2010 International Conference on Signal Acquisition and Processing最新文献

筛选
英文 中文
Image Watermarking Scheme Using Singular Value Decomposition, Quantization and Genetic Algorithm 基于奇异值分解、量化和遗传算法的图像水印方案
2010 International Conference on Signal Acquisition and Processing Pub Date : 2010-02-09 DOI: 10.1109/ICSAP.2010.71
B. Jagadeesh, Samayamantula Srinivas Kumar, K. Rajeswari
{"title":"Image Watermarking Scheme Using Singular Value Decomposition, Quantization and Genetic Algorithm","authors":"B. Jagadeesh, Samayamantula Srinivas Kumar, K. Rajeswari","doi":"10.1109/ICSAP.2010.71","DOIUrl":"https://doi.org/10.1109/ICSAP.2010.71","url":null,"abstract":"Digital Watermarking and data hiding has become an important tool for protecting digital images from theft, illegal copying and unlawful reproduction. Some digital watermarking algorithms were proposed using spatial domain and transform domain. The transform domain could be DFT, DCT, DWT or SVD. Several digital watermarking algorithms using Genetic Algorithms are available in the literature. In this paper, a modified image watermarking scheme based on Singular Value Decomposition using Genetic Algorithm (GA) is proposed. The proposed scheme is based on quantization step size optimization using the Genetic Algorithm to improve the quality of watermarked image and robustness of the watermark. This method is more secure and robust to attacks, viz., Low Pass Filtering, Median Filtering, JPEG Compression, Resizing, Row-Column blanking, Row-Column Copying etc. Superior experimental results are observed with the proposed scheme over an algorithm proposed by Sun et al. in terms of Normalized Cross correlation (NC) and Peak Signal to Noise Ratio(PSNR).","PeriodicalId":303366,"journal":{"name":"2010 International Conference on Signal Acquisition and Processing","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-02-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129757732","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
BiCMOS Implementation of Cell Signaling for Cell Survival/Death 细胞存活/死亡信号的BiCMOS实现
2010 International Conference on Signal Acquisition and Processing Pub Date : 2010-02-09 DOI: 10.1109/ICSAP.2010.36
Shruti Jain, P. Naik, S. Bhooshan
{"title":"BiCMOS Implementation of Cell Signaling for Cell Survival/Death","authors":"Shruti Jain, P. Naik, S. Bhooshan","doi":"10.1109/ICSAP.2010.36","DOIUrl":"https://doi.org/10.1109/ICSAP.2010.36","url":null,"abstract":": A well-structured and controlled design methodology, along with a supporting hierarchical design system, has been developed to optimally support the development effort on several programs requiring gate array and semi custom Very Large Scale Integration (VLSI) design. In this paper, we will present an application of VLSI in System Biology. This work examines signaling networks that control the survival decision treated with combinations of three primary signals the pro death cytokine, tumor necrosis factor-α (TNF), and the pro survival growth factors, epidermal growth factor (EGF) and insulin. We have made model by taking three inputs, than made the truth table, Boolean equation and than implement the equation using BiCMOS logic circuit.","PeriodicalId":303366,"journal":{"name":"2010 International Conference on Signal Acquisition and Processing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-02-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131023765","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Using a Novel Intelligent Location Management Strategy in Cellular Networks 一种新的蜂窝网络智能位置管理策略
2010 International Conference on Signal Acquisition and Processing Pub Date : 2010-02-09 DOI: 10.1109/ICSAP.2010.57
J. Singh, M. Karnan
{"title":"Using a Novel Intelligent Location Management Strategy in Cellular Networks","authors":"J. Singh, M. Karnan","doi":"10.1109/ICSAP.2010.57","DOIUrl":"https://doi.org/10.1109/ICSAP.2010.57","url":null,"abstract":"Cellular mobile systems provides access to a wide range of services and allow mobile terminals (MTs) to move randomly from one place to another within a well-defined geographical area. Due to the growing number of mobile users, global connectivity, and the small size of cells, one of the most critical issues regarding these networks is location management. The challenging task in a cellular system is to track the location of the mobile users effectively so that the connection establishment cost and delay is low. In recent years, several strategies have been proposed to improve the performance of the location management procedure in cellular networks. In this paper, we propose an intelligent approach by taking the User Profile History (UPH); to reduce the location update cost by combining Back-Propagation Algorithm and Cascaded Correlation Neural Network. The implementation of this strategy has been subject to extensive tests. The results obtained confirm the efficiency of UPH in significantly reducing the costs of both location updates and call delivery procedures when compared to the various other strategies well-known in the literature.","PeriodicalId":303366,"journal":{"name":"2010 International Conference on Signal Acquisition and Processing","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-02-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128509306","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Watermark Embedder Optimization for 3D Mesh Objects Using Classification Based Approach 基于分类方法的三维网格对象水印嵌入优化
