A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Zahran, O.
- Distillation Column Malfunctions Identification Using SVM Classifier Based on Higher Order Statistics
Authors
1 Engineering Department, Nuclear Research Center, Egyptian Atomic Energy Authority, EG
2 Electronics and Electrical Communications Department, Menoufia University, Menouf, EG
Source
Programmable Device Circuits and Systems, Vol 6, No 8 (2014), Pagination: 206-214Abstract
This paper presents a proposed approach for distillation column malfunction identification using Higher Order Statistics (HOS). Gamma ray scanning techniques have been used for examining the inner details of a distillation column. In the proposed method, the signals are firstly divided into frames; each frame contains only the signal of one column tray. Secondly, HOS are estimated for these frame signals. Thirdly, features are extracted from the HOS estimate. Finally, features are used for training and testing of Support Vector Machine classifier to identify the distillation column malfunctions. The simulation results show that the HOS can be used efficiently for the distillation column malfunction identification especially at high noisy scanning conditions.Keywords
Bispectrum, Cumulant, Moment, and Trispectrum.- Efficient Compressed Video Communication
Authors
1 Department of Electronics and Electrical Communications, Menoufia University, Menouf 32952, EG
2 University of Liverpool, GB
3 Electronics and Communications Eng., Menoufia University, EG
4 Menoufia University, EG
Source
Networking and Communication Engineering, Vol 6, No 6 (2014), Pagination: 219-226Abstract
This paper presents a chaotic interleaving approach for efficient video transmission with orthogonal frequency division multiplexing (OFDM) with equalization over fading channels. The SPIHT compressed video is converted to luminance and chrominance approach and converted to binary data. The binary data is interleaved with the proposed approach prior to the modulation step. The chaotic Baker map is used in the proposed interleaving approach. In addition to reducing the channel effects on the transmitted data, the proposed chaotic interleaving approach adds a degree of encryption to the transmitted data. The performance of the proposed approach is tested by the transmission of SPIHT compressed video frames over Rayleigh fading channels with chaotic interleaving. Experimental results show that video frames are received with higher peak signal-to-noise ratios (PSNRs) if chaotic interleaving is applied. We also propose an efficient technique to reduce the effects of both multiple access interference (MAI) and intersymbol interference (ISI) in wireless OFDM systems. A hybrid scheme comprising randomization of SPIHT video frames at the transmitter and a regularized equalizer at the receiver unit is suggested and studied. Then, the regularized equalizer is used to reduce the effect of ISI and provide a better estimate of the data. The performance of the proposed scheme is studied and compared with traditional schemes. Our simulation results show a noticeable performance improvement by using the proposed scheme.Keywords
Video Processing, SPIHT Video Compression, OFDM, and Chaotic Map.- Synchronous Interpolation and Equalization Technique of Digital Images
Authors
1 Electronics and Electrical Communications Department, Menoufia University, Menouf, EG
2 Department of Electronics and Electrical Communications, Menoufia University, Menouf, EG
3 Department of Electronics and Electrical Communications, Menoufia University, Menouf, EG
Source
Digital Image Processing, Vol 6, No 8 (2014), Pagination: 331-336Abstract
In this paper histogram equalization with image interpolation are presented. Histogram equalization is a very important widely used contrast-enhancement technique in image processing. Image enhancement is a means of improvement of an image appearance by increasing luminance of some a distinctive attribute or by decreasing ambiguity between different regions of the image to improve quality. This paper proposes simultaneous interpolation and equalization of digital images. The best performance has been achieved when performing the equalization on interpolated images instead of performing the interpolation on equalized images. Finally, we can say that the proposed techniques achieve better performance compared to other techniques.
Keywords
Histogram Equalization, Interpolation, and Image Enhancement.- Robust Verification Method for Video Communication
Authors
1 Department of Electronics and Electrical Communications, Menoufia University, 32952, Menouf, EG
2 University of Liverpool, GB
3 Menoufia University, EG
4 Electrical Communications, Menoufia University, EG
Source
Digital Image Processing, Vol 6, No 6 (2014), Pagination: 251-253Abstract
Video is compressed to move the redundancies for efficient communication. In this paper, we use a steganography method for verification of the video content at the receiver side. The main idea of the proposed steganography method is based on the Discrete Cosine Transform (DCT). It is based on creating a signature for each block of the DCT of the compressed video sequence to be embedded in another block. This is attributed to the fact that most DCT coefficients of the compressed video sequence are either zero or close to zero. Simulation results reveal the robustness of the suggested steganography method.
