Professional Documents
Culture Documents
IJITCE PUBLICATION
INTERNATIONAL JOURNAL OF
INNOVATIVE TECHNOLOGY & CREATIVE
ENGINEERING
Vol.1 No.1
Editorial Team
January 2011
Contents
1. Measurement of Potassium Levels in the Soil using Embedded System based
Soil Analyzer ……….[1]
Abstract: Potassium is important to the plants for metabolic The measured data is represented in the form of web
changes during flowering, and the production of floral clusters. pages, using HTML and the processing of data using
It also promotes general plant-vigor, disease-resistance, and Dynamic C functions. The Rabbit is created as
study growth. Hence, in this paper the concentration of
potassium ion in aqueous soil samples of Anantapur area is
analyzed. Combination of ISE and reference electrode is used web server and is connected to PC by using Ethernet
to determine the ion activities of potassium ion in aqueous soil cross cable (RJ45). Then the Rabbit processor and the
samples. This method is very simple and fast when compared PC are in LAN (Local Area Network). Here data is
with the other methods. The soil samples tested with the accessed through Rabbit processor, webpage can be
embedded system based soil analyzer. viewed on PC, and hence, we can access physical data
through LAN.
Keywords: ESBSA (Embedded System Based Soil
Analyzer); ISEs (Ion Selective Electrodes);
1
INTERNATIONAL JOURNAL OF INNOVATIVE TECHNOLOGY & CREATIVE ENGINEERING (ISSN:2045-8711)
VOL.1 NO.1 JANUARY 2011
different parameters. In this paper the estimation of After removing any stones or fresh organic material
Potassium present in the soil sample is explained. The (roots, twigs, leaves, worms, insects etc), and breaking
ESBSA is connected to local computer via Ethernet port up any large lumps, soil samples must be air dried by
using RJ45 Ethernet cable. Then internet is provided to laying out in a thin layer on metal or plastic trays in a
the local PC, Apache Web Server Software is used to current of air at no more than 30°C until dry. Then they
configure the PC and made the local PC as Web Server. must be crushed in a pestle and mortar to pass through
Using this software proxy pass and proxy reverse a 2mm sieve. About 200g of material should be
operations are provided to have online communication. sufficient for duplicate analysis and storage.
Now the local system is ready to communicate the
information online. Therefore, with the ESBSA,
measured and calibrated data can be accessed globally. Weigh accurately about 50g of dry soil
sample and add exactly 100ml of de-ionized water and
shake vigorously for 30 seconds to ensure good
dispersion, then leave to stand for 15 mins. After this
time, shake again for 5 seconds, and allow to stand
again. Repeat this procedure three times before finally
allowing to settle. When the solution is clear, take
exactly 50 mls (by decanting or pipetting) and mix with 1
ml of buffer solution in a plastic beaker.
The Potassium Ion-Selective Electrode has a solid-state FIG 3: Potassium Sensor electrode and reference
-3
PVC polymer matrix membrane which is designed for electrode are immersed in 10 M buffer solution
the detection of potassium ions ( K+ ) in aqueous
solutions and is suitable for both field and laboratory
applications. The Potassium Ion is a monovalent action. Calibration
One mole of Before soil sample measurement, the electrodes
( K+ ) has a mass of 39.098grams; 1000 ppm is 0.026 must be calibrated by measuring a series of known
M. standard solutions, made by serial dilution of the
1000ppm standard solution. For a full calibration,
Sample Preparation prepare 100ml of solutions containing 1000, 100, 10, 1,
and 0.1ppm K. If the approximate range of
2
INTERNATIONAL JOURNAL OF INNOVATIVE TECHNOLOGY & CREATIVE ENGINEERING (ISSN:2045-8711)
VOL.1 NO.1 JANUARY 2011
concentrations of the samples is known, and this is 2. The RCM-3700 has 40 pins out of which we use 7
within the specified linear range of the ISE, then it is only pins from port-B and 6 pins from port-A for our
necessary to make two solutions which span this range: application.
e.g. if samples are known to lie between, say, 30 and
130ppm then we could use standards of 10 and 200ppm 3. The 4 pins of port-B are configured as input and
or even 20 and 150ppm.2 ml of buffer solution must be
output pins, 6 pins of port-A are configured for LCD
added to each 100ml standard and mixed thoroughly to
compensate for different activity coefficients between Display.
samples and standards.
4. In which PB-5 is used for clock, PB-7 for D-out, PB-4
Sample Measurement for D-in, PB-2 for chip select, PA-4, PA-5, PA-6, PA-7
Briefly, it is important to note that the are used for data transfer, PA-0 for R/W, PA-1 for
electrodes must be washed and dried between each Enabling the LCD.
sample, to avoid cross contamination, and sufficient time
must be allowed (2 or 3 minutes), before taking a 5. 40th pin is connected to VCC (+5v) and pins 19 and
reading after immersion, to permit the electrode signal to 20 are connected to ground.
reach a stable value. For the highest precision, frequent
recalibration is recommended (see operating
instructions).
The results will be displayed as ppm and mol/l in the
solution. Since buffer solution has been added equally to
standards and samples, these figures will not need
adjusting for this addition. However, the concentration in
the solution (in ppm = micrograms per ml) must be
multiplied by 100 and divided by the sample weight to
give the concentration in the soil (in micrograms per
gram).
Temperature Compensation:
The ISE (POTASSIUM) is a temperature
dependent one. Hence, in this research a temperature
compensated Potassium measurement system is
developed. LM35 series are precision integrated-circuit
temperature sensors, whose output voltage is linearly
proportional to the Celsius (Centigrade) temperature.
The LM35 thus has an advantage over linear
temperature sensors calibrated in ° Kelvin, as the user is
not required to subtract a large constant voltage from its Fig.4: Schematic Diagram of Embedded Soil Analyzer
output to obtain convenient Centigrade scaling. The
LM35 does not require any external calibration or
trimming to provide typical accuracies of ±1⁄4°C at room 6. LCD INTERFACE:
temperature and ±3⁄4°C over a full −55 to +150°C
temperature range. Low cost is assured by trimming and 1, 3, 5, 16th pins are connected to ground;
calibration at the wafer level. The LM35’s low output
impedance, linear output, and precise inherent 2,15th pins are connected to 5volts;
calibration make interfacing to readout or control
4th pin (RS) is connected to PA-0, 6th pin (E) is
circuitry especially easy. It can be used with single th
connected to PA-1, and 11, 12, 13, 14 pins are
power supplies, or with plus and minus supplies.
connected to PA-4, 5, 6, 7 pins for data transferring.
Hardware Description:
7. In MCP3208, ch-0,1,2,4,5 & 7(not used) Temperature
1. Here, we use rabbit-3000 processor along with RCM- sensor-ch-3, Potassium sensor – ch-5
3700 development kit.
3
INTERNATIONAL JOURNAL OF INNOVATIVE TECHNOLOGY & CREATIVE ENGINEERING (ISSN:2045-8711)
VOL.1 NO.1 JANUARY 2011
Results:
4
INTERNATIONAL JOURNAL OF INNOVATIVE TECHNOLOGY & CREATIVE ENGINEERING (ISSN:2045-8711)
VOL.1 NO.1 JANUARY 2011
12. References
[1]www.agric.gov.ab.ca/app21/rtw/index.jsp
5
INTERNATIONAL JOURNAL OF INNOVATIVE TECHNOLOGY & CREATIVE ENGINEERING (ISSN:2045-8711)
VOL.1 NO.1 JANUARY 2011
#2
Director, Bharathidasan School of Computer Applications, Erode, Tamilnadu, India
#3
Doctoral Research Scholar, Anna University, Coimbatore, Tamilnadu, India
Abstract— Man-made disasters are the outcome means and routes of entrance and exists,
of lack of awareness, lack of sensitivity towards the communication, jamming and queuing [3].
safety measures to be taken to prevent unforeseen It is clear that a stampede death never occurs
accidents. Large crowds always invite accidents if due to the presence of 1-10 people at a place. It
preventive measures are not taken with proper
planning. When the number of people waits in queue
always happens when a huge crowd gathers at
before a shopping mall on a special sales day or one place for some or other reason. Whenever we
gathering at religious functions or at a sports have experienced any stampede death to our
gallery, it is very much evident that large crowding society the crowd of people has been held
is part of normal life. This exposes a new problem responsible. When one person in a crowd starts
space of crowd management. Excessive crowding running due to any kind of rumour the entire crowd
and poor crowd management can cost loss of follows him or her without having any time for the
precious life very easily. Hence the need for second thought to be processed and this causes
developing an automated crowd management the deaths on mass level. With the tremendous
system will be highly appreciated by the society.
Crowd management involves keeping track of the
growth of population and the facts given that
crowd, the space available and balancing between having a bad system can easily jeopardize the
the crowd and space. In this paper, we propose a precious life, “Why do crowds need to be
prototype for counting the people as a part of managed?” is becoming a penny worth question
developing better crowd monitoring system. The and “What is the best way to manage a crowd?” is
system counts people and displays the result in a becoming a million dollar question. The best
user friendly interface. The system has been tested reasons for the “Why?” Includes; Big gatherings of
in different places and found working fine for people raise the odds of a dangerous occurrence
counting people. happening. Secondly, individuals within a crowd
always take for granted that others have the
responsibility. Thirdly, big crowds or gatherings of
Keywords: Crowd Monitoring, LDR & people make changes in action slower and more
Programmable Interface Controller complicated. Fourthly, big crowds or gatherings of
people make communications slower and more
I. INTRODUCTION complicated. And most importantly, big crowds of
Crowd monitoring is the process of monitoring people raise the possible number of victims [2].
and controlling large groups of people for their Even though crowd is normal in all over the
safety and security. It also provides ways to world, India often faces many problems with crowd
efficiently utilize space and reduce cost involved in particularly in religious functions. Religious is the
maintenance [1]. It includes different phases like soul of India and its culture. There are number of
planning, organizing, guiding and evaluating holy places where the devotees go as pilgrims
results of corrective actions. Crowd safety and throughout the year. Whenever there are such
security in public areas are primarily the mammoth gatherings, there should be proper
organizer’s or operator’s responsibility. A health arrangements to control the people.
and safety management system is required to Traditionally, crowd management is performed
monitor and control potential crowding risks in by employing extensive closed circuit television
public areas. The four interacting elements that system. This involves extensive cost, time and
contribute to a better and efficient system are; human effort in setting up and establishing the
time, space, information, and energy. The system. As routine monitoring is tedious, the
behaviour of the crowd is another attribute that observers are likely to lose concentration. The
plays a vital role in efficient crowd monitoring need and necessity of the automatic surveillance
system. Other attributes include facility, size,
6
INTERNATIONAL JOURNAL OF INNOVATIVE TECHNOLOGY & CREATIVE ENGINEERING (ISSN:2045-8711)
VOL.1 NO.1 JANUARY 2011
for routine crowd monitoring and controlling is Examples of these types are turnstiles and mat-
again proven [6] type foot switches. The above sensors are suitable
In order to save the life of the public, a model for counting a few people and are not adequate for
has been developed to count the entry of the crowd monitoring. On the other hand, there are
people entering into an area. The system has non-contact and non-obstruct sensors. From these
been developed using both the hardware and types, is CCTV visual camera. In CCTV based
software implementations. This paper has been research efforts, individuals are first detected by
organized in the following ways. Section II human models or detectors and then tracked in
describes some of the incidents occurred due to order to count the number of pedestrians. Masoud
overcrowding and Section III discuses previous et al. [2] used difference images to detect moving
work done. The Section IV describes prototype of blobs, and pedestrians are detected by rectangular
the system and Section V discuses experimental patches based on their dynamic behavior. Liu et al.
