current time        (2) The EKF does not guarantee unbiased estimates and also
step and the posterior mean of the previous time step,                  calculate error covariance matrices that do not necessarily
respectively.                                                           represents the true error covariance.
      Time Update:                                                      We consider a dynamic system i.e. a car with a constant force
                                                                        moving with a constant acceleration and follow a linear/ non-
(1) Project the state ahead :                                           linear motion. To estimate the state i.e. position, the
                                                                        continuous time state space model is discretised with a 10
                                                                        millisec sampling time.
                                                               … (4)
                                                                          3.1      MATHEMATICAL MODELING OF SYSTEM
(2) Project the error covariance ahead:
                                                                        In a dynamic system, the values of the output signals depend
                                                                        on both the the past behavior of the system and also on
                                                               … (5)    instantaneous values of its input signals. The output value at a
                                                                        given time t can be computed using the measured values of
The time update equations project the state and covariance              output at previous two time instants and the input value at a
estimates from the previous time step k-1 to the current time           previous time instant.
step k.
Measurement Update:
… (6)
                                                               … (7)
                                                                                      Figure 2. Free body diagram of car-model
(3) Update the error covariance:
                                                                        Horizontal and Vertical motion is govern by the following
                                                               … (8)    equations:
                                                                                                                                 SIP0107-4
          CONFERENCE ON “SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM (SPRTOS)” MARCH 26-27 2011
0.15
                                                                                 Car position
                                                                                                  0.1
0.05
                                                                                                -0.05
Figure 2 illustrates the modeled characteristics of the car. The
front and rear suspension are modeled as spring/damper
                                                                                                 -0.1
systems. This model include damper nonlinearities such as                                               0    10      20        30      40       50     60       70    80          90    100
velocity-dependent damping. The vehicle body has pitch and                                                                                  Time (sec)
bounce degrees of freedom. They are represented in the model                              Figure 3. Comparison of True, Measured & Estimated position with KF
by four states: vertical displacement, vertical velocity, pitch
angular displacement, and pitch angular velocity. The front
                                                                                                                  difference between true position and measured position
suspension influences the bounce (i.e. vertical degree of                                        0.1
                                                                                                                  difference between true position and estimated position
freedom).
4. SIMULATION RESULTS 0
Time     True       Measured      Estimated     Error (true -   Error (true -   Time                True          Measured          Estimated         Error (true -        Error (true -
(sec)    state      state (mt)    state         measured        estimated       (sec)               state         state (mt)        state             measured             estimated
         (mt)                      (mt)         position)       position)                           (mt)                            (mt)              position)            position)
                                                (mt)            (mt)                                                                                  (mt)                 (mt)
                                                                                                                                                                      SIP0107-5
                              CONFERENCE ON “SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM (SPRTOS)” MARCH 26-27 2011
               1              0.0012        0.0181               0.0010          -0.0169              0.0002    make future state and measurement predictions more accurate
               30             0.0186        0.0251                0.022          -0.0065              -0.0034   and therefore improving the accuracy of target positioning and
               60             0.746            0.744              0.731          0.0020               0.015
                                                                                                                tracking. Further efforts in kalman filter will lead to improved
                                                                                                                estimation of signal arrival time and more accurate target
               90             0.147            0.189              0.148          -0.042               -0.0010
                                                                                                                positioning and tracking.
        100                   0.1791           0.181              0.183          -0.0019              -0.0039
                    0.3                                                                                         This work can be used as theoretical base for further studies in
                                       true position                                                            a number of different directions such as tracking system, to
                0.25
                                       measured position                                                        achieve high computational speed for multi-dimensional state
                                       estimated position
                                                                                                                estimation.
                    0.2
                                                                                                                                          REFERENCES
Car position
                0.15
                                                                                                                [1]     Kalman, R. E.,” A new approach to linear filtering and prediction
                                                                                                                        problems”, Journal of Basic Engineering Transactions of the
                    0.1                                                                                                 ASME, Series D, Vol. 82, No. 1, pp. 35-45, 0021- 9223, 1960.
                                                                                                                [2]     Kalman, R. E. & Bucy R. S.,” New results in linear filtering and
                                                                                                                        prediction problems”, Journal of Basic Engineering Transactions
                0.05
                                                                                                                        of the ASME, Series D, Vol. 83, No. 3, pp. 95- 108, 0021-9223,
                                                                                                                        1961.
                     0                                                                                          [3]     Mudi Rajani, K. & Nikhil Pal, R. ,”A robust self-tuning scheme for
                                                                                                                        PI and PD type fuzzy controllers”, IEEE transactions on fuzzy
                                                                                                                        systems, Vol. 7, No. 1, ( February 1999) 2-16, 1999.
               -0.05                                                                                            [4]    Zdzislaw, B. ,”Modern control theory”, Springer-Verlag Berlin
                          0      10       20      30        40       50     60    70       80    90      100
                                                                 Time (sec)                                     [5]     Eubank, R. L.,”A Kalman filter primer”, Taylor & Francis Group,
                                                                                                                       2006.
                Figure 5. Comparison of True, Measured & Estimated position with EKF                            [6]     D. L. Alspach, and H. W. Sorenson, “Nonlinear Baysian
                                                                                                                        estimation using Gaussian sum approximations,” IEEE Trans.
                                                                                                                        Automatic Cont., vol. 17, no. 4, pp. 439-448, Aug. 1972.
                    0.1
                                       difference between true position and measured position                   [7]     Yang, F.; Wang, Z. & Hung, Y. S.,” Robust Kalman filtering for
                                       difference between true position and estimated position                          discrete time-varying uncertain systems with multiplicative
                                                                                                                        noises”, IEEE Transactions on Automatic Control, Vol. 47, No. 7,
                                                                                                                        pp.1179-1183, 0018-9286, 2002.
                0.05
                                                                                                                [8]     Dong, Z. & You, Z. ,” Finite-horizon robust Kalman filtering for
                                                                                                                        discrete time-varying systems with uncertain-covariance white
                                                                                                                        noises”, IEEE Signal Processing Letters, Vol.13, No. 8, pp. 493-
                                                                                                                        496, 1070-9908, 2006.
                                                                                                                [9]     Zhu, X.; Soh, Y. C. & Xie, L,” Design and analysis of discete-time
error
                     0
                                                                                                                        robust Kalman filters. Automatica”, Vol. 38, pp. 1069-1077, 0005-
                                                                                                                        1098, 2002.
                                                                                                                [10]    Hounkpevi, F. O. & Yaz, E. E.,” Robust minimum variance linear
               -0.05
                                                                                                                        state estimators for multiple sensors with different failure rates”,
                                                                                                                        Automatica, Vol. 43, pp. 1274-1280, 0005-1098, 2007.
                                                                                                                [11]    Wei Wu and Wei Min, “The mobile robot GPS position based on
                                                                                                                        neural network adaptive Kalman filter”, International Conference
                   -0.1
                                                                                                                        on Computational Intelligence and Natural Computing, IEEE, pp.
                                                                                                                        26-29, 2009
                                                                                                                [12]    Y. Bar-Shalom and Li X.R., Estimation and Tracking: Principles,
                          0      10       20      30        40       50     60    70       80    90      100
                                                                                                                        Techniques, and Software, Artech House, 1993.
                                                                 Time (sec)
                                                                                                                [13]    Y. Bar Shalom, X.-R. Li, and T. Kirubarajan, Estimation With
           Figure 6. Comparison of Error between true, measured & estimated position                                    Applications to Tracking and Navigation. New York: Wiley, 2001.
                                                                                                                [14]    Y. C. Ho and R. C. K. Lee, “A Bayesian approach to problems in
                                                       value with EKF
                                                                                                                        stochastic estimation and control,” IEEE Trans. Automatic Cont.,
                                                                                                                        vol. AC-9, pp. 333-339, Oct. 1964.
                                                                                                                [15]    P. Maybeck, Stochastic Models, Estimation and Control. New
                                                 5.         CONCLUSION
                                                                                                                        York: Academic Press, vol. I, 1979.
                                                                                                                [16]    S. Haykin, Adaptive Filter Theory. Prentice-Hall, Inc., 1996.
   In this paper, a detailed overview of Kalman filter and                                                      [17]    H. J. Kushner, “Approximations to optimal nonlinear filters,” IEEE
   Extended Kalman Filter to improve inadequate statistical                                                             Trans. Automatic Cont., AC-12(5), pp. 546-556, Oct. 1967.
   models, nonlinearities in the measurement is presented.                                                      [18]    Sawaragi, Yoshikazu and Katayama, Tohru, “Performance Loss
                                                                                                                        And Design Method of Kalman Filters For Discrete-time Linear
   Simulation results show that the performance of the Extended                                                         Systems With Uncertainties”, International Journal of Control,
   Kalman filter is higher than that of the Kalman filter and                                                           12:1, 163 — 172, 1970.
   conclude that the Kalman filter-based scheme is capable of
   effectively estimating the position errors of moving target to
                                                                                                                                                                           SIP0107-6
CONFERENCE ON “SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM (SPRTOS)” MARCH 26-27 2011
                                                                                     SIP0107-7
CONFERENCE ON “SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM (SPRTOS)” MARCH 26-
27 2011
                                                                            SIP0108-1
CONFERENCE ON “SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM (SPRTOS)” MARCH 26-
27 2011
                                                                        SIP0108-10
CONFERENCE ON “SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM (SPRTOS)” MARCH 26-27
2011
                                                                                                SIP0109-1
CONFERENCE ON “SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM (SPRTOS)” MARCH 26-27
2011
generation through the walking steps of         film, h is the total transducer height, t is
human being is reviewed and presented           the film thickness, and N is the number of
here. The sole of shoe could be constructed     film layers in the transducer [6]. The
of piezoelectric materials and every step a     piezoelectric polymer power generator and
person took would begin to generate             conversion circuit provide over 2 mW of
electricity. This smart mechanism of            regulated power at 4.5 V. The transducer is
generation of electricity through shoe sole     low cost, ecological, and soft suitable
could then be stored in a battery or used       shock absorption inside heel. The design
immediately in personal electronics             of electromagnetic generators that can be
devices.                                        integrated within shoe soles is described.
                                                In this way, parasitic energy expended by a
      II. LITERATURE REVIEW                     person while walking can be tapped and
   The most common methodology of               used to power portable electronic
shoe power generators include dielectric        equipment. Designs are based on discrete
elastomers [1] and piezoelectric ceramics       permanent magnets and copper wire coils,
[2,3]. The elastomer demonstrated               and it is intended to improve performance
significant power output but it required a      by          applying        micro-fabrication
large bias (2 kV) and the heavy                 technologies. The proposed approach is
construction is likely to negatively affect     good in an aspect that voltage level are
the user experience. The power harvesting       comparable with piezoelectric generator
shoe reported in [2] and [3] uses               however, its complex circuitry is a
piezoelectric ceramic bi-morphs for power       constraint. Vibration based generators
harvesting. As piezoelectric materials were     using three types of electromechanical
employed, no bias voltage was needed.           transducers:        electromagnetic        [8],
However, a complex PZT/metal bi-morph           electrostatic [9], and piezoelectric [10-11]
was required and the power output after         have also been presented.
dc/dc conversion and regulation was low           In all of these methods, vibrations consist
(<1 mW) [2]. The schematic of                   of a traveling wave in or on a solid
microstructured piezoelectric polymer film      material, and it is often not possible to find
that is used for the power generation as        a relative movement within the reach of a
shown in below figure1.                         small generator. Therefore, one has to
                                                couple the vibration movement to the
                                                generator by means of the inertia of a
                                                seismic mass.
                                                                                    SIP0109-2
CONFERENCE ON “SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM (SPRTOS)” MARCH 26-27
2011
                                                                                 SIP0109-3
CONFERENCE ON “SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM (SPRTOS)” MARCH 26-27
2011
                                                                               SIP0109-4
CONFERENCE ON ―SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM (SPRTOS)‖ MARCH 26-27 2011
                                                                                                                   SIP0110-1
CONFERENCE ON ―SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM (SPRTOS)‖ MARCH 26-27 2011
                                                                       xx [ m]                  x[n            m ]x[n]
                                                                                         n 0                                  -(6)
                   II. WINDOW FUNCTIONS
These are the window functions used for spectrum and               The sequence x(a) is windowed and autocorrelated and psd
cepstrum analysis.
                                                                   is calculated by -
      [1]
MBH are used for the estimation techniques. Modified
Bartlett-Hanning (MBH) window is extended to the form [1]                        N 1
                                                                                                     jn
                                                                     xx   (f)            xx   [m]e        .                  –(7)
w(t,α)=α-(4α-2)|t|+(1-α)cos2πt; |t| ≤0.5, 0.5≤α <1.88       -(1)                 n 0
Blackman window:
                                                                                   IV. CEPSTRUM ANALYSIS
W(n)=.42-.50cos((2πn)/(M-1))+.08cos((4πn)/(M-1))            -(2)
                      N     n 0                                                                                                      Log
                                                               -
(5)
                                                              TABLE-I(bandwidth of
                                                                periodogram[4])
Smooth cepstrum
Fig.2(Welch method)
                                                                                     SIP0110-3
CONFERENCE ON ―SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM (SPRTOS)‖ MARCH 26-27 2011
             TABLE-II(bandwidth of
                  welch[4])
                                                             For cepstrum analysis we have taken the voice
                                                             samples of two speakers of duration 25 ms each.
                                                             And after that we have passed the voice samples
                                                             through the low pass filter of cut-off frequency
                                                             0.15*pi. We have used low pass filter here to
                                                             eliminate the high frequency additive noise and
                                                             analyzed the cepstrum of the filtered voice samples
                                                             for pitch detection.
Fig.4(Cepstrum Analysis)
VII. CONCLUSION
                                                      The aim is to detect and estimate the signal [3]. For the
                                                      identification of two different frequency components in a
                                                      presence of noise different threshold levels has been taken
                                                      starting from -3dB [4]. In periodogram method (Fig.1) -
                                                      3dB,-6dB and -15dB of threshold is taken and it is
                                                      observed from the results (TABLE-I) that at -3dB two
                                                      sinusoidal peaks are not detected and beyond -15dB noise
                                                      is detected. Same is the case with autocorrelation PSD
                                                      method that at -3db (TABLE-III) no peaks are detected but
                                                      we can detect our signals up to -20dB in comparison to
                                                      peridogram method. But in the case of Welch method
                                                      (TABLE-II), (Fig.2) detection at -3dB is possible i.e. the
                                                      minimum threshold to detect the signal. As the Fourier
                                                      transform of sinusoidal signal is an impulse so in the Welch
                                                      method (TABLE-II) using MBH window, side lobe levels
                                                      are more suppressed and width of main become
                                                      narrower(tending to an impulse Fig 2) than Hamming and
                                                      Blackman windows .
                                                                                                     SIP0110-4
CONFERENCE ON ―SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM (SPRTOS)‖ MARCH 26-27 2011
           Taking ―HELLO‖ as an iterative voice sample for      [5] The Cepstrum Guide: A Guide to Processing by
two speakers, we have estimated the average pitch. It is        Donald G. Childers,David P. Skinner and Robert C.
observed that in cepstrum (fig.4) error in pitch detection is   Kemerait, PROCEEDINGS OF THE IEEE, VOL. 65,
more than smooth cepstrum (fig. 5). Now, considering 0.4        NO. 10, OCTOBER 1977, pp 1428-1443.
as threshold level we see that the periodicity in smooth
cepstrum is more distinguished and hence pith can easily be     [6] Signal Modeling Techniques in Speech Recognition by
detected. This can be further used in voice recognition         JOSEPH W. PICONE, SENIOR MEMBER,                  IEEE,
systems in order to minimize false acceptance rate (FAR)        PROCEEDINGS OF THE IEEE, VOL. 81, NO. 9,
and false rejection rate (FRR).                                 SEPTEMBER 1993, pp 1215-1247.
                                                                                                            SIP0110-5
CONFERENCE ON ―SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM (SPRTOS)‖ MARCH 26-27 2011
[9] http://en.wikipedia.org/wiki/Cepstrum
[11] http://en.wikipedia.org/wiki/Human_voice
                                                                                   SIP0110-6
                                                                                                               1
           A 3D APPROACH TO FACE-EXPRESSION
                     RECOGNITION
               Akshay Gupta , Ananya Misra , Hridesh Verma , Garima Chandel-Member IEEE
 ABSTRACT: Face recognition has been in                  expression has become a big challenge in 3D face
research for the last couple of decades. With the        recognition systems. In this paper, we propose an
advancement of 3D imaging technology, 3D face            approach to tackle this problem, through the
                                                         integration of expression recognition and face
recognition emerges as an alternative to overcome
                                                         recognition in a system.
the problems inherent to 2D face recognition, i.e.
sensitivity to illumination conditions and positions               II.    EXPRESSION AND FACE
of a subject. But 3D face recognition still needs to                         RECOGNITION
tackle the problem of deformation of facial
geometry that results from the expression changes          From the psychological point of view, it is still not
of a subject. To deal with this issue, a 3D face         known whether facial expression recognition
                                                         information aids the recognition of faces by human
recognition framework is proposed in this paper.
                                                         beings. It is found that people are slower in
It is combination of three subsystems: expression        identifying happy and angry faces than they are in
recognition system, expressional face recognition        identifying faces with neutral expression.
system and neutral face recognition system. A            The proposed framework involves an initial
system for the recognition of faces with one type        assessment of the expression of an unknown face,
of expression (smile) and neutral faces was              and uses that assessment to assist the progress of its
                                                         recognition. The incoming 3D range image is
implemented and tested on a database of 30
                                                         processed by an expression recognition system to
subjects. The results proved the feasibility of this     find the most appropriate expression label for it. The
framework.                                               expression labels include the six prototypical
                                                         expressions of the faces, which are happiness,
Index Terms- face recognition, databases, neutral        sadness, anger, fear, surprise and disgust, plus the
face, smiling face, image acquisition.                   neutral expression. According to different
                                                         expressions, a matching face recognition system is
               I.    INTRODUCTION                        then applied. If the expression is recognized as
                                                         neutral, then the incoming 3D range image is directly
  Mostly the face recognition attempts that have been    passed to the neutral expression face recognition
made use of 2D intensity images as the data format       system, which uses the features of the probe image to
for processing. In spite of the success reached by 2D    directly match those of the gallery images, which are
recognition methods, certain problems still exist. 2D    all neutral, to get the closest match. If the expression
face images not only depend on the face of a subject,    found is not neutral, then for each of the six
but also depend on imaging factors, such as the          expressions, a separate face recognition subsystem
environmental illumination and the orientation of the    should be used. The system will find the right face
subject. These variable factors can become the cause     through modelling the variations of the face features
of the failure of the 2D face recognition system. With   between the neutral face and the face with
the advancement of 3D imaging technology, more           expression. Figure 1 shows a simplified version of
attention is given to 3D face recognition, which is      this framework. This simplified diagram only deals
robust with respect to illumination variation and        with the smiling expression, which is the most
posing orientation. In [1], Bowyer et al. provide a      commonly displayed by people publicly.
survey of 3D face recognition technology. Mostly the
3D face recognition systems treat the 3D face surface            III.    DATA ACQUISITION AND
as a rigid surface. But actually, the face surface is                        PROCESSING
deformed by different expressions of the subject,
which causes the failure of the systems that treat the    To test the approach proposed in this model, a
face as a rigid surface. The involvement of facial       database, which includes 30 subjects, was built. In
                                                                                                                          2
this database, we test the different processing of the         generated by contraction of the zygomatic major
two most common expressions, i.e., smiling versus              muscle. This muscle lifts the corner of the mouth
neutral. Each subject participated in two sessions of          obliquely upwards and laterally, producing a
the data acquisition process, which took place in two
                                                               characteristic “smiling expression”. So, the most
different days. In each session, two 3D scans were
acquired with a Polhemus Fastscan scanner. One was             distinctive features associated with the smile are the
a neutral expression; the other was a happy (smiling)          bulging of the cheek muscle and the uplift of the
expression. The resulting database contains 60 3D              corner of the mouth, as shown in Figure 3.
neutral scans and 60 3D smiling scans of 30 subjects.          The following steps are followed to extract six
                                                               representative features for the smiling expression:-
    Figure1- Simplified framework of 3D face recognition       Figure 3- Illustration of features of a smiling face versus a
                                                               neutral face
The left image in Figure 2 shows an example of the
                                                               2. The first feature is the width of the mouth, BE,
3D scans obtained using this scanner, the right image
                                                                  normalized by the length of AD. Obviously, while
is the 2.5D range image used in the algorithm.
                                                                  smiling the mouth becomes wider. The first feature
                                                                  is represented by mw.
                                                               3. The second feature is the depth of the mouth (The
                                                                  difference between the Z coordinates of point B
                                                                  point C and point E point C) normalized by the
                                                                  height of the nose to capture the fact that the
                                                                  smiling expression pulls back the mouth. This
                                                                  second feature is represented by md.
                                                               4. The third feature is the uplift of the corner of the
                                                                  mouth, compared with the middle of the lower lip
                                                                  d1 and d2, as shown in the figure, normalized by
                                                                  the difference of the Y coordinates of point A point
Figure 2- 3D surface (left) and a mesh plot of the converted
range image (right)                                               B and point D point E, respectively and
                                                                  represented by lc.
      IV.      EXPRESSION RECOGNITION                          5. The fourth feature is the angle of line AB and line
                                                                  DE with the central vertical profile, represented by
  The face expression is a basic mode of nonverbal                ag.
communication among people. In [5], Ekman and                  6. The last two features are extracted from the
Friesen proposed six primary emotions. Each                       semicircular areas shown, which are defined by
possesses a distinctive content together with a unique            using line AB and line DE as diameters. The
facial expression. These six emotions are happiness,              histograms of the range (Z coordinates) of all the
sadness, fear, disgust, surprise and anger. Together              points within these two semicircles are calculated.
with the neutral expression, they also form the seven
basic prototypical facial expressions.                           Figure 4 shows the histograms for the smiling and
  In our experiment, we aim to recognize social                the neutral faces of the subject in Figure 3. The two
smiles, which were posed by each subject. Smiling is           figures in the first row are the histograms of the range
                                                                                                                3
values for the left cheek and right cheek of the         pattern classification methods are applied to
neutral face image; the two figures in the second row    recognize the expression of the incoming faces. The
are the histograms of the range values for the left      first method used is a linear discriminant (LDA)
cheek and right cheek of the smiling face image.         classifier, which seeks the best set of features to
                                                         separate the classes. The other method used is a
                                                         support vector machine (SVM).
     300
     200                                                            V.     3D FACE RECOGNITION
     100                             Series1
        0                                                  A. Neutral face recognition
                                                           In our earlier research work, we have found that the
            abcde f gh i j                               central vertical profile and the contour are both
                                                         discriminant features for every person. Therefore, for
                                                         neutral face recognition, the results of central vertical
     200                                                 profile matching and contour matching are combined.
                                                         The combination of the two classifiers improves the
                                     Series1             overall performance significantly. The final similarity
        0
                                                         score for the probe image is the product of ranks for
            abcde f gh i j                               each of the two classifiers (based on the central
                                                         vertical profile and contour). The image with the
                                                         smallest score in the gallery will be chosen as the
                                                         matching face for the probe image.
     300
     200                                                   B. Smiling face recognition
     100                                                   For the recognition of smiling faces we have
                                      Series1
                                                         adopted the probabilistic subspace method proposed
        0                                                by B. Moghaddam et al. [8,9]. It is an unsupervised
            abcde f gh i j                               technique for visual learning, which is based on
                                                         density estimation in high dimensional spaces using
                                                         Eigen decomposition. Using the probabilistic
                                                         subspace method, a multi-class classification problem
      150                                                can be converted into a binary classification problem.
      100                                                In the experiment for smiling face recognition,
       50                                                because of the limited number of subjects (30), the
                                        Series1          central vertical profile and the contour are not used
        0                                                directly as vectors in a high dimensional subspace.
             ab c de f gh i j                            Instead, they are down sampled to a dimension of 17
                                                         to be used. The dimension of difference in feature
                                                         space is set to be 10, which contains approximately
    Figure 4- Histogram of range of cheeks (L &R) for    97% of the total variance. The dimension of
    neutral (top row), and smiling (bottom row) face.
                                                         difference from feature space is 7.
  From the above figures, we can see that the range        In this case also, the results of central vertical
histograms of the neutral and smiling expressions are    profile matching and contour matching are combined,
different. The smiling face tends to have large values   improving the overall performance. The final
at the high end of the histogram because of the bulge    similarity score for the probe image is the product of
of the cheek muscle. On the other hand, a neutral face   ranks for each of the two classifiers. The image with
has large values at the low end of the histogram         the smallest score in the gallery will be chosen as the
distribution. Therefore two features can be obtained     matching face for the probe image.
from the histogram.
  One is called the ‘histogram ratio’, represented by         VI.        EXPERIMENTS AND RESULTS
hr, the other is called the ‘histogram maximum’,
represented by hm.                                         One gallery and three probe databases were used
                                                         for evaluation. The gallery database has 30 neutral
                  ℎ6 + ℎ7 + ℎ8 + ℎ9 + ℎ10                faces, one for each subject, recorded in the first data
            ℎ =                                          acquisition session. Three probe sets are formed as
                   ℎ1 + ℎ2 + ℎ3 + ℎ4 + ℎ5
                                                         follows: Probe set 1: 30 neutral faces acquired in the
hm = i; i = arg {max (h (i))}                            second session.
                                                         Probe set 2: 30 smiling faces acquired in the second
 After the six features have been extracted, this        session.
becomes a general classification problem. Two            Probe set 3: 60 faces, (probe set 1 and probe set 2).
                                                                                                                   4
Experiment 1: Testing the expression recognition             On the other hand, if the incoming faces are
module                                                     smiling, then the neutral face recognition algorithm
  The leave-one-outout cross validation method is used     does not
to test thee expression recognition classifier. Every        These experiments emulate a realistic situation in
time, the faces collected from 29 subjects in both data    which a mixture of neutral and smiling faces (probe
acquisition sessions are used to train the classifier      set 3) must be perform well, only 57% rank one
and the four faces of the remaining subject collected      recognition rate is obtained. (Rankone means only
in both sessions are used to test the classifier. Two      the face which scores highest is selected from the
classifiers are used. One is the linear discriminant       gallery. Rank one recognition rate is the ratio
classifier; the other is a support vector machine          between number of faces correctly recognized and
classifier. LDA tries to find the subspace that best       the number of probe faces. Rank three ree means three
discriminates different classes by maximizing the          highest scored faces instead of one face are selected.)
between class scatter matrix, while minimizing the         In contrast, when the smiling face recognition
within-class
        class scatter matrix in the projective subspace.   algorithm is used to deal with smiling faces, the
Support vector machine is a relatively new                 recognition rate can be as high as 80%.
technology for classification. It relies on pre-    pre
processing the data to represent patterns in a high        Experiment 3: Testing a practical scenario
dimension, typically much higher than the original
feature space. With an appropriate nonlinear mapping         These
                                                                 ese experiments emulate a realistic situation in
to a sufficiently high dimension, data from two            which a mixture of neutral and smiling faces (probe
categories can always be separated by a hyper plane.       set 3) must be recognized. Sub experiment 1
                                                           investigates the performance obtained if the
Table 1- expression recognition results                    expression recognition front end is bypassed, and the
                                                           recognition of all the probe faces is attempted with
Method                                    LDA      SVM
Expression recognition rate               90.8     92.5    the neutral face recognition module alone. The last
                                                           two sub experiments implement the full framework
                                                           shown in Figure 1. In 3.2 the expression recognition
Experiment 2: Testing the neutral and smiling              is performed with the linear discriminant
                                                                                            discrim       classifier,
recognition modules separately                             while inn 3.3 it is implemented through the support
                                                           vector machine approach.
  In the first two sub experiments, probe faces are              a. Neutral face recognition module used alone:
directly fed to the natural face recognition module. In              probe set 3 is used.
the third sub experiment, the leave-one   one-out cross          b. Integratedd expression and face recognitio
                                                                                                       recognition:
validation is used to verify the performance of the                  probe set 3 is used. (Linear discriminant
smiling face recognition module.                                     classifier for expression recognition.)
                                                                                               recognitio
                                                                 c. Integrated expression and face recognition:
     a.    Neutral face recognition: probe set
           1.(neutral face recognition module used.)                 probe set 3 is used.(support vector machine
     b.    Natural face recognition: probe set 2(neutral             for expression recognition.)
           face recognition module used.)                     It can been seen in Figure 6 that if the incoming
     c.    Smiling face recognition: probe  pro      set   faces include both neutral faces and smiling faces,
           2(smiling face recognition module used).        the recognition rate can be improved about 10
                                                           percent by using the integrated framework proposed
  From Figure 5, it can be seen that when the              here.
incoming faces are all neutral, the algorithm which
treats all the faces as neutral achieves a very high                          CONCLUSION
recognition rate.
   1.5                                                       The work reported in this paper represents an
                                           rank 1          attempt to acknowledge and account for the presence
      1                                    recognition     of expression on 3D face images, towards their
                                           rate            improved identification. The method introduced here
   0.5                                                     is computationally efficient. Furthermore, this
                                           rank 3
                                           recognition     method also yields as a secondary result the
      0                                                    information of the expression found in the faces.
                                           rate
              a        b      c                            Based on these findings we believe that the
                                                           acknowledgement of the impactact of expression on 3D
Figure 5 Results of Experiment 2(three sub-experiments)
                                           experiments)
                                                           face recognition and the development of systems that
                                                                   5
    1.2
      1
                                              rank 1
    0.8                                       recognition
    0.6                                       rate
    0.4
                                              rank 3
    0.2                                       recognition
      0                                       rate
              a         b         c
REFERENCES
[3] www.polhemus.com.
                                                                                    SIP0112-1
CONFERENCE ON “SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM (SPRTOS)” MARCH 26-27 2011
through solving a least squares (LS)              approach. For multiple targets both [6] and
problem. The authors of [3] improve the           [7] require data association. In [7], the data
performance of [2] by employing the source        association is done by Bayes classifier
movement model and refining the updated           which is computationally expensive. The
DOAs through a Kalman filter. The authors         authors of [8] develop two computationally
of [4] update the DOA estimates of each           simple methods for DOA tracking based on
time frame by solving a maximum–                  recursive expectation and maximization
likelihood (ML) problem of most current           (REM) algorithm. These two methods apply
array output. This approach also employs a        for both narrowband and wideband signals .
source movement model and refines the             From [8], the first method does not work
DOA estimates through a Kalman filter as in       properly when two DOAs are crossing , and
[3].The authors of [5] introduce multiple         the second method requires a linear DOA
target states (MTS) to describe the target        motion model, restricting DOA tracks to
motion ,and the DOA tracking is                   only straight lines.
implemented through updating the MTS by
maximizing the likelihood function of the         Recently,a          statistical        property,
array output. Whether by LS or ML method,         cyclostationarity, which many type of man
whether introducing MTS or other models to        made signals in communications such as
describe the target motion , whether using        BPSK,FSK,AM exhibit has been exploited
Kalman filter or not ,all these algorithms        in DOA estimation[10]-[12].By exploiting
implement the DOA tracking in a way that          cyclostationarity, interference and noise that
the order of the estimated DOAs for               do not share the same cycle frequency as the
different times or time frames is maintained      desired signals or do              not exhibit
, thus data association is avoided. Therefore,    cyclostationarity can be suppressed ,thus
they are more computationally efficient than      performance of DOA estimation is improved
the methods requiring the data association.       when the DOA of interference is close to
                                                  DOA        of      desired      signal.     The
All the above methods are applicable to           Cyclostationarity could be exploited to
narrowband signals and they would fail for        improve performance of DOA tracking. All
wideband signals .Wideband signals are            the DOA tracking algorithms discussed
becoming more and more common                     previously [1]-[7] assume that the signals
nowdays. Therefore, research work on              are stationary but not cyclostationary .Here
developing DOA tracking algorithms that           ,a new signal selective DOA tracking
work for wideband sources has been carried        algorithm for wideband multiple moving
out[6]-[8].The authors of [6] use focusing        sources by exploiting the cyclostationarity
matrices to align steering vectors of different   of the signals is proposed .In this algorithm ,
frequency bins to carrier frequency so that       the signals emitted by moving sources can
wideband signals can be treated the same          be either narrowband or wideband
way as narrowband signals in estimating the       cyclostationary. Our algorithm assumes that
DOAs            by        multiple       signal   DOAs in each time frame are fixed and
classification(MUSIC)[9].When new data            tracks the DOA changes from frame to
arrive ,[6] first updates the focusing matrices   frame by exploiting the difference of
and then applies MUSIC to obtain new              averaged cyclic cross correlation of the
estimated DOAs. In [7], the authors estimate      array output. DOA tracking is initiated by
the DOAs of each time frame by an ML              applying once a wideband DOA estimation
                                                                                      SIP0112-9
CONFERENCE ON “SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM (SPRTOS)” MARCH 26-27 2011
                                                                                          SIP0112-9
CONFERENCE ON “SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM (SPRTOS)” MARCH 26-27 2011
deal with the data samples collected during a         we can obtain N-1 cross-cyclic correlations
time frame.                                           estimated at the kth time frame,
rαsisj (τ,k)= ∫k si(t + τ/2) sj*(t- τ/2) )e-j2παtdt   rαz1zn (τ,k) =∫kz1(t+τ/2)zn*(t- τ/2)) e-j2παtdt
                                              (4)
                                                                                    α
Now let us define the following vectors and                = Σi=1 I [ Σp=1 I    r    spsi   (τ-(n-1) Δi(k),k)]. E-
                                                      j2π(fo-(α/2))(n-1)Δi(k)
matrices,                                                                                              (9)
                                                                                                             SIP0112-9
CONFERENCE ON “SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM (SPRTOS)” MARCH 26-27 2011
                                                                                            SIP0112-9
CONFERENCE ON “SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM (SPRTOS)” MARCH 26-27 2011
filter. Our simulation shows that Kalman          2. Obtain θi^(k) by LS tracking method.
filter refinement further improves DOA            Use θi^(k-1│k-1) in place of θi^(k-1).
tracking accuracy and reduces the burden of       3. Obtain Qi^(k-1) and σ2yi (k) from (39) &
selecting optimum ۸(k) in(30).                    (40).Use Qi^(k-1)as an approximation of
                                                  Qi^(k).
                                                  4. Calculate Pi^(k│k-1)= F Pi^(k-1│k-1)FH
Define the state of the ith(i=1,…,I) source at
                                                  + Qi^(k).
the kth time frame as,
                                                  5. Calculate the Kalman filter gain G(k)=
                                                  Pi^(k│k-1) HH/R(k) where
xi(k) = [ θi(k) ]
                                                      R(k)= H Pi^(k│k-1) HH + σ2yi (k).