Keywords
Video Compression, Data Hiding, Steganography.- Robust Verification Method for Video Communication
Authors
1 Department of Electronics and Electrical Communications Engineering, Menoufia University, Menouf-32952, EG
2 Department of Electronics and Electrical Communications Engineering, Menoufia University, Menouf-32952, EG
3 Department of Electronics and Electrical Communications Engineering, Menoufia University, Menouf-32952, EG
Source
Digital Image Processing, Vol 6, No 5 (2014), Pagination: 215-221Abstract
The videois compressed to move the redundancies for reducing the number of bits whichneed to show the video for reducing the size of video to reduce the band width. We embed the hiding data in redundancies of the video frame withoutvisibility manner using Steganography technique. In our research we focus in increasing the improvement of compressed video frame through using steganography. In our research we use two mixed techniques to compress the video, the first is digital steganography and the second is data compression. Hence, the suggested scheme is mixed the algorithm ofthe steganography algorithm with the DCT compressionvideo frame.The suggested scheme in our study compression of data is made in two steps. In the first step,redundant data isminimized by compaction of energy using video. In the second step, with using steganography bit blocks isembedded in its blocks which call subsequent of the same video frame. Theadvantage of thebits which it is embedded isdecrease the size of the file and increase thesize of the file of the compressed video frame, but also decrease the file size further more. Theresults of simulation results explainthat,the suggestedschemehave more potential in coding of the frame of the video.
Keywords
Video, Data Hiding and Compression and Steganography, DCT Compression.- Cepstral Identification Techniques of Buried Landmines from Degraded Images Using ANNs and SVMs based on a Spiral Scan
Authors
1 Engineering Department, Nuclear Research Center, Atomic Energy Authority, Cairo, EG
2 Electrical Communications Department, Menoufia University, Menouf, EG
Source
Digital Image Processing, Vol 5, No 12 (2013), Pagination: 529-539Abstract
In this paper new identification techniques for buried landmine objects are presented. Most of the existing supervised identification methods are based on traditional statistics, which can provide ideal results when sample size is tending to infinity. However, only finite samples can be acquired in practice. In this paper, two proposed learning methods; Artificial Neural Networks (ANNs) and Support Vector Machines (SVMs), are applied on landmine images. The complete identification technique consists of two stages to perform both the training of the input image models and the evaluation of the testing image sets. In the 1st stage, the 2-D images are transformed into 1-D signals by a spiral scan, and then the Mel Frequency Cepstral Coefficients (MFCCs) and polynomial coefficients are extracted from these 1-D signals and/or their transforms. In the 2nd stage, the ANN and SVM are used to match the extracted features in the testing phase to those of the training phase. Experimental results have shown that the proposed techniques are effective with landmines. The best performance has been achieved with features extracted from the Discrete Cosine Transform (DCT) signals using ANN and from the DCT of images contaminated by AWGN and speckle noise and from the Discrete Sine Transform (DST) of images contaminated by impulsive noise using SVM. Finally, we can say that the proposed techniques achieve better performance compared to other techniques.Keywords
Spiral Scan, Landmines Identification, ANNs, SVMs, MFCC, Kernel Functions.- Comparative Study of Different Denoising Algorithms for Speckle Noise Reduction in Ultrasonic B-Mode Images
Authors
1 Department of Electronics and Electrical Communications, Menoufia University, 32952, Menouf, EG
2 Department of Electronics and Electrical Communications, Menoufia University, 32952, Menouf, EG
3 Department of Electronics and Electrical Communications, Menoufia University, 32952, Menouf, EG
4 University of Liverpool, GB
Source
Digital Image Processing, Vol 4, No 11 (2012), Pagination: 599-607Abstract
Image denoising involves processing of the image data to produce a visually high quality image. The denoising algorithms may be classified into two categories, spatial filtering algorithms (Wiener filter, Gaussian filter, Gabor filter and Median filter) and wavelet based algorithms (Wiener filter in the wavelet domain and Log Gabor filter in the wavelet domain). In this paper a comparative study for the previous mentioned algorithms based on calculating the Peak Signal to Noise Ratio (PSNR) value as a metric since for such images the visual evaluation is not appropriate. The quantitative results of comparison are tabulated by calculating the PSNR of the output image.
Keywords
PSNR, DWT.- Blind Source Separation for Different Modulation Techniques with Wavelet Denoising
Authors
1 Department of Electronics and Electrical Communication, Menoufia University, Menouf, EG
Source
Digital Signal Processing, Vol 5, No 12 (2013), Pagination: 418-423Abstract
This paper addresses the problem of blind signal separation (BSS) for the system of multiple input and multiple output signals (MIMO). We use different modulation techniques such as quadrature phase shift keying (QPSK), minimum shift keying (MSK), and Gaussian minimum shift keying (GMSK). Several methods have been used to solve this problem such as principle component analysis (PCA), independent component analysis (ICA), and multi user kurtosis (MUK) algorithms. We use different modulation techniques and different algorithms in the separation to compare between results and take into consideration the good separation. In this paper, we propose wavelet denoising with PCA, ICA and MUK methods. We consider the instantaneous mixture of two sources. The simulation results show a considerable improvement in extracted signals when compared to original signals. We assume mean square error (MSE) between extracted and original signals to compare between them to give the better result.
Keywords
BSS, MIMO, PCA, ICA, MUK, MSK, GMSK, QPSK, MSE.- Blind Signal Separation Using Discrete Cosine Transform
Authors
1 Department of Electronics and Electrical Communications, Menoufia University, Menouf, EG
2 Department of Electronics and Electrical Communications, Menoufia University, Menouf, EG
3 Department of Electronics and Electrical Communications, Menoufia University, Menouf, EG