Developing a Comprehensive Rehabilitation Evaluation System for the Minimization of Reinjury in Postoperative Rotator Cuff Pendulum Exercises
Research Paper | Journal Paper
Vol.3 , Issue.6 , pp.1-8, Jun-2015
Abstract
Pendulum exercises are commonly used in early stage of rehabilitation exercises after rotator cuff repair. However, strain or micromotion at the repair site should be avoided during this phase to facilitate healing. We hypothesized that patients who performed pendulum exercises with improper motion after surgery would increase the potential for recurring injuries. To minimize such injuries and to monitor improper movement, a real-time monitor and warning system that evaluates motion of pendulum exercises was developed. The subjects of study were homogeneous in age and fatty grade, tear size and location, and surgical technique. After initial assessments were performed, the group with the real-time warning system obtained prominent vascular findings at the adjacent repair site after one week (p<0.001), and resulted in lower re-tear rates (p=0.013) twelve weeks after surgery, compared to the group without a real-time warning system. Use of an accelerometer to monitor backward shoulder movement was successful in facilitating tendon-to-bone vascular response and preventing a higher re-tear rate. The comprehensive rehabilitation evaluation system appeared to be effective in minimizing re-injury in the early stages of rehabilitation after rotator cuff repair by monitoring improper shoulder movement through a real-time warning system.
Key-Words / Index Term
Accelerometer; Rotator cuff repair;Pendulum exercises; Ultrasound ; Digitial imaging processing
References
[1] S. C. Gamradt, R. A. Gallo, R. S. Adler, A. Maderazo, D. W. Altchek, R. F. Warren, et al. Vascularity of the supraspinatus tendon three months after repair: Charasterization using contrast-enhanced ultrasound. J Shoulder Elbow Surg, Vol.19, Issue-1, 2010, pp.73-80.
[2] E. A. Codman. “The Shoulder: Rupture of the Supraspinatus Tendon and Other Lesions in or About the Subacromial Bursa.” Malabar, FL: G. Miller and Co Medical Publishers, Inc; 1984.
[3] D. T. Harryman, L. A. Mack, K. Y. Wang, S. E. Jackins, M. L. Richardson , F. A. Matsen. Repairs of the rotator cuff. Correlation of functional results with integrity of the cuff. J Bone Joint Surg Am, Vol.73, 1991, pp.982-989.
[4] L. J. Soslowsky, S. Thomopoulos, G. R. Williams. Tendon to bone healing: Differences in biomechanical, structural, and compositional properties due to a range of activity levels. J Biomech Eng, Vol.125, 2003, pp.107-113.
[5] J. Smith, D. J. Padgett, D. L. Dahm, K. R. Kaufman, S. P. Harrington, D. A. Morrow, et al. Electromyographic activity in the immobilized shoulder girdle musculature during contralateral upper limb movements. J should Elbow Surg, Vol.13, Issue-6, 2004, pp.583-588.
[6] B. T. Kelly, R. J. Williams, F. A. Cordasco, S. I. Backus, J. C. Otis, D. E. Weiland. Differential patterns of muscle activation in patients with symptomatic and asymptomatic rotator cuff tears. J shoulder Elbow Surg, Vol.14, Issue-2, 2004, pp.165-171.
[7] J. L. Long, R. A. Ruberte Thiele, J. G. Skendzel, J. Jeon, R. E. Hughes, B. S. Miller, et al. Activation of the shoulder musculature during pendulum exercises and light activities. J Orthop Sports Phys Ther, Vol.40, Issue-4, 2010, pp.230-237.
[8] J. J. Kavanagh, S. Morrison, D. A. James, R. Barrett Reliability of segmental accelerations measured using a new wireless gait analysis system. J Biomech, Vol.39, Issue-15, 2006, pp.2863–2872.
[9] C. D. Peltz, J. J. Sarver, L. M. Dourte, C. C. Wu¨ rgler-Hauri, G. R. Williams, L. J. Soslowsky. Exercise following a short immobilization period is detrimental to tendon properties and joint mechanics in a rat rotator cuff injury model. J Orthop Res Vol.28, 2010, pp.841–845.
[10] H. K. Uhthoff, M. Seki, D. S. Backman, G. Trudel, K. Himori, H. Sano. Tensile strength of the supraspinatus after reimplantation into a bony trough: An experimental study in rabbits. J Shoulder Elbow Surg. Vol.11, 2002, pp.504–509.
[11] S.A. Fenwick , B. L. Hazleman , G.P. Riley . The vasculature and its role in the damaged and healing tendon. Arthritis Res. Vol.4, Issue-4, 2002, pp.252-260.
[12] S. Fealy, R. S. Adler, M. C. Drakos, A. M. Kelly, A. A. Allen, F. A. Cordasco, et al. Patterns of vascular and anatomical response after rotator cuff repair. Am J Sports Med , Vol.34, Issue-1, 2006, pp.120-127.
[13] D. C. Meyer, K. Wieser, M .Farshad, C. Gerber. Retraction of supraspinatus muscle and tendon as predictors of success of rotator cuff repair. Am J Sports Med, Vol.40, Issue-10, 2012, pp.2242-2247.
[14] Y. S. Kim , S. W. Chung , J. Y. Kim , J. H. Ok , I. Park, J. H. Oh . Is early passive motion exercise necessary after arthroscopic rotator cuff repair? Am J Sports Med, Vol.40, Issue- 4, 2012, pp.815-821.