        [ θi˙(k) ]
                                                  6. Update the state for the kth time frame
        [θi˙˙(k)]                   (31)
                                                  by xi^(k│k)= xi^(k│k-1)+ G(k)( θi^(k) - H
                                                  xi^(k│k-1)).
xi(k)=Fxi(k-1)+wi(k)                 (32)
                                                  7. Take the first element of xi^(k│k ) as
                                                  the refined DOA estimate for the kth time
yi(k)=Hxi(k)+vi(k)                  (33)
                                                  frame, θi^(k│k) .
                                                  8. Prepare the next recursion by calculating
F = [ 1 T T2/2 ]
                                                  Pi^(k│k)= Pi^(k│k-1) – G(k)H Pi^(k│k-1).
    [ 0 1T     ]
    [001]                           (34)
                                                     4.                   Simulations
E[wi(j) wiH (k)] = { Qi(k) , j=k }
                   { 0,        j ≠ k }      for
                                                  Tracking performance versus SNR.
i=1,…,I                            (35)
                                                  In this simulation, three sources are assumed
                                                  to emit three wideband BPSK signals with
H=[100]                            (36)
                                                  raised cosine pulse shaping. Two of them
                                                  are SOI with same baud rate 20 MHz and a
ei(k)=xi^(k│k)-Fxi^(k-1│k-1)      (37)
                                                  same carrier frequency 100 MHz. The other
                                                  is interference with a baud rate 6 MHz and a
εi(k)=θi^(k)–Hxi^(k│k-1)          (38)
                                                  carrier frequency 80 MHz. The cycle
                                                  frequency of SOI is 20 MHz, which is
Since both process noise and measurement
                                                  assumed to be known. The two SOI are
noise are assumed to be zero mean ,their
                                                  coherent. A ULA with 7 antennas with
variance can be estimated by,
                                                  equal spacing of c/(2fo+α)= 1.36 m is used.
                                                  The subarray size is 6 for SS during
Qi^(k)=1/LΣj=k-L+1kei(j)eiH(j)     (39)
                                                  initialization .The duration of each time
                                                  frame is 0.5s during which 3200 snapshots
σ2yi(k)=1/LΣj=k-L+1kεi(j)εi*(j)    (40)
                                                  of data samples are obtained. The SNR of
                                                  one SOI is 1 db lower than other. The SNR
The steps to estimate DOAs for the kth time
                                                  of the interference is 5 db lower than the
frame are as follows:
                                                  higher powered SOI. To see how the
                                                  performances of the LS method and the
1. Obtain the predicted state by xi^(k│k-1)
                                                  Kalman filter method change with SNR, we
= F xi^(k-1│k-1).
                                                                                    SIP0112-9
CONFERENCE ON “SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM (SPRTOS)” MARCH 26-27 2011
vary the SNR of high powered SOI from -5            except that SNR for both SOI are the same
db to 15 db.                                        and there is one more interference with a
                                                    baud rate of 6MHz and a carrier frequency
Generally , source crossing poses difficulty        100MHz.whose SNR is also 5 db lower than
for tracking algorithm. The tracking                that of SOI.
algorithm fails if the estimation error is so       We first assume that the SNR of the SOI is 5
large that the tracks of two crossing sources       db and runs both the LS method and Kalman
are switched and lost as shown in fig 1. We         filter method 40 times. We assume that SNR
define failure rate as the ratio of number of       of SOI is 15 db and runs these two tracking
failed trials to the total number of trials         methods both for 40 times again. We plot
,which is 40 in our estimation.Fig2 shows           ensemble averages of estimated DOAs by
the failure rates of LS algorithm and Kalman        the LS method when SNR is 5 db in fig4.
filter algorithm with respect to SNR.We can         Three other plots for the mean of the
see with the usage of a Kalman filter,failure       estimated DOAs by the LS method when
rate is lower than that with the LS method          SNR is 15 db and by Kalman filter
and at and above 5 db SNR ,Kalman filter            methodwhen SNR is 5 db and 15 dbare
method does not fail at all.                        similar and hence omitted. The comparisons
                                                    of the rms errors of the estimated DOAs by
In this simulation ,we also plot the rms error      our two algorithms is illustrated in fig 5 and
of the estimated DOA in fig 3. Consider             fig6 .for one SOI. It can be seen from these
aspecific value of SNR; we can calculate            plots that both methods track the DOAs of
mean squared error of the estimated DOAs            the SOI well with Kalman filter method
for each trial of LS algorithm or Kalman            outperforming the LS method in accuracy.
filter algorithm. Then, the root of the mean
of the mse obtained through all 40 trials is
what we call rms of estimated DOAs at this
certain SNR. We should note that if the
algorithm fails to track the sources at one
trial ,the mse for that trial will be large,it is
excluded from calculating the final rms. If
we ignore this value by not considering the
failed trial ,the final rms will tend to be
smaller than true value, not reflecting the
tracking failure.From fig3 we see that
Kalman filter method performs better than
the LS method.
                                                                                       SIP0112-9
CONFERENCE ON “SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM (SPRTOS)” MARCH 26-27 2011
                                                                                 SIP0112-9
CONFERENCE ON “SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM (SPRTOS)” MARCH 26-27 2011
                                                                                   SIP0112-9
CONFERENCE ON “SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM (SPRTOS)” MARCH 26-27 2011
                                                                                 SIP0112-9
    Bartlett Windowed fast computation of
discrete trigonometric transforms for real-time
                data processing
                              Abhijit Khare, Shubham Varshney, Vikram Karwal
                      {khareabhijit14, shubham7502909dece}@gmail.com, vikram.karwal@jiit.ac.in
Abstract- Discrete trigonometric transforms (DTT)             their powerful bandwidth reduction capability the
namely discrete cosine transform (DCT) and discrete           DCT and DST algorithms are widely used for data
sine transform (DST) are widely used transforms in            compression. DCT transforms a signal or image
image compression applications. Numerous fast                 from the spatial domain to the frequency domain,
algorithms for rapid processing of real time data exist       where much of the energy lies in the lower
in theory. Windowing is a technique where a portion           frequencies coefficients like Discrete Fourier
of the signal is extracted and its transform is               Transform (DFT). The main advantage of the DCT
computed. These algorithms form a class of fast
                                                              over the DFT is that DCT involves only real
update transform that uses less computation as
compared to computing transform using conventional            multiplications. The DCT does a better job of
definition. Different windows such as rectangular,            concentrating energy into lower order coefficients
split-triangular and sinusoidal windows have been             than the DFT for image data. The DCT is adopted
used in theory to sample the real time sequence and           as a standard technique for image compression in
their performance compared. In this research fast             JPEG and MPEG standards because of its energy
update algorithm are analytically derived that are            compaction property.
capable of windowing the real time data in presence
of Bartlett window. Initially simultaneous update                 A portion of input signal is extracted using
algorithms are analytically derived and thereafter
                                                              windowing [6] and the transform of the windowed
algorithms capable of independently updating DCT
and DST are derived i.e. while computing the DCT              contents is computed. These classes of algorithms
updated coefficients no DST coefficients are required         already exist in theory and are known as fast update
and vice-versa. The analytically derived algorithms           algorithms [2]. Different windows such as
are implemented in C language to test their                   rectangular, split-triangular, Hamming, Hanning
correctness.                                                  and Blackman windows have been used earlier to
                                                              sample the real time data and their performance
Keywords— Discrete trigonometric transform,                   compared [6]. In this paper we have developed
window, fast update
                                                              update algorithm in the presence of Bartlett
                 I.       INTRODUCTION                        window. Initially the algorithms are derived for
                                                              simultaneous update of DCT/ DST coefficients, i.e.
                                                              we require to compute both the DCT and the DST
    In the area of signal processing, transform               coefficients to find the updated DCT/ DST
coding [8] provides an efficient way for                      coefficients. Thereafter algorithms are derived that
transmitting and storing data. The input data                 establish independence [1] between the DCT and
sequence is divided into suitably sized blocks and            DST coefficients. These algorithms lead to easier
thereafter reversible linear transforms are                   implementation of the update transform as we do
performed. The transformed sequence has much                  not need to compute both the coefficients
lower degree of redundancy than in the original               simultaneously.
signal. Karhunen-Loéve Transform (KLT) [3] has
emerged as a benchmark for Markov-1 type                          Section I lists the introduction of Discrete
signals. The Discrete Cosine Transform (DCT)                  trigonometric transforms, windowed update
[4,7] and the Discrete Sine Transform (DST)                   algorithms and their advantages. Section II lists the
perform quite closely to the ideal KLT and have               Bartlett   window      and     DTT     definitions.
emerged as the practical alternatives to the ideal            Simultaneous Bartlett windowed update algorithms
KLT.                                                          are also derived in Section II. In Section III
                                                              independent update algorithms are derived. Section
    The DCT and DST have wide applications in                 IV includes the complexity calculations of the
signal and image processing for the purposes of               derived algorithms and section V concludes the
pattern    recognition,    data     compression,              paper.
communication and several other areas [5]. Due to
          II.     DCT/DST TYPE-II WINDOWED                                     1
              SIMULTANEOUS UPDATE ALGORITHMS
                   USING BARTLETT WINDOW
𝑓𝑤 (𝑛𝑒𝑤 ) (𝑥) = 𝑓 𝑥 + 1 𝑤 𝑥 + 1                                                      4      𝑁
                                                                                   + 𝑁 −𝑓   2
                                                                                                𝛿𝑥,𝑁 −1 + 𝑓 𝑁 𝛿𝑥,𝑁−1             (9)
                                                                                                  2
                +𝑓 𝑥 + 1 𝑤 𝑥 − 𝑤(𝑥 + 1)
         The windowed update version of fw(x) and            while performing the windowed DCT update, both
fm(x) for moving DCT/DST for Bartlett window is              the coefficients of DCT and DST are required.
represented by equations (6) and (9) respectively. In
equation (6), fw(x+1) represents non-windowed                                𝑟𝑘𝜋           𝑟𝑘𝜋
                                                             𝐶+ 𝑘 = 𝑐𝑜𝑠          𝐶 𝑘 + 𝑠𝑖𝑛     𝑆(𝑘)
update of fw(x) and the second term fm(new)(x) is a                           𝑁             𝑁
correction factor that converts this non-windowed                                𝑁−1
update of fw(x) into an update in the presence of the                     2
                                                                        +   𝑃           −1 𝑘 𝑓 𝑁 + 𝑟 − 1 − 𝑥
window. Similarly in equation (9), fm(x+1)                                𝑁 𝑘
                                                                                 𝑥=0
represents non-windowed update of fm(x) and the                                                               2𝑥 + 1 𝑘𝜋
second term converts this into the update in the                                  − 𝑓(𝑟 − 1 − 𝑥) 𝑐𝑜𝑠
                                                                                                                 2𝑁
presence of the window.
                                                                                                   𝑓𝑜𝑟 𝑘 = 0, … … , 𝑁 − 1
Taking DCT-II of equation (6) and equation (9)
yields:                                                      where, C+(k)         represents       the       updated   DCT
                                                             coefficients.
𝐶𝑤   𝑛𝑒𝑤   𝑥 = 𝐶𝑤 𝑥 + 1 + 𝐶𝑚       𝑛𝑒𝑤    𝑥           (10)
                                                             Similarly the DST update equation may be derived
  𝐶𝑚(𝑛𝑒𝑤 ) = 𝐶𝑚 𝑥 + 1                                        and is:
                                   𝑁−1
                          2              4    𝑁              𝑆𝑤         𝑥 = 𝑆𝑤 𝑥 + 1 + 𝑆𝑚                𝑥             (12)
                        +   𝑃              −𝑓   𝛿 𝑁               𝑛𝑒𝑤                             𝑛𝑒𝑤
                          𝑁 𝑘            𝑁    2 𝑥, 2 −1
                                   𝑥=0
                                              2𝑥 + 1 𝑘𝜋      𝑆𝑚 (𝑛𝑒𝑤 ) = 𝑆𝑚 𝑥 + 1
                        + 𝑓(𝑁)𝛿𝑥,𝑁−1 𝑐𝑜𝑠
                                                 2𝑁
                                                                                       𝑁−1
                                                                              2   4        𝑁        𝑁 − 1 𝑘𝜋
Solving the above equation yields:                                       +      𝑃            −𝑓𝑠𝑖𝑛
                                                                              𝑁 𝑘𝑁         2          2𝑁
                                                                                    𝑥=0
𝐶𝑚(𝑛𝑒𝑤 ) = 𝐶𝑚 𝑥 + 1                                                                               𝑘𝜋
                                                                                  + 𝑓(𝑁)(−1)𝑘 𝑠𝑖𝑛            (13)
                                                                                                  2𝑁
                𝑁−1              𝑁
       2   4             𝑁     2( 2 − 1) + 1 𝑘𝜋
     +   𝑃            −𝑓   𝑐𝑜𝑠                                                                     𝑓𝑜𝑟 𝑘 = 0, … … , 𝑁 − 1
       𝑁 𝑘𝑁              2            2𝑁
                𝑥=0
                                                                  Equations (12) and (13) can be used to
                                   2(𝑁 − 1) + 1 𝑘𝜋
                      + 𝑓(𝑁)𝑐𝑜𝑠                              calculate the simultaneous update of the moving
                                        2𝑁                   DST for Bartlett window. Sw(x+1) is the non-
                                                             windowed DST update of fw(x) calculated using
𝐶𝑚   𝑛𝑒𝑤   = 𝐶𝑚 𝑥 + 1                                        DST update equation for rectangular window
                                                             which is listed below [2], and Sm(x+1) is the non-
                      𝑁−1                                    windowed updated DST of fm(x) calculated using
             2 4              𝑁      𝑁 − 1 𝑘𝜋
           +  𝑃             −𝑓  𝑐𝑜𝑠                          the same equation. Clearly, it can be seen that
             𝑁 𝑘𝑁             2        2𝑁
                      𝑥=0                                    while performing the windowed DST update both
                                2(𝑁 − 1) + 1 𝑘𝜋              the coefficients of DST and DCT are required.
                      + 𝑓(𝑁)𝑐𝑜𝑠
                                      2𝑁
                                                                             𝑟𝑘𝜋           𝑟𝑘𝜋
                                                             𝑆+ 𝑘 = 𝑐𝑜𝑠          𝑆 𝑘 − 𝑠𝑖𝑛     𝐶(𝑘)
Therefore,                                                                    𝑁             𝑁
𝐶𝑚         = 𝐶𝑚 𝑥 + 1                                                               𝑁−1
     𝑛𝑒𝑤                                                                    2
                                                                          +   𝑃              −1 𝑘 𝑓 𝑁 + 𝑟 − 1 − 𝑥
                      𝑁−1
                                                                            𝑁 𝑘
                                                                                    𝑥=0
               2 4           𝑁      𝑁 − 1 𝑘𝜋                                                                  2𝑥 + 1 𝑘𝜋
           +    𝑃           −𝑓  𝑐𝑜𝑠                                               − 𝑓(𝑟 − 1 − 𝑥) 𝑠𝑖𝑛
               𝑁 𝑘𝑁           2       2𝑁                                                                         2𝑁
                    𝑥=0
                           𝑘𝜋
           + 𝑓(𝑁)(−1)𝑘 𝑐𝑜𝑠             (11)                  where, S+(k)         represents       the       updated   DST
                           2𝑁
                                                             coefficients.
                                 𝑓𝑜𝑟 𝑘 = 0, … … , 𝑁 − 1
                                                              III.      DCT/DST TYPE-II WINDOWED INDEPENDENT
     Equations (10) and (11) can be used to                              UPDATE ALGORITHMS USING BARTLETT
calculate the simultaneous update of the moving                                         WINDOW
DCT for Bartlett window. Cw(x+1) is the non-
windowed DCT update of fw(x) calculated using                      A. Independent Update Algorithm
DCT simultaneous update equation for rectangular
window which is listed below [2], and Cm(x+1) is                 Above mentioned equations (10) and (11) can
the non-windowed DCT update of fm(x) calculated              be used to calculate the independent update of the
using same equation. Clearly, it can be seen that            moving DCT-II for Bartlett window. Cw(x+1) is
the non-windowed DCT-II update of fw(x), using                          window which is listed below [2], and Sm(x+1) is
DCT independent update equation for rectangular                         the non-windowed DST-II update of fm(x) also
window which is listed below [2], and Cm(x+1) is                        calculated using the same equation.
the non-windowed DCT-II update of fm(x) also
calculated using the same equation.                                                          𝑟𝑘𝜋
                                                                        𝑆𝑤 𝑛 + 𝑟, 𝑘 = 2𝑐𝑜𝑠       𝑆 𝑛. 𝑘 − 𝑆 𝑛 − 𝑟, 𝑘
                                                                                              𝑁
                       𝑟𝑘𝜋
𝐶𝑤 𝑛 + 𝑟, 𝑘 = 2𝑐𝑜𝑠         𝐶 𝑛. 𝑘 − 𝐶 𝑛 − 𝑟, 𝑘                                                   𝑟−1
                        𝑁                                                         2       𝑟𝑘𝜋
                                                                              +     𝑃 𝑠𝑖𝑛              [𝑓 𝑛 − 𝑁 − 𝑥 − 1
                          𝑟−1
                                                                                  𝑁 𝑘      𝑁
                                                                                                 𝑥=0
           2        𝑟𝑘𝜋
       +     𝑃𝑘 𝑠𝑖𝑛              [𝑓 𝑛 − 𝑁 − 𝑥 − 1
           𝑁         𝑁                                                                                        2𝑥 + 1 𝑘𝜋
                          𝑥 =0                                                − −1 𝑘 𝑓(𝑛 − 𝑥 − 1)] 𝑐𝑜𝑠
                                                                                                                 2𝑁
                                         2𝑥 + 1 𝑘𝜋
       − −1 𝑘 𝑓(𝑛 − 𝑥 − 1)] 𝑠𝑖𝑛                                                                  𝑟−1
                                            2𝑁                                  2       𝑟𝑘𝜋
                                                                              +   𝑃 𝑠𝑖𝑛                [ −1 𝑘 𝑓 𝑛 + 𝑟 − 𝑥 − 1
                          𝑟−1
                                                                                𝑁 𝑘      𝑁
                                                                                                 𝑥=0
           2       𝑟𝑘𝜋
       +     𝑃 𝑠𝑖𝑛               [ −1 𝑘 𝑓 𝑛 + 𝑟 − 𝑥 − 1
           𝑁 𝑘      𝑁                                                                                          2𝑥 + 1 𝑘𝜋
                          𝑥 =0                                                −𝑓 𝑛 + 𝑟 − 𝑁 − 𝑥 − 1 ]𝑠𝑖𝑛
                                                                                                                  2𝑁
                                             2𝑥 + 1 𝑘𝜋
       −𝑓 𝑛 + 𝑟 − 𝑁 − 𝑥 − 1 ]𝑐𝑜𝑠                                                                 𝑟−1
                                                2𝑁                                2        𝑟𝑘𝜋
                                                                              −     𝑃𝑘 𝑐𝑜𝑠             [𝑓 𝑛 − 𝑁 − 𝑥 − 1
                          𝑟−1
                                                                                  𝑁         𝑁
                                                                                                 𝑥=0
           2       𝑟𝑘𝜋                                                                                       2𝑥 + 1 𝑘𝜋
       −     𝑃 𝑐𝑜𝑠               [ −1 𝑘 𝑓 𝑛 − 𝑥 − 1                           − −1 𝑘 𝑓 𝑛 − 𝑥 − 1 ]𝑠𝑖𝑛
           𝑁 𝑘      𝑁                                                                                           2𝑁
                          𝑥=0
                                       2𝑥 + 1 𝑘𝜋
       −𝑓 𝑛 − 𝑁 − 𝑥 − 1 ]𝑐𝑜𝑠                                                                                        for k=1,......,N
                                          2𝑁
         Similarly the analogous formulae for                                    The correction factor to calculate the
DST-II are obtained by taking DST-II of equations                       correct value C[f(x-1)w(x-1)] from C[f(x-1)w(x)]
(6) and (9):                                                            for DCT update algorithm, and the correct value of
                                                                        S[f(x-1)w(x-1)] from S[f(x-1)w(x)] are derived here
𝑆𝑤   𝑛𝑒𝑤   𝑥 = 𝑆𝑤 𝑥 + 1 + 𝑆𝑚           𝑛𝑒𝑤   𝑥                 (14)     for the DST-II update algorithm.
𝑆𝑚 (𝑛𝑒𝑤 ) = 𝑆𝑚 𝑥 + 1                                                    𝑓 𝑥 − 1 𝑤 𝑥 = 𝑓(𝑥 − 1) 𝑤(𝑥) + 𝑤(𝑥 − 1) − 𝑤(𝑥 − 1)
                          𝑁−1
               2   4          𝑁        𝑁 − 1 𝑘𝜋                          = 𝑓 𝑥 − 1 𝑤 𝑥 − 1 − 𝑓(𝑥 − 1) 𝑤(𝑥 − 1) − 𝑤(𝑥)
             +   𝑃                −𝑓
                                  𝑠𝑖𝑛
               𝑁 𝑘𝑁            2         2𝑁
                       𝑥=0                                                   = 𝑓 𝑥 − 1 𝑤 𝑥 − 1 − 𝑓(𝑥 − 1)𝑚(𝑥 − 1)
                                    𝑘𝜋
                    + 𝑓(𝑁)(−1)𝑘 𝑠𝑖𝑛             (15)
                                    2𝑁
                                                                        Therefore,
                                        𝑓𝑜𝑟 𝑘 = 0, … … , 𝑁 − 1          𝑓 𝑥 − 1 𝑤 𝑥 − 1 = 𝑓(𝑥 − 1)𝑤(𝑥)
I.INTRO
      ODUCTION                                              There are
                                                                    a different schemes
                                                                                s       presen
                                                                                             nt in the markket
                                                            such ass
        B
        BAYER COLO
                 OR FILTER ARRAY
                           A
                                                                •    Lossy comprression schemee
A Bayerr Filter color array
                        a       usually coated
                                        c        over the       •    JPEG2000
sensors in these camerras to record onlyo      one of the
three coolors componen   nts at each pixeel location. The   So now
                                                                 w we have to llook the drawbbacks of preseent
resultantt image is referrred to as a CFA image.            methodds.
                                                                •    Encoder
                                                                •    Decoder
Encoderr:
                                                          Let g(m
                                                                mk,nk)Є Φg(i,,j) for k=1,2,,3,4 be the foour
                                                          ranked candidates of sample g(i,j)
                                                                                           g      Э(Sg(i,jj),
                                                          Sg(mu,,nu)) <= D D(Sg(i,j), Sg(mv,nv) ) ffor
                                                          1<=u<==v<=4
Fig 3: Sttructure of propposed scheme
Green Subimage
       S           is cooded first and the Non greenn     If the directions oof g(i,j) is iddentical to thhe
Subimagge follows baased on greenn subimage as      a     directioons of all greenn samples in Sg(i,j), pixel (i,j)
reference and To reduuce the spectrral redundancyy,       will bee considered in a homogennous region annd
the nonggreen subimaage is processeed in the coloor       predictiion of g(i,j) is
differencce domain whereas
                      w         the greeen subimage is
                                                     i
processeed in the intenssity domain as a reference foor
the coloor difference content of the nongreenn
subimagge. Both subim   mages are proccessed in rasteer
                                                          i.e. {w1,w2,w3,w4}= ={1,0,0,0} Elsse the g(i,j) is in
scan seequence withh context maatching basedd
                                                          heteroggenous region and
                                                                               a predicted value
                                                                                            v     of g(i,j) iis
predictioon technique to removee the spatiaal
dependeency. The pred   diction residuee planes of the
two suubimages aree then entrropy encodedd
sequentiially with our proposed realization scheme
of adaptiive Rice code.
                                                          i.e. {w11,w2,w3,w4}=
                                                                             ={5/8,2/8,1/8,0}
        IIV. WORKING
                   G OF THE SC
                             CHEME
                                                          FLOW CHART FO
                                                                      OR PREDICT
                                                                               TION ON TH
                                                                                        HE
This prroposed schem   me is mainlyy working onn          GREEN
                                                              N PLANE
Predictioon on the greenn plane and Prrediction on the
Non-greeen plane.
                                                       The error
                                                               e      residue e(i, j) is thenn mapped to a
                                                       nonneggative integer aas follows to reshape
                                                                                            r       its valuue
                                                       distribuution to an expponential one from
                                                                                            f    a Laplaciaan
                                                       one
Compresssion scheme
The preediction Error of pixel (i, jj) in the CFA
                                                A
image, say e(i, j) is givven by                                  When codinng E(i, j) of green plane is
                                                       definedd to be
                                                           Image 2      6.188       5.218         4.847
                                                           Image 3      6.828       4.525         3.847
                                                                                 Table I
When cooding E(i, j) off non green plaane is defined too   If we aalter the values of weighting g factor then w
                                                                                                              we
be                                                         get impproved results in terms of coompression rattio
                                                           and alsoo reduce the biit rates of CFA
                                                                                                A.
                                                           VI. EX
                                                                XPERIMENTA
                                                                         AL RESULTS
               BITRAT
                    TE ANALYSIS
                              S
                                                                      SIP0201-2
CONFERENCE ON “SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM
(SPRTOS)” MARCH 26-27 2011
                                                                    SIP0201-3
CONFERENCE ON “SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM
(SPRTOS)” MARCH 26-27 2011
                                                                    SIP0201-4
CONFERENCE ON “SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM
(SPRTOS)” MARCH 26-27 2011
                                   N 1                                              [( N L 2 ) / 8 ]
h^(k)                 =                  g(i)f(k-i),   ŝ (k)   =     h(0) s(k) +
                                   i o                                             i [( N L 2 ) / 8 ]
k=0,1,…………….N+L-1,                                                                 i 0
                                                                                     SIP0201-5
CONFERENCE ON “SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM
(SPRTOS)” MARCH 26-27 2011
                                                                                  SIP0201-6
CONFERENCE ON “SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM
(SPRTOS)” MARCH 26-27 2011
non-selective and has only one                                                                                                          Eye Diagram for In-Phase Signal
                                                                                                                                4
path. In 3G systems, we require to
                                                                                                                                2
transmit data rate as high as
                                                                                                                    Amplitude
possible. To increase the data                                                                                                  0
                                                                                                                    Amplitude
                                                                                                                                0
                                        20
                                                                                       Matched filterdata1
                                                                                                                                -2
                                                                                       MMSE filter
                                         0                                                                                      -4
                                                                                                                                -0.5                   0                      0.5
                                                                                                                                                     Time
   Normalized magnitude response(dB)
-20
                                                                                                                                                                           SIP0201-7
 CONFERENCE ON “SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM
 (SPRTOS)” MARCH 26-27 2011
               0
                                                                     Table 1. Comparison between
               -2                                                    optimal matched filter and
               -4
               -0.5                   0                        0.5
                                                                     MMSE filter with different no. of
                                    Time
                                                                     taps
                      Eye Diagram for Quadrature Signal
               4
               2
   Amplitude
               -2
                                                                     5. Conclusion
               -4
               -0.5                   0
                                    Time
                                                               0.5   In 3G and beyond 3G system,
                                                                     higher SIR of the received signal is
 Figure   4.   Eye diagram of                                        required so that high order
 received signal using receiver                                      modulation schemes such as 8-
 MMSE filter                                                         PSK, 16-QAM can be applied from
                                                                     which we can achieve high data
                                                                                               SIP0201-8
CONFERENCE ON “SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM
(SPRTOS)” MARCH 26-27 2011
                                                                  SIP0201-9
CONFERENCE ON “SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM
(SPRTOS)” MARCH 26-27 2011
                                                            SIP0201-10
CONFERENCE ON “SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM (SPRTOS)” MARCH 26-27 2011
Abstract- In the present era virtual instrumentation    super imposed in the data which comes from the
technique is considered as a separate discipline of     field with the help of transducers and data
engineering education. It has replaced the              acquisition system. After acquiring data from the
conventional technique of measurement and data          field, the signal processing operation is performed.
acquisition and taken the instrumentation               In signal processing operation, different noises
experiment in to a new level. With easy to use,         which are super imposed in the original process
graphical programming enabled software, supported       signal is removed and the signal is amplified so that
by dedicated, easy to use hardware virtual              the signal keeps its original traits and the data
instrumentation has transformed the notion of           which comes with the signal remains intact. After
engineering education and simulation based              the signal processing part, the data is given to a data
experiments.                                            processing algorithm which processes the data and
        This paper gives a brief idea of the need and   stores the data in a memory unit.
advantages of virtual instrumentation in engineering              With the advantage of technology
education and discusses the need of distant             personal computers with PCI, PXI/compact PCI,
laboratory in engineering education. It also            PCMCIA, USB, IEEE 1394, ISA, VXI, serial and
develops a simple application for signal acquisition,   parallel ports are used for data acquisition, test and
analysis and storage.                                   measurement and automation. Personal computers
Keywords- LabVIEW, virtual instrumentation              are linked with the real world process with the help
                                                        of OPC, DDE protocol and application software is
                 I. INTRODUCTION                        used to form a closed loop interaction between the
    Acquiring multiple data, the data may be analog     real world process, application software and
or discrete in nature from the field or process at      personal computing unit. Many of the networking
high speed using multi channel data acquisition         technologies that have already been available for a
system, processing the data with the help of a data     long time in industrial automation (e.g., standard
processing algorithm and a computing device and         and/or proprietary field and control level buses),
displaying the data for the user is the elementary      besides having undertaken great improvements in
need of any industrial automation system [1,2,3,4].     the last few years, have also been progressively
Modern day process plants, construction sites,          integrated by newly introduced connectivity
agricultural industry [11], petroleum, wireless         solutions (Industrial Ethernet, Wireless LAN, etc.).
sensor network [16], power distribution network         They have greatly contributed to the technological
[17], refinery industry, renewable energy system        renewal of a large number of automation solutions
[10,28] and every other industry where data is of       in already existing plants. Obviously, even the
prime importance use wireless data acquisition, data    software      technologies     involved      in     the
processing and data logging equipments. Acquiring       corresponding data exchange processes have been
data from the field with the help of different sensor   greatly improved; as an example, today it is
is always challenging. Different kinds of noises are    possible to use a common personal computer in
                                                                                                   SIP0202-1
CONFERENCE ON “SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM (SPRTOS)” MARCH 26-27 2011
order to implement even complex remote               converts the analog signal to the equivalent digital
supervisory tasks of simple as well as highly        data. The equivalent digital data is then fed to the
sophisticated industrial plants.                     computer, which acts both as a controller and
   This paper gives an overview of modern day        display element.
industrial automation system comprising of data                Once data has been acquired, there is a need
acquisition system and data loggers. This paper      to store it for current and future reference. Today,
develops a secured data acquisition and analysis     alternative methods of data storage embrace both
module using virtual instrumentation concept. With   digital computer memory and that old traditional
the help of this system the operator can securely    standby-paper. There are two principal areas where
login to the system and perform the desired signal   recorders or data loggers are used. Recorders and
acquisition and analysis operation. The system also  data loggers are used in measurements of process
stores the relevant data for future reference and    variables such as temperature, pressure, flow, pH,
record keeping purpose.                              humidity; and also used for scientific and
                                                     engineering applications such as high-speed testing
        II. INDUSTRIAL AUTOMATION SYSTEM             (e.g., stress/strain), statistical analyses, and other
   Most measurements begin with a transducer, a laboratory or off-line uses where a graphic or
device that converts a measurable physical quantity, digital record of selected variables is desired.
such as temperature, strain, or acceleration, to an Digital computer systems have the ability to
equivalent electrical signal. Transducers are provide useful trend curves on CRT displays that
available for a wide range of measurements, and could be analyzed.
come in a variety of shapes, sizes, and
specifications. Signal conditioning can include         III. VIRTUAL INSTRUMENTATION IN DISTANT LAB
amplification, filtering, differential applications,      To improve the learning methodology in
isolation, simultaneous sample and hold (SS&H), different discipline in engineering virtual
current-to-voltage conversion, voltage-to-frequency instrumentation is used. This technique is easy to
conversion, linearization and more.                  use, easy to understand and cost effective. The main
                                                     feature is that various simulations can be performed
                                                     with the help of programming, which is very
                                                     difficult to perform in hardware. State of art virtual
                                                     instrumentation system has been reported in
                                                     literature which enhances the learning experience of
                                                     the students of different discipline. Some of the
                                                     discipline where state of art virtual instrumentation
                                                     system has been developed are mechanical
                                                     engineering [6], power plant training [8],
                                                     electronics [9], control system [12], chemical
                                                     engineering [14], ultrasonic range measurement
                                                     [20], biomedical [21,22], power system [23,24],
                                                     electrical machine [25], intelligent control [31].
Figure 1: Block diagram of data acquisition and           Laboratories in engineering and applied science
logging                                              have important effects on student learning. Most
        Figure 1 shows the schematic diagram of educational institutions construct their own
data acquisition system. Sensor is used to sense the laboratories individually. Alternatively, some
physical parameters from the real world. The output institutions establish laboratories, which can be
of the sensor is provided to the signal conditioning conducted remotely via internet. Different
element. The main purpose of signal conditioning researchers have proposed the concept of distant
element is to remove the noise of the signal and laboratory [7, 18, 19] using internet [27], and using
amplify the signal. The output of the signal intranet [26]. Researchers have proposed different
conditioning system is provided to ADC. The ADC hardware and software architectures for remote
                                                                                                SIP0202-2
CONFERENCE ON “SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM (SPRTOS)” MARCH 26-27 2011
                                                                                                    SIP0202-3
CONFERENCE ON “SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM (SPRTOS)” MARCH 26-27 2011
Figure 5: Front panel for time domain analysis of      Figure 7: Front panel for analysis of the subset of
the acquired noisy signal                              signal
        Figure 5 shows the time domain                 These results can be analyzed and logged to a file
representation of the noisy signal where as figure 6   for record keeping and further analysis.
show the frequency domain representation of the
signal. Frequency domain representation involves
the Fourier analysis of the signal.                                      V.  CONCLUSIONS
                                                         This paper emphasizes on the data acquisition,
                                                       supervisory control and data logging aspect of an
                                                       industrial process. These areas are of prime
                                                       importance for computer control of an industrial
                                                       process. The signal is acquired from the filed and
                                                       different signal processing and analysis function is
                                                       performed on the acquired signal on the selected
                                                       portion of the signal. The selected portions of the
                                                       signal along with its mathematical values are stored
                                                       in a log file for record keeping and future reference
Figure 6: Front panel for frequency domain analysis    and analysis.
of the acquired signal                                               In future scope of the paper, a wireless
The third module of the system is the analysis         web based data acquisition, data logging and
module. In this analysis module the operator can       supervisory control system can be implemented.
select a certain portion of the signal using the       The main advantage of wireless web based data
pointer available. The portion of the signal is        acquisition system is that any authorized person in
displayed in the subplot and DC value, RMS value,      any where in the world can access the real time
average value and mean value of the portion of the     process data with the help of internet. The main
signal is displayed. Figure 7 shows the front panel    concern area of web based data logging and
for waveform analysis.                                 supervisory control system is the security of data
                                                       and authentication of the user. To solve the above
                                                       security need a firewall can be implemented.
