Unlike external attacks,insider threats arise from legitimate users who belong to the organization.These individuals may be a potential threat for hostile behavior depending on their motives.For insider detection,many...Unlike external attacks,insider threats arise from legitimate users who belong to the organization.These individuals may be a potential threat for hostile behavior depending on their motives.For insider detection,many intrusion detection systems learn and prevent known scenarios,but because malicious behavior has similar patterns to normal behavior,in reality,these systems can be evaded.Furthermore,because insider threats share a feature space similar to normal behavior,identifying them by detecting anomalies has limitations.This study proposes an improved anomaly detection methodology for insider threats that occur in cybersecurity in which a discrete wavelet transformation technique is applied to classify normal vs.malicious users.The discrete wavelet transformation technique easily discovers new patterns or decomposes synthesized data,making it possible to distinguish between shared characteristics.To verify the efficacy of the proposed methodology,experiments were conducted in which normal users and malicious users were classified based on insider threat scenarios provided in Carnegie Mellon University’s Computer Emergency Response Team(CERT)dataset.The experimental results indicate that the proposed methodology with discrete wavelet transformation reduced the false-positive rate by 82%to 98%compared to the case with no wavelet applied.Thus,the proposed methodology has high potential for application to similar feature spaces.展开更多
The aim of this study is to carry out hydrothermal alteration mapping and structural mapping using ASTER images in order to identify indices that could guide mining exploration work in the Poli area and its surroundin...The aim of this study is to carry out hydrothermal alteration mapping and structural mapping using ASTER images in order to identify indices that could guide mining exploration work in the Poli area and its surroundings. To achieve this, the ASTER images were first preprocessed to correct atmospheric effects and remove vegetation influence. Secondly, a lineament mapping was conducted by applying Discrete Wavelet Transform (DWT) algorithms to the First Principal Component Analysis (PCA1) of Visible Near-Infrared (VNIR) and Shortwave Infrared (SWIR) bands. Lastly, band ratio methods were applied to the VNIR, SWIR, and Thermal Infrared (TIR) bands to determine indices of iron oxides/hydroxides (hematite and limonite), hydroxyl-bearing minerals (chlorite, epidote, and muscovite), and the quartz index. The results obtained showed that the lineaments were mainly oriented NE-SW, ENE-WSW, and E-W, with NE-SW being the most predominant direction. Concerning hydrothermal alteration, the identified indices covered almost the entire study area and showed a strong correlation with lithological data. Overlaying the obtained lineaments with the hydrothermal alteration indices revealed a significant correlation between existing mining indices and those observed in the field. Mineralized zones generally coincided with areas of high lineament density exhibiting significant hydrothermal alteration. Based on the correlation between existing mining indices and the results of hydrothermal and structural mapping, the results obtained can then be used as a reference document for any mining exploration in the study area.展开更多
Transmission of data over the internet has become a critical issue as a result of the advancement in technology, since it is possible for pirates to steal the intellectual property of content owners. This paper presen...Transmission of data over the internet has become a critical issue as a result of the advancement in technology, since it is possible for pirates to steal the intellectual property of content owners. This paper presents a new digital watermarking scheme that combines some operators of the Genetic Algorithm (GA) and the Residue Number (RN) System (RNS) to perform encryption on an image, which is embedded into a cover image for the purposes of watermarking. Thus, an image watermarking scheme uses an encrypted image. The secret image is embedded in decomposed frames of the cover image achieved by applying a three-level Discrete Wavelet Transform (DWT). This is to ensure that the secret information is not exposed even when there is a successful attack on the cover information. Content creators can prove ownership of the multimedia content by unveiling the secret information in a court of law. The proposed scheme was tested with sample data using MATLAB2022 and the results of the simulation show a great deal of imperceptibility and robustness as compared to similar existing schemes.展开更多
