2005 5th International Conference on Information Communications & Signal Processing最新文献

筛选
英文 中文
Greedy perceptual coding 贪婪感知编码
2005 5th International Conference on Information Communications & Signal Processing Pub Date : 2005-12-06 DOI: 10.1109/ICICS.2005.1689177
M.L. Miller
{"title":"Greedy perceptual coding","authors":"M.L. Miller","doi":"10.1109/ICICS.2005.1689177","DOIUrl":"https://doi.org/10.1109/ICICS.2005.1689177","url":null,"abstract":"This paper discusses an approach to quantization for lossy compression, termed greedy perceptual coding, in which the quantizer uses a perceptual model to determine the amount by which a work of media can be distorted, and then greedily tries to find the distortion that minimizes the number of bits that will be output by a subsequent lossless coder. The chief advantage of this approach is that the decoder does not need to know any distortion parameters used during compression, such as quantization step sizes or perceptual model parameters. As a result, the perceptual model can be arbitrarily complex. Since greedy perceptual coding changes the distribution of image values to be encoded, the best lossless codes for undistorted images are not the best to use in this context. A method is presented here for designing simple codes to use in the greedy-perceptual-coding context, and a preliminary compression system is implemented using these ideas","PeriodicalId":425178,"journal":{"name":"2005 5th International Conference on Information Communications & Signal Processing","volume":"117 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124339668","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Characteristics of Weighted Email Communications 加权电子邮件通信的特征
2005 5th International Conference on Information Communications & Signal Processing Pub Date : 2005-12-06 DOI: 10.1109/ICICS.2005.1689076
Yihjia Tsai, Cheng-Chin Lin, Ching-Chang Lin
{"title":"Characteristics of Weighted Email Communications","authors":"Yihjia Tsai, Cheng-Chin Lin, Ching-Chang Lin","doi":"10.1109/ICICS.2005.1689076","DOIUrl":"https://doi.org/10.1109/ICICS.2005.1689076","url":null,"abstract":"In recent years, network models have been extensively studied. Most of those models are based on the binary status of the existence of a communication link, the intensity of the communication pattern for a given pair of nodes is not taken into consideration. In this paper, we study the statistics of commonly used Email communication and take into account communication frequencies. The resulting weighted Email communication network showed a rather different statistical behavior than the unweighted one. We compare the link and node weight distribution under different assumptions. Finally, weighted clustering coefficient and group growth are introduced and analyzed in the network","PeriodicalId":425178,"journal":{"name":"2005 5th International Conference on Information Communications & Signal Processing","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124501693","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Security Enhancement for Lightweight JPEG 2000 Transparent Encryption 轻量级JPEG 2000透明加密的安全性增强
2005 5th International Conference on Information Communications & Signal Processing Pub Date : 2005-12-06 DOI: 10.1109/ICICS.2005.1689224
D. Engel, A. Uhl
{"title":"Security Enhancement for Lightweight JPEG 2000 Transparent Encryption","authors":"D. Engel, A. Uhl","doi":"10.1109/ICICS.2005.1689224","DOIUrl":"https://doi.org/10.1109/ICICS.2005.1689224","url":null,"abstract":"We present improvements in lightweight transparent JPEG 2000 encryption with lifting parameterized biorthogonal wavelet filters. Security is further enhanced by a combination with the wavelet packet transform. Different methods for the selection of a suitable wavelet packet basis are presented, which also make a certain amount of control in the trade-off between security and computational complexity possible. The combined approach of parameterized filters and wavelet packets is evaluated with regard to compression performance, complexity and security","PeriodicalId":425178,"journal":{"name":"2005 5th International Conference on Information Communications & Signal Processing","volume":"168 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114744590","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Design Space Exploration for Rapid Development of DSP Applications DSP应用快速发展的设计空间探索
2005 5th International Conference on Information Communications & Signal Processing Pub Date : 2005-12-06 DOI: 10.1109/ICICS.2005.1689289
Y. Le Moullec, S. S. Christensen, W. Chenpeng, P. Koch, S. Bilavarn
