2007 International Conference on Signal Processing, Communications and Networking最新文献

筛选
英文 中文
Phase Estimation in Video Transmission using Hilbert Transform 希尔伯特变换在视频传输中的相位估计
2007 International Conference on Signal Processing, Communications and Networking Pub Date : 2007-11-05 DOI: 10.1109/ICSCN.2007.350722
S. Chand, H. Om
{"title":"Phase Estimation in Video Transmission using Hilbert Transform","authors":"S. Chand, H. Om","doi":"10.1109/ICSCN.2007.350722","DOIUrl":"https://doi.org/10.1109/ICSCN.2007.350722","url":null,"abstract":"Channelization is one of the important techniques for sharing a single physical channel among the multiple videos. In channelization the videos are partitioned into segments and the bandwidth of the physical channel is partitioned into logical channels. The first segment of each video is transmitted through the first logical channel, the second segment of each video through the second logical channel, and so forth. The segments are transmitted periodically through the logical channels. In this paper, the video signals to be transmitted through different logical channels are estimated. Furthermore, using the Hilbert transform the phase is estimated by incorporating the jitter delays occurring among the video segments while transmitting through the logical channels. The phase is helpful in estimating the storage space at the user's site so that continuous delivery of the video services can be maintained","PeriodicalId":257948,"journal":{"name":"2007 International Conference on Signal Processing, Communications and Networking","volume":"115 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131417100","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Design of CDMA MAC for Microsatellite 微卫星CDMA MAC的设计
2007 International Conference on Signal Processing, Communications and Networking Pub Date : 2007-11-05 DOI: 10.1109/ICSCN.2007.350702
S. Shobana, S. Priyadharshini, S. Amritha, G. Revadhi, R. Manickavasagam, B. Revathi, V. Vaidehi, S. Vasuhi
{"title":"Design of CDMA MAC for Microsatellite","authors":"S. Shobana, S. Priyadharshini, S. Amritha, G. Revadhi, R. Manickavasagam, B. Revathi, V. Vaidehi, S. Vasuhi","doi":"10.1109/ICSCN.2007.350702","DOIUrl":"https://doi.org/10.1109/ICSCN.2007.350702","url":null,"abstract":"Code division multiple access (CDMA) is a digital wireless transmission technology that allows for a large amount of users to share access to a single radio channel. This technology is being widely used in cellular communication and can be extended to store and forward (S&F) payload that provides message relay service for several users with ground terminals, simultaneously. In this paper, the three layered model for the store and forward payload using CDMA medium access control (MAC) is considered. Their design methodologies are discussed assuming static code assignment","PeriodicalId":257948,"journal":{"name":"2007 International Conference on Signal Processing, Communications and Networking","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134052123","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Attractive Leader Approach Based Clustering for Non-Symmetric Proximity 一种基于吸引领导者的非对称邻近聚类方法
2007 International Conference on Signal Processing, Communications and Networking Pub Date : 2007-11-05 DOI: 10.1109/ICSCN.2007.350691
B. B. Kiranagi, D. S. Guru
{"title":"An Attractive Leader Approach Based Clustering for Non-Symmetric Proximity","authors":"B. B. Kiranagi, D. S. Guru","doi":"10.1109/ICSCN.2007.350691","DOIUrl":"https://doi.org/10.1109/ICSCN.2007.350691","url":null,"abstract":"In this paper, the importance of non-symmetric proximity between symbolic data is discussed and a new algorithm for clustering is proposed. The proposed algorithm works directly on the non-symmetric proximity matrices and is based on the leader oriented incremental approach. Experiments on the standard symbolic data sets have been conducted in order to study the efficacy of the proposed methodology","PeriodicalId":257948,"journal":{"name":"2007 International Conference on Signal Processing, Communications and Networking","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134145757","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Design Challenges for Optimizing the Performance of Energy Constrained Wireless Sensor Networks 优化能量受限无线传感器网络性能的设计挑战
2007 International Conference on Signal Processing, Communications and Networking Pub Date : 2007-11-05 DOI: 10.1109/ICSCN.2007.350659
L. Jayashree, S. Arumugam
{"title":"Design Challenges for Optimizing the Performance of Energy Constrained Wireless Sensor Networks","authors":"L. Jayashree, S. Arumugam","doi":"10.1109/ICSCN.2007.350659","DOIUrl":"https://doi.org/10.1109/ICSCN.2007.350659","url":null,"abstract":"Prolonged network lifetime, scalability and reliability are the most common requirements for many ad-hoc sensor network applications. Clustering sensor nodes is an effective technique to achieve these goals. This paper assumes a heterogeneous network structure where nodes with higher capabilities act as cluster heads and others as members of the cluster. Nodes use multi hopping to reach the cluster heads and hence the cluster heads and the nodes closest to them decide the lifetime of the network. The contributions of this paper are: (i) it outlines the design issues to be considered in optimizing the performance of large-scale wireless sensor networks operating under energy and reliability constraints, (ii) It provides a model to calculate the optimum number of clusters to guarantee a minimum lifetime and validates the model using a simulation study","PeriodicalId":257948,"journal":{"name":"2007 International Conference on Signal Processing, Communications and Networking","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134642457","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Intelligent Agent Based Approach for Intrusion Detection and Prevention in Adhoc Networks 一种基于智能代理的自组织网络入侵检测与防御方法