In the era of big data,the number of images transmitted over the public channel increases exponentially.As a result,it is crucial to devise the efficient and highly secure encryption method to safeguard the sensitive ...In the era of big data,the number of images transmitted over the public channel increases exponentially.As a result,it is crucial to devise the efficient and highly secure encryption method to safeguard the sensitive image.In this paper,an improved sine map(ISM)possessing a larger chaotic region,more complex chaotic behavior and greater unpredictability is proposed and extensively tested.Drawing upon the strengths of ISM,we introduce a lightweight symmetric image encryption cryptosystem in wavelet domain(WDLIC).The WDLIC employs selective encryption to strike a satisfactory balance between security and speed.Initially,only the low-frequency-low-frequency component is chosen to encrypt utilizing classic permutation and diffusion.Then leveraging the statistical properties in wavelet domain,Gaussianization operation which opens the minds of encrypting image information in wavelet domain is first proposed and employed to all sub-bands.Simulations and theoretical analysis demonstrate the high speed and the remarkable effectiveness of WDLIC.展开更多
This paper presents discrete wavelet transform (DWT) and its inverse (IDWT) with Haar wavelets as tools to compute the variable size interpolated versions of an image at optimum computational load. As a human obse...This paper presents discrete wavelet transform (DWT) and its inverse (IDWT) with Haar wavelets as tools to compute the variable size interpolated versions of an image at optimum computational load. As a human observer moves closer to or farther from a scene, the retinal image of the scene zooms in or out, respectively. This zooming in or out can be modeled using variable scale interpolation. The paper proposes a novel way of applying DWT and IDWT in a piecewise manner by non-uniform down- or up-sampling of the images to achieve partially sampled versions of the images. The partially sampled versions are then aggregated to achieve the final variable scale interpolated images. The non-uniform down- or up-sampling here is a function of the required scale of interpolation. Appropriate zero padding is used to make the images suitable for the required non-uniform sampling and the subsequent interpolation to the required scale. The concept of zeroeth level DWT is introduced here, which works as the basis for interpolating the images to achieve bigger size than the original one. The main emphasis here is on the computation of variable size images at less computational load, without compromise of quality of images. The interpolated images to different sizes and the reconstructed images are benchmarked using the statistical parameters and visual comparison. It has been found that the proposed approach performs better as compared to bilinear and bicubic interpolation techniques.展开更多
In this paper, we summarize the human emotion recognition using different set of electroencephalogram (EEG) channels using discrete wavelet transform. An audio-visual induction based protocol has been designed with mo...In this paper, we summarize the human emotion recognition using different set of electroencephalogram (EEG) channels using discrete wavelet transform. An audio-visual induction based protocol has been designed with more dynamic emotional content for inducing discrete emotions (disgust, happy, surprise, fear and neutral). EEG signals are collected using 64 electrodes from 20 subjects and are placed over the entire scalp using International 10-10 system. The raw EEG signals are preprocessed using Surface Laplacian (SL) filtering method and decomposed into three different frequency bands (alpha, beta and gamma) using Discrete Wavelet Transform (DWT). We have used “db4” wavelet function for deriving a set of conventional and modified energy based features from the EEG signals for classifying emotions. Two simple pattern classification methods, K Nearest Neighbor (KNN) and Linear Discriminant Analysis (LDA) methods are used and their performances are compared for emotional states classification. The experimental results indicate that, one of the proposed features (ALREE) gives the maximum average classification rate of 83.26% using KNN and 75.21% using LDA compared to those of conventional features. Finally, we present the average classification rate and subsets of emotions classification rate of these two different classifiers for justifying the performance of our emotion recognition system.展开更多
