The Application of Lifting Wavelet Transform in the Fault Diagnosis of Reciprocating Air Compressor

Author(s):  
Lijun Wang ◽  
Lili Ma ◽  
Yongliang Huang
2012 ◽  
Vol 224 ◽  
pp. 493-496 ◽  
Author(s):  
Huai Long Wang ◽  
Qiang Pan ◽  
Hong Liu

In order to improve the speed and the rate of fault diagnosis in mixed circuit, this paper introduces a new fault diagnosis method. Through extracting fault features of current characteristics effectively and applying to Improved SVM, the ability of pattern recognition will be better than the traditional BP Neural Network and Single SVM, especially in small samples or non-linear cases. Meanwhile, this paper presents the lifting wavelet transform in order to obtain the feature information accurately. The accuracy of fault diagnosis can greatly enhance by discussing the Improved SVM combined with lifting wavelet transform in a specific monostable trigger. That points out a new direction for the fault diagnosis of mixed circuit.


2013 ◽  
Vol 433-435 ◽  
pp. 494-498
Author(s):  
Jian Wu ◽  
Nan Wu ◽  
Feng Lv

For Rolling of the mine key equipment is damaged easily the problem which is machinery fault diagnosis,through the failure mechanism of the reload / variable load conditions and the weak fault signal characteristics of coal mine electrical equipment bearing are analyzed, a more refined analysis of the vibration signal and achieve coal mining equipment online monitoring and Intelligent Fault Diagnosis system is constructed directly by scale adaptive lifting wavelet transform


2015 ◽  
Vol 10 (11) ◽  
pp. 1127
Author(s):  
Nidaa Hasan Abbas ◽  
Sharifah Mumtazah Syed Ahmad ◽  
Wan Azizun Wan Adnan ◽  
Abed Rahman Bin Ramli ◽  
Sajida Parveen

Author(s):  
Mourad Talbi ◽  
Med Salim Bouhlel

Background: In this paper, we propose a secure image watermarking technique which is applied to grayscale and color images. It consists in applying the SVD (Singular Value Decomposition) in the Lifting Wavelet Transform domain for embedding a speech image (the watermark) into the host image. Methods: It also uses signature in the embedding and extraction steps. Its performance is justified by the computation of PSNR (Pick Signal to Noise Ratio), SSIM (Structural Similarity), SNR (Signal to Noise Ratio), SegSNR (Segmental SNR) and PESQ (Perceptual Evaluation Speech Quality). Results: The PSNR and SSIM are used for evaluating the perceptual quality of the watermarked image compared to the original image. The SNR, SegSNR and PESQ are used for evaluating the perceptual quality of the reconstructed or extracted speech signal compared to the original speech signal. Conclusion: The Results obtained from computation of PSNR, SSIM, SNR, SegSNR and PESQ show the performance of the proposed technique.


Author(s):  
Rahul Dixit ◽  
Amita Nandal ◽  
Arvind Dhaka ◽  
Vardan Agarwal ◽  
Yohan Varghese

Background: Nowadays information security is one of the biggest issues of social networks. The multimedia data can be tampered with, and the attackers can then claim its ownership. Image watermarking is a technique that is used for copyright protection and authentication of multimedia. Objective: We aim to create a new and more robust image watermarking technique to prevent illegal copying, editing and distribution of media. Method : The watermarking technique proposed in this paper is non-blind and employs Lifting Wavelet Transform on the cover image to decompose the image into four coefficient matrices. Then Discrete Cosine Transform is applied which separates a selected coefficient matrix into different frequencies and later Singular Value Decomposition is applied. Singular Value Decomposition is also applied to the watermarking image and it is added to the singular matrix of the cover image which is then normalized followed by the inverse Singular Value Decomposition, inverse Discrete Cosine Transform and inverse Lifting Wavelet Transform respectively to obtain an embedded image. Normalization is proposed as an alternative to the traditional scaling factor. Results: Our technique is tested against attacks like rotation, resizing, cropping, noise addition and filtering. The performance comparison is evaluated based on Peak Signal to Noise Ratio, Structural Similarity Index Measure, and Normalized Cross-Correlation. Conclusion: The experimental results prove that the proposed method performs better than other state-of-the-art techniques and can be used to protect multimedia ownership.


Sign in / Sign up

Export Citation Format

Share Document