[15] E. R. Tham, L. Briggs, G. A. Murrell.Ultrasound changes after rotator cuff repair: is supraspinatus tendon thickness related to pain? J Shoulder Elbow Surg, Vol.22, Issue-8, 2013, pp.8-15.
[16] Boissonnault WG, B. M. Patient outcome follow rehabilitation for rotator cuff repair surgery: The imapct of selected medical comorbidities. J Orthop Sports Phys Ther, Vol.37, Issue- 6, 2007, pp.312-319.
[17] J.A. Gimbel, J. P. Van Kleunen, S. P. Lake, G. R. Williams, L. J. Soslowsky. The role of repair tension on tendon to bone healing in an animal model of chronic rotator cuff tears. J Biomech. Vol.40, 2007, pp.561–568.
[18] R.T. Bicknell, C. Harwood, L. Ferreira, G. J. W. King, J. A. Johnson, K. Faber, D. Drosdowech. Cyclic loading of rotator cuff repairs: an in vitro biomechanical comparison of bioabsorbable tacks with transosseous sutures. Arthroscopy, Vol.21, Issue-7, 2005, pp.875-880.
[19] S. S. Burkhart, T. C. Johnson, M. A. Writh, K. A. Athanasiou. Cyclic loading of transosseous rotator cuff repairs: tension overload as a possible cause of failure. Arthroscopy, Vol.13, 1997, pp.172-176.
[20] J. A. McCarron, A. D. Kathleen, M. J Bey, J. M. Polster, J. P. Schils, E. T. Ricchetti, J. P. Iannotti. Failure with continuity in rotator cuff repair ‘‘healing’’ Am J Sports Med, Vol.41, 2013, pp.134-141.
[21] C. T. Chou , C. S. Wen ; S. L. Lou. Rehabilitation evaluation system for rotator cuff repairs-develop a limitable Pendulum exercise brace. In: Proceeding of 2012 IEEE International Symposium on IT in Medicine & Education (ITME); 2012, Aug 3-5, Issue-2, pp.764 – 767.
[22] E. R. Cadet , R. S. Adler , R. A. Gallo , S. C. Gamradt , R. F. Warren , F. A. Cordasco et al. Contrast-enhanced ultrasound characterization of the vascularity of the repaired rotator cuff tendon: short-term and intermediate-term follow-up. J Shoulder
[23] Elbow Surg, Vol.21, Issue-5, 2012, pp.597-603.
[24] L.M. Galatz, L.J. Sandell, S.Y. Rothermich, R.D, Ava Mastny, N. Havlioglu et al. Characteristics of the rat supraspinatus tendon during tendon-to-bone healing after acute injury. J Orthop Res. Vol.24, 2006, pp.541–550.
[25] H. G. Potter, S. T. Jawetz, L. F. Foo. Imaging of the rotator cuff following repair: Human and animal models. J Shoulder Elbow Surg, 2007, pp.134S-139S.
[26] C. A. Murphy, W. J. McDermott , R. K. Petersen, S. E. Johnson , S. A. Baxter . Electromyographic analysis of the rotator cuff in postoperative shoulder patients during passive rehabilitation exercises. J shoulder Elbow Surg, Vol.22, Issue-1, 2013, pp.102-107.
[27] N.G. Arun, S.G. Surya, M.Azath. Survey on mobile healthcare. International Journal of Computer Science and Engineering (IJCSE), Vol.3, Issue-5, 2015, pp.261-263.
Citation
Chin-Tsai Chou, Che-Sheng Wen and Weichih Hu, "Developing a Comprehensive Rehabilitation Evaluation System for the Minimization of Reinjury in Postoperative Rotator Cuff Pendulum Exercises," International Journal of Computer Sciences and Engineering, Vol.3, Issue.6, pp.1-8, 2015.
A Comparative Analysis of Different Movement Models in MANET
Research Paper | Journal Paper
Vol.3 , Issue.6 , pp.9-13, Jun-2015
Abstract
Mobile ad-hoc network (MANET) is a group of wireless movable nodes that form a temporary network without any infrastructure. MANET consists of three words i.e. Mobile which means in moving the nature, Ad-hoc which means for this purpose and Networks which means collections of nodes or computers. Nodes in the MANET are free to move. No inner base station exists and therefore each node acts itself as a router in forwarding the traffic to another. MANETs are also characterize by a active, random and rapidly changing topology. The dynamic topology of MANET makes the routing protocol design complex and difficult. In this paper, we studied different queuing strategies, challenges and different routing scheme. Theoretical and simulation result explain the comparative analysis of the routing scheme.
Key-Words / Index Term
Queuing policies, Challenges, Routing schemes, Movement models
References
[1] RFC2501, Mobile Ad-hoc Networking (MANET) Routing Protocol Performance Issues and Evaluation Considerations,Pages. 1-12,Jan 1999.
[2] Stuart Kurkowski, Tracy Camp and William Navidi, “Two Standard for Rigorous MANET Routing Protocol Evalution”, Pages.256-266,2006.
[3] G. Banga, S. Kumar, A. Singh, “e-EPSAR: Enhanced Efficient Power Saving Adaptive Routing Algorithm for Mobile Ad-hoc Networks” proceeding of the International Journal of Advanced Research in Computer Science and Software Engineering, 3(8),Pages 128-133, 2013.
[4] D. Kumar, A. Srivastva, S. C. Gupta, “Performance Comparison of Pro-active and Reactive Routing Protocols for MANET” 2008.
