{"title":"Phase Estimation in Video Transmission using Hilbert Transform","authors":"S. Chand, H. Om","doi":"10.1109/ICSCN.2007.350722","DOIUrl":"https://doi.org/10.1109/ICSCN.2007.350722","url":null,"abstract":"Channelization is one of the important techniques for sharing a single physical channel among the multiple videos. In channelization the videos are partitioned into segments and the bandwidth of the physical channel is partitioned into logical channels. The first segment of each video is transmitted through the first logical channel, the second segment of each video through the second logical channel, and so forth. The segments are transmitted periodically through the logical channels. In this paper, the video signals to be transmitted through different logical channels are estimated. Furthermore, using the Hilbert transform the phase is estimated by incorporating the jitter delays occurring among the video segments while transmitting through the logical channels. The phase is helpful in estimating the storage space at the user's site so that continuous delivery of the video services can be maintained","PeriodicalId":257948,"journal":{"name":"2007 International Conference on Signal Processing, Communications and Networking","volume":"115 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131417100","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Shobana, S. Priyadharshini, S. Amritha, G. Revadhi, R. Manickavasagam, B. Revathi, V. Vaidehi, S. Vasuhi
{"title":"Design of CDMA MAC for Microsatellite","authors":"S. Shobana, S. Priyadharshini, S. Amritha, G. Revadhi, R. Manickavasagam, B. Revathi, V. Vaidehi, S. Vasuhi","doi":"10.1109/ICSCN.2007.350702","DOIUrl":"https://doi.org/10.1109/ICSCN.2007.350702","url":null,"abstract":"Code division multiple access (CDMA) is a digital wireless transmission technology that allows for a large amount of users to share access to a single radio channel. This technology is being widely used in cellular communication and can be extended to store and forward (S&F) payload that provides message relay service for several users with ground terminals, simultaneously. In this paper, the three layered model for the store and forward payload using CDMA medium access control (MAC) is considered. Their design methodologies are discussed assuming static code assignment","PeriodicalId":257948,"journal":{"name":"2007 International Conference on Signal Processing, Communications and Networking","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134052123","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Attractive Leader Approach Based Clustering for Non-Symmetric Proximity","authors":"B. B. Kiranagi, D. S. Guru","doi":"10.1109/ICSCN.2007.350691","DOIUrl":"https://doi.org/10.1109/ICSCN.2007.350691","url":null,"abstract":"In this paper, the importance of non-symmetric proximity between symbolic data is discussed and a new algorithm for clustering is proposed. The proposed algorithm works directly on the non-symmetric proximity matrices and is based on the leader oriented incremental approach. Experiments on the standard symbolic data sets have been conducted in order to study the efficacy of the proposed methodology","PeriodicalId":257948,"journal":{"name":"2007 International Conference on Signal Processing, Communications and Networking","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134145757","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design Challenges for Optimizing the Performance of Energy Constrained Wireless Sensor Networks","authors":"L. Jayashree, S. Arumugam","doi":"10.1109/ICSCN.2007.350659","DOIUrl":"https://doi.org/10.1109/ICSCN.2007.350659","url":null,"abstract":"Prolonged network lifetime, scalability and reliability are the most common requirements for many ad-hoc sensor network applications. Clustering sensor nodes is an effective technique to achieve these goals. This paper assumes a heterogeneous network structure where nodes with higher capabilities act as cluster heads and others as members of the cluster. Nodes use multi hopping to reach the cluster heads and hence the cluster heads and the nodes closest to them decide the lifetime of the network. The contributions of this paper are: (i) it outlines the design issues to be considered in optimizing the performance of large-scale wireless sensor networks operating under energy and reliability constraints, (ii) It provides a model to calculate the optimum number of clusters to guarantee a minimum lifetime and validates the model using a simulation study","PeriodicalId":257948,"journal":{"name":"2007 International Conference on Signal Processing, Communications and Networking","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134642457","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Intelligent Agent Based Approach for Intrusion Detection and Prevention in Adhoc Networks","authors":"S. Veeraraghavan, S. Bose, K. Anand, A. Kannan","doi":"10.1109/ICSCN.2007.350658","DOIUrl":"https://doi.org/10.1109/ICSCN.2007.350658","url":null,"abstract":"This paper describes about an intelligent agent based intrusion detection and prevention system for mobile ad hoc network. This system collects data from application layer and network layer and classifies them using the log file data collected from these layers and local anomalies are computed using local agents finally it is sent to a global agent for integration. The local agents monitor the two layers of the network to determine the correlation among the observed anomalous patterns, reporting such abnormal behavior to the administrator for taking possible action. Our simulation results obtained after integration shows that it is possible to obtain high intrusion-detection rates (99.2%) and low false-alarm rates","PeriodicalId":257948,"journal":{"name":"2007 International Conference on Signal Processing, Communications and Networking","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132232773","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
N. Elfadel, E. Idriss, A. Mohammed, A. Aziz, N. Saad