2007 International Conference on Signal Processing, Communications and Networking Pub Date : 2007-11-05 DOI: 10.1109/ICSCN.2007.350658
S. Veeraraghavan, S. Bose, K. Anand, A. Kannan
{"title":"An Intelligent Agent Based Approach for Intrusion Detection and Prevention in Adhoc Networks","authors":"S. Veeraraghavan, S. Bose, K. Anand, A. Kannan","doi":"10.1109/ICSCN.2007.350658","DOIUrl":"https://doi.org/10.1109/ICSCN.2007.350658","url":null,"abstract":"This paper describes about an intelligent agent based intrusion detection and prevention system for mobile ad hoc network. This system collects data from application layer and network layer and classifies them using the log file data collected from these layers and local anomalies are computed using local agents finally it is sent to a global agent for integration. The local agents monitor the two layers of the network to determine the correlation among the observed anomalous patterns, reporting such abnormal behavior to the administrator for taking possible action. Our simulation results obtained after integration shows that it is possible to obtain high intrusion-detection rates (99.2%) and low false-alarm rates","PeriodicalId":257948,"journal":{"name":"2007 International Conference on Signal Processing, Communications and Networking","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132232773","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Multi-user Detection for the Optical CDMA: One Stage Optical Parallel Interference Cancellation 光CDMA的多用户检测:一级光并行干扰消除
2007 International Conference on Signal Processing, Communications and Networking Pub Date : 2007-11-05 DOI: 10.1109/ICSCN.2007.350749
N. Elfadel, E. Idriss, A. Mohammed, A. Aziz, N. Saad
{"title":"Multi-user Detection for the Optical CDMA: One Stage Optical Parallel Interference Cancellation","authors":"N. Elfadel, E. Idriss, A. Mohammed, A. Aziz, N. Saad","doi":"10.1109/ICSCN.2007.350749","DOIUrl":"https://doi.org/10.1109/ICSCN.2007.350749","url":null,"abstract":"The need for high speed networks has motivated the telecommunication community to investigate the potential of optical code division multiple access (OCDMA) in local area networks. However, multiple access interference (MAI), which increases with the number of simultaneous users, severely limits the capacity of the system. Optical parallel interference cancellation (OPIC) has been used to reduce the effect of MAI. The drawback of OPIC is that, it increases the demand for hardware complexity, resulting into higher processing time and cost. To overcome these difficulties, an efficient method is presented in this paper called, one stage optical parallel interference cancellation (OS-OPIC) which is based mainly on OPIC. Performance analysis of the proposed design is done using optical orthogonal code (OOC) as signature sequence and new expression for error probability is demonstrated. It is shown that, the proposed method is effective to reduce the hardware complexity, processing time and cost while maintaining the same bit error probability at the cost of increasing threshold value","PeriodicalId":257948,"journal":{"name":"2007 International Conference on Signal Processing, Communications and Networking","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114858105","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Improved Adaptive Skip Algorithm for Video Shot Boundary Detection 视频镜头边界检测的改进自适应跳过算法
2007 International Conference on Signal Processing, Communications and Networking Pub Date : 2007-11-05 DOI: 10.1109/ICSCN.2007.350787
A. Baskar, M. Prabukumar, S. Sathishkumar
{"title":"Improved Adaptive Skip Algorithm for Video Shot Boundary Detection","authors":"A. Baskar, M. Prabukumar, S. Sathishkumar","doi":"10.1109/ICSCN.2007.350787","DOIUrl":"https://doi.org/10.1109/ICSCN.2007.350787","url":null,"abstract":"Video shot boundary (VSB) detection plays an important role in modern video archiving and summarization applications. The classical linear approach towards VSB detection is basically a sequential search, however this approach is computationally very expensive for large databases. In this work we propose a non-linear approach for VSB detection, which is an improvement of existing adaptive skip. The proposed technique compares less than 10% of frames in an entire video. Our experimental result shows that the proposed technique outperforms the other existing non-linear algorithms with better accuracy and meaningful VSBs","PeriodicalId":257948,"journal":{"name":"2007 International Conference on Signal Processing, Communications and Networking","volume":"57 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124321069","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Tracebacking the Spoofed IP Packets in Multi ISP Domains with Secured Communication 基于安全通信的多ISP域欺骗IP报文溯源