[5] G.R.Vijayavani, G.Prema ,“Performance comparison of MANET Routing Protocols with Mobility Model derived based on Realistic mobility pattern of Mobile Nodes”, Proceeding of theIEEE Intertnational Conference on Advanced Communication Control and Computing Technologies,Pages.32-35, 2012.
[6] Anders Lindgren and Kaustubh S. Phanse, “ Evaluation of Queueing Policies and Forwarding Strategies for Routing in Intermittently Connected Networks”, Proceeding of 1st International Conference on Communication System Software and Middleware, IEEE, Pages 1-10,2006.
[7] Dinesh Singh, Sanjeev Indora, Anju Rani, Atul Sharma” Routing Policies & Strategies in Delay Tolerant Network”, International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 National Conference on Advances in Engineering and Technology.
[8] Divecha B., Abraham A., Grosan C., and Sanyal S., “ Impact of Node Mobility on MANET Routing Protocols Models”, Journal of Digital Information Management, 5(1),Pages 1-11, 2007.
[9] Jeroen Hoebeke, Ingrid Moerman, Bart Dhoedt and Piet Demeester, “An Overview of Mobile Ad Hoc Networks: Applications and Challenges”.
[10] Aarti, Dr. S. S. Tyagi, “Study of MANET: Characteristics, Challenges, Application and Security Attacks” Proceeding of the IEEE International Journal of Advanced Research in Computer Science and Software Engineering, 3,Pages.252-257,2013.
[11] Gaurav Banga, Amar Singh, “Hierarchical Inter / Intra Cluster Based Enhanced Efficient Power Saving Adaptive Routing Protocol (e-EPSAR) for MANETs: FEAsibilty and analysis” Proceeding of the International Journal of Advanced Research in Computer Science and Software Engineering, 2 Pages.3606-3609,Sept. 2013
Citation
Virali Girdhar and Gaurav Banga, "A Comparative Analysis of Different Movement Models in MANET," International Journal of Computer Sciences and Engineering, Vol.3, Issue.6, pp.9-13, 2015.
A Preliminary Approach to Daily Use Cryptography
Research Paper | Journal Paper
Vol.3 , Issue.6 , pp.14-16, Jun-2015
Abstract
In the modern era of computation security is the most essential matter. Nowadays everyone is concerned about data abstraction. In this paper, a simple yet standard cryptography algorithm has been introduced which can easily be implemented and used by common people. Here, as an introductory approach a text file with some data has been taken and encrypted using a new symmetric key cryptography algorithm and the decryption has been done using the same where each 32 bit from the plain text has been selected and expanded using an Expansion Function and a 64 bit key has been processed and used for the encryption of the expanded plain text. That encrypted text is then shrunk back to 32 bit cipher text. The decryption is done in the same procedure.
Key-Words / Index Term
Plain text, Cipher Text, Key, Shrink Function, Expansion Function, L-Key, R-Key
References
[1] Christof Paar, Jan Pelzl, “Understanding Cryptography: A text book for students and practitioners”, Springer-Verlag Berlin Heidelberg, ISBN: 978-3-642-04100-6, Page No (2-3), (55-83).
[2] David E. Newton, “Encyclopedia of Cryptography”, ABC-CLIO (October 1, 1997), Zero (0th) Edition, ISBN-13: 978-0874367720.
Citation
Rishav Upadhyay and Shibaji Kundu, "A Preliminary Approach to Daily Use Cryptography," International Journal of Computer Sciences and Engineering, Vol.3, Issue.6, pp.14-16, 2015.
Dynamic Stability Factor Based AODV Routing Protocol
Research Paper | Journal Paper
Vol.3 , Issue.6 , pp.17-21, Jun-2015
Abstract
The mobility of nodes is the important factor responsible for the performance of mobile adhoc networks. Since the development of wireless sensors, stability of each node has been an important region of concern to ensure the quality of network. In this paper link stability factor is calculated dynamically in order to use the remaining energy present in the nodes. The modified routing scheme is evaluated by simulation and results show that an improved throughput and reduced end to end delay can be obtained.
Key-Words / Index Term
Wireless Sensor Networks, Sensor Nodes, Link Stability Factor, MANET, AODV Routing Protocol
References
[1]. P.Srinivasan,Dr.P.kamalakkannan ,”REAQ-AODV Route stability and energy aware QOS Routing in mobile adhoc networks” ,IEEE-IV international conference on advanced computing ICOAC 2012, MIT, Anna University, chennai, December 13-15,2012.
[2]. Jianzhen Sun, Yuan’an Liu, Hefei Hu and Dongming Yuan,”Link stability based routing in mobile adhoc network”, IEEE-Beijing university of posts and telecommunication, 2010.
[3]. Mrs.Sangeeta Kurundkhar, Apoorva maidamwar,”An improved AODV routing protocol for mobile adhoc networks”, Internal Journal of advanced research in electrical, electronics & Instrumentation engineering, July 2013.
[4]. Devideen ahirwar, Prof.Sarvesh Singh Rai,”Improvement of AODV Routing Protocol Algorithm with link stability & energy efficient Routing in MANET”, International Journal of Computer Science Engineering & Technology, February 2014.
[5]. Geetha nair, Dr.N.J.R Muniraj,”Prediction based link stability Scheme for mobile adhoc networks”, International Journal of Computer Science Issues, Nov 2012.
[6]. Reena Singh, Shilpa Gupta,”EE-AODV Energy efficient AODV Routing Protocol by Optimizing Route Selection Process ”, International Journal of Research in computer and communication Technology, January 2014.