References
                                                                                                 SIP0202-4
CONFERENCE ON “SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM (SPRTOS)” MARCH 26-27 2011
 [2]  Rik Pintelon, Yves Rolain, M. Vanden            [11] Sarang Bhutada, Siddarth Shetty, Rohan
      Bossche and J. Schoukens, “Towards an                Malye, Vivek Sharma, Shilpa Menon,
      Ideal Data Acquisition Channel,” IEEE                Radhika Ramamoorthy, “Implementation of
      Transactions on Instrumentation and                  a Fully Automated Greenhouse using
      Measurement, vol. 39, no. 1, Feb 1990, pp.           SCADA Tool like LabVIEW,” in
      116-120.                                             Proceedings of the 2005 IEEE/ASME
 [3] Deichert, R.L., Burris, D.P., Luckemeyer, J.,         International Conference on Advanced
      “Development of a High Speed Data                    Intelligent Mechatronics, Jul 2005, pp. 741-
      Acquisition System Based on LabVIEW                  746.
      and VXI,” in Proceedings of IEEE                [12] Samuel Daniels, Dave Harding, Mike
      Autotestcon, Sep 1997, pp. 302-307.                  Collura, “Introducing Feedback Control to
 [4] F. Figueroa, S. Griffin, L. Roemer and J.             First Year Engineering Students Using
      Schmalzel, “A Look into the Future of Data           LabVIEW,” in Proceedings of 2005
      Acquisition”, IEEE Instrumentation and               American       Society   for    Engineering
      Measurement Magazine, vol. 2, issue 4,               Education       Annual     Conference     &
      Dec1999, pp. 23–34.                                  Exposition, 2005, pp. 1-12
 [5] A. Ferrero, L. Cristaldi and V. Piuri,           [13] Mihaela Lascu and Dan Lascu, “Feature
      “Programmable        Instruments,     Virtual        Extraction in Digital Mammography Using
      Instruments, and Distributed Measurement             LabVIEW,” 2005 WSEAS International
      Systems: what is Really Useful, Innovative,          Conference on Dynamical Systems and
      and      Technically       Sound”,      IEEE         Control, Nov 2005, pp. 427-432
      Instrumentation       and       Measurement     [14] V M Cristea, A Imre-Lucaci, Z K Nagy and
      Magazine, vol. 2, issue 3, Sep 1999, pp. 20–         S P Agachi, “E-Tools for Education and
      27.                                                  Research in Chemical Engineering,”
 [6] P. Strachan, A. Oldroyd, M. Stickland,                Chemical Bulletin, vol. 50, issue 64, 2005,
      “Introducing Instrumentation and Data                pp. 14-17
      Acquisition to Mechanical Engineers Using       [15] Ziad Salem, Ismail Al Kamal, Alaa Al
      LabVIEW,” International Journal of                   Bashar, “A Novel Design of an Industrial
      Engineering Education, vol. 16, no. 4, Jan           Data Acquisition System,” in Proceedings
      2000, pp. 315-326                                    of International Conference on Information
 [7] K K Tan, T H Lee, F M Leu, “Development               and Communication Techniques, Apr 2006,
      of a Distant Laboratory Using LabVIEW,”              pp. 2589-2594.
      International Journal of Engineering            [16] Aditya N. Das, Frank L. Lewis, Dan O.
      Education, vol. 16, no. 3, 2000, pp. 273-282         Popa, “Data-logging and Supervisory
 [8] Amit Chaudhuri, Amitava Akuli and Abhijit             Control in Wireless Sensor Networks,” in
      Auddy, “Virtual Instrumentation Systems-             Proceedings of 7th ACIS international
      Some Developments in Power Plant                     conference on software engineering,
      Training and Education,” IEEE ACE, Dec               Artificial Intelligence, Networking and
      2002                                                 Parallel Distributed Computing (SNDP’06),
 [9] Melanie L Higa, Dalia M Tawy and Susan                2006, pp. 1-12
      M Lord, “An Introduction to LabVIEW             [17] K. S Swarup and P. Uma Mahesh,
      Exercise for an Electronic Class,” 32nd              “Computerized Data Acquisition for Power
      ASEE/IEEE       Frontiers    in    Education         System Automation,” in Proceedings of
      Conference, Nov 2002, T1D-13-T1D-16                  Power India Conference, Jun 2006, pp. 1-7.
 [10] Recayi Pecen, M.D Salim, Ayhan Zora, “A         [18] Francesco Adamo, Filippo Attivissimo,
      LabVIEW Based Instrumentation System                 Giuseppe Cavone, Nicola Giaquinto,
      for a Wind-Solar Hybrid Power Station,”              “SCADA/HMI Systems in Advanced
      Journal of Industrial Technology, vol. 20,           Educational Courses,” IEEE Transactions
      no. 3, Jun-Aug 2004.                                 on Instrumentation and Measurement, vol.
                                                                                             SIP0202-5
CONFERENCE ON “SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM (SPRTOS)” MARCH 26-27 2011
      56, no. 1, Feb 2007, pp. 4-10.                          Based on LabVIEW DSC Module and
 [19] Vu Van Tan, Dae-Seung Yoo, Myeong-Jae                   Matlab/Simulink,” in Proceedings of The
      Yi, “A Novel Framework for Building                     Ninth     International   Conference      on
      Distributed      Data      Acquisition     and          Electronic Measurement & Instruments,
      Monitoring System,” Journal of Software,                Aug 2009, pp. 1-547-1-552.
      vol.2, no.4, Oct 2007, pp. 70-79                 [29]   Hiram E Ponce, Dejanira Araiza and Pedro
 [20] A Hammad, A Hafez, M T Elewa, “A                        Ponce, “A Neuro-Fuzzy Controller for
      LabVIEW Based Experimental Platform for                 Collaborative Applications in Robotics
      Ultrasonic Range Measurements,” DSP                     Using LabVIEW,” Applied Computational
      Journal, vol. 6, issue 2, Feb 2007, pp. 1-8             Intelligence and Soft Computing, Hindawi
 [21] Shekhar       Sharad,      “A      Biomedical           Publishing Corporation, vol. 2009, 2009, pp.
      Engineering Start Up Kit for LabVIEW,”                  1-9
      Americal Society f Engineering Education,        [30]   Akif Kutlu, Kubilay Tasdelen, “Remote
      2008                                                    Electronic Experiments Using LabVIEW
 [22] Steve Warren and James DeVault, “A Bio                  Over Controller Area Network,” Scientific
      Signal Acquisition and Conditioning Board               Research and Essays, vol. 5(13), Jul 2010,
      as a Cross-Course Senior Design Project,”               pp. 1754-1758
      in Proceedings of 38th ASEE/IEEE Frontiers       [31]   Pedro Ponce Cruz, Aruto Molina Gutierre,
      in Education Conference, 2008, pp. S3C1-                “LabVIEW for Intelligent Control Research
      S3C6                                                    and Education,” 4th IEEE International
 [23] S K Bath, Sanjay Kumra, “Simulation and                 Conference on E-Learning in Industrial
      Measurement        of     Power     Waveform            Electronics, Nov 2010, pp. 47-54
      Distortion Using LabVIEW,” IEEE                  [32]   David McDonald, “Work In Progress
      International Power Modulators and High                 Introductory LabVIEW Real Time Data
      Voltage Conference, May 2008, pp. 427-                  Acquisition Laboratory Activities,” ASEE
      434                                                     North Central Sectional Conference, Mar
 [24] Nikunja K Swain, James A Anderson and                   2010, pp. 1B-1-1B-6
      Raghu B. Korrapati, “Study of Electrical
      Power Systems using LabVIEW VI
      Modules,” in Proceedings of 2008 IAJC-
      IJME International Conference, 2008
 [25] M. Usama Sadar, “Synchronous Generator
      Simulation Using LabVIEW,” World
      Academy of Science, Engineering and
      Technology, 39, 2008, pp. 392-400
 [26] Muhammad Noman Ashraf, Syed Annus
      Bin Khalid, Muhammad Shahrukh Ahmed,
      Ahmed Munir, “Implementation of Intranet-
      SCADA using LabVIEW based Data
      Acquisition      and      Management,”      in
      Proceedings of International Conference on
      Computing, Engineering and Information,
      2009, pp. 244-249.
 [27] Zafer Aydogmus, Omur Aydogmus, “A
      Web-Based Remote Access Laboratory
      Using SCADA,” IEEE Transactions on
      Education, vol. 52, no. 1, Feb 2009.
 [28] Li Nailu, Lv Yuegang, Xi Peiyu, “A Real
      Time Simulation System of Wind Power
                                                                                               SIP0202-6
CONFERENCE ON “SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM (SPRTOS)” MARCH 26-27 2011
                                                                                             SIP0203-1
CONFERENCE ON “SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM (SPRTOS)” MARCH 26-27 2011
frequency, thus they are orthogonal over the          significantly by the ICI generated by the
interval (0,Ts). Then, the N symbols are mapped       subcarrier l +1. In considering a further reduction
to bins of an inverse fast Fourier transform          of ICI, the ICI cancellation demodulation scheme
(IFFT). The IFFT bins correspond to the               is used. In this scheme, signal at the (k +1)
orthogonal sub-carriers in the OFDM symbol.           subcarrier is multiplied by"-1" and then added to
Thus, the OFDM symbol is expressed as                 the one at the k subcarrier. Then, the resulting data
                                                      sequence is used for making symbol decision.
                                                      2). ICI Cancelling Modulation
                                                      The ICI self-cancellation scheme requires that the
                                                      transmitted signals be constrained such that
where the Xm’s are the baseband symbols on each       X(1) = -X(0), X(3) = -X(2),......., X(N -1) = -X(N -
sub-carrier. The analog time-domain signal is         2) using this assignment of transmitted symbols
obtained using digital to analog(D/A) converter.      allows the received signal on subcarriers k and
This discrete signal is demodulated using an N-       k+1          to        be           written        as
point Fast Fourier Transform (FFT) operation at
the receiver. The demodulated symbol is
-40
                                                             -70
                                                                   0           20             40          60           80              100          120
the complex baseband representation of the N          Fig.1 Comparison of |S(l-k)|, |S`(l-k)|, and |S``(l-k)| for N = 128 and
modulated sub carriers. As the broadband channel      ε = 0.4
has been decomposed into N parallel sub               3) ICI Canceling Demodulation
channels.Each sub channel needs an. These blocks      ICI modulation introduces redundancy in the
are called Frequency Domain Equalizers                received signal since each pair of subcarriers
(FEQ).The bits on the transmitter are received at     transmit only one data symbol. This
high data rates at receiver.                          redundancy can be exploited to improve the
                                                      system power performance, while it surely
III. ICI SELF CANCELLATION SCHEME
                                                      decreases the bandwidth efficiency. To take
A. Self-Cancellation
ICI self-cancellation is a scheme that was
                                                      advantage of this redundancy, the received
introduced by Zhao and Sven-Gustav Häggman[1]         signal at the (k + 1)th subcarrier, where k is
in order to combat and suppress ICI in OFDM.          even, is subtracted from the kth subcarrier.
The input data is modulated into group of
subcarriers with coefficients such that the ICI
signals so generated within that group cancel each
other.Thus it is called self-cancellation method.
1) Cancellation Method
The data pair (X ,- X ) is modulated on to two
adjacent subcarriers (l,l +1) . The ICI signals
generated by the subcarrier l will be cancelled out
                                                                                                                                                              SIP0203-2
CONFERENCE ON “SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM (SPRTOS)” MARCH 26-27 2011
                                                       Real(S(l-k))
      |S(l-k)|
0.4 0.1
                  0.2                                                   0
                                                                                                           OFDM system is calculated. As expected, the CIR
                    0
                         0      5          10     15
                                                                      -0.1
                                                                             0      5          10     15   is greatly improved using the ICI selfcancellation
                             Subcarrier index k                                  Subcarrier index k
-0.5
                         0      5          10     15
                             Subcarrier index k
At the receiver
                                                                                                                                                           SIP0203-3
CONFERENCE ON “SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM (SPRTOS)” MARCH 26-27 2011
                                                                                                           SIP0203-4
CONFERENCE ON “SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM (SPRTOS)” MARCH 26-27 2011
                                                                                                         SIP0203-5
CONFERENCE ON “SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM (SPRTOS)” MARCH 26-27 2011
                                                                                 SIP0203-6
CONFERENCE ON “SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM (SPRTOS)” MARCH 26-27 2011
sudhakarsingh86@gmail.com
                                                                                                 SIP0204-1
CONFERENCE ON “SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM (SPRTOS)” MARCH 26-27 2011
consists three stages, (i) Image matching using     public security systems, and virtual reality
templates. (ii) Object detection. (iii) Then        interfaces. Detection and tracking of moving
implementation of PSO technique.                    object like car and people are more concerned,
                                                    especially flexible and robust tracking
        In this paper proposed PSO based            algorithms under dynamic environments, where
algorithm is better which gives better result as    lightening condition may change and occlusions
compare to conventional algorithm.                  may happen. The general process of object
                                                    detection consists of two steps. The first step is
          II. LITERATURE REVIEW                     building models. The second step is according to
 F. Ackermann [1] proposed an image matching        the prior knowledge of the interested objects, the
algorithm based on least squares window             feature model is built up to describe the target
matching. Several common object detection and       object and separate it from other objects and
tracking methods are surveyed in [2], such as       backgrounds. And since most images are noisy,
point detectors , background subtraction [7], In    statistic information are usually adopted to
fact, color is one of the most widely used          quantify features. The second step is to find a
features to represent the object appearance for     particular region in the image; called area of
detection and tracking [5]. Most of object          interest (AOI), which either can best fit the
detection and tracking methods used pre-            object model or has the highest similarity with
specified models for object representation. W.      the model. Many algorithms developed recently
Forstner [3] proposed a feature based               in this area relate to human face detection and
correspondence algorithm for image matching A       recognition due to its potential applications in
W Gruent [4]. The Adaptive Least Squares            security and surveillance. Yet, generic, reliable,
Correlation is a very potent and flexible           and fast human face detection was, until very
technique for all kinds of data matching            recently, impossible to achieve in real-time. The
problems, J. Bala, K.[5]. They address the          concepts involved in object detection, object
problem of crafting visual routines for detection   recognition, and object tracking often overlap.
tasks. C.F.Olson [6] in image matching              Each of these computer vision techniques tries to
applications such as tracking and stereo            achieve the following: Object Tracking:
matching. Kwan-Ho Lin, Kin-Man [8] new              dynamically locates objects by determining their
method for locating object based on valley field    position in each frame. Object Detection and
detection and measurement of fractal                Recognition has made significant progress in the
dimensions. Yaakov Hel-Or [10] a novel              last few years. Many algorithms developed
approach to pattern matching is proposed in         recently in this area relate to human face
which time complexity is reduced by two orders      detection and recognition due to its potential
of magnitude compared to traditional                applications in security and surveillance.
approaches. Kun Peng, Liming Chen [9]                  IV. TEMLATE MATCHING BASED ON
presented a robust eye detection algorithm for                CROSS CORRELATION
gray intensity images.
                                                             Template matching is a popular method
          III. OBJECT DETECTION                     for pattern recognition. It is defined below:
         Object detection attempts to determine     Definition: Let I be an image of dimension m×n
the existence of specific object in an image and,   and T be another image of dimension p×q such
if object is present, then it determines the        that p<m and q<n then template matching is
location, size and shape of that object. In         defined as a search method which finds out the
computer vision, object detection and tracking is   portion in I of size p×q where T has the
an active research area which has attracted         maximum cross correlation coefficient with it.
extensive attentions from multi-disciplinary        The normalized cross correlation coefficient is
fields, and it has wide applications in many        defined as:
fields like service robots, surveillance systems,
                                                                                           SIP0204-2
CONFERENCE ON “SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM (SPRTOS)” MARCH 26-27 2011
                                                                                                                                            SIP0204-3
CONFERENCE ON “SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM (SPRTOS)” MARCH 26-27 2011
                                                                                           SIP0204-4
CONFERENCE ON “SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM (SPRTOS)” MARCH 26-27 2011
                                                                                           SIP0204-5
CONFERENCE ON “SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM (SPRTOS)” MARCH 26-27 2011
                                                                                            SIP0204-6
CONFERENCE ON “SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM (SPRTOS)” MARCH 26-27 2011
                                                                                   SIP0204-7
                                                                                                                          1
Abstract--- In this paper, we carry out a                            Primarily, thresholding are of two types – Bi-level
comparative study of the efficacy of wavelets                        and Multi-level [1].
belonging to Daubechies and Coiflet family in
achieving image segmentation through a fast                          Bi-level thresholding consists of two values – one
statistical algorithm.The fact that wavelets                         below the threshold and another above it. While in
belonging to Daubechies family optimally capture                     Multilevel thresholding, different values are assigned
the polynomial trends and those of Coiflet family                    between different ranges of threshold levels. Various
satisfy    mini-max   condition,   makes     this                    thresholding techniques have been categorized on the
comparison interesting. In the context of the                        basis of histogram shape, clustering, entropy and
prseent algorithm, it is found that the                              object attributes [2].
performance of Coiflet wavelets is better, as
compared to Daubechies wavelet.                                      Wavelet Transform is very significant tool in the
                                                                     field of image processing. The wavelet transform of
Keywords: Peak Signal to Noise Ratio,                                an image comprises four components –
Segmentation, Standard deviation, Thresholding,                      Approximation, Horizontal, Vertical and Diagonal.
Weighted mean.                                                       The process is recursively used in approximation
                                                                     component of wavelet transform for farther
   Madhur Srivastava is final year B.TECH student in the
Department of Electronics and Communication Engineering at
                                                                     decomposition of image until only one coefficient is
Jaypee University of Engineering and Technology, Guna, India;        left in approximation part [3-5].
e-mail: madhur.manas@gmail.com
   Yashwant Yashu is final year B.TECH student in the                As is well known, Daubechies family are useful in
Department of Electronics and Communication Engineering at
Jaypee University of Engineering and Technology, Guna, India;
                                                                     extracting polynomial trends through their low-pass
e-mail: yashwantyashu.jiet@gmail.com                                 coefficients satisfying vanishing moments conditions:
   Satish K. Singh is Assistant Professor in the Department of
Electronics and Communication Engineering at Jaypee University                         
of      Engineering and Technology, Guna, India e-mail:
satish432002@gmail.com
                                                                                   
                                                                                            x n j.k dx  0             (1)
   Prasanta K. Panigrahi is Professor in the Department of Physics
at Indian Institute of Science Education and Research, Kolkata,      This is due to the fact that, the wavelets of
India;      (Phone       No.       +91-9748918201)         e-mail:
pprasanta@iiserkol.ac.in
error in extracting local features is minimized in this basis set. Hence, it is worth comparing behavior of
                                                                          T
                                                                          H
                         R Component                                                R Component
                                                A H                       R
                                                                          E
                                                                          S
                                                                          H
                         G Component                                      O
                                                                                    G Component
                         B Component
                                                V D                       L
                                                                          D
                                                                          I         B Component
                                                                          N
                                                                          G
the corresponding wavelet at low-pass coefficients from the perspective of the proposed algorithm.
Table 1. PSNR and size of reconstructed images using different Daubechies and Coiflet wavelets.
Lenna        3            PSNR(dB)      34.45     35.19      35.52   35.71     34.50    35.23     35.48    35.61     35.69
                          Size(kB)      36.2      36.5       36.3    36.2      36.4     36.2      36.4     36.3      36.3
             5            PSNR(dB)      36.41     37.13      37.41   37.53     36.5     37.19     37.42    37.54     37.62
                          Size(kB)      36.2      36.5       36.3    36.3      36.3     36.3      36.4     36.4      36.4
             7            PSNR(dB)      36.79     37.5       37.74   37.88     36.84    37.53     37.76    37.89     37.97
                          Size(kB)      36.2      36.5       36.3    36.3      36.3     36.3      36.4     36.4      36.4
Baboon       3            PSNR(dB)      25.92     26.31      26.29   26.19     25.94    26.20     26.29    26.33     26.36
                          Size(kB)      74.4      74.2       74.2    74.3      74.4     74.4      74.3     74.3      74.2
             5            PSNR(dB)      27.06     27.56      27.44   27.40     27.13    27.41     27.50    27.55     27.58
                          Size(kB)      74.4      74.1       74.2    74.2      74.3     74.2      74.2     74.2      74.1
                                                                                                                    3
          7           PSNR(dB)     27.18    27.70     27.57   27.53    27.27     27.53     27.62     27.67     27.71
                      Size(kB)     74.3     74.1      74.1    74.1     74.2      74.2      74.1      74.2      74.1
Pepper    3           PSNR(dB)     30.63    33.87     31.61   31.25    31.48     31.63     31.70     31.75     31.77
                      Size(kB)     39.9     39.8      40.3    40.4     40.1      40.3      40.3      40.2      40.2
          5           PSNR(dB)     34.12    35.83     34.61   34.30    33.98     34.41     34.55     34.60     34.62
                      Size(kB)     39.5     39.7      39.6    39.6     39.6      39.6      39.7      39.7      39.7
          7           PSNR(dB)     34.56    36.26     34.92   34.58    34.25     34.73     34.88     34.93     34.95
                      Size(kB)     39.5     39.8      39.5    39.6     39.6      39.6      39.6      39.6      39.7
Fig. 2 Plot of PSNR vs Threshold levels thresholded using different wavelets of Lenna image
3.   S.G. Mallat, A Wavelet Tour of Signal              6.    M. Srivastava, P. Katiyar, Y. Yashu, S.K. Singh,
     Processing. New York: Academic (1999).                  P.K. Panigrahi,” A Fast Statistical Method for
4.   Daubechies, Ten Lectures on Wavelets, Vol. 61           Multilevel Thresholding in Wavelet Domain,”
     of Proc. CBMS-NSF Regional           Conference         unpublished.
     Series in Applied Mathematics, Philadelphia, PA:
     SIAM (1992).
5.   J.S. Walker,” A Primer on Wavelets and Their
     Scientific Applications,” 2nd ed. Chapman &
     Hall/CRC Press, Boca Raton, FL, 2008.
     Analysis of Signals in Fractional Fourier Domain
       Ajmer Singh, Student of Lovely Professional University(LPU)-India, Nikesh Bajaj, Asst. Prof., ECE Dept.(LPU)
                                  ajmersingh155-2006@lpu.in, nikesh.14730@lpu.co.in
               	 
 
  ∞                              !
                                                                   "
                 
                                                                                                          Figure 1: Time- frequency plane for FRFT.
                          ∞
                                                                           # $% & '          In this paper, we use the Digital Computation method of
           %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%# $%  '         the FRFT which is given in [7].
           	%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%# $%  ' ( 
   Fα(u) called as the α- order FRFT of signal f(t). Where α                                             III.   ANALYSIS OF DIFFERENT SIGNALS
= Aл/2, and ‘A’ is a real number and is called the order of                                      We always store our information or data in some type of
the FRFT, which is in interval [-2, 2] and can be extended to                                memory space, that set of information or data is known as
any real number according to A+4k = A. Where k is any                                        signal. There are some basic signals like Rectangular pulse,
integer like [….-3, -2, -1, 0, 1, 2, 3,….], and A can be any                                 Sine wave, Gaussian signals. These signals are basically use
fractional value in interval [-2, 2].
                                                                                             for signal processing. In signal processing there are different
   Some basic properties of FRFT are:
                                                                                             types of transform techniques which are used to analysis the
                                                                                         1
frequency spectrum of the signals. Because the frequency                                                          domains shows the FRFT results for rectangular pulse at α =
spectrum tells more about the signal behavior as compare to                                                       л/10, л/5, 3л/10, and 2л/5.
the time domain representation.                                                                                      Two FRFDs for rectangular pulse at α=0 and α= л/2 are
   But the FRFT tell about the signal representations in time                                                     ordinary time and frequency domains respectively. By taking
domain and frequency domain while using the different                                                             a look on figure 2(a) to 2(e) any one can easily understand
FRFT operator Fα(u), where α = 0; give the time domain                                                            the concept that how an rectangular pulse become a sinc
representation and α = л/2; give the frequency domain                                                             function in frequency domain, without any mathamaticaly
representation. Also 0 < α < л/2 give the intermediates                                                           expression. We can also see how much these domains are
domain which are known as α–domains. These domains are                                                            correlated to each other. But not tell the actual value of
not giving any exact information about the time / frequency                                                       correlation cofficent. To analysis this in figure 3 there are
component. But gives some mixed information about that.                                                           two graphs first one of which tells about the normalized
                                                                                                                  correlation value of α-domain signal to the time domain
   So, in this section we are going to discuss about the
                                                                                                                  signal and second one tells about the normalized correlation
variation of some signals with variation in α-domain.
                                                                                                                  value of α-domain to (α-1)-domain. For the better results we
A. Analysis of Rectangular pulse in FRFD                                                                          take 90 domains at 90 different values of A between 0 < A <
   The rectangular pulse (also known as the rectangle                                                             1.
function, rectangular function, gate function, or unit pulse) is                                                     In figure 3(a) and 3(b) where the α = 0 correlation
defined as:                                                                                                       coefficent has the maxium value is 1. It proof that the FRFT
                                                                                                                  at α = 0 give the actual time domain signal or no rotation.
                         )*  %%%%%%%%%$%++ , -                                                         But when there is a small change of 1° (one degree) in α
                          %%%%%%%%%%%%%% %.%%%%%%%%$%++ / -                                                  value the correlation coefficent give the minimum value
                                                                                                                  quite different from time domain signal but still correlate up
   And FT of a rectangular function is defined as:                                                                to 95%, and so on. In figure 3(b) we can see that when 1° <
                                                                                                                  α < 45° then the α-domain signal is highly corrrelated to the
                         01)*2  345%-6-
                                                                                                                  previous α-domain, an simillar result for 45°< α < 90°.
                                                                                                                                               Correlation of α domain signal to time domain signal
  Now, let us discuss an example for rectangular pulse in                                                                                 1
FRFD and discuss results. In figure 2 we shows the results
   1                                             1.5                                                                                    0.95
                                                                                                                     MAX(Correlation)
 0.8
                                                   1
 0.6                                                                                                                                     0.9
                                                 0.5
 0.4
                                                   0
 0.2
                                                                                                                                        0.85
   0                                           -0.5
   -30      -20   -10      0    10    20    30    -30      -20    -10       0        10        20        30
                                                                                                                                        0.99
-0.5                                             -0.5
                                                                                                                   MAX(Correlation)
                                                    1
  1                                                                                                                                     0.97
                                                   0.5
 0.5
                                                                                                                                        0.96
  0                                                 0
                                                                                                                                        0.95
-0.5
   -30      -20   -10      0    10    20    30
                                                  -0.5
                                                     -30   -20   -10    0       10        20    30                                             0        20          40          60          80        100
                  (e) A=0.8/α=2л/5                     (f) A=1/α=л/2                                                                                           value of α in degrees
         Figure 2: FRFT of rectangular pulse for different values of angle α/A.                                                                                         (b)
                  solid line: real part. Dashed line: imaginary part.                                                                              Figure 3: Correlation results for rectangular pulse.
                                                                                                              2
electrical engineering and many other fields. It’s most basic                                               is not correlated to TD signal, for these domains the
form as x(t) known as a function of time (t) is defined as:                                                 correlation coefficient values tends to zero.
                                7  8 345 ( 9
                                                                                                               In figure 5(b) the correlation results for α-domain to (α-1)
                                                                                                            domain are shows. When 1°< α < 90°, these domain are
                                                                                                            equally correlated to each other. But very less correlated to
   Where M is the amplitude of the sine wave, f is the                                                      TD signal
                                                                                                                                               Correlation of α domain signal to time domain signal
frequency component, t is time and θ is the phase, specifies                                                                         1.4
where in its cycle the oscillation begins at t = 0.
                                                                                                                                     1.2
   Now, let discuss the results for Sine wave in FRFD. In
figure 4 we shows the results for six α’s values, out of which                                                                        1
                                                                                                                  MAX(Correlation)
figure 4(a) for α = 0; which shows the Sine wave in time                                                                             0.8
domain and figure 4(f) for α = л/2; which shows the
spectrum of Sine wave that is impulse function, rest of the                                                                          0.6
four domains shows the FRFT results for Sine wave at α =                                                                             0.4
л/10, л/5, 3л/10, and 2л/5.
                                                                                                                                     0.2
     As similar to the results discuss in section 3(A), now in
figure 4 shows the six α-domains for Sine wave out of which                                                                           0
                                                                                                                                           0           20         40          60        80        100
two domains are identical to the ordinary time domain and                                                                                                     value of α in degrees
frequency domain, which are in figure 4(a) and 4(b)                                                                                                                   (a)
respectively. Rest four figures 4(b), 4(c), 4(d) and 4(e)                                                                                      Correlation of α domain signal to (α -1) domain signal
                                                                                                                                     1.02
shows the results for FRFT of Sine wave at different value
of α. The correlation results for Sine wave in the α-domain                                                                          1.01
with the TD signal, and with the (α-1)-domain signal are
                                                                                                                  MAX(Correlation)
                                                                                                                                           1
shown in figure 5(a) and 5(b) respectively.
                                                                                                                                     0.99
  1                                                     1.5
                                                          1                                                                          0.98
 0.5
                                                        0.5
                                                                                                                                     0.97
  0                                                       0
                                                                                                                                     0.96
                                                        -0.5                                                                                   0         20        40          60        80           100
-0.5                                                                                                                                                           value of α in degrees
                                                         -1
                                                                                                                                                              (b)
  -1                                                    -1.5                                                                         Figure 5: Correlation results for Sine wave in α-domain.
       0      20    40      60       80        100             0     20     40    60     80       100
                                                                                                                                                      7   
-0.5                                                   -0.5                                                                                                            -
-1 -1
-1.5                                                   -1.5                                                    As we discuss two type of signals in section 3(a) and 3(b)
       0      20    40      60       80        100            0      20    40     60     80       100
                                                                                                            which are Rectangular pulse and Sine wave respectively.
                    (c) A=0.4/α=л/5                                  (d) FRFT
                                                                         A=0.6/α=3л/10
                                                                              of Sine Wave A= 1             The third point of interest is Gaussian signal. Because
  2                                                      5
                                                                                                            Gaussian functions are widely used in statistics where they
 1.5
                                                                                                            describe the normal distributions, in signal processing where
  1
                                                                                                            they serve to define Gaussian filters, and many more
 0.5
                                                                                                            application they have.
  0                                                      0                                                     At last, by taking an example of Gaussian signal to
-0.5                                                                                                        compute the FRFT for analysis it in FRFDs. In figure 6 we
  -1                                                                                                        show six different FRFDs for Gaussian signal. Out of which
-1.5                                                                                                        two domains are again identical to TD and FD. And rest four
  -2                                                     -5
                                                                                                            domains are intermediate domains of TD and FD.
       0       20    40         60        80     100          0      20     40    60     80       100          For Gaussian signals the Fourier transform is again a
                   (e) A=0.8/α=2л/5                    (f) A=1/α=л/2                                        Gaussian signals. Now if we have a look from 6(a) to 6(f)
           Figure 4: FRFT of Sine wave for different values of angle α/A. solid                             then the variation from TD to FD is easily understandable.
                      line: real part. Dashed line: imaginary part.
                                                                                                            Our point of interest is that how FRFD signals are correlated
  In figure 5(a) it is clear that when 1° < α <10° then the α-                                              to each other. For this in figure 7 we have two plots which
domain signal for sine wave is somehow correlated to the                                                    show the correlation of α-domain signal with TD signal and
                                                                                                            with (α-1)-domain signal in figure 7(a) and 7(b) respectively.
TD signal. But when 10° < α < 90° then the α-domain signal
                                                                                                        3
                                                                                                                                          By analyzing these three signals in FRFDs. It is clear that
  1                                                                               1.5
                                                                                                                                       the α-domain signal are highly correlated to the (α-1)-
0.8                                                                                 1                                                  domain. That can understand from figure 3(b), 5(b) and 7(b).
                                                                                                                                       These figures show that for the interval 1° < α < 90° these
0.6                                                                               0.5
                                                                                                                                       signals are similar to each other. And by taking a look to
0.4                                                                                 0                                                  figure 2(b) to 2(e), 4(b) to 4(e) and 6(b) to 6(e), we can
                                                                                                                                       realized that the FRFDs signal are just scaled version of the
0.2                                                                               -0.5
                                                                                                                                       previous FRFD.
   0                                                                               -1
  -100              -50                                     0         50    100    -100    -50        0         50          100
  0
                                                                                    1                                                                                REFERENCES
-0.5
                                                                                    0                                                   [1]   V. Namias, “The fractional order Fourier transform and its
 -1                                                                                                                                           application to quantum mechanics,” J. Inst. Math. Applicat., vol. 25,
-1.5                                                                               -1                                                         pp. 241–265, 1980.
  -100              -50                                     0         50    100    -100     -50        0         50          100
                                                                                                                                        [2]    A. C. McBride and F. H. Kerr, “On Namias’ fractional Fourier
                 (e) A=0.8/α=2л/5                    (f) A=1/α=л/2                                                                            transforms,” IMA J. Appl. Math., vol. 39, pp. 159–175, 1987.
         Figure 6: FRFT of Sine wave for different values of angle α/A. solid                                                           [3]   H. M. Ozaktas, B. Barshan, D. Mendlovic, and L. Onural,
                    line: real part. Dashed line: imaginary part.                                                                             “Convolution, filtering, and multiplexing in fractional Fourier
                                                                                                                                              domains and their relationship to chirp and wavelet transforms,” J.
                                                            Correlation of α domain signal to time domain signal                              Opt. Soc. Amer. A, vol. 11, pp. 547–559, Feb. 1994.
                                                  1.1                                                                                   [4]   R. G. Dorsch, A. W. Lohmann, Y. Bitran, and D. Mendlovic, “Chirp
                                                                                                                                              filtering in the fractional Fourier domain,” Appl. Opt., vol. 33, pp.
                                                   1
                                                                                                                                              7599–7602, 1994.
                                                  0.9                                                                                   [5]   A. W. Lohmann and B. H. Soffer, “Relationships between the
                                                                                                                                              Radon–Wigner and fractional Fourier transforms,” J. Opt. Soc. Amer.
