Skip to main content

PREDICTI ON OF AXIAL CAPACITY OF PILES DRIVEN IN NON-COHESIVE SOILS BASED ON NEURAL NETWORKS APPROACH

Research Abstract
NULL
Research Authors
Amel Benali · Bakhta Boukhatem · Mahmoud N. Hussien · Ammar Nechnech · Mourad Karray ·
Research Department
Research Journal
Journal of Civil Engineering and Management
Research Pages
NULL
Research Publisher
NULL
Research Rank
1
Research Vol
NULL
Research Website
NULL
Research Year
2016

Modified Efficient Fast Multiplication-Free Integer Transformation for the 2-D DCT H.265 Standard system

Research Abstract
In this paper, efficient one-dimensional (1-D) fast integer transform algorithms of the DCT matrix for the H.265 standard are proposed. Based on the symmetric property of the integer transform matrix and the matrix operations, which denote the row/column permutations and the matrix decompositions, along with using the dyadic symmetry modification on the standard matrix, the efficient fast 1-D integer transform algorithms are developed. Therefore, the computational complexities of the proposed fast integer transform are smaller than those of the direct method. In addition to computational complexity reduction one of the proposed algorithms provides transformation quality improvement, while the other provides more computational complexity reduction while maintaining almost the same transformation quality.
Research Authors
M. N. Haggag, M. El-Sharkawy, and G. Fahmy
Research Department
Research Journal
Data Compression Conference, Snowbird, UT, March 2011.
Research Pages
NULL
Research Publisher
NULL
Research Rank
3
Research Vol
NULL
Research Website
NULL
Research Year
2011

Towards an Automated Dental Identification System (ADIS)system

Research Abstract
This paper addresses the problem of developing an automated system for postmortem identification using dental records. The Automated Dental Identification System (ADIS) can be used by law enforcement agencies to locate missing persons using databases of dental x-rays. Currently, this search and identification process is carried out manually, which makes it very time consuming and unreliable. In this paper, we propose an architecture for ADIS, we define the functionality of its components, and we briefly describe some of the techniques used in realizing these components.
Research Authors
34. G. Fahmy, D. Nassar, E. Haj-Said, H. Chen, O. Nomir, J. Zhou, R. Howell, H. Ammar, M. Abdel-Mottaleb and A. Jain
Research Department
Research Journal
IEEE International Conference of Biometric Authenticity, pp. 789-796, Hong Kong 2004
Research Pages
NULL
Research Publisher
NULL
Research Rank
3
Research Vol
NULL
Research Website
NULL
Research Year
2004

Performance Evaluation of IRIS Based Recognition System Implementing Global ICA Encoding

Research Abstract
In this paper, we describe and analyze the performance of two iris-encoding techniques. The first technique is based on Principle Component Analysis (PCA) encoding method while the second technique is a combination of Principal Component Analysis with Independent Component Analysis (ICA) following it. Both techniques are applied globally. PCA and ICA are two well known methods used to process a variety of data. Though PCA has been used as a preprocessing step that reduces dimensions for obtaining ICA components for iris, it has never been analyzed in depth as an individual encoding method. In practice PCA and ICA are known as methods that extract global and fine features, respectively. It is shown here that when PCA and ICA methods are used to encode iris images, one of the critical steps required to achieve a good performance is compensation for rotation effect. We further study the effect of varying the image resolution level on the performance of the two encoding methods. The major motivation for this study is the cases in practice where images of the same or different irises taken at different distances have to be compared. The performance of encoding techniques is analyzed using the CASIA dataset. The original images are non-ideal and thus require a sequence of preprocessing steps prior to application of encoding methods. We plot a series of Receiver Operating Characteristics (ROCs) to demonstrate various effects on the performance of the iris-based recognition system implementing PCA and ICA encoding techniques.
Research Authors
N. Schmid and Vivekanad Dorairaj and G.Fahmy
Research Department
Research Journal
SPIE Human identification conference, Proc SPIE 5779, pp. 51, April 2005.
Research Pages
NULL
Research Publisher
NULL
Research Rank
3
Research Vol
NULL
Research Website
NULL
Research Year
2005

Performance Evaluation of non-ideal IRIS Based Recognition System Implementing Global ICA Encoding

Research Abstract
We describe and analyze the performance of a non-ideal iris recognition system. The system is designed to process non-ideal iris images in two steps: (i) estimation of the gaze direction and (ii) processing and encoding of the rotated iris image. We use two objective functions to estimate the gaze direction: Hamming distance and Daugman’s integro-differential operator and determine an estimated angle by picking the value that optimizes the selected objective function. After the angle is estimated, the off-angle iris image undergoes geometric transformations involving the estimated angle and is further processed as if it were a frontal view image. The encoding technique developed in this work is based on application of the global Independent Component Analysis (ICA) to masked iris images. We use two datasets: CASIA dataset and a special dataset of offangle iris images collected at WVU to verify the performance of the encoding technique and angle estimator, respectively. A series of Receiver Operating Characteristics (ROCs) demonstrates various effects on the performance of the non-ideal iris based recognition system implementing the global ICA encoding.
Research Authors
N. Schmid and Vivekanad Dorairaj and G.Fahmy
Research Department
Research Journal
IEEE International Conference on Image Processing, pp. 285-288, Genova, Italy 2005.
Research Pages
NULL
Research Publisher
NULL
Research Rank
3
Research Vol
NULL
Research Website
NULL
Research Year
2005

The effect of lighting direction/condition on the performance of face recognition algorithms