[7]. Shrikant D.Kulkarni, Radhika D.Joshi,”Performance improvement of AODV protocol by introducing energy factor technique”, Proc. Of international conference on advances in electronics, electrical and computer science engineering, 2012.
[8]. Asha Ambhaikar, H.R Sharma, “Improved AODV Protocol for solving link failure in MANET”, International Journal of Scientific & Engineering Research, October 2012.
[9]. Murthy,Manoj, “ Ad hoc Wireless Networks and Architecture and protocols” ,Prentice Hall PTR,2004.
[10]. Lee,M-G., & Lee, “A link stability model and stable routing for mobile adhoc networks” ,EUC'06,Seoul,Korea,2006.
[11]. Morteza Maleki,Karthik,Pedram, “Power-aware Secure Routing Protocol for Mobile Ad hoc Networks” ,ISLPED'02,California,USA,2002.
[12]. Nityananda Sarma,Sukumar Nandi , “Route Stability Based QoS Routing in Mobile Ad Hoc Networks” ,Wireless Pers Comm., Springer,2009.
[13]. M.Rajendiran, S.K. Srivatsa, “An Improved Routing Algorithm to Enhance Energy Efficiency in Multicast Ad Hoc Networks “, European Journal of Scientific Research Vol.72, No.1, 2012, pp. 97-106.
[14]. M.Rajendiran, S.K. Srivatsa, “Route efficient on demand multicast routing protocol with stability link for MANETs”, Indian Journal of Science and Technology, Vol. 5, No. 6 , June 2012,pp.2866-2871.
[15]. G N V Prasad, V. Siva Parvathi, Dr.K.Nageswara Rao, “Link stability based multicast routing scheme in Manet”, International Journal of Advanced Engineering Sciences and Technologies (IJAEST), Vol.8, Issue 2, pp.169-176.
[16]. Akbari Torkestani, Meybodi M R“ A Link Stability-based Multicast Routing Protocol for Wireless Mobile Ad hoc Networks”, Journal of Network and Computer Applications, Volume 34, Issue 4, July 2011, pp. 1429-1440.
[17]. D. Johnson et al., “Dynamic Source Routing for Mobile Ad Hoc Networks”, IEFT MANETDraft,April2003.
Citation
Harpinder Kaur and Birinder Singh, "Dynamic Stability Factor Based AODV Routing Protocol," International Journal of Computer Sciences and Engineering, Vol.3, Issue.6, pp.17-21, 2015.
PAPR Reduction in OFDM System by Using Discrete Cosine Transform and µ-law Companding
Review Paper | Journal Paper
Vol.3 , Issue.6 , pp.22-25, Jun-2015
Abstract
Communication is one of the important aspects of human life. With the advancement in age and its growing demands, there has been rapid growth in the field of communication. Multi-carrier modulation is an attractive transmission technique for fourth generation high speed wireless communication. Orthogonal Frequency Division Multiplexing (OFDM) is a promising multicarrier technique used in wireless communication with high data rate and high spectral efficiency.One of the main problems of the OFDM system is the high Peak-to-Average Power Ratio(PAPR) of transmission signal due to the use of many subcarriers. In this paper, a joint Discrete Cosine Transform (DCT) and µ-law companding method is proposed to reduce peak-to-average power ratio of OFDM signal. Simulation results show that this new method is more efficient than the conventional OFDM systems.
Key-Words / Index Term
Multi-carrier modulation, OFDM, PAPR, µ-law companding, DCT Transform
References
[1] Y.Wu and W. Y. Zou, “Orthogonal frequency division multiplexing: A multi-carrier modulation scheme,” IEEE Trans. Consumer Electronics, vol. 41, no. 3, pp. 392–399, Aug. 1995.
[2] W. Y. Zou and Y. Wu, “COFDM: An overview,” IEEE Trans. Broadcasting, vol. 41, no. 1, pp. 1–8, Mar. 1995.
[3] T. Jiang, W. Xiang, H. H. Chen, and Q. Ni, “Multicast broadcasting services support in OFDMA-based WiMAX systems,” IEEE Communications Magazine, vol. 45, no. 8, pp. 78–86, Aug. 2007.
[4] H. Rohling, T. May, K. Bruninghaus, and R. Grunheid, “Broadband OFDM radio transmission for multimedia applications,”Proc. IEEE, vol.87, pp.1778-1789, Oct.1999.
[5] Pepin MagnanganaZokoGoyoro, Ibrahim James Moumouni, SroyAbouty “SLM Using Riemann Sequence Combined with DCT Transform for PAPR Reduction in OFDM Communication Systems” International Journal of World Academy of Science in Computer and information Engineering, Issue No. 64, pp. 347-352, 2012.
[6] J. Kim and Y. Shin, “An Effective Clipping Companding Scheme for PAPR Reduction of OFDM Signal,” IEEE International Conference on Communications 2008, Bei-jing,, pp. 668-672, 2008.
[7] Zhongpeng Wang in “Combined DCT and Companding for PAPR Reduction in OFDM Signals” Scientific Research Journal of Signal and Information Processing, Vol:2,, pp. 100-104, 2011.
[8] “Cisco - Waveform Coding Techniques”. Retrieved 2008- 07-29.
[9] X. D. Zhu, G. X. Zhu and T. Jiang, “Reducing the Peak-to- Average Power Ratio Using Unitary Matrix Transformation,” IET Communications, Vol. 3, No. 2, pp.161-171, 2009.
