{"title":"Evaluation of augmented RIC model of child respiratory impedance based on impulse oscillometry data","authors":"A. Rajagiri, B. Diong","doi":"10.1109/TPSD.2006.5507416","DOIUrl":"https://doi.org/10.1109/TPSD.2006.5507416","url":null,"abstract":"The augmented RIC model of the respiratory system is described and analyzed in this work. The parameters for this and four other well-known respiratory system models were estimated using impulse oscillometry data, obtained from both healthy and asthmatic children, in order to compare the modeling errors and the models' fidelity. Of these five models, the augmented RIC model ranked in the middle in terms of magnitude of modeling error for the given data, but other factors in its favor were determined. Hence it is the most reasonable model to use for further studies to improve the detection and diagnosis of respiratory diseases.","PeriodicalId":385396,"journal":{"name":"2006 IEEE Region 5 Conference","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114407758","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Energy complexity- a metric for energy consumption of ad hoc network protocols","authors":"Rajesh Bhairampally, B. Chatt","doi":"10.1109/TPSD.2006.5507426","DOIUrl":"https://doi.org/10.1109/TPSD.2006.5507426","url":null,"abstract":"The key in minimizing system wide energy consumption of a network is to use a protocol stack that is energy sensitive. However, there has been no appropriate metric to correctly evaluate the impact of a protocol strategy on battery-powered devices. This paper presents a method to evaluate minimum energy consumption of a protocol. In this paper, we apply a method, called energy complexity to separately compute minimum energy consumption due to transmissions, receptions, and protocol specific local computations for a protocol control-message transmission and data transmission strategies. This method can also be used to analytically experiment with protocols by changing their control-message and/or data transmission strategies. The usefulness of our method is demonstrated by analyzing two routing protocols for sensor networks.","PeriodicalId":385396,"journal":{"name":"2006 IEEE Region 5 Conference","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125428934","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Hopfield neural network model for solving affine transformation parameters in the correlation method","authors":"Panomkhawn Riyamongkol, Weizhao Zhao","doi":"10.1109/TPSD.2006.5507421","DOIUrl":"https://doi.org/10.1109/TPSD.2006.5507421","url":null,"abstract":"In this paper, we present the Hopfield neural network model to provide solution for affine transformation parameters in the correlation method. Affine transformation equation is derived to get the mean-square error. The model maps the mean-square error equation with the energy function. When the energy function reaches local minima, the mean-square error is minimized. Outputs of the model will be affine transformation parameters. These parameters are applied in the affine transformation equation to register the corresponding two images.","PeriodicalId":385396,"journal":{"name":"2006 IEEE Region 5 Conference","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130271439","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Joint incremental codeword and power adaptation in CDMA systems","authors":"C. Lacatus, D. Popescu","doi":"10.1109/TPSD.2006.5507434","DOIUrl":"https://doi.org/10.1109/TPSD.2006.5507434","url":null,"abstract":"In this paper we present a distributed algorithm for joint codeword and power adaptation in the uplink of a Code Division Multiple Access (CDMA) system. The algorithm uses incremental updates for codewords and powers of individual users such that their corresponding signal-to-interference plus-noise ratios (SINR) at the receiver are maximized subject to specified power constraints. Updates are based on a steepest descent method which is a widely used digital signal processing technique, and which can be easily implemented in a wide range of hardware for communication systems. The proposed algorithm is analyzed and illustrated with numerical examples obtained from simulations.","PeriodicalId":385396,"journal":{"name":"2006 IEEE Region 5 Conference","volume":"111 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123108550","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Effect of phase noise in Dense Wavelength Division Multiplexing (DWDM) networks","authors":"P. Chennu, J. Bratton, M. Shadaram","doi":"10.1109/TPSD.2006.5507433","DOIUrl":"https://doi.org/10.1109/TPSD.2006.5507433","url":null,"abstract":"In this paper, the phase stability of 50 km externally modulated 256-QAM DWDM fiber optic link is evaluated. The analysis of RF phase noise in the fiber optic link is the main objective of this work. RF phase noise is mainly investigated with preamplifier (EDFA) configuration at 1550 nm wavelength. BER curves, constellation diagrams and Eye diagrams are the three main performance criteria considered through this paper.","PeriodicalId":385396,"journal":{"name":"2006 IEEE Region 5 Conference","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114860511","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ashley Trimmer, Tarun Banka, Panho Lee, A. Jayasumana, V. Chandrasekar