Image denoising has remained a fundamental problem in the field of image processing. With Wavelet transforms, various algorithms for denoising in wavelet domain were introduced. Wavelets gave a superior performance in...Image denoising has remained a fundamental problem in the field of image processing. With Wavelet transforms, various algorithms for denoising in wavelet domain were introduced. Wavelets gave a superior performance in image denoising due to its properties such as multi-resolution. The problem of estimating an image that is corrupted by Additive White Gaussian Noise has been of interest for practical and theoretical reasons. Non-linear methods especially those based on wavelets have become popular due to its advantages over linear methods. Here I applied non-linear thresholding techniques in wavelet domain such as hard and soft thresholding, wavelet shrinkages such as Visu-shrink (non-adaptive) and SURE, Bayes and Normal Shrink (adaptive), using Discrete Stationary Wavelet Transform (DSWT) for different wavelets, at different levels, to denoise an image and determine the best one out of them. Performance of denoising algorithm is measured using quantitative performance measures such as Signal-to-Noise Ratio (SNR) and Mean Square Error (MSE) for various thresholding techniques.展开更多
Watermarking is a widely used solution to the problems of authentication and copyright protection of digital media especially for images,videos,and audio data.Chaos is one of the emerging techniques adopted in image w...Watermarking is a widely used solution to the problems of authentication and copyright protection of digital media especially for images,videos,and audio data.Chaos is one of the emerging techniques adopted in image watermarking schemes due to its intrinsic cryptographic properties.This paper proposes a new chaotic hybrid watermarking method combining Discrete Wavelet Transform(DWT),Z-transform(ZT)and Bidiagonal Singular Value Decomposition(BSVD).The original image is decomposed into 3-level DWT,and then,ZT is applied on the HH3 and HL3 sub-bands.The watermark image is encrypted using Arnold Cat Map.BSVD for the watermark and transformed original image were computed,and the watermark was embedded by modifying singular values of the host image with the singular values of the watermark image.Robustness of the proposed scheme was examined using standard test images and assessed against common signal processing and geometric attacks.Experiments indicated that the proposed method is transparent and highly robust.展开更多
This paper presents the fault diagnosis of face milling tool based on machine learning approach.While machining,spindle vibration signals in feed direction under healthy and faulty conditions of the milling tool are a...This paper presents the fault diagnosis of face milling tool based on machine learning approach.While machining,spindle vibration signals in feed direction under healthy and faulty conditions of the milling tool are acquired.A set of discrete wavelet features is extracted from the vibration signals using discrete wavelet transform(DWT)technique.The decision tree technique is used to select significant features out of all extracted wavelet features.C-support vector classification(C-SVC)andν-support vector classification(ν-SVC)models with different kernel functions of support vector machine(SVM)are used to study and classify the tool condition based on selected features.From the results obtained,C-SVC is the best model thanν-SVC and it can be able to give 94.5%classification accuracy for face milling of special steel alloy 42CrMo4.展开更多
Traditional watermark embedding schemes inevitably modify the data in a host audio signal and lead to the degradation of the host signal.In this paper,a novel audio zero-watermarking algorithm based on discrete wavele...Traditional watermark embedding schemes inevitably modify the data in a host audio signal and lead to the degradation of the host signal.In this paper,a novel audio zero-watermarking algorithm based on discrete wavelet transform(DWT),discrete cosine transform(DCT),and singular value decomposition(SVD) is presented.The watermark is registered by performing SVD on the coefficients generated through DWT and DCT to avoid data modification and host signal degradation.Simulation results show that the proposed zero-watermarking algorithm is strongly robust to common signal processing methods such as requantization,MP3 compression,resampling,addition of white Gaussian noise,and low-pass filtering.展开更多
A new simple and efficient dual tree analytic wavelet transform based on Discrete Cosine Harmonic Wavelet Transform DCHWT (ADCHWT) has been proposed and is applied for signal and image denoising. The analytic DCHWT ha...A new simple and efficient dual tree analytic wavelet transform based on Discrete Cosine Harmonic Wavelet Transform DCHWT (ADCHWT) has been proposed and is applied for signal and image denoising. The analytic DCHWT has been realized by applying DCHWT to the original signal and its Hilbert transform. The shift invariance and the envelope extraction properties of the ADCHWT have been found to be very effective in denoising speech and image signals, compared to that of DCHWT.展开更多
