Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

University of Wollongong

Discipline
Keyword
Publication Year
Publication
Publication Type
File Type

Articles 2011 - 2040 of 4868

Full-Text Articles in Physical Sciences and Mathematics

Implementing Patient Accessible Health Information Site For Diabetes Management, Khin Than Win Jan 2010

Implementing Patient Accessible Health Information Site For Diabetes Management, Khin Than Win

Faculty of Informatics - Papers (Archive)

The focus of health care has changed from health care provider paternalistic approach to consumer focused approach. The aim of this study is to implement an online health information site for patient education of Diabetes. To achieve this, design criteria for effective patient education were considered and diabetes patients information site was implemented which includes patient information access, diabetes challenge, administrator module and the scheduler module. Implementing patients access for their health information with providing patients tailored health information according to their needs to enhance patient education is important. This project contributes vastly in consumer health informatics as it develops …


Virtual Museums And Web-Based Digital Ecosystems, Peter Eklund, Peter Goodall, Timothy Wray Jan 2010

Virtual Museums And Web-Based Digital Ecosystems, Peter Eklund, Peter Goodall, Timothy Wray

Faculty of Informatics - Papers (Archive)

The Virtual Museum of the Pacific was developed by the authors and launched by the Australian Museum in November 2009. A digital ecosystem implemented as Web 2.0 application, the VMP is an experimental platform with information and knowledge acquisition for the Australian Museum’s Pacific collection. Importantly, the VMP facilitates a number of social media interfaces that enable content to be added and tagged, the control vocabulary to be extended, user perspectives to be defined and narratives added via wiki. It is therefore extensible. This paper concentrates on technical issues involving several search methods: attribute search based on a control vocabulary, …


A Knowledge-Based Risk Advisor Model For Chronic Complications Of Diabetes, Mohsen Sangi, Khin Than Win, John Fulcher Jan 2010

A Knowledge-Based Risk Advisor Model For Chronic Complications Of Diabetes, Mohsen Sangi, Khin Than Win, John Fulcher

Faculty of Informatics - Papers (Archive)

Diabetes as an unprecedented epidemic is spreading all around the world. While one in every seven health care dollars in USA is spent on diabetes, 60% of direct costs and almost 80-90% of indirect costs of that are related to diabetic complications. The ultimate aim of this study is to develop a rule-based model for advising the risk of chronic diabetic complications. An extensive literature review has been carried out to gather actual knowledge about diabetic complications and their related predisposing factors. NViv08 is used to organize and categorize the acquired knowledge. A rule-based decision support model is constructed from …


A Control Approach For Voltage And Frequency Regulation Of A Wind-Diesel-Battery Based Hybrid Remote Area Power Supply System, Nishad Mendis, Kashem Muttaqi, Saad Sayeef, Sarath Perera Jan 2010

A Control Approach For Voltage And Frequency Regulation Of A Wind-Diesel-Battery Based Hybrid Remote Area Power Supply System, Nishad Mendis, Kashem Muttaqi, Saad Sayeef, Sarath Perera

Faculty of Informatics - Papers (Archive)

A novel Remote Area Power Supply (RAPS) system consisting of a Doubly Fed Induction Generator (DFIG) wind turbine generator, synchronous diesel generator system, battery storage system and a dump load is considered in this paper. A control coordination strategy is formulated with a view to regulate the system voltage and frequency within acceptable limits while extracting the maximum power available from the wind. The battery storage unit is used to provide a smooth state transition from Wind-Only (WO) to Wind-Diesel (WD) mode while enabling the DFIG to operate in its maximum power point tracking mode of operation. The dump load …


Applying The Modified Delphi Method To Identify The Taiwanese Electronic Health Record Systems Evaluation Framework And Instrument, Yung-Yu Su, Khin Than Win, Tieh-Chi Chung Jan 2010

Applying The Modified Delphi Method To Identify The Taiwanese Electronic Health Record Systems Evaluation Framework And Instrument, Yung-Yu Su, Khin Than Win, Tieh-Chi Chung

Faculty of Informatics - Papers (Archive)