{"title":"Performance of high-bandwidth TRABOL protocol for radar data streaming","authors":"Ashley Trimmer, Tarun Banka, Panho Lee, A. Jayasumana, V. Chandrasekar","doi":"10.1109/TPSD.2006.5507437","DOIUrl":"https://doi.org/10.1109/TPSD.2006.5507437","url":null,"abstract":"TCP-friendly Rate Adaptation Based on Loss (TRABOL) is a high bandwidth overlay transport protocol that dynamically adapts the data transmission rate based on the packet loss feedback received from an end user. TRABOL performs AIMD based congestion control such that transmission rate satisfies minimum and target rate requirements of the end user. Additionally, rate is adapted, while remaining friendly to the TCP cross traffic and efficiently using the bottleneck link bandwidth. This paper investigates the impact of different AIMD increase and decrease functions for congestion control on performance of the TRABOL protocol. A network emulator test bed is used for the performance evaluation, measuring the effectiveness of different AIMD rate control schemes in meeting bandwidth requirements of the end user, TCP-friendliness, bandwidth efficiency, and response time of the protocol.","PeriodicalId":385396,"journal":{"name":"2006 IEEE Region 5 Conference","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130040716","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
O. Adamo, S. Mohanty, E. Kougianos, M. Varanasi, Wei-guang Cai
{"title":"VLSI architecture and FPGA prototyping of a digital camera for image security and authentication","authors":"O. Adamo, S. Mohanty, E. Kougianos, M. Varanasi, Wei-guang Cai","doi":"10.1109/TPSD.2006.5507440","DOIUrl":"https://doi.org/10.1109/TPSD.2006.5507440","url":null,"abstract":"Two fundamental operations performed by a digital camera are image capturing and storing. The images are subsequently transmitted in various forms over appropriate media. These images are always vulnerable to various forms of copyright attacks and ownership issues. This paper introduces a digital camera with built-in copyright protection and security mechanism for images produced by it. Since the proposal of the trustworthy digital camera by Friedman [1], significant research has been done in developing algorithms for watermarking and encryption with the aim of using them in digital cameras. However, only few of these efforts are involved with the architectural development of the entire digital camera. Incorporation of encryption and watermarking together in the digital camera will assist in protecting and authenticating image files. In this paper, we present an architecture and a hardware efficient FPGA based watermark module towards the development of the complete digital camera.","PeriodicalId":385396,"journal":{"name":"2006 IEEE Region 5 Conference","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121259461","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Narrowband interference suppression in multi-band UWB communication systems","authors":"P. Yaddanapudi, D. Popescu","doi":"10.1109/TPSD.2006.5507441","DOIUrl":"https://doi.org/10.1109/TPSD.2006.5507441","url":null,"abstract":"In this paper we present a new method for mitigating narrowband interference in multiband OFDM (MB-OFDM) ultra wideband (UWB) systems. The method employs spectral shaping of the transmitted signal using binary signature sequences with minimum total squared correlation (TSC) to avoid the narrowband interfering signal. We illustrate the proposed method with plots that show the spectrum of the transmitted signal with and without spectral shaping, and present also simulation results that show improvement in the bit error rate (BER) performance of the system when the method is applied.","PeriodicalId":385396,"journal":{"name":"2006 IEEE Region 5 Conference","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121349154","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Simulation of animal behavior using neural networks","authors":"S. S. Sebastian Echegaray, Wenbin Luo","doi":"10.1109/TPSD.2006.5507449","DOIUrl":"https://doi.org/10.1109/TPSD.2006.5507449","url":null,"abstract":"In this paper, we simulated some basic animal behavior by letting it “evolve” through generations. The animals, which are able to survive, will be given the privilege to breed the new generation and pass the good genes to the next generation. Our simulation environment consisted of a Prey-Predator-Food model. The prey and predators created in our simulation are objects that have sensors to make them aware of their environment, and they are able to move freely around the world. The food sources are stationary objects placed randomly throughout the world, which serve as targets for prey to search for and eat.","PeriodicalId":385396,"journal":{"name":"2006 IEEE Region 5 Conference","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121421927","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On porting of computer applications into symbian cell phone platform","authors":"A. Panchul, D. Akopian","doi":"10.1109/TPSD.2006.5507442","DOIUrl":"https://doi.org/10.1109/TPSD.2006.5507442","url":null,"abstract":"The wide availability of so-called “smart” phones gave engineers the opportunity to embed their software without involvement of manufacturers and service providers [2]. Recently we developed an image processing toolbox for cellular phones for educational and research purposes. The embedding of new applications brought up several implementation challenges which were common. In this paper we review the problems of code development for cell phone platforms. We analyze the sequence of necessary adaptation stages and novel visualization techniques which are required for the adequate representation of two-dimensional floating-point data [1].","PeriodicalId":385396,"journal":{"name":"2006 IEEE Region 5 Conference","volume":"222 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124412553","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}