{"title":"Computational system to detect defects in mounted and bare PCB Based on connectivity and image correlation","authors":"F. R. Leta, F. F. Feliciano","doi":"10.1109/IWSSIP.2008.4604434","DOIUrl":"https://doi.org/10.1109/IWSSIP.2008.4604434","url":null,"abstract":"In this paper we present an image analysis system for printed circuit board (PCB) automated inspection. In the last years PCB manufacturing industry has been advanced in inspection automation systems, especially to solve smaller tolerance requirements. A PCB consists in a circuit and electronic components assembled in a surface. There are three main process involved in its manufacture, where the inspection is necessary. The main process consists in the printing itself. Another important procedure is the components placement over the PCB surface. And the third is the components soldering. In the proposed inspection system we consider the board printing and components placements defects. We first compare a PCB standard image with a PCB image, using a simple subtraction algorithm that can highlight the main problem-regions. Then we used connection analysis in the printed circuit to find fatal and potential errors, like breaks, circuit shorts, missing components. Besides, using digital image correlation techniques, the system detects component errors, like absence, change, and wrong position. In other to develop this methodology in real PCB, we propose to magnify the problem-regions and start to find the errors in a set of PCB sections, which are smaller than the main PCB image.","PeriodicalId":322045,"journal":{"name":"2008 15th International Conference on Systems, Signals and Image Processing","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116425688","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Subjective and objective quality evaluation of the H.264/AVC coded video","authors":"M. Vranješ, S. Rimac-Drlje, D. Žagar","doi":"10.1109/IWSSIP.2008.4604423","DOIUrl":"https://doi.org/10.1109/IWSSIP.2008.4604423","url":null,"abstract":"The H.264/AVC codec provides a superior coding efficiency and an improved network adaptation if compared to older video standards. In this paper we present experimental results obtained by the subjective and objective quality evaluation of the H.264/AVC coded video. Four objective metrics are used: peak signal-to-noise ratio (PSNR), minimum of locally averaged PSNR (local_PSNR), video quality metric (VQM) and structural similarity index (SSIM). We have analyzed results of objective and subjective metrics for several CIF sequences and bit rates. Also, we have compared results obtained for H.264/AVC coded sequences with those coded with MPEG-4 Part 2 codec. Results of the subjective quality evaluation show that on the bit rates below 640 kb/s the H.264/AVC codec has achieved an obviously higher video quality, ensured by the objective metrics as well. On the bit rates higher than 640 kb/s the subjective quality of sequences coded by MPEG-4 Part 2 is close to the quality of H.264/AVC coded video, confirmed only by the SSIM and local_PSNR results.","PeriodicalId":322045,"journal":{"name":"2008 15th International Conference on Systems, Signals and Image Processing","volume":"117 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122573042","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Hybrid ARQ error control for broadcast or multicast in wireless networks","authors":"P. Farkaš, A. Yassine, V. Tran","doi":"10.1109/IWSSIP.2008.4604444","DOIUrl":"https://doi.org/10.1109/IWSSIP.2008.4604444","url":null,"abstract":"In this paper, new error control techniques are introduced for wireless networks with broadcasting or multicasting the information from one source to many sinks. They are compared with the standard selective repeat ARQ strategy. Reed-Solomon code is exploited in these techniques. Simulation results are presented, which show that the quantity of data to be retransmitted can be significantly decreased using these new methods.","PeriodicalId":322045,"journal":{"name":"2008 15th International Conference on Systems, Signals and Image Processing","volume":"14 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116821417","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Robust digital watermarking in color images","authors":"R. Ridzon, D. Levický","doi":"10.1109/IWSSIP.2008.4604457","DOIUrl":"https://doi.org/10.1109/IWSSIP.2008.4604457","url":null,"abstract":"Digital watermarking is a potential effective method for authentication and ownership rights protection. The digital watermark is hidden information added into the multimedia. This paper presents one watermarking method for the color images robust against geometrical attacks. The detailed description of this method is given and some experiments by using the set of different attacks are performed.","PeriodicalId":322045,"journal":{"name":"2008 15th International Conference on Systems, Signals and Image Processing","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116747672","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Technologies used in wireless sensor networks","authors":"I.J. Sliva","doi":"10.1109/IWSSIP.2008.4604371","DOIUrl":"https://doi.org/10.1109/IWSSIP.2008.4604371","url":null,"abstract":"In recent years, a demand for remote measuring, automation and control in various branches of industry, agriculture, environmental engineering, and many other areas is rapidly growing. Therefore, many systems are emerging and evolving. Such systems utilize small autonomous devices (nodes) and it is obvious that all these devices need to communicate with each other as well as with the system administrator. In most cases the communication is wireless. Devices form networks, each of which requires specific approach because of different conditions and needs. Thus, there are many various methods, protocols and algorithms, most of them still under development. However, a few standards already exist. Such networks are called wireless sensor networks (WSN) and this paper will bring the overview of technologies used in WSNs, differences, constraints and corresponding recommendations and standards. The recent