Proceedings of the Fifth IEEE International Symposium on Signal Processing and Information Technology, 2005.最新文献

筛选
英文 中文
Quality evaluation of fast morphing interpolation model for 3D volume reconstruction 用于三维体重建的快速变形插值模型质量评估
A. Fadeev, N. Eltonsy, G. Tourassi, Adel Said Elmaghraby
{"title":"Quality evaluation of fast morphing interpolation model for 3D volume reconstruction","authors":"A. Fadeev, N. Eltonsy, G. Tourassi, Adel Said Elmaghraby","doi":"10.1109/ISSPIT.2005.1577201","DOIUrl":"https://doi.org/10.1109/ISSPIT.2005.1577201","url":null,"abstract":"The purpose of this study is to evaluate a 3D volume reconstruction model for volume rendering. The model is conducted using brain MRI data of Visible Human Project. Particularly MRI T1 data were used. The quality of the developed model is compared with linear interpolation technique. By applying our morphing technique recursively, taking progressively smaller subregions within a region, a high quality and accuracy interpolation is obtained. The presented algorithm is robust and has 20 adjustable parameters for use with different modalities. The main advantages of this morphing algorithm are: 1) applicability to general configurations of planes in 3D space, 2) automated behavior, 3) applicability to CT scans with no changes in the algorithm and software. Subsequently, to visualize data, a specialized volume rendering card (TeraRecon VolumePro 1000) was used. To represent data in 3D space, special software was developed to convert interpolated CT slices to 3D objects compatible with the VolumePro card. Quantitative and visual comparison between the proposed model and linear interpolation clearly demonstrates the superiority of the proposed model. Evaluation is performed by removing slices from the original stack of 2D images and using them as reference for error comparison among alternative approaches. Error analysis using average Mean Square and Absolute error clearly demonstrates improved performance","PeriodicalId":421826,"journal":{"name":"Proceedings of the Fifth IEEE International Symposium on Signal Processing and Information Technology, 2005.","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127511936","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Signal processing techniques for aeronautical communications via satellite 卫星航空通信信号处理技术
P. Fines, K. Christofylaki, P. Febvre
{"title":"Signal processing techniques for aeronautical communications via satellite","authors":"P. Fines, K. Christofylaki, P. Febvre","doi":"10.1109/ISSPIT.2005.1577149","DOIUrl":"https://doi.org/10.1109/ISSPIT.2005.1577149","url":null,"abstract":"Aeronautical communications are playing an important role in the air traffic control as well as new passenger communication services. Due to the global coverage required, satellite transponders provide the required links which are traditionally limited to narrowband throughputs (e.g. 64 kb/s) due to the propagation channel characteristics. This paper analyses the reasons that limit the throughput of the aeronautical satellite links and presents advanced signal processing techniques that allow satellite transceivers to break the narrowband barriers","PeriodicalId":421826,"journal":{"name":"Proceedings of the Fifth IEEE International Symposium on Signal Processing and Information Technology, 2005.","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126507521","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Electromagnetic signatures of WLAN cards and network security 无线网卡的电磁签名与网络安全
Kate A. Remley, C. Grosvenor, R. Johnk, David R. Novotny, Paul D. Hale, M. D. McKinley, A. Karygiannis, E. Antonakakis
{"title":"Electromagnetic signatures of WLAN cards and network security","authors":"Kate A. Remley, C. Grosvenor, R. Johnk, David R. Novotny, Paul D. Hale, M. D. McKinley, A. Karygiannis, E. Antonakakis","doi":"10.1109/ISSPIT.2005.1577145","DOIUrl":"https://doi.org/10.1109/ISSPIT.2005.1577145","url":null,"abstract":"The proliferation of wireless devices and the availability of new wireless applications and services raise new privacy and security concerns. Although network-layer anonymity protects the identities of the communication endpoints, the physical layer of many wireless communication protocols offers no such guarantee. The electromagnetic signal transmitted over an open communication medium can be monitored, captured, and analyzed in an effort to trace and identify users of wireless devices. In this paper we present preliminary results on the feasibility of identifying wireless nodes in a network by measuring distinctive electromagnetic characteristics or \"signatures\" of wireless local area network (WLAN) cards","PeriodicalId":421826,"journal":{"name":"Proceedings of the Fifth IEEE International Symposium on Signal Processing and Information Technology, 2005.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130569209","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 78