results. Conclusion and future work is given in [3] proposed a method based on human
Section VI. appearance models to detect pedestrians. In this
method, human models are created using a set of
II. LIST OF DANGERS ENCOUNTERED low level image features, and the number of
Numerous incidents have been recorded in people is counted using these human models.
which uncontrolled crowding has resulted in Also, Sidla et al. [4] proposed a model-based
injuries and, in some instances, death. There are method to detect the number of humans in scenes.
inherent dangers associated with every large In this method, humans were successfully
public gathering. Every year there are reports of detected using active shape models (ASM) even if
overcrowding and crushing incidents from around their bodies were partially occluded. However,
the world. It is very particular to say that more these methods cannot be applied to multicamera
number of incidents is occurring in India during systems or embedded systems because they
Temple festivals. Hence there is a growing need in usually require a great amount of computational
India to develop a very useful automated crowd power.
monitoring system. To put the problem into In this paper, we propose a simple and effective
perspective, the following list highlights just some method to count the number of people by using
of the events that have ended in tragedy. Light Dependent Sensors (LDR). The sensors are
fitted in two sides of the doors, so that when light
January 15, 1999 - 51 Hindus killed and 100 beam is cut, automatically the counting process
injured in a stampede after part of a shrine starts by the program stored in programmable
collapsed. Over 1.5 million present in a ceremony Interface Controller.
in Kerala, India. IV. PROTOTYPE DESCRIPTION
The prototype of the crowd monitoring system
August 24, 2005 – 56 die, hundreds of people
includes the following main components in the
injured in a stampede at Vaishnavi Devi temple,
hardware part. The components are i) Power Unit
India
ii) Step-down Transformer iii) Light Dependent
Sensor (LDR) iv) Programmable Interface
September 30, 2008: 147 people were killed
Controller (PIC) v) LCD Display. The Software part
during the Chamunda Devi stampede at the
includes development of a system which accepts
Chamunda Devi temple in Jodhpur, India
output from the hardware unit as input and
March 4, 2010: At least 71 killed and over 200 displays the result. The working of prototype is as
injured at Ram Janki Temple in Kunda, India follows: The 230V power supply is connected to
the Transformer. The Step-Down Transformer
The above listing shows some incidents takes the voltage and converts it into 5V. The 5V
occurred in India, where there is a growing need supply is connected to Light Dependent Sensors
for better crowd monitoring system. (LDR). The sensor has two hands where 5 mA
III. RELATED W ORK light is emitted between two hands of the sensor.
In general, the detection methods are broadly The two hands are fitted in the left and right sides
classified into two categories. The first one is of the door. Fig. 1 a) shows an entry gate where
obstructive and the second is non-obstructive [6]. hands of the sensor are fixed. Fig. 1 b) shows
The first type to detect the number of people people movement through the gate. The picture
requires personal contact, which obstruct the path. shows the entrance of Sri Sangameswarar Temple
7
INTERNATIONAL JOURNAL OF INNOVATIVE TECHNOLOGY & CREATIVE ENGINEERING (ISSN:2045-8711)
VOL.1 NO.1 JANUARY 2011
8
INTERNATIONAL JOURNAL OF INNOVATIVE TECHNOLOGY & CREATIVE ENGINEERING (ISSN:2045-8711)
VOL.1 NO.1 JANUARY 2011
REFERENCES
[1] M.Rossi and A.Bozzoli, ‘Tracking and
Counting Moving People’, Proc. Second IEEE
International Conference on Image Processing,
pp. 212-216, 1994
[2] Masoud, O., Papanikolopoulos, N.P., ‘A Novel
Method for Tracking and Counting Pedestrians
in Real-time Using a Singe Camera’, Vehicular
Technology 50, 1267–1278 (2001)
[3] Liu, X., Tu, P.H., Rittscher, J., Perera, A.,
Krahnstoever, N.: ‘Detecting and Counting Dr. Arthanariee A.M., holds a Ph.D degree
People in Surveillance Applications’. in Mathematics from Madras University as
well as Masters Degree in Computer
10
INTERNATIONAL JOURNAL OF INNOVATIVE TECHNOLOGY & CREATIVE ENGINEERING (ISSN:2045-8711)
VOL.1 NO.1 JANUARY 2011
11
INTERNATIONAL JOURNAL OF INNOVATIVE TECHNOLOGY & CREATIVE ENGINEERING (ISSN:2045-8711)
VOL.1 NO.1 JANUARY 2011
Abstract— The heart of democracy is voting. The heart of For many years, paper-based ballot is used as a way
voting is trust that each vote is recorded and tallied with to vote during campus election day. This matter put
accuracy and impartiality. The accuracy and impartiality are an inefficient way of voting process as students have
tallied in high rate with biometric system. Among these to queue up to register their name before they can
biometric signs, fingerprint has been researched the
longest period of time, and shows the most promising
vote. Furthermore, the traditional way of voting will
future in real-world applications. Because of their take a long process and time. So, the novel electronic
uniqueness and consistency over time, fingerprints have voting using minutiae will become the best solution
been used for identification over time. However, because of for the matters; besides provide easier way of voting.
the complex distortions among the different impression of Compared to existing voting system the Electronic
the same finger in real life, fingerprint recognition is still a voting has several advantages like: Electronic voting
challenging problem. Hence in this study, the authors are system is capable of saving considerable printing
interested in designing and analysing the Electronic Voting stationery and transport of large volumes of electoral
System based on the fingerprint minutiae which is the core material. It is easy to transport, store, and maintain. It
in current modern approach for fingerprint analysis. The
new design is analysed by conducting pilot election among
completely rules out the chance of invalid votes. Its
a class of students for selecting their representative. use results in reduction of polling time, resulting in
Various analysis predicted shows that the proposed fewer problems in electoral preparations, law and
electronic voting system resolves many issues of the order, candidate’s expenditure, etc. and easy and
current system with the help of biometric technology. accurate counting without mischief at the counting
Keywords— Biometric, Fingerprint, Minutiae, centre. It is also eco friendly [8].
Electronic Voting. Biometrics is the automated recognition of
individuals based on their behavioural and biological
I. INTRODUCTION characteristics. Biometric recognition means by
measuring an individual's suitable behavioural and
biological characteristics in a recognition inquiry and
Elections allow the populace to choose their comparing these data with the biometric reference
representatives and express their preferences for data which had been stored during a learning
how they will be governed. Naturally, the integrity of procedure, the identity of a specific user is
the election process is fundamental to the integrity of determined. A fingerprint is an impression of the
democracy itself. The election system must be friction ridges, from the surface of a fingertip.
sufficiently robust to withstand a variety of fraudulent Fingerprints have been used for personal
behaviours and must be sufficiently transparent and identification for many decades, more recently
comprehensible that voters and candidates can becoming recognition is nowadays one of the most
accept the results of an election. In context of important and popular biometric technologies mainly
Western democracies' current crisis, electronic voting because of the inherent ease in acquisition the
has become a very popular topic of discussion in numerous sources (ten fingers) available for
academic and technical circles. collection, and the established use and collections by
Voting is a method for a group such as a meeting or law enforcement agencies. Automatic fingerprint
an electorate to make a decision or express an identification is one of the most reliable biometric
opinion—often following discussions, debates, or technologies. This is because of the well known
election campaigns. It is often found in democracies fingerprint distinctiveness, persistence, ease of
and republics. Electronic voting (also known as e- acquisition and high matching accuracy rates.
voting) is a term encompassing several different Fingerprints are unique to each individual and they
types of voting, embracing both electronic means of do not change over time. Even identical twins do not
casting a vote and electronic means of counting carry identical fingerprints. Scientific research in
votes.
12
INTERNATIONAL JOURNAL OF INNOVATIVE TECHNOLOGY & CREATIVE ENGINEERING (ISSN:2045-8711)
VOL.1 NO.1 JANUARY 2011
areas such as biology, embryology, anatomy and of students to chose their representative and Section
histology has supported these findings [28]. V concludes and states the future work plans.
Because biometric identifiers cannot be easily
misplaced, forged, or shared, they are considered II. ISSUES OF PRESENT VOTING SYSTEM
more reliable for person recognition than traditional There has been several studies on using
token or knowledge based methods. The objectives computer technologies to improve elections [5, 38,
of biometric recognition are user convenience (e.g., 21, 22, and 29].
money withdrawal without ATM card or PIN), better These studies caution against the risks of moving
security (e.g., difficult to forge access), and higher too quickly to adopt electronic voting system,
efficiency (e.g., lower overhead for computer because of the software engineering challenges,
password maintenance). The tremendous success of insider threats, network vulnerabilities, and the
fingerprint based recognition technology in law challenges of auditing.
enforcement applications, decreasing cost of Researchers in the electronic voting field have
fingerprint sensing devices, increasing availability of already reached a consensus pack of following core
inexpensive computing power, and growing identity properties that an electronic voting system should
fraud/theft have all ushered in an era of fingerprint- have [30]:
based person recognition applications in commercial, Accuracy: (1) it is not possible for a vote to be
civilian, and financial domains. So the Electronic altered, (2) it is not possible for a validated vote to be
voting system has to be improved based on the eliminated from the final tally, and (3) it is not
current technologies viz., biometric system. possible for an invalid vote to be counted in the final
There are some previous works which uses tally.
fingerprint for the purpose of voter identification or Democracy: (1) it permits only eligible voters to vote
authentication. As the fingerprint of every individual is and, (2) it ensures that eligible voters vote only once.
unique, it helps in maximizing the accuracy. A Privacy: (1) neither authorities nor anyone else can
database is created containing the fingerprint of all link any ballot to the voter who cast it and (2) no voter
the voters in the constituency. Illegal votes and can prove that he voted in a particular way.
repetition of votes is checked for in this system. Verifiability: anyone can independently verify that all
Hence if this system is employed the elections would votes have been counted correctly.
be fair and free from rigging. Collusion Resistance: no electoral entity (any server
Fingerprint recognition or fingerprint authentication participating in the election) or group of entities,
refers to the automated method of verifying a match running the election can work in a conspiracy to
between two human fingerprints. Fingerprints are introduce votes or to prevent voters from voting. If all
one of many forms of biometrics used to identify an entities conspire this property isn’t achieved. So, this
individual and verify their identity. Extensive research characteristic should be measured in terms of the
has been done on fingerprints in humans. Two of the total number of entities that must conspire to
fundamentally important conclusions that have risen guarantee a successful interference in the election.
from research are: (i) a person's fingerprint will not Availability: (1) the system works properly as long as
naturally change structure after about one year after the poll stands and (2) any voter can have access to
birth and (ii) the fingerprints of individuals are unique. it from the beginning to the end of the poll.
