Go to the main menu
Skip to content
Go to bottom
REFERENCE LINKING PLATFORM OF KOREA S&T JOURNALS
> Journal Vol & Issue
Journal of Information Processing Systems
Journal Basic Information
Journal DOI :
Korea Information Processing Society
Editor in Chief :
Young-Sik Jeong / Mohammad S. Obaidat
Volume & Issues
Volume 11, Issue 4 - Dec 2015
Volume 11, Issue 3 - Sep 2015
Volume 11, Issue 2 - Jun 2015
Volume 11, Issue 1 - Mar 2015
Selecting the target year
A Dataset of Online Handwritten Assamese Characters
Baruah, Udayan ; Hazarika, Shyamanta M. ;
Journal of Information Processing Systems, volume 11, issue 3, 2015, Pages 325~341
DOI : 10.3745/JIPS.02.0008
This paper describes the Tezpur University dataset of online handwritten Assamese characters. The online data acquisition process involves the capturing of data as the text is written on a digitizer with an electronic pen. A sensor picks up the pen-tip movements, as well as pen-up/pen-down switching. The dataset contains 8,235 isolated online handwritten Assamese characters. Preliminary results on the classification of online handwritten Assamese characters using the above dataset are presented in this paper. The use of the support vector machine classifier and the classification accuracy for three different feature vectors are explored in our research.
Sparse Channel Estimation of Single Carrier Frequency Division Multiple Access Based on Compressive Sensing
Zhong, Yuan-Hong ; Huang, Zhi-Yong ; Zhu, Bin ; Wu, Hua ;
Journal of Information Processing Systems, volume 11, issue 3, 2015, Pages 342~353
DOI : 10.3745/JIPS.03.0028
It is widely accepted that single carrier frequency division multiple access (SC-FDMA) is an excellent candidate for broadband wireless systems. Channel estimation is one of the key challenges in SC-FDMA, since accurate channel estimation can significantly improve equalization at the receiver and, consequently, enhance the communication performances. In this paper, we study the application of compressive sensing for sparse channel estimation in a SC-FDMA system. By skillfully designing pilots, their patterns, and taking advantages of the sparsity of the channel impulse response, the proposed system realizes channel estimation at a low cost. Simulation results show that it can achieve significantly improved performance in a frequency selective fading sparse channel with fewer pilots.
A Review of Fixed-Complexity Vector Perturbation for MU-MIMO
Mohaisen, Manar ;
Journal of Information Processing Systems, volume 11, issue 3, 2015, Pages 354~369
DOI : 10.3745/JIPS.03.0035
Recently, there has been an increasing demand of high data rates services, where several multiuser multiple-input multiple-output (MU-MIMO) techniques were introduced to meet these demands. Among these techniques, vector perturbation combined with linear precoding techniques, such as zero-forcing and minimum mean-square error, have been proven to be efficient in reducing the transmit power and hence, perform close to the optimum algorithm. In this paper, we review several fixed-complexity vector perturbation techniques and investigate their performance under both perfect and imperfect channel knowledge at the transmitter. Also, we investigate the combination of block diagonalization with vector perturbation outline its merits.
Simple Pyramid RAM-Based Neural Network Architecture for Localization of Swarm Robots
Nurmaini, Siti ; Zarkasi, Ahmad ;
Journal of Information Processing Systems, volume 11, issue 3, 2015, Pages 370~388
DOI : 10.3745/JIPS.01.0008
The localization of multi-agents, such as people, animals, or robots, is a requirement to accomplish several tasks. Especially in the case of multi-robotic applications, localization is the process for determining the positions of robots and targets in an unknown environment. Many sensors like GPS, lasers, and cameras are utilized in the localization process. However, these sensors produce a large amount of computational resources to process complex algorithms, because the process requires environmental mapping. Currently, combination multi-robots or swarm robots and sensor networks, as mobile sensor nodes have been widely available in indoor and outdoor environments. They allow for a type of efficient global localization that demands a relatively low amount of computational resources and for the independence of specific environmental features. However, the inherent instability in the wireless signal does not allow for it to be directly used for very accurate position estimations and making difficulty associated with conducting the localization processes of swarm robotics system. Furthermore, these swarm systems are usually highly decentralized, which makes it hard to synthesize and access global maps, it can be decrease its flexibility. In this paper, a simple pyramid RAM-based Neural Network architecture is proposed to improve the localization process of mobile sensor nodes in indoor environments. Our approach uses the capabilities of learning and generalization to reduce the effect of incorrect information and increases the accuracy of the agent`s position. The results show that by using simple pyramid RAM-base Neural Network approach, produces low computational resources, a fast response for processing every changing in environmental situation and mobile sensor nodes have the ability to finish several tasks especially in localization processes in real time.
