Proceedings of the Fifth IEEE International Symposium on Signal Processing and Information Technology, 2005.最新文献

筛选
英文 中文
Design and implementation of a distributed router 分布式路由器的设计与实现
O. Hagsand, M. Hidell, Peter Sjödin
{"title":"Design and implementation of a distributed router","authors":"O. Hagsand, M. Hidell, Peter Sjödin","doi":"10.1109/ISSPIT.2005.1577100","DOIUrl":"https://doi.org/10.1109/ISSPIT.2005.1577100","url":null,"abstract":"The requirements on IP routers are increasing for every new generation of designs. The driving forces are growing traffic volumes and demands for new services. We argue that a decentralized modular system design would improve the scalability, flexibility, and reliability of future routers. We have designed and implemented such a distributed router, based on physical separation between different functional modules for control and forwarding plane operations. This paper presents the design and implementation, focusing on the internal communication protocols and implementation aspects of the control plane","PeriodicalId":421826,"journal":{"name":"Proceedings of the Fifth IEEE International Symposium on Signal Processing and Information Technology, 2005.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130965697","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 25
Novel scheme for compact orthogonal modified-Prony representation of signals 信号紧正交修正proony表示的新格式
M. Fahmy, Y. Hasan
{"title":"Novel scheme for compact orthogonal modified-Prony representation of signals","authors":"M. Fahmy, Y. Hasan","doi":"10.1109/ISSPIT.2005.1577181","DOIUrl":"https://doi.org/10.1109/ISSPIT.2005.1577181","url":null,"abstract":"In this paper, an algorithm is developed to construct a set of M orthogonal basis along which signals, whether noisy or noise-free, can be decomposed. Combining a modified Prony signal approximation and Gram-Schmidt orthogonalization schemes (to obtain the orthogonal bases), the proposed method represents the processed signal as the sum of M damped exponentials. It is shown that the employed bases are closely related to the roots of an Mth order forward linear prediction polynomial, satisfying the system. In addition, an optimization procedure is described to optimally adjust these bases to accurately represent the signal under consideration. The proposed procedure finds applications in signal compression and signal de-noising, where it is only necessary to specify the orthogonal basis, as well as the decomposition weights rather than sending the complete signal batch. Illustrative examples are given","PeriodicalId":421826,"journal":{"name":"Proceedings of the Fifth IEEE International Symposium on Signal Processing and Information Technology, 2005.","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127862806","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
On space-time block coding in downlink of multiuser CDMA systems 多用户CDMA系统下行链路空时分组编码研究
S. Mohammad Razavizadeh, V. Tabataba Vakili, P. Azmi, M. Fardis
{"title":"On space-time block coding in downlink of multiuser CDMA systems","authors":"S. Mohammad Razavizadeh, V. Tabataba Vakili, P. Azmi, M. Fardis","doi":"10.1109/ISSPIT.2005.1577079","DOIUrl":"https://doi.org/10.1109/ISSPIT.2005.1577079","url":null,"abstract":"In this paper, we introduce a new transmission scheme for downlink of multiple antenna code division multiple access (CDMA) systems. In the proposed scheme, the Alamouti's space-time block coding (STBC) method is extended to multiuser systems. Moreover, to mitigate multiple access interference in the conventional receivers, the linear transmit preceding technique is used in the transmitter. We show that using STBC codes in conjunction with transmit preceding in CDMA systems can significantly increase the capacity of these systems. In this method, the mobile terminals are simple and they do not need any information about other users' spreading sequences. Our computer simulations show that the proposed method has the same performance as the methods based on the combination of receive diversity and multiuser detection in the uplink of CDMA systems","PeriodicalId":421826,"journal":{"name":"Proceedings of the Fifth IEEE International Symposium on Signal Processing and Information Technology, 2005.","volume":"107 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114585485","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
An efficient parameter selection criterion for image denoising 一种有效的图像去噪参数选择准则
H. Pirsiavash, S. Kasaei, F. Marvasti