2010 International Conference on Signal Acquisition and Processing Pub Date : 2010-02-09 DOI: 10.1109/ICSAP.2010.83
R. Motwani, M. Motwani, B. D. Bryant, F. Harris, Akshata S. Agarwal
{"title":"Watermark Embedder Optimization for 3D Mesh Objects Using Classification Based Approach","authors":"R. Motwani, M. Motwani, B. D. Bryant, F. Harris, Akshata S. Agarwal","doi":"10.1109/ICSAP.2010.83","DOIUrl":"https://doi.org/10.1109/ICSAP.2010.83","url":null,"abstract":"This paper presents a novel 3D mesh watermarking scheme that utilizes a support vector machine(SVM) based classifier for watermark insertion. Artificial intelligence(AI)based approaches have been employed by watermarking algorithms for various host mediums such as images, audio, and video. However, AI based techniques are yet to be explored by researchers in the 3D domain for watermark insertion and extraction processes. Contributing towards this end, the proposed approach employs a binary SVM to classify vertices as appropriate or inappropriate candidates for watermark insertion. The SVM is trained with feature vectors derived from the curvature estimates of a 1-ring neighborhood of vertices taken from normalized 3D meshes. A geometry-based non-blind approach is used by the watermarking algorithm. The robustness of proposed technique is evaluated experimentally by simulating attacks such as mesh smoothing, cropping and noise addition.","PeriodicalId":303366,"journal":{"name":"2010 International Conference on Signal Acquisition and Processing","volume":"104 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-02-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134326442","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Research and Implement of Digital Receiver 数字接收机的研究与实现
2010 International Conference on Signal Acquisition and Processing Pub Date : 2010-02-09 DOI: 10.1109/ICSAP.2010.24
Dingkun Ma, Xiaomin Zhang, Jian Luo
{"title":"Research and Implement of Digital Receiver","authors":"Dingkun Ma, Xiaomin Zhang, Jian Luo","doi":"10.1109/ICSAP.2010.24","DOIUrl":"https://doi.org/10.1109/ICSAP.2010.24","url":null,"abstract":"In order to detect weak signal in complex background, the paper studies and realizes six-channel digital receiver. Receiver is designed as much digital structure as possible, the basic hardware parameters of receiver can be adjust to meet different needs of specific applications by calling the corresponding software packages. Compared with the conventional receivers, the receiver has virtues of high sensitivity, low power consumption, standardization and software-based. The receiver has been applied in a target detection system, the experiment results show that the method is very promising.","PeriodicalId":303366,"journal":{"name":"2010 International Conference on Signal Acquisition and Processing","volume":"140 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-02-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116408879","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
ESA: Equilibrium-Based Spectrum Allocation Algorithm in CogMesh Network CogMesh网络中基于均衡的频谱分配算法
2010 International Conference on Signal Acquisition and Processing Pub Date : 2010-02-09 DOI: 10.1109/ICSAP.2010.15
Xiao-tian Xiang, Qi-hui Wu
{"title":"ESA: Equilibrium-Based Spectrum Allocation Algorithm in CogMesh Network","authors":"Xiao-tian Xiang, Qi-hui Wu","doi":"10.1109/ICSAP.2010.15","DOIUrl":"https://doi.org/10.1109/ICSAP.2010.15","url":null,"abstract":"A cognitive scenario similar to BSS (basic service set) in CogMesh network is considered. Traditional MR (mesh router) is reconstructed into multi-transceiver structure, which called CMR (cognitive mesh router). CMR can allocate vacant spectrum bands for SMCs (secondary mesh client), which access the CMR with one hop. Besides, ESA algorithm is proposed according to the spectrum scenario based on the average minimum back-off delay of each SMC. From the simulation, the outstanding performance gain will be got in the term of decreasing SMC’s back-off delay through a theoretical approach and Qualnet software.","PeriodicalId":303366,"journal":{"name":"2010 International Conference on Signal Acquisition and Processing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-02-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128926098","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Novel Method of DOA Estimation Based on Subarray Beamforming for Uniform Circular Arrays 基于子阵波束形成的均匀圆阵列DOA估计新方法
2010 International Conference on Signal Acquisition and Processing Pub Date : 2010-02-09 DOI: 10.1109/ICSAP.2010.43
Jia Yu, Huiyong Li, Zishu He
