{"title":"Analysis of Interpolated FIR Filter for VoIP in Noisy Enviroment","authors":"H. Singh, Sarabjeet Singh, R. Sarin, Jasvir Singh","doi":"10.1109/CICSyN.2010.69","DOIUrl":"https://doi.org/10.1109/CICSyN.2010.69","url":null,"abstract":"The presence of background noise degrades the quality of speech signal. The speech quality of the VoIP system can be improved by reducing the background noise, codec distortion and various network impairments such as packet loss, delay and jitter. The work in this paper proposes the Interpolated Finite Impulse Response filter (IFIR) based scheme for reduction of noise. The IFIR filter would be applied as post processing after the speech decoding. For various noisy conditions, the quality of speech signal is measured with PESQ measurement to evaluate the performance of the proposed method. The codec tested with proposed method are G.729A and AMR-NB. The performance is evaluated not only for the codec used but also for VoIP system with packet loss in noisy environment. The results show much improvement in speech quality with proposed method","PeriodicalId":358023,"journal":{"name":"2010 2nd International Conference on Computational Intelligence, Communication Systems and Networks","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123564159","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Discrete-Event Solver for Repairable Flow Networks with Complex Topology","authors":"Michael T. Todinov","doi":"10.1109/CICSyN.2010.13","DOIUrl":"https://doi.org/10.1109/CICSyN.2010.13","url":null,"abstract":"The paper presents a discrete-event simulator of repairable flow networks with complex topology. The solver is based on an efficient algorithm for maximizing the flow in repairable flow networks with complex topology. The discrete-event solver maximizes the flow through the repairable network upon each component failure and return from repair. This ensures a larger output flow compared to a flow maximization conducted on the static flow network. Because of the flow maximization upon failure and return from repair, the simulator also tracks naturally the variation of the output flow from multiple overlapping failures. The discrete-event solver determines the basic performance characteristic of repairable flow networks – the expected output flow delivered during a specified time interval in the presence of component failures.","PeriodicalId":358023,"journal":{"name":"2010 2nd International Conference on Computational Intelligence, Communication Systems and Networks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131159567","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Discrete Time Linear Optimal Repetitive Control - A Low Order Controller Scheme","authors":"Youde Han, D. Owens, B. Chu","doi":"10.1109/CICSyN.2010.50","DOIUrl":"https://doi.org/10.1109/CICSyN.2010.50","url":null,"abstract":"This paper proposes a new method to discrete time linear time invariant (LTI) repetitive control tracking problem when the reference signal includes a single period with an already known high period. Based on an earlier result in [1], as period gets high, dimension of the augmented state-space description there also gets very high. This in turn leads to higher order computation issues for designing the control law when optimality methodology is used. The low order controller designed in this paper is thus served for this purpose, where the computational problem is eased by using spectrum analysis of the reference signal. Application of this new low order repetitive controller to a non-minimum spring mass damper system demonstrates its effectiveness for tracking problems even if the periodic signal has a very high period.","PeriodicalId":358023,"journal":{"name":"2010 2nd International Conference on Computational Intelligence, Communication Systems and Networks","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131963826","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"DTBSVMs: A New Approach for Road Sign Recognition","authors":"Hossein Pazhoumand-dar, M. Yaghoobi","doi":"10.1109/CICSyN.2010.17","DOIUrl":"https://doi.org/10.1109/CICSyN.2010.17","url":null,"abstract":"The tasks of traffic signs are to notify drivers about the current state of the road and give them other important information for navigation. In this paper, a new approach for detection, tracking and recognition such objects is presented. Road signs are detected using color thresholding, then candidate blobs that have specific criteria are classified based on their geometrical shape and are tracked trough successive frames based on a new similarity measure. Candidate blobs that successfully tracked processed for pictogram classification using Decision-tree-based support vector multi-class classifiers (DTBSVMs). Results show high accuracy with a low false hit rate of this method and its robustness to illumination changes and road sign occlusion or scale changes. Also results indicate