The aim of this research is to design an appropriate conceptual evaluation framework with a draft instrument for validating the structure of the Taiwanese EHR systems evaluation framework. According to the knowledge of "Triangulation research method" and both quantitative and qualitative approaches, the modified Delphi method was applied to refine the proposed instrument into practicable for real medical environment based on a quantitative approach. In addition, by calculating content validity index for items (I-CVI) and content validity index for scales (S-CVI), it also indicates the degree of consensus between and within questions in the proposed instrument. In short, an appropriate …


Autonomous Operation Of Wind-Battery Hybrid Power System With Maximum Power Extraction Capability, Nishad Mendis, Kashem Muttaqi, Saad Sayeef, Sarath Perera Jan 2010

Autonomous Operation Of Wind-Battery Hybrid Power System With Maximum Power Extraction Capability, Nishad Mendis, Kashem Muttaqi, Saad Sayeef, Sarath Perera

Faculty of Informatics - Papers (Archive)

The hybrid operation of a remote area power system consisting of a Doubly Fed Induction Generator (DFIG) based wind turbine, a battery storage unit and a dummy load is investigated in this paper. The battery storage unit operates as a source or load, depending on the wind power output and loading conditions of the system. The battery storage is connected to the AC side of the wind energy system through a three phase inverter to supply both active and reactive power. A dummy load is also incorporated into the AC side of the system. The design criteria of the controllers …


Captcha Challenges For Massively Multiplayer Online Games: Mini-Game Captchas, Yang-Wai Chow, Willy Susilo, Hua-Yu Zhou Jan 2010

Captcha Challenges For Massively Multiplayer Online Games: Mini-Game Captchas, Yang-Wai Chow, Willy Susilo, Hua-Yu Zhou

Faculty of Informatics - Papers (Archive)

Botting or automated programs in Massively Multiplayer Online Games (MMOGs) has long been a problem in these networked virtual environments. The use of bots gives cheating players an unfair advantage over other honest players. Using bots, players can potentially amass a huge amount of game wealth, resources, experience points, etc. without much effort, as bot programs can be run continuously for countless hours and will never get tired. Honest players on the other hand have to spend much more time and effort in order to gather an equal amount of game resources. This destroys the fun for legitimate players, ruins …


Phase Error Correction Based On Inverse Function Shift Estimation In Phase Shifting Profilometry Using A Digital Video Projector, Yang Liu, Jiangtao Xi, Yanguang Yu, Joe F. Chicharo Jan 2010

Phase Error Correction Based On Inverse Function Shift Estimation In Phase Shifting Profilometry Using A Digital Video Projector, Yang Liu, Jiangtao Xi, Yanguang Yu, Joe F. Chicharo

Faculty of Informatics - Papers (Archive)

Fringe Pattern Profilometry (FPP) is 3D surface measuring technique based on triangulation. The utilization of digital projection in FPP system introduces significant phase distortion for Phase Shifting Profilometry (PSP), because of the nonlinear response of digital video projectors, which is referred as gamma distortion. Considering that the distorted phase has a stable function for a reference plane, this paper proposes an approach based on inverse function shift estimation (IFSE) to detect the spatial shift of the distorted phase caused by object height. This spatial shift is independent of projector’s gamma distortion and accurate surface can be reconstructed based it. The …


Fair Data Flows Scheduling Schema For Multihop Wireless Ad Hoc Networks, Hamidreza Salarian, Pejman Khadivi Jan 2010

Fair Data Flows Scheduling Schema For Multihop Wireless Ad Hoc Networks, Hamidreza Salarian, Pejman Khadivi

Faculty of Informatics - Papers (Archive)

One of the most critical problems in multihop wireless networks is the fair allocation of bandwidth among different nodes. Although there are significant researches on the fairness issues in single-hop wireless networks, research on multihop fairness rarely found in the literature. A user in multi-hop network, besides the contention with other nodes to obtain the channel in physical layer, must find a solution for the inevitable contention between its own and the relayed traffic in the network layer. Accordingly, a suitable mechanism is needed to schedule data flows in network layer fairly. In this paper, a new algorithm is proposed …


A Novel Approach For Interference Suppression In Multi-Subband Convolutional Coded Ofdm System, Ke Chen, Xiaojing Huang, Jiangtao Xi Jan 2010

A Novel Approach For Interference Suppression In Multi-Subband Convolutional Coded Ofdm System, Ke Chen, Xiaojing Huang, Jiangtao Xi

Faculty of Informatics - Papers (Archive)

This paper proposes a novel approach of suppressing narrowband interference from a multi - subband convolutional coded orthogonal frequency division multiplexing (OFDM) system. In this system, the convolutional coded data symbols using different coding generators are transmitted in different subbands. By identifying and discarding the interfered subband(s), the interference level can be greatly reduced and the system performance of the OFDM system can be improved. The interference thresholds for discarding the interfered subband(s) are determined through simulations over additive white Gaussian noise (AWGN) channel for demonstration purpose. The principle can also be applied to multipath fading channel.


