{"title":"Natural Sounding Sub-Word Units Concatenation in Malay Speech Synthesis","authors":"S. Tiun, Rosni Abdullah, E. Tang","doi":"10.1109/ICSAP.2009.40","DOIUrl":"https://doi.org/10.1109/ICSAP.2009.40","url":null,"abstract":"The goal of this work was to concatenate Malay subwordswithout introducing perceptible audible discontinuities.Based on a phonemes adjacency analysis, we build a list ofnon-audible distortion sub-word unit lookup. Selecting subwordfrom this lookup will avoid spectral mismatched betweenthe joined speech units and this can guarantee the segmentalquality of the sub-words concatenation. In order to avoidprosodic mismatched, we only allow the sub-words to beconcatenated when they have the same prosodic features. Theexpectation by considering the correct prosodic features andthe non-audible discontinuities of sub-word units, a naturalsounding of sub-words concatenation is possible to be obtained.","PeriodicalId":176934,"journal":{"name":"2009 International Conference on Signal Acquisition and Processing","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127535822","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Novel Measurement and Statistics of Similarity Cue for Edges in Contour Grouping","authors":"Jingjing Zhong, Siwei Luo, Qi Zou","doi":"10.1109/ICSAP.2009.8","DOIUrl":"https://doi.org/10.1109/ICSAP.2009.8","url":null,"abstract":"Similarity is one of the important Gestalt laws for contour grouping. Edges are the basic elements of contour grouping. We define a novel measurement of edge similarity on the case of that an edge representation includes an estimate of the image intensity on either side of each edge. We discuss how to choose a proper feature to encode edge regions and which shape and size region is proper to edge similarity measurement. We also propose a new statistic of similarity cue which considers similarity on the basis of proximity, and which enhances the power of similarity cue in contour grouping effectively.","PeriodicalId":176934,"journal":{"name":"2009 International Conference on Signal Acquisition and Processing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128735095","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Fast H.264/AVC Intra Mode Decision Implementation on DM648 DSP","authors":"M. Mohammadnia, H. Taheri, S. Motamedi","doi":"10.1109/ICSAP.2009.16","DOIUrl":"https://doi.org/10.1109/ICSAP.2009.16","url":null,"abstract":"Abstract—One of the advantages of H264/AVC videocoding standard is its new algorithms in intra codingmode, but making decision among all these predictionmodes needs some complex computation so it makes abottleneck in implementation of a real-time video codec.In this paper a new and simple method for intraprediction mode decision has been proposed and alsoimplemented on a DM648 TI DSP. Experimental resultsillustrate the proposed algorithm efficiency in codingprocedure speed versus neglectable PSNR and bit ratedegradation.","PeriodicalId":176934,"journal":{"name":"2009 International Conference on Signal Acquisition and Processing","volume":"146 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129492703","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"SONAR Based Obstacle Detection and Avoidance Algorithm","authors":"M. A. Ansari, F. Umrani","doi":"10.1109/ICSAP.2009.46","DOIUrl":"https://doi.org/10.1109/ICSAP.2009.46","url":null,"abstract":"Autonomous robots are intelligent machines that arecapable of performing desired tasks by themselves, withoutexplicit human control. This paper presents a novel simplealgorithm based on ultrasonic sensors and simple calculationsfor real-time obstacle detection and avoidance that is intendedfor mobile robots. The design is implemented in air usingultrasonic sensors but can be adapted using sonar tounderwater environments where it has important applicationssuch as deep sea maintenance and reconnaissance tasks. Thepaper also presents performance results of a prototypedeveloped to prove the design concept.","PeriodicalId":176934,"journal":{"name":"2009 International Conference on Signal Acquisition and Processing","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130646669","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"FTTH Network Management Software Tool: SANTAD ver 2.0","authors":"Boonchuan Ng, M. Ab-Rahman, K. Jumari","doi":"10.1109/ICSAP.2009.27","DOIUrl":"https://doi.org/10.1109/ICSAP.2009.27","url":null,"abstract":"This paper focused on developing a fiber-to-the-home (FTTH) network management software tool named Smart Access Network Testing, Analyzing and Database (SANTAD) ver 2.0 based on Visual Basic for transmission surveillance and fiber fault identification. SANTAD will be installed with optical line terminal (OLT) at central office (CO) to allow the network service providers and field engineers to detect a fiber fault, locate the failure location, and monitor the network performance downwardly from CO towards customer residential locations. SANTAD is able to display the status of each optical network unit (ONU) connected line on a single computer screen with capability to configure the attenuation and detect the failure simultaneously. The failure information will be delivered to the field engineers for promptly actions, meanwhile the failure line will be diverted to protection line to ensure the traffic flow continuously. The database system enable the history of network scanning process be analyzed and studied by the engineer.","PeriodicalId":176934,"journal":{"name":"2009 International Conference on Signal Acquisition and Processing","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114797014","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ahmad Tahmasebi, Arash Kamali, H. B. Bahar, Z. D. Koozehkanani