that structure of DTB-balanced branches is more efficient in comparison to other SVM classifier structures such as one-against-all and one-against one both in accuracy and speed for pictogram classification.","PeriodicalId":358023,"journal":{"name":"2010 2nd International Conference on Computational Intelligence, Communication Systems and Networks","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116768695","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Data Mining Techniques for Modelling the Influence of Daily Extreme Weather Conditions on Grapevine, Wine Quality and Perennial Crop Yield","authors":"S. Shanmuganathan, P. Sallis, A. Narayanan","doi":"10.1109/CICSyN.2010.15","DOIUrl":"https://doi.org/10.1109/CICSyN.2010.15","url":null,"abstract":"The influences of daily weather extremes, such as maximum/ minimum temperatures, humidity, and precipitation, are observable in perennial crop phenology that in turn determines the annual crop yield in quality and quantity. In viticulture, grapevine phenology determines the quality of vintage produced from the grapes apart from the best effects by winemaker. Following a brief review of current literature in this research domain, the paper describes a data mining approach being developed to data association modelling to depict dependency relationships between daily weather extremes, grapevine phenology and yield indicators using data from a vineyard in northern New Zealand and daily weather extremes logged at a nearby meteorology station. An artificial neural network algorithm was used to classify the data associations and the chi-square test was used to establish the degree of dependence between the related variable values. The initial results of the approach to daily maximum weather conditions show potential.","PeriodicalId":358023,"journal":{"name":"2010 2nd International Conference on Computational Intelligence, Communication Systems and Networks","volume":"412 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115923077","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Nor Anita Fairos bt. Ismail, S. N. Kamarudin, M. Rahim, Jianguo Liu, P. Mason
{"title":"Visualisation of Earth Deformation in 2D","authors":"Nor Anita Fairos bt. Ismail, S. N. Kamarudin, M. Rahim, Jianguo Liu, P. Mason","doi":"10.1109/CICSyN.2010.29","DOIUrl":"https://doi.org/10.1109/CICSyN.2010.29","url":null,"abstract":"The rapidly growing field of remote sensing is beginning to supply massive quantities of high-resolution imagery of the Earth and other planets. In the earth sciences, parallel supercomputers have always played a prominent role in the visualization of this imagery, and in other image processing applications designed to enhance and display the obtained information. Imageodesy is a technique for detection and measurement of feature shifts between two images based on local feature fitting algorithms such as Normalize Cross-Correlation (Crippen, 1992) and phase correlation. This technique allows the vast archives of optical imagery, collected by satellite systems such as SPOT and Landsat, to be used not only to detect but also to measure the subtle terrain displacements associated with earthquakes, glacial motion and volcanic processes, all to within sub-resolution accuracy and precision is also a major factor.","PeriodicalId":358023,"journal":{"name":"2010 2nd International Conference on Computational Intelligence, Communication Systems and Networks","volume":"177 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116109985","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"PAL: A Path Selection Algorithm for Life Critical Data","authors":"Sadik Armagan, Enda Fallon, Yuansong Qiao","doi":"10.1109/CICSyN.2010.49","DOIUrl":"https://doi.org/10.1109/CICSyN.2010.49","url":null,"abstract":"The real time data transmission facilities provided by Personal Area Networks (PAN) can improve both the life expectancy and living conditions of patients following cardiac surgery. The limited signal range of such devices however, coupled with the life critical nature of the data transferred places strict performance limits on the mobility protocol. The Stream Control Transmission Protocol (SCTP) can support mobility through its multi-homing feature. SCTP has 2 core features (1) analyzing performance metrics which trigger network migration (2) implementing the physical migration from one network path to another. We illustrate that as a transport layer protocol which adheres to protocol boundaries SCTP’s network evaluation is performance limited, as Bluetooth MAC retransmissions distort end-to-end calculations. We propose a division of functionality in which SCTP is responsible for network migration while we propose a new Path Selection Algorithm for Life Critical Data (PAL) which defines a Media Independent Handover (MIH) oriented trigger to control path switchover. PAL illustrates the importance of Bluetooth MAC retransmissions as a performance