Even the fingerprints in twins are not the same. In Resume Ability: the system allows any voter who had
practice two humans with the same fingerprint have interrupted his/her voting process to resume it or
never been found [7]. In this study, for the fingerprint restart it while the poll stands
authentication the minutiae based matching is The existing elections were done in traditional way,
considered for higher recognition accuracy. Also, the using ballot, ink and tallying the votes afterward. But
matching accuracy of fingerprint based authentication this system prevents the election from being
systems has been shown to be very high. Fingerprint accurate. Problems encounter the usual elections are
– based authentication systems continue to dominate as follows:
the biometrics market by accounting for almost 52% • It requires human participation, in tallying the
of authentication systems based on biometric traits votes that makes the elections time consuming
[2]. and prone to human error.
This paper is organized as follows: The section II
describes the issues of the present voting system, • The voter find the event boring resulting to a
section III discusses the fundamentals of finger print
small number of voters.
authentication system Section III describes the
proposed novel application for Electronic Voting
• Deceitful election mechanism.
Systems, Section IV describes the Experimental
Results of a pilot election conducted among a class
13
INTERNATIONAL JOURNAL OF INNOVATIVE TECHNOLOGY & CREATIVE ENGINEERING (ISSN:2045-8711)
VOL.1 NO.1 JANUARY 2011
14
INTERNATIONAL JOURNAL OF INNOVATIVE TECHNOLOGY & CREATIVE ENGINEERING (ISSN:2045-8711)
VOL.1 NO.1 JANUARY 2011
analyzed the results with previous referred to the core point and finger code obtained. The paper
transformations. [32] proposed a fingerprint matching which is more
robust at shift and rotation of the fingerprints while it
Feature Extraction: In this section I describe is of high accuracy. A Survey on Ridge feature based
various levels of feature in fingerprint. The levels of matching techniques is proposed in paper [1].
features which is to be extracted are Minutiae, Pores, Minutiae based Matching
Ridge Contour Extraction. Let T and Q be the feature vectors, representing
Minutiae Extraction The next step after enhancement minutiae points, form the template and query
of the image is the extraction of minutiae. The fingerprint, respectively. Each element of these
enhanced image is binarized first in this step. The feature vectors is a minutiae point, which may be
skeleton of the image is then formed. The minutiae described by different attributes such as location,
points are then extracted by the following method. orientation, type, quality of the neighbourhood region,
The binary image is thinned as a result of which a etc. The most common representation of a minutiae
ridge is only one pixel wide. The minutiae points are is the triplet x, y, θ where x, y is the minutiae location
thus those which have a pixel value of one (ridge and θ is the minutiae angle. Let the number of
ending) as their neighbour or more than two ones minutiae in T and Q be m and n, respectively.
(ridge bifurcations) in their neighbourhood. This ends T=m1, m2,…, mm, mi = xi, yi, θi, i =1…m
the process of extraction of minutiae points.
Let (x, y) denote a pixel on a thinned ridge, and Q=m’1, m’2,…,m’ni m’j = x’j, y’j, θ ‘j, j=1…n
N0, N1,…, N7 denote its eight neighbours. A pixel (x, (9)
y) is a
7
Ridge ending if ( ∑ Ni ) = 1 A minutiae mi in T and mj’ in Q are considered
i =0 matching, if following conditions are satisfied:
7
if (
Ridge bifurcation
∑ Ni ) > 2
i =0
III. A NOVEL ELECTRONIC VOTING SYSTEM allowed to vote. Otherwise he is rejected and give the
The main core of this study is to design an beep sound. The person who is authenticated may
electronic voting system based on fingerprint vote for their beloved one by giving his fingerprint to
minutiae is discussed in this section by two phases: i) the fingerprint scanner of corresponding nominee.
Enrolment Process and ii) Voting Process. This is the innovation we made so that no person is
allowed to press voting button as it is one of the
i) Enrolment Process
drawbacks of the present voting machine. After the
The Fig 6 shows the enrolment process clearly. completion of voting, one can know the status of the
The Process involved in using fingerprint scanner for nominees by clicking the count button.
election is very simple. First, the chosen finger for
example, the thumb is captured and extracted. The
fingerprint template is then enrolled and store in a
local repository, a database. This primary process is IV. EXPERIMENTAL RESULTS
done during the registration process. After that, the In this work, we have conducted the Pilot Election
chosen finger can be live scan. The fingerprint using a Personal Computer with four fingerprint
template is then processed and extracted. It will scanners for selecting class representative. For that,
subsequently match the scanned fingerprint against we have created the database which consists of the
the stored template. Upon verification, they will have fingerprint of the Computer Science department
the access to vote for their desired candidates. students with the number of 80 (45 males and 35
Mismatched fingerprint certainly would indicate denial females). The database is created based on the
form the access. digital personal scanner. This primary process is
done during the registration process. After that, the
chosen finger can be live scan. The fingerprint
Fingerprint Scanner template is then processed and extracted. It will
subsequently match the scanned fingerprint against
the stored template. Upon verification, they will have
Capture the the access to vote for their desired candidates.
Fingerprint image Mismatched fingerprint certainly would indicate denial
from the access.
During the voting, the voter first places his thumb
on the touch sensitive region. If the fingerprint
FP Enhancement matches he is allowed to vote. In case the print is not
stored before, a single beep is given, so the person
cannot vote OR if the same person votes again, the
Minutiae Extraction system should give a double beep, so that the
security can be alerted. The system is programmed
to recognize a fingerprint twice, but to give a beep for
more than once.
There are three nominees for the selection of
Fingerprint representative and each student is asked to vote for
the candidates they wish by checking their identity
Database through fingerprint and allowing them to vote by
giving thumb impression against the fingerprint
Fig 6 Enrollment Process scanner of candidate.
The Table 6 shows the pilot election results.
ii) A Novel Design for E-Voting Process TABLE 6: PILOT ELECTION RESULT
In the Fig 7, the first process is capture the input S. Name of the Count of the Votes
No Candidate Polled
image, the captured image is then enhanced by using
the best enhancement technique Gabor. The next 1 M. Jeyaraj 20
step after enhancement is the extraction of minutiae. 2 S. Ashik 15
After extracting minutiae, it is compared with the 3 P. Kokila 10
template which is stored in the database based on
4 P. Krishna 35
minutiae based matching as proposed in the previous
chapter. If the matching result is true, the person is Total 80
17
INTERNATIONAL JOURNAL OF INNOVATIVE TECHNOLOGY & CREATIVE ENGINEERING (ISSN:2045-8711)
VOL.1 NO.1 JANUARY 2011
Fingerprint Scanner
ACKNOWLEDGMENT
This work is a part of a Research Project and
authors are thankful to UGC for funding the Project
(File No. F-38-258/2009 (SR) Dt: 19.12.2009).The
authors would like to thank the anonymous reviewers
for their thorough reviews, and constructive
suggestions which significantly enhance the
presentation of the paper.
REFERENCES
Abishek Rawat,, A Hierarchical Fingerprint Matching System,
Indian Institute of Technology, Kanpur, July 2009
18
INTERNATIONAL JOURNAL OF INNOVATIVE TECHNOLOGY & CREATIVE ENGINEERING (ISSN:2045-8711)
VOL.1 NO.1 JANUARY 2011
Anil K. Jain and David maltoni. , Handbook of Fingerprint Rajnikannan M., Ashok Kumar D., Muthuraj, Estimating the Impact
Recognition, Springer-verlag New York, Inc., Secaucus, NJ, of Fingerprint Image Enhancement Algorithms for Better
USA, 2003 Minutia Detection, International Journal of Computer
Ashbaugh D. R., Quantitative-Qualitative Friction Ridge Analysis: Application, No.1 Article 7, 2010
An Introduction to basic and advanced Ridgeology. CRC Raju Sonavane, Dr. B.S. Sawant., Noisy Fingerprint Image
Press, 1999 Enhancement Technique for Image Analysis: A Structure
Bahuguna R., Fingerprint Verification using Hologram matched Similarity Measure Approach, SNS International Journal of
filterings, Biometric Consortium Eighth Meeting, San Jose, Computer Science and Network Security, Vol. 7, No. 9,
CA, 1996 September 2007
California Internet Voting Task Force. A Report on the Feasibility of Ranade A. and Rosenfeld A, Point pattern matching by relaxation.
Internet Voting, Jan.2000. Pattern Recognition, 12(2):269–275, 1993.
http://www.ss.ca.gov/executive/ivote/ Ratha, N., Chen, S., and Jain, A. Adaptive flow orientation based
Coetzee L. and Botha E.C., Fingerprint Recognition in low quality feature extraction in fingerprint images. Pattern Recognition
images, Pattern Recognition , Vol.26, No.10, pages. 1441- 28, 11, 1657–1672., 1995
1460, 1993 Ridges and Furrows – history and science of fingerprint
Francis Galton. Fingerprints, Macmillan, London, 1892 identification technology and legal issues.
Frank Vahid and Tony Givargis, Embedded System: Design A http://ridgeand.furrows.homestead.com/fingerprint.html
unified Hardware/Software Introduction, John Wiley & Sons, Rubin A.D. Security considerations for remote electronic voting.
Inc, 2002. Communications of the ACM, 45(12):39-44,Dec.2002.
International Biometric Group. Analysis of Level 3 features at High Rui Joaquim, André Zúquete, Paulo Ferreira Revs- A Robust
Resolutions. http://level3tk.sourcforge.net/, 2008 Electronic Voting Voting System Instituto Superior Técnico
Jain A. K., Hong L. , Bolle R., Online Fingerprint Verification, IEEE Salil Prabhakar, "Fingerprint classification and matching using
Trans Patt Anal Mach Intell, Vol 19, No. 4., Pages 302-314, filterbank", Ph. D. Thesis, 2001.
1997 Shaharam Mohammadi, Ali Frajzadeh A . Matching Algorithm of
Jain A., Hong, L., Pankanti, S., and Bolle, R. An identity Minutiae for Real Time Fingerprint Identification System ,
authentication system using fingerprints. In Proceedings of World Academy of Science, Engineering and Technology 60
the IEEE ,vol. 85, pp. 1365–1388.Sep 1997 ,2009
Jain A.K, Prabhakar S., Hong L. , Pankanti S., Filter bank based Sharat Chikkerur, Alexander N. Cartwright and Venu Govindaraju.,
fingerprint matching, IEEE Trans. Image Processing, 9(5): Fingerprint Enhancment using STFT analysis., Pattern
Pages 846–859, 2000. Recognition., 40(1):198-211, 2007
Jain A.K., Chen Y. and Demirkus M., Pores and Ridges: High Sharath Pankanti, Salil Prabhakar and Anil K. Jain., On the
Resolution Fingerprint Matching using Level 3 features, Individuality of Fingerprints, IEEE Trans. Pattern Anal. Mach.
PMAI, 29(1):15-27, January 2007 Intell, 24(8):1010-1025, 2002
Jie Y., Yifang Y., Renjie Z. and Qifa S., Fingerprint minutiae Sherlock, D. B. G., Monro, D. M., and Millard, K. Fingerprint
matching algorithm for real time system, Pattern enhancement by directional Fourier filtering. In IEEE Proc.
Recognition , pp. 143–146 , 2006 Vis. Image Signal Processing , vol 141, pp. 87–94., 1994
Kryszczuk K., Drygajlo A. and Morier P., Extraction of Level 2 and The Thin Blue Line.