This paper presents an optimized 3-D Discrete Wavelet Transform (3-DDWT) architecture. 1-DDWT employed for the design of 3-DDWT architecture uses reduced lifting scheme approach. Further the architecture is optimized ...This paper presents an optimized 3-D Discrete Wavelet Transform (3-DDWT) architecture. 1-DDWT employed for the design of 3-DDWT architecture uses reduced lifting scheme approach. Further the architecture is optimized by applying block enabling technique, scaling, and rounding of the filter coefficients. The proposed architecture uses biorthogonal (9/7) wavelet filter. The architecture is modeled using Verilog HDL, simulated using ModelSim, synthesized using Xilinx ISE and finally implemented on Virtex-5 FPGA. The proposed 3-DDWT architecture has slice register utilization of 5%, operating frequency of 396 MHz and a power consumption of 0.45 W.展开更多
A new adaptive Packet algorithm based on Discrete Cosine harmonic wavelet transform (DCHWT), (DCAHWP) has been proposed. This is realized by the Discrete Cosine Harmonic Wavelet transform (DCHTWT) which exploits the g...A new adaptive Packet algorithm based on Discrete Cosine harmonic wavelet transform (DCHWT), (DCAHWP) has been proposed. This is realized by the Discrete Cosine Harmonic Wavelet transform (DCHTWT) which exploits the good properties of DCT viz., energy compaction (low leakage), frequency resolution and computational simplicity due its real nature, compared to those of DFT and its harmonic wavelet version. Hence the proposed wavelet packet is advantageous both in terms of performance and computational efficiency compared to those of existing DFT harmonic wavelet packet. Further, the new DCAHWP also enjoys the desirable properties of a Harmonic wavelet transform over the time domain WT, viz., built in decimation without any explicit antialiasing filtering and easy interpolation by mere concatenation of different scales in frequency (DCT) domain with out any image rejection filter and with out laborious delay compensation required. Further, the compression by the proposed DCAHWP is much better compared to that by adaptive WP based on Daubechies-2 wavelet (DBAWP). For a compression factor (CF) of 1/8, the ratio of the percentage error energy by proposed DCAHWP to that by DBAWP is about 1/8 and 1/5 for considered 1-D signal and speech signal, respectively. Its compression performance is better than that of DCHWT, both for 1-D and 2-D signals. The improvement is more significant for signals with abrupt changes or images with rapid variations (textures). For compression factor of 1/8, the ratio of the percentage error energy by DCAHWP to that by DCHWT, is about 1/3 and 1/2, for the considered 1-D signal and speech signal, respectively. This factor for an image considered is 2/3 and in particular for a textural image it is 1/5.展开更多
This paper introduces a new method to separate PD1 from other disturbing signals present on the high voltage genera-tors and motors. The method is based on combination of a pattern classifier, the Discrete Wavelet Tra...This paper introduces a new method to separate PD1 from other disturbing signals present on the high voltage genera-tors and motors. The method is based on combination of a pattern classifier, the Discrete Wavelet Transform (DWT), to de-noise PD and Time-Of-Arrival method to separate PD sources. Furthermore, it will be shown that it can recognize PD sources including rotating machine’s internal and external discharge pulses (e.g. on the bus bar).展开更多
基金This work was supported by the Research Program through the National Research Foundation of Korea,NRF-2022R1F1A1073375。
文摘Unlike external attacks,insider threats arise from legitimate users who belong to the organization.These individuals may be a potential threat for hostile behavior depending on their motives.For insider detection,many intrusion detection systems learn and prevent known scenarios,but because malicious behavior has similar patterns to normal behavior,in reality,these systems can be evaded.Furthermore,because insider threats share a feature space similar to normal behavior,identifying them by detecting anomalies has limitations.This study proposes an improved anomaly detection methodology for insider threats that occur in cybersecurity in which a discrete wavelet transformation technique is applied to classify normal vs.malicious users.The discrete wavelet transformation technique easily discovers new patterns or decomposes synthesized data,making it possible to distinguish between shared characteristics.To verify the efficacy of the proposed methodology,experiments were conducted in which normal users and malicious users were classified based on insider threat scenarios provided in Carnegie Mellon University’s Computer Emergency Response Team(CERT)dataset.The experimental results indicate that the proposed methodology with discrete wavelet transformation reduced the false-positive rate by 82%to 98%compared to the case with no wavelet applied.Thus,the proposed methodology has high potential for application to similar feature spaces.