[10] B.Benarji, G.Sasibhusana Rao, S.PallamSetty “ BER Performance of OFDM System with various OFDM frames in AWGN, Rayleigh and Rician fading channel.” Int. Journal of Computer Sciences and Engineering, vol.
Citation
Arpit Maheshwari, Puneet Khanna and Neelu Trivedi, "PAPR Reduction in OFDM System by Using Discrete Cosine Transform and µ-law Companding," International Journal of Computer Sciences and Engineering, Vol.3, Issue.6, pp.22-25, 2015.
A Survey Paper on Inter-carrier Interference Reduction Techniques in OFDM Systems
Research Paper | Journal Paper
Vol.3 , Issue.6 , pp.26-29, Jun-2015
Abstract
Orthogonal Frequency Division Multiplexing (OFDM) is a multicarrier modulation technique that divides the available spectrum into many carriers. The efficient use of the spectrum makes it more suitable for transmitting high speed data candidate. However, the main drawback is its sensitivity to CFO causing Inter Carrier Interference (ICI). The Orthogonal Frequency Division Multiplexing systems (OFDM) suffering from interference between carriers in mobile environment due to loss of orthogonality between subcarriers caused by Doppler shifts. Many ICI Reduction techniques in this paper, to improve the performance of OFDM systems. This ICI causes severe degradation of the bit error rate (BER) of OFDM receiver. There are numerous techniques for reducing ICI windows, including time domain, frequency domain equalization, matrix technique and ICI self-cancellation.
Key-Words / Index Term
Bit error Rate (BER); Additive white Gaussian noise (AWGN); Inter carrier interference (ICI); carrier frequency offset (CFO); orthogonal frequency division multiplexing (OFDM)
References
[1] Yi-Hao Peng, etal, “Performance Analysis of a New ICI-Self- Cancellation-Scheme in OFDM Systems,” IEEE Transactions on Consumer Electronics, vol.53, no. 4, pp.1333-1338, 2007.
[2] Qiang Shi “A Novel ICI Self-Cancellation Scheme for OFDM Systems,” IEEE conference on WiCom, pp 1-4, sept. 2009.
[3] Y. Zhao and S. Häggman, “Intercarrier interference self-cancellation scheme for OFDM mobile communication systems,” IEEE Transactions on Communications, vol.49, no. 7, pp. 1185-1191, 2011.
[4] Heung-Gyoon Ryu, Yingshan Li, and Jin-Soo Park, “An Improved ICI Reduction Method in OFDM Communication System,” IEEE Transactions on Broadcasting, vol.51, no.3, pp.395-400, 2013.
[5] Y. Fu, S. G. Kang, and C. C. Ko, “A new scheme for PAPR reduction in OFDM systems with ICI self-cancellation,” IEEE 56th Vehicular Technology Conf., vol.3, pp. 1418–1421, Sep. 2012.
[6] M A Matin “A New Approach to Improve ICI Self-Cancellation Technique in OFDM”, ICECE, December 2010.
[7] J. Armstrong, “Analysis of new and existing methods of reducing inter carrier interference due to carrier frequency offset in OFDM,” IEEE Transactions on Communications, vol. 47, no. 3, pp.365- 369, 1999.
[8] J. G. Proakis, Digital Communications: McGraw-Hill, 2000.
[9] X. Li, R. Zhou, V. Chakravarthy, S. Hong, and Z. Wu, “Total intercarrier interference cancellation for ofdm mobile communication systems,” IEEE Consumer Communications and Networking Conference, pp. 1 –5, Jan. 2010.
[10] R. Zhou, X. Li, V. Chakravarthy, H. Li, and Z.Wu, “The demonstration of smse based cognitive radio in mobile environment via software defined radio,” IEEE Global Communications Conference, Dec. 2010.
[11] Zhang Zhi-hui, Wang Yin, and Duan Tao, “Theoretical analysis of ICI self-cancellation in OFDM systems over Rayleigh flat-fading channels,” The Journal of China Universities of Posts and Telecommunications, Elsevier, pp. 6–12, Sep. 2011.
[12] Xue Li, Ruolin Zhou, Vasu Chakravarthy, Steven Hong, and Zhiqiang Wu, “Total Intercarrier Interference Cancellation for OFDM Mobile Communication Systems,” IEEE CCNC, pp. 1-5, 2010.
[13] Defeng Huang, and Khaled Ben Letaief, “An Interference-Cancellation Scheme for Carrier Frequency Offsets Correction in OFDMA Systems,” IEEE Transactions on Communications, Vol. 53, No. 7, pp. 1155-1165, July 2005.
[14] V. K. Dwivedi and G. Singh, “An efficient BER analysis of OFDM systems with ICI conjugate cancellation method,” PIERS Proceedings, July, 2008.
[15] Charan Langton, “Orthogonal frequency division multiplexing (OFDM) tutorial,” http://www.complextoreal.com/chapters/ofdm2.pdf
[16] L. Hanzo, M. Munster, B. J. Choi and T. Keller, “OFDM and MC-CDMA for broadband multi-user Communications,” New York, IEEE press, 2000.
[17] A. R. S. Bahai, B. R. Saltzberg, “Multi-Carrier Digital Communication Theory and Applications of OFDM,” Plenum Publishing, New York, 1999.