Implementation procedure of wireless signal map matching for location-based services 基于位置服务的无线信号地图匹配的实现程序
H.K. Lee, B. Li, C. Rizos
{"title":"Implementation procedure of wireless signal map matching for location-based services","authors":"H.K. Lee, B. Li, C. Rizos","doi":"10.1109/ISSPIT.2005.1577135","DOIUrl":"https://doi.org/10.1109/ISSPIT.2005.1577135","url":null,"abstract":"To mitigate the effects of non-line-of-sight error in terrestrial wireless location systems, a wireless signal map matching concept was recently introduced. The key concept of the wireless signal map matching is the automatic extraction of relationship between an electronic map representing ideal world and the fully-populated anonymous user distribution representing the distorted world. This paper introduces an implementation procedure of the wireless signal map matching method. A simulation results demonstrates performance improvement that can be obtained by the proposed method","PeriodicalId":421826,"journal":{"name":"Proceedings of the Fifth IEEE International Symposium on Signal Processing and Information Technology, 2005.","volume":"195 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114098167","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Text-independent speaker identification using backpropagation MLP network classifier for a closed set of speakers 使用反向传播MLP网络分类器对一组封闭的说话人进行文本无关的说话人识别
A. Sharma, S.P. Singh, V. Kumar
{"title":"Text-independent speaker identification using backpropagation MLP network classifier for a closed set of speakers","authors":"A. Sharma, S.P. Singh, V. Kumar","doi":"10.1109/ISSPIT.2005.1577176","DOIUrl":"https://doi.org/10.1109/ISSPIT.2005.1577176","url":null,"abstract":"Speaker identification is recognizing the voice of someone familiar, and matches it to speaker's name. This is done by speech signal processing and extracting relevant information. This paper documents such a speaker identification technique using a MLP (multilayer perceptron) using backpropagation learning rule for text-independent speaker recognition for a closed set of speaker whose speech content are present in the repository","PeriodicalId":421826,"journal":{"name":"Proceedings of the Fifth IEEE International Symposium on Signal Processing and Information Technology, 2005.","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128666044","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Neural network implementation of the BCJR algorithm based on reformulation using matrix algebra 基于矩阵代数的BCJR算法的神经网络实现
M. H. Sazli, C. Isik
{"title":"Neural network implementation of the BCJR algorithm based on reformulation using matrix algebra","authors":"M. H. Sazli, C. Isik","doi":"10.1109/ISSPIT.2005.1577207","DOIUrl":"https://doi.org/10.1109/ISSPIT.2005.1577207","url":null,"abstract":"In this paper, we show that the BCJR algorithm (or Bahl algorithm) can be implemented as a feedforward neural network structure based on a reformulation of the algorithm using matrix algebra. We verified through computer simulations that this novel neural network implementation yields identical results with the BCJR algorithm","PeriodicalId":421826,"journal":{"name":"Proceedings of the Fifth IEEE International Symposium on Signal Processing and Information Technology, 2005.","volume":"569 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134238460","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A new neural network ensemble heuristic for a predictor of the aldose reductase inhibitory activity 一种新的预测醛糖还原酶抑制活性的神经网络集合启发式方法
R. Parra-Hernandez, E. M. Laxdal, N. Dimopoulos, P. Alexiou
{"title":"A new neural network ensemble heuristic for a predictor of the aldose reductase inhibitory activity","authors":"R. Parra-Hernandez, E. M. Laxdal, N. Dimopoulos, P. Alexiou","doi":"10.1109/ISSPIT.2005.1577208","DOIUrl":"https://doi.org/10.1109/ISSPIT.2005.1577208","url":null,"abstract":"In this paper, we present a mechanism to obtain a neural network-based model that predicts an enzyme inhibitory activity of a group of compounds. The mechanism selects the compounds, among a sparse set of, that should be used to obtain models of the inhibitory activity of interest. That is, the mechanism is aimed to the selection of a training set of compounds which will ensure that the training of a neural network-based model will result in a system capable of generalization","PeriodicalId":421826,"journal":{"name":"Proceedings of the Fifth IEEE International Symposium on Signal Processing and Information Technology, 2005.","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133951485","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