文摘The aim of this study is to carry out hydrothermal alteration mapping and structural mapping using ASTER images in order to identify indices that could guide mining exploration work in the Poli area and its surroundings. To achieve this, the ASTER images were first preprocessed to correct atmospheric effects and remove vegetation influence. Secondly, a lineament mapping was conducted by applying Discrete Wavelet Transform (DWT) algorithms to the First Principal Component Analysis (PCA1) of Visible Near-Infrared (VNIR) and Shortwave Infrared (SWIR) bands. Lastly, band ratio methods were applied to the VNIR, SWIR, and Thermal Infrared (TIR) bands to determine indices of iron oxides/hydroxides (hematite and limonite), hydroxyl-bearing minerals (chlorite, epidote, and muscovite), and the quartz index. The results obtained showed that the lineaments were mainly oriented NE-SW, ENE-WSW, and E-W, with NE-SW being the most predominant direction. Concerning hydrothermal alteration, the identified indices covered almost the entire study area and showed a strong correlation with lithological data. Overlaying the obtained lineaments with the hydrothermal alteration indices revealed a significant correlation between existing mining indices and those observed in the field. Mineralized zones generally coincided with areas of high lineament density exhibiting significant hydrothermal alteration. Based on the correlation between existing mining indices and the results of hydrothermal and structural mapping, the results obtained can then be used as a reference document for any mining exploration in the study area.
文摘Transmission of data over the internet has become a critical issue as a result of the advancement in technology, since it is possible for pirates to steal the intellectual property of content owners. This paper presents a new digital watermarking scheme that combines some operators of the Genetic Algorithm (GA) and the Residue Number (RN) System (RNS) to perform encryption on an image, which is embedded into a cover image for the purposes of watermarking. Thus, an image watermarking scheme uses an encrypted image. The secret image is embedded in decomposed frames of the cover image achieved by applying a three-level Discrete Wavelet Transform (DWT). This is to ensure that the secret information is not exposed even when there is a successful attack on the cover information. Content creators can prove ownership of the multimedia content by unveiling the secret information in a court of law. The proposed scheme was tested with sample data using MATLAB2022 and the results of the simulation show a great deal of imperceptibility and robustness as compared to similar existing schemes.
基金Project supported by the Key Area Research and Development Program of Guangdong Province,China(Grant No.2022B0701180001)the National Natural Science Foundation of China(Grant No.61801127)+1 种基金the Science Technology Planning Project of Guangdong Province,China(Grant Nos.2019B010140002 and 2020B111110002)the Guangdong–Hong Kong–Macao Joint Innovation Field Project(Grant No.2021A0505080006).
文摘In the era of big data,the number of images transmitted over the public channel increases exponentially.As a result,it is crucial to devise the efficient and highly secure encryption method to safeguard the sensitive image.In this paper,an improved sine map(ISM)possessing a larger chaotic region,more complex chaotic behavior and greater unpredictability is proposed and extensively tested.Drawing upon the strengths of ISM,we introduce a lightweight symmetric image encryption cryptosystem in wavelet domain(WDLIC).The WDLIC employs selective encryption to strike a satisfactory balance between security and speed.Initially,only the low-frequency-low-frequency component is chosen to encrypt utilizing classic permutation and diffusion.Then leveraging the statistical properties in wavelet domain,Gaussianization operation which opens the minds of encrypting image information in wavelet domain is first proposed and employed to all sub-bands.Simulations and theoretical analysis demonstrate the high speed and the remarkable effectiveness of WDLIC.