{"title":"A Novel Method of DOA Estimation Based on Subarray Beamforming for Uniform Circular Arrays","authors":"Jia Yu, Huiyong Li, Zishu He","doi":"10.1109/ICSAP.2010.43","DOIUrl":"https://doi.org/10.1109/ICSAP.2010.43","url":null,"abstract":"A novel method of direction-of-arrival (DOA) estimation based on subarray beamforming for uniform circular arrays is proposed. In this method, the beamform manifold of uniform circular arrays is transformed via virtual structure, and then the virtual arrays are divided into two subarrrays. The target DOA is estimated from the phase shift between the reference signal and its phase-shifted version by subarray beamforming. The computation of the proposed method is simple, and the number of the signal sources of target is not bounded by the number of antenna elements. Simulation results demonstrate that proposed method has significantly improved estimation resolution, capacity, and accuracy relative to other method.","PeriodicalId":303366,"journal":{"name":"2010 International Conference on Signal Acquisition and Processing","volume":"11 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-02-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120924197","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Enhanced Cost Effective Symmetric Key Algorithm for Small Amount of Data 面向小数据量的增强型高效对称密钥算法
2010 International Conference on Signal Acquisition and Processing Pub Date : 2010-02-09 DOI: 10.1109/ICSAP.2010.13
R. S. Kumar, E. Pradeep, K. Naveen, R. Gunasekaran
{"title":"Enhanced Cost Effective Symmetric Key Algorithm for Small Amount of Data","authors":"R. S. Kumar, E. Pradeep, K. Naveen, R. Gunasekaran","doi":"10.1109/ICSAP.2010.13","DOIUrl":"https://doi.org/10.1109/ICSAP.2010.13","url":null,"abstract":"Security being the major concern during data transfers; we have various challenges to face. The requirements of the security model vary depending on the type of data to be encrypted. Considering small size of data the requirements change from the existing security encryption techniques. One of the major issues to be considered is the computational speed of the encryption model. Though there are many challenging encryption algorithms, which provide high level of security, they increase the level of execution time for encryption. Cost effectiveness of the encryption algorithm is also another main concern for determining the efficiency of the algorithm. The computational time of the algorithms have a major impact on the determining the cost effectiveness. In this paper, we propose an enhanced cost effective symmetric key algorithm for small amount of data.","PeriodicalId":303366,"journal":{"name":"2010 International Conference on Signal Acquisition and Processing","volume":"92 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-02-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131288258","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
An FFT Approach for Efficient OFDM Communication Systems 高效OFDM通信系统的FFT方法
2010 International Conference on Signal Acquisition and Processing Pub Date : 2010-02-09 DOI: 10.1109/ICSAP.2010.49
K. Harikrishna, T. Rao, V. Labay
{"title":"An FFT Approach for Efficient OFDM Communication Systems","authors":"K. Harikrishna, T. Rao, V. Labay","doi":"10.1109/ICSAP.2010.49","DOIUrl":"https://doi.org/10.1109/ICSAP.2010.49","url":null,"abstract":"In the widely used OFDM (Orthogonal Frequency Division Multiplexing) systems, the FFT and IFFT pair are used to modulate and demodulate the data constellation on the subcarriers. This paper presents a high level implementation of a high performance FFT for OFDM Modulator and Demodulator. The design has been coded in Verilog and targeted into XilinxSpartan3 FPGAs. Radix-22 Algorithm is proposed and used for the OFDM communication system. This algorithm has the same multiplicative complexity as the radix-4 algorithm, but retains the butterfly structure of radix-2 algorithm. The design is parameterizable in terms of input word length, output word length, twiddle factor word length, and processing word length. Also, it is scalable in terms of number of stages.","PeriodicalId":303366,"journal":{"name":"2010 International Conference on Signal Acquisition and Processing","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-02-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125333915","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Data Transmission over GSM Adaptive Multi Rate Voice Channel Using Speech-Like Symbols 使用类语音符号在GSM自适应多速率语音信道上的数据传输
2010 International Conference on Signal Acquisition and Processing Pub Date : 2010-02-09 DOI: 10.1109/ICSAP.2010.72
Ali Shahbazi, Amir Hossein Rezaei, A. Sayadiyan, Saeed Mosayyebpour
{"title":"Data Transmission over GSM Adaptive Multi Rate Voice Channel Using Speech-Like Symbols","authors":"Ali Shahbazi, Amir Hossein Rezaei, A. Sayadiyan, Saeed Mosayyebpour","doi":"10.1109/ICSAP.2010.72","DOIUrl":"https://doi.org/10.1109/ICSAP.2010.72","url":null,"abstract":"This paper introduces a new method to transmit digital data through Global System for Mobile communications (GSM) voice channel. A novel algorithm is proposed to design a set of Speech-Like (SL) symbols which leads to design a GSM voice channel data modem to modulate and demodulate data on GSM Adaptive Multi Rate (AMR) voice codec which consist of different bit-rates. Designing a set of time-symbols is an off line procedure with the aim of minimizing symbol detection error. This modem is useful in real-time data communication with high priority. The introduced modem encodes data into SL symbols to be transmitted over GSM voice channel and the received SL symbols are decoded back to data.","PeriodicalId":303366,"journal":{"name":"2010 International Conference on Signal Acquisition and Processing","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-02-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123489927","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信