[18] J. A. C. Bingham, “Multi Carrier Modulation for Data Transmission, An Idea Whose Time Has Come”, IEEE Communications Magazine, pp., 5-14, May. 1990.
Citation
Brijesh Ahirwar and Vishal Pasi, "A Survey Paper on Inter-carrier Interference Reduction Techniques in OFDM Systems," International Journal of Computer Sciences and Engineering, Vol.3, Issue.6, pp.26-29, 2015.
A Survey: Optimization of Bit Error Ratio in Fiber Optic Communication System
Survey Paper | Journal Paper
Vol.3 , Issue.6 , pp.30-34, Jun-2015
Abstract
A key objective of the modeling of Fiber Optic Communication systems is to understand the physics of the system behaviour and the development of computational tools for the design of systems and predict their performance. Data transmission via fiber optical link inevitably leads to bit errors due to various effects, the dominant of which are optical amplifier noise, nonlinearity, polarization effects and non ideal transreceivers. There are numerous studies that provide techniques to characterize and calculate the effects in Bit Error Ratio (BER). In This paper, we optimize the Bit Error Ratio (BER) in fiber optic communication. The calculation of the BER in a system of finding optimum power level requires an accurate model of the nonlinear interactions. Our method of calculation of the BER in the presence of nonlinear distortion and amplified spontaneous emission noise is based on calculations of the full Probability Density Function (PDF) of the amplitude or time jitter induced nonlinear phase. Using knowledge of the PDF of the variation of the amplitude induced by combined noise, noise and nonlinear contributions issue to calculate the BER. The purpose of this paper is to develop a method to accurately account between nonlinear crosstalk and channels in the calculation of BER.
Key-Words / Index Term
Optical Fiber Communication (OFC); Bit Error Ratio (BER); Probability Density Function (PDF); Multiplerxer (MUX); Demultiplexer (Demux); Figure of Merit (FOM)
References
[1] L. Kazovsky, S. Benedetto, and A. Willner, “Optical Fiber Comminication Systems,” Boston: Artech House, 2006.
[2] G. P. Agrawal, “Fiber-Optics Communication Systems,” New York: Wiley, 2nd edition, 2007.
[3] I.P. Kaminov and T. Li (Eds.), “Optical Fiber Telecommunications IVB,” San Diego: Academic Press, 2012.
[4] R.-M. Mu and C. R. Menyuk, “Convergence of the chirped return-to-zero and dispersion managed soliton modulation formats in WDM systems,” J. Lightwave Technol., vol. 20, pp. 608-617, 2012.
[5] S. Bigo, G. Bellotti, and M. Chbat, “Investigation of cross-phase modulation limitation over various types of ber infrastructures,” IEEE Photon. Technol. Lett., vol. 11, pp. 605-607, 2009.
[6] E. Desurvire, “Erbium-doped ber amplifiers: principles and applications,” New York: Wiley, 2004.
[7] E. Forestieri, “Evaluating the error probability in lightwave systems with chromatic dispersion, arbitrary pulse shape and pre- and post detection filtering,” J. Lightwave Technol., vol. 18, pp. 1493-1503, 2010.
[8] Karamjeet Kaur, and Chakshu Goel, “Threshold based Bit Error Rate Optimization in Four Wave Mixing Optical WDM Systems” in American Journal of Engineering Research, Vol. 03, Issue-03, pp-225-229, 2014.
[9] Amninder Kaur, Sukhbir Singh and Rajeev Thakur, “Review Paper: Free Space Optics”, International Journal of Advanced Research in Computer Science and Software Engineering, Vol. 4, Issue 8, pp. 969-976, 2014.
[10] S. M. Jahangir Alam, M. Rabiul Alam, Guoqing Hu, and Md. Zakirul Mehrab, “Bit Error Rate Optimization in Fiber Optic Communications”, International Journal of Machine Learning and Computing, Vol. 1, No. 5, pp. 435-440, 2011.
Citation
Shadbhawana Jain and Ritu Dubey, "A Survey: Optimization of Bit Error Ratio in Fiber Optic Communication System," International Journal of Computer Sciences and Engineering, Vol.3, Issue.6, pp.30-34, 2015.
Comparative Analysis of Various Image Denoising Techniques: A Review Paper
Review Paper | Journal Paper
Vol.3 , Issue.6 , pp.35-39, Jun-2015
Abstract
Removing noise from the image frame remained a difficult task for researchers. Image denoising is an important issue in image processing and computer vision. A good image denoising model should completely eliminate noise and preserve edges. There are several existing methods for denoise image. Each method has its advantages and disadvantages. In this paper a review of some important works done in the field of image denoising is presented. This paper also contains a comparative study of different image denoising techniques.
Key-Words / Index Term
Denoising; Wavelet transforms; Gaussian noise; Speckle noise; linear filters; Thresholding
References
[1] Kenneth, R., “Digital Image Processing”, Prentice Hall, New Jersey, 1979.
[2] Rafael C. Gonzalez and Richard E.Woods, “Digital Image Processing”, Pearson Education, Second Edition, 2005.
[3] Kenny Kal Vin Toh,Nor, Ashidi Mat Isa, “Noise Adaptive Fuzzy Switching Median Filter for Salt-and- Pepper Noise Reduction”, IEEE Trans. Image Processing, Vol. 17, No. 3, March 2010.
[4] Sheng-Fu Liang, Shih-Mao Lu, Jyh-Yeong Chang, and Chin-Teng Lin, “A Novel Two-Stage Impulse Noise Removal Technique Based on Neural Networks and Fuzzy Decision”, IEEE Trans. Image Processing, Vol. 16, No. 4, August 2008.