                              MAX(Correlation)
                                                        0             20        40          60             80         100
                                                                                                                                                          Ajmer Singh (M’22) was born in Punjab, India. He is
                                                                            value of α in degrees
                                                                                                                                                          pursuing the master’s degree in signal processing from
                                                                                  (a)                                                                     Lovely Professional University, Punjab, India, in 2011.
                                                            Correlation of α domain signal to (α -1) domain signal                                        Currently, he is doing dissertation under the supervision
                                      1.0005
                                                                                                                                                          of Mr. Nikesh Bajaj, the assistant professor of electronic
                                                    1
                                                                                                                                                          department. Research interests include different aspects
                                                                                                                                                          of FRFD filter designing.
                                      0.9995
           MAX(Correlation)
                                                 0.999
                                                                                                                                                        Nikesh Bajaj received his bachelor degree in Electronics
                                      0.9985                                                                                                            & Telecommunication from Institute of Electronics And
                                                                                                                                                        Telecommunication Engineers. And he received his
                                                 0.998                                                                                                  master degree in Communication & Information System
                                                                                                                                                        from Aligarh Muslim University, India. Now, he is
                                      0.9975
                                                                                                                                                        working in LPU as Asst. Professor, Department of ECE.
                                                                                                                                                        Research interests include Cryptography, Cryptanalysis,
                                                 0.997
                                                         0             20       40          60         80            100               and Signal & Image Processing.
                                                                            value of α in degrees
                                                                                  (b)
          Figure 7: Correlation results for Gaussian signal in α-domain.
                                                                                                                                   4
        Parzen-Cos6 (πt) combinational window family based QMF bank
                                  Narendra Singh (*) and Rajiv Saxena,
                Jaypee University of Engineering and Technology, Raghogarh, Guna (MP)
(*) Corresponding Author: narendra_biet@rediffmail.com ; narendra.singh@jiet.ac.in
                                                        1
                                                               can be significantly reduced by appropriate choice
                                                               of smoothing function w (n). Hence, a filter p (n) of
                                                               order N is of the form [15-17]-
p n hid n w n (3)
hid n
          sin(      c (n 0.5 N ))
                                  ,   0   n   N-1   (2)
                   (n 0.5 N )
                                                           2
                                           Table 1: Window Functions with Filter Design Equations
Sr.   Name of window                                              Expression for
No                        Expression for Window         Window variable                   Window shape parameter
.                         function
1.    Blackman window     w n      0.42       0.5 cos 2 n M                0.08 cos 4 n M
for M n M
                                                                 n
                                                                                                  a=8.15414,b= -                                     a = 1.82892, b= - 0.027548,
                                   1 24                1 2             ,         n   N 4
                                              N                  N                                0.236709,c=0.00218617                               c = .00157699
                          l ( n)                       3
                                                  n
                                   2 1 2                   ,          N 4        n   N 2
                                                  N                                               for 51.25<ATT≤68.69                                for 43.6 < ATT ≤ 49.44
                          d (n)     cos 6 ( n / N ), n                     N 2                    a=21.269,b= -0.605789,c=0.00434808                 a = 1.67702, b = 0.0450505,
                                                                                                                                                     c = 0.00000
                                                                                                                                                     for 57.48<ATT≤38.69
                                                                                                                                                     a = -8.60006, b= 0.477004,
                                                                                                                                                      c = -0.00355655
                                                                                                                     3
4. OPTIMIZATION ALGORITHM                                                    designed using windowing technique. With each
                                                                             iteration, fc of p(n) and reconstruction error (error)
        The amplitude distortion in reconstructed                            is computed, which is also the objective function. If
signal can be minimized by optimization                                      the error increases in comparison to previous
techniques. The gradient based iterative                                     iteration (prev-error), step size (step) is halved and
optimization algorithm is described in this section.                         the search direction (dir) is reversed. This step size
                                                                             and direction is used to re-compute fc for new
a. Objective Function                                                        prototype filter. The optimization process is halted
                                                                             when the error of the current iteration is within the
To get the high-quality reconstructed output y(n),                           specified tolerance (depicted as t-error), which is
the frequency response of low pass prototype filter,                         initialized before the optimization process begins or
H(ej2πf), must satisfy the following [13]-                                   when prev-error equals error [26].
                  j 2 f Fs 4 2
                                              Fs / 4 (5)
      2 f 2
 |H e     |  |H e             | 1,    for 0 f
                                                                         4
                   Table 2: Performance of QMF filter at 50 dB stop-band attenuation
5. CONCLUSION                                                 References
                                                                 1. Johnston, J. D.: A filter family designed for
A simple algorithm for designing the low pass                       use in quadrature mirror filter banks. In:
prototype filters for QMF banks has been used to                    Proceedings      of    IEEE      International
optimize the reconstruction error by varying the                    Conference Acoustics, Speech and Signal
filter cut-off frequency. Prototype filters designed                Processing, Denver, 291–294(1980)
using high SLFOR combinational window, Kaiser                    2. Bellanger, M.G., Daguet, J.L.: TDM-FDM
window and Blackman window functions have been                      transmultiplexer: Digital Poly phase and
compared. Combinational window functions provide                    FFT. IEEE Trans. Commun. 22(9) ,1199-
better far-end rejection of the stop-band energy. This              1204 (1974)
feature helps to reduce the aliasing energy leak into a          3. Vetterly,M.: Prefect transmultiplexers. In:
sub-band from that of the signal in the other sub-                  Proceedings      of    IEEE      International
band.
                                                          5
    Conference on Acoustics, Speech, and Signal             image filter banks. IEEE Trans. Signal
    Processing, vol. 4, 2567- 2570 (1986).                  Process. , 46 (6), 1275-1281(1998)
4. Gu, G., Badran, E.F.: Optimal design for             16. Goh, C. K., Lim, Y. C.: An efficient
    channel equalization via the filter bank                algorithm to design weighted minimax PR
    approach. IEEE Trans. Signal Process.52                 QMF        banks.     IEEE     Trans.    Signal
    (2),536-544 (2004)                                      Process.47(12), 3303-3314)(1999)
5. Esteban, D., Galand, C.: Application of              17. Chen, C.K., Lee J.H.: Design of quadrature
    quadrature mirror filter to split band voice            mirror filters with linear phase in frequency
    coding schemes. In: Proceedings of IEEE                 domain. IEEE Trans Circuits System, 39 (9),
    International Conference on Acoustics,                  593-605(1992)
    Speech, and Signal Processing (ASSP), 191-          18. Lin, Yuan-Pei, Vaidyanathan, P. P.: A Kaiser
    195(1977)                                               window approach for the design of prototype
6. Crochiere, R.E.: Sub–band coding. Bell Syst.             filters of cosine modulated filterbanks. IEEE
    Tech. J., 9, 1633-1654(1981)                            Signal Processing Lett., 5, 132–134 (1998).
7. Vrtterli, M.: Multidimensional sub-band              19. Saxena, R.: Synthesis and characterization of
    coding: Some theory and algorithm, Signal               new window families with their applications,
    Process 6, 97- 112(1984)                                Ph. D. Thesis, Electronics and Computer
8. Woods,J.W.,Neil,S.D.O.:Sub-band coding of                Engineering Department, University of
    images. IEEE Trans Acoustic. Speech and                 Roorkee, Roorkee, India (1997).
    Signal Process. (ASSP)-34 (10), 1278-               20. Sharma, S. N., Saxena, R., Jain, A.: FIR
    1288(1986)                                              digital filter design with Parzen and cos6 (πt)
9. Liu,Q.G.,Champagne,B.,Ho,D.K.C.:Simple                   combinational window family, Proc. Int.
    design of over sampled uniform DFT filter               Conf. Signal Processing, Beijing, China,
    banks with application to sub-band acoustic             IEEE Press, 92–95 (2002).
    echo cancellation. Signal Process, 80(5),831-       21. Sharma, S. N., Saxena, R., Saxena, S. C.:
    847(2000)                                               Design of FIR filters using variable window
10. Crochiere,R.E., Rabiner , L. R.: Multirate              families – A comparative study, J. Indian
    digital     signal   processing.    Prentice–           Inst. Sci., 84, 155–161 (2004).
    Hall(1983)                                          22. DeFatta, D. J., Lucas J. G., Hodgkiss, W. S.
11. Creusere, C.D., Mitra, S.K.: A simple                   Digital signal processing: A system design
    method for designing highquality prototype              approach, Wiley (1988).
    filters for M band pseudo QMF banks. IEEE           23. Gautam, J. K., Kumar, A., Saxena, S.C.:
    Trans. Signal Process. 43(4), 1005–1007                 WINDOWS: A tool in signal processing.
    (1995)                                                  IETE Tech. Rev., vol. 12(3), 217-226
12. Mitra, S.K.: Digital signal processing: A               (1995).
    computer       based     Approach,     TMH,         24. Paulo, S. R. Diniz, Eduardo A. B. da Silva
    ch.7&10(2001)                                           and Sergio L. Netto.: Digital signal
13. Vaidyanathan, P.P.: Multirate systems and               processing: System, analysis and design,
    filter banks. Prentice- Hall, Englewood                 Cambridge University Press (2003).
    Cliffs, NJ (1993)                                   25. Hooke, R., Jeaves, T.: Direct search solution
14. Jain, V.K., Crochiere,R.E.: Quadrature                  of numerical and statistical problems, J.
    mirror filter design in time domain. IEEE               Assoc. Comp. Machines, 8, 212–229 (1961).
    Trans, Acoustic,. Speechand Signal Process.         26. Jain, A., Saxena, R., Saxena, S.C.: An
    ASSP- 329 (4), 353-361(1984)                            improved and simplified design of cosine
15. H. Xu, W.S. Lu, A. Antoniou, “An improved               modulated pseudo-QMF filter banks. Digit.
    method for design of FIR quadrature mirror              Signal Process. 16(3), 225–232 (2006).
                                                    6
                                                                            Annexure 1
or
                               |prev-error| =|error|
Stop
                             No
|prev-error| |error|
Is No
|error| >|m-error|
Yes
step =step/2
dir=-dir
                                                 7
  Performance Analysis of Sub Carrier Spacing Offset in
   Orthogonal Frequency Division Multiplexing System
          Shivaji Sinha, Member IETE, Rachna Bhati, Dinesh Chandra, Member IEEE & IETE
          email:shivaji2006@gmail.com, dinesshc@yahoo.co.in, rachna.bhati1988@gmail.com
               Department of Electronics & Communication Engineering, JSSATE Noida
   Abstract — A very important aspect in OFDM is time           in oscillators at the modulator and the demodulator.
and frequency synchronization. In particular, frequency         These frequency errors cause a frequency offset
synchronization is the basis of the orthogonality between       comparable to the frequency spacing, thus lowering the
frequencies. Loss in frequency synchronization is caused        overall SNR [3].
due to Doppler shift because of           large number of
frequencies closely spaced next to each other in OFDM                 II. OFDM SYSTEM IMPLEMENTATION
frame. So the intersymbol interference (ISI) and Inter
Carrier Interference(ICI) are also produced. This paper
                                                                In OFDM, a frequency-selective channel is subdivided
presents the effects of frequency offset error in OFDM
system introduced by the fading sensitive channel.
                                                                into narrower flat fading channels. Although the
Performance of the OFDM system is evaluated using r.m.s.        frequency responses of the channels overlap with each
value of error across all subcarriers for different values of   other as shown in Figure 1, the impulse responses are
the subcarrier spacing, SNR degradation and received            orthogonal at the carriers, because the nulls of the each
signal constellation in Matlab environment. The                 impulse response coincides with the maximum values of
performance is compared under various conditions of             another impulse response and thus the channels can be
noise variance and frequency Offset.                            separated [3].
I. INTRODUCTION
                                                            1
prevent ISI. At the receiver, the cyclic prefix is re-           The areas, colored with yellow, show the ICI. When the
moved, because it contains no information symbols.               centers of adjacent subcarriers are shifted because of the
After the serial-to-parallel (S/P) conversion, the               frequency offset, the adjacent subcarriers nulls are also
received data in the time domain (ym) are converted to           shifted from the center of the other subcarrier. The
the frequency domain (Ym) using the fast Fourier                 received signal contains samples from this shifted
transform (FFT) algorithm.                                       subcarrier, leading to ICI [6]. The destructive effects of
                                                                 the frequency offset can be corrected by estimating the
                                                                 frequency offset itself and applying proper correction.
                                                                 This calls for the development of a frequency
                                                                 synchronization algorithm. Three types of algorithms
                                                                 are used for frequency synchronization: algorithms that
                                                                 use pilot tones for estimation (data-aided), algorithms
                                                                 that process the data at the receiver (blind), and
                                                                 algorithms that use the cyclic prefix for estimation
                                                                 [4 ][5].
                                                                           Among these algorithms, blind techniques are
               Fig 2. OFDM System                                attractive because they do not waste bandwidth to
                                                                 transmit pilot tones . However, they use less information
   III. FREQUENCY OFFSET & FREQUNCY                              at the expense of added complexity and degraded
         SYNCHRONIZATION ALGORITHM                               performance [6]. The degradation of the SNR, Dfreq,
                                                                 caused by the frequency offset, is approximated as
The first source of frequency Offset is relative motion
between transmitter & receiver (Doppler or Frequency
drift) and is given by                                                                                            ..….(3)
                                                                 Where       is the frequency offset, T is the symbol
                                                ……..(2)
                                                                 duration in seconds , Eb is the energy per bit of the
Where fc is carrier frequency & v is relative velocity
                                                                 OFDM signal and N0 is the one-sided noise power
between Transmitter & Reciver. While second source is
                                                                 spectrum density (PSD) [6][7] .
frequency errors in oscillator.. Single-carrier systems
are more sensitive to timing offset errors while OFDM
                                                                          IV. SIMULATION PARAMETERS
generally exhibits good performance in the presence of
                                                                 First we have analyzed the impact of frequency offset
timing errors. In practice, the frequency, which is the
                                                                 resulting in Inter Carrier Interference (ICI) while
time derivative of the phase, is never perfectly constant,
                                                                 receiving an OFDM modulated symbol. The analysis is
thereby causing ICI in OFDM receivers. One of the
                                                                 accompanied by Matlab simulation.
destructive effects of frequency offset is loss of
orthogonality. The loss of orthogonality causes the ICI                                  TABLE 1
as shown in Figure 3.
                                                                           R.M.S. ERROR RELATED PARAMETERS
                                                                              PARAMETERS                 VALUES
                                                                                  FFT Size                   64
                                                                           No. of Data Subcarriers           52
                                                                           No. of bits per OFDM
                                                                                                             52
                                                                                  symbol
                                                                              No. of symbols                  1
                                                                             Modulation Scheme             BPSK
                                                             2
We have generated an OFDM symbol with all                                                                                                Error magnitude with frequency offset
                                                                                                                10
subcarriers BPSK modulated then added frequency                                                                                                                     theory at Eb/No=20 db
                                                                                                                                                                    simulation at Eb/No=20 db
offset with Gaussian noise of unit variance & zero mean                                                             0
                                                                                                   Error, dB
                                                                                                               -20
This is repeated for different values of frequency offset.
The parameters are listed in Table 1.                                                                          -30
           IFFT/FFT period
                                        3.2(1/   ) s                                                           -40
          Preamble duration
                                            16 s                                                               -50
                                                                                                                         -0.6      -0.4          -0.2         0         0.2            0.4        0.6
    Signal duration BPSK_OFDM                                                                                                                freqency offset/subcarrier spacing
               symbol                  4(TGI+TFFT) s
                                                                                      Fig 5. Energy Magnitude with frequency Offset at Eb/No=30db
     Guard interval (GI) duration
                                       0.8(TFFT /4) s
                                                                 Figure 6 shows the calculated degradation of the SNR
         Modulation Scheme                 QPSK
                                                                                                               -7
                                                                                                     10
                                                                                                                                                                                                  17 db
                                                                                                               -8
                                                                                                     10                                                                                           15 db
              V. RESULTS ANALYSIS                                                                                                                                                                 10 db
                                                                                                               -9                                                                                 5 db
                                                                                                     10
                                                                   SNR degradation (Dfreq) in dB
                                                             3
due to the frequency offset. For smaller SNR values, the                   When compared to Figure 8 in figure 9, it can be seen
degradation is less than for bigger SNR values as shown                    that the received signal with 0.5% frequency offset
in Figure 6. In order to study the SNR degradation in                      value for the same 0.002 noise variance is more
OFDM systems we have examined the received signal                          distorted than the received signal with 0.3% frequency
with no frequency offset. In this case, the data were sent                 offset.
by two of the carriers. We have generated 512 random
                                                                           The simulation results reveal that the distortion in the
QPSK signals as data. We send data using only two of
                                                                           received signal is increased. which is set to zero as
the subcarriers, and the other subcarriers have no data.
                                                                           shown in figure 9 & figure 10. The effects of the
Figure 7 shows that for no frequency offset & noise
                                                                           frequency offset can also be observed when, data are
variance (ideal condition), there is no ICI and no
                                                                           sent with every subcarrier, except one.
interference between the data and the other zeros
                                                                                             1.5
             1.5
                                                                                               1
               1
                                                                                             0.5
             0.5
                                                                             imaginel
  imaginel
                                                                                               0
               0
                                                                                             -0.5
             -0.5
                                                                                              -1
              -1
                                                                                             -1.5
             -1.5
                                                                                                     -1.5      -1          -0.5          0       0.5         1      1.5
                    -1.5   -1   -0.5      0     0.5    1       1.5                                                                     real
                                        real
                                                                             Fig 9. Received signal constellation with 0.5% frequency offset
0.8
0.6
                                                                                             0.4
             1.5
                                                                                             0.2
                                                                             Imaginel axis
                1
                                                                                               0
0.5 -0.2
                                                                                             -0.4
  imaginel
                0
                                                                                             -0.6
-0.5 -0.8
                                                                                              -1
               -1                                                                               -1    -0.8   -0.6   -0.4      -0.2       0     0.2     0.4   0.6   0.8    1
                                                                                                                                     Real axis
             -1.5
                                                                                                Fig 10. Received signal at the zero subcarrier with no
                    -1.5   -1    -0.5      0     0.5       1     1.5                                               frequency offset
                                         real
                                                                                               [5] Jan-Jaap van de Beek, Magnus Sandelland Per Ola B.rjesson, “ML
               0.1
                                                                                               Estimation of Time and Frequency Offset in OFDM Systems,” In
                 0
                                                                                               IEEE Transactions on Signal Processing, vol. 45, no. 7, pp. 1800-
   Imaginary
 Fig 11. Received signal at the zero subcarrier with 0.4% and 0.6%
                                                                                                                 IX. AUTHOR’S BIOGRAPHY
                          frequency off-set
                                                                                               1.Shivaji Sinha is Asst. Prof. in J.S.S. Academy of Technical
                                  VI. CONCLUSION                                               Education, Noida since Oct. 2003. He is member of IETE. He has
                                                                                               done his B. Tech from G.B. Pant Engg. College Pauri, Garhwal in
Simulation results demonstrated the distortive effects of                                      Electronics & Communication Engineering & M. Tech in VLSI
frequency offset on OFDM signals; frequency offset                                             design from U.P. Technical University.
affects symbol groups equally. Additionally, it was seen
that an increase in frequency offset resulted in a
                                                                                               2. Rachan Bhati is a student of B. Tech Final Year in JSS Aademy of
corresponding increase in these distortive effects and
                                                                                               Technical Education.
caused degradation in the SNR of individual OFDM
symbols.
                                                                                               3. Dinesh Chandra is Head & Professor in deptt. of Electronics &
VIII. REFERENCES
[1] Md. Amir Ali Hasan, Faiza Nabita, Imtiaz Ahmed Amith
Khandakar “Analytical Evaluation of Timing Offset error in OFDM
                                                                                           5
CONFERENCE ON “SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM (SPRTOS)” MARCH 26-27
2011
     (such as at the QRS peak) and discards every alternate     reconstruction of ECG data; and a measure of error loss,
     sample [6]. The data reduction algorithms are              often measured as the percent mean-square difference
     empirically designed to achieve good reduction             (PRD) [5]. The PRD is calculated as follows:
     without causing significant distortion error.
                                                                                                                 SIP0301-2
CONFERENCE ON “SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM (SPRTOS)” MARCH 26-27
2011
                                                                                                          SIP0301-4
CONFERENCE ON “SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM (SPRTOS)” MARCH 26-27
2011
                                                                                                          SIP0301-5
        CONFERENCE ON “SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM (SPRTOS)” MARCH 26-27 2011
Abstract:- Data security to ensure authorized access of            bit-wise exclusive-OR (XOR) [2]. BIT is a field that has
information and fast delivery to a variety of end users with       caught the interest of many researchers. The ability of using
guaranteed Quality of Services (QoS) are important topics of       BIT approaches in various fields has been proven. Clark [6]
current relevance. In data security, cryptology is introduced to   hopes for those who do research in BIT especially related to
guarantee the safety of data, whereby it is divided into           ants, swarm and Artificial Neural Network, to examine the
cryptography and cryptanalysis. Cryptography is a technique        application of those techniques in cryptology. He also states
to conceal information by means of encryption and decryption       that a good place to start is on classical cipher cryptanalysis or
while cryptanalysis is used to break the encrypted information     Boolean function design. This paper is organized as follows:
using some methods. Biological Inspired techniques (BIT) are       first, we review simple substitution cipher, columnar
a method that takes ideas from biology to be used in               transposition cipher and permutation cipher which are types of
cryptography. BIT is a field that has been widely used in many     classical cipher, in Section 2. In Section 3, some biological
computer applications such as pattern recognition, computer        inspired techniques employed are explained and the use of
and network security and optimization. Some examples of BIT        these approaches in cryptography is reviewed in Section 4.
approaches are genetic algorithm (GA), ant colony and              Finally, conclusions are given in Section 5.
artificial neural network (ANN). GA and ant colony have been       2 Classical Ciphers
successfully applied in cryptanalysis of classical ciphers.        Classical ciphers are often divided into substitution ciphers
Therefore, this paper will review these techniques and explore     and transposition ciphers. There are many types of these
the potential of using BIT in cryptanalysis.                       ciphers. In this paper, we focus on simple substitution cipher
Keywords: Cryptanalysis, Genetic Algorithm, Artificial             and two types of transposition cipher namely columnar
neural network, Ant Colony.                                        transposition cipher and permutation cipher. The ciphers are
1 Introduction                                                     vulnerable to cipher text-only attacks by using frequency
There are many cryptographic algorithms (cipher) that have         analysis.
been developed for information security purposes such as the       Basically, a simple substitution cipher is a technique of
Data Encryption Standard (DES), Advanced Encryption                replacing each character with another character. The mapping
Standard (AES) and Rivest-Shamir-Adleman (RSA). These              function of replacing the characters is represented by the key
are some examples of a modern cipher. The foundation of the        used. For this purpose of study, white spaces are ignored while
algorithms, especially block ciphers, is mainly based on the       other special characters like comma and apostrophe are
concepts of a classical cipher such as substitution and            removed. Example 1 shows a simple substitution cipher:
transposition. For instance, DES uses only three simple            Alphabet: A B C D E F G H I J K L M N O P Q R S T U V
operator namely substitution, permutation (transposition) and      WXYZ
                                                                                                                         SIP0303-1
         CONFERENCE ON “SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM (SPRTOS)” MARCH 26-27 2011
Key: M N F Q Y A J G R Z K B H S L C I V U D O W T E P               can also be written in group of five characters. Using the same
X                                                                    plaintext and key of the previous example, the cipher text of
Example 1                                                            the permutation cipher is produced as depicted in example 3 as
Plain     Text:     -       KAMLA   NEHRU     INSTITUTE        OF    follows:
TECHNOLOGY                                                           Key: -     plain text order: - 1 2 3 4 5 6 7
Cipher text: - KMHBM SYGVO RSUDRDODY LA                                         Cipher text order: - 4 7 2 6 1 3 5
DYFGSLBLJP                                                           Order: - 1234567 1234567 1234567 1234567 1234567
The idea of a transposition cipher is to alter the position of a     Example 3
character to another position. In columnar transposition cipher,     Plain text: KAMLANE HRUINST ITUTEOF TECHNOL
the plaintext is written into a table of fixed number of             GYPQRSX
columns. The number of columns depends on the length of the          Cipher Text: - LEANK MAITR SHUNT FTOIU EHLEO
key. The key represents the order of columns that will become        TCNQX YSGPR (P, O, R, S, X, are dummy variable)
the cipher text. We only consider 26 characters in the               In both simple substitution and transposition cipher, there are
alphabet, so all special characters are removed. For example,        same disadvantage which regards to the frequency of
the     plaintext       “KAMLA      NEHRU    INSTITUTE         OF    characters. Based on the Example 1, the character K is
TECHNOLOGY” with the key “4726135” is transformed to                 replaced with K, A with M and so forth. Therefore, the
cipher text by inserting it into a table as shown in the example     frequency of each character in the plaintext will be exactly the
in Example 2.                                                        same as the frequency of its corresponding cipher text
                                                                     character. Hence, the encryption algorithm preserves the
4          7            2       6      1         3         5         frequency of characters of the plaintext in the cipher text
K          A            M       L      A         N         E         because it merely replaces one character with another. Still,
H          R            U       I      N         S         T         the frequency of characters depends on the length of the text
I          T            U       T      E         O         F         and probably, some characters are not even used in plaintext.
T          E            C       H      N         O         L         As shown in the above example, the character P, Q and R are
Four dummy alphabets (here, P, Q, R and S) are added for simple substitution cipher. Analyses were done by using
complete the rectangle and the cipher text can be written in frequency of single character (unigram), double character
group of five characters [4]. So the cipher text of this cipher is (bigram), triple character (trigram) and so on (n-grams). The
“KHITO ARTEG MUUCY LITHP ANENQ NSOOR technique used to compare candidate keys to the simple
The permutation cipher operates by rearranging each character the cipher text with the language of the text. In the effort of
in a plaintext block by block based on a key. The size of the attacking the transposition cipher, the multiple anagramming
block is the same as the length of the key and the cipher text attack can be used. The cipher text is written into a table
                                                                                                                         SIP0303-2
          CONFERENCE ON “SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM (SPRTOS)” MARCH 26-27 2011
which the number of columns represents the length of the key.         will further explore the usage of this algorithm in
For columnar cipher, the cipher text is written into the table        cryptanalysis in Section 4.
column by column from left to right while in permutation              3.2 Ant Colony Optimization
cipher, the cipher text is written row by row from top to             Ant colony optimization is inspired by the pheromones trail
bottom. After that, the columns are rearranged to form                laying and following behavior of real ants which use
readable plaintext in every row.                                      pheromones as a communication medium. This approach was
3 Biological Inspired Techniques                                      proposed    for    solving    hard   combinatorial   optimization
BIT is a method that takes ideas from biology to be used in           problems [9]. An important aspect of ant colonies is the
computing. It relies heavily on the fields of biology, computer       collective action of many ants result in the location of the
science and mathematics. Some of BIT approaches are GA,               shortest path between a food source and a nest. Standard ant
artificial neural network (ANN), DNA, Cellular Automata, ant          colony optimization (ACO) algorithm contains probabilistic
colony,    particle    swarm     optimization      and   membrane     transition rule, goodness evolution and pheromone updating
computing. Four of these techniques namely GA, ant colony             [6]. In cryptanalysis, ACO algorithm has been applied in
and ANN, Cellular automata describe later in this section.            breaking transposition cipher and block cipher. Cryptanalysis
3.1 Genetic Algorithm                                                 of transposition cipher published in [6] is reviewed in Section
Genetic Algorithm (GA) is a technique that is used to optimize        4 of this paper.
searching process and was introduced by Holland in 1975 [5].          3.3 Artificial Neural Network
This algorithm is based on natural selection in the biological        Artificial Neural Networks (ANN) can be defined as
sciences [7]. There are several processes in GA namely                computational systems inspired by theoretical immunology,
selection, mating and mutation. In the beginning of the cycle,        observed immune functions, principles and mechanisms in
a set of random population is created as the first generation.        order to solve problems [8]. ANN can be divided to
Elements that make up the population are the potential                population-based algorithm such as negative selection and
solution to the problem. The population is represented by             clonal selection algorithm and network-based algorithm such
strings. Then, pairs of strings are selected based on a certain       as continuous and discrete immune networks. ANN has been
criteria called a fitness function. These pairs are known as          applied to a wide variety of application areas such as pattern
parents and will be mated to produce children. The children           recognition and classification, optimization, data analysis,
are then mutated based on a mutation rate because not all             computer security and robotic [8]. Hart and Timmis et. l.
children are mutated. After the mutation process, a new set of        categorized these application areas and some others into three
population is formed (the next generation). The cycle                 major categories namely learning, anomaly detection and
continues until some stopping condition is met such as a              optimization. In optimization, most of the papers published are
maximum number of generations. This algorithm has been                based on the application of clonal selection principle using the
successfully applied in cryptanalysis of classical and modern         algorithm such as Clonalg, opt-AINET and B-cell algorithm.
ciphers    such   as    simple     substitution,    polyalphabetic,   De Castro & Von Zuben [8] proposed a computational
transposition, knapsack, rotor machine, RSA and TEA. We               implementation of the clonal selection algorithm (it is now
                                                                                                                            SIP0303-3
        CONFERENCE ON “SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM (SPRTOS)” MARCH 26-27 2011
called Clonalg). The authors compared their algorithm‟s               Classical cipher was successfully attacked using various
performance with GA for multi-modal optimization and argue            metaheuristic techniques. Metaheuristic is a heuristic method
that their algorithm was capable of detecting a high number of        for solving a very general class of computational problems.
sub-optimal solutions, including the global optimum of the            Therefore, this technique is commonly used in combinatorial
function being optimized. Castro [8] extended this work by            optimization problems. Some of metaheuristic techniques that
using   immune         network    metaphor    for       multi-modal   were successfully applied in the cryptanalysis of classical
optimization. Clonal selection has also been used in                  cipher are genetic algorithm, simulated annealing, tabu search
optimization of dynamic functions. The result is compared             , ant colony optimization and hill climbing. In this paper, we
with evolution strategies (ES) algorithm. The comparison is           will review BIT techniques that have been successfully
based on time and performance and shows that clonal                   applied   in   cryptanalysis   of   classical   ciphers   (simple
selection is better than ES in small dimension problems.              substitution and transposition cipher). Spillman et al have
However, in higher dimension, ES outperformed the clonal              published their paper on the cryptanalysis of simple
selection in time and performance. Other than that, somr              substitution cipher using genetic algorithm in 1993. The paper
author applied the Clonalg in a scheduling problem, with the          is an early work done by using GA in cryptanalysis and it is a
name clonal selection algorithm for examination timetabling           good choice for re-implementation and comparison [4]. In [4],
(CSAET). The research shows that CSAET is successful in               the authors review some idea about genetic algorithm before
solving problems related to scheduling. From the comparison           they show the steps on how the algorithm is applied in the
performed between CSAET with GA and memetic algorithm,                cryptanalysis. The aim of the attack is to find the possible key
CSAET produced quality output as good as those algorithms.            values based on frequency of characters in the cipher text. The
Therefore, literature shows that ANN is capable of producing          key is sorted from the most frequent to the least frequent
good    results   in    various   fields   especially     regarding   characters in the English language. In the selection process,
optimization. It is hoped that ANN will also find its way in          pairs of keys (parents) are randomly selected from the
cryptanalysis.                                                        population (contains a set of keys that is randomly generated
3.4 Cellular Automata                                                 for the first generation) based on fitness function. The fitness
A cellular automaton is a decentralized computing model               function compares unigram and bigram frequencies characters
providing an excellent platform for performing complex                in the known language with the corresponding frequencies in
computation with the help of only local information. Nandi et         the cipher text. Keys with higher fitness value have more
al. presented an elegant low cost scheme for CA based cipher          chance of being selected. Mating is done by combining each
system design. Both block ciphering and stream ciphering              of the pairs of parents to produce a pair of children. The
strategies designed with programmable cellular automata               children are formed by comparing every element (character) in
(PCA) have been reported. Recently, an improved version of            each pair of parents. After that, one character in the key can be
the cipher system has been proposed.                                  change with a randomly selected character based on a
4 BIT in cryptanalysis                                                mutation rate in the mutation process. The selection, mating
                                                                      and mutation processes continue until a stopping criterion is
                                                                                                                           SIP0303-4
        CONFERENCE ON “SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM (SPRTOS)” MARCH 26-27 2011
met. Another paper published in 1993 utilizing genetic             transposition cipher which involves differing heuristics,
algorithm in cryptanalysis was by Matthews. However, the           processing time and success criteria. The comparison shows
paper is focuses on transposition cipher. The attack is known      that the ACS algorithm can decrypt cryptograms which are
as GENALYST. The attack finds the correct key length and           significantly shorter than other methods due to the use of
correct permutation of the key of a transposition cipher.          dictionary heuristics in addition to bigrams.