The European Court Of Human Rights Ruling Against The Policy Of Keeping Fingerprints And Dna Samples Of Criminal Suspects In Britain, Wales And Northern Ireland: The Case Of S. And Marper V United Kingdom, Katina Michael Jan 2010

The European Court Of Human Rights Ruling Against The Policy Of Keeping Fingerprints And Dna Samples Of Criminal Suspects In Britain, Wales And Northern Ireland: The Case Of S. And Marper V United Kingdom, Katina Michael

Faculty of Informatics - Papers (Archive)

In England, Wales and Northern Island, the Police and Criminal Evidence Act 1984 (the PACE) contained powers for the taking of fingerprints, and samples in the form of deoxyribonucleic acid (DNA). In 2001, Section 64(1A) of the PACE was substituted with Section 82 of the Criminal Justice and Police Act. The change to legislation meant that a suspect of a crime would have their fingerprints and samples permanently stored on the police national computer (PNC) even after having been acquitted. This paper critically analyses the circumstances of the landmark case of S. AND MARPER V. THE UNITED KINGDOM in two …


Eliminating Noises Contained In Sensing Signals From A Self-Mixing Laser Diode, Yanguang Yu, Tiemin Mei, Jiangtao Xi, Joe F. Chicharo, Huiying Ye, Zhao Wang Jan 2010

Eliminating Noises Contained In Sensing Signals From A Self-Mixing Laser Diode, Yanguang Yu, Tiemin Mei, Jiangtao Xi, Joe F. Chicharo, Huiying Ye, Zhao Wang

Faculty of Informatics - Papers (Archive)

The paper studied the noise elimination methods for the signals observed from a self-mixing-laser diode (SM-LD) based sensing system. The core part of the sensing system consists of a LD, a lens and an external vibrating target. The proposed noise elimination methods are applied on both the simulated and experimental sensing signals. The results presented in the paper show the noise contained in the sensing signals can be effectively eliminated. As a consequence, the vibration trace of the target can be reconstructed with high accuracy using this sensing system.


A Framework For Privacy Policy Management In Service Aggregation, Peishun Wang, L. Dong, Yi Mu, Willy Susilo, Jun Yan Jan 2010

A Framework For Privacy Policy Management In Service Aggregation, Peishun Wang, L. Dong, Yi Mu, Willy Susilo, Jun Yan

Faculty of Informatics - Papers (Archive)

With a rapid growth of the Internet, exploring cost-effective and time-efficient methods for creating Internet services has become critical. As an emerging technology, service aggregation has been regarded as a promising candidate. However, it also raises serious issues on privacy management, as a service is usually provided by multiple providers that are usually transparent to its users. We observe that these issues have not been formally studied in the literature. In this paper, we propose a formal model for the privacy management in service aggregation and present a negotiation strategy on different privacy policies between two organizations.


Escrowed Deniable Identification Schemes, Pairat Thorncharoensri, Qiong Huang, Willy Susilo, Man Ho Allen Au, Yi Mu, Duncan Wong Jan 2010

Escrowed Deniable Identification Schemes, Pairat Thorncharoensri, Qiong Huang, Willy Susilo, Man Ho Allen Au, Yi Mu, Duncan Wong

Faculty of Informatics - Papers (Archive)

Generally, the goal of identification schemes is to provide security assurance against impersonation attacks. Identification schemes based on zero knowledge protocols have more advantages, for example, deniability, which enables the prover to deny an identification proof so that the verifier couldn’t persuade others that it is indeed the prover who identified itself to him. This kind of identifications is called ‘deniable identification’. However, in some applications we require the existence of a (trusted) party being able to find out an evidence that a party did identify itself to a verifier is required, in order to prevent parties from misbehavior. So …


Efficient Processing Of Databases With Inconsistent Information, Janusz Getta Jan 2010

