2010 5th International Symposium on Telecommunications最新文献

筛选
英文 中文
Modification of short length LT block coding technique by removing LT weaknesses with an equivalent matrix 用等效矩阵去除短长度LT分组编码弱点的改进
2010 5th International Symposium on Telecommunications Pub Date : 2010-12-01 DOI: 10.1109/ISTEL.2010.5734052
S. Hosseini, M. Akbari, A. Falahati
{"title":"Modification of short length LT block coding technique by removing LT weaknesses with an equivalent matrix","authors":"S. Hosseini, M. Akbari, A. Falahati","doi":"10.1109/ISTEL.2010.5734052","DOIUrl":"https://doi.org/10.1109/ISTEL.2010.5734052","url":null,"abstract":"It is known that the Luby Transform codes provide an efficient scheme to transfer information over erasure channels. These codes are also rate-less and robust against packet losses in a jamming environment. In this paper overcome many weaknesses that this coding technique apprehends. Three weaknesses are observed in three different categories when the equivalent matrix is employed. In fact, such codes have these similar weaknesses due to their randomized nature. When this code. Also, the occurrence probability concerning two of them weaknesses categories which can be briefly described as all zero columns and the same digits in many rows are obtained analytically. Identifying these weaknesses, an efficient encoding algorithm is proposed which can improve the successful decoding probability for short length LT block codes. Simulation results justify the effectiveness of the proposed algorithm.","PeriodicalId":306663,"journal":{"name":"2010 5th International Symposium on Telecommunications","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132469513","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Robust phoneme recognition using MLP neural networks in various domains of MFCC features 基于MLP神经网络的多领域MFCC特征鲁棒性音素识别
2010 5th International Symposium on Telecommunications Pub Date : 2010-12-01 DOI: 10.1109/ISTEL.2010.5734123
S. Dabbaghchian, H. Sameti, Masoumeh P. Ghaemmaghami, B. BabaAli
{"title":"Robust phoneme recognition using MLP neural networks in various domains of MFCC features","authors":"S. Dabbaghchian, H. Sameti, Masoumeh P. Ghaemmaghami, B. BabaAli","doi":"10.1109/ISTEL.2010.5734123","DOIUrl":"https://doi.org/10.1109/ISTEL.2010.5734123","url":null,"abstract":"This paper focuses on enhancing MFCC features using a set of MLP NN in order to improve phoneme recognition accuracy under different noise types and SNRs. A NN can be used in different domains (between any pair of MFCC feature extraction blocks). It includes FFT, MEL, LOG, DCT and DELTA domains. Various domains have different complexities and achieve different degrees. A comparative study is done in this paper in order to find the best domain. Furthermore, a set of MLP NNs, instead of one NN, is used to enhance various noise types with different levels of SNRs. In this case, each NN is trained with a special noise type and SNR. The database used in the simulations is created by artificially adding different types of noises from the NOISEX-92 database to a subset of TIMIT speech corpus. Our experiments show that the highest improvement is achievable in LOG domain. It is also shown that although the performance decreases slightly in the DCT domain, the complexity is reduced to one fourth in this domain.","PeriodicalId":306663,"journal":{"name":"2010 5th International Symposium on Telecommunications","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128299620","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
A fuzzy description logic model for Intrusion Detection Systems 入侵检测系统的模糊描述逻辑模型
2010 5th International Symposium on Telecommunications Pub Date : 2010-12-01 DOI: 10.1109/ISTEL.2010.5734086
Zohreh Baniasadi, A. Sanei, M. Omidi
{"title":"A fuzzy description logic model for Intrusion Detection Systems","authors":"Zohreh Baniasadi, A. Sanei, M. Omidi","doi":"10.1109/ISTEL.2010.5734086","DOIUrl":"https://doi.org/10.1109/ISTEL.2010.5734086","url":null,"abstract":"Today most managing network security systems, especially Intrusion Detection System (IDS), play a significant role in computer societies and due to the evolution of threats, the use of traditional crisp methods are not efficient. It is also clear that high level conceptual modeling eases the complex attack detection process. This paper proposes a new approach in which the benefits of both fuzzy and description logics are exploited in IDS in the form of simple model. Finally our example shows the main aim of attackers by categorizing attacks.","PeriodicalId":306663,"journal":{"name":"2010 5th International Symposium on Telecommunications","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128533419","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Application of ensemble models in web ranking 集成模型在网页排名中的应用
2010 5th International Symposium on Telecommunications Pub Date : 2010-12-01 DOI: 10.1109/ISTEL.2010.5734118
Homa Baradaran Hashemi, N. Yazdani, A. Shakery, Mahdi Pakdaman Naeini