H.263 video decoding on programmable graphics hardware H.263视频解码可编程的图形硬件
A. Hirvonen, T. Leppanen
{"title":"H.263 video decoding on programmable graphics hardware","authors":"A. Hirvonen, T. Leppanen","doi":"10.1109/ISSPIT.2005.1577219","DOIUrl":"https://doi.org/10.1109/ISSPIT.2005.1577219","url":null,"abstract":"Mobile devices like PDAs and mobile phones include advanced multimedia processing capabilities especially in the area of audio, imaging and video. High performance graphics processing is emerging to the mobile devices in near future. Recent development in 3D graphics acceleration hardware has brought higher performance but also versatile and programmable 3D acceleration architectures. These programmable architectures can be utilized also for other purposes than graphics processing. In this paper we describe how graphics hardware can be used for video decoding based on the h.263 standard. In our implementation we have used OpenGL graphics API to program the graphics hardware. It is shown that programmable graphics hardware can be used for video processing with some limitations","PeriodicalId":421826,"journal":{"name":"Proceedings of the Fifth IEEE International Symposium on Signal Processing and Information Technology, 2005.","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132830182","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
An approach to crosslayer QoS management in MISO systems MISO系统中跨层QoS管理方法
B. Zerlin, J. Nossek
{"title":"An approach to crosslayer QoS management in MISO systems","authors":"B. Zerlin, J. Nossek","doi":"10.1109/ISSPIT.2005.1577140","DOIUrl":"https://doi.org/10.1109/ISSPIT.2005.1577140","url":null,"abstract":"We study the crosslayer problem of joint optimization of radio parameters in a multiuser MISO system with partial channel state information at the transmitter. The central optimization problem within is formulated as a power minimization subject to a set of QoS constraints. Based upon analytical models for all regarded sublayers and the formulation of the resulting channel outage probability of the MISO system, the mode of operation and the MISO transmit processing are optimized jointly in an fast converging iterative scheme. With these results service requests from different users can be met with a significantly lower amount of resources, resulting in a higher system capacity","PeriodicalId":421826,"journal":{"name":"Proceedings of the Fifth IEEE International Symposium on Signal Processing and Information Technology, 2005.","volume":"112 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124070631","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Trust in PRIME 信任PRIME
C. Andersson, J. Camenisch, S. Crane, S. Fischer-Hübner, R. Leenes, Siani Pearson, J. Pettersson, Dieter Sommer
{"title":"Trust in PRIME","authors":"C. Andersson, J. Camenisch, S. Crane, S. Fischer-Hübner, R. Leenes, Siani Pearson, J. Pettersson, Dieter Sommer","doi":"10.1109/ISSPIT.2005.1577157","DOIUrl":"https://doi.org/10.1109/ISSPIT.2005.1577157","url":null,"abstract":"The PRIME project develops privacy enhancing identity management systems that allow users in various application areas such as e-commerce to regain control over their personal spheres. This paper introduces the PRIME technical architecture that also includes special trust-enhancing mechanisms, and shows how PRIME technologies can enhance privacy and trust of e-shopping customers. It also discusses the socio-psychological factors and HCI aspects influencing the end user's trust in privacy enhancing identity management, and shows why HCI research, user studies, and socio-psychological research, are necessary efforts to accompany system design","PeriodicalId":421826,"journal":{"name":"Proceedings of the Fifth IEEE International Symposium on Signal Processing and Information Technology, 2005.","volume":"218 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130406095","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 52
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信