{"title":"Design Space Exploration for Rapid Development of DSP Applications","authors":"Y. Le Moullec, S. S. Christensen, W. Chenpeng, P. Koch, S. Bilavarn","doi":"10.1109/ICICS.2005.1689289","DOIUrl":"https://doi.org/10.1109/ICICS.2005.1689289","url":null,"abstract":"In this paper a new methodology for accelerating the development cycle of DSP applications is presented. This methodology is composed of three steps 1) algorithm design with Matlab (mathworks), 2) algorithmic-level characterization and parallelism exploration using Design-Trotter SoC framework (LESTER/CISS) and 3) FPGA hardware synthesis with DK Design Suite (Celoxica). We have applied the proposed methodology to explore the design space of a RAKE receiver. The results show that by using this methodology, designers can rapidly converge from specification phases to the final synthesis of the system. The parallelism information provided by Design-Trotter has been shown extremely useful to develop the Handel-C description of the application, enabling a rapid synthesis of the system with DK Design Suite. The time-to-market factor is thus significantly reduced","PeriodicalId":425178,"journal":{"name":"2005 5th International Conference on Information Communications & Signal Processing","volume":"571 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116296545","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Comparison of IP Datagrams Transmission using MPE and ULE over Mpeg-2/DVB Networks MPE和ULE在Mpeg-2/DVB网络上IP数据报传输的比较
2005 5th International Conference on Information Communications & Signal Processing Pub Date : 2005-12-06 DOI: 10.1109/ICICS.2005.1689239
Teh Hong, W. Chee, R. Budiarto
{"title":"A Comparison of IP Datagrams Transmission using MPE and ULE over Mpeg-2/DVB Networks","authors":"Teh Hong, W. Chee, R. Budiarto","doi":"10.1109/ICICS.2005.1689239","DOIUrl":"https://doi.org/10.1109/ICICS.2005.1689239","url":null,"abstract":"Digital video broadcasting (DVB) defines the carriage of multimedia and Internet information to client by means of MPEG-2 transport stream. The DVB standards also allow the same system to transmit Internet protocol (IP) data. This data broadcasting technology enables the broadcast of large amount of data to the personal computer over satellite or other broadcasting network. This allows the MPEG-2 TS bearer become a hop in IP network. The intention of this paper is to compare the existing multi-protocol encapsulation and ultra lightweight encapsulation methods for IP transmission over DVB networks","PeriodicalId":425178,"journal":{"name":"2005 5th International Conference on Information Communications & Signal Processing","volume":"90 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116325816","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 27
Frame Based Adaptation for CMOS Imager 基于帧的CMOS成像仪自适应
2005 5th International Conference on Information Communications & Signal Processing Pub Date : 2005-12-06 DOI: 10.1109/ICICS.2005.1689055
D. Climie, S. Chen, A. Bermak, D. Martinez
{"title":"Frame Based Adaptation for CMOS Imager","authors":"D. Climie, S. Chen, A. Bermak, D. Martinez","doi":"10.1109/ICICS.2005.1689055","DOIUrl":"https://doi.org/10.1109/ICICS.2005.1689055","url":null,"abstract":"This paper presents a VLSI architecture of a frame-based adaptive quantization technique based on the fast boundary adaptation rule (FBAR). The adaptive quantization algorithm is integrated together with a 128times128 pixel CMOS image sensor array. The pixel operation is based on biologically inspired time-to-first spike encoding scheme. System and circuit level simulations show the successful operation of the proposed architecture","PeriodicalId":425178,"journal":{"name":"2005 5th International Conference on Information Communications & Signal Processing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125850977","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Investigation of Ultra-Wideband Pulse Distortion Due to the Body Shadowing 体影引起的超宽带脉冲失真研究
2005 5th International Conference on Information Communications & Signal Processing Pub Date : 2005-12-06 DOI: 10.1109/ICICS.2005.1689165
A. Pradabphon, W. Doungdeun, M. Chamchoy, P. Supanakoon, S. Promwong
{"title":"Investigation of Ultra-Wideband Pulse Distortion Due to the Body Shadowing","authors":"A. Pradabphon, W. Doungdeun, M. Chamchoy, P. Supanakoon, S. Promwong","doi":"10.1109/ICICS.2005.1689165","DOIUrl":"https://doi.org/10.1109/ICICS.2005.1689165","url":null,"abstract":"In this paper, the distortion of ultra-wideband (UWB) pulse due to the human body shadowing is investigated. The frequency responses of the radio channels are acquired by using a vector network analyzer (VNA) over the frequency bandwidth of 3 GHz to 11 GHz. The experimental channels are taken for several T-R separation distances in the indoor environment. Consequently, the characteristics of the UWB pulse distortion including