{"title":"Application of ensemble models in web ranking","authors":"Homa Baradaran Hashemi, N. Yazdani, A. Shakery, Mahdi Pakdaman Naeini","doi":"10.1109/ISTEL.2010.5734118","DOIUrl":"https://doi.org/10.1109/ISTEL.2010.5734118","url":null,"abstract":"One of the most important parts of search engines is the ranking unit. Many different classical ranking algorithms based on content (such as TF-IDF and BM25) and connectivity (such as HITS and PageRank) have been used in web search engines to find pages in response to a user query. Although these algorithms have been developed to improve retrieval results, none of them can take advantage of power of contents as well as useful link structures. Thus, it remains a challenging research question how to effectively combine these available information to maximize search accuracy. In this study, we investigate the application of different ensemble models in ranking algorithms. Some of them are simple such as Sum, Product and Borda rule, and the others are more complicated methods. We present three complex ensemble approaches. The first one is OWA operator to merge the results of various ranking algorithms. In the second approach, a state-of-the-art method, simulated click-through data, is used to learn how to combine many content and connectivity features of web pages. Moreover, we present a modified version of SVM classifier customized for ranking problems as the third complex fusion approach. The proposed methods are evaluated using the LETOR and dotIR benchmark data sets. The experimental results show that in most of the cases ensemble methods give better results and the improvements are very encouraging. These results also show that the OWA and SVM fusion methods are promising respect to other ensemble models.","PeriodicalId":306663,"journal":{"name":"2010 5th International Symposium on Telecommunications","volume":"73 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134354774","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
A low complexity and efficient face recognition approach in JPEG compressed domain using quantized coefficients 一种基于量化系数的JPEG压缩域低复杂度高效人脸识别方法
2010 5th International Symposium on Telecommunications Pub Date : 2010-12-01 DOI: 10.1109/ISTEL.2010.5734128
Alireza Sepas-Moghaddam, M. Moin, H. Rashidy Kanan
{"title":"A low complexity and efficient face recognition approach in JPEG compressed domain using quantized coefficients","authors":"Alireza Sepas-Moghaddam, M. Moin, H. Rashidy Kanan","doi":"10.1109/ISTEL.2010.5734128","DOIUrl":"https://doi.org/10.1109/ISTEL.2010.5734128","url":null,"abstract":"Computational and space complexities and storage space are amongst the most important issues in designing face recognition systems. A common method for storing images in face recognition systems is compressing images using JPEG standard. Usually, the compressed images are fully decompressed for recognition, so that the recognition process is done in decompressed domain. This procedure causes a high computational overhead. In this paper, we have studied the face recognition procedure using quantized coefficients in JPEG compressed domain for reducing the computational overhead caused by decompression process. In addition, in order to reduce the matching stage computational and space complexities, variance analysis and principle components analysis methods on quantized coefficients have been applied to reduce the dimension of images subspace. The experiments in this research have been done on four datasets of FERET database. Experimental results show that the proposed method outperforms existing methods in recognition rates, storage space, computational and space complexity aspects.","PeriodicalId":306663,"journal":{"name":"2010 5th International Symposium on Telecommunications","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125753615","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Analyzing delay limits of high-speed wireless ad hoc networks based on IEEE 802.11n 基于IEEE 802.11n的高速无线自组网时延限制分析
2010 5th International Symposium on Telecommunications Pub Date : 2010-12-01 DOI: 10.1109/ISTEL.2010.5734075
P. Teymoori, N. Yazdani, S. A. Hoseini, MohammadReza EffatParvar
{"title":"Analyzing delay limits of high-speed wireless ad hoc networks based on IEEE 802.11n","authors":"P. Teymoori, N. Yazdani, S. A. Hoseini, MohammadReza EffatParvar","doi":"10.1109/ISTEL.2010.5734075","DOIUrl":"https://doi.org/10.1109/ISTEL.2010.5734075","url":null,"abstract":"Recent advances in high-speed wireless LANs with physical layer (PHY) rates reaching 600Mbps make them ideal for multimedia applications. It has been shown that efficiency at medium access control (MAC) layer decreases with increasing the PHY rate. To achieve high efficiency, few researches have tried to use aggregation in which few packets are concatenated into a larger frame. The resultant frame is sent at once in order to reduce the media access protocol overhead. Unfortunately larger frames increase delays. Since demand for real-time data communication and delay-sensitive applications have become more critical, especially for high-speed networks, a thorough delay analysis is required to examine the effect of aggregation on delay in high-speed networks. In this paper, we propose an analytical model for examining packet delay in IEEE 802.11n networks in the saturation mode. To the best of our knowledge, this is the first work which focuses on packet delay analysis in the presence of aggregation. Analysis and simulation results show that packet delay increases in larger aggregation sizes, and IEEE 802.11n performs poorly in high rates in terms of packet delay. Moreover, based on two new metrics that we propose in the paper, it is shown that aggregation loses its effectiveness in higher rates.","PeriodicalId":306663,"journal":{"name":"2010 5th International Symposium on Telecommunications","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123661653","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Adaptive random puncturing based secure block turbo coding 基于自适应随机穿刺的安全块turbo编码
2010 5th International Symposium on Telecommunications Pub Date : 2010-12-01 DOI: 10.1109/ISTEL.2010.5734027
Mohammad Sadegh Daghighi, A. Payandeh, M. Aref
