3,922 research outputs found

    A New Evolutionary Bayesian Approach Incorporating Additive Path Correction for Nonlinear Inverse Problems

    Full text link
    An evolutionary form of a generalized Bayesian update method, which is strictly derivative- free yet directed through an additive update term based purely on the statistical moments of the design variables, is proposed for nonlinear inverse problems in general and applied in particular to an optical imaging problem, the ultrasound modulated optical tomography (UMOT). The additive update term, which bypasses most pitfalls of a conventional weight- based Bayesian update, results from a change of measures aimed at driving appropriately derived observation-prediction error terms or increments of cost functionals to zero-mean Brownian martingales. This constitutes a novel characterization corresponding to the extremization of the cost functional(s), where the design unknowns are represented as diffusion processes evolving with respect to a continuously parameterized iteration variable. This leads to a recursive prediction-update algorithm to implement the search. The scheme offers freedom from sample degeneracy and the accompanying divergence of the conventional weight-based Bayesian update schemes. We obtain the order of convergence of the conditioned process and also establish that the solutions are stable against tolerable variations in the regularizing noise terms, even as the original inverse problem remains severely ill-posed. Numerical evidence on solutions to the UMOT problem also confirms substantive improvements in the reconstruction efficacy through the proposed method vis-\`a- vis a Gauss-Newton approach, especially where the regularized quasi-Newton direction has low sensitivity to variations in the design unknowns.Comment: 42 pages, 3 figures (not yet published in a refereed journal or any conference proceedings

    Fingerprint Recognition Using Minutia Score Matching

    Full text link
    The popular Biometric used to authenticate a person is Fingerprint which is unique and permanent throughout a person's life. A minutia matching is widely used for fingerprint recognition and can be classified as ridge ending and ridge bifurcation. In this paper we projected Fingerprint Recognition using Minutia Score Matching method (FRMSM). For Fingerprint thinning, the Block Filter is used, which scans the image at the boundary to preserves the quality of the image and extract the minutiae from the thinned image. The false matching ratio is better compared to the existing algorithm.Comment: 8 Page

    A Kushner-Stratonovich Monte Carlo Filter Applied to Nonlinear Dynamical System Identification

    Full text link
    A Monte Carlo filter, based on the idea of averaging over characteristics and fashioned after a particle-based time-discretized approximation to the Kushner-Stratonovich (KS) nonlinear filtering equation, is proposed. A key aspect of the new filter is the gain-like additive update, designed to approximate the innovation integral in the KS equation and implemented through an annealing-type iterative procedure, which is aimed at rendering the innovation (observation-prediction mismatch) for a given time-step to a zero-mean Brownian increment corresponding to the measurement noise. This may be contrasted with the weight- based multiplicative updates in most particle filters that are known to precipitate the numerical problem of weight collapse within a finite-ensemble setting. A study to estimate the a-priori error bounds in the proposed scheme is undertaken. The numerical evidence, presently gathered from the assessed performance of the proposed and a few other competing filters on a class of nonlinear dynamic system identification and target tracking problems, is suggestive of the remarkably improved convergence and accuracy of the new filter.Comment: 51 pages, 6 figure

    FPGA Based Efficient Multiplier for Image Processing Applications Using Recursive Error Free Mitchell Log Multiplier and KOM Architecture

    Full text link
    The Digital Image processing applications like medical imaging, satellite imaging, Biometric trait images etc., rely on multipliers to improve the quality of image. However, existing multiplication techniques introduce errors in the output with consumption of more time, hence error free high speed multipliers has to be designed. In this paper we propose FPGA based Recursive Error Free Mitchell Log Multiplier (REFMLM) for image Filters. The 2x2 error free Mitchell log multiplier is designed with zero error by introducing error correction term is used in higher order Karastuba-Ofman Multiplier (KOM) Architectures. The higher order KOM multipliers is decomposed into number of lower order multipliers using radix 2 till basic multiplier block of order 2x2 which is designed by error free Mitchell log multiplier. The 8x8 REFMLM is tested for Gaussian filter to remove noise in fingerprint image. The Multiplier is synthesized using Spartan 3 FPGA family device XC3S1500-5fg320. It is observed that the performance parameters such as area utilization, speed, error and PSNR are better in the case of proposed architecture compared to existing architecture

    Similarity based Dynamic Web Data Extraction and Integration System from Search Engine Result Pages for Web Content Mining

    Full text link
    There is an explosive growth of information in the World Wide Web thus posing a challenge to Web users to extract essential knowledge from the Web. Search engines help us to narrow down the search in the form of Search Engine Result Pages (SERP). Web Content Mining is one of the techniques that help users to extract useful information from these SERPs. In this paper, we propose two similarity based mechanisms; WDES, to extract desired SERPs and store them in the local depository for offline browsing and WDICS, to integrate the requested contents and enable the user to perform the intended analysis and extract the desired information. Our experimental results show that WDES and WDICS outperform DEPTA [1] in terms of Precision and Recall.Comment: 8 page