文摘This paper presents discrete wavelet transform (DWT) and its inverse (IDWT) with Haar wavelets as tools to compute the variable size interpolated versions of an image at optimum computational load. As a human observer moves closer to or farther from a scene, the retinal image of the scene zooms in or out, respectively. This zooming in or out can be modeled using variable scale interpolation. The paper proposes a novel way of applying DWT and IDWT in a piecewise manner by non-uniform down- or up-sampling of the images to achieve partially sampled versions of the images. The partially sampled versions are then aggregated to achieve the final variable scale interpolated images. The non-uniform down- or up-sampling here is a function of the required scale of interpolation. Appropriate zero padding is used to make the images suitable for the required non-uniform sampling and the subsequent interpolation to the required scale. The concept of zeroeth level DWT is introduced here, which works as the basis for interpolating the images to achieve bigger size than the original one. The main emphasis here is on the computation of variable size images at less computational load, without compromise of quality of images. The interpolated images to different sizes and the reconstructed images are benchmarked using the statistical parameters and visual comparison. It has been found that the proposed approach performs better as compared to bilinear and bicubic interpolation techniques.
文摘In this paper, we summarize the human emotion recognition using different set of electroencephalogram (EEG) channels using discrete wavelet transform. An audio-visual induction based protocol has been designed with more dynamic emotional content for inducing discrete emotions (disgust, happy, surprise, fear and neutral). EEG signals are collected using 64 electrodes from 20 subjects and are placed over the entire scalp using International 10-10 system. The raw EEG signals are preprocessed using Surface Laplacian (SL) filtering method and decomposed into three different frequency bands (alpha, beta and gamma) using Discrete Wavelet Transform (DWT). We have used “db4” wavelet function for deriving a set of conventional and modified energy based features from the EEG signals for classifying emotions. Two simple pattern classification methods, K Nearest Neighbor (KNN) and Linear Discriminant Analysis (LDA) methods are used and their performances are compared for emotional states classification. The experimental results indicate that, one of the proposed features (ALREE) gives the maximum average classification rate of 83.26% using KNN and 75.21% using LDA compared to those of conventional features. Finally, we present the average classification rate and subsets of emotions classification rate of these two different classifiers for justifying the performance of our emotion recognition system.
文摘Image denoising has remained a fundamental problem in the field of image processing. With Wavelet transforms, various algorithms for denoising in wavelet domain were introduced. Wavelets gave a superior performance in image denoising due to its properties such as multi-resolution. The problem of estimating an image that is corrupted by Additive White Gaussian Noise has been of interest for practical and theoretical reasons. Non-linear methods especially those based on wavelets have become popular due to its advantages over linear methods. Here I applied non-linear thresholding techniques in wavelet domain such as hard and soft thresholding, wavelet shrinkages such as Visu-shrink (non-adaptive) and SURE, Bayes and Normal Shrink (adaptive), using Discrete Stationary Wavelet Transform (DSWT) for different wavelets, at different levels, to denoise an image and determine the best one out of them. Performance of denoising algorithm is measured using quantitative performance measures such as Signal-to-Noise Ratio (SNR) and Mean Square Error (MSE) for various thresholding techniques.
文摘Watermarking is a widely used solution to the problems of authentication and copyright protection of digital media especially for images,videos,and audio data.Chaos is one of the emerging techniques adopted in image watermarking schemes due to its intrinsic cryptographic properties.This paper proposes a new chaotic hybrid watermarking method combining Discrete Wavelet Transform(DWT),Z-transform(ZT)and Bidiagonal Singular Value Decomposition(BSVD).The original image is decomposed into 3-level DWT,and then,ZT is applied on the HH3 and HL3 sub-bands.The watermark image is encrypted using Arnold Cat Map.BSVD for the watermark and transformed original image were computed,and the watermark was embedded by modifying singular values of the host image with the singular values of the watermark image.Robustness of the proposed scheme was examined using standard test images and assessed against common signal processing and geometric attacks.Experiments indicated that the proposed method is transparent and highly robust.
文摘This paper presents the fault diagnosis of face milling tool based on machine learning approach.While machining,spindle vibration signals in feed direction under healthy and faulty conditions of the milling tool are acquired.A set of discrete wavelet features is extracted from the vibration signals using discrete wavelet transform(DWT)technique.The decision tree technique is used to select significant features out of all extracted wavelet features.C-support vector classification(C-SVC)andν-support vector classification(ν-SVC)models with different kernel functions of support vector machine(SVM)are used to study and classify the tool condition based on selected features.From the results obtained,C-SVC is the best model thanν-SVC and it can be able to give 94.5%classification accuracy for face milling of special steel alloy 42CrMo4.