A Column-Aware Index Management Using Flash Memory for Read-Intensive Databases
Byun, Si-Woo ; Jang, Seok-Woo ;
Journal of Information Processing Systems, volume 11, issue 3, 2015, Pages 389~405
DOI : 10.3745/JIPS.04.0017
Most traditional database systems exploit a record-oriented model where the attributes of a record are placed contiguously in a hard disk to achieve high performance writes. However, for read-mostly data warehouse systems, the column-oriented database has become a proper model because of its superior read performance. Today, flash memory is largely recognized as the preferred storage media for high-speed database systems. In this paper, we introduce a column-oriented database model based on flash memory and then propose a new column-aware flash indexing scheme for the high-speed column-oriented data warehouse systems. Our index management scheme, which uses an enhanced
-Tree, achieves superior search performance by indexing an embedded segment and packing an unused space in internal and leaf nodes. Based on the performance results of two test databases, we concluded that the column-aware flash index management outperforms the traditional scheme in the respect of the mixed operation throughput and its response time.
Robust and Reversible Image Watermarking Scheme Using Combined DCT-DWT-SVD Transforms
Bekkouch, Souad ; Faraoun, Kamel Mohamed ;
Journal of Information Processing Systems, volume 11, issue 3, 2015, Pages 406~420
DOI : 10.3745/JIPS.02.0021
We present a secure and robust image watermarking scheme that uses combined reversible DWT-DCT-SVD transformations to increase integrity, authentication, and confidentiality. The proposed scheme uses two different kinds of watermarking images: a reversible watermark,
, which is used for verification (ensuring integrity and authentication aspects); and a second one,
, which is defined by a logo image that provides confidentiality. Our proposed scheme is shown to be robust, while its performances are evaluated with respect to the peak signal-to-noise ratio (PSNR), signal-to-noise ratio (SNR), normalized cross-correlation (NCC), and running time. The robustness of the scheme is also evaluated against different attacks, including a compression attack and Salt & Pepper attack.
Classification of Textured Images Based on Discrete Wavelet Transform and Information Fusion
Anibou, Chaimae ; Saidi, Mohammed Nabil ; Aboutajdine, Driss ;
Journal of Information Processing Systems, volume 11, issue 3, 2015, Pages 421~437
DOI : 10.3745/JIPS.02.0028
This paper aims to present a supervised classification algorithm based on data fusion for the segmentation of the textured images. The feature extraction method we used is based on discrete wavelet transform (DWT). In the segmentation stage, the estimated feature vector of each pixel is sent to the support vector machine (SVM) classifier for initial labeling. To obtain a more accurate segmentation result, two strategies based on information fusion were used. We first integrated decision-level fusion strategies by combining decisions made by the SVM classifier within a sliding window. In the second strategy, the fuzzy set theory and rules based on probability theory were used to combine the scores obtained by SVM over a sliding window. Finally, the performance of the proposed segmentation algorithm was demonstrated on a variety of synthetic and real images and showed that the proposed data fusion method improved the classification accuracy compared to applying a SVM classifier. The results revealed that the overall accuracies of SVM classification of textured images is 88%, while our fusion methodology obtained an accuracy of up to 96%, depending on the size of the data base.