{"title":"Multi-user Detection for the Optical CDMA: One Stage Optical Parallel Interference Cancellation","authors":"N. Elfadel, E. Idriss, A. Mohammed, A. Aziz, N. Saad","doi":"10.1109/ICSCN.2007.350749","DOIUrl":"https://doi.org/10.1109/ICSCN.2007.350749","url":null,"abstract":"The need for high speed networks has motivated the telecommunication community to investigate the potential of optical code division multiple access (OCDMA) in local area networks. However, multiple access interference (MAI), which increases with the number of simultaneous users, severely limits the capacity of the system. Optical parallel interference cancellation (OPIC) has been used to reduce the effect of MAI. The drawback of OPIC is that, it increases the demand for hardware complexity, resulting into higher processing time and cost. To overcome these difficulties, an efficient method is presented in this paper called, one stage optical parallel interference cancellation (OS-OPIC) which is based mainly on OPIC. Performance analysis of the proposed design is done using optical orthogonal code (OOC) as signature sequence and new expression for error probability is demonstrated. It is shown that, the proposed method is effective to reduce the hardware complexity, processing time and cost while maintaining the same bit error probability at the cost of increasing threshold value","PeriodicalId":257948,"journal":{"name":"2007 International Conference on Signal Processing, Communications and Networking","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114858105","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Improved Adaptive Skip Algorithm for Video Shot Boundary Detection","authors":"A. Baskar, M. Prabukumar, S. Sathishkumar","doi":"10.1109/ICSCN.2007.350787","DOIUrl":"https://doi.org/10.1109/ICSCN.2007.350787","url":null,"abstract":"Video shot boundary (VSB) detection plays an important role in modern video archiving and summarization applications. The classical linear approach towards VSB detection is basically a sequential search, however this approach is computationally very expensive for large databases. In this work we propose a non-linear approach for VSB detection, which is an improvement of existing adaptive skip. The proposed technique compares less than 10% of frames in an entire video. Our experimental result shows that the proposed technique outperforms the other existing non-linear algorithms with better accuracy and meaningful VSBs","PeriodicalId":257948,"journal":{"name":"2007 International Conference on Signal Processing, Communications and Networking","volume":"57 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124321069","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Tracebacking the Spoofed IP Packets in Multi ISP Domains with Secured Communication","authors":"V. Murali Bhaskaran, A. Natarajan, S. Sivanandam","doi":"10.1109/ICSCN.2007.350668","DOIUrl":"https://doi.org/10.1109/ICSCN.2007.350668","url":null,"abstract":"Internet protocol (IP) packet traceback system identifies the origin of the sequence of IP packets when the source addresses of these packets are spoofed. IP packet traceback is usually performed with the help of routers and gateways. Several approaches have been proposed to trace IP packets to their origin. The packet marking approach enables routers to probabilistically mark packets with partial path information and tries to reconstruct the complete path from the marked packets. In most of these approaches, routers and victims (affected systems) are considerably overloaded for marking the packet and reconstructing the trace path and requires more marked packets. This paper focuses on tracing the approximate source of attack instead of tracing the entire path in multi domain system without computation, by victim and also implementing security for authentication and confidentiality. It is assumed that Internet topology has been grouped as ISP domains","PeriodicalId":257948,"journal":{"name":"2007 International Conference on Signal Processing, Communications and Networking","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126278838","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Energy Aware Routing for Wireless Sensor Networks","authors":"R. Vidhyapriya, P. Vanathi","doi":"10.1109/ICSCN.2007.350661","DOIUrl":"https://doi.org/10.1109/ICSCN.2007.350661","url":null,"abstract":"Applications of sensor networks have become an emerging technology, which can monitor a specific area and collect environmental data around a place. In recent years, low power wireless communication and the availability of cheap and small micro sensor nodes lead to enhanced developments of wireless sensor network applications in real society. The energy constraint inherent in the small battery powered nodes presents a considerable problem, and much effort is being put into reducing the power consumption. We introduce a reactive routing protocol called energy aware routing that is intended to provide a reliable transmission environment with low energy consumption. This protocol efficiently utilizes both the energy available in the node and quality of the link to identify the best possible route to the destination. Simulation results show that the energy aware routing scheme outperforms the existing schemes even in the presence of high node density and overcomes simultaneous packet forwarding","PeriodicalId":257948,"journal":{"name":"2007 International Conference on Signal Processing, Communications and Networking","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128964756","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Computer Aided Medical Diagnosis for the Identification of Malaria Parasites","authors":"S.F. Toha, U. K. Ngah","doi":"10.1109/ICSCN.2007.350655","DOIUrl":"https://doi.org/10.1109/ICSCN.2007.350655","url":null,"abstract":"This paper presents one of the applications of digital image processing in artificial intelligence particularly in the field of medical diagnosis system. Currently in Malaysia the traditional method for the identification of Malaria parasites requires a trained technologist to manually examine and detect the number of the parasites subsequently by reading the slides. This is a very time consuming process, causes operator fatigue and is prone to human errors and inconsistency. An automated system is therefore needed to complete as much work as possible for the identification of Malaria parasites. The integration both soft computing tools has been successfully designed with the capability to improve the quality of the image, analyze and classify the image as well as calculating the number of Malaria parasites","PeriodicalId":257948,"journal":{"name":"2007 International Conference on Signal Processing, Communications and Networking","volume":"82 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130285141","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}