[5] H. Guo, J. E. Odegard, M. Lang, R. A. Gopinath, I.W. Selesnick, and C. S. Burrus, "Wavelet based speckle reduction with application to SAR based ATD/R," First Int'l Conf. on Image Processing, vol. 1, pp. 75-79, Nov. 1994.
[6] Robert D. Nowak, “Wavelet Based Rician Noise Removal”, IEEE Transactions on Image Processing, vol. 8, no. 10, pp.1408, October 1999.
[7] Matlab 6.1, “Image Processing Toolbox”, http:/www.mathworks.com/access/helpdesk/help/toolbox/images/.
[8] Umbaugh, S. E., “Computer Vision and Image Processing,” Prentice Hall PTR, New Jersey, 1998.
[9] Gagnon, L., “Wavelet Filtering of Speckle Noiseome Numerical Results,” Proceedings of the Conference Vision Interface, Trois-Reveres, 1999.
[10] Goodman, J. W., “Some fundamental properties of Speckle,” J. Opt. Soc. Am., pp. 1145–1150, 1976.
[11] Pawan Patidar, Manoj Gupta, Sumit Srivastava, Ashok Kumar Nagawat,“ Image De-noising by Various Filters for Different Noise”, International Journal of Computer Applications, Vol. 9, No.4, pp. 975-887, 2010.
[12] Yousef Hawwar and Ali Reza, “Spatially Adaptive Multiplicative Noise Image Denoising Technique”, IEEE Transaction On Image Processing, Vol.-11, No. 12, 2002.
[13] Motwani, M.C., Gadiya, M. C., Motwani, R.C., Harris, F. C Jr. “Survey of Image Denoising Techniques,” IEEE Conference Digital Communication System, pp. 11-16, 2012.
[14] Windyga, S. P., “Fast Impulsive Noise Removal,” IEEE transactions on image processing, Vol. 10, No. 1, pp.173-178, 2001.
[15] Kailath, T., “Equations of Wiener-Hopf type in filtering theory and related applications,” in Norbert Wiener: Collected Works vol. III, P.Masani, Ed. Cambridge, MA: MIT Press, pp. 63–94, 1976.
[16] Kanika Gupta, S.K. Gupta, “Image Denoising Techniques – A Review paper”, International Journal of Innovative Technology and Exploring Engineering (IJITEE), Vol. 2, Issue 4, 2013.
[17] S.Arivazhagan, S.Deivalakshmi, K.Kannan, “Performance Analysis of Image Denoising System for different levels of Wavelet decomposition”, International Journal of Imaging Science and Engineering (IJISE), Vol.1, No. 3, 2007.
[18] Idan Ram, Michael Elad, and Israel Cohen, “Generalized Tree-Based Wavelet Transform”, IEEE Transactions On Signal Processing, Vol. 59, No. 9, 2011.
[19] Rakesh Kumar and B. S. Saini , “ Improved Image Denoising Technique Using Neighboring Wavelet Coefficients of Optimal Wavelet with Adaptive Thresholding”, International Journal of Computer Theory and Engineering , Vol. 4, No. 3, 2012.
[20] Sachin D Ruikar, Dharampal D Doye, “Wavelet based image denoising technique”, International Journal of Advanced Computer Science and Applications, Vol.2, No.3, 2011.
[21] Sethunadh R and Tessamma Thomas ,“Spatially Adaptive Image Denoising using Undecimated Directionlet Transform”, International Journal of Computer Applications (IJCA), Vol.8, No.11, 2013.
[22] S.Kother Mohideen, Dr. S. Arumuga Perumal, Dr. M.Mohamed Sathik, “Image De-noising using Discrete Wavelet transform”, International Journal of Computer Science and Network Security (IJCSNS), Vol.8, No.1, 2008.
[23] S.S.Patil, A.B.Patil, S.C.Deshmukh, M.N.Chavan, “Wavelet Shrinkage Techniques for Images”, International Journal of Computer Applications, Vol.7, No.1, 2010.
[24] Akhilesh Bijalwan, Aditya Goyal, Nidhi Sethi, “Wavelet Transform Based Image Denoise Using Threshold Approaches”, International Journal of Engineering and Advanced Technology (IJEAT), Vol.1, Issue- 5, 2012.
[25] Abdolhossein Fathi and Ahmad Reza Naghsh-Nilchi, “Efficient Image Denoising Method Based on a New Adaptive Wavelet Packet Thresholding Function”, IEEE Transaction On Image Processing, Vol. 21, No. 9, 2013.
[26] David L. Donoho and Iain M. Johnstone, “Ideal spatial adaption via Wavelet Shrinkage”, Journal of Biometrika, Vol.8, pp. 425-455, 1994.
[27] E.Jebamalar Leavline, S.Sutha, D.Asir Antony Gnana Singh, “Wavelet Domain Shrinkage Methods for Noise Removal in Images: A Compendium”, International Journal of Computer Applications, Vol. 3, No. 10, 2011.
[28] Priyanka Kamboj, Versha Rani, “A Brief Study Of Various Noise Model And Filtering Techniques”, Journal of Global Research in Computer Science, Vol. 4, pp. 166-171, 2013.
[29] Vikas Gupta, Dr. Vijayshree Chaurasia Dr. Madhu Shandilya, “A Review on Image Denoising Techniques”, International Association of Scientific Innovation and Research (IASIR), pp. 13-34, 2013.