Level 3 features for Fragmentary Fingerprints. In proc. http://policensw.com/info/fingerprints/finger06.html, October
Second COST Action 275 Workshop, pages 83-303, 1996. 2006
Maio D. and Maltoni D. , Direct gray scale minutia detection in Tico M., Kuosmanen P., Fingerprint Matching using an Orientation
fingerprints. Transactions on PAMI, 19(1), 1997. based minutia descriptor, IEEE Trans. On Patt. Analy and
Maltoni D., Dmaio, Jain A.K., Prabhakar S. , "Hand book of Mach Intell, Vol. 25, No. 8, Pages 1009-1014, 2003
Fingerprint Recognition", Springer, 2003. Voting: What Is; What Could Be, July 2001.
Mariam BT. Samawi , Web Based Campus Election using Thumb http://www.vote.caltech.edu/Reports/
Recognition, Mara University of Technology Faculty of WUZHILI, "Fingerprint recognition," Student project, Hong Kong
Information Technology and Quantitative Science, May 2006 Baptist University, April 2002.
Marsh R.A., Petty G. S., Optical Fingerprint Correlator, US Patent Xia X. and O’Gorman, L. Innovations in fingerprint capture
5050220, 1991 devices. Journal of Pattern Recognition, Pergamon Press,
Meltemp Ballan & F. Ayhan Sakarya & Brian L.Evans, "A Vol. 36, No. 2, pp. 361-370, 2002
Fingerprint Classification Technique Using Directional Xuejun Tan Bhanu, Yingqiang Lin B. , Fingerprint classification
Images". based on learned features, Center for Res. In Intelligent
Mercuri R.. Electronic Vote Tabulation Checks and balances. PhD Syst., Univ. of California, Riverside, CA, USA; Aug 2005.
thesis, University of Pennsylvania, Philadelphia, PA, Zhou Wang ,Alan Conrad Bovik’sJain,A., “Image Quality
Oct.2000 Assessment :from error visibility to structure imilarity IEEE
National Science Foundation. Report on the National Workshop on transaction On image processing” Vol.13 No4, April 2004
Internet Voting: Issues and Research Agenda, Mar.2001.
Nieuwendijk H.Y.D, Fingerprints.
http://www.xs4all.nl/~dacty/minu.htm, October 2006
19
INTERNATIONAL JOURNAL OF INNOVATIVE TECHNOLOGY & CREATIVE ENGINEERING (ISSN:2045-8711)
VOL.1 NO.1 JANUARY 2011
Abstract—GPS (Global Positioning System) has a Private and Government owned transport, shipping
variety of applications among which real-time tracking and cargo companies have started using GPS to
finds significance in day-to-day life. GPS tracking is track their vehicles. They maintain a tracking
defined as the measurement of object position and database of their own vehicles and they do not want
orientation in a given coordinate system using GPS to share this database with anybody else because of
data at different points of time. GPS data are collected
from GPS receivers attached to the moving objects and
the fear that these data may be used by their
these data are used for tracking objects in real-time. competitors. But researchers need GPS databases
Researchers who work in GPS tracking need GPS generated by hundreds of GPS receivers. This
databases which contain huge volume of GPS data introduces a new problem domain of non-availability
generated by hundreds of GPS receivers. But the of sample data to develop and test GPS
presently available GPS databases are owned by applications. Hence the need for a GPS tracking
private players and are not available for use by the simulator is vital to generate GPS databases. Such a
researchers. This work is an attempt to generate a simulator will greatly reduce the expenses in
database of GPS data which can be used by the research area and enable us to have more
researchers to develop and test GPS applications. The
approach consists of three successive steps:
researches carried out in the allocated budgets.
Collecting floating car data (FCD) of each path once in
a log file; refining the log file; and replaying multiple This paper presents a GPS tracking simulation
instances of several log files simultaneously after process which produces a database of GPS tracking
replacing some old values with new values to simulate data. GPS simulation has already been carried out by
GPS tracking. Thus a single path tracked previously some of the researchers, but with limitations like
can be used to produce a tracking simulation of a hardware dependency, involvement of certain cost,
number of moving objects by path replaying and each complexity, lack of provision for GPS database
and every execution of the simulation generates a set creation and lack of provision for integration of digital
of new GPS tracking data of several moving objects.
These data are stored in a database and can be used
maps. These limitations have been addressed in this
as sample data for developing and testing GPS work. The remainder of this paper is organised as
applications. follows. Section 2 of this paper describes the tracking
of moving objects using GPS. Previous work in this
Keywords: GPS receiver, GPS simulation, GPS data, area is discussed in Section 3. In Section 4, the
Real time tracking. simulation scenario is introduced. The results of the
simulation along with a comparison of output data
I. INTRODUCTION items with real-time data are dealt in Section 5. The
work is concluded and the possible improvements
The applications of GPS tracking in real time have are discussed in Section 6. The path replaying
found its place in almost all walks of life, for instance, simulator has been designed using Matlab 7.6.
navigation, map making, land surveying, fishing and
trekking. GPS has many technical and economical
II. TRACKING USING GPS
benefits to almost all industries and nowadays many
companies are developing GPS [1] enabled A. A. Global Positioning System
applications and systems. More research is being
carried out in this domain as GPS has the unique
There are many thousands of civil users of GPS
capability of locating any moving object over the
system world-wide. GPS is a Satellite Navigation
earth in terms of latitude, longitude and altitude with
System funded, controlled and operated by the U. S.
high accuracy.
Department of Defense [2, 3]. The GPS system
consists of three segments viz., satellites that
transmit the position information, the ground stations
20
INTERNATIONAL JOURNAL OF INNOVATIVE TECHNOLOGY & CREATIVE ENGINEERING (ISSN:2045-8711)
VOL.1 NO.1 JANUARY 2011
that are used to control the satellites, and finally there Many of the tracking systems combine GPS, GSM
is the receiver that computes its location anywhere in technologies. In less than ten years since the first
the world based on information it gets from the GSM network was commercially launched, it became
satellites [4]. the world's leading and fastest growing mobile
standard, spanning over 200 countries. There is at
The satellite segment consists of a minimum of 21 least one cell tower in every 900m-1000m radius in
satellites and 3 working spares. The GPS satellites the high traffic regions (city limits) and in the low
broadcasts two signals, PPS (Precise Positioning traffic regions (high ways) a single cell tower can
Service) which is available for use by military and cover a radius up to 10 km. The operation of GPS
government and SPS (Standard Positioning Service) tracking is explained in Fig. 1. The GPS receiver
which is available for use by public [5]. The Control captures position data from the satellites, computes
Segment consists of a system of control stations the position of the object, say, a vehicle, and sends
located around the world. The Master Control facility this information to a central base station, using SMS
is located in Colorado. These stations measure (Short Message Service) or GPRS(General Packet
signals from the satellites which are incorporated into Radio Service). If the optional storage module is
orbital models which in turn compute precise orbital installed, location data can even be stored when the
data and satellites clock corrections for each and vehicle is out of range of the cellular operator and
every satellite. The Master Control station uploads retrieved later. GSM technology is used to transmit
ephemeris and clock data to the satellites. The this information which in turn is collected by the
satellites then send subsets of the orbital ephemeris server at the base station. The geographical position
data to GPS receivers over radio signals. The of the object can be displayed at the base station
Receiver Segment consists of GPS receivers which using a suitable application.
are used for navigation, positioning, time
dissemination and other applications. A GPS receiver B. B. NMEA Specification
receives signals from more satellites than are actually
needed for a position fix. The reason for this is that if The NMEA (National Marine Electronics
one satellite becomes unavailable, the receiver Association) has developed a specification that
knows exactly where to find the best possible defines the interface between various pieces of
replacement. Three satellites are required for two marine electronic equipments. The NMEA standard
dimensional positioning and four satellites are permits marine electronics to send information to
required for three dimensional positioning. Two computers and to other marine equipments [6] in
dimensional positioning reports position only in terms predefined formats. GPS receiver communication is
of latitude and longitude whereas three dimensional defined with NMEA specification. Most computer
positioning reports position in terms of altitude as programs that provide real time position information
well. In general, a GPS receiver can provide position recognize data that are in NMEA format which
information with an error of less than 10 meters, and includes the latitude, longitude, velocity and time
velocity information with an error of less than 5 computed by the GPS receiver. In NMEA
meters per second. specification system, data is sent as a line of text,
called a sentence which is totally self contained and
independent from other sentences. The data is
contained within this single line and the data items
are separated by commas. The commas act as
terminators for the sentences and the programs that
read the data should only use the commas to
determine the end of a data item.
21
INTERNATIONAL JOURNAL OF INNOVATIVE TECHNOLOGY & CREATIVE ENGINEERING (ISSN:2045-8711)
VOL.1 NO.1 JANUARY 2011
A device for generating NMEA sequences for The dynamic environment of moving objects is
testing embedded GPS reception firmware and modelled using the following steps.
hardware is described by Sinivee V [7]. This work
describes a prototype GPS data simulator designed C. Collecting Floating Car GPS data in a log file
and built in Department of Physics of Tallinn D. Log File Pre-processing
University of Technology, Estonia. Device can work E. Replaying multiple instances of several log file.
in standalone mode and also in conjunction with
F. A. Collecting Floating Car GPS data in a log file
control software. Configuration program can be used
to generate test strings without tester hardware as
well. First version of the device was limited to Nowadays, the main research focus in the
generating only one NMEA message and enabled community of Intelligent Transport Systems (ITS) is
simulation of communication errors. Later versions how to acquire real-time and dynamic transportation
were developed to a more universal device with information. This information can be applied in the
control via a GUI running on an ordinary PC. But transportation area like vehicle tracking, navigation,
there is no option provided in this software to create a road guidance and so on. GPS is one such system
database of NMEA sentences. Hardware dependent which is used to provide real time information on
GPS simulators [1, 8] are also available and they moving objects.
operate by generating pseudo GPS signals.
The Floating Car (Probe Car) technique is one of 07742.4325,E : Longitude 77 deg 42.4325' E
the key technologies adopted by the ITS to get the 31.6 : Speed over the ground in knots
traffic information in recent years [11]. Its basic 317.52 : Course over the ground
principle is to periodically record the location, 140510 : Date – 14th of May 2010
direction, date, time and speed information of the A : Autonomous mode
traveling vehicle from a moving vehicle with the data *62 : The checksum data, always begins with *
of the GPS as shown in Fig 2. The information can be
processed by the related computing model and
algorithm so that the floating car data can be TABLE I
associated with the city road in real time [12]. This $GPRMC DATA FORMAT
data can also be used as a source of data for
creating research and commercial applications on
vehicle tracking and road guidance systems. Data Item Format Description
Message ID $GPRMC RMC protocol header.
Mostly, the GPS receivers generate $GPGGA, UTC Time
$GPGSA, $GPRMC, $GPVTG and $GPGSV (Coordinated hhmmss.sss Fix time to 1ms accuracy.
sentences at a regular time interval. A sample list of Universal Time)
NMEA sentences produced by the GPS receiver and A Data Valid.
Status Char
V Data invalid.
stored in a log file when travelled in a road is given in
Fig. 3. Latitude Float Degrees * 100 + minutes.