metric over traditional metrics such as Received Signal Strength (RSS).","PeriodicalId":358023,"journal":{"name":"2010 2nd International Conference on Computational Intelligence, Communication Systems and Networks","volume":"29 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116198447","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Binomial Heap Algorithm for Self-Recognition in Exclusive Management on Autonomic Grid Networks","authors":"M. Bahrami, Peyman Arebi","doi":"10.1109/CICSyN.2010.59","DOIUrl":"https://doi.org/10.1109/CICSyN.2010.59","url":null,"abstract":"Self-managing, meaning that it is selfprotecting,self-configuring, self-healing and self-optimizing inAutonomic Grid Networks need to be use of self-control butsometimes this node can't self-managing then other top of thisnode can be managing this node on the grid, therefore othernodes in the grid networks need to be have a method tomanaging other nodes, in this paper we introduce a selfrecognitionalgorithm for grid network and try this algorithmto have exclusive management control on autonomic gridnetworks. This algorithm base on Binomial Heap to allocateand recognition any node in the grid and next, any node in thegrid can have exclusive management for self-managing andother node managing or exclusive managing.","PeriodicalId":358023,"journal":{"name":"2010 2nd International Conference on Computational Intelligence, Communication Systems and Networks","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126157969","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
T. Chattopadhyay, Aniruddha Sinha, Asmita Hardikar
{"title":"H.264 Compressed Domain Watermarking in Content Delivery Network (CDN) Environment","authors":"T. Chattopadhyay, Aniruddha Sinha, Asmita Hardikar","doi":"10.1109/CICSyN.2010.66","DOIUrl":"https://doi.org/10.1109/CICSyN.2010.66","url":null,"abstract":"Over the years it has been observed that a hacker, finds it less difficult to break any encryption key, even though it may require large number of attempts, specially with advent of high-speed machines. Therefore, an encryption method alone is not sufficient for copyright protection and ownership authentication of stored and streamed videos. Digital watermarking techniques have been proposed for this purpose. A fast method of watermarking of streamed H.264 video data is proposed in the present work to meet the real time criteria of a streaming CDN server. The approach involves a blind watermarking scheme that inserts watermark in transformed coefficients of Independent Decoder Refresh (IDR) frames of the streamed H.264. As these IDR frames are then required to reconstruct the P frames, the proposed scheme can ensure security for both type of frames namely I and P. The method also may include a hashing technique to hash the entire group of pictures (GOP) into a 128-bit number. This number, in turn, is used as watermark for the next GOP to ensure the integrity feature of the watermarking scheme.","PeriodicalId":358023,"journal":{"name":"2010 2nd International Conference on Computational Intelligence, Communication Systems and Networks","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129057301","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. N. Ayob, Z. Yusof, Asrul Adam, A. F. Z. Abidin, I. Ibrahim, Z. Ibrahim, S. Sudin, N. Shaikh-Husin, M. Hani
{"title":"A Particle Swarm Optimization Approach for Routing in VLSI","authors":"M. N. Ayob, Z. Yusof, Asrul Adam, A. F. Z. Abidin, I. Ibrahim, Z. Ibrahim, S. Sudin, N. Shaikh-Husin, M. Hani","doi":"10.1109/CICSyN.2010.42","DOIUrl":"https://doi.org/10.1109/CICSyN.2010.42","url":null,"abstract":"The performance of very large scale integration (VLSI) circuits is depends on the interconnected routing in the circuits. In VLSI routing, wire sizing, buffer sizing, and buffer insertion are techniques to improve power dissipation, area usage, noise, crosstalk, and time delay. Without considering buffer insertion, the shortest path in routing is assumed having the minimum delay and better performance. However, the interconnect delay can be further improved if buffers are inserted at proper locations along the routing path. Hence, this paper proposes a heuristic technique to simultaneously find the optimal routing path and buffer location for minimal interconnect delay in VLSI based on particle swarm optimization (PSO). PSO is a robust stochastic optimization technique based on the movement and information sharing of swarms. In this study, location of doglegs is employed to model the particles that represent the routing solutions in VLSI. The proposed approach has a good potential in VLSI routing and can be further extended in future","PeriodicalId":358023,"journal":{"name":"2010 2nd International Conference on Computational Intelligence, Communication Systems and Networks","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123403411","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}