2007 International Conference on Signal Processing, Communications and Networking Pub Date : 2007-11-05 DOI: 10.1109/ICSCN.2007.350668
V. Murali Bhaskaran, A. Natarajan, S. Sivanandam
{"title":"Tracebacking the Spoofed IP Packets in Multi ISP Domains with Secured Communication","authors":"V. Murali Bhaskaran, A. Natarajan, S. Sivanandam","doi":"10.1109/ICSCN.2007.350668","DOIUrl":"https://doi.org/10.1109/ICSCN.2007.350668","url":null,"abstract":"Internet protocol (IP) packet traceback system identifies the origin of the sequence of IP packets when the source addresses of these packets are spoofed. IP packet traceback is usually performed with the help of routers and gateways. Several approaches have been proposed to trace IP packets to their origin. The packet marking approach enables routers to probabilistically mark packets with partial path information and tries to reconstruct the complete path from the marked packets. In most of these approaches, routers and victims (affected systems) are considerably overloaded for marking the packet and reconstructing the trace path and requires more marked packets. This paper focuses on tracing the approximate source of attack instead of tracing the entire path in multi domain system without computation, by victim and also implementing security for authentication and confidentiality. It is assumed that Internet topology has been grouped as ISP domains","PeriodicalId":257948,"journal":{"name":"2007 International Conference on Signal Processing, Communications and Networking","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126278838","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Energy Aware Routing for Wireless Sensor Networks 无线传感器网络的能量感知路由
2007 International Conference on Signal Processing, Communications and Networking Pub Date : 2007-11-05 DOI: 10.1109/ICSCN.2007.350661
R. Vidhyapriya, P. Vanathi
{"title":"Energy Aware Routing for Wireless Sensor Networks","authors":"R. Vidhyapriya, P. Vanathi","doi":"10.1109/ICSCN.2007.350661","DOIUrl":"https://doi.org/10.1109/ICSCN.2007.350661","url":null,"abstract":"Applications of sensor networks have become an emerging technology, which can monitor a specific area and collect environmental data around a place. In recent years, low power wireless communication and the availability of cheap and small micro sensor nodes lead to enhanced developments of wireless sensor network applications in real society. The energy constraint inherent in the small battery powered nodes presents a considerable problem, and much effort is being put into reducing the power consumption. We introduce a reactive routing protocol called energy aware routing that is intended to provide a reliable transmission environment with low energy consumption. This protocol efficiently utilizes both the energy available in the node and quality of the link to identify the best possible route to the destination. Simulation results show that the energy aware routing scheme outperforms the existing schemes even in the presence of high node density and overcomes simultaneous packet forwarding","PeriodicalId":257948,"journal":{"name":"2007 International Conference on Signal Processing, Communications and Networking","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128964756","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 90
Computer Aided Medical Diagnosis for the Identification of Malaria Parasites 疟疾寄生虫鉴定的计算机辅助医学诊断
2007 International Conference on Signal Processing, Communications and Networking Pub Date : 2007-11-05 DOI: 10.1109/ICSCN.2007.350655
S.F. Toha, U. K. Ngah
{"title":"Computer Aided Medical Diagnosis for the Identification of Malaria Parasites","authors":"S.F. Toha, U. K. Ngah","doi":"10.1109/ICSCN.2007.350655","DOIUrl":"https://doi.org/10.1109/ICSCN.2007.350655","url":null,"abstract":"This paper presents one of the applications of digital image processing in artificial intelligence particularly in the field of medical diagnosis system. Currently in Malaysia the traditional method for the identification of Malaria parasites requires a trained technologist to manually examine and detect the number of the parasites subsequently by reading the slides. This is a very time consuming process, causes operator fatigue and is prone to human errors and inconsistency. An automated system is therefore needed to complete as much work as possible for the identification of Malaria parasites. The integration both soft computing tools has been successfully designed with the capability to improve the quality of the image, analyze and classify the image as well as calculating the number of Malaria parasites","PeriodicalId":257948,"journal":{"name":"2007 International Conference on Signal Processing, Communications and Networking","volume":"82 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130285141","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 32
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信