{"title":"A systems approach to network security in private ISDN","authors":"B. Hamersma, J. Prinsloo, C.F.P. Jordaan","doi":"10.1109/COMSIG.1992.274310","DOIUrl":"https://doi.org/10.1109/COMSIG.1992.274310","url":null,"abstract":"The point of departure was the use of commercially available ISDN terminals and switching equipment and applying network security measures as add-on units. This approach could be used meaningfully by any network operator or user, as determined by individual security requirements, for implementing (or migrating) to a transparent secure network, with ease of use and maximum availability of features. This paper emphasises the system issues, rather than the implementation details. The layered ISDN model is discussed, with the considerations for placement of security services. End-to-end and link-oriented security measures are compared. Security in the terminal, switch and transmission systems is discussed. Key distribution and network management implications are referred to.<<ETX>>","PeriodicalId":342857,"journal":{"name":"Proceedings of the 1992 South African Symposium on Communications and Signal Processing","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1992-09-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115493946","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Speaker-independent vowel classification from inaccurate formant features","authors":"J. Scalkwyk, P. Vermeulen, E. Barnard","doi":"10.1109/COMSIG.1992.274313","DOIUrl":"https://doi.org/10.1109/COMSIG.1992.274313","url":null,"abstract":"Formant extraction is a notoriously unreliable procedure. Neural networks on the other hand are able to deal with such inaccurate data. It is shown that a multilayer perceptron is able to classify five types of vowels with acceptable accuracy (approximately 74%) when operating on very simple formant-based features.<<ETX>>","PeriodicalId":342857,"journal":{"name":"Proceedings of the 1992 South African Symposium on Communications and Signal Processing","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1992-09-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115677355","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Near-end crosstalk modelling in the digital subscriber loop","authors":"R. Stacey, H. Hanrahan","doi":"10.1109/COMSIG.1992.274297","DOIUrl":"https://doi.org/10.1109/COMSIG.1992.274297","url":null,"abstract":"The importance of near-end crosstalk in digital subscriber loops is reviewed. Three statistical models are examined for predicting the mean and standard deviation of the NEXT interference power from n disturbers. The Bradley model is selected as most accurate with moderate computational complexity. A set of measurements on multipair cable to obtain model parameters is described. Crosstalk coupling on 26 gauge cable is found to vary with f/sup 1.4/, have a mean at 80 kHz equal to -93.7 dB and standard deviation of 11.5 dB. The distribution of the loss in dB across pairs of disturbers is Gaussian. The model is applicable when line codes are compared for the digital subscriber loop.<<ETX>>","PeriodicalId":342857,"journal":{"name":"Proceedings of the 1992 South African Symposium on Communications and Signal Processing","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1992-09-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115710642","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Target classification for phase array radar using the minimum norm criteria","authors":"A. J. Willis, R. de Mello Koch","doi":"10.1109/COMSIG.1992.274321","DOIUrl":"https://doi.org/10.1109/COMSIG.1992.274321","url":null,"abstract":"Using SVD a reconstruction consistent with the minimum norm criteria is derived. The resulting algorithm is able to profile an arbitrary target bearing distribution from the readings received at an arbitrary number of sensors with arbitrary directional characteristics and locations; in a noisy environment. The algorithm produced using this method represents an advance on previous multiple snapshot techniques designed to identify a limited number of point targets through parametric search. The more rapid process of a single matrix decomposition is employed to give the minimum norm estimate applicable to an arbitrary target profile-this being derived in principle from a single snapshot. The algorithm is well suited to the inclusion of a priori knowledge, which gives flexibility in speed and resolution.<<ETX>>","PeriodicalId":342857,"journal":{"name":"Proceedings of the 1992 South African Symposium on Communications and Signal Processing","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1992-09-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121327163","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An heuristic graph searching algorithm to find the boundary of apple images","authors":"P. Moon, G. de Jager","doi":"10.1109/COMSIG.1992.274278","DOIUrl":"https://doi.org/10.1109/COMSIG.1992.274278","url":null,"abstract":"A computer vision system to sort apples into size and colour categories would have to find the boundary of each apple image before size estimation or colour analysis can be done. An algorithm was developed to find these boundaries in images which would be produced by an industrial system. The images contained touching objects and the contrast between the objects and the background is poor in places. This paper describes the algorithm as well as the test results, which demonstrate that it works reliably.<<ETX>>","PeriodicalId":342857,"journal":{"name":"Proceedings of the 1992 South African Symposium on Communications and Signal Processing","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1992-09-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123991193","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Synthetic range profile measurements with a pulse compression radar","authors":"M. R. Inggs, A. Knight, P. Smit","doi":"10.1109/COMSIG.1992.274322","DOIUrl":"https://doi.org/10.1109/COMSIG.1992.274322","url":null,"abstract":"Monochromatic or pulse compression radars have a range resolution determined by the instantaneous bandwidth of the pulse. For surveillance radars, the range resolution must be set fairly coarse to reduce the output data rate. Synthetic range profiling is a technique where successive radar pulses are radiated at different frequencies. This frequency domain information can be transformed to the time domain to obtain a high resolution range profile of a target over a small subdomain of the radar imaging area. This paper reports practical measurements which included static targets, simulated moving targets and a small aircraft.<<ETX>>","PeriodicalId":342857,"journal":{"name":"Proceedings of the 1992 South African Symposium on Communications and Signal Processing","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1992-09-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125346001","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Image compression for photovideotext","authors":"B. Van Der Eems, K. Laaks","doi":"10.1109/COMSIG.1992.274305","DOIUrl":"https://doi.org/10.1109/COMSIG.1992.274305","url":null,"abstract":"This article describes the specifications that an image compression algorithm must meet for implementation in a photovideotext application. The algorithms that have been used are described and evaluated.<<ETX>>","PeriodicalId":342857,"journal":{"name":"Proceedings of the 1992 South African Symposium on Communications and Signal Processing","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1992-09-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127752601","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}