Research Abstract
In this paper, we measure the effect of the lighting direction in facial images on the performance of 2 well-known face recognition algorithms, an appearance based method and a facial feature based method. We collect hundreds/thousands of facial images of subjects with a fixed pose and under different lighting conditions through a unique facial acquisition laboratory designed specifically for this purpose. Then we present a methodology for automatically detecting the lighting direction of different face images based on statistics derived from the image. We also detect if there is any glare regions in some lighting directions. Finally we determine the most reliable lighting direction that will lead to a good quality/high performance facial image from both techniques based on our experiments with the acquired data.
Research Authors
30. G. Fahmy, A. Elsherbeeny, H. Ammar, S. Mandala, M. Abdel-Mottaleb
Research Department
Research Journal
SPIE Human Identification Conference (6202-21) April 2006
Research Pages
NULL
Research Publisher
NULL
Research Rank
3
Research Vol
NULL
Research Website
NULL
Research Year
2006

'A New Signal Compression Algorithm Using AllPass Extraction And Its Use In Image Compression And Coding

Research Abstract
A new signal compression scheme is proposed. It is based on all pass extraction from the received signal's transfer function. The all pass parameters are closely related to a linear prediction polynomial LP of the same order, of the received data. Results have shown that, this new algorithm yields far smaller signal's reconstruction errors when compared with other known methods, for the same compression ratio CR. This algorithm is used in image compression and coding, as follows: First, the image is segmented into blocks and the 2-D DCT of each block, is computed. Next, each 2-D DCT matrix is zigzag scanned to yield a 1-D vector, which is subsequently compressed using the proposed scheme. The image is reconstructed in a reverse manner, using the compressed vectors. The image's compressed parameters is further compressed using schemes like EZW or SPHIT coders. Simulation results have revealed that the proposed compression scheme competes very well with JPEG compression schemes, especially when the images have many details.
Research Authors
M. F. Fahmy and G. Fahmy
Research Department
Research Journal
IEEE International Symposium for Signal Processing and Information Technology, ISSPIT, pp. 91-94, Vancouver, August 2006
Research Pages
NULL
Research Publisher
NULL
Research Rank
3
Research Vol
NULL
Research Website
NULL
Research Year
2006

Super-Resolution Construction of IRIS Images from a Visual Low Resolution Face Video

Research Abstract
Iris became an important biometric in the last decade, due to its uniqueness and richness of features. In this paper, a novel super-resolution and image registration technique for visual (non-infra-red) iris images is presented. In the proposed technique a full face, 3 second long, 90 frames, visual video is captured with a digital camera located 3 feet away from each subject. Iris images are segmented from the full face image. A cross correlation model is applied for the registration/ alignment of full gray scale iris images. A high resolution iris image, that is 4 times higher in terms of size and resolution, is constructed from every 9 low resolution images. This process of building a high resolution image is based on an auto_regressive signature model between consecutive low resolution images in filling the sub pixels in the constructed high resolution image. Then this process is iterated until a 16 times higher resolution iris image is constructed. Illustrative images are shown that prove the effectiveness of the proposed technique.
Research Authors
G. Fahmy
Research Department
Research Journal
IEEE International Conference for Signal Processing and its applications, ISSPA 2007, WB-P4-4, Sharjah, UAE, Feb. 2007
Research Pages
NULL
Research Publisher
NULL
Research Rank
3
Research Vol
NULL
Research Website
NULL
Research Year
2007

A Study of Fault Coverage of Standard and Windowed Watchdog Timers

Research Abstract
Both standard and windowed watchdog timers were designed to detect flow faults and ensure the safe operation of the systems they supervise. This paper studies the effect of transient failures on microprocessors, and utilizes two methods to compare the fault coverage of both watchdog timers. The first method is injecting a fault while a processor is reading an image from RAM and sending it to the VGA RAM for display. This method is implemented on FPGA, and visually demonstrates the existence of fast watchdog resets which can not be detected by standard watchdog timers, and faulty resets which occur undetected within the safe window of the windowed watchdog timers. The second method is a simulation where the fault coverage for each watchdog timer system is calculated. This simulation tries to take into consideration many factors which could affect the outcome of this comparison.
Research Authors
A. El-attar, and G. Fahmy
Research Department
Research Journal
IEEE International Conference on Signal Processing and Communications, pp. 325-328, Dubai Nov. 2007
Research Pages
NULL
Research Publisher
NULL
Research Rank
3
Research Vol
NULL
Research Website
NULL
Research Year
2007

An Improved Watchdog Timer to Enhance Imaging System Reliability In The Presence Of Soft Errors

Research Abstract
Satellite and Ariel imaging systems are located at high altitudes. Thus, they are more vulnerable to Soft errors than similar systems operating at sea level. This paper studies the effect of transient faults on microprocessor based imaging systems. The paper studies the ability of different watchdog timer systems to recover the system from failure. A new improved watchdog timer system design is introduced. This new design solves the problems of both the standard and windowed watchdog timers. The watchdog timers are tested by injecting a fault while a processor is reading an image from RAM and sending it to the VGA RAM for display. This method is implemented on FPGA, and visually demonstrates the existence of fast watchdog resets, which can not be detected by standard watchdog timers, and faulty resets which occur undetected within the safe window of the windowed watchdog timers.
Research Authors
A. El-attar and G. Fahmy
Research Department
Research Journal
IEEE International Symposium for Signal Processing and Information Technology, ISSPIT, pp. 1116-11120, Cairo, Dec. 2007.
Research Pages
NULL
Research Publisher
NULL
Research Rank
3
Research Vol
NULL
Research Website
NULL
Research Year
2007
Subscribe to