Efficient Processing Of Databases With Inconsistent Information, Janusz Getta

Faculty of Informatics - Papers (Archive)

Abstract—Representation and efficient processing of inconsistent information is a common problem for centralized and distributed database systems. While detection of inconsistencies through offline verification of the consistency constraints is a relatively easy task, a complete elimination of inconsistent information from a database as almost impossible. Therefore, database systems should enable the features that allow for the representation and processing of inconsistent information by the user applications. Implementation of such features require the conceptual extensions to both data model and data manipulation language used for the implementation of a database system. This work presents a formal model for the representation and …


Medical Image Retrieval With Query-Dependent Feature Fusion Based On One-Class Svm, Yonggang Huang, Jun Zhang, Yongwang Zhao, Dianfu Ma Jan 2010

Medical Image Retrieval With Query-Dependent Feature Fusion Based On One-Class Svm, Yonggang Huang, Jun Zhang, Yongwang Zhao, Dianfu Ma

Faculty of Informatics - Papers (Archive)

Due to the huge growth of the World Wide Web, medical images are now available in large numbers in online repositories, and there exists the need to retrieval the images through automatically extracting visual information of the medical images, which is commonly known as content-based image retrieval (CBIR). Since each feature extracted from images just characterizes certain aspect of image content, multiple features are necessarily employed to improve the retrieval performance. Meanwhile, experiments demonstrate that a special feature is not equally important for different image queries. Most of existed feature fusion methods for image retrieval only utilize query independent feature …


An Authentication Framework For Wireless Sensor Networks Using Identity-Based Signatures, Rehana Yasmin, Eike Ritter, Guilin Wang Jan 2010

An Authentication Framework For Wireless Sensor Networks Using Identity-Based Signatures, Rehana Yasmin, Eike Ritter, Guilin Wang

Faculty of Informatics - Papers (Archive)

In Wireless Sensor Networks (WSNs), authentication is a crucial security requirement to avoid attacks against secure communication, and to mitigate DoS attacks exploiting the limited resources of sensor nodes. Resource constraints of sensor nodes are hurdles in applying strong public key cryptographic based mechanisms in WSNs. To address the problem of authentication in WSNs, we propose an efficient and secure framework for authenticated broadcast/multicast by sensor nodes as well as for outside user authentication, which utilizes identity based cryptography and online/offline signature schemes. The primary goals of this framework are to enable all sensor nodes in the network, firstly, to …


Operation Of A Wind-Diesel-Battery Based Hybrid Remote Area Power Supply System, Nishad Mendis, Kashem Muttaqi, Saad Sayeef, Sarath Perera Jan 2010

Operation Of A Wind-Diesel-Battery Based Hybrid Remote Area Power Supply System, Nishad Mendis, Kashem Muttaqi, Saad Sayeef, Sarath Perera

Faculty of Informatics - Papers (Archive)

The operational behaviour of a Remote Area Power Supply (RAPS) system consisting of a Doubly Fed Induction Generator (DFIG) as the wind turbine generator, diesel generator system, battery storage, dump load and mains loads is investigated in this paper. The diesel generator operates during low wind penetration or high load demand periods. Otherwise, the DFIG and battery storage are able to satisfy the load demand of the system. The battery storage can be used as a source or load depending on the wind and loading conditions of the system. A control coordination among the system components is established with a …


Enhanced Reactive Power Support Of A Pmsg Based Wind Turbine For A Remote Area Power System, Saad Sayeef, Nishad Mendis, Kashem Muttaqi, Sarath Perera Jan 2010

Enhanced Reactive Power Support Of A Pmsg Based Wind Turbine For A Remote Area Power System, Saad Sayeef, Nishad Mendis, Kashem Muttaqi, Sarath Perera

Faculty of Informatics - Papers (Archive)

Due to the intermittent nature of wind, a wind turbine generator alone cannot supply all the active and reactive power required by the load at all times in a standalone environment. As a close relationship exists between reactive power and voltage magnitude, reactive power support is the mean used to maintain the desired voltage profile, both during normal and contingency conditions. In this paper, a synchronous condenser is integrated into the AC bus of a wind turbine generator based hybrid Remote Area Power Supply (RAPS) system where a Permanent Magnet Synchronous Generator (PMSG) is used to satisfy the active power …