Citation
Rajneesh Mishra, Priyanka Pateriya, D.K. Rajoriya and Anand Vardhan Bhalla, "Comparative Analysis of Various Image Denoising Techniques: A Review Paper," International Journal of Computer Sciences and Engineering, Vol.3, Issue.6, pp.35-39, 2015.
Flowgraph Representation of Information System Using Rough Set Theory
Research Paper | Journal Paper
Vol.3 , Issue.6 , pp.40-43, Jun-2015
Abstract
Lot of work has been done to classify raw data, for e.g. Data Mining, Machine Learning etc. But in these approaches uncertainty is not focused. Thus in this we are trying to find accuracy when uncertainty is in raw data. The starting point of rough set theory is an information system In this paper, Rough Set Theory is applied on 9 different mobile brands. Survey is conducted where 334 participants were asked to evaluate these 9 brands on different parameters. Using this information, Decision table and Flow Graph will be created and will found accuracy and strength of same.
Key-Words / Index Term
Rough Sets, Information System and Flow Graph
References
[1] Abraham A., Bello R. and Falcon R., “Rough Set Theory: A True Landmark in Data Analysis”, Studies in Computational Intelligence, Vol. 174, 1-324.
[2] Rissino S. and Torres G. L., “Rough Set Theory – Fundamental Concepts, Principals, Data Extraction, and Applications”, Julio Ponce and Adem Karahoca, ISBN, 35-58.
[3] Zbigniew S., “An Introduction to Rough Set Theory and Its Applications”, ICENCO, 27- 30.
[4] Pawlak Z., “Rough sets”, International Journal of Computer and Information Sciences, 11,341- 356.
[5] Biswas, R., and S. Nanda, “Rough groups and rough subgroups”, Bulletin of the Polish Academy of Sciences Mathematics, vol.42, no.3, pp.251-254.
[6] Pawlak, Z., “Rough sets and fuzzy sets”, Fuzzy Sests and Systems, vol.17, pp.99-102.
[7] Pawlak, Z., “Hard and soft sets”, Fuzzy Sets and Knowledge-Discovery, pp.130-135.
[8] Pawlak, Z., and R. Slowinski, “Rough set approach to multi–attribute decision analysis”, European Journal of Operational Research, vol.72, pp.443-449.
[9] Pawlak, Z, “Rough sets and intelligent data analysis”, Information Sciences, vol.147, pp.1-12.
Citation
Niharika Upadhyay and Pragati Jain, "Flowgraph Representation of Information System Using Rough Set Theory," International Journal of Computer Sciences and Engineering, Vol.3, Issue.6, pp.40-43, 2015.
Enhancement to SIP Protocol
Research Paper | Journal Paper
Vol.3 , Issue.6 , pp.44-49, Jun-2015
Abstract
The paper is based on Enhancement to SIP Protocol. Session Initiation Protocol (SIP) is used for session establishment in IP telephony. SIP is a text based protocol. It contains messages that are exchanged between end users for the establishment of session. After the session is established the media stream is transmitted between the end users using Real Time Protocol (RTP). This papers aims at reducing the bandwidth used for transmitting the SIP Protocol by using efficient messages for Session Negotiation. The use of Options Message of SIP protocol instead of Subscribe and Notify reduces the bandwidth involved in maintaining a dialog that is created for Subscribe and Notify messages.
Key-Words / Index Term
Session Initiation Protocol(SIP); Real Time Protocol(RTP); Option; Subscribe; Notify
References
[1] Samir Chatterjee, Bengisu Tulu, Tarun Abhichandani and Haiqing Li, ”SIP-Based Enterprise Converged Networks for Voice/Video-Over-IP: Implementation and Evaluation of Components”.
[2] J. Rosenberg, H. Schulzrinne, G. Camarillo, A. Johnston, J. Peterson, R. Sparks, N. Handley, and E. Schooler, “SIP: Session inititation protocol” , Internet Engineering Task Force, RFC 3261, 2002.
[3] International Telecommunications Union, “Packet based multimedia communications systems,” ITU, Recommendation H.323, 2000”.
[4] Alan B. Johnston, “SIP: Understanding the Session Initiation Protocol”, Third Edition.
[5] Handley, “SIP: Session Initiation Protocol,” RFC 2543, March 1999.
[6] Rosenberg, H.Schulzrinne, G.Camarillo, A.Johnston, J.Peterson, R.Sparks, M.Handley and E. Schooler, “SIP: Session Initiation Protocol”, RFC 3261, June 2002.
[7] Miikka Poikselka, Aki Niemi, Hisham Khartabil, Georg Mayer, “The IMS: IP Multimedia Concepts and Services”.
[8] Gonzalo Camarillo, “SIP Demystified”, McGraw-Hill Professional Book Group, 2001.
[9] Olivier Hersent, David Gurle, Jean-Pierre Petit. Addison-Wesley, “IP Telephony”, 2000.
[10] AlanB.Johnston, Artech House, “SIP: Understanding the Session Initiation Protocol”, second edition, 2004.
[11] Rajinder Singh, “4G By WiMAX2 and LTE-Advance”, International Journal of Computer Sciences and Engineering, Volume-01, Issue-03,
Page No(36-38).
Citation
Aparna Sateesh Kini and C N Ravi Kumar, "Enhancement to SIP Protocol," International Journal of Computer Sciences and Engineering, Vol.3, Issue.6, pp.44-49, 2015.