N/S Indicator Char N=north or S=south.
Longitude Float Degrees * 100 + minutes.
E/W Indicator Char E=East or W=West.
Speed over Speed Over Ground in
Float
Ground knots
Course over Course Over Ground in
Float
Ground Degrees
Date ddmmyy Current Date
Magnetic
Blank Not Used
Variation
Fig. 3 Log file of floating car GPS data with $GPGGA, $GPGSA, Checksum *xx 2 Digits
$GPRMC, $GPVTG and $GPGSV sentences Message
<CR><LF> ASCII 13, ASCII 10
Terminator
G. B. Log File Pre-processing
The log file contains a number of different types of Hence the next step in the simulation process is to
sentences but the $GPRMC (recommended refine the log file by removing other sentences in
minimum sentence C) provides the essential GPS such a way that it contains the $GPRMC sentences
PVT (Position, Velocity and Time) data. All GPS only as shown in Fig 4. This refined log file now
receivers output this sentence along with some other contains the path of the probe car in terms of latitude
sentences. This data is used to locate moving objects and longitude at an interval of one second per
in terms of latitude and longitude. The moving object, sentence.
if attached with a GPS receiver, can be located with
the help of this NMEA sentence. The $GPRMC data In this context, replaying means picking the
format [13] is given in Table 1.An example of $GPRMC sentences one by one from the log file and
$GPRMC NMEA sentence is given below: plotting the latitude and longitude position of the
$GPRMC,120642.206,A,1118.4253,N,07742.4325, object continuously in a map. During replay, new
E,31.6,317.52,140510,,,A*62 $GPRMC strings are also generated for the moving
Where object as described below.
$GPRMC : Recommended Minimum sentence
C For instance, consider the following sentence in
120642.206 : Fix taken at 12:06:42.206 UTC refined log file.
A : Status A=active or V=Void.
1118.4253,N : Latitude 11 deg 18.4253' N
23
INTERNATIONAL JOURNAL OF INNOVATIVE TECHNOLOGY & CREATIVE ENGINEERING (ISSN:2045-8711)
VOL.1 NO.1 JANUARY 2011
$GPRMC,120642.206,A,1118.4253,N,07742.4325, $GPRMC,111315.773,A,1120.8973,N,07743.0879,
E,31.6,317.52,140510,,,A*62 E,0.00,286.94,240410,,,A*6F
$GPRMC,111316.773,A,1120.8972,N,07743.0879,
E,0.00,286.94,240410,,,A*6D
GPRMC,111317.773,A,1120.8972,N,07743.0879,
E,0.00,286.94,240410,,,A*6C
$GPRMC,111318.773,A,1120.8972,N,07743.0878,
E,0.00,286.94,240410,,,A*62
$GPRMC,111319.773,A,1120.8972,N,07743.0878,
E,0.00,286.94,240410,,,A*63
$GPRMC,111320.772,A,1120.8972,N,07743.0877,
E,0.00,286.94,240410,,,A*67
$GPRMC,111321.772,A,1120.8974,N,07743.0872,
E,1.85,275.60,240410,,,A*6E
Fig. 4 Refined Log file of $GPRMC sentences $GPRMC,111322.772,A,1120.8979,N,07743.0860,
E,4.79,292.27,240410,,,A*6F
H. C. Replaying Multiple Instances of Several Log $GPRMC,111323.772,A,1120.8988,N,07743.0842,
Files E,6.96,294.28,240410,,,A*6A
$GPRMC,111324.771,A,1120.8996,N,07743.0819,
During simulation, the values in the date and time E,8.56,290.47,240410,,,A*60
fields in the above sentence are replaced with system The new $GPRMC sentences produced from the
date and time values as shown below. The micro- above sentences during simulation are listed below.
time in the time field is left unaltered because of its
insignificance. The check sum field is also left $GPRMC,040210.773,A,1120.8973,N,07743.0879,
unaltered as it is insignificant in simulation. The E,0.00,286.94,251110,,,A*6F
remaining values are treated as current values for $GPRMC,040211.773,A,1120.8972,N,07743.0879,
simulation. So the newly generated sentence for E,0.00,286.94, 251110,,,A*6D
simulation will be $GPRMC,040212.773,A,1120.8972,N,07743.0879,
E,0.00,286.94, 251110,,,A*6C
$GPRMC,151245.206,A,1118.4253,N,07742.4325, $GPRMC,040213.773,A,1120.8972,N,07743.0878,
E,31.6,317.52,221110,,,A*62 E,0.00,286.94, 251110,,,A*62
$GPRMC,040214.773,A,1120.8972,N,07743.0878,
The different fields of the newly generated E,0.00,286.94, 251110,,,A*63
sentence for the currently moving object can be $GPRMC,040215.772,A,1120.8972,N,07743.0877,
extracted and stored in the database. E,0.00,286.94, 251110,,,A*67
$GPRMC,040216.772,A,1120.8974,N,07743.0872,
E,1.85,275.60, 251110,,,A*6E
V. GPS TRACKING SIMULATION RESULTS $GPRMC,040217.772,A,1120.8979,N,07743.0860,
E,4.79,292.27, 251110,,,A*6F
Wonde-X series GPS receiver (ZX4125) was used $GPRMC,040218.772,A,1120.8988,N,07743.0842,
in order to produce log files once for each path. The E,6.96,294.28, 251110,,,A*6A
GPS receiver is fixed in a moving car and the NMEA $GPRMC,040219.771,A,1120.8996,N,07743.0819,
sentence generated by it are stored in the log file in a E,8.56,290.47, 251110,,,A*60
laptop kept in the moving car. The log-file is then
refined and replayed to produce simulation of one
moving object. During replay, new $GPRMC
sentences are produced out of the sentences present
in log file. For instance, the first ten sentences
originally available in the log file for a particular path
is given below.
24
INTERNATIONAL JOURNAL OF INNOVATIVE TECHNOLOGY & CREATIVE ENGINEERING (ISSN:2045-8711)
VOL.1 NO.1 JANUARY 2011
ACKNOWLEDGMENT
Fig. 5b
Fig. 5a, 5b Moving objects simulated and plotted in the map at The authors would like to thank Hashprompt Logistics
different instances of time. Management India Pvt. Ltd., for their support to
perform demonstration on GPS tracking using their
resources.
25
INTERNATIONAL JOURNAL OF INNOVATIVE TECHNOLOGY & CREATIVE ENGINEERING (ISSN:2045-8711)
VOL.1 NO.1 JANUARY 2011
REFERENCES
[1] Yun Young-sun, Park Sung-min and Kee Chang-don, "Test of
GBAS Integrity Monitoring System Using GPS Simulator,"
Wuhan University Journal of Natural Sciences, vol. 8, no.2B,
pp. 697-704, 2003.
[2] Parkinson, B. W. and Spilker, J. J., "Global Positioning System:
Theory and Applications," American Institute of Aeronautics and
Astronautics, Washington, 1996.
[3] Interface control document, Navstar GPS Space Segment
(Navigation User Interfaces), 2000.
[4] Asoke K Talukder and Roopa R Yavagal, "Mobile Computing-
Technology, Applications and Service Creation," Tata McGraw
Hill Publishing Company, 2005.
[5] Goran M. Djuknic and Robert E. Richton., "Geolocation and
Assisted GPS," Computer, vol. 34, no. 2, pp.123-125, 2001.
[6] http://avangardo.com accessed on 10-10-2010.
[7] Sinivee V., "Simple yet efficient NMEA sentence generator for
testing GPS reception firmware and hardware," Novel
Algorithms and Techniques in Telecommunications and
Networking, Springer Netherlands, pp.207-210, 2010.
[8] Kou Yanhong, Yang Dongkai and Zhang Qishan, "GPS Satellite
Simulator Signal Estimation based on ANN," Journal of
Electronics(China), vol. 22 no.5, pp.458-464, 2005.
[9]http://www.gpspassion.com/forumsen/topic.asp?TOPIC_ID=114
933 accessed on 10-10-2010.
[10] Rajendran G., Arthanari. M., and Sivakumar M. "A Simplified
NMEA Sentence Generator for the Simulation of GPS
Tracking," Global Journal of Computer Science and
Technology, vol. 10, no. 14, November 2010.
[11] X. W. Dai, M.A. Ferman, “A simulation evaluation of a real-
time traffic information system using probe vehicles,” IEEE
ITSC, vol. 1, pp. 12-15, 2003.
[12] R. Kuehne, R.P. Schaefer and J. Mikat, “New approaches for
traffic management in metropolitan areas,” IFAC CTS, 2003.
[13] http://www.gpsinformation.org/dale/nmea.htm accessed
on 10-10-2010.
[14] Rajendran G., Arthanari. M., and Sivakumar M., "Customized
Digital Road Map Building using Floating Car GPS Data,"
International Journal of Computer Science and Information
Security, vol. 8, no. 3, pp. 21-29, June 2010.
26
INTERNATIONAL JOURNAL OF INNOVATIVE TECHNOLOGY & CREATIVE ENGINEERING (ISSN:2045-8711)
VOL.1 NO.1 JANUARY 2011
Content Organiser
I. Introduction Knowledge Partners in
E-learning System
Content
Organisers/Library Creators
and Information
E-Learning allows learners to study from home, Graphic
Visualize
minimizes the distance between learners and
Graphic
teachers, and enables institutes to provide a high Designer
27
INTERNATIONAL JOURNAL OF INNOVATIVE TECHNOLOGY & CREATIVE ENGINEERING (ISSN:2045-8711)
VOL.1 NO.1 JANUARY 2011
Read text: make choice from numbered list; receive IV. Objects for e-Learning system and Use cases
score.
These examples are simply imitating the commonly Content writer: Responsible for writing the course
accepted notion of what education looks like-which materials for a particular course.
does not involve the way people really learn. “People
E-Course library/ Digital Library: Output of Course
really learn by doing a task they care about, failing
Designers and Content writers.
and redoing it until they get it right”.
Administrative Manager: He/She is in-charge of over
Object oriented system design using UML [2,3] is an
all administrative functions.
important research activity now-a-days. Different
steps of O-O design are design of classes, Briefly we describe the use cases as follows:
identification and construction of different objects,
and ultimately establishing object to object Use Case 1: Learner-Different Cases are Enrollment,
communication. View course, Browse, and Examination.