Matthews uses a list containing ten bigram and trigram yang        5 Conclusion
that have been given weight values to calculate the fitness. For   This paper reviews works on cryptanalysis of classical ciphers
instance, the trigram „THE‟ and „AND‟ are given a score of         using BIT approaches. The types of classical ciphers involved
„+5‟ while „HE‟ and „IN‟ are given a score of „+1‟. Matthews       are the simple substitution and transposition cipher while GA
also give „-5‟ score for the trigram of „EEE‟. This is because,    and ant colony optimization is the techniques used. GA has
although „E‟ is very common in English, but a word                 been applied to both ciphers but only transposition cipher was
containing a sequence of three „E‟s is very uncommon in            found to have been implemented using ant colony. ANN is
normal English text. Higher fitness values have more chance        also discovered to be a promising approach to be employed in
of being selected. After the selection process has been done,      cryptanalysis based on its ability to solve optimization
mating is performed using a position-based crossover method.       problems. Therefore, the application of ANN in cryptanalysis
Then, the mutation process is applied. There are two possible      should be further studied,
mutation types that can be applied. First, randomly swap two       References
elements and second, shift forward all elements by a random        [1] Rsa from wikipedia. http://en.wikipedia.org/wiki/RSA.
number of places. The experiment was done by using                 [2]. A. Menezes, P. van Oorschot, and S. Vanstone. Handbook
population size of 20, 25 generations and crossover decreases      of Applied Cryptography. CRC Press, New York, NY, 1997.
from 8.0 to 0.5. The result shows that GENALYST is                 [3] S. Nandi, B. K. Kar, and P. Pal Chaudhuri. Theory and
successful in breaking the cipher with key lengths of 7 and 9.     applications of cellular automata in cryptography. IEEE
Ant   colony   optimization    has   also   been   successfully    Transactions on Computers, 43(12):1346–1357,1994.
implemented in the cryptanalysis of transposition cipher           4]. Lin, Feng-Tse, & Kao, Cheng-Yan. (1995). A genetic
published in [8]. The paper uses specific ant algorithm named      algorithm for ciphertext-only attack in cryptanalysis. In IEEE
Ant Colony System (ACS) with known success on the                  International Conference on Systems, Man and Cybernetics,
Traveling Salesman Problem (TSP), to break the cipher. The         1995, (pp. 650-654, vol. 1).
authors used the bigram adjacency score, Adj(I,J) to define the    [5]. Holland, J. H. (1975). Adaptation in natural and artificial
average probability of the bigram created by juxtaposing           systems. Ann Arbor: The University of Michigan Press.
columns I and J. The score will be higher for two correctly        [6]. Clark, J. A. (2003) Invited Paper. Natured- Inspired
aligned columns. Other than that, they also used dictionary        Cryptography: Past, Present and Future. IEEE Conference on
heuristic, Dict(M) for the recognition of plaintext. The authors   Evolutionary    Computation     2003.    Special   Session   on
also made a comparison between the results produced by ACS         Evolutionary Computation and Computer Security. Canberra.
with the result of previous metaheuristic techniques in
                                                                                                                       SIP0303-5
       CONFERENCE ON “SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM (SPRTOS)” MARCH 26-27 2011
[7]Goldberg, D., (1989) Genetic Algorithms in Search,           [15] Schmidt, T.; Rahnama, H.; Sadeghian, A. , A review of
Optimization, and Machine Learning. Reading MA: Addison-        applications of artificial neural networks in cryptosystems ,
Wesley.                                                         Automation Congress, 2008. WAC 2008. World , Page(s): 1 –
[8].de Castro, L. N. (2002) Immune, Swarm and Evolutionary      6
Algorithms Part I: Basic Models. International Conference on    [16]   Godhavari,       T.;    Alamelu,         N.R.;   Soundararajan,
Neural Information Processing Vol. 3 pp 1464-1468.              R.,Cryptography Using Neural Network ,INDICON, 2005
[9]. S.N.Sivanandam · S.N.Deepa “Introduction to Genetic        Annual IEEE , Page(s): 258 - 261
Algorithms, Springer-Verlag Berlin Heidelberg 2008.             [17] R. Spillman, M. Janssen, B. Nelson, and M. Kepner. Use
[10] Xu Xiangyang, The block cipher for construction of S-      of a genetic algorithm in the cryptanalysis of simple
boxes based on particle swarm optimization, 2nd International   substitution ciphers. Cryptologia, 1993,17(1):31–44.
Conference on Networking and Digital Society (ICNDS),           [18] Diffie, W. and Hellman, M. (1976). New Directions in
2010 , Page(s): 612 - 615                                       Cryptography. IEEE Transactions on Information Theory,
[11] Uddin, M.F.; Youssef, A.M, Cryptanalysis of Simple         22(6): 644-654.
Substitution Ciphers Using Particle Swarm Optimization”,        [19] Tarek Tadros, Abd El Fatah Hegazy, and Amr Badr
IEEE Congress on Evolutionary Computation, 2006. Page(s):       ,Genetic      Algorithm       for   DES          Cryptanalysis,IJCSNS
677 – 680                                                       International Journal of Computer Science and Network
[12] Mohammad Faisal Uddin; Amr M. Youssef , An                 Security, VOL.10 No.5, May 2010
Artificial Life Technique for the Cryptanalysis of Simple       [20]Forrest, S., Perelson, A. S. Allen, L. and Cherukuri, R.
Substitution Ciphers , Canadian Conference on Electrical and    (1994).      Self-nonself     Discrimination       in   A   Computer.
Computer Engineering, 2006, Page(s): 1582 - 1585                Proceedings of IEEE Symposium on Research in Security and
[13] Khan, S.; Shahzad, W.; Khan, F.A. , Cryptanalysis of       Privacy, Los Alamos, CA. IEEE Computer Society Press.
Four-Rounded     DES    Using   Ant    Colony   Optimization    [21] Stallings, W. (2003). Cryptography and Network
                                                                                                           rd
,International Conference    on Information Science and         Security: Principles and Practices, 3 Edition. Upper Saddle
Applications (ICISA), 2010 , Page(s): 1 - 7                     River, New Jersey: Prentice Hall.
[14] Ghnaim, W.A.-E.; Ghali, N.I.; Hassanien, A.E., Known-      [22] Spillman, R. (1993). Cryptanalysis of Knapsack Ciphers
ciphertext cryptanalysis approach for the Data Encryption       Using Genetic Algorithms. Cryptologia, XVII(4):367-377.
Standard technique, International Conference on Computer        [23] Clark, J.A. (2003). Nature-Inspired Cryptography: Past,
Information Systems and Industrial Management Applications      Present and Future. In Proceedings of Conference on
(CISIM), 2010 , Page(s): 600 - 603                              Evolutionary      Computation,      8-12        December.    Canberra,
[14] AbdulHalim, M.F.; Attea, B.A.; Hameed, S.M., A binary      Australia.
Particle Swarm Optimization for attacking knapsacks Cipher      [24] Clark, A. (1998). Optimization Heuristics for Cryptology.
Algorithm ,International Conference on Computer and             Ph.D. Dissertation, Faculty of Information Technology,
Communication Engineering ,2008. Page(s): 77 - 81               Queensland University of Technology, Australia.
                                                                                                                            SIP0303-6
        CONFERENCE ON “SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM (SPRTOS)” MARCH 26-27 2011
[25] Bagnall, A.J. (1996). The Applications of Genetic            Annual Workshop on Selected Areas in Cryptography, Aug.
Algorithms in Cryptanalysis. M.Sc. Thesis. School of              11-12, SAC 1997.
Information System, University of East Anglia.                    [34] Millan, W., Clark, A. and Dawson, E. (1998). Heuristic
[26] Dimovski, A., Gligoroski, D. (2003). Attack on the           Design of Cryptographically Strong Balanced Boolean
Polyalphabetic Substitution Cipher Using a Parellel Genetic       Functions. Advances in Cryptology – EUROCRYPT ‟98,
Algorithm. Technical Report, Swiss-Macedonian Scientific          LNCS 1403, 489-499, Springer-Verlag, Berlin Heidelberg.
Cooperation through SCOPES Project, March 2003, Ohrid,            [35] Dimovski, A., Gligoroski, D. (2003). Generating Highly
Macedonia.                                                        NonLinear Boolean Functions Using a Genetic Algorithm. In
                                                                                     st
[27] Dimovski, A., Gligoroski, D. (2003). Attacks on              Proceedings of 1        Balcan Conference on Informatics,
Transposition Cipher Using Optimization Heuristics. In            November, Thessaloniki, Greece.
Proceedings of ICEST 2003, October, Sofia, Bulgaria.
[28] Morelli, R.A. and Walde, R.E. (2003). A Word-Based
Genetic Algorithm for Cryptanalysis of Short Cryptograms.
Proceedings of the 2003 Florida Artificial Intelligence
                                                                  .
Research Symposium (FLAIRS – 2003), pp. 229-233.
[29] Morelli, R.A., Walde, R.E., Servos, W. (2004). A Study
of   Heuristic   Search   Algorithms   for   Breaking   Short
Cryptograms. International Journal of Artificial Intelligence
Tools (IJAIT), Vol. 13, No. 1, pp. 45-64, World Scientific
Publishing Company.
[30] Servos, W. (2004). Using Genetic Algorithm to Break
Alberti Cipher. Journal of Computing Science in Colleges,
Vol. 19(5): 294-295.
[31] Hernandez, J.C., Sierra, J.M., Isasi, P., Ribagorda, A.
(2002). Genetic Cryptanalysis of Two Rounds TEA. ICCS
2002, LNCS 2331, 1024 – 1031, Springer-Verlag Berlin
Heidelberg.
[32] Ali, H. and Al-Salami, M. (2004). Timing Attack
Prospect for RSA Cryptanalysis Using Genetic Algorithm
Technique. The International Arab Journal of Information
Technology, 1(1).
[33] Millan, W., Clark, A. and Dawson, E. (1997). Smart Hill
                                                             th
Climbing Finds Better Boolean Functions. Proceedings of. 4
                                                                                                                  SIP0303-7
CONFERENCE ON ―SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM (SPRTOS)‖ MARCH 26-27 2011
Abstract— The aim of this study is to                motor impairments (severe cerebral palsy,
detect eye movement (left to right) from             head trauma and spinal injuries) may use
Electroencephalograph (EEG) signal.                  such a BCI system as an alternative form of
Four electrodes of EEG in the frontal                communication by mental activity [1]. Using
area were used. The statistical features             improved measurement devices, computer
were extracted from the four channels of             power, and software, multidisciplinary
frontal channel. These features were then            research      teams       in       medicine,
fed into a classifier based on the linear            psychophysiology, medical engineering, and
discriminator     function.   The      most          information technology are investigating and
prominent features for the classification            realizing new noninvasive methods to
of left and right movements were                     monitor and even control human physical
identified. These features were then                 functions.
interfaced with computer so that cursor
movement can be controlled. Electrodes               In a bigger picture – there can be devices
are placed along the scalp following the             that would allow severely disabled people to
10-20 International System of Electrode              function independently. For a quadriplegic,
Placement. Recorded data was filtered,               something as basic as controlling a computer
windowed and analysed in order to                    cursor via mental commands would
extract features. Four different classifiers         represent a revolutionary improvement in
were used. Best results were found in                quality of life. With an EEG or implant in
support vector machine (SVM) and linear              place, the subject would visualize closing his
classifiers each of which gave the average           or her eyes or moving eyes from left to right
accuracy of 90%.                                     and vice versa [2]. The software can learn
                                                     eye movement through training, using
                                                     repeated trials. Subsequently, the classifier
Keywords: BCI, Eye movement, EEG.
                                                     may be used to instruct the closure/opening
            I.   INTRODUCTION                        of eye. A similar method is used to
                                                     manipulate a computer cursor, with the
   A brain-computer interface (BCI)                  subject thinking about forward, left, right
provides an alternative communication                and back movements of the cursor [3]. With
channel between the human brain and a                enough practice, users can gain enough
computer by using pattern recognition                control over a cursor to draw a circle, access
methods to convert brain waves into control          computer programs and control a television.
signals. Patients who suffer from severe             It could theoretically be expanded to allow
                                                                                                  SIP0304-1
 CONFERENCE ON ―SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM (SPRTOS)‖ MARCH 26-27
                                         2011
users to "type" with their thoughts. This can     The term ―Brain-Computer Interface‖ first
be achieved by controlling cursor movement        appeared in scientific literature in the 1970's,
on a computer screen through EEG signals          though the idea of hooking up the mind to
from brain, specifically, generated due to        computers was nothing new [5]. Currently,
eye movement. The signals can be analysed         the systems are ―open loop‖ and responds to
by different methods.                             user‘s thoughts only. The ―closed loop‖
                                                  systems are aimed to be developed that can
    Traditional analysis methods, such as the     give feedback to user as well.
Fourier Transform and autoregressive
modelling are not suitable for non-stationary     In order to meet the requirements of the
signals. Recently, wavelets have been used        growing technology expansion, some kind of
in numerous applications for a variety of         standardization was required not only for the
purposes in various fields. It is a logical way   guidance of future researchers but also for
to represent and analyse a non-stationary         the validation and checking of             new
signal with variable sized region windows         developments with other systems, thus a
and to provide local information. In the          general purpose system was developed
Fourier Transform (FT), the time                  called BCI2000 which made analysis of
information is lost and in short Term Fourier     brain siganl recording easy by defining the
Transform (STFT) there is limited time            output formats and operating protocols to
frequency resolution. Even though basic           facilitate the researchers in developing any
filters can be used for decomposition of          type of application. This made it easier to
desired bands, ideal filters are never realised   extract specific features of brain activity and
in practice, which results in aliasing effects.   translate them into device control signals
However, wavelet analysis enables perfect         [7]..
decomposition of the desired bands, which
helps us to obtain better features [4].                     III.   OUR METHODOLOGY
   In this paper different features are used      The procedure in this study was to initially
for training the classifier for eye movement      acquire EEG data. The stored data was then
in left and right directions. A time-frequency    pre-processed    to     remove     artifacts.
analysis was applied to the EEG signals           Subsquently features were extracted in the
from different channels, to determine             clean EEG and used for classification. Thus
combination of features and channels that         methodology is shown in Fig. 1.
yielded the best classification performance.
                                                                                              SIP0304-2
 CONFERENCE ON ―SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM (SPRTOS)‖ MARCH 26-27
                                         2011
A.Experimental Setup and Data Acquisition                   BrainTech software. EEG of the frontal lobe
The subject was seated on wooden armchair                   channels for subject 1 is illustrated in Fig. 3.
and legs were rested on wooden footrest                                                                         Frontal lobe channels
(wooden items should be used so as to                                                                                                                   fp1f3
reduce interference) with eyes closed. The                                                                                                              fp1f7
                                                                          1500                                                                          fp2f4
subject was instructed to avoid speaking and                                                                                                            fp2f7
to avoid body movement in order to ensure
                                                              Amplitude
                                                                          1000
relaxed body. EEG data were recorded using
a Brain Tech clarityTM system [9] with the                                   500
electrodes positioned according to the
standard 10-20 system in the biomedical                                                0
-10
                 Right to                                                         -20
                   left                Relax
                movement                                                          -30
                                                                                  -40
                                                                                     0           20        40          60        80           100     120            140
                                                                                                                      Frequency (Hz)
                                                            Fig. 4: Power Spectral Density of FP1F3
                                     Left to
                   Relax              right
                                                             IIR second order notch filter with the
                                    movement                quality factor (or Q factor) of 3.91 was used
                                                            to remove the undesired frequency
   Fig. 2 Sequence followed during experimental recording   components.
                                                            Signal after removing the artifacts of 4
                                                            channels stacked over one another is shown
B. Data Processing                                          in Fig. 5.
                                                                                                                                              SIP0304-3
 CONFERENCE ON ―SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM (SPRTOS)‖ MARCH 26-27
                                         2011
       0
                                                                                      IV.   RESULTS AND DISCUSSIONS
    -500
        0        100            200              300               400       500
                                                                                 For each frame of EEG, four features were
Fig. 5: Signal Plot of filtered Frontal lobe associated                          calculated namely, variance, mean, skewness
channels
EEG by nature is non stationary signal. So it                                    and cross correlation. The seperabrability
was fragmented into frames so that it can be                                     provided by each feature was individually
assumed stationary for small segment. EEG                                        tested. The best three features were
data is divided into frames of 1s duration i.e.                                  subsequently used as an input to the
frame size of 256 samples.                                                       classifier. Four classifiers were used in this
                                                                                 work. The classifiers results are illustrated in
                                                                                 Table 1.For each movement of LTR and
C. Feature extraction                                                            RTL 20 seconds (20 frames) of data were
                                                                                 collected. From these 20 frames 15 frames
Feature extraction is the process of
                                                                                 were used for training and rest 5 are used for
discarding the irrelevant information to the
                                                                                 testing for both movements.
possible extent and representing relevant data
in a compact and meaningful form. Two eye
                                                                                 Table 1: Percentage accuracy of classification for eye
movements were recorded: right to left
                                                                                 movements
(RTL), left to right (LTR).Standard statistical
parameters such as mean, variance,                                                  Classifier       RTL             LTR
skewness, cross-correlation were calculated
for all the channels in each movement type.                                            SVM              80               100
                                                                                                                            SIP0304-4
 CONFERENCE ON ―SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM (SPRTOS)‖ MARCH 26-27
                                         2011
               20
                                                                                                   .
                                                                                                                    REFERENCES
               10
                -15       -10        -5             0         5    10       15            20
                                                                                       1. The            "10-20      System     of     Electrode      Placement‖
                                                                                               http://faculty.washington.edu/chudler/1020.html
                     Fig. 6: Plot of Classifier in Signal Space
                                                                                       2. Y. U. Khan,(2010) ‘Imagined wrist movement classification in
                                                                                               single trial EEG for brain computer interface using wavelet
                                                                                               packet‘, Int. J. Biomedical Engineering and Technology, Vol. 4,
                                                                                               No. 2, pp169-180.
A linear classifier classifying both eye
movements is shown in Fig. 6.            3. Daniel, J. Szafir (2009-10) ‗Non-Invasive BCI through EEG ―An
                                                                                               Exploration of the Utilization of electroencephalography to Create
                                          Variance of FP2F4                                    Thought-Based Brain-Computer Interfaces‖.
             1000
                                                                            RTL        4. Wolpaw, J.R., Birbaumer, N., McFarland, D.J., Pfurtscheller, G.,
                                                                            LTR                Vaughan, T.M. (2002): Brain–computer interfaces                 for
              800
                                                                                               communication and control. Clinical Neurophys. pp767–791
V. CONCLUSIONS
                                                                                                                                                    SIP0304-5
     CONFERENCE ON “SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM (SPRTOS)” MARCH 26-27 2011
                                                                                                       SIP0333-1
        CONFERENCE ON “SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM (SPRTOS)” MARCH 26-27 2011
                                                                                                         SIP0333-2
       CONFERENCE ON “SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM (SPRTOS)” MARCH 26-27 2011
                                                          A.   Fuzzification
                                                            In this system we are considering the atrial and
                                                         ventricular heart rates, QRS complex width and
                                                         PR interval values as the input linguistic variables,
                                                         which are passed to the inference engine.
                                                            Based on the rule base and linguistic variables,
                                                         the fuzzy system output is obtained.
               Fig.2 Internet based system
                                                          B.   Defuzzification
 B.   LABVIEW                                                 The defuzzified values are the risk levels high
  LabVIEW is a graphical programming language            risk, medium risk, low risk which are obtained
developed by National instruments. Programming           according to the weights of fuzzy variables.
with LabVIEW gives a vivid picture of data flow by        C.   Relation between input and output variables
the graphical representation in blocks. labview is          The relationship between input and output is
used here for getting the ECG waveform and also          shown by a 3-Dimensional figure 4. shown below
for analyzing the parameters like PR interval, QRS
width, heart rates which are later passed to the fuzzy
system.
LabVIEW offers modular approach and parallel
computing , which makes easier for developing
complex systems. Debugging tools like probes,
Highlight execution are handy in analyzing where
actually the error occurred.
 C.  Fuzzy system
  Fuzzy controllers are the widely employed as they
are efficient controllers when working with the                 Fig 4. Relation between input and output
vague values. A Fuzzy controller has a rule base in
“IF-THEN” fashion, which is used for identification       D.   Fuzzy Rules
of the risk level of disease using the weight.               In this Fuzzy system we are using the centre of
  A Fuzzy system is generally given by Fig 3.            area method as the fuzzificaton method. The rule
                                                         base of the fuzzy system consists of rules in the
                                                         form of “If-Then”. The risk levels are dependent on
                                                         the number of conditions are met by the input
                                                         variables for the respective cardiac disorder. As
                                                         there is no particular rule of identifying the
                                                         arrhythmia based on heart rate, since it can differ
                                                         from patient to patient and so this system thus is
                                                         more accurate in determining the arrhythmia since it
                                                         is not based only on heart rate.
                                                                                                    SIP0333-3
       CONFERENCE ON “SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM (SPRTOS)” MARCH 26-27 2011
  Fuzzy rule base is acts like a database of rules for                      IV. RESULTS
selecting the output, basing on the input quantities.       This system is able to measure the arrhythmias
Some of the rules are:-                                  accurately and also publish it online.
   1. IF 'PR interval' IS 'Normal' AND 'vHR' IS
'30,40' AND 'aHR' IS '60,75' THEN 'First Degree
Block' IS 'No ' ALSO 'Third Degree block' IS
'Medium                                        Risk'
2. IF 'PR interval' IS 'Normal' AND 'vHR' IS '30,40'
AND 'aHR' IS '75,90' THEN 'First Degree Block' IS
'No ' ALSO 'Third Degree block' IS 'Medium Risk'
3. IF 'PR interval' IS 'Normal' AND 'vHR' IS '30,40'
AND 'aHR' IS '90,100' THEN 'First Degree Block'
IS 'No ' ALSO 'Third Degree block' IS 'High Risk'.
4. IF 'vHR' IS '150,180' AND 'QRS Width' IS
'Narrow QRS' THEN 'Ventricular Tachycardia at' IS
'Low risk' ALSO 'Junctional Tachycardia at' IS 'Low
Risk' ALSO 'Supra Ventricular Tachy at' IS 'High
Risk'
5. IF 'vHR' IS '180,210' AND 'QRS Width' IS
'Normal QRS' THEN 'Ventricular Tachycardia at' IS
'Low risk' ALSO 'Junctional Tachycardia at' IS
'High Risk' ALSO 'Supra Ventricular Tachy at' IS                 Fig 5. Block Diagram for extracting
'Low                                           Risk'     ECG waveform
                                                                                                   SIP0333-4
       CONFERENCE ON “SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM (SPRTOS)” MARCH 26-27 2011
     Above figure 6. Shows the block diagram of        [1] N.Noury and P.Pilichowski,”A telematic system
risk level detection , we show how we called the       tool for home health care,”-in proc.   IEEE 14th
fuzzy system into the main panel for diagnosing and    Annu.Int.conf.EMBS, Paris, oct.1992, PP.1175-
risk level indication.                                 1177
   Fig 7 shows the Front panel which is developed      [2] Zhenyu Guo and John c.Moulder “An internet
from the fuzzy system ,and is sent to the doctor       based Telemedicine system”IEEE transactions, pp.
using web publishing tool for the second advice        2000
.System also have a database to save the details of
                                                       [3].Volodymyr Hrusha, Olexandr Osolinskiy,
patient like Name, Age, Sex, Symptoms which can
used for the next time..                               Pasquale Daponte, Domenico Grimaldi”Distributed
                                                       Web-based Measurement system” IEEE Workshop
                                                       on Intelligent Data and Advanced Computing
                                                       System Technology and Applications pp, on 5-7
                                                       2005
                                                       1. Acquisition and Analysis System of the ECG
                                                         Signal Based on LabVIEW by Lina Zhang,
                                                         Xinhua Jiang.
                                                       2. QRS DETECTION USING A FUZZY NEURAL
                                                          NETWORK Kevin P. Cohen, Willis J.
                                                          Tompkins, Adrianus Djohan, John G. Webster
                                                          and Yu H. Hu.
                                                       3. Classification of ECG Arrhythmias using Type-2
                                                       Fuzzy
                                                          Clustering Neural Network
                                                       4. Robust techniques for remote real time
                                                          arrhythmias classification system
                                                       5. ECG Arrhythmia Detection Using Fuzzy
                                                       Classifiers by
                                                          S. Zarei Mahmoodabadi ,A. Ahmadian, M. D.
                                                          Abolhassani, J. Alireazie P. Babyn
                                                       6. Discrimination of Cardiac Arrhythmias Using a
                                                          Fuzzy Rule-Based Method by E Chowdhury,
                 Fig 7. Front panel                       LC Ludeman.
                                                       7. Automated ECG Rhythm Analysis Using Fuzzy
                                                          Reasoning by W Zong, D Jiang.
                V. CONCLUSION
                                                       8. Fuzzy Classification of Intra-Cardiac
          In this way we had developed a fuzzy            Arrhythmias by Jodie Usher, Duncan Campbell,
system with good accuracy in determining the              Jitu Vohra, Jim Cameron.
cardiac disorders with risk levels when compared
to the normal system considering the atrial and
ventricular heart rates, QRS complex width and
PR interval values as the input linguistic variables
using labVIEW. This report is successfully sent to
the doctors system using web publising tool for the
second advice.
REFERENCES:-
                                                                                               SIP0333-5
CONFERENCE ON “SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM (SPRTOS)” MARCH 26-27 2011
   Abstract— Image searching is one of the fascinating          The initial techniques which are used are based on the
topics for the advanced research since the 1990s. As fast       textual annotation of the images. Using the text
there is advancement in the computer and network                descriptions, images can be organized by topical or
technologies coupled with relatively cheap high volume          semantic hierarchies to facilitate easy navigation and
data storage devices have brought tremendous growth in          browsing based on standard Boolean queries. Content
the amount of digital images, hence the development of          Based Image Retrieval is one of the major approaches of
pattern recognition is also increases exponentially. Pattern    image retrieval that has drawn significant attention in the
recognition is the act of taking in raw data and classifying    past decade, which uses visual contents to search images
it into predefined categories using statistical and empirical   from large scale image database according to users
methods. Content based image retrieval (CBIR) is one of         interests Low Level image features such as color, texture,
the widely used applications of pattern recognition for         shape and structure are extracted from images. Relevant
finding images from vast and un-annotated image                 images are retrieved based on the similarity of their image
database. In CBIR images are indexed on the basis of            features. Examples of some of the prominent systems are
low-level features, such as color, texture, and shape,          QBIC, Photobook, and NETRA. In this paper we discuss
which can automatically be derived from the visual              the different algorithms used to extract the different
content of the images. The paper discusses techniques and       features of an image. In this paper we also discuss the
algorithm that are used to extract these image features         future advancement of the Context Based Image Retrieval
from the visual content of the images & the advancement         techniques, how can be it beneficial in different fields.
which can be done using the CBIR. The various similarity        We also discuss the futuristic approaches to attain this
measures are used to identify the closely associated            technique in more advanced way.
patterns. These methods compute the distance between
the features generated for different patterns and identify
the closely related patterns and these patterns are then        1. Image Retrieval
generated as the result. This paper unfolds a novel
application using context based image retrieval for search      A recent study of literature in image indexing and
the detailed description of an image without knowing a          retrieval has been conducted based on 100 papers from
single word about it. This paper also proposes algorithms       Web of Science. Two major research approaches, text-
to create such a utility.                                       based (description-based) and content-based, were
                                                                identified. It appears that researchers in the information
                                                                science community focus on the text-based approach
Keywords: Context Based Image Retrieval, Image
                                                                while researchers in computer science focus on the
Searching.
                                                                content-based approach. Text-based image retrieval
                         INTRODUCTION                           (TBIR) makes use of the text descriptors to retrieve
                                                                relevant images. Some recent studies found that text
                                                                descriptors such as time, location, events, objects,
                                                                                                               SIP0401-1
CONFERENCE ON “SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM (SPRTOS)” MARCH 26-27 2011
formats, aboutness of image content, and topical terms are     Barbara (UCSB) [5, 6]. NETRA supports features of
most helpful to users. The advantage of this approach was      color, texture, shape, and spatial information of
that it enabled widely approved text information retrieval     segmented image regions to region-based search. Images
systems to be used for visual retrieval systems.               are segmented to homogenous regions. Using the region
                                                               as the basic unit, users can submit queries based on
1.1. Content-based image retrieval                             features that combine regions of multiple images. For
                                                               example, a user may compose queries such as retrieve all
In CBIR, the images are indexed by features that are           images that contain regions having color of a region of
derived directly from the images. The features are always      image A, texture of a region of image B, shape of a region
consistent with the image and they are extracted and           of image C.
analyzed automatically by means of computer processing,
instead of manual annotation. Due to the difficulty of
automatic object recognition, information extracted from       1.1.1 Image features
images in CBIR is rather low level, such as colors,
textures, shapes, structure and combinations of the above.     One of the main foci in CBIR is the means for extraction
A number of representative generic CBIR systems have           of the features of the images and evaluation of the
been developed in the last ten years. These systems have       similarity measurement between the features. Image
been implemented in different environments, some of            features refer to the characteristics which describe the
which are Web based while some are GUI-based                   contents of an image. In this paper, image features are
applications. QBIC, Photobook, and NETRA are the most          confined to visual features that are derived from an image
prominent examples.                                            directly. There have been extensive studies of various
                                                               sorts of visual feature. The simplest form of visual feature
QBIC is developed at the IBM Almaden Research Centre           is directly based on pixel values of the image. However,
[1, 2, 3]. It is the first commercial CBIR application and     these types of visual feature are very sensitive to noise,
plays an important role in the evolution of CBIR systems.      brightness, hue and saturation changes, and are not
The QBIC system supports low level image features of           invariant to spatial transformations such as translation and
average color, color histogram, color layout, texture and      rotations. As a result, CBIR systems that are based on
shape. Additionally, users can provide pictures or draw        pixel values do not generally have satisfactory results.
sketches as example images in query. The visual queries        Much of the research in this area has placed the emphasis
can also be combined with textual keyword predicates.          on computing useful characteristics from images using
Photobook [4], developed at the MIT Media Lab. It is a         image processing and computer vision techniques.
tool for performing queries on image databases based on        Usually, general purpose features in CBIR have included
image content. It works by comparing features associated       Text, color, texture, shape and Layout.
with images, not the images themselves. These features
are in turn the parameter values of particular models fitted   Color representations
to each image. These models are commonly color,
texture, and shape, though Photobook will work with            Color histogram is the standard representation of color
features from any model. Features are compared using           feature in CBIR system, initially investigated by Swain
one out of a library of matching algorithms that               and Ballard. The histograms of intensity values are used
Photobook provides. It is a set of interactive tools for       to represent the color distribution. This captures the
searching and querying images. It is divided into three        global chromatic information of an image and is invariant
specialized systems, namely Appearance Photobook (face         under translation and rotation about the view axis. Despite
images), Texture Photobook, and Shape Photobook,               changes in view, change in scale, and occlusion, the
which can also be used in combination. The features are        histogram changes only slightly. A Color histogram H
compared by using one of the matching algorithms. These        (M) of image M is a 1-D discrete function representing
include Euclidean, Mahalanobis, divergence, vector space       the
angle, histogram, Fourier peak, and wavelet tree               Probabilities of occurrence of colors in images, which, is
distances, as well as any linear combination of those          typically defined as:
previously discussed.
NETRA is a prototype image retrieval system that has           H (M) = [             ]
been developed at them University of California, Santa
                                                                                                               SIP0401-2
CONFERENCE ON “SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM (SPRTOS)” MARCH 26-27 2011
   =     k= 1, 2, 3 …. , n                  [Equation 1]
Where N is the number of pixels in image M and is the
number of pixels with image value k. The division
                                                                G (x, y) = (         ) × exp [- (         ) + 2 jWx]
normalizes the histogram such that:
= G( )
Texture representations
                                                                   a > 1; m, n are integers
Many texture features have been investigated in the past,
including the conventional pyramid-structured wavelet       Given an image with luminance, I (m, n), Gabor
transform (PWT) features, tree-structured wavelet           decomposition can be obtained by multiplying the
transform (TWT) features, the multi-resolution              luminance by the magnitude of the Gabor wavelet:
simultaneous autoregressive model (MR-SAR) features
and the Gabor wavelet features. Experiments have been
                                                            |             |= I (     )
conducted and have found that the Gabor features [7, 8]
produce the best performance. The computation of Gabor                                                     [Equation 4]
features is given as follows. A two dimensional Gabor
function can be formulated as:                              The mean and standard deviation of the magnitude of the
                                                            transform coefficient are used to represent the texture
                                                            feature for classification and retrieval purposes:
                                                                                                             SIP0401-3
CONFERENCE ON “SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM (SPRTOS)” MARCH 26-27 2011
                                                              (A) First of all filter out all the unuseful words like
                                                              preposition, adjective etc. from the whole text.
                                                              And then apply the given algorithms for assigning the
                                                              priority to remaining words.
  APPLICATION BASED ON CONTEXT BASED                          (B) Now we have an Image and some words which
IMAGE RETRIEVAL AND WORKING PROCEDURE                         contain the top priority from each page.
                                                              (C) I upload an image to search the related images and its
The one of the future advancement of the CBIR is to           description.
develop a platform for the users on which someone             (D) The Context Based Image Searching is done to find
upload a image, query processor calculate the distance        the related images.
between the images of the database & according to the         (E) After searching, the words are also collected along
closeness of the images(distance between the images) it       with the related images of the desired Image.
shows the related results for that image. Let suppose I am    (F) Now one more filtering algorithm is apply for finding
a noob for Egypt and walking into the streets of Cairo. I     the exact keyword related to that image, the frequency of
saw a monument, and I am eager to know about that then        each word is calculated from the different results.
I just capture the image of it and upload on an application   (G) Now we assign the top priority to the word which
of my mobile. The application processed the query image       contains the highest frequency.