{"title":"An efficient parameter selection criterion for image denoising","authors":"H. Pirsiavash, S. Kasaei, F. Marvasti","doi":"10.1109/ISSPIT.2005.1577214","DOIUrl":"https://doi.org/10.1109/ISSPIT.2005.1577214","url":null,"abstract":"The performance of most image denoising systems depends on some parameters which should be set carefully based on noise distribution and its variance. As in some applications noise characteristics are unknown, in this research, a criterion which its minimization leads to the best parameter set up is introduced. The proposed criterion is evaluated for the wavelet shrinkage image denoising algorithm using the cross validation procedure. The criterion is tested for some different values of thresholds, and the output leading to the minimum criterion value is selected as the final denoised output. The resulting outputs of our method and the previous threshold selection scheme for the wavelet shrinkage, i.e. the median absolute difference (MAD), are compared. The objective and subjective test results show the improved efficiency of the proposed denoising algorithm","PeriodicalId":421826,"journal":{"name":"Proceedings of the Fifth IEEE International Symposium on Signal Processing and Information Technology, 2005.","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116160520","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Using visual augmentations to test control interactions in visual dataflow languages 使用可视化增强来测试可视化数据流语言中的控件交互
M. Karam
{"title":"Using visual augmentations to test control interactions in visual dataflow languages","authors":"M. Karam","doi":"10.1109/ISSPIT.2005.1577172","DOIUrl":"https://doi.org/10.1109/ISSPIT.2005.1577172","url":null,"abstract":"In this work, we have extended the abstract graph model which we have previously introduced (Karam, M. et al., Sept. 2001), and incorporated the extended model into a visual dataflow testing system that allows testers to import, test, and reflect, with the use of colors, the testedness/coverage of a visual dataflow program's controls. The testing environment in our system is complemented with an augmentation technique that uses visual artifacts and a coloring scheme. Results from our case studies indicates the usefulness of this technique and its practicality in terms of catching, as well as locating faults in real Prograph (shafer Dan, Oct. 1994) programs","PeriodicalId":421826,"journal":{"name":"Proceedings of the Fifth IEEE International Symposium on Signal Processing and Information Technology, 2005.","volume":"88 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125967001","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A new entropy-based algorithm for face localization 一种新的基于熵的人脸定位算法
S. Alirezaee, K. Faez, H. Rashidy Kanan, H. Aghaeinia
{"title":"A new entropy-based algorithm for face localization","authors":"S. Alirezaee, K. Faez, H. Rashidy Kanan, H. Aghaeinia","doi":"10.1109/ISSPIT.2005.1577114","DOIUrl":"https://doi.org/10.1109/ISSPIT.2005.1577114","url":null,"abstract":"Detecting and localizing a face in a single image is the most important part of almost all face recognition systems. Face localization aims to determine the image position of a face for verification purpose of documents such as passport, driving license, ID cards, etc. In this paper an entropy-based method is proposed for detecting the high information region of the image, which may include eyes, mouth, nose, etc. The derived regions in this stage of recognition are sent to feature extraction and classification phase. The method has been tested on the ORL database. The results show the effectiveness and robustness of the proposed method for face detection and localization in presence of white additive Gaussian noise up to 25 dBw. We have achieved localization rate 99.75% for detection of faces in the ORL data set that we had which means 1 miss over 400 ORL faces","PeriodicalId":421826,"journal":{"name":"Proceedings of the Fifth IEEE International Symposium on Signal Processing and Information Technology, 2005.","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124691942","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Kernel Design of bilinear TFD for multiple LFM signals with unbalanced amplitudes 多幅不平衡LFM信号双线性TFD的核设计
Pu Wang, Jianyu Yang, Jintao Xiong
{"title":"Kernel Design of bilinear TFD for multiple LFM signals with unbalanced amplitudes","authors":"Pu Wang, Jianyu Yang, Jintao Xiong","doi":"10.1109/ISSPIT.2005.1577152","DOIUrl":"https://doi.org/10.1109/ISSPIT.2005.1577152","url":null,"abstract":"This paper presents a novel method for kernel design of a bilinear time frequency distribution (TFD) for multiple linear frequency modulated (LFM) signals with unbalanced amplitudes. The kernel is constructed from the product ambiguity function (AF), which suppresses cross terms and noise in the ambiguity domain. An algorithm is developed to determine the angles and distances of the radically distributed contents of the auto terms in the ambiguity domain. To reduce the residual signals and error propagation effect, an iterative approach is implemented. Simulation results validate the method and demonstrate cross terms and noise suppression and high resolution in the time frequency domain","PeriodicalId":421826,"journal":{"name":"Proceedings of the Fifth IEEE International Symposium on Signal Processing and Information Technology, 2005.","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128237810","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Considering the security challenges in consumer-oriented eCommerce 考虑到面向消费者的电子商务中的安全挑战