On The Outage Of Multihop Parallel Relay Networks, Bappi Barua, Farzad Safaei, Mehran Abolhasan Jan 2010

On The Outage Of Multihop Parallel Relay Networks, Bappi Barua, Farzad Safaei, Mehran Abolhasan

Faculty of Informatics - Papers (Archive)

In this paper we analyze the outage probability of a cooperative multihop parallel relay network in Nakagami-m fading channels. The general closed form expression of the outage probability is derived both for integer and arbitrary Nakagami parameter m. We present numerical results on the performance of the network. It shows a careful configuration of the network size and power sharing between nodes can ensure optimal outage performance in the network.


Using In-Air Acoustic Vector Sensors For Tracking Moving Speakers, Muawiyath Shujau, Christian H. Ritz, I. Burnett Jan 2010

Using In-Air Acoustic Vector Sensors For Tracking Moving Speakers, Muawiyath Shujau, Christian H. Ritz, I. Burnett

Faculty of Informatics - Papers (Archive)

This paper investigates the use of an Acoustic Vector Sensor (AVS) for tracking a moving speaker in real time through estimation of the Direction of Arrival (DOA). This estimation is obtained using the MUltiple SIgnal Classification (MUSIC) [1] algorithm applied on a time-frame basis. The performance of the AVS is compared with a SoundField Microphone which has similar polar responses to the AVS using time-frames ranging from 20 ms to 1 s. Results show that for 20 ms frames, the AVS is capable of estimating the DOA for both mono-tone and speech signals, which are both stationary and moving, with …


Efficient Rfid Authentication Scheme For Supply Chain Applications, Fei Bi, Yi Mu Jan 2010

Efficient Rfid Authentication Scheme For Supply Chain Applications, Fei Bi, Yi Mu

Faculty of Informatics - Papers (Archive)

Radio Frequency Identification (RFID) technology has been widely used in supply chains to track and manage shipments. By tagging shipments with RFID tags, which can be remotely accessed by RFID readers, shipments can be identified and tracked in a supply chain. Security issues in RFID have been major concerns, since passive RFID tags have very weak computational power to support authentication. Sound authentication between tag and reader remains a challenging problem. In this paper, we provide a novel authentication scheme to protect tags from being tracked and identified by unauthorized readers and protect authorized readers against bogus tags. Our scheme …


Classification Cervical Cancer Using Histology Images, Rahmadwati, Golshah Naghdy, Montserrat Ros, Catherine Todd, E. Norachmawati Jan 2010

Classification Cervical Cancer Using Histology Images, Rahmadwati, Golshah Naghdy, Montserrat Ros, Catherine Todd, E. Norachmawati

Faculty of Informatics - Papers (Archive)

This papers reports on methodologies and outcome of a study aiming at developing robust tool to evaluate and classify histology images of cervical cancer. Using the histology images acquired from the pathology laboratories in an Indonesian hospital, this study aims to classify cervical biopsy images based on four well known discriminatory features a) the ratio of nuclei to cytoplasm b) diameter of nuclei c) shape factor and d) roundness of nuclei. In this study, the cervical histology images are classified into three categories: 1) normal, 2) pre cancer and 3) malignant. The final system will take as input a biopsy …


Demystifying The Number Of The Beast In The Book Of Revelation: Examples Of Ancient Cryptology And The Interpretation Of The “666” Conundrum, M G. Michael Jan 2010

Demystifying The Number Of The Beast In The Book Of Revelation: Examples Of Ancient Cryptology And The Interpretation Of The “666” Conundrum, M G. Michael

Faculty of Informatics - Papers (Archive)

As the year 2000 came and went, with the suitably forecasted fuse-box of utopian and apocalyptic responses, the question of "666" (Rev 13:18) was once more brought to our attention in different ways. Biblical scholars, for instance, focused again on the interpretation of the notorious conundrum and on the Traditionsgeschichte of Antichrist. For some of those commentators it was a reply to the outpouring of sensationalist publications fuelled by the millennial mania. This paper aims to shed some light on the background, the sources, and the interpretation of the “number of the beast”. It explores the ancient techniques for understanding …


Modelling Process For The Development Of Learning Content For Tertiary Education, Zhengui Wu, Parviz Doulai Jan 2010