A Lightweight and Effective Music Score Recognition on Mobile Phones
Nguyen, Tam ; Lee, Gueesang ;
Journal of Information Processing Systems, volume 11, issue 3, 2015, Pages 438~449
DOI : 10.3745/JIPS.02.0023
Recognition systems for scanned or printed music scores that have been implemented on personal computers have received attention from numerous scientists and have achieved significant results over many years. A modern trend with music scores being captured and played directly on mobile devices has become more interesting to researchers. The limitation of resources and the effects of illumination, distortion, and inclination on input images are still challenges to these recognition systems. In this paper, we introduce a novel approach for recognizing music scores captured by mobile cameras. To reduce the complexity, as well as the computational time of the system, we grouped all of the symbols extracted from music scores into ten main classes. We then applied each major class to SVM to classify the musical symbols separately. The experimental results showed that our proposed method could be applied to real time applications and that its performance is competitive with other methods.
Comparative Study of Various Persian Stemmers in the Field of Information Retrieval
Moghadam, Fatemeh Momenipour ; Keyvanpour, MohammadReza ;
Journal of Information Processing Systems, volume 11, issue 3, 2015, Pages 450~464
DOI : 10.3745/JIPS.04.0020
In linguistics, stemming is the operation of reducing words to their more general form, which is called the `stem`. Stemming is an important step in information retrieval systems, natural language processing, and text mining. Information retrieval systems are evaluated by metrics like precision and recall and the fundamental superiority of an information retrieval system over another one is measured by them. Stemmers decrease the indexed file, increase the speed of information retrieval systems, and improve the performance of these systems by boosting precision and recall. There are few Persian stemmers and most of them work based on morphological rules. In this paper we carefully study Persian stemmers, which are classified into three main classes: structural stemmers, lookup table stemmers, and statistical stemmers. We describe the algorithms of each class carefully and present the weaknesses and strengths of each Persian stemmer. We also propose some metrics to compare and evaluate each stemmer by them.
An Enhanced Message Priority Mechanism in IEEE 802.11p Based Vehicular Networks
Liu, Chang ; Chung, Sang-Hwa ; Jeong, Han-You ; Jung, Ik-Joo ;
Journal of Information Processing Systems, volume 11, issue 3, 2015, Pages 465~482
DOI : 10.3745/JIPS.03.0027
IEEE 802.11p is a standard MAC protocol for wireless access in vehicular environments (WAVEs). If a packet collision happens when a safety message is sent out, IEEE 802.11p chooses a random back-off counter value in a fixed-size contention window. However, depending on the random choice of back-off counter value, it is still possible that less important messages are sent out first while more important messages are delayed longer until sent out. In this paper, we present a new scheme for safety message scheduling, called the enhanced message priority mechanism (EMPM). It consists of the following two components: the benefit-value algorithm, which calculates the priority of the messages depending on the speed, deceleration, and message lifetime; and the back-off counter selection algorithm, which chooses the non-uniform back-off counter value in order to reduce the collision probability and to enhance the throughput of the highly beneficial messages. Numerical results show that the EMPM can significantly improve the throughput and delay of messages with high benefits when compared with existing MAC protocols. Consequently, the EMPM can provide better QoS support for the more important and urgent messages.
Performance Comparison of HEVC and H.264/AVC Standards in Broadcasting Environments
Dissanayake, Maheshi B. ; Abeyrathna, Dilanga L.B. ;
Journal of Information Processing Systems, volume 11, issue 3, 2015, Pages 483~494
DOI : 10.3745/JIPS.03.0036
High Efficiency Video Coding (HEVC) is the most recent video codec standard of the ITU-T Video Coding Experts Group and the ISO/IEC Moving Picture Experts Group. The main goal of this newly introduced standard is for catering to high-resolution video in low bandwidth environments with a higher compression ratio. This paper provides a performance comparison between HEVC and H.264/AVC video compression standards in terms of objective quality, delay, and complexity in the broadcasting environment. The experimental investigation was carried out using six test sequences in the random access configuration of the HEVC test model (HM), the HEVC reference software. This was also carried out in similar configuration settings of the Joint Scalable Video Module (JSVM), the official scalable H.264/AVC reference implementation, running on a single layer mode. According to the results obtained, the HM achieves more than double the compression ratio compared to that of JSVM and delivers the same video quality at half the bitrate. Yet, the HM encodes two times slower (at most) than JSVM. Hence, it can be concluded that the application scenarios of HM and JSVM should be judiciously selected considering the availability of system resources. For instance, HM is not suitable for low delay applications, but it can be used effectively in low bandwidth environments.