S. Furnell
{"title":"Considering the security challenges in consumer-oriented eCommerce","authors":"S. Furnell","doi":"10.1109/ISSPIT.2005.1577154","DOIUrl":"https://doi.org/10.1109/ISSPIT.2005.1577154","url":null,"abstract":"Although proven security technologies are available to protect eCommerce transactions, consumers can still face significant challenges if they have low threat awareness or limited technology literacy. This paper considers such challenges, linked to the consumer's understanding and the usability of the security features placed before them. The need to ensure threat awareness is well illustrated by the problem of phishing - a threat that can specifically target eCommerce users, and which explicitly uses their lack of knowledge as a basis for exploitation. Having established a need for protection, the discussion proceeds to consider the barriers posed by security technologies themselves, identifying a range of issues that may specifically be encountered by end-users. Providing a solution to the problems is far from straightforward, but the paper proposes a number of directions in which useful contributions can be made","PeriodicalId":421826,"journal":{"name":"Proceedings of the Fifth IEEE International Symposium on Signal Processing and Information Technology, 2005.","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126845362","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Multitarget ground tracking with road maps and particle filters 多目标地面跟踪与道路地图和粒子过滤器
G. Kravaritis, B. Mulgrew
{"title":"Multitarget ground tracking with road maps and particle filters","authors":"G. Kravaritis, B. Mulgrew","doi":"10.1109/ISSPIT.2005.1577104","DOIUrl":"https://doi.org/10.1109/ISSPIT.2005.1577104","url":null,"abstract":"This paper studies the problem of tracking multiple targets on the ground when information about the road map is available. It introduces an algorithmic structure which employs a particle filter for estimation and tracking in conjunction with a gating function and a data association scheme for measurement-to-track assignment. The proposed technique is based on the variable structure multiple model particle filter and the joint probabilistic data association algorithm","PeriodicalId":421826,"journal":{"name":"Proceedings of the Fifth IEEE International Symposium on Signal Processing and Information Technology, 2005.","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121603886","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Extending an OMA-based DRM framework with non-repudiation services 使用不可否认服务扩展基于oma的DRM框架
J. A. Onieva, J. Lopez, Jianying Zhou, R. Román
{"title":"Extending an OMA-based DRM framework with non-repudiation services","authors":"J. A. Onieva, J. Lopez, Jianying Zhou, R. Román","doi":"10.1109/ISSPIT.2005.1577143","DOIUrl":"https://doi.org/10.1109/ISSPIT.2005.1577143","url":null,"abstract":"Digital rights management (DRM) is an umbrella term for any of several arrangements, which allows a vendor of content in electronic form to control the material and restrict its usage in various ways that can be specified by the vendor. These arrangements are provided through security techniques, mainly encryption, and the distribution, in a detached manner, of content and rights. This allows free access to the content by the consumers, but only those carrying the proper right object (RO) will be able to process such content. As a security service considered in different layers of the security framework defined by ITU X.805, almost all applications need to consider non-repudiation in the very beginning of their design. Unfortunately this has not been done so far in DRM specifications due to practical issues and the type of content distributed. We analyze this service for the a DRM framework and provide a solution which allows the right objects acquisition to be undeniable","PeriodicalId":421826,"journal":{"name":"Proceedings of the Fifth IEEE International Symposium on Signal Processing and Information Technology, 2005.","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126046031","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信