28
INTERNATIONAL JOURNAL OF INNOVATIVE TECHNOLOGY & CREATIVE ENGINEERING (ISSN:2045-8711)
VOL.1 NO.1 JANUARY 2011
Login Course
Vie
Use Case 1
No
Update
Use Case 4
Monitor
Question for User
Examinat Use Case 5: Administrative Manager- Six different
Cases have been proposed for administrative
manager. These are Guideline to be given to the
learners, Form Design, supervise the course may be
Upd named as Course Monitoring, fees collection,
controlling examination activities, presenting results.
ate
Use Case 2
Guidel
Use Case 3: Content Writer- Two cases are related ine
to Content Writer. These are write contents of the
course and updating the contents as and when Form
needed. C
Design
Con
Update Fee
Collectio
Result
Exam
Control
Use Case 5
Use Case 3
29
INTERNATIONAL JOURNAL OF INNOVATIVE TECHNOLOGY & CREATIVE ENGINEERING (ISSN:2045-8711)
VOL.1 NO.1 JANUARY 2011
References
30
INTERNATIONAL JOURNAL OF INNOVATIVE TECHNOLOGY & CREATIVE ENGINEERING (ISSN:2045-8711)
VOL.1 NO.1 JANUARY 2011
Abstract—This paper,in a sense, is a sequel to an For the basics of character theory of G, we shall
earlier construction by T.Gnanaseelan of a graph Γ (G, refer to [4] . The universal notations such as IrrG,
H) for any finite group G and a subgroup H using χ H, θ G and [ χ , ψ ] will stand for the complete set
(complex) irreducible characters (See [3]). We
of irreducible characters of G, the restriction of a
construct another graph Ω (G, H), which is structurally character χ of G to a subgroup H, the induction of a
quite different from Γ (G,H). However, we prove that
character of H to G and the scalar product
for the special case of the sequence of subgroups Sn-1
⊂ Sn ⊂ Sn+1 (where Sn is the symmetric group on n 1
χ (s) ψ (s −1 )
letters), Γ (Sn, Sn-1) and Ω (Sn+1, Sn) are indeed O (G )
∑
S ∈G
(of course, all
isomorphic.
representations are finite dimensional taken over the
/ ).
complex field C
Key words: Character Theory, Graph Theory, Group
Theory, and Representation Theory.
31
INTERNATIONAL JOURNAL OF INNOVATIVE TECHNOLOGY & CREATIVE ENGINEERING (ISSN:2045-8711)
VOL.1 NO.1 JANUARY 2011
4) If H and K are two subgroups of G such that K namely {1}, { θ 2, θ 3} and { θ 4}. Let 1G, χ 2, χ 3, χ 4
⊂ H, then Γ (G,H) is a subgraph of Γ (G,K). and χ 5 be the irreducible characters of S4 with
5) If, x ∈G then Γ (G, H) = Γ (G, Hx), where Hx degrees 1, 1, 2, 3 and 3 respectively.Then 1GH = 1G +
is the conjugate of H under x. χ 2, θ G2 = θ 3G = χ 3 and θ G4 = χ 4 + χ 5. We
6) Γ (G, H) is connected if and only if core GH = conclude that Ω (L,G) has three connected
(1). components, namely, {1G, χ 2}, { χ 3} and { χ 4, χ 5}.
Naturally, Γ (G,H) and Ω (G,H) are not
7) A connected graph Γ (G, H) is a tree if and isomorphic.
only if G is a Frobenius group NH, and the kernel N is
a unique elementary abelian normal p-Sylow We do not propose to study the graph Ω (G,H)
subgroup for some prime p with order pm and O(H) = systematically here such as the connectivity
m
P - 1. properties etc, as was done by Gnanseelan for his
graph Γ (G,H). However, taking cue from the last
example, we make some beginning which partially
compares with results of Gnanseelan mentioned in
III. THE GRAPH Ω (G, H).
[7].
We shall now construct another finite graph, again
2) Proposition : If H is a normal subgroup of G,
with reference to a subgroup, which, in a sense, will
then Ω (G,H) is disconnected. (If H is trivial Ω
be dual to the graph Γ (G, H).
(G,H), is just a dot, whereas Γ (G, H) is complete).
1) Definition : The vertex set of Ω (G, H), is IrrH
Proof : Let O1, O2, . . . ., Os be the complete set of
and two distinct θ and φ are adjacent if and only if distinct orbits of IrrH under the conjugate action of G
the induced characters θ and φ have atleast one
G G
an IrrH. Then by Clifford’s theorem it is clear that two
element of IrrG in common,in other words[ θ G, φ G]G distinct θ, φ, ∈ IrrH are adjacent in Ω (G,H) if and
> 0. The structural properties of Ω (G, H) differ in only if θ and φ lie in the same orbit Oi for some i.
many ways to those of Γ (G, H). To begin with, even Since H ∆ G, s >1 and hence Ω (G,H)
the vertices sets of both the graphs are different. is disconnected.
But there is one situation wherein the vertices sets Infact, Ω (G,H) has exactly s components each of
of both Γ (G, H) and Ω (G, H) coincide. This which is complete.
occurs when we have a sequence of groups and
subgroups of the form H ⊂ G ⊂ L. Here the vertices We shall push a little further in the compare and
sets of both Γ (G, H) and Ω (L,G) coincide. But contrast syndrome vis-à-vis Γ (G, H) of Gnanaselan.
these graphs need not be the same, as can be seen
from the following example. Consider the sequence H As per (1.3), Γ (G, (1) ) is complete But in Ω
⊂ G ⊂ L , where, L is the symmetric group S4, G is (G,H) completeness can be achieved in quite
the Alternating subgroup A4 and H is the subgroup different situations. First we shall recall Mackey’s
consisting of the two elements {(1), (12)(34)}. Since subgroup theorem.
core GH = maximal normal subgroup of G contained
3) Theorem (Mackey [1]) : If H is a subgroup of
in H is trivial, using the criterion for connectivity
obtained in [3], Γ (G,H) is a connected graph. Using G and if θ, φ, ∈ IrrH, then (θ ,
G
φ G) =
Clifford’s theorem, it is quite easy to see that Ω ∑ (θ, x φ) H ∩ x , where D is a set of double coset
H
(L,G) is not connected. To see this, let 1H, θ 2, θ 3 x∈D
32
INTERNATIONAL JOURNAL OF INNOVATIVE TECHNOLOGY & CREATIVE ENGINEERING (ISSN:2045-8711)
VOL.1 NO.1 JANUARY 2011
4) Theorem ; Let H be a subgroup of G such that upper triangular matrices, (q = pn for a fixed prime p)
for some x ∈D , the set of (H, H) - double coset and also G = PSL (2, q) and B = Borel subgroup.
representatives of H, H ∩x H = (1). Then Ω (G,H) For a brief reference of the representation theory of
G, we refer to [1]. We straightaway go to the
is complete. following.
is true for any two distinct θ, φ, ∈ IrrH, it follows 8) Proposition: When G = GL (2, q), the graph
that Ω (G,H) is complete. Ω (G, B) is connected.
5) Corollary : If H is non-normal and prime cyclic, Proof : As already mentioned, W consists of just
two elements namely, 1 and the element =
then Ω (G,H) is complete.
0 1
Proof is clear. σ = (7) gives all the non-principal
1 0
6) Corollary : If G = NH is a Frobenius group characters θ m, n of Ω which can be pulled back to
with complement H, then Ω (G,H) is complete. give all non-principal irreducible characters of B. It
can be easily seen that θσ m , n = θ n ,m . (Note
Proof : By definition, H ∩a H = (1) for all a ∉H .
The result now follows from the above theorem.
that only when m ≠ n the pull backs are irreducible.)
Turning to our Ω (G,H) we observe that this graph have some irreducible other than 1G we have Ω (G,
has a strong bearing on the character theory of B) is connected.
algebraic groups and the related finite groups. The n
The case G = PSL (2, q), (q - p for a prime p), the
reasons are obvious. The study of the character
Projective Special Linear Group of rank 1. The
theory of these groups heavily rests on the so-called
subgroup that we choose is as before the Borel
‘Harish – Chandra Induction’ and all the fascinating
subgroup B - TU, where T consists of the 2 x 2
theory governing these aspects can be naturally fitted
matrices of determinant 1 and U denotes a p -
graph theoretically into our graph Ω (G,H). We
Sylow subgroup (the unipotent subgroup). We have
propose to take up this study systematically in our
future works, but for the moment, we shall briefly q −1
O (T) = when p is odd and q-1 when p is 2,
outline the construction of Ω (G,B), where G = GL 2
(2,q) and B = the Borel subgroup, the subgroup of
33
INTERNATIONAL JOURNAL OF INNOVATIVE TECHNOLOGY & CREATIVE ENGINEERING (ISSN:2045-8711)
VOL.1 NO.1 JANUARY 2011
q −1
and α 2 each of degree . q+5
2 The irreducible characters of G are
2
We can very easily calculate the character denoted by χ 1, χ 2 (= Steinberg), χ 3, χ 4, of
θ G
, for any θ ∈ IrrB . We write down the induced q +1 q −5
degrees , the irreducible characters
covers I ( θ ) as follows : 2 4
34
INTERNATIONAL JOURNAL OF INNOVATIVE TECHNOLOGY & CREATIVE ENGINEERING (ISSN:2045-8711)
VOL.1 NO.1 JANUARY 2011
We shall draw the graph Ω (G, B) for the case when We shall omit several details regarding the well-
p = 5. known theory of representations via partitions as
developed by Frobenius and Schur and just state the
1B basic facts needed in the sequel.
3) (Frobenius - Schur) : λ of
To every partition
φ1
n, one can associate an irreducible module V λ for
Sn. The family (V λ ) λ n is a complete set of
35
INTERNATIONAL JOURNAL OF INNOVATIVE TECHNOLOGY & CREATIVE ENGINEERING (ISSN:2045-8711)
VOL.1 NO.1 JANUARY 2011
ii) | λ - µ | ≤ 1 for every i (taking µ s+1 = 0 when and when s = r + 1, µ s = 1 and λ s = 0, we can
i i
prove (ii) using similar arguments, which completes
r = s+1 and λ r+1
= 0 when s = r +1 the proof of (ii).
respectively.
(iii) Suppose that | λ -
i
µ i |=1for k i’s, k > 2. Since
iii) |λ -µ | = 1 for exactly two distincts i’s
i i
Σλ i = Σµ i = n, if λ i = µ i -1, then there exists
= 0 for the remaining i’s. some j
36
INTERNATIONAL JOURNAL OF INNOVATIVE TECHNOLOGY & CREATIVE ENGINEERING (ISSN:2045-8711)
VOL.1 NO.1 JANUARY 2011
such that λ =
j
µ j +1 to maintain parity. By µ j. Therefore, ( λ 1, . . . . , λ j-1, µ j +1 . . . . . . . , λ k +1, . .
.. λ s) is a constituent of [ µ ] ↑ . Again λ k-1 > λ k.
Branching theorem, only one part of [ λ ] and [ µ ] will
Therefore ( λ 1, . . . . λ j-1, µ j +1 . . . . λ k-1, λ k+1, . . . .
be
not i) |r-s| ≤ 1,
result. Conversely, let the three conditions hold. iii) | λ - µ | = 1 for exactly two distinct i’s
i i
Case (i) : Let | r – s |=1. It is enough to prove the = 0 for the remaining i’s.
result for r = s+1. Then λ = ( λ , . . . . λ ) and µ = ( µ ,
1 s+1 1
. . . . . , µ s). We can take µ s+1 = 0 and hence by Proof :Let [ λ ] ↓ and [ µ ] ↓ have a common
(ii) λ = 1. By iii) there exists some j such that irreducible constituent (as before, we have simplified
s+1
the notations).
µj = λ +1 and for all other i, λ =
j i
µ i. That means,
(i) Suppose that |r-s| > 1.