{"title":"Adaptive random puncturing based secure block turbo coding","authors":"Mohammad Sadegh Daghighi, A. Payandeh, M. Aref","doi":"10.1109/ISTEL.2010.5734027","DOIUrl":"https://doi.org/10.1109/ISTEL.2010.5734027","url":null,"abstract":"Reliability and security are two important subjects in modern digital communications. A secure channel coding scheme provides both of reliability and security in one process to combat problems in an unreliable and insecure channel. In this paper, a secure block turbo coding scheme will be proposed and analyzed. Security and reliability are based on pseudo-random puncturing. Simulation results show that this scheme has superior performance and high security.","PeriodicalId":306663,"journal":{"name":"2010 5th International Symposium on Telecommunications","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123780504","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Determination of pitch range based on onset and offset analysis in modulation frequency domain 基于调制频域起始和偏置分析的基音范围确定
2010 5th International Symposium on Telecommunications Pub Date : 2010-12-01 DOI: 10.1109/ISTEL.2010.5734096
A. Mahmoodzadeh, H. R. Abutalebi, H. Soltanian-Zadeh, H. Sheikhzadeh
{"title":"Determination of pitch range based on onset and offset analysis in modulation frequency domain","authors":"A. Mahmoodzadeh, H. R. Abutalebi, H. Soltanian-Zadeh, H. Sheikhzadeh","doi":"10.1109/ISTEL.2010.5734096","DOIUrl":"https://doi.org/10.1109/ISTEL.2010.5734096","url":null,"abstract":"Auditory scene in a natural environment contains multiple sources. Auditory scene analysis (ASA) is the process in which the auditory system segregates a scene into streams corresponding to different sources. The determination of range of pitch frequency is necessary for segmentation. We propose a system to determine the range of pitch frequency by analyzing onsets and offsets in modulation frequency domain. In the proposed system, first the modulation spectrum of speech is calculated and then, in each subband onsets and offsets will be detected. Thereafter, the segments are generated by matching corresponding onset and offset front. Finally, by choosing the desired segments, the rage of pitch frequency is determined. Systematic evaluation shows that the range of pitch frequency is estimated with good accuracy.","PeriodicalId":306663,"journal":{"name":"2010 5th International Symposium on Telecommunications","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128807157","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Alleviating the cold-start problem of recommender systems using a new hybrid approach 用一种新的混合方法缓解推荐系统的冷启动问题
2010 5th International Symposium on Telecommunications Pub Date : 2010-12-01 DOI: 10.1109/ISTEL.2010.5734161
Javad Basiri, A. Shakery, B. Moshiri, Morteza Zi Hayat
{"title":"Alleviating the cold-start problem of recommender systems using a new hybrid approach","authors":"Javad Basiri, A. Shakery, B. Moshiri, Morteza Zi Hayat","doi":"10.1109/ISTEL.2010.5734161","DOIUrl":"https://doi.org/10.1109/ISTEL.2010.5734161","url":null,"abstract":"Recommender systems have become significant tools in electronic commerce, proposing effectively those items that best meet the preferences of users. A variety of techniques have been proposed for the recommender systems such as, collaborative filtering and content-based filtering. This study proposes a new hybrid recommender system that focuses on improving the performance under the “new user cold-start” condition where existence of users with no ratings or with only a small number of ratings is probable. In this method, the optimistic exponential type of ordered weighted averaging (OWA) operator is applied to fuse the output of five recommender system strategies. Experiments using MovieLens dataset show the superiority of the proposed hybrid approach in the cold-start conditions.","PeriodicalId":306663,"journal":{"name":"2010 5th International Symposium on Telecommunications","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124547528","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 41
A hybrid mesh-tree peer-to-peer overlay structure for layered video streaming 用于分层视频流的混合网格树点对点覆盖结构
2010 5th International Symposium on Telecommunications Pub Date : 2010-12-01 DOI: 10.1109/ISTEL.2010.5734114
N. Tahghigh Jahromi, B. Akbari, A. Movaghar
{"title":"A hybrid mesh-tree peer-to-peer overlay structure for layered video streaming","authors":"N. Tahghigh Jahromi, B. Akbari, A. Movaghar","doi":"10.1109/ISTEL.2010.5734114","DOIUrl":"https://doi.org/10.1109/ISTEL.2010.5734114","url":null,"abstract":"Due to complicated implementation of IP multicast, application layer multicast has attracted the attention of researchers. Tree overlay has some challenges such as resiliency problems caused by peer churns and also network resources may not be efficiently used. Mesh overlay doesn't have such problems, but has a high delivery latency and overhead caused by pull mechanism. Using a hybrid mesh/tree overlay offers push pull approach and leads to use the advantages of both overlays simultaneously. Also in p2p networks a significant problem is heterogeneity of peers. In this paper we propose a hybrid mesh/tree overlay that by means of streaming layered coded video, addresses these challenges. This overlay poses other critical design challenges such as latency and resiliency issues that stable nodes in a distributed algorithm form a tree in order to accelerate media streaming.","PeriodicalId":306663,"journal":{"name":"2010 5th International Symposium on Telecommunications","volume":"83 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122622451","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信