areas of research and future perspectives will also be mentioned.","PeriodicalId":322045,"journal":{"name":"2008 15th International Conference on Systems, Signals and Image Processing","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121571478","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Low computation method for fast mode decision in H.264/MPEG-4 AVC","authors":"S. Tran, M. Preda, F. Prêteux","doi":"10.1109/IWSSIP.2008.4604471","DOIUrl":"https://doi.org/10.1109/IWSSIP.2008.4604471","url":null,"abstract":"The efficiency of the H.264/AVC video coding standard (the latest in the MPEG family) can be further improved by advancing new prediction key-techniques. However, generally these techniques also lead to an extremely high complexity encoding process. As a solution to this problem, we focused on a fast technique to avoid the exhaustive search on the numerous prediction methods available in the standard. Exploiting the high spatial correlation in the natural video, we introduce a new measure of conformance (MC), which is based on the similarity of performance produced by the encoder on the neighbour blocks. This MC makes it possible to select automatically the sub-optimal prediction mode for intra coding as well as to safely avoid the full-scale search for motion compensation applied to variable block-size throughout multiple reference pictures. The MC is updated during the encoding process of the considered block. Therefore, it does not expose any serious additional computation. The experimental results obtained by the new technique are discussed in the paper. In average, the H.264 encoder is speeded up by 23 % at a slight decrease in compression efficiency (5.8 %) for all most the same PSNR quality (-0.08 %).","PeriodicalId":322045,"journal":{"name":"2008 15th International Conference on Systems, Signals and Image Processing","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126881626","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Robust text-independent speaker identification using multiple subband-classifiers in colored noise environment","authors":"E. Vale, A. Cunha, A. Alcaim","doi":"10.1109/IWSSIP.2008.4604420","DOIUrl":"https://doi.org/10.1109/IWSSIP.2008.4604420","url":null,"abstract":"A new approach for robust speaker identification using multiple classifiers in the subband domain is presented. The proposed system uses weights calculated from the energy in each subband of the speech signal to combine a set of likelihoods provided by GMM subband-classifiers. Experiments show the effectiveness of the proposed scheme as compared to other techniques.","PeriodicalId":322045,"journal":{"name":"2008 15th International Conference on Systems, Signals and Image Processing","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129165685","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Digital image watermarking by adaptive quantization of wavelet packet coefficients","authors":"Chi-Man Pun, I-Kuan Kong","doi":"10.1109/IWSSIP.2008.4604395","DOIUrl":"https://doi.org/10.1109/IWSSIP.2008.4604395","url":null,"abstract":"In this paper, a robust digital image watermarking approach using adaptive quantization of wavelet packet coefficients was proposed. The original image is decomposed by discrete wavelet packet transform and the dominant wavelet coefficients are selected for watermark embedding from each sub-band except the lowest frequency one. Then, each watermark bit is adaptively embedded with different strength into the selected wavelet packet coefficients based on the odd or even value after quantization. Experimental results show that the proposed method is effective for copyright verification and robust to various common attacks such as Gaussian noise, JPEG compression, and without original image as references.","PeriodicalId":322045,"journal":{"name":"2008 15th International Conference on Systems, Signals and Image Processing","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126533279","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"End-to-end packet delays in LEO satellite constellations","authors":"T. Peter, M. Ocel","doi":"10.1109/IWSSIP.2008.4604479","DOIUrl":"https://doi.org/10.1109/IWSSIP.2008.4604479","url":null,"abstract":"Satellite systems are part of the global communication system and considerable differ from ground communications networks (such as fixed, mobile, and wireless data networks) mainly in a quality of transmission links. From transmission delays point of view the low earth orbit satellite systems (from all satellite systems) can only compete with ground systems. This contribution is oriented into the analysis and comparison of selected low earth orbit satellite constellations. The satellite constellations investigated here differ in orbital plane inclination, position of the end user terminals and availability of cross-seam intersatellite links. The comparison is mainly realized based on the end-to-end transmission delays.","PeriodicalId":322045,"journal":{"name":"2008 15th International Conference on Systems, Signals and Image Processing","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127804291","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Evolution of 3GPP Core Network","authors":"M. Neruda, R. Bestak","doi":"10.1109/IWSSIP.2008.4604358","DOIUrl":"https://doi.org/10.1109/IWSSIP.2008.4604358","url":null,"abstract":"A core network of UMTS has a very long development. The first version of core network corresponds to an improved GSM/GPRS core network. The interfaces are changed and later all conception. The main changes are in using Internet Protocol, adding IMS functionality and finally in complete new packet core of technology called long term evolution. From user point of view it means increasing bit rates from tens kbit/s to tens Mbit/s, offering multimedia services, access to Internet, etc. This paper gives an overview about evolution of UMTS core network.","PeriodicalId":322045,"journal":{"name":"2008 15th International Conference on Systems, Signals and Image Processing","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133063087","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}