µ = (λ , . . . . . λ
1 i-1
, λ , . . . . λ , 1 ) and µ =
i s
Assume that r = s+k, k>1. By Branching
(λ , . . . . λ j-1 , λ j+1 , . . . . λ s, 0). Now, theorem, the partition corresponding to any
1
λ j−1 ≥ λ j + 1. That is λ j−1 > λ j . Therefore irreducible constituent of [ λ ] ↓ will have atleast s+k-
1 parts and the partition corresponding to any
( λ 1, . . . ., λ j+1, . . . λ s, is a constituent of [ λ ] ↑
clearly, replacing 0 by 1 in irreducible constituent of [ µ ] ↓ will have almost s
parts. Since k > 1, s + 1 < s + k. Hence no
1) [ µ ] ↑ we get ( λ , . . . ., λ j-1, λ j+1, . . . . irreducible constituent of [ λ ] ↓ is equal to any
1
λ s, 1) irreducible constituent of [ µ ] ↓ which proves (i).
2) is a constituent of [ µ ] ↑ as well.
Case (ii) : (ii) Assume that | λ - µ | >1 for some i, 1 ≤i≤ r.
i i
37
INTERNATIONAL JOURNAL OF INNOVATIVE TECHNOLOGY & CREATIVE ENGINEERING (ISSN:2045-8711)
VOL.1 NO.1 JANUARY 2011
Case (ii) :
and [ µ ] ↓ will coincide. µ s). By (iii), there exists some j and k such that
λ j = µ j-1 and µ k = λ k - 1 and λ i = µ i for all other
Similar argument holds when λ i - µ i > 1 for some
i’s. That is, λ = ( λ , . . . . , λ , µ - 1, . . . , λ k, . . . . .,
1 j-1 j
1. The cases r = s +1 and s = r + 1 can be dealt with
similarly, completing the proof of ii). λ s) and µ = ( λ 1, . . . . , λ j-1, µ j, . . . . , λ k -1, . . . . λ s)
Then λ j-1 > µ j. Therefore, ( λ 1, . . . . , λ j-1- 1, µ j
(iii) Suppose that | λ - µ i |=1 for k i’s, k > 2.
Since
i
Σλ i = Σ µ i = n, if λ i = µ i + 1, then ......., λ k -1, . . . . λ s) is a constituent of [ µ ] ↓ .
there exists some j such that λ = µ -1 to
Again λ k-1 > λ k. Therefore ( λ 1, . . . . λ j-1, µ j . . . .
j j
maintain parity. By Branching theorem, only one λ k-1 -1, λ k, . . . . λ s) is a constituent of [ λ ] ↓
part of [ λ ] and [ µ ] will be increased by 1 at a time, also.
which constitute the parts of [ λ ] ↓ and [ µ ] ↓ This completes the proof of the lemma. We are
respectively. Hence if k > 2, there will be parts now in a position to prove our main theorem.
say λ , µ in [ λ ], [ µ ] respectively (k ≠ 1,2) such
k k 8)Theorem : The two graphs Ω (Sn+1, S ) and
that λ ≠ µ k and these parts will not be touched
n
k Γ (Sn, Sn-1) are isomorphic.
upon restriction. Thus in each part of [ λ ] ↓ and
[ µ ] ↓ , there will be some λ ≠ µ k. That is, [ λ ] ↓ Proof :Let [ λ ] and [ µ ] belong to IrrSn and let
k
and [ µ ] ↓ will not have any common constituent. [ λ ] ↑ and [ µ ] ↑ contain an irreducible character of
38
INTERNATIONAL JOURNAL OF INNOVATIVE TECHNOLOGY & CREATIVE ENGINEERING (ISSN:2045-8711)
VOL.1 NO.1 JANUARY 2011
39
INTERNATIONAL JOURNAL OF INNOVATIVE TECHNOLOGY & CREATIVE ENGINEERING (ISSN:2045-8711)
VOL.1 NO.1 JANUARY 2011
Abstract — Retinal exudates classification and distribution of exudates and microaneurysms and
identification of diabetic retinopathy to diagnose the eyes hemorrhages[3], especially in relation to the fovea
using fundus images requires automation. This research can be used to determine the severity of diabetic
work proposes retinal exudates classification. retinopathy
Approach: Representative features are obtained Hard exudates are shinny and yellowish
from the fundus images using contextual clustering (CC)
intraretinal protein deposits, irregular shaped, and
segmentation methods. The number of features obtained is
found in the posterior pole of the fundus [4]. Hard
two. The radial basis function (RBF) network is trained by
the features. Final weights are obtained and subsequently exudates may be observed in several retinal vascular
used for testing. pathologies. Diabetic macular edema is the main
cause of visual impairment in diabetic patients.
Results: The presence of exudates is identified Exudates are well contrasted with respect to the
more clearly as the CC uses neighbourhood information. background that surrounds them and their shape and
By knowing the outputs of RBF during testing, accurate size vary considerably [5]. Hard and soft exudates
diagnosis and prescription for treatment of the affected
can be distinguished because of their color and the
eyes can be done. One hundred fundus images are used
sharpness of their borders. Various methods have
for testing. The performance of RBF is 96%(48 images are
classified). been reported for the detection of Exudates. Efficient
algorithms for the detection of the optic disc and
Conclusion: Simulation results show the retinal exudates have been presented in [6][7].
effectiveness of RBF in retinopathy classification. Very
large database can be created from the fundus images Thresholding and region growing methods
collected from the diabetic retinopathy patients that can be were used to detect exudates [8][9], use a median
used for future work filter to remove noise, segment bright lesions and
dark lesions by thresholding, perform region growing,
Keywords: Diabetic retinopathy, fundus image,
then identify exudates regions with Bayesian,
exudates detection, radial basis function, contextual
Mahalanobis, and nearest neighbor (NN) classifiers.
clustering
Recursive region growing segmentation (RRGS).[10],
have been used for an automated detection of
I. INTRODUCTION diabetic retinopathy Adaptive intensity thresholding
and combination of RRGS were used to detect
Diabetic Retinopathy (DR) cause blindness exudates,[11], [12], combine color and sharp edge
[1]. The prevalence of retinopathy varies with the age features to detect exudate. First they find yellowish
of onset of diabetes and the duration of the disease . objects, and then they find sharp edges using various
Color fundus images are used by ophthalmologists to rotated versions of Kirsch masks on the green
study eye diseases like diabetic retinopathy [2]. Big component of the original image. Yellowish objects
blood clots called hemorrhages are found. Hard with sharp edges are classified as exudates.
exudates are yellow lipid deposits which appear as
bright yellow lesions. The bright circular region from
where the blood vessels emanate is called the optic
disk. The fovea defines the center of the retina, and
is the region of highest visual acuity. The spatial
40
INTERNATIONAL JOURNAL OF INNOVATIVE TECHNOLOGY & CREATIVE ENGINEERING (ISSN:2045-8711)
VOL.1 NO.1 JANUARY 2011
II. MATERIALS AND METHODS 1. Define decision parameter Tcc (positive) and
weight of neighbourhood information β
This research work proposes contextual (positive). Let Nn be the total number of data
clustering (CC) and Radial Basis Function (RBF) in the neighbourhood. Let Zi be the data.
network. CC is used for feature extraction. The 2. Initialization: classify element of data with
extracted features are input to the RBF network. In Zi>Tcc to ω1 and element of data to ω0. Store
the classification to C0 and C1.
order to achieve maximum percentage of
3. For each element of data ‘i’, count the
identification of the exudates, proper data input for number of data ui, belonging to class ω1 in
RBF, optimum topology of RBF and correct training the neighbourhood of data ‘i’. Assume that
of RBF with suitable parameters is a must. the element of data outside the data area
belong to ω0.
A large amount of exudates and non 4. Classify element of data with
exudates images are collected. Features are β N
extracted from the images using contextual clustering zi + (u i − n ) > Tα to ω1 and other
segmentation. The features are input to the RBF and Tcc 2
labeling is given in the output layer of RBF. The element of data to ω0. Store the classification
labeling indicates the exudates. The final weights to variable C2.
obtained after training the RBF is used to identify the 5. If C2 ≠C1 and C2 ≠ C0, copy C1 to C0, C2 to C1
exudates. Figure 1 explains the overall sequence of and return to step 3, otherwise stop and
proposed methodology. return to C2.[13]
41
INTERNATIONAL JOURNAL OF INNOVATIVE TECHNOLOGY & CREATIVE ENGINEERING (ISSN:2045-8711)
VOL.1 NO.1 JANUARY 2011
V. EXPERIMENTAL WORK
Figure 4.
42
INTERNATIONAL JOURNAL OF INNOVATIVE TECHNOLOGY & CREATIVE ENGINEERING (ISSN:2045-8711)
VOL.1 NO.1 JANUARY 2011
exudates templates are found. The statistical features Fig.5c Plane 2 of the image in Figure 5a
considered are ‘Convex Area’, ’Solidity’,’ Orientation’
and ‘Filled Area’. In Fig. 5a, different stages of
outputs of CC are given. The entire image processing
included here involves normalizing, histogram
equalization, segmentation.
44
INTERNATIONAL JOURNAL OF INNOVATIVE TECHNOLOGY & CREATIVE ENGINEERING (ISSN:2045-8711)
VOL.1 NO.1 JANUARY 2011
Fig.6a Total pixel values an object is greater than a value of 500, then it is
2500
treated as optic disc. Using the boundingbox concept,
this object is filled with black. Hence the remaining
2000 objects could be either the noise or the exudates.
Figure 7 shows the edydisc removed by applying
Summation of the window
1000
Fig.7 Eyedisc removed
500
0
0 2 4 6 8 10 12
3 X 3 window position 4
x 10
Fig.6b Mean of each window
300
250
200
Mean of the window
6000
5000
150
4000
Statistical area of the objects
3000
100
2000
1000
50
0
0 50 100 150 200 250 300
Object numbers
0
0 2 4 6 8 10 12 The sample outputs of statistical area of
3 X 3 window position x 10
4
the imfeature is shown in Table 1.
The mean (Figure 6b) and the contextual values
(Figure 6c) are shown.
250
Contextual value of window
200
150
100
50
0
0 2 4 6 8 10 12
3 X 3 window position 4
x 10
5108 5117 0.8913 91.3917 2 [4] Walter, T.; Klevin, J.C.; Massin, P.; et al. A Contribution of
Image Processing to the Diagnosis of Diabetic Retinopathy —
Detection of Exudates in Color Fundus Images of the Human
Retina. IEEE Transactions on Medical Imaging 2002, 21,
1236–1243
The RBF is trained with the data given in
Table 1. Each row made up of 4 variables. A [5] Akara Sopharak and Bunyarit Uyyanonvara, “Automatic
Exudates Detection From Non-Dilated Diabetic Retinopathy
labeling is given in the last column. Eighteen Retinal Images Using FCM Clustering Sensors 2009, 9, 2148-
patterns are considered for training RBF. These 2161; doi:10.3390/s90302148
18 patterns are taken from the segmented [6] Xiaohui Zhang, Opas Chutatape School Of Electrical &
Electronic Engineering Nanyang Technological University,
image given in Figure 5e. Additional hard Singapore, Top-Down And Bottom-Up Strategies In Lesion
exudate images can also be considered from Detection Of Background Diabetic Retinopathy. Proceedings
Of The 2005 IEEE Computer Society Conference On
which additional patterns can be obtained. A Computer Vision And Pattern Recognition (CVPR’05), 2005.
topology of 4(nodes in the input layer) X 5(nodes in the hidden [7] Vallabha, D., Dorairaj, R., Namuduri, K., and Thompson,
H., Automated detection and classification of vascular
layer) X 1(node in the output layer) is used for training RBF. abnormalities in diabetic retinopathy. Proceedings of Thirty-
The final weights obtained is used for Eighth Asilomar Conference on Signals, Systems and
Computers. 2:1625–1629, 2004.
classification of the segmented exudates from
[8] Liu, Z.; Chutatape, O.; Krishna, S.M. Automatic Image
the noise present in the segmented image. Analysis of Fundus Photograph. IEEE Conf. on Engineering
in Medicine and Biology 1997, 2, 524–525.