基金supported by the Open Foundation of Jiangsu Engineering Center of Network Monitoring(Nanjing University of Information Science&Technology)(Grant No.KJR1509)the PAPD fundthe CICAEET fund
文摘Traditional watermark embedding schemes inevitably modify the data in a host audio signal and lead to the degradation of the host signal.In this paper,a novel audio zero-watermarking algorithm based on discrete wavelet transform(DWT),discrete cosine transform(DCT),and singular value decomposition(SVD) is presented.The watermark is registered by performing SVD on the coefficients generated through DWT and DCT to avoid data modification and host signal degradation.Simulation results show that the proposed zero-watermarking algorithm is strongly robust to common signal processing methods such as requantization,MP3 compression,resampling,addition of white Gaussian noise,and low-pass filtering.
文摘A new simple and efficient dual tree analytic wavelet transform based on Discrete Cosine Harmonic Wavelet Transform DCHWT (ADCHWT) has been proposed and is applied for signal and image denoising. The analytic DCHWT has been realized by applying DCHWT to the original signal and its Hilbert transform. The shift invariance and the envelope extraction properties of the ADCHWT have been found to be very effective in denoising speech and image signals, compared to that of DCHWT.
文摘This paper presents an optimized 3-D Discrete Wavelet Transform (3-DDWT) architecture. 1-DDWT employed for the design of 3-DDWT architecture uses reduced lifting scheme approach. Further the architecture is optimized by applying block enabling technique, scaling, and rounding of the filter coefficients. The proposed architecture uses biorthogonal (9/7) wavelet filter. The architecture is modeled using Verilog HDL, simulated using ModelSim, synthesized using Xilinx ISE and finally implemented on Virtex-5 FPGA. The proposed 3-DDWT architecture has slice register utilization of 5%, operating frequency of 396 MHz and a power consumption of 0.45 W.
文摘A new adaptive Packet algorithm based on Discrete Cosine harmonic wavelet transform (DCHWT), (DCAHWP) has been proposed. This is realized by the Discrete Cosine Harmonic Wavelet transform (DCHTWT) which exploits the good properties of DCT viz., energy compaction (low leakage), frequency resolution and computational simplicity due its real nature, compared to those of DFT and its harmonic wavelet version. Hence the proposed wavelet packet is advantageous both in terms of performance and computational efficiency compared to those of existing DFT harmonic wavelet packet. Further, the new DCAHWP also enjoys the desirable properties of a Harmonic wavelet transform over the time domain WT, viz., built in decimation without any explicit antialiasing filtering and easy interpolation by mere concatenation of different scales in frequency (DCT) domain with out any image rejection filter and with out laborious delay compensation required. Further, the compression by the proposed DCAHWP is much better compared to that by adaptive WP based on Daubechies-2 wavelet (DBAWP). For a compression factor (CF) of 1/8, the ratio of the percentage error energy by proposed DCAHWP to that by DBAWP is about 1/8 and 1/5 for considered 1-D signal and speech signal, respectively. Its compression performance is better than that of DCHWT, both for 1-D and 2-D signals. The improvement is more significant for signals with abrupt changes or images with rapid variations (textures). For compression factor of 1/8, the ratio of the percentage error energy by DCAHWP to that by DCHWT, is about 1/3 and 1/2, for the considered 1-D signal and speech signal, respectively. This factor for an image considered is 2/3 and in particular for a textural image it is 1/5.
文摘This paper introduces a new method to separate PD1 from other disturbing signals present on the high voltage genera-tors and motors. The method is based on combination of a pattern classifier, the Discrete Wavelet Transform (DWT), to de-noise PD and Time-Of-Arrival method to separate PD sources. Furthermore, it will be shown that it can recognize PD sources including rotating machine’s internal and external discharge pulses (e.g. on the bus bar).