                                                                                                              SIP0401-4
CONFERENCE ON “SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM (SPRTOS)” MARCH 26-27 2011
ACKNOWLEDGMENTS
REFERENCES
                                                                                       SIP0401-5
       CONFERENCE ON “SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM (SPRTOS)” MARCH
       26-27 2011
                                            S.N. Panda,
                                       Department of Physics,
                                      Gunupur College, Gunupur,
                                            Orissa, India
                                                                                          SIP0402-1
CONFERENCE ON “SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM (SPRTOS)” MARCH 26-27
2011
= x(m) sin z
                N                2 sin (n m) z cos z
                       x(n)                                                     Equations (4) and (5) show that no
               n m 1               sin (n m 1) z
                                 N
                                                                        complex multiplication is required during
= x(m) sin z    2 cos z                  x(n) sin (n m) z               the recursive computation. Equation (5) is a
                               n m 1                                    discrete time recursive transfer function of
                               N
                                 x(n) sin (n m 1) z                     finite duration input sequence, x(n), n = N,
                           n m 2                                        N-1, …,2,1. As a consequence, X(k) is
                                     N
                                                                        obtained as the output of a finite impulse
= x(m) sin z       2 cos z                x(n) sin (n m) z              response system. Fig. 1 shows the recursive
                                 n m
                           N                                            structure with the input sequence in reverse
                                x(n) sin (n m 1) z                      order for the realisation of X(k).
                       n m 2
                                                                                                                          SIP0402-2
  CONFERENCE ON “SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM (SPRTOS)” MARCH 26-27
  2011
   Input sequence
x(1), …, x(n-1), x(n)
                                                             Z-1
                                                                                     sin k
                                                                                       2N         Output X(k)
                                                                                x(1), …, x(n-
                                              2 cos k
                                                                                   1), x(n)
                                                      N
                                          -1 x(1), …, x(n-
                                                              Z-1
                                                1), x(n)
    III. COMPARISONS WITH RELATED WORKS                      proposed algorithm are compared with the
                                                             corresponding parameters based on the other
         The proposed approach requires N                    methods.
  multiplications per point, and (2N-2)
  additions per point for the realisation of N                       Table III gives the comparison of the
  length DST.                                                computation complexities of the proposed
                                                             algorithm with other algorithms found in the
         In Tables I and II, the number of                   related research works.
  multipliers and the number of adders in the
                                     TABLE I
      COMPARISON OF THE NUMBER OF MULTIPLIERS REQUIRED BY DIFFERENT ALGORITHMS
                                       TABLE II
          COMPARISON OF THE NUMBER OF ADDERS REQUIRED BY DIFFERENT ALGORITHMS
                                                                                                     SIP0402-3
CONFERENCE ON “SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM (SPRTOS)” MARCH 26-27
2011
                                        TABLE III
                                 COMPUTATION COMPLEXITIES
                                of multiplications              of additions
Proposed algorithm              N                               2N-2
[13]                            (3/4) N log2N - N + 3           (7/4) N log2N - 2N + 3
[14,16,20,23]                   (1/2) N log2N                   (3/2) N log2N - N + 1
[15,24,25]                      N log2N /2 + 1                  3 N log2 N / 2 -N +1
[18]                            (1/2) N log2N + (1/4) N-1       (3/2) N log2N + (1/2) N-2
[21]                            2(N+3)(N-1) / N                 2(2N-1)(N-1) / N
[22]                            (N+1)(N-1) / N                  (2N+1)(N-1) / N
[26] if N is even               2N-3                            3N+2
[26] if N is odd                2(N-1)                          3N+4
        IV. SYSTOLIC ARCHITECTURE                 and the rest (N-1) output are obtained in
                                                  subsequent (N-1) time-steps. However,
        The structure of the proposed linear      successive sets of N-point DSTs are obtained
systolic array for computation of N-point         in every N time-steps. Each PE of the linear
DST is shown in Fig. 2. It consists of (N+1)      array comprises of one multiplier and two
locally connected processing elements (PEs)       adders, while the last PE contains one adder
of which the first N PEs are identical. The       and one multiplier. The duration of the cycle
recurrence relation given by (3) is               period is T = TM + 2TA, where TM and TA are,
implemented in the first N PEs, while the         respectively, the times involved in
last PE computes the DST components.              performing one multiplication and one
Function of each of the first N PEs is shown      addition in the PE. This architecture requires
in Fig. 3 and that of the last PE is shown in     N multiplications per point and (2N-2)
Fig. 4. One sample of the input data is fed to    additions per point for realisation of N-point
each PE, one time-step staggered with             DST. The hardware - and time-complexities
respect to the input of previous PE in the        of the proposed systolic realisation along
reverse order i.e, i th input sample is fed to    with those of the existing structures [27] -
(N+1-i) th PE in (N+1-i) th time-step. The        [31] are listed in Table IV.
first output is obtained after (N+1) time steps
                                                                                       SIP0402-4
CONFERENCE ON “SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM (SPRTOS)” MARCH 26-27 2011
                                       x(n-1)
                       x(n)              0
2 cosz
                                                                           (N-1) TH                     N TH   V1   (N+1) TH
     0               1ST PE            2ND PE                                                                                  OUTPUT
                                                                              PE                         PE          PE [S]
                                                                                                               V2
     0
                                                                                                                                SIP0402-5
CONFERENCE ON “SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM (SPRTOS)” MARCH 26-27
2011
xin
                                       ain                                      aout
                                       bin                     PE               bout
                                       cin                                      cout
                                  aout =ain
                                  bout = xin + ain bin - cin
                                  cout = bin
                                  xin = Input sample
                                          TABLE IV
 HARDWARE - AND TIME-COMPLEXITIES OF PROPOSED STRUCTURE AND THE EXISTING SYSTOLIC STRUCTURES
                                      FOR THE DST / DCT
                                                                                           Average Computation
      Structures              Multipliers                Adders       Cycle-Time (T)
                                                                                                 - Time
Pan and Park [27]         N                        2N                TM + TA               NT/2
                                                                                                       SIP0402-6
CONFERENCE ON “SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM (SPRTOS)” MARCH 26-27
2011
[2] H.B. Kekre and J.K. Solanka,                 [11]     W.H. Chen, C.H. Smith and S.C.
    “Comparative performance of various                   Fralick, “A fast computational
    trigonometric unitary transforms for                  algorithm for the discrete cosine
    transform image coding,” Int. J.                      transform”,      IEEE      Trans.
    Electron., vol. 44, pp 305-315, 1978.                 Communicat., vol. COM-25, no. 9,
                                                          pp. 1004-1009, Sep. 1977.
[3] A.K. Jain, “A sinusoidal family of
    unitary transforms,” IEEE Trans. Patt.       [12]     P. Yip and K.R. Rao, “A fast
    Anal. Machine Intell., vol. PAMI-I, pp                computational algorithm for the
    356-365, September 1979.                              discrete sine transform”, IEEE Trans.
                                                          Commun., vol. COM-28, pp. 304-
[4] Z. Wang and B. Hunt, “The discrete W                  307, Feb. 1980.
    transform,” Applied Math Computat.,
    vol. 16, pp 19-48, January 1985.             [13]     Z. Wang, “Fast algorithms for the
                                                          discrete W transform and for the
[5] S. Poornachandra, V. Ravichandran and                 discrete Fourier transform”, IEEE
    N.Kumarvel, “Mapping of discrete                      Trans. Acoust., Speech, Signal
    cosine transform (DCT) and discrete                   Processing, vol. ASSP-32, pp. 803-
    sine transform (DST) based on                         816, Aug. 1984.
    symmetries” IETE Journal of Research,
    Vol. 49, no. 1, pp 35-42, January-           [14]     P. Yip and K.R. Rao, “Fast
    February 2003.                                        decimation-in-time algorithms for a
                                                          family of discrete sine and cosine
[6] S. Cheng, “Application of the sine                    transforms”, Circuits, Syst., Signal
    transform method in time of flight                    Processing, vol. 3, pp. 387-408,
    positron emission image reconstruction                1984.
    algorithms,” IEEE Trans. BIOMED.
                                                                                     SIP0402-7
CONFERENCE ON “SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM (SPRTOS)” MARCH 26-27
2011
[15]   H.S. Hou, “A fast recursive                     Electronics Letters, vol. 30, no. 3,
       algorithm for computing the discrete            Feb. 1994.
       cosine transform”, IEEE Trans.
       Acoust., Speech, Signal Processing,      [23]   Peizong Lee and Fang-Yu Huang,
       vol. ASSP-35, no. 10, pp. 1455-                 “Restructured recursive DCT and
       1461, Oct. 1987.                                DST algorithms”, IEEE Transactions
                                                       on Signal Processing,” vol. 42, no.
[16]   O. Ersoy and N.C. Hu, “A unified                7, pp. 1600-1609, July 1994.
       approach to the fast computation of
       all      discrete       trigonometric
       transforms,” in Proc. IEEE Int. Conf.    [24]   V. Britanak, “On the discrete cosine
       Acoust., Speech, Signal Processing,             computation”, Signal Process., vol.
       pp. 1843-1846, 1987.                            40, no. 2-3, pp. 183-194, 1994.
[17]   H.S. Malvar, “Corrections to fast        [25]   C.W. Kok, “Fast algorithm for
       computation of the discrete cosine              computing        discrete     cosine
       transform and the discrete hartley              transform”, IEEE Trans. Signal
       transform,” IEEE Trans. Acoust.,                Process., vol. 45, pp. 757-760, Mar.
       Speech, Signal Processing, vol. 36,             1997.
       no. 4, pp. 610-612, Apr. 1988.
                                                [26]   V. Kober, “Fast recursive algorithm
[18]   P. Yip and K.R. Rao, “The                       for sliding discrete sine transform”,
       decimation-in-frequency algorithms              Electronics Letters, vol. 38, no. 25,
       for a family of discrete sine and               pp. 1747-1748, Dec. 2002.
       cosine transforms”, Circuits, Syst.,
       Signal Processing, vol. 7, no. 1, pp.    [27]   S.B. Pan and R.H. Park, “Unified
       3-19, 1988.                                     systolic array for computation of
                                                       DCT / DST / DHT”, IEEE Trans.
[19]   A. Gupta and K.R. Rao, “A fast                  Circuits Syst. Video Technol., vol. 7,
       recursive algorithm for the discrete            no. 2, pp.413-419, April 1997.
       sine transform” IEEE Transactions
       on Acoustics, Speech and Signal          [28]   W.H. Fang and M.L. Wu, “Unified
       Processing, vol. 38, no. 3, pp. 553-            fully-pipelined implementations of
       557, March, 1990.                               one- and two-dimensional real
                                                       discrete trigonometric trnasforms”,
[20]   Z. Cvetković and M.V. Popović,                  IEICE Trans. Fund. Electron.
       “New fast recursive algorithms for              Commun. Comput. Sci., vol. E82-A,
       the computation of discrete cosine              no. 10, pp. 2219-2230, Oct. 1999.
       and sine transforms”, IEEE Trans.
       Signal Processing, vol. 40, no. 8, pp.   [29]   D.F. Chiper, M.N.S. Swamy, M.O.
       2083-2086, Aug. 1992.                           Ahmad, and T. Stouraitis, “A systolic
                                                       array architecture for the discrete
[21]   J. Caranis, “A VLSI architecture for            sine transform”, IEEE trans. Signal
       the real time computation of discrete           Process., vol. 50, no. 9, pp. 2347 -
       trigonometric transform”, J. VLSI               2354, Sept. 2002.
       Signal Process., no. 5, pp. 95-104,
       1993.                                    [30]   P.K. Meher, “A new convolutional
                                                       formulation of the DFT and efficient
[22]   L.P. Chau and W.C. Siu, “Recursive              systolic implementation”, in Proc.
       algorithm for the discrete cosine               IEEE Int. Region 10 Conf.
       transform with general lengths”,                (TENCON’05), pp. 1462-1466, Nov.
                                                       2005.
                                                                                   SIP0402-8
CONFERENCE ON “SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM (SPRTOS)” MARCH 26-27
2011
                                                                            SIP0402-9
CONFERENCE ON “SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM (SPRTOS)” MARCH 26-27
2011
Abstract: This paper presents a new approach                 Edge detection is an important task in image
to edge detection using wavelet transforms.                  processing. It is a main tool in pattern
First, we briefly introduce the development of               recognition, image segmentation, and scene
wavelet analysis. Then, some major classical                 analysis. An edge detector is basically a high
edge detectors are reviewed and interpreted                  pass filter that can be applied to extract the
with    continuous       wavelet   transforms.   The         edge points in an image. This topic has
classical edge detectors work fine with high-                attracted   many     researchers       and    many
quality pictures, but often are not good enough              achievements have been made [14]-[20]. In
for    noisy   pictures    because      they   cannot        this paper, we will explain the mechanism of
distinguish edges of different significance. The             edge detectors from the point of view of
proposed       wavelet     based   edge    detection         wavelets and develop a way to construct edge
algorithm combines the coefficients of wavelet               detection filters using wavelet transforms.
transforms      on   a    series   of   scales   and                 Many classical edge detectors have
significantly improves the results. Finally, a               been developed over time. They are based on
cascade algorithm is developed to implement                  the principle of matching local image segments
the wavelet based edge detector.                             with   specific   edge     patterns.   The    edge
                                                             detection is realized by the convolution with a
Keywords: wavelet transform, canny edge                      set of directional derivative masks [21]. The
detector, sobel edge detector, noise.
                                                             popular edge detection operators are Roberts,
INTRODUCTION                                                 Sobel, Prewitt, Frei-Chen, and           Laplacian
     An edge in an image is a contour
                                                             operators ( [17], [18], [21], [22] ). They are all
across which the brightness of the image
                                                             defined on a 3 by 3 pattern grid, so they are
changes abruptly. In image processing, an
                                                             efficient and easy to apply. In certain situations
edge is often interpreted as one class of
                                                             where the edges are highly directional, some
singularities. In a function, singularities can be
                                                             edge detector works especially well because
characterized easily as discontinuities where
                                                             their patterns fit the edges better.
the gradient approaches infinity. However,
image data is discrete, so edges in an image                 Noise and its influence on edge detection
often are defined as the local maxima of the                         However, classical edge detectors
gradient. This is the definition we will use here.           usually fail to handle images with strong noise,
                                                                                                     SIP0403-1
CONFERENCE ON “SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM (SPRTOS)” MARCH 26-27
2011
                                                                                                                        SIP0403-2
CONFERENCE ON “SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM (SPRTOS)” MARCH 26-27
2011
The edge pattern of this edge detector makes                 A 3×3 sub image b of an image f may
it especially sensitive to edges with a slope        be thought of as a vector in R . For example,
                                                                                   9
Sobel edge detector The edge patterns are shown in fig. 1.4
images in the edge space are typical edge signal-to-noise ratio but also decreases the
patterns with different directions; the other sub localization by the same factor. This suggests
images resemble lines and blank space. maximizing the product of the two. So the
Therefore, the angle θE is small when the sub object function is defined as:
                                                                                                       SIP0403-4
CONFERENCE ON “SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM (SPRTOS)” MARCH 26-27
2011
In many applied areas like digital signal processing,    obtained from Vj+1 by a dilation of factor 2. V0 is
time-frequency analysis is critical. That is, we want    spanned by a function φ that satisfies
to know the frequency properties of a function in a
local time interval. Engineers and mathematicians
developed analytic methods that were adapted to                                                     (1.6)
these problems, therefore avoiding the inherent
difficulties in classical Fourier analysis. For this     Equation (1.6) is called the “two-scale equation”,
purpose, Dennis Gabor introduced a “sliding-             and it plays an essential role in the theory of
window” technique. He used a Gaussian function g         wavelet bases.
as a “window” function, and then calculated the
Fourier transform of a function in the “sliding          Edge detector using wavelets
window”. The analyzing function is                                 Now that we have talked briefly about the
                                                         development of edge detection techniques and
                                                         wavelet theories, we next discuss how they are
The Gabor transform is useful for time-frequency
                                                         related. Edges in images can be mathematically
analysis. The Gabor transform was later
                                                         defined as local singularities. Until recently, the
generalized to the windowed Fourier transform in
                                                         Fourier transforms was the main mathematical tool
which g is replaced by a “time local” function
                                                         for analyzing singularities. However, the Fourier
called the “window” function. However, this
                                                         transform is global and not well adapted to local
analyzing function has the disadvantage that the
                                                         singularities. It is hard to find the location and
spatial resolution is limited by the fixed size of the
                                                         spatial distribution of singularities with Fourier
Gaussian envelope [13]. In 1985, Yves Meyer
                                                         transforms. Wavelet analysis is a local analysis, it
([23], [24]) discovered that one could obtain
                                                         is especially suitable for time-frequency analysis
orthonormal bases for L2(R) of the type
                                                         [1], which is essential for singularity detection.
                                                         This was a major motivation for the study of the
                                                         wavelet transform in mathematics and in applied
                                                         domains. With the growth of wavelet theory, the
and that the expression
                                                         wavelet transforms have been found to be
                                                         remarkable mathematical tools to analyze the
                                                         singularities including the edges, and further, to
for decomposing a function into these orthonormal        detect them effectively. This idea is similar to that
wavelets converged in many function spaces.              of John Canny [4]. The Canny approach selects a
Themost preeminent books on wavelets are those           Gaussian function as a smoothing function θ; while
ofMeyer ([23], [24]) and Daubechies. Meyer               the wavelet-based approach chooses a wavelet
focuses on mathematical applications of wavelet          function to be θ0. Mallat, Hwang, and Zhong ( [5],
theory in harmonic analysis; Daubechies gives a          [6] ) proved that the maxima of the wavelet
thorough presentation of techniques             for      transform modulus can detect the location of the
constructing wavelet bases with desired properties,      irregular structures. Further, a numerical procedure
along with a variety of methods for mathematical         to calculate their Lipschitz exponents has been
signal analysis [14]. A particular example of an         provided. One and two-dimensional signals can be
orthonormal wavelet system was introduced by             reconstructed, with a good approximation, from the
Alfred Haar. However, the Haar wavelets are              local maxima of their wavelet transform modulus.
discontinuous and therefore poorly localized in          The wavelet transform characterizes the local
frequency. Stéphane Mallat made a decisive step in       regularity of signals by decomposing signals into
the theory of wavelets in 1987 when he proposed a        elementary building blocks that arewell localized
fast algorithm for the computation of wavelet            both in space and frequency. This not only explains
coefficients. He proposed the pyramidal schemes          the underlying mechanism of classical edge
that decompose signals into subbands. These              detectors, but also indicates a way of constructing
techniques can be traced back to the 1970s when          optimal edge detectors under specific working
they were developed to reduce quantization noise.        conditions.
The framework that unifies these algorithms and
the theory of wavelets is the concept of a multi-
resolution analysis (MRA). AnMRA is an                   Results:
increasing sequence of closed, nested subspaces
                                                         Multiscale edge detection
{Vj}j∈ Z that tends to L2(R) as j increases. Vj is
                                                                                                  SIP0403-5
CONFERENCE ON “SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM (SPRTOS)” MARCH 26-27
2011
         Wavelet filters of large scales are        method gives more continuous and precise
more effective for removing noise, but at the       edges. Table 1 shows that the SNR of the
same time increase the uncertainty of the           edges obtained by the multiscale wavelet
location of edges. Wavelet filters of small         transform is significantly higher than others.
scales preserve the exact location of edges,
but cannot distinguish between noise and real
edges. We can use the coefficients of the
wavelet transform across scales to measure
the local Lipschitz regularity. That is, when the
scale increases, the coefficients of the wavelet              (a)             (b)                 (c)
transformare likely to increase where the            Fig. 1.5: Edge detection for Lena image: (a) The
Lipschitz regularity is positive, but they are      Lena image; (b) Edges by the Canny edge detector;
                                                     (c) Edges by the multiscale edge detection using
likely   to   decrease   where   the   Lipschitz
                                                                    wavelet transform
regularity is negative. We know that locations
with lower Lipschitz regularities are more likely
to be details and noise. As scale increases,
the coefficients of the wavelet transform
increase for step edges, but decrease for Dirac
and fractal edges. So we can use a larger-
scale wavelet at positions where the wavelet
transform decreases rapidly across scales to
remove the effect of noise, while using a
smaller-scale wavelet at positions where the
wavelet transform decreases slowly across                                    (a)
scale to preserve the precise position of the
edges. Using the cascade algorithm in, we can
observe the change of the wavelet transform
coefficient between each adjacent scales, and
                                                                     (b)                (c)
distinguish different kind of edges. Then we
can keep the scales small for locations with
positive Lipschitz regularity and increase the
scales for locations with negative Lipschitz
regularity. Fig. 1.5 shows that for a image                          (d)                 (e)
without noise, the result of our method is            Fig. 1.6: Edge detection for a block image with
similar to that of Canny’s edge detection. For noise: (a) A block image (SNR=10db); (b) Edges by
images with white noise in Fig. 1.6 – 1.10, our the Sobel edge detector; (c) Edges by Canny edge
                                                                                               SIP0403-6
CONFERENCE ON “SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM (SPRTOS)” MARCH 26-27
2011
                                                                   (c)                     (d)
                                                       Fig. 1.8: Edge detection for a bridge image with
                                                      noise: (a) Bridge image (SNR=30db); (b) Edges by
                                                      the Sobel edge detector; (c) Edges by Canny edge
             (a)                        (b)             detection with adjusted variance; (d) Edges by
                                                           multi-level edge detection using wavelet
              (c)                        (d)
  Fig. 1.7: Edge detection for a Lena image with
 noise: (a) Lena image (SNR=30db); (b) Edges by
the Sobel edge detector; (c) Edges by Canny edge                   (a)                      (b)
  detection with adjusted variance; (d) Edges by
     multi-level edge detection using wavelets
                                                                       (c)                   (d)
                                                       Fig. 1.9: Edge detection for a pepper image with
                                                      noise: (a) Pepper image (SNR=10db); (b) Edges by
                                                      the Sobel edge detector; (c) Edges by Canny edge
                                                        detection with adjusted variance; (d) Edges by
                                                           multi-level edge detection using wavelet
                                                                                              SIP0403-7
CONFERENCE ON “SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM (SPRTOS)” MARCH 26-27
2011
                                                                                                          SIP0403-8
CONFERENCE ON “SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM (SPRTOS)” MARCH 26-27
2011
                                                                               SIP0403-9
   CONFERENCE ON “SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM (SPRTOS)” MARCH 26-27 2011
II DCT, which is widely, used in practice for                           implemented in four steps. In first step
speech and image compression applications as                            adjustment of local brightness is achieved. Local
part of various standards [7]. Equation (1)                             brightness is adjusted by mapping the DC
represents two dimensional DCT where C(k,l)                             coefficients of each sub block of Y(u,v) using a
represents transformed DCT coefficients for the                         monotonically increasing function ψ(x) [8]
input image x(m,n) assuming a square image of                           which is shown in fig.1. While mapping the
size (N×N).                                                             coefficients, DC coefficient is treated separately
                                                                        as compared to rest of the AC coefficients.
                         N 1N 1
                                                (2m 1) k     (2n 1) l
C (k , l )   (k ) (l )            x(m, n) cos            cos            Mapping function for DC coefficient is
                         m 0n 0
                                                   2N           2N
0    k, l    N 1
                                                                                                  Y 0, 0
                                                                 (1)          DC                                8
                                                                            y mapped   Ymax                                    (2)
where                                                                                                 Ymax
               1                                   2                    where
        0            and k                l
             N                                     N
     for 1 k , l N            1                                                                       p1
                                                                                                  x
                                                                                       n1     1            0        x m
                                                                                                  m
Contrast of an image is defined using as change                                 x
                                                                                                               p2
in luminance with respect to surrounding to                                                     x m
                                                                                       n    1 n                     ,m   x 1
luminance of surround. Hence contrast can be                                                    1 m
thought of as the ratio between standard                                      and 0 m n 1; p1 , p 2            0
deviation (σ) to mean (µ) value of the image.
The greater the value of standard deviation more                        ymax is the maximum brightness value of the
is the contrast.                                                        image before transforming using DCT. There
                                                                        are various monotonic increasing functions
   3. THE PROPOSED ALGORITHM
                                                                        available in the literature [4] and [7]. No single
Image in RGB format space is converted into Y-
                                                                        function is best suitable for all the images for
Cb-Cr color space to find out luminance and
                                                                        enhancement purpose. We choose ψ(x) as its
chromatic component individually. Then Y, Cb,
                                                                        value can be modified using four parameters
Cr component is split into (8×8) sub blocks
                                                                        such as m, n, p1, p2. We varied the values for m,
respectively. Then for each sub block DCT-II is
                                                                        n, p1, p2 and choose m = n = 0.5 and p1=1.8 and
computed separately to obtain Y(u,v), Cb(u,v)
                                                                        p2= 0.8 for best performance. As Y component
and Cr(u,v) respectively, where Y(u,v), Cb(u,v)
                                                                        represents the luminance component hence only
and Cr(u,v) represents the block transformed
                                                                        this component is mapped to alter its brightness
DCT coefficients and the first element of each
                                                                        leaving behind the Cb and Cr component
DCT transformed coefficient Y(0,0), Cb(0,0)
                                                                        unaltered. In the second step adjustment of local
and Cr(0,0) represents DC component and rest
                                                                        contrast is achieved by scaling the DC and AC
are AC component. Each sub block after
                                                                        coefficients of normalized Y(u,v), Cb(u,v) and
computing its DCT coefficient is normalized by
                                                                        Cr(u,v). The scale factor „s‟ is defined as the
a factor of 8. The proposed algorithm is
                                                                        ratio between mapped DC coefficient for each
                                                                                                                          SIP0404-2
CONFERENCE ON “SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM (SPRTOS)” MARCH 26-27 2011
normalized sub block (8×8) of Y(u,v) to the            value of standard deviation which is image
original DC coefficient. As DC component               dependent and to be decided based on the
gives the information about mean of brightness         amount of blocking artifact removal. Each
distribution of each sub block hence it is used to     normalized 8×8 sub block of Y(u,v), Cb(u,v)
compute the scale factor„s‟. Assuming 8 bit            and Cr(u,v) are subdivided into four 4×4 sub
representation while scaling overflow of gray          blocks. and the scale factor „s‟ is recomputed
values may occur beyond 255 which is taken             through the earlier mentioned steps of this
care by limiting the scale factor depending upon       algorithm. Only those sub blocks will be scaled
the image. In the third step preservation of color     where        threshold condition is met leaving
is achieved through scaling of normalized              behind the remaining sub blocks unaltered.
Cb(u,v) and Cr(u,v) component through the              Then corresponding sub blocks of Y, Cb and Cr
same scale factor „s‟ corresponding to each            is scaled through the new scale factor in order to
normalized sub block of Y(u,v). Since the              remove the artifacts. Finally image is
mapping from RGB to Y-Cb-Cr is non linear              reconstructed in spatial domain by combing Y,
and Cb, Cr depends on Y hence while scaling            Cb and Cr components.
the color component DC coefficients has to be
treated separately.                                        4. QUALITY ASSESMENT
                                                       Simulation is performed on various images
                                                       using MATLAB. As the proposed algorithm is
                                                       based on DCT so for assessing quality PSNR
                                                       and SNR is not a suitable option as prior
                                                       information regarding the type of distortion is
                                                       not available with us. We have used no-
Similarly for normalized Cr(u,v) is to be scaled       reference perceptual quality assessment for
                                                       JPEG compressed images [9] where quality
using the above mentioned procedure. Finally
                                                       metric that incorporates human visual system
blocking artifacts are suppressed. As this             characteristics which do not require the input
algorithm is developed around type–II DCT              image for computing the quality. Based upon
hence blocking artifacts are visible in the            this a quality score is obtained which reflects the
processed image because of discontinuities in          amount of blocking artifact removal and
gray values. There are several methods available       distortion removal due to non linear mapping. If
to minimize the blocking artifacts but they are        the quality score is nearer to 10 it reflects the
                                                       best quality image and 1 represents worst
computationally exhaustive. We have proposed
                                                       quality image. Wang et al. [9] suggested no
a simple method to minimize blocking artifacts         reference quality metric for computing the
and at the same time it requires less                  quality of JPEG image. The computation of this
computation. For this purpose standard                 metric is described in [9] where they have cited
deviation (σ) is computed for each normalized          the website which contains the MATLAB code
sub block of Y(u,v). When (σ) represents a large       for computing the quality score. We have used
value then it is concluded that corresponding          the same MATLAB code for evaluation of
                                                       quality and called as quality score. Quality score
sub block contains a large variation of gray
                                                       obtained for different images is tabulated in
values which results in blocking artifacts. If         table 1.
      threshold where threshold represents threshold
                                                                     Table 1. Quality Score
                                                                                                SIP0404-3
CONFERENCE ON “SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM (SPRTOS)” MARCH 26-27 2011
                      Before       After
                      artifact    artifact
                     removal     removal
(c) (d)
                                                                                                 SIP0404-4
CONFERENCE ON “SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM (SPRTOS)” MARCH 26-27 2011
                                                       ACKNOWLEDGMENT
                                                       The authors acknowledge the DST-TIFAC
                                                       CORE      on      “3G/4G      Communication
                                                       Technologies” received by National Institute of
       (a)                           (b)               Science and Technology from Department of
                                                       Science & Technology (DST), Government of
                                                       India.
                                                       REFERENCES
                                                       [1] Gonzalez, Rafael C. and Woods, Richard E.
                                                           Digital Image Processing, Pearson, Prentice
                       (c)                                 Hall, Third edition, 2008.
                                                       [2] Aghagolzadeh, S. and Erosy, O. K.
Fig 4.(a) Image_3 (b) enhanced image by                    “Transform image enhancement,” Opt. Eng.,
scaling all components including Cb and Cr (c)             vol.31, pp.614-626, Mar.1992.
enhanced image with blocking artifacts removal         [3] Tang, J., Peli, E., and Acton, S. “Image
                                                           enhancement using a contrast measure in the
                                                           compressed domain,” IEEE Signal Process.
                                                           Lett. Vol.10, pp.289-292, Oct. 2003.
                                                       [4] Lee, S. “An efficient content – based image
                                                           enhancement in the compressed domain
                                                           using retinex theory,” IEEE Trans. Circuits
         (a)                          (b)
                                                           Syst. Video Technol., vol. 17,no. 2, pp. 199-
                                                           213, feb.2007.
                                                       [5] Wang, Z. “Fast algorithms for the discrete w
                                                           transform for the discrete fourier transform,”
                                                           IEEE Trans. On ASSP, vol. 32. No. 4. pp.
                                                           803-816, Aug. 1984.
                       (c)
                                                       [6] Martucci, S.A. “Symmetric convolution and
Fig 5.(a)Image_4 (b) enhanced image by scaling             the discrete sine and cosine transforms.”
all components including Cb and Cr (c)                     IEEE Trans. On signal Processing, vol.42,
enhanced image with blocking artifacts removal             no. 5, pp.1038-4051, May. 1994.
                                                       [7] Rao, K. and Huang, J. “Techniques and
                                                           standards for image, video, and audio
CONCLUSION                                                 coding,” Prentice Hall, Upper Saddle River,
In this paper, we have presented a simple                  NJ. 1996.
method for enhancing the color image in                [8] De, T.K. “A simple programmable S-
compressed format by scaling luminance and                 function for digital image processing,” in
chromatic components using less computational              Proc. 4th IEEE Region 10th Int. Conf.,
overhead. Quality score is computed which                  Bombay, India, pp. 573-576.Nov.1989.
proves the performance of proposed method.             [9] Wang, Z., Sheikh, H.R. and Bovik, A.C.
The proposed algorithm can be implemented on               “No-reference perceptual quality assessment
any image processing hardware.
                                                                                               SIP0404-5
CONFERENCE ON “SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM (SPRTOS)” MARCH 26-27 2011
   of JPEG compressed images,” in Proc. Int.               vol. 1. pp. 477-480, Sep. 2002.
   Conf. Image Processing, Rochester, NY,
                                                                                             SIP0404-6
CONFERENCE ON “SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM (SPRTOS)” MARCH 26-27 2011
Abstract—Processing of multimedia data acquires large                   Existing correlation in neighboring pixels causes the
transmission bandwidth and storage capacity. Reduction in          redundant information in images. So less correlated
these parameters introduces the concept of data compression.
For achieving the better compression without degrading the         representation of image required. Two fundamental
image quality, data compression techniques become the              components of compression are redundancy and
challenge for the researchers. Numerous image coding               irrelevancy reduction. Redundancy reduction aims at
techniques i.e. subband coding, EZW, SPIHT, EBCOT,
                                                                   removing duplication from the signal source
wavelet transform coding have been presented. In this paper
performance comparison of these coding techniques is               (image/video). Irrelevancy reduction omits parts of the
presented.                                                         signal that will not be noticed by the signal receiver,
Keywords—Wavelet transform, EBCOT, SPIHT, EZW,                     namely the Human Visual System (HVS). In general, three
subband coding, JPEG                                               types of redundancy can be identified. Image compression
                                                                   research aims at reducing the number of bits needed to
                    I.       INTRODUCTION                          represent an image by removing the spatial and spectral
                                                                   redundancies as much as possible.
     Uncompressed multimedia (audio and video) data
                                                                        a. Spatial Redundancy; correlation between
requires considerable storage capacity and transmission
                                                                             neighboring pixel values.
bandwidth. Despite rapid progress in mass-storage density,
                                                                        b. Spectral Redundancy; correlation between
processor speeds, and digital communication system
                                                                             different color planes or spectral bands.
performance, demand for data storage capacity and data-
                                                                        c. Temporal Redundancy; correlation between
transmission bandwidth continues to outstrip the
                                                                             adjacent frames in a sequence of images (in video
capabilities of available technologies. The recent growth of
                                                                             applications).
data intensive multimedia-based web applications have not
                                                                        In lossless compression schemes, the reconstructed
only sustained the need for more efficient ways to encode
                                                                   image, after compression, is numerically identical to the
signals and images but have made compression of such
                                                                   original image. An image reconstructed following lossy
signals central to storage and communication technology.
                                                                   compression contains degradation relative to the original.
For still image compression, the `Joint Photographic
                                                                   Often this is because the compression scheme completely
Experts Group' or JPEG standard has been established by
                                                                   discards redundant information. However, lossy schemes
ISO (International Standards Organization) and IEC
                                                                   are capable of achieving much higher compression. Under
(International Electro-Technical Commission). The
                                                                   normal viewing conditions, no visible loss is perceived. In
performance of these coders generally degrades at low bit-
                                                                   predictive coding, information already sent or available is
rates mainly because of the underlying block-based
                                                                   used to predict future values, and the difference is coded.
Discrete Cosine Transform (DCT) scheme. More recently,
                                                                   Since this is done in the image or spatial domain, it is
the wavelet transform has emerged as a cutting edge
                                                                   relatively simple to implement and is readily adapted to
technology, within the field of image compression.
                                                                   local image characteristics. Transform coding, on the other
Wavelet-based coding provides substantial improvements
                                                                   hand, first transforms the image from its spatial domain
in picture quality at higher compression ratios. The large
                                                                   representation to a different type of representation using
storage space, large transmission bandwidth, and long
                                                                   some well-known transform and then codes the
transmission time is required for image, audio, and video
                                                                   transformed values. This method provides greater data
data. At the present state of technology, the only solution
                                                                   compression compared to predictive methods, although at
is to compress multimedia data before its storage and
                                                                   the expense of greater computation.
transmission, and decompress it at the receiver for play
back.                                                                            III. COMPRESSION TECHNIQUES
                                                                                                                 SIP0405-1
 CONFERENCE ON “SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM (SPRTOS)” MARCH 26-27 2011
       In subband coding [4], an image is decomposed into                        The Fourier Transform separates the waveform into a
 asset of band-limited components, called subbands, which                  sum of sinusoids of different frequencies and identifies
 can be resembled to reconstruct the original image without                their respective amplitudes. Thus it gives us a frequency-
 error. Each subband is generated by band pass filtering the               amplitude representation of signal. In STFT [6], non-
 input. Since the bandwidth of the resulting subbands is                   stationary signal is divided into small portions, which are
 smaller than that of the original image, the subbands can                 assumed to be stationary. This is done using a window
 be downsampled without loss of information.                               function of chosen width, which is shifted and multiplied
 Reconstruction of the original image is accomplished by                   with the signal to obtain the small stationary signals. The
 upsampling, filtering, and summing the individual                         Fourier Transform is then applied to each of these portions
 subbands. Fig.1 shows the principal components of a two-                  to obtain the STFT of the signal. The problem with STFT
 band subband coding and decoding system. The input of                     goes back to the Heisenberg uncertainty principle which
 the system is a 1-D, band-limited discrete-time signal x(n)               states that it is impossible for one to obtain which
 for n= 0,1,2....; the output sequence x‟(n) is formed                     frequencies exist at which time instance, but, one can
 through the decomposition of x(n) into y0(n) and y1(n) via                obtain the frequency bands existing in a time interval. This
 analysis filters g0(n) and g1(n). Filter h0(n) is a low pass              gives rise to the resolution issue where there is a trade-off
 filter whose output is an approximation of x(n); filter h1(n)             between the time resolution and frequency resolution. To
 is a high pass filter whose output is high frequency or                   assume stationarity, the window is supposed to be narrow,
 detail part of x(n). All the filters Are selected in such a               which results in a poor frequency resolution, i.e., it is
 way so that the input can be reconstructed perfectly such                 difficult to know the exact frequency components that
 that x‟(n) = x(n).                                                        exist in the signal; only the band of frequencies that exist is
                                                                           obtained. If the width of the window is increased,
                   ho(n)          2         2        go(n)                 frequency resolution improves but time resolution
                                                                   x‟(n)
                                                                           becomes poor, i.e., it is difficult to know what frequencies
x(n)
                                                                           occur at which time intervals. Once the window function
                   h1(n)          2                  g1(n)                 is decided, the frequency and time resolutions are fixed for
                                            2
                                                                           all frequencies and all times.