Modelling Process For The Development Of Learning Content For Tertiary Education, Zhengui Wu, Parviz Doulai

Faculty of Informatics - Papers (Archive)

Along with the development of Internet technology, e-Learning as a flexible and convenient educational method has been widely accepted in tertiary education institutions to enhance and facilitate learning. By avoiding costly duplication and enabling the rapid creation of online courses, the employment of Learning Objects (LOs) and their reusability can benefit any educational institution when developing digital learning content for e-Learning. This paper proposes a learning content development target model utilizing LOs and related technologies to help content authors to design, develop and publish learning content at a minimized cost. The proposed model consists of identified variables that directly or …


A Network-Aware Virtual Machine Placement And Migration Approach In Cloud Computing, Jingtai Piao, Jun Yan Jan 2010

A Network-Aware Virtual Machine Placement And Migration Approach In Cloud Computing, Jingtai Piao, Jun Yan

Faculty of Informatics - Papers (Archive)

Cloud computing represents a major step up in computing whereby shared computation resources are provided on demand. In such a scenario, applications and data thereof can be hosted by various networked virtual machines (VMs). As applications, especially data-intensive applications, often need to communicate with data frequently, the network I/O performance would affect the overall application performance significantly. Therefore, placement of virtual machines which host an application and migration of these virtual machines while the unexpected network latency or congestion occurs is critical to achieve and maintain the application performance. To address these issues, this paper proposes a virtual machine placement …


Graphs Of C*-Correspondences And Fell Bundles, Valentin Deaconu, Alexander Kumjian, David A. Pask, Aidan Sims Jan 2010

Graphs Of C*-Correspondences And Fell Bundles, Valentin Deaconu, Alexander Kumjian, David A. Pask, Aidan Sims

Faculty of Informatics - Papers (Archive)

We define the notion of a ˄-system of C*-correspondences associated to a higher-rank graph ˄. Roughly speaking, such a system assigns to each vertex of ˄ a C*- algebra, and to each path in ˄ a C*-correspondence in a way which carries compositions of paths to balanced tensor products of C*-correspondences. Under some simplifying assumptions, we use Fowler’s technology of Cuntz-Pimsner algebras for product systems of C*-correspondences to associate a C*-algebra to each ˄-system. We then construct a Fell bundle over the path groupoid G˄ and show that the C*-algebra of the ˄-system coincides with the reduced cross-sectional algebra of …


Connecting Museum Collections And Creator Communities: The Virtual Museum Of The Pacific Project, Frank Howarth, Peter Eklund Jan 2010

Connecting Museum Collections And Creator Communities: The Virtual Museum Of The Pacific Project, Frank Howarth, Peter Eklund

Faculty of Informatics - Papers (Archive)

[extract] “I’m interested in what you can’t see in collections...where this has been, what its function could be and how it still exists today...artists have a perspective that may assist in keeping some of these things in the way these objects always were made, but [also] ensuring that they evolve as well because that's part of the culture”. Artist Latai Taumopeau talking about a Ngatu, a traditional bark cloth from Tonga, in the Australian Museum collection.


Generalised Score And Wald Tests, Paul Rippon, J. C. W Rayner Jan 2010

Generalised Score And Wald Tests, Paul Rippon, J. C. W Rayner

Faculty of Informatics - Papers (Archive)

The generalised score and Wald tests are described and related to their nongeneralised versions. Two interesting applications are discussed. In the first a new test for the Behrens-Fisher problem is derived. The second is testing homogeneity of variances from multiple univariate normal populations.


Wavelet Based Nonlocal-Means Super-Resolution For Video Sequences, H Zheng, A Bouzerdoum, S L. Phung Jan 2010

Wavelet Based Nonlocal-Means Super-Resolution For Video Sequences, H Zheng, A Bouzerdoum, S L. Phung

Faculty of Informatics - Papers (Archive)

Video sequence resolution enhancement became a popular research area during the last two decades. Although traditional super-resolution techniques have been successful in dealing with image sequences, many constraints such as global translation between frames, have to be imposed to obtain good performance. In this paper, we present a new wavelet-based nonlocal-means (WNLM) framework to bypass the motion estimation stage. It can handle complex motion changes between frames. Compared with the nonlocal-means (NLM) super-resolution framework, the proposed method provides better result in terms of PSNR and faster processing.