    A model-independent technique to determine one-dimensional radio source structure from interplanetary scintillation (IPS) observations

    Full text link
    We outline a method of deriving one-dimensional phaseless visibility along solar wind direction from interplanetary scintillation power spectrum, together with the known visibility of a calibration source. The method is illustrated briefly. Details may be found in Edwin Jayaraj (1990).Comment: 3 pages, 1 figure, 1 table, method used by S Edwin Jayaraj for MPhil project of Madurai Kamaraj Universit

    A Dataset and Preliminary Results for Umpire Pose Detection Using SVM Classification of Deep Features

    Full text link
    In recent years, there has been increased interest in video summarization and automatic sports highlights generation. In this work, we introduce a new dataset, called SNOW, for umpire pose detection in the game of cricket. The proposed dataset is evaluated as a preliminary aid for developing systems to automatically generate cricket highlights. In cricket, the umpire has the authority to make important decisions about events on the field. The umpire signals important events using unique hand signals and gestures. We identify four such events for classification namely SIX, NO BALL, OUT and WIDE based on detecting the pose of the umpire from the frames of a cricket video. Pre-trained convolutional neural networks such as Inception V3 and VGG19 net-works are selected as primary candidates for feature extraction. The results are obtained using a linear SVM classifier. The highest classification performance was achieved for the SVM trained on features extracted from the VGG19 network. The preliminary results suggest that the proposed system is an effective solution for the application of cricket highlights generation.Comment: To be published at the 2018 IEEE Symposium Series on Computational Intelligence (IEEE SSCI 2018), 18-21 NOV, 2018, BENGALURU, INDI

    Two Stage Prediction Process with Gradient Descent Methods Aligning with the Data Privacy Preservation

    Full text link
    Privacy preservation emphasize on authorization of data, which signifies that data should be accessed only by authorized users. Ensuring the privacy of data is considered as one of the challenging task in data management. The generalization of data with varying concept hierarchies seems to be interesting solution. This paper proposes two stage prediction processes on privacy preserved data. The privacy is preserved using generalization and betraying other communicating parties by disguising generalized data which adds another level of privacy. The generalization with betraying is performed in first stage to define the knowledge or hypothesis and which is further optimized using gradient descent method in second stage prediction for accurate prediction of data. The experiment carried with both batch and stochastic gradient methods and it is shown that bulk operation performed by batch takes long time and more iterations than stochastic to give more accurate solution.Comment: 14 page

    Static Analysis, Design Modification and Modal Analysis of Structural Chassis Frame

    Get PDF
    The chassis frame is an important part in a truck and it carries the whole load acting on the truck as well as \ud different parts of the automobile. So it must be strong enough to resist the shock, twist, vibration and other \ud stresses. Maximum stress and maximum deflection are important criteria for design of the chassis. The objective\ud of present is to determine the maximum stress, maximum deflection and to recognize critical regions under \ud static loading condition. Static structural analysis of the chassis frame is carried out by FEA Method. The \ud structural chassis frame is modeled using PRO-E wildfire 4.0 software. The Pre-processing has done with \ud HYPERMESH software; then the problem has been solved through RADIOSS and the post processing was done\ud by HYPERVIEW. The results obtained like maximum shear stress, Von-mises stress and maximum deflections \ud are used for improving design modification. Modal analysis of the chassis frame done using ANSYS \ud WORKBENCH. Through modal analysis, natural frequencies and corresponding vibration mode shapes of the \ud structure are obtained

    QoS group based optimal retransmission medium access protocol for wireless sensor networks

    Full text link
    This paper presents, a Group Based Optimal Retransmission Medium Access (GORMA) Protocol is designed that combines protocol of Collision Avoidance (CA) and energy management for low-cost, short-range, low-data rate and low-energy sensor nodes applications in environment monitoring, agriculture, industrial plants etc. In this paper, the GORMA protocol focuses on efficient MAC protocol to provide autonomous Quality of Service (QoS) to the sensor nodes in one-hop QoS retransmission group and two QoS groups in WSNs where the source nodes do not have receiver circuits. Hence, they can only transmit data to a sink node, but cannot receive acknowledgement control signals from the sink node. The proposed protocol GORMA provides QoS to the nodes which work independently on predefined time by allowing them to transmit each packet an optimal number of times within a given period. Our simulation results shows that the performance of GORMA protocol, which maximize the delivery probability of one-hop QoS group and two QoS groups and minimize the energy consumption.Comment: 9 pages in IEEE format and 6 figure
    corecore