                                                                                                                            SIP0405-2
CONFERENCE ON “SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM (SPRTOS)” MARCH 26-27 2011
having N components, for example, is expressed by an N x                  1.   A discrete wavelet transforms which provides a
N matrix.                                                                      compact multiresolution representation of the
    The generic form for a1-D wavelet transform is shown                       image.
in Fig.3. Here a signal is passed through a low pass and                  2.   Zero tree coding which provides a compact
high pass filter, h and g, respectively, then downsampled                      multiresolution representation of significance
by a factor of 2, constituting one level of transform.                         maps, which indicates the position of significant
Multiple levels or scales of the wavelet transform are made                    coefficients. Zero trees allow the successful
by repeating the filtering and decimation on low pass                          prediction of insignificant coefficients across
branch outputs only. The process is typically carried out                      scales to be efficiently represented as a part of
for a finite number of levels K, and the resulting                             growing trees.
coefficients, di1 (n), i {1,....K} and dk0(n), and are called             3.   Successive Approximation which provides a
wavelet coefficients.                                                          compact multiprecision representation of the
                                                                               significant coefficients and facilitates the
                             d10(n)                          dk0(n)            embedding algorithm.
         h            2                       h          2
                                                                          4.   Adaptive multilevel arithmetic coding which
                                                                               provides a fast and efficient method for entropy
         g            2                       g          2
                                                                               coding string of symbols, and requires no pre-
                             d11(n)                          dk1(n)
                                                                               stored tables.
                                                                          5.   The algorithm runs sequentially and stops
             Fig.3. Generic form of 1-D wavelet transforms
                                                                               whenever a target bit rate is met.
     The 1-D wavelet transform can be extended to a 2-D
                                                                           A significant map defined as an indication of whether
wavelet transform using separable wavelet filters. With
                                                                      a particular coefficient was zero or nonzero (i.e.,
separable filters the 2-D transform can be computed by
                                                                      significant) relative to a given quantization level. The
applying a 1-D transform to all the rows of input, and then
                                                                      EZW algorithm [2] determined a very efficient way to
repeating on all of the columns. Fig.4 shows an example of
                                                                      code significance maps not by coding the location of the
three-level (k=3) 2-D wavelet expansion, where k
                                                                      significant coefficients, but rather by coding the location of
represents the highest level of the decomposition of the
                                                                      the zeros. It was found experimentally that zeros could be
wavelet transform.
                                                                      predicted very accurately across different scales in the
                                                                      wavelet transform. Defining a wavelet coefficient as
                LL2         HL2
                                                                      insignificant with respect to a threshold T if |x | < T, the
                                          HL1                         EZW algorithm hypothesized that “if a wavelet coefficient
                LH2          HH                                       at a coarse scale is insignificant with respect to a given
                              2
                                                                      threshold T, then all wavelet coefficients of the same
                                                                      orientation in the same spatial location at finer scales are
                      LH1                  HH                         likely to be insignificant with respect to T.” Recognizing
                                            1                         that coefficients of the same spatial location and frequency
                                                                      orientation in the wavelet decomposition can be compactly
               Fig.4 Three-level 2-D wavelet expansion
                                                                      described using tree structures, the EZW called the set of
                                                                      insignificant coefficients, or coefficients that are quantized
d.   Embedded Zero tree Wavelet (EZW) Compression                     to zero using threshold T, zero-trees.
     In octave-band wavelet decomposition each
coefficient in the high-pass bands of the wavelet transform
has four coefficients corresponding to its spatial position in
the octave band above in frequency. Because of this very
structure of the decomposition, encoding of coefficients
required to achieve better compression results. Lewis and
Knowles [5] in 1992 were the first to introduce a tree-like
data structure to represent the coefficients of the octave
decomposition. Later, in 1993 Shapiro [2] called this
structure zero tree of wavelet coefficients, and presented
his elegant algorithm for entropy encoding called
Embedded Zero tree Wavelet (EZW) algorithm. EZW
algorithm contains the following features
                                                                                                                      SIP0405-3
CONFERENCE ON “SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM (SPRTOS)” MARCH 26-27 2011
                Fig.5 Tree structure of wavelet transform          algorithm. They also present a scheme for progressive
      Consider the tree structures on the wavelet transform        transmission of the coefficient values that incorporates the
shown in Fig.5. In the wavelet decomposition, coefficients         concepts of ordering the coefficients by magnitude and
that are spatially related across scale can be compactly           transmitting the most significant bits first. SPIHT uses a
described using these tree structures. With the exception of       uniform scalar quantizer and claim that the ordering
the low resolution approximation (LL1) and the highest             information made this simple quantization method more
frequency bands (HL1, LH1, and HH1) each parent                    efficient than expected. An efficient way to code the
coefficient at level i of the decomposition spatially              ordering information is also proposed. Results from the
correlates to 4 (child) coefficients at level i -1of the           SPIHT coding algorithm in most cases surpass those
decomposition which are at the same frequency                      obtained from EZQ algorithm.
orientation. For the LLk band, each parent coefficient             f.    Scalable Image Compression with EBCOT
spatially correlates with 3 child coefficients, one each in             This algorithm is based on independent Embedded
the HLk, LHk, and HHk bands. The standard definitions of           Block Coding with Optimized Truncation of the embedded
ancestors and descendants in the tree follow directly from         bit-streams (EBCOT). EBCOT algorithm [1] uses a
these parent- child relationships. A coefficient is part of a      wavelet transform to generate the subband coefficients
zero-tree if it is zero and if all of its descendants are zero     which are then quantized and coded. Although the usual
with respect to the threshold T. It is also a zero-tree root if    dyadic wavelet decomposition is typical, other "packet"
is not part of another zero-tree starting at a coarser scale.      decompositions are also supported and occasionally
Zero-trees are very efficient for coding since by declaring        preferable. Scalable compression refers to the generation
only one coefficient a zero-tree root, a large number of           of a bit-stream which contains embedded subsets, each of
descendant coefficients are automatically known to be              which represents an efficient compression of the original
zero. The compact representation, coupled with the fact            image at a reduced resolution or increased distortion. A
that zero-trees occur frequently, especially at low bit rates,     key advantage of scalable compression is that the target
make zero-trees efficient for coding position information.         bit-rate or reconstruction resolution need not be known at
      EZW       implements       successive      approximation     the time of compression. Another advantage of practical
quantization through a multipass scanning of the wavelet           significance is that the image need not be compressed
coefficients using successively decreasing thresholdsT0,           multiple times in order to achieve a target bit-rate, as is
T1,T2 ,.... . The initial threshold is set to the value of T 0 =   common with the existing JPEG compression standard.
2[log2 xmax], where xmax is the largest wavelet coefficient.       Rather than focusing on generating a single scalable bit-
Each scan of wavelet coefficients is divided into two              stream to represent the entire image, EBCOT partitions
passes: dominant and subordinate. The dominant pass                each subband into relatively small blocks of samples and
establishes a significance map of the coefficients relative        generates a separate highly scalable bit-stream to represent
to the current threshold Ti. Thus, coefficients which are          each so-called code-block. The algorithm exhibits state-of-
significant on the first dominant pass are known to lie in         the-art compression performance while producing a bit-
the interval [T0 ,2T0 ) , and can be represented with the          stream with an unprecedented feature set, including
reconstruction value of (3T 0/2). The dominant pass                resolution and SNR scalability together with a random
essentially establishes the most significant bit of binary         access property. The algorithm has modest complexity and
representation of the wavelet coefficient, with the binary         is extremely well suited to applications involving remote
weights being relative to the thresholds Ti.                       browsing of large compressed images.
e.    Set Partitioning in Hierarchical Trees (SPIHT)                          IV. PERFORMANCE COMPARISION
     Said and Pearlman [3], offered an alternative
explanation of the principles of operation of the EZW
algorithm to better understand the reasons for its excellent
performance. According to them, partial ordering by
magnitude of the transformed coefficients with a set
partitioning sorting algorithm, ordered bit plane
transmission of refinement bits, and exploitation of self-
similarity of the image wavelet transform across different
scales of an image are the three key concepts in EZW. In
addition, they offer a new and more effective
implementation of the modified EZW algorithm based on
set partitioning in hierarchical trees, and call it the SPIHT
                                                                                                                  SIP0405-4
CONFERENCE ON “SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM (SPRTOS)” MARCH 26-27 2011
  45
                          PSNR (Lena)                                  ideas found in the EZW algorithm. The wavelet coders are
                                                                       much closer to the EZW algorithm than to the subband
  40
                                                                       coding. SPIHT became very popular since it was able to
  35                                                                   achieve equal or better performance than EZW without
  30                                                                   having to use an arithmetic encoder. The reduction in
                                                               SC
  25                                                                   complexity from eliminating the arithmetic encoder is
                                                               WT
                                                                       significant. Another technique, EBCOT algorithm, has
  20                                                           EZW     been chosen as the basis of the JPEG 2000 standard. The
  15                                                           SPIHT   performance comparison of these techniques has been
  10                                                           EBCOT   discussed in the previous section. By comparing the EZW,
   5                                                                   subband coding and other techniques, because of the
                                                                       multiresolution property and its performance of the lossy
   0
        0.0625    0.125      0.25          0.5         1
                                                                       wavelet image coding technique have matured
                                                                       significantly and provides a very strong basis for the new
                  Fig.6 (a) PSNR results for LENA                      JPEG 2000 coding standard.
                          PSNR (Barbara)
  40
  35
                                                                                               VI. REFRENCES
  30
                                                                       [1] Taubman, D. „High Performance Scalable Image
  25                                                                       Compression with EBCOT‟, IEEE Tran. IP, Mar. 1999
                                                           EZW
  20                                                                   [2] Shapiro, J. M. „Embedded Image Coding Using Zerotrees of
                                                           SPIHT
                                                                           Wavelet Coefficients‟, IEEE Trans. SP, vol. 41, no. 12, Dec.
  15                                                       EBCOT           1993, pp. 3445-3462.
  10                                                                   [3] Said, A. and Pearlman, W. A. „A New, Fast and Efficient
                                                                           Image Codec Based on Set Partitioning in Hierarchical
   5
                                                                           Trees‟, IEEE Trans. CSVT, vol. 6, no. 3, June 1996, pp. 243-
   0                                                                       250,
         0.0625      0.125          0.25         0.5       1           [4] Woods, J. W. and O'Neil, S. D. „Subband Coding of Images‟
                                                                           IEEE Trans. ASSP, vol. 34, no. 5, October 1986, pp. 1278-
                    Fig.6 (b) PSNR results for BARBARA
                                                                           128
                                                                       [5] Lewis, A. S. and Knowles, G. „Image Compression Using
                                                                           the 2-D Wavelet Transform‟, IEEE Trans. IP, vol. 1, no. 2,
                          V. CONCLUSION                                    April 1992, pp. 244-250.
    A number of coding techniques have been proposed                   [6] Gonzalez, R.C. and Woods, R.E., Digital Image Processing,
since the introduction of the EZW algorithm. A common                      2nd edition, Pearson Education, 2004, pp. 409 – 510.
characteristic of these techniques is that they use the basic
                                                                                                                         SIP0405-5
CONFERENCE ON ―SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM (SPRTOS)‖ MARCH 26-27 2011
                                                                                                      SIP0406-1
  CONFERENCE ON ―SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM (SPRTOS)‖ MARCH 26-27 2011
                                                                                                                merge
Split
                                                            K
                                                   K
                                                                        (b ) Inverse transforms.
        (a) Forward transformation.
                                                            Fig 2 Lifting based DWT&IDWT.
                                                                                                       SIP0406-2
CONFERENCE ON ―SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM (SPRTOS)‖ MARCH 26-27 2011
The inverse DWT can be derived by traversing              The architecture proposed by Lian, et al. in [2]
above steps in the reverse direction, first scaling the   consists of two pipeline stages, with three pipeline
low-pass and high-pass sub band inputs by K and           registers, R1, R2 and R3. In the (9, 7) type filtering
1/K respectively, and then applying the dual and          operation, intermediate data (R3) generated after
primal lifting steps after reversing the signs of         the first two lifting steps (Phase 1) are folded back
coefficients in      and      and finally the inverse     to R1 (as shown in Fig.5) for computation of the
lazy transform by up-scaling the output before            last two lifting steps (phase 2). The architecture can
merging them into a single reconstructed stream as        be reconfigured so that computation of two phases
shown in Fig.2 (b)                                        can be interleaved by selection of appropriate data
3. Lifting Architecture for 1D DWT                        by the multiplexors. As a result, two delay registers
                                                          (D) are needed in each lifting step in order to
The data dependencies in the lifting scheme can be        properly schedule the data in each phase. Based on
explained with the help of an example of DWT              the phase of interleaved computation, the
filtering with four factors (or four lifting steps).      coefficient for multiplier M1 is either α or γ, and
The four lifting steps correspond to four stages as       similarly the coefficient for multiplier M2 is β or δ
shown in Fig. 3. The intermediate results generated       .The hardware utilization of this architecture is
in the first two stages for the first two lifting steps   always 100%. Note that for the (5, 3) type filter
are subsequently processed to produce the high-           operation, folding is not required.
pass (HP) outputs in the third stage, followed by
the low-pass (LP) outputs in the fourth stage. (9, 7)     3.3 MAC Based Programmable Architecture [3]
filter is an example of a filter that requires four
lifting steps. For the DWT filters requiring only          A programmable architecture that implements the
two factors, such as the (5, 3) filter, the               data dependencies represented in Fig.3 using four
intermediate two stages can simply be bypassed            MACs (Multiply and Accumulate) and nine
                                                          registers has been proposed by Chang et al. in [3].
3.1 Direct Mapped Architecture                            The algorithm is executed in two phases as shown
                                                          in Fig. 6 The data-flow of the proposed architecture
A direct mapping of the data dependency diagram           can be explained in terms of the register allocation
into a pipelined architecture was proposed by Liu         of the nodes. The computation and allocation of the
et al. in [7] and described in Fig .4 the architecture    registers in phase 1 are done in the following order.
is designed with 8 adders (A1–A8), 4 multipliers
(M1–M4), 6 delay elements (D) and 8 pipeline              R0          s2i-1 ;  R2          s2i
registers (R). There are two input lines to the           R3          R0 + α (R1+R2);
architecture: one that inputs even samples (s2i) and      R4          R1 +β (R5+R3);
the other one that inputs odd samples (s2i+1). There      R8          R5 + γ (R6+R4);
are four pipeline stages in the architecture. In the      Output LP            R6+δ (R7+R8);
first pipeline stage, adder A1computes s2i + s2i+1and     Output HP                  R8
adder A2 computes α (s2i+s2i-2)+s2i-1 The output of
A2 corresponds to the intermediate results                Similarly, the computation and register allocation
generated in the first stage of Fig3. The output of       in phase 2 are done in the following order.
adder A4 in the second pipeline stage corresponds
to the intermediate results generated in the second       R0             s2i+1; R1          s2i+2;
stage of Fig.3. Continuing in this fashion, adder A6      R5             R0+ α (R2+R1);
in the third pipeline stage produces the high-pass        R6             R2 + β (R3+R5);
output samples, and adder A8 in the fourth pipeline       Output LP               R4 +γ (R8+R7);
stage produces the low-pass output samples. For           Output HP               R7
lifting schemes that require only 2 lifting steps,        As a result, two samples are input per phase and
such as the(5,3) filter, the last two pipeline stages     two samples (LP and HP) are output at the end of
need to be bypassed causing the hardware                  every phase. For 2D DWT implementation, the
utilization to be only 50% or less. Also, for a           output samples are also stored into a temporary
single read port memory, the odd and even samples         buffer for filtering in the vertical dimension.
are read serially in alternate clock cycles and
buffered. This slows down the overall pipelined           3.4 Flipping Architecture [1]
architecture by 50% as well.
                                                          While conventional lifting-based architectures
3.2 Folded Architecture                                   require fewer arithmetic operations, they
                                                          sometimes have long critical paths. For instance,
The pipelined architecture in Fig.4 can be further        the critical path of the lifting-based architecture for
improved by carefully folding the last two pipeline       the (9, 7) filter is 4Tm + 8Ta while that of the
                                                          convolution implementation is Tm + 4Ta.
stages into the first two stages as shown in Fig.5 .
                                                                                                    SIP0406-3
       CONFERENCE ON ―SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM (SPRTOS)‖ MARCH 26-27 2011
input s0 s1 s2 s3 s4 s5 s6 s7 s8
First stage α α α α α α α α
Second stage β β β β β β β β
                           γ                γ             γ                 γ                 γ                 γ                γ                     γ              1/K
   HP output                                                                                                                                                                       HP
                               δ        δ                     δ                 δ                 δ             δ                    δ                 δ
                                                                                                                                                                               K
  LP output                                                                                                                                                                        LP
Fig.3 Data dependency diagram for lifting of filters with four factors
                                                                                                                                                                                                LP
       s2i
                       D                    R1                     A4                R2                             D                          R3                     A8           R4
                                   A1
                                                                                                                                 A5
                  s2i-2+s2                                             M2                                                                                                 M4
                                                 β                                                                                                     δ
                  α                M1
                                                                                                            γ
                                                                                                                                 M3
                                                         D             A3                                                                                                 A7
                                                                                                                                                       D                                        HP
       s2i+1
                  D                A2               R1                                                                           A6
                                                                                     R2                             D                                 R3                           R4
                               s2i-1             α (s2i+s2i-2)+s2i-1
Input
                                                    R1             D                D                 R2                                  A4               R3
                      Even                                                                                                                                                              R
                                                                                                                β, δ                                            M4
                                                                                                                                                                K
                                                                                         A1                                                   M2                      1/K
                                                                  α, γ
                                                                                        M1
                                                                                                                                                  A3                 M3
                                                                                                                                                                                            R
                      Odd                                                               A2                 R2                D                D                 R3
                                                     R1
                                                                                                                                                                                        SIP0406-4
CONFERENCE ON ―SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM (SPRTOS)‖ MARCH 26-27 2011
One way of improving this is by pipelining which                           critical path. . The critical path is now Tm + 5Ta.
results in a significant increase in the number of                         The minimum critical path of Tm can be achieved
registers. For instance, to pipeline the lifting-based                     by 5 pipelining stages using 11 pipelining registers
(9,7) filter such that the critical path is Tm + 2Ta, 6                    (not shown in the figure). Detailed hardware
additional registers are required. C.T. Huang,[1]                          analysis of lossy (9, 7), integer (9, 7) and (6, 10)
proposed a very efficient way of solving the timing                        filters have been included in [1]. Furthermore,
accumulation problem The basic idea is to remove                           since the flipping transformation Changes the
the multiplications along the critical path by scaling                     round-off noise considerably, techniques to address
the remaining paths by the inverse of the multiplier                       precision d noise problems have also been
coefficients. Fig.7 (a)–(b) describes how scaling at                       addressed in [1].
each level can reduce the multiplications in the
Input R1 R0 R2 R0 R1 R0 R2 R0 R1
First stage R3 R5 R3 R5
Second stage R4 R6 R4 R6 R4
HP output R7 R8 R7 R8 1/K HP
LP output
                                                                                                                            K       LP
Fig. 6 Data-flow and registers allocation of the MAC based architecture
                    z-1                                                                         z-1
                                                                                          1/α   1/α
         α              α         z-1                                                 1
                                                                                                    1/α        z-1
                                                                                                      1/β      1/β
                    β             β          z-1                                                1
                                                                                                                             z-1
                                                                                                                1/β
                                                                                                                      1/γ   1/γ
                                   γ         γ          z-1                                                    1
                                                                                                                                              z-1
                                                                                                                              1/γ
                                                                                                                            1 1/δ       1/δ
                                             δ          δ
                                                                                                                                          1/δ
HP LP 1/K K
HP LP
Fig 7 A flipping architecture [1]. (a) Original architecture, (b) Scaling the coefficients to reduce the number of
multiplications .
                                                                                                                                  SIP0406-5
CONFERENCE ON ―SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM (SPRTOS)‖ MARCH 26-27 2011
However, the conventional lifting scheme adopts               We can compare the performances of different
the serial operation to process these intermediate            architecture on the basis of hardware requirement
data; thus, the critical path latency is very long. We        and critical path latency. The hardware complexity
know that the way of processing the intermediate              has been described in terms of data path
data determines the hardware scale and critical path          components. Comparison of different architecture
latency of the implementing architecture. Since               shown in table I
some intermediate data are on different paths, we
can calculate them in parallel. With this parallel
operation, the critical path latency is reduced, and
the number of registers is decreased. Therefore it is
called as efficient folded. The critical path latency
is reduces up to Tm+Ta.
Flipping+        4                8                11             Tm              complex         2
5stage                                                                                            input/output
pipeline
5. Conclusion Reference
In this paper, we presented comparison of the                 [1] C.T. Huang, P.C. Tseng, and L.G. Chen,
existing lifting based implementations of 1-                  ―Flipping    Structure:   An    Efficient  VLSI
dimensional Discrete Wavelet Transform. We                    Architecture for Lifting-Based Discrete Wavelet
briefly described the principles behind the lifting           Transform,‖ in IEEE Transactions on Signal
scheme in order to better understand the different            Processing, 2004, pp. 1080–1089.
implementation styles and structure. We provided a            [2] C.J Lian, K.F. Chen, H.H. Chen, and L.G.
systematic derivation of each architecture and                Chen, ―Lifting Based Discrete Wavelet Transform
evaluated them with respect to their hardware and             Architecture for JPEG2000,‖ in IEEE International
timing requirements.
                                                                                                    SIP0406-6
CONFERENCE ON ―SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM (SPRTOS)‖ MARCH 26-27 2011
                                                                                         SIP0406-7
CONFERENCE ON “SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM (SPRTOS)” MARCH 26-27 2011
Abstract-The de-noising of an image corrupted by           tend to blur edges and other fine image
salt and pepper has been a classical problem in            details. Therefore nonlinear filters [1, 2] are
image processing. In the last decade, various
modified median filtering schemes have been
                                                           most preferred over linear filters due to their
developed, under various signal/noise models, to           improved filtering performance in terms of
deliver improved performance over traditional              noise suppression and edge preservation.
methods. In this paper a simple method called              The standard median (SM) filter [3] is the
Inerpolate Median Filter (IMF) is proposed to              one of the most robust nonlinear filters,
restore the images corrupted by salt and pepper
noise. The proposed method works better in
                                                           which exploits the rank-order information of
preserving image details by suppressing noise. The         pixel intensities within filtering window.
experimental results show that the proposed                This filter is very popular due to its edge
algorithm outperforms the conventional Median              preserving characteristics and its simplicity
filter and other algorithms like mimum-                    in implementation. Various modifications of
maximumum exclusive mean filter (MMEM),
Adaptive median filtering(AMF) in terms of signal
                                                           the SM filter have been introduced, such as
to noise ratio.                                            the weighted median (WM) [4] filter. By
                                                           incorporating noise detection mechanism
                                                           into the conventional median filtering
Key words- Image de-noising, Interpolate median            approach, the filters like switching median
filter, nonlinear filter, salt & pepper noise
                                                           filters [5, 6] had shown significant
             I. INTRODUCTION                               performance improvement. The median
                                                           filter, as well as its modifications and
   An image is often corrupted by noise                    generalizations[7] are typically implemented
during its acquisition and transmission.                   invariably across an image. Examples
Image de-noising is used to reduce the noise               include the mimum-maximumum exclusive
while retaining the important features in the              mean filter (MMEM)[8], Florencio‟s [9],
image. Always there exists a tradeoff                      Adaptive median filter(AMF)[10]These
between the removed noise and the blurring                 filters    have    demonstrated      excellent
in the image. The intensity of impulse noise               performance but the main drawbacks of all
has the tendency of being either relatively                these filters are, they are prone to edge
high or relatively low, which will degrade                 jitters in the cases where noise density is
the image quality. Therefore image de-                     high, large widow size results in blurred
noising is used as preprocessing to edge                   images and significant computational
detection, image segmentation and object                   complexity. To solve this problem, a
recognition etc.                                           modified median filter algorithm called
A variety of filtering techniques has been                 Interpolate Median filter that employs
proposed for enhancing images degraded by                  Interpolated search in determining the
noise. The classical linear digital image                  desired central pixel value is proposed.
filters, such as averaging lowpass filters,
                                                                                             SIP0407-1
CONFERENCE ON “SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM (SPRTOS)” MARCH 26-27 2011
   The paper is organized as follows: Section    considered with the middle pixel value. The
II gives brief review of mean and median         median filter, especially with larger window
filtering. The new approach, The Interpolate     size destroys the fine image details due to its
Median filter technique is explained in
                                                 rank ordering process. Figure1. illustrates an
section III. Experimental results are
presented in section IV. Finally in section V,   example calculation.
we give the conclusion.
                                                 Neighborhood values: 115, 119, 120, 123,
    II MEAN & MEDIAN FILTERING                   124, 125, 126, 127, 150
MEAN FILTER                                      Median value: 124
   Mean filtering is a simple and easy to
implement method of smoothing images, i.e.
it reduces the amount of intensity variation      110       125       125        130      140
between one pixel and the next. It is often       123       124       126        127      136
used to reduce noise in images.
   The idea of mean filtering is simply to        114       120       150        125      134
replace each pixel value in an image with
                                                  118       115       119        123      134
the mean (`average') value of its neighbors,
including itself. The drawback of this            111       116       111        120      131
algorithm is, it has the effect of eliminating
pixel values which are unrepresentative of       Fig. 1. Calculating the median value of a 3x3 pixel
their surroundings. With salt and pepper         neighborhood. The central pixel value of 150 is rather
noise, image gets smoothed with a 3×3            unrepresentative of the surrounding pixels and is
                                                 replaced with the median value: 124
mean filter. Since the shot noise pixel values
are often very different from the surrounding
values, they tend to significantly distort the      III INTERPOTATE MEDIAN FILTER
pixel average calculated by the mean filter.
                                                 The Interpolate Median filter method
MEDIAN FILTER                                    considers each pixel in the image in turn and
   The median filter is normally used to         looks at its neighbors to decide whether or
reduce noise in an image like the mean           not it is representative of its surroundings.
filter; however, it does well in preserving      Instead of replacing the pixel value with the
useful details in the image. Unlike the mean     median of neighboring pixel values, it
filter, the median filter considers each pixel   replaces it with the interpolation of those
in the image and instead of simply replacing     values.
the pixel value with the mean of neighboring
                                                  The interpolation is calculated by first
pixel values; it is replaced with the median
                                                 sorting all pixel values from surrounding
of those values. The median is calculated by
                                                 neighborhood into numerical order and then
first sorting all the pixel values from the
                                                 replacing the pixel being considered with
surrounding neighborhood into numerical
                                                 the interpolation pixel value. The calculation
order and then replacing the pixel being
                                                 of interpolation value is derived from the
                                                                                        SIP0407-2
CONFERENCE ON “SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM (SPRTOS)” MARCH 26-27 2011
Interpolation search technique used for           levels Table 1, illustrates the PSNRs of the
searching the elements. We can also call it a     six de-noising methods. The peak signal-to-
Non- linear filter or order-static filter         noise ratio (PSNR) in decibels (dB), is
because there response is based on the            defined as
ordering or ranking of the pixels contained
within the mask. The advantages of this                                 2552
filter over mean and median filter are, it          PSNR 10 log              (dB)                     (3)
                                                                        MSE
gives more robust average than both the
methods, for some pixels in the
neighborhood; it creates new pixel values                        1 m1n1                           2
                                                   with MSE                 I (i, j ) K (i, j )       (4)
like mean filter and for some it will not                        mn i 0 j 0
create new pixel value like median filter, It
has the characteristics of both filters.
                                                  where I and K being the original image and
                                                  denoised image, respectively. Figure 2,
The algorithm uses the fallowing formula          shows the original test images used for
                                                  experiments and Figure 3, shows the Lena
           Key (a[l ]) a[h]) / 2                  image corrupted by salt and pepper noise by
                                            (1)
                                                  20% (dB).
IV EXPERIMENTAL RESULTS
Table 1. PSNR Performance of Different Algorithms         [9] T. Sun and Y. Neuvo, “Detail-preserving median
for Lena image corrupted with salt and pepper noise            based filters in image processing,”    Pattern
                                                               Recognit. Lett., vol. 15, no. 4, pp. 341–347,
Algorithm                        Noise Density in dB           Apr.1994.
                                                          [10] A. Sawant, H. Zeman, D. Muratore, S. Samant,
                        10%        20%        30%              and F. DiBianka, “An adaptive median filter
MF(3x3)                31.19      28.48      25.45             algorithm to remove impulse noise in X-ray and
MF(5x5)                29.45      28.91      28.43             CT images           and speckle in ultrasound
                                                               images,” Proc.SPIE vol. 3661,pp. 1263–1274,
MMEM [8]               30.28      29.63      29.05             Feb. 1999.
Florencio‟s [9]        33.69      32.20      30.95
AMF(5x5) [10]          30.11      28.72      27.84
IMF(Proposed)          33.86      30.59      25.75
V CONCLUSION
REFERENCES
                                                                                               SIP0407-4
 CONFERENCE ON “SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM (SPRTOS)” MARCH 26-27 2011
Abstract: The rapid development of technologies and steady            using a simple metric and the images are compared with one
growing amounts of digital information highlight the need of          another based on those extracted features. These three features
developing an accessing system. Content-based image indexing          are integrated into one method to improve the retrieval
and retrieval has been an emerging research area from the last        efficiency. Those images which have similar features would
few decades. In this, the project approaches content based image
                                                                      have similar content as well. Focus of this project is on
retrieval using low level features such as color, shape and texture
to investigate samples of blood cells through the images to aid       medical diagnosis in which CBIR can be used to detect the
diagnosing disease by identifying similar cases in a medical          disease by identifying similar cases in a medical database.
database. Medical images are classified in terms of diseases and
by using query image the relevant image is retrieved along with                          II. PROPOSED METHOD
the classification of disease. The histogram of red, green, and           Content-based Image Retrieval (CBIR) consists of
blue color components is analyzed. The wavelet decomposition is       retrieving the most visually similar images to a given query
also used to analyze texture. In addition, morphological              image from a database of images. CBIR from medical image
operations such as opening and closing are applied to analyze         databases does not aim to replace the physician by predicting
object shape. Lastly, color, texture, and shape in image retrieval
                                                                      the disease of a particular case but to assist him/her in
are integrated in order to increase the retrieval accuracy.
                                                                      diagnosis. The visual characteristics of a disease carry
Keywords: Text Based Image Retrieval (TBIR), Content Based            diagnostic information and oftentimes visually similar images
Image Retrieval (CBIR)                                                correspond to the same disease category. By consulting the
                                                                      output of a CBIR system, the physician can gain more
                      I.   INTRODUCTION                               confidence in his/her decision or even consider other
    In today world the word knowledge has exchanged its               possibilities.
meaning with the information and hence to the data. In                    However, due to the existence of a large number of
addition to it the rapid development of technologies in digital       medical image acquisition devices, medical images are
field and computing hardware makes the digital acquisition of         distinct and require a specific design of CBIR systems. The
information to be more in demand and popular.                         goals of medical information systems have been defined to
    Consequently many digital images are being captured and           deliver the needed information at the right time, the right place
stored such as medical images, architectural and engineering          to the right person in order to improve the quality and
images, advertising, design and fashion images, etc., and as a        efficiency of care processes. In the medical domain, images
result large image databases are being created and used in            from the same disease class as the query image must be
many applications. However, the focus of our study is on              retrieved in order to help the doctor in diagnosis. The images
medical images in this work. A large number of medical                in the medical database are labeled by a specialist to ensure
images in digital format are generated by hospitals and               that they are less subjective than those of the generic CBIR.
medical institutions every day. So, how to make use of this           Figure 1 represents the framework of the CBIR system. This
huge amount of images effectively becomes a challenging               level of retrieval is based on the primitive features. The
problem.                                                              following are some of the primitive features such as
    In order to overcome this problem the most common
approach that had been used previously for image retrieval                     Color
from a database was Text Based Image Retrieval (TBIR).                         Texture
    But later introduced image retrieval based on content                      Shape or the spatial location of image element.
which is known as Content Based Image Retrieval (CBIR). In
TBIR, all medical images are labeled with text which is               A. COLOR ANALYSIS
manmade and may be different for individuals for the similar               Color is one of the most important features that make the
images. Another drawback of TBIR is that all images                   image recognition possible by human. It is a property that
especially medical images are difficult to be described by text.      depends on the reflection of light to the eye and the processing
Drawback of TBIR can be overcome by CBIR.                             of that information in the brain. Color will be used every day
    In CBIR, the features from images are extracted using             to differentiate objects, places, etc. where colors are defined in
different methods. The features include color, texture and            three dimensional color spaces such as RGB (Red, Green, and
shape. Color histogram is the main method to represent the            Blue), HSV(Hue, Saturation, and Value) or HSB (Hue,
color information of the image. A method called the pyramid-          Saturation, and Brightness). Most image formats use the RGB
structured wavelet transform for texture classification is used.      color space to store information. Most image formats such as
The number of oval objects in the query image is calculated
                                                                                                                     SIP0427-1
CONFERENCE ON “SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM (SPRTOS)” MARCH 26-27 2011
JPEG, BMP, GIF, use the RGB color space to store                       Where considering the samples a and b, n is the number
information.                                                      of partitions, and ai, bi are the number of members of samples
                                                                  a and b in the ith partition. The Bhattacharya coefficient will
                                                                  range from 0 to 1 where 1 represents the completely similar
                                                                  image and 0 indicates that there is no similarity in two images
                                                                  [9].
                                                                  B) TEXTURE ANALYSIS:
                                                                       A texture is a measure of the variation of the intensity of a
                                                                  surface, quantifying properties such as smoothness, coarseness
                                                                  and regularity. The most popular representation of texture is
                                                                  Wavelet Transform.A method called the pyramid-structured
                                                                  wavelet transform for texture classification is used. It
                                                                  decomposes sub-signals in the low frequency channels
                                                                  recursively. It is mainly trivial for textures with dominant
                                                                  frequency channels. For this reason, it is mostly suitable for
                                                                  signals consisting of components with information
                                                                  concentrated in lower frequency channels. Since most of the
                                                                  information exists in lower sub band of the image due to the
                                                                  natural image properties, the pyramid-structured wavelet
                  Figure: 1 Proposed CBIR System                  transform is highly sufficient. Using the pyramid structured
                                                                  wavelet transform, [6] the texture image is decomposed into
     The RGB color space is defined as a unit cube with red,
                                                                  four sub images, in low-low, low-high, high-low and high-
green, and blue axes. Thus, a vector with three co-ordinates
                                                                  high sub-bands. At this point, the energy level of each sub-
represents the color in this space which represents black when
                                                                  band is calculated which is the first level decomposition. In
all of them set to zeros and represents white when all three
                                                                  this study, fifth level decomposition is obtained by using the
coordinates are set to 1.
                                                                  low-low sub-band for further decomposition. The reason for
1) Algorithm for Color Analysis:
                                                                  this is the basic assumption that the energy of an image is
         i.    Color histograms of query image and images in a
                                                                  concentrated in the low-low band. For this reason the wavelet
               database are calculated and put them into two
                                                                  function used is the Daubechies wavelet.
               different vectors.
                                                                  1) Algorithm for Texture Analysis:
        ii.    Use this vector to calculate Bhattacharya
                                                                           i.     Decompose the image using pyramid –
               coefficient of query image with each image in
                                                                                  structures Wavelet Transform (till fifth level
               data base.
                                                                                  decomposition).
       iii.    The Bhattacharya coefficient is 1 for completely
                                                                          ii.     Build a histogram of the transformed image
               similar image and 0 indicates that there is no
                                                                                  coefficients in each sub band.
               similarity in two images. It ranges from 0 to 1.
                                                                         iii.     Calculate signature Vector for each image by
     In CBIR, color histogram is the main method to represent
                                                                                  concatenation of these histograms.
the color information of the image. A color histogram is a type
                                                                         iv.      Compute L1- distance using equation 2 of Query
of bar graph, where each bar represents a particular color of
                                                                                  image with all images in data base.
the color space being used. A histogram is a probability
                                                                       In order to characterize the image texture at different
density function. It represents discrete frequency distribution
                                                                  scales, the distribution of the wavelet coefficients in each sub
for a grouped dataset, which includes different discrete values
                                                                  band of such decomposition is characterized by an image
that are grouped into a number of intervals [12]. An image
                                                                  signature. An image signature is defined by building a
histogram refers to the probability density function of the
                                                                  histogram of the transformed image coefficients in each sub
image intensities. This is extended for color images to capture
                                                                  band. As images are decomposed with a pyramidal scheme on
the intensities of the three-color channels.
                                                                  Nl levels, they consist of 3 * Nl + 1 sub bands: there are 3 sub
     In this project the color histograms of query image and
                                                                  bands of details at each scale l <= Nl (lHH, lHL and lLH) plus
images in a database are calculated and put them into two
                                                                  an approximation (NlLL), 3*Nl+1 histograms are thus built.
different vectors and compare them using Bhattacharya
                                                                  The signature is a vector formed by the concatenation of these
coefficient. The Bhattacharya coefficient is an approximate
                                                                  histograms. The distance used to compare two images Im1
measurement of the amount of overlap between two statistical
                                                                  and Im2 based on the L1-distance between histograms or 2
samples. The coefficient can be used to determine the relative
                                                                  signatures.
closeness of the two samples being considered.
                               n
                                                                              The distance measure is given
        BhattacharyaCoeff           (   ai    bi)   (1)
                              i 1
                                                                                                                 SIP0427-2
CONFERENCE ON “SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM (SPRTOS)” MARCH 26-27 2011
                         3 Nl 1                                                                          III. RESULT
        d (Im1 , Im2 )                   t ( H t1 H t2 )         (2)              In our classification system, the ground truth database is
                             t 1                                              made of 25 blood cell images with two different
                                   NB                                         classifications. Classification is based on type of disease i.e.,
                Ht1 Ht2                  Ht1 ( j ) Ht2 ( j )                  sickle cell disease and cancer disease.
                                   j 1                                                 Sickle Cell disease is hereditary Blood disease
            n
        H ( j ) the value of the jth bin of the ith is normalized                      resulting from a single amino acid mutation of the red
Where      t
                                                                                       blood cells. A blood condition of anemia. People with
                                                                                       sickle cell disease have red blood cells that contain
                                         t t 1 3 Nl 1
histogram of image n and                                is a set of tunable            mostly hemoglobin S, an abnormal type of
weights.                                                                               hemoglobin. Sometimes these red blood cells become
                                                                                       crescent shaped "sickle shaped".
C) SHAPE ANALYSIS                                                                      Cancer of the myeloid line of blood cells,
     Shape may be defined as the characteristic surface                                characterized by the rapid growth of abnormal white
configuration of an object; an outline or contour. It permits an                       blood cells.
object to be distinguished from its surroundings by its outline.                       In order to increase the accuracy of retrieval result in
1) Algorithm for cell geometry analysis:                                          the proposed system, the result of color, texture and cell
        i.    Convert the image to black and white in order to                    geometric are combined so that only images which are
              prepare     for    boundary      tracing     using                  common in all the above three feature extraction will be
              bwboundaries and threshold the image.                               shown as final result. The advantages of this system are
       ii.    Remove the noise.                                                   high accuracy and precision as well as simplicity of the
      iii.    Find the boundaries.                                                algorithm.
      iv.     Determine number of oval objects in Query                                Query image is blood cell sample image of patient for
              image and all the images in database.                               diagnose of disease. Search result shows type of disease
     Based on the domain in this project which is blood cell                      patient is suffering from. If patient is not suffering from
images, the number of round objects in the image needs to be                      these two diseases then result will be shown as patient is
determined; to achieve this Convert the image to black and                        not suffering.
white in order to prepare for boundary tracing using
bwboundaries function in MATLAB.
     Then morphological operator such as opening is used to
remove the small connected objects which do not belong to
the objects of interest. The result of area and perimeter of an
object inside each image is used to form a simple metric
indicating the roundness of an object using the following
formula:
                          4     area              (3)
            Metric
                         P   Perim eter 2
                                                                                                                                       SIP0427-3
CONFERENCE ON “SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM (SPRTOS)” MARCH 26-27 2011
                            REFERENCES
[1]    “Old fashion text-based image retrieval uses FCA” by Ahamd, I.;
      Taek-Sueng Jang, published in Image Processing, 2003.ICIP
      2003.Proceedings.2003 International Conference on Image Processing.
[2]    “ Content based medical image retrieval based on pyramid structure
      wavelet” by Aliaa.A.A.Youssif*, A.A.Darwish an R.A.Mohamed
      published in IJCSNS International Journal of Computer Science and
      Network Security, VOL.10 No.3, March 2010
[3] “Content-based image retrieval from large medical databases” by Kak,
      A. Pavlopoulou, C. published in 3D Data Processing Visualization and
      Transmission, 2002,Proceedings in First International Symposium.
[4] “An Adaptive, Knowledge-Driven Medical Image Search for Interactive
      Diffuse Parenchymal Lung Disease Quantification” by Yimo Tao,
      Xiang Sean Zhou.
[5] “WEB-BASED MEDICAL IMAGE RETRIEVAL SYSTEM” by Ivica
      Dimitrovski, Dejan Gorgevik, Suzana Loskovska.
[6] Paper on “Wavelet Optimization for Content-Based Image Retrieval in
      Medical Database “by G. Quellec M. Lamard, G. Cazuguel B.
      Cochener, C. Roux.
[7] “Application of Wavelet Transform and its Advantage Compared to
      Fourier Transform” by M. Sifuzzaman1, M.R. Islam1 and M.Z Ali
      Journal of Physical Sciences, Vol. 13, 2009, 121-134.
[8] “Automatic Detection of Red Blood Cells in Hematological Images Using
      Polar Transformation and Run-length Matrix” by S. H. Rezatofighi*, A.
      Roodaki, R. A. Zoroofi R. Sharifian H. Soltanian-Zadeh published in
      ICSP2008 Proceedings. ( 978-1-4244-2179-4/08/$25.00 ©2008 IEEE)
[9] “Content-based Image Retrieval for Blood Cells” by Mohammad Reza
      Zare, Raja Noor Ainon, Woo Chaw Seng, published in 2009 Third Asia
      International Conference on Modelling & Simulation.
[10] “Digital Image Search & Retrieval uses FFT Sectors of Color Images”
      by H. B. Kekre, Dhirendra Mishra published in International Journal on
      Computer Science and Engineering.
[11] “Content Based Image Retrieval using Contourlet Transform” by
      Ch.Srinivasa rao ,S. Srinivas kumar , B.N.Chatterji in ICGST-GVIP
      Journal, Volume 7, Issue 3, November 2007.
[12] Paper on “Discrete Wavelet Transforms: Theory and Implementation
      “by Tim Edwards.
[13] “A Content-Based Retrieval System for Blood Cells Images” by Woo
      Chaw Seng and Seyed Hadi Mirisaee in 2009 International Conference
      on Future Computer and Communication.
[14] “A CBIR METHOD BASED ON COLOR-SPATIAL FEATURE” by
      Zhang Lei, Lin Fuzong, Zhang Bo.
                                                                                       SIP0427-4
                                                                                                                     1
                                                     AUDIO +
                                             Abhay Kumar
         Research Scholar at Associated Electronics Research Foundation, Phase-II Noida (U.P.)
                                         abhay.2t@gmail.com
Abstract--AUDIO+ is an electronic device that                    Very low distortion, low noise, and wide bandwidth
alter how a musical instrument or other audio                    provide superior performance in high quality audio
source sounds and can be best termed as a                        applications.
“Digital Effect Processor”. Some effects subtly
"colour" a sound, while others transform it                      LM1036 of the National Instruments is a DC
dramatically. Effects can be used during live                    controlled tone (bass/treble), volume and balance
performances (typically with keyboard, electric                  circuit for stereo applications in car radio, TV and
guitar or bass) or in the studio i.e. the faithful               audio systems. An additional control input allows
reproduction of the sound signals is heard when                  loudness compensation to be simply effected.
AUDIO+ is used in the audio line.
                                                                                    III.     DRV134
AUDIO+ has a unique quality to modify the
sound signals and make it soothing to every                      DRV134 is a differential output amplifiers that
human ear. The device is provided with the                       convert a single-ended input to a balanced output
control panel of “Volume”, “Bass”, “Treble” and                  pair. These balanced audio drivers consist of high
“Balance” to make it desirable for ear sensitive                 performance op amps with on-chip precision
to high and low frequency sound. AUDIO+ is                       resistors. They are fully specified for high
easy to use portable device with single signal                   performance audio applications, including low
input/output port and an internal power supply                   distortion (0.0005% at 1 kHz). Wide output voltage
with batteries.                                                  swing and high output drive capability allow use in
                                                                 a wide variety of demanding applications. They
Keywords: Digital audio players, Digital signal                  easily drive the large capacitive loads associated
processors, Mixed analog digital integrated circuits,            with long audio cables. Laser-trimmed matched
Digital filters, Equalizers, Digital controls.                   resistors provide optimum output common-mode
                                                                 rejection (typically 68dB), especially when
                  I.     INTRODUCTION                            compared to circuits implemented with op amps and
                                                                 discrete precision resistors. In addition, high slew
                                                                 rate (15V/μs) and fast settling time (2.5μs to 0.01%)
AUDIO+ is all about the musical sound box, which
                                                                 ensure excellent dynamic response. The DRV134
can take the raw mp3, mpeg data and process it                   has excellent distortion characteristics. Noise is
digitally. What is interesting that it can sample and            below 0.003% throughout the audio frequency range
play many sound formats starting from sampling                   under various output conditions. The gain of 6dB is
rate of 8 kHz to 96 kHz which is more than enough                seen at the output of the differential amplifier.
to play any sound format. It improves Sound quality
with significant reduction of noise and Dolby sound
effects.
V. LM1036
1.50
                                                                                                Output
                                                                                                         0.00
-1.50
                                                                                                         -3.00
                                                                                                                 0.00         10.00         20.00           30.00   40.00   50.00
                                                                                                                                               Input voltage (V)
 T 30.00u
 Output noise (V/Hz?)
20.00u
10.00u
                          0.00
                                 1     10        100            1k          10k   100k   1M   The above diagram shows that how the balanced
                                                           Frequency (Hz)                     output can be amplified and two channels can be
                                                                                              made using INA137 (Gain=1/2) and INA134
                                                                                              (Gain=1).
                                     Fig 7: Noise analysis of DRV 134
                       0.00
                                                                                                                       The AUDIO+ has a great advantage in audio
                                                                                                                       system and audio communication. That’s why an
                       -1.50
                                                                                                                       opportunity to use in digital communication and
                                                                                                                       VOIP phone.
                                                                                                                                         X. REFRENCES
                       -3.00
                               0.00              25.00             50.00                 75.00          100.00   1)    Software support and information about the digital speakers
                                                               Input voltage (V)                                       reveal from: Texas Instrument ( www.TI.com)
                                Fig 11: DC analysis of DRV 134 with INA 2137                                     2)    Audio www.ti.com/audio
                                                                                                                 3)    Data Converters dataconverter.ti.com
                                                                                                                 4)    DSP dsp.ti.com
                                                                                                                 5)    Digital Control www.ti.com/digitalcontrol
The above fig 11 shows that the output voltage
                                                                                                                 6)    Clocks and Timers www.ti.com/clocks
range between 200mVrms to 2Vrms and the sampling                                                                 7)    Logic logic.ti.com
frequency of 8 kHz to 96 kHz.                                                                                    8)    Power Mgmt power.ti.com
                                                                                                                 9)    Microcontrollers microcontroller.ti.com
                                                 VIII.         CONCLUSION                                        10)   Hardware support from: Farnell India (http://in.farnell.com/)
                                                                                                                 11)   Audio codec www.ti.com/tlv320aic3101.pdf
AUDIO+ maintains the originality of five major                                                                   12)   Audio digital processor www.ti.com/tas3103.pdf
components of sound signals:                                                                                     13)   Audio line driver www.ti.com/drv134.pdf
                                                                                                                 14)   Input amplifier www.ti.com/ina2134.pdf
                           a.         Pitch: the frequency of sound signals.                                     15)   Voltage regulator www.ti.com/tps62007.pdf,
                                           Low frequencies (Bass): Make                                               www.ti.com/tps74801.pdf, www.ti.com/tps74701.pdf,
                                                                                                                 16)   Control IC www.national.com
                                               the sound powerful.
                                           Midrange frequencies: Give
                                               sound its energy. Human being
                                               are more sensitive to midrange
                                               frequencies.
                                           High frequencies (Treble): Give
                                               sounds its presence and life like
                                               quality and lets us feel that we
                                               are close to sound source.
CONFERENCE ON “SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM (SPRTOS)” MARCH 26-27 2011
amplitude at a rate of 12 dB per octave – the      structures such as the oral cavity, nasal
measure between each harmonic .                    cavity, velum, epiglottis, tongue, etc.
The reason pitch differs between sexes is the      When air flows through the laryngeal tract,
size, mass, and tension of the laryngeal tract     the air vibrates at the pitch frequency
which includes the vocal folds and the             formed by the laryngeal tract as mentioned
glottis (the spaces between and behind the         above. Then the air flows through the
vocal folds). Just before puberty, the             supralaryngeal tract, which begins to
fundamental frequency, or pitch, of the            reverberate at particular frequencies
human voice is about 250 Hz, and the vocal         determined by the diameter and length of the
fold length is about 10.4 mm. After puberty        cavities in the supralaryngeal tract. These
the human body grows to its full adult size,       reverberations are called “resonances” or
changing the dimensions of the larynx area.        “formant     frequencies”.     In     speech,
The vocal fold length in males increases to        resonances are called formants. So, those
about 15-25 mm while female’s vocal fold           harmonics of the pitch that are closest to the
length increases to about 13-15 mm. These          formant frequencies of the vocal tract will
increases in size correlate to decreased           become amplified while the others are
frequencies coming from the vocal folds. In        attenuated
males, the average pitch falls between 60
and 120 Hz, and the range of a female’s            INTRODUCTION- Most signal processing
pitch can be found between 120 and 200 Hz.         involves processing a signal without concern
Females have a higher pitch range than             for the quality or information content of that
males because the size of their larynx is          signal. In speech processing, speech is
smaller. However, these are not the only           processed on a frame by-frame basis usually
differences between male and female speech         only with the concern that the frame is either
patterns .                                         speech or silence The usable speech frames
                                                   can be defined as frames of speech that
 FORMANT FREQUENCIES                               contain     higher     information    content
When sound is emitted from the human               compared to unusable frames with reference
mouth, it passes through two different             to a particular application. We have been
systems before it takes its final form. The
first system is the pitch generator, and the                              Similarity
next system modulates the pitch harmonics
created by the first system. Scientists call the
                                                                          Reference
first system the laryngeal tract and the                                    model                   Identification
                                                    Input    Feature                    Maximum
second system the supralaryngeal/vocal                                   (Speaker #1)                   result
                                                   speech   extraction                  selection
tract. The supralaryngeal tract consists of                                                         (Speaker ID)
SIP0502-2
Similarity
                                                                           Reference
                                                                            model
                                                                         (Speaker #N)
CONFERENCE ON “SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM (SPRTOS)” MARCH 26-27 2011
investigating a speaker identification system    speech utterance. System identifies the user
to identify usable speech frames. We then        by comparing the codebook of speech
determine a method for identifying those         utterance with those of the stored in the
frames as usable using a different approach.     database and lists, which contain the most
However, knowing how reliable the                likely speakers, could have given that
information is in a frame of speech can be       speech utterance.
very important and useful.
This is where usable speech detection and
extraction can play a very important role.
The usable speech frames can be defined as
frames of speech that contain higher
information content compared to unusable
frames with reference to a particular
application. We have been investigating a
speaker identification system to identify        At the highest level, all speaker recognition
usable speech frames .We then determine a        systems contain two main modules (refer to
method for identifying those frames as           Figure 1): feature extraction and feature
usable using a different approach.               matching. Feature extraction is the process
                                                 that extracts a small amount of data from the
PARADIGMS              OF         SPEECH         voice signal that can later be used to
RECONGITION                                      represent each speaker. Feature matching
                                                 involves the actual procedure to identify the
1. Speaker Recognition - Recognize which         unknown speaker by comparing extracted
of the population of subjects spoke a given      features from his/her voice input with the
utterance.                                       ones from a set of known speakers.
2. Speaker verification -Verify that a given
speaker is one who he claims to be. System
prompts the user who claims to be the
                                                                                                            Verification
                                                    Input      Feature                                        result
speaker to provide ID. System verifies user                                 Similarity    Decision
by comparing codebook of given speech              speech     extraction                                  (Accept/Reject)
utterance with that given by user. If it
matches the set threshold then the identity
claim of the user is accepted otherwise                                      Reference
rejected.                                        Speaker ID                               Threshold
3. Speaker identification - detects a
                                                                              model
particular speaker from a known population.
                                                   (#M)                    (Speaker #M)
The system prompts the user to provide
                                                                                              SIP0502-3
CONFERENCE ON “SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM (SPRTOS)” MARCH 26-27 2011
REFERENCES
                                                                                  SIP0502-7
Modeling of FBAR Resonator and Simulation using APLAC
                        Deepak kumar, Navaid Z.Rizvi,Rajesh Mishra
                         Gautam Buddha University,Greater Noida
                                 dkumar.gbu@gmail.com
 Abstract
                                                      as compared to silicon and furthermost the
 This Paper focuses on the analysis of the
                                                      cost of quartz wafers is significantly higher
 Film Bulk Acoustic Wave Resonator
                                                      than that of silicon.[1-7]
 (FBAR) comprising of Zinc Oxide (ZnO)
                                                      FBAR Devices
 piezoelectric thin film sandwiched
                                                      FBAR stands for Film Bilk Acoustic
 between two metal electrodes of gold (Au)
                                                      Resonator FBAR is a break through
 and located on a silicon substrate with a
                                                      resonator technology being developed by
 low stress silicon nitride (Si3N4)
                                                      Agilent technologies.Thus the technology
 supporting membrane for high frequency               can be used to create the essential
 wireless application. The film bulk                  frequency shooing elements found in
 acoustic wave technology is a promising              modern wireless systems, including filters,
 technology for manufacturing miniaturized            duplexers and resonators for oscillators.
 high performance filters for Giga Hertz              [1-3]
 range.                                               Why FBAR
 Keywords: FBAR, Quartz crystal, APLAC.               The rapid growth of wireless mobile
                                                      telecommunication system leads to
 Quartz Crystal                                       increase in demand for high frequency
 Crystal Quartz is the most important                 oscillators, filters and duplexers capable of
 resonator material presently available. It           operating in GHz frequency band range.
 has been used for 50 years, and thus                 Conventionally Liquid Crystal, microwave
 growth, characterization, and fabrication            ceramic resonators, transmission lines and
 techniques are quite mature. Its low                 SAW devices have been used as high
 coupling is usually not a disadvantage               frequency band devices. Although they
 when it is used for frequency control                provide high performance at reasonable
 applications. For reasonable values of               price but they are large in size to be able to
 transducer areas, the resistance falls in the        integrate in wireless application. SAW
 10 –20 ohm range at 5 to 20MHz. This                 have better electrical performances and
 range is ideal for oscillator circuits. Its Q is     smaller in size but they had relatively poor
 some what lower than that of ferroelectric           sensitivity to temperature, high insertion
 materials, but at lower frequencies it is            losses and limited power handling.
 more than adequate, and because the                  To cope with these limitations FBAR
 stoichmetery of the crystal quartz is simple         devices have been developed and can
 and its growth technology well                       easily replace these devices in higher
 established, there are a few crystal defects         frequency for wireless communication
 and the attenuation has frequency squared            applications.A thin film bulk acoustic
 dependence. Only when very high                      wave resonator consists basically of a thin
 frequencies or wide inductive regions are            piezoelectric layer sandwiched between
 required do designers look beyond quartz.            two electrodes. In such a resonator a
 So at higher frequencies e.g. at GHz we              mechanical wave is piezoelectrically is
 cannot use quartz and FBAR and Saw                   excited in response to an electric field
 devices are used which are much smaller              applied between the electrodes. The
 in size. Quartz also have disadvantage that          propagation direction of this acoustic wave
 it has the limits of the integration with the        is perpendicular to the surface of the
 mechanical structure and integrated circuit          resonator. For a standing wave situation to
 CONFERENCE ON “SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM (SPRTOS)” MARCH 26-27 2011
                                                                                              SIP0503-1
prevail, the acoustic energy has to be                In an LFE-FBAR, the applied electric
reflected back at the boundaries of the              field is in y-direction, and the shear
resonator. This reflectivity can be achieved         acoustic wave (excited by the lateral
by two means, either an air-interface or an          electric field) propagates in z-direction.
acoustic mirror. Piezoelectric thin films
convert electrical energy into mechanical            One      Dimensional      Acoustic-Wave
energy and vice versa. Film Bulk Acoustic            Equation:
Resonator (FBAR) consists of a                       The fundamental wave equation related to
piezoelectric thin film sandwiched by two            the longitudinal acoustic-wave generation
metal layers. A resonance condition occurs           and propagation for one dimensional case
if the thickness of piezoelectric thin film          is
(d) is equal to an integer multiple of a half
of the wavelength (λres). The fundamental
resonant frequency (Fres=1/ λres) is then                                                              (1)
inversely proportional to the thickness of
the piezoelectric material used, and is
equal to Va/2d where Va is an acoustic               Where T, S, c and mo are the mechanical
velocity at the resonant frequency (Fig. 1).         stress, the mechanical strain, the stiffness
                                                     elastic constant and the mass density of the
                                                     material, respectively.
CONFERENCE ON “SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM (SPRTOS)” MARCH 26-27 2011
                                                                                                 SIP0503-2
The following equivalent circuit models              Using boundary conditions :
are used widely for FBAR electrical                   V = -v2sin[k(z+d/2)]+v1sin[k(d/(2-z))]/sin(kd)
modeling.                                                                                         (15)
    1. Mason equivalent circuit model                By evaluating the above equations Mason
    2. Redwood equivalent circuit model              model of a piezoelectric transducer
    3. KLM equivalent circuit model                  (resonator) is obtained.
In this paper the Mason three Port
Equivalent circuit model have been used.
CONFERENCE ON “SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM (SPRTOS)” MARCH 26-27 2011
                                                                                             SIP0503-3
               Why APLAC
With the help of APLAC Circuit                       Obtained and taken values               in    the
simulation and design tool, any RF or                simulation are given in table.1:
analog circuit can be easily simulated with                             Table.1
a wide range of analysis methods.                     Ar Thi S S fp             fs    k        Q    F
Moreover, optimization, tuning and a                  ea ck 21 11                     eff           O
                                                                                      2
Monte Carlo statistical feature (for design           (F nes Mi Mi                                  M
yield) are available with every analysis              B s        n    n
methods. Through APLAC it is possible to              A of
easily simulate miniaturized structures and           R) Zn
complex system. Device models developed                    O
for large devices are inapplicable when               45 1.2 - - 2.5 2.6 0.                    1    3
nano-scale physical phenomena enter into              u    um 6 0. 93 21 0                     5    9
                                                        2
play.                                                 m          1 3 GH GH 2                   0    0
                                                                 d d z          z     6        0
            Simulation Results                                   B B                           0
Firstly simulated a ZnO FBAR structure in
Aplac8.1 version. The FBAR is having lay
an upper and bottom electrode of Au and a
membrane layer of Si3N4 for support.
Then calculated the resonance frequency
analytically and then analyzed the
simulated result which is approximately
the same.
CONFERENCE ON “SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM (SPRTOS)” MARCH 26-27 2011
                                                                                             SIP0503-4
                                                                  It also analyzed the influence of different
                 ZnO FBAR Area 45usq.m d=1.2um                    piezoelectric films and electrode materials
     APLAC 8.10 Student version FOR NON-COMMERCIAL USE ONLY
                                                                  on the characteristics of a thin film bulk
    1.00                                                 180.00
                                                                  acoustic resonator (FBAR). The results
      dB                                                  PHASE
                                                                  confirm that the material properties and
    0.63                                                 90.00    thicknesses of piezoelectric film play a
                                                                  significant role in determining the
    0.25                                                0.00      performance of FBAR, and influence such
                                                                  characteristics    such    as    Resonance
  -0.13                                                 -90.00    frequency, the bandwidth and the insertion
                                                                  loss. Since the results demonstrate that the
  -0.50                                                 -180.00   thicknesses of each of the layers within the
     1.500G      1.875G       2.250G      2.625G    3.000G        acoustic wave path, and by the resonance
                               f/Hz                               area, the potential exists to tune the
       MagdB(S(1,1))              Pha(S(1,1))                     characteristics of the FBAR by specifying
     Figure.6 .FBAR Resonator S (1, 1)                            appropriate geometric parameters during
                                                                  the FBAR design stage.
0.5 2.0
-0.5 -2.0
CONFERENCE ON “SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM (SPRTOS)” MARCH 26-27 2011
                                                                                                     SIP0503-5
                                                                                    Conclusion
                AlN FBAR Area=45um d=1.2um                        Result shows that the resonant frequency
     APLAC 8.10 Student version FOR NON-COMMERCIAL USE ONLY       of the FBAR depends upon the particular
  -18.00                                                 180.00   choice of the piezoelectric material. It also
      dB                                                  PHASE   demonstrated that the FBAR performance
  -28.50                                                 90.00    is influenced by the physical dimensions
                                                                  of the device, including the thickness of
  -39.00                                                0.00      the      piezoelectric     film,     electrode,
                                                                  membrane layer, and by the resonance area
  -49.50                                                -90.00    size. It is possible to calculate the effective
                                                                  coupling coeffient, Q factor and figure of
                                                                  merit. In this way it is possible to specify
  -60.00                                                -180.00   suitable parameter values, which will
      3.500G        3.875G     4.250G      4.625G   5.000G
                                                                  optimize the design of the FBAR, and
                                f/Hz
                                                                  which can be used in designing FBAR
          MagdB(S(2,1))            Pha(S(2,1))
                                                                  devices that will operate within a specified
Figure.9 AlN FBAR Resonator S21                                   frequency range.
                                                                                    Refrences
                                                                  (1)K.M Lakin and G.R Kline and K.T
               AlN FBAR     Area=45um d=1.2um
    APLAC 8.10 Student version FOR NON-COMMERCIAL USE ONLY
                                                                  MCArron,” High –Q microwave acoustic
   0.50                                                 180.00    resonators and filters,” IEEE transactions
     dB                                                  PHASE    microwave theory and techniques,vol.41.
   0.18                                                 90.00     (2) S.V Krishnaswamy , J. Rosenbaum ,S.
                                                                   Horwitz ,C.Vale and R.A. Moore ,” Film
  -0.15                                                 0.00       Bulk acoustic wave resonator technology
                                                                   ,” Proceedings of the IEEE ultrasonic
  -0.48                                                 -90.00     Symposium, Honolulu, HI, USA, 1990.
                                                                  (3)P.J Yoon GW,” Fabrication of ZnO-
  -0.80                                                 -180.00   based film bulk acoustic resonator devices
     3.500G        3.875G      4.250G      4.625G   5.000G
                                                                  using W/SiO2 multilayer reflector,”
                                f/Hz
       MagdB(S(1,1))               Pha(S(1,1))                    Electronics letters, vol.36 (16).
                                                                  (4)K.M.Lakin and J.S. Wang,”UHF
Figure.10 AlN FBAR Resonator S11                                  composite bulk wave resonator” Ultrasonic
                                                                  Symposium ,1990.
                                                                  (5)W.P       Mason,      Physical     Acoustic
               AlN FBAR     Area=45um d=1.2um                     Principles      and     Methods,       Vol.1A,
    APLAC 8.10 Student version FOR NON-COMMERCIAL USE ONLY        Academic press, New York.
                                                                  (6) G. G. Fattinger, J. Kaitila, R. Aigner,
                       0.5                2.0
                                                                  W. Nessler,” Single-to-balanced Filters for
                                                                  Mobile Phones using Coupled Resonator
                                                                  BAW Technology”,IEEE International
                                                                  Ultrasonics, Ferroelectrics and Frequency
                                                                  Control Symposium, 2004.
                                                                  (7)K. M. Lakin, “Thin film resonator
                     -0.5                -2.0                     technologies”, IEEE Trans. UFFC,vol.52,
                                                                  pp. 707-716, May 2005.
                     0.0 0.2    1.0     5.0                       (8)F. Constantinescu. M. Nitescu, A. G.
            Im(S(1,1))             Im(S(2,1))                     Gheorghe, “New circuit models for power
Figure.11 Smith Chart showing S (2, 1)                            BAW resonators “, in Proc. .ICCSC
          and S(1,1)                                              Shanghai, China, pp.176-179,2008.
CONFERENCE ON “SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM (SPRTOS)” MARCH 26-27 2011
                                                                                                       SIP0503-6
          CONFERENCE ON “SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM (SPRTOS)” MARCH 26-27 2011
                                                                                                   SIP0506-1
          CONFERENCE ON “SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM (SPRTOS)” MARCH 26-27 2011
receiver. Having only two copies of records made        (CFB). The basic DVP algorithm is capable of
it impossible for the wrong receiver to decrypt the     2.36 x 1021 different "keys" based on a key length
signal. To implement the system, the army               of 32 bits." The extremely high amount of
contracted Bell Laboratories and they developed a       possible keys associated with the early DVP
system called SIGSALY. With SIGSALY, ten                algorithm, makes the algorithm very robust and
channels were used to sample the frequency              gives the user a high level of security. As with any
spectrum from 250 Hz to 3 kHz and two channels          voice encryption system, the encryption key is
were allocated to sample voice pitch and                required to decrypt the signal with a special
background hiss. In the time of SIGSALY, the            decryption algorithm[2].
transistor had not been developed and the digital
sampling was done by circuits using the model               OVERVIEW OF THE PROPOSED SPEECH
                                                         III.
2051 Thyratron vacuum tube. Each SIGSALY                          SCRAMBLING TECHNIQUE
terminal used 40 racks of equipment weighing 55            Speech inversion is a very common method of
tons and filled a large room. This equipment            speech scrambling, probably because its the
included radio transmitters and receivers and large     cheapest. Speech inversion works be taking a
phonograph turntables. The voice was keyed to           signal and turning it 'inside out', reversing the
two 16-inch vinyl phonograph records that               signal around a pre-set frequency. Speech
contained a Frequency Shift Keying (FSK) audio          inversion can be broken down into three types,
tone. The records were played on large precise          base-band inversion (also called 'phase
turntables in synch with the voice transmission[1].     inversion'), variable-band inversion (or 'rolling
                                                        phase inversion') and split band inversion. Images
From the introduction of voice encryption to
                                                        will be used to help clarify what different
today, encryption techniques have evolved
                                                        inversion systems do.
drastically. Digital technology has effectively
replaced old analog methods of voice encryption
and by using complex algorithms; voice
encryption has become much more secure and
efficient. One relatively modern voice encryption
method is Sub-band coding. With Sub-band
Coding, the voice signal is split into multiple
frequency bands, using multiple bandpass filters
that cover specific frequency ranges of interest.
The output signals from the bandpass filters are
then lowpass translated to reduce the bandwidth,
which reduces the sampling rate. The lowpass
signals are then quantized and encoded using
                                                                 Fig 1: The non-scrambled sound wave
special      techniques      like, Pulse      Code
Modulation (PCM). After the encoding stage, the
signals are multiplexed and sent out along the              Base band inversion inverts the signal around
communication network. When the signal reaches          a pre-set frequency that never changes. Because
the receiver, the inverse operations are applied to     of this, base-band inversion is useless. Because
the signal to get it back to its original state.        the inverting frequency never changes, running
Motorola developed a voice encryption system            the frequency through another inverter set on the
called Digital Voice Protection (DVP) as part of        same frequency unscrambles it. Descrambling
their first generation of voice encryption              baseband inversion is simple. Take the scrambled
techniques. "DVP uses a self-synchronizing              input and re-invert it around the same inversion
encryption technique known as cipher feedback           point used to scramble it.
                                                                                                 SIP0506-2
          CONFERENCE ON “SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM (SPRTOS)” MARCH 26-27 2011
                                                                                                 SIP0506-3
          CONFERENCE ON “SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM (SPRTOS)” MARCH 26-27 2011
                                                  .
   Fig 4: SEU-8201 Voice Encryption System
                                                                                                 SIP0506-4
CONFERENCE ON “SIGNAL PROCESSING AND REAL TIME OPERATING SYSTEM (SPRTOS)” MARCH 26-27 2011
SIP0506-5