{"title":"A Fully Digital Background Calibration Technique for Pipeline Analog-to-Digital Converters","authors":"Ahmad Tahmasebi, Arash Kamali, H. B. Bahar, Z. D. Koozehkanani","doi":"10.1109/ICSAP.2009.51","DOIUrl":"https://doi.org/10.1109/ICSAP.2009.51","url":null,"abstract":"This paper describes a new Background calibration technique for pipeline analog-to-digital converters (ADCs). The new scheme utilizes an existing digital foreground calibration algorithm and extends it to work in background. The goal is to digitally calibrate the pipeline ADCs in the background without stopping the input conversion. In this method one additional stage connected in parallel to the stage under calibration and one cyclic ADC are used to accommodate the calibration. The extra stage and the cyclic ADC are only used during the calibration process. Sources of error in pipeline architectures and effects of error on residue plot of 1-bit per stage are identified and discussed. The digital background calibration accounts for capacitor mismatch, comparator offset, charge injection and finite op-amp gain. By applying proposed calibration to a 12 bit resolution pipeline ADC, maximum INL improved from 14 to 0.6 LSB, and maximum DNL improved from 26 to 0.8 LSB.","PeriodicalId":176934,"journal":{"name":"2009 International Conference on Signal Acquisition and Processing","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126238712","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Parallel Pipelined VLSI Architectures for Lifting-Based Two-Dimensional Forward Discrete Wavelet Transform","authors":"I. S. Koko, H. Agustiawan","doi":"10.1109/ICSAP.2009.23","DOIUrl":"https://doi.org/10.1109/ICSAP.2009.23","url":null,"abstract":"In this paper, in order to best meet real-time applications of 2-dimensional discrete wavelet transform (2-D DWT) with demanding requirements in terms of speed and throughput, 2-parallel and 4-parallel pipelined lifting-based VLSI architectures for lossless 5/3 and lossy 9/7 algorithms are proposed. The two proposed parallel architectures achieve speedup factors of 2 and 4 as compared with single pipelined architecture based on the first scan method proposed by Ibrahim et al. The advantage of the proposed architectures is that they only require a total temporary line buffer (TLB) of size N and 3N in 5/3 and 9/7, respectively.","PeriodicalId":176934,"journal":{"name":"2009 International Conference on Signal Acquisition and Processing","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125619600","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"CMMI and Six Sigma-Relationship & Integration","authors":"N. Kamalakshi, H. Naganna","doi":"10.1109/ICSAP.2009.59","DOIUrl":"https://doi.org/10.1109/ICSAP.2009.59","url":null,"abstract":"Organizations that endeavor to improve often find themselves juggling many solutions: maturity models, EIA standards, acquisition standards, ISO standards, measurement best practices, codified lifecycle processes such as Team Software ProcessSM (TSPSM), software development principles, and more. All improvement initiatives selected by an organization should be implemented in an integrated fashion, not as layered or stovepiped efforts.And the result should be a set of organizational processes, used by everyone- from developer to software engineering process group (SEPG)1 member to manager-that reflect the features of the improvement initiatives chosen. This paper focuses on two popular improvement initiatives: CMMI and Six Sigma, and their relationships. As CMMI has become more widely institutionalized, Six Sigma has made its way into engineering disciplines.","PeriodicalId":176934,"journal":{"name":"2009 International Conference on Signal Acquisition and Processing","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131009812","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
H. Mathkour, G. Assassa, Abdulaziz Al Muharib, Ibrahim Kiady
{"title":"A Novel Approach for Hiding Messages in Images","authors":"H. Mathkour, G. Assassa, Abdulaziz Al Muharib, Ibrahim Kiady","doi":"10.1109/ICSAP.2009.36","DOIUrl":"https://doi.org/10.1109/ICSAP.2009.36","url":null,"abstract":"In this paper, a spiral-based Least Significant Bit (LSB) approach for hiding messages in images is presented. The proposed approach is based on the LSB substitution technique applied on RGB color components of BMP images. The key idea is to divide the image into segments and process them differently. The presented approach considers three algorithms corresponding to three spiral substitution. The proposed algorithms are presented and their performance against attacks and processing time are evaluated. The embedding time was compared for the proposed algorithms as function of the message length up to 20 KB. Numerical experimentation suggests that the embedding time varies linearly with the message length. The assessment of the proposed algorithms against attacks was also evaluated using a chi-square analysis technique exhibiting superior performance","PeriodicalId":176934,"journal":{"name":"2009 International Conference on Signal Acquisition and Processing","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131081202","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Abdelmahmoud Youssouf Dahab, H. Hasbullah, A. Said
{"title":"Predicting Traffic Bursts Using Extreme Value Theory","authors":"Abdelmahmoud Youssouf Dahab, H. Hasbullah, A. Said","doi":"10.1109/ICSAP.2009.52","DOIUrl":"https://doi.org/10.1109/ICSAP.2009.52","url":null,"abstract":"Traffic Bursts appear to be more pronounced recently and have major consequences for network Quality of Service. We investigate the extreme behavior of bursts and quantify the probabilities of these large bursts. Taking Bellcore internal Ethernet traces as an example, we applied Generalized Extreme Value model over block maxima. The analysis reveals that traffic burst maxima follows GEV model with negative shape parameter. Traffic bursts are in the domain of attraction of Weibull distribution. Our result confirms the conclusion of Norros of storage fed with Gaussian self-similar input.","PeriodicalId":176934,"journal":{"name":"2009 International Conference on Signal Acquisition and Processing","volume":"18 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133293433","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}