[9] Christopher E. Hann, James A. Revie, Darren Hewett,
Geoffrey Chase and Geoffrey M. Shaw, Screening for
Diabetic Retinopathy Using Computer Vision and
Physiological Markers, Journal of Diabetes Science and
Technology Volume 3, Issue 4, July 2009
46
INTERNATIONAL JOURNAL OF INNOVATIVE TECHNOLOGY & CREATIVE ENGINEERING (ISSN:2045-8711)
VOL.1 NO.1 JANUARY 2011
47
INTERNATIONAL JOURNAL OF INNOVATIVE TECHNOLOGY & CREATIVE ENGINEERING (ISSN:2045-8711)
VOL.1 NO.1 JANUARY 2011
48
phase, further a1 , b1 , d1 , d 2 and φ satisfies the and low Reynolds number, neglecting the terms of
order δ and higher, equations (5) and (6) take the
condition a
2
1 + b 21 + 2a1b1 cos φ ≤ (d1 + d 2 ) 2 . form
∂p ∂ ∂u ∂u
= 1 + We − σ 2 (u + 1) (7)
∂x ∂y ∂y ∂y
∂p
=0 (8)
∂y
The corresponding boundary conditions in wave
frame of reference are given by
u= -1 on y=h1(x)
u= -1 on y=h2(x) (9)
Elimination of pressure from equations (7) & (8) yields
dp ∂ ∂u ∂u
Figure 1.Physical Model = 1 + We − σ 2 (u + 1) (10)
dx ∂y ∂y ∂y
Introducing a wave frame ( x , y ) moving with velocity The volume flow rate q in a wave frame of reference
is given by
c away from the fixed frame ( X , Y ) by the h1 ( x )
transformation, q= ∫ udy
x = X −ct , y =Y ,u =U −c ,v =V and P(x) = P(X,t). h2 ( x )
(2) (11)
and defining The instantaneous flow Q(x, t) in a fixed frame is
h1(x) h1(x) h1(x)
x y u v c h h λ d
x= , y= ,u= ,v= ,t = t , h1 = 1 , h2 = 2 , τxx = τxx, τxy = 1 τxy Q(x,t) = ∫ (u +1)dy = ∫ udy + ∫ 1dy=q+(h -h )
λ d1 c c λ d1 d2 µ0c µ0c h2 (x) h2 (x) h2 (x) 1 2
d d ρcd Γc d γ&d 2
τyy = 1 τyy, δ = 1 , Re= 1 ,We= , P= P, γ& = 1 1
γ& = 2δ 2 + +δ + 2δ . dx ∂y
∂x ∂y ∂x ∂y and the respective boundary conditions are
Here δ, Re, We represent the wave, u 0 = −1 for y = h 1 , u 0 = −1 for y = h2
Reynolds and Weisseing numbers, respectively.
(16)
Under the assumptions of long wavelength δ << 1
49
System of order We1 and the volume flow rate q1 is given by
σ h1 σ h2
2
A −2σ h1 e −e A −2σ h1 e −σ h1 − e−σ h2
dp1 ∂ 2u1 ∂ ∂u0 q1 = + e − E ( h1 − h2 )
− σ u1
e
= + 2
(17) D σ D σ
dx ∂y 2 ∂y ∂y
eσ h1 − eσ h2
+ Ee −σ h1 +H
u 1 = 0, for y = h 1 , u 1 = 0, for y = h 2 (18) σ
0 (23)
Solution for system of order We
Solution of Eq. (15) satisfying the boundary where
conditions (16) can be written as ( B+C) e−2σh1 eσh1 −eσh2 + F−G e−σh1 eσh1 −eσh2 +( B+C) e−σh1 −e−σh2
H= ( )
p 1 −σ h σ y D σ σ D σ
−σ y
u0 = 0 (1 − ke 1) e + ke −1 −1
σ 2 eσ h1 ( e −e ) − dx 3σ ( e −e )
F 2σh1 2σh2 dp0 k2 −2σh1 −2σh2
−
2σe2σh1
(19)
where
σ h2 σ h1
e −e
, and the volume flow From equation (23), we get
dp1 σ
=
3
( q1 − H ) D
k =
eσ ( h2 −h1) − eσ ( h1−h2 )
dx I
(24)
where
rate q 0 is given by
I = ( eσh1 −eσh2 ) e−2σh1 +( eσh1 −eσh2 )( e−σh1 −e−σh2 ) −σD( h1 −h2 ) + De−σh1 ( eσh1 −eσh2 )
q0 = 2
dp0 1 −σh1
3 e (1−ke )( e −e ) −k( e −e ) −σ( h1−h2)−( h1 −h2)
−σh1 σh1 σh2 −σh1 −σh2 Substituting equations (21) and (24) in to equation
dx σ (14) and using the relation (14), we get
dp σ3 L (
(20) = ( q+( h1 −h2 ) ) −σ6We2 q2 +h12 +h22 −2hh
1 2 +2q( h1 −h2 ) 2
From Equation (20), we get
dx J J
25)
dp0 σ ( q0 + ( h1 − h2 ) ) 3
where J=
I
, Integrate above equation over
= −σh1
dx e (1− ke−σh1 )( eσh1 − eσh2 ) − k ( e−σh1 − e−σh2 ) −σ ( h1 − h2 ) D
one wavelength, we get
(21)
(21) 1 1
σ3 L
∆P=∫ dx =∫ ( q+( h1 −h2 ) ) −σ6We2 q2 +h12 +h22 −2hh
dp
1 1 2 +2q( h1 −h2 ) 2 dx
Solution for system of order We 0
dx 0
J J
Substituting the zeroth-order solution (19) into
(17), the solution of the resulting problem satisfying (26)
the boundary conditions take the following form.
where L = A1 + A2 + A3 − A4 + A5 + A6 − A7 − A8
( A+ B+C) e−σh1 + D( E + F −G) e−σh1 σy A+ B+C −σy 1 dp1
u1 = e − e − 2
D D σ dx
e −2σh1 e σ(2 h 2 −h1 ) − e σh 2
2
A1 =
2
3σ 3
D
(1 − ke ) −σ h1 2
2 dp0 2 −2σy
−Fe−2σh1e2σy + ke
3σ3 dx eσ h1 − eσ h2
,
(22) σ
where A = E ( eσ h1 − eσ h2 ) ,B =
F (e −2σ h1 σ ( 2 h2 − h1 )
e − eσ h2 , ) A2 =
2
k2 e ( − eσ h2
σ ( h2 − 2 h1 )
−e
σ ( h1 − 2 h2 )
) e
σ h1
3σ 3 D σ
( )
2
2 dp 0 2 σ ( h2 − 2 h1 )
C= − e ( 1 2)
σ h −2h
k e
3σ 3 dx σ h1
e −e σ h2
A3 = 3 (1 − ke −σ h1 ) e −σ h1
2 2
σ ( h2 − h1 ) σ ( h1 − h2 )
−e ,
D= e , E = 1 dp1 , 3σ σ
σ 2 dx
σ h1 σ h2
2 2 e −e
2
F = 2 dp0 1 − ke−σ h 2 , G =
2 dp0 2 −2σ h1 A4 = 3 k 2 e−2σ h1
3 ( ) k e
3σ 3 dx 3σ σ
1
3σ dx
50
A5 =
3σ
2
3
D
(1 − ke ) ( e −σ h1 2 −2σ h1 σ ( 2 h2 − h1 )
e − eσ h2 )
e −σ h1 − e −σ h2
σ
−σ h1
− e −σ h2
A6 =
2
3σ 3 D
(
k2 e
σ ( h2 − 2 h1 )
−e
σ ( h1 − 2 h2 )
) e σ
A7 =
6σ
2
4 (1 − ke )
e −2σ h1 ( e 2σ h1 − e2σ h2 ) ,
−σ h1 2
A8 = 4 ( e −2σ h1 − e −2σ h2 )
k2
Fig.2. The variation of ∆P with Q for different values of
3σ
σ
for a fixed a = 0.8, b =0.5, φ =0, d =2; We = 0.03
51
REFERENCES
[1]. Fung, Y.C. and Yih, C.S. Peristaltic transport,
Trans ASME, E.J. App. Mech, 35, pp.669-675,
1968.
[2]. Shapiro, A.H., Jaffrin, M.Y and Weinberg, S.L.
Peristaltic pumping with long wavelengths at
low Reynolds number, J. Fluid Mech. 37,pp.
799-825, 1969.
[3]. Raju, K.K. and Devanathan, R. Peristaltic
motion of a non-Newtonian fluid part –I Rheol.
Acta. 11,pp. 170-178, 1972.
52
[12]. Subba Reddy, M.V. Manoranjan Mishra,
Sreenadh, S. and Ramachandra Rao, A.
Influence of lateral walls on peristaltic flow in a
Rectangular ducts, Journal of Fluids
Engineering, 127,pp. 824-827, 2005.
[13]. Subba Reddy.M.V, A.Ramachandra Rao and
S.Sreenadh, Peristaltic motion of a power-law
fluid in an asymmetric channel, International
Journal of Nonlinear Mechanics, 42,pp. 1153-
1161, 2006.
[14]. Kothandapani. M, Srinivas. S , Non-linear
peristaltic transport of a Newtonian fluid in an
inclined asymmetric channel through a porous
medium, Physics Letters A, Volume 372, Issue
8, pp. 1265-1276,2008.
[15]. Srinivas.S, Kothandapani. M, Peristaltic
transport in an asymmetric channel with heat
transfer International Communications in Heat
and Mass Transfer, Volume 35, Issue4,pp.514-
522,2008.
[16]. Brasseur, J.G., Corrsin, S. and Lu, Nan Q. The
influence of a peripheral layer of different
viscosity on peristaltic pumping with Newtonian
fluids, J.Fluid Mech., 174,pp.495-519, 1987.
[17]. Eytan, O. and Elad, D. Analysis of Intra –
Uterine fluid motion induced by uterine
contractions, Bull. Math. Bio.,61,pp.221-238,
1999.
[18]. Nadeem.S ,Akram Safia, Influence of inclined
magnetic field on peristaltic flow of a Williamson
fluid model in an inclined symmetric or
asymmetric channel, Mathematical and
Computer Modelling, Volume52,Issue1-2,
pp.107-119, 2010
[19]. Nagarani, P., Sarojamma, G. and Girija.
Jayaraman, Effect of boundary absorption in
dispersion in Casson fluid flow in a tube, Annals
of Biomedical Engineering, Vol. 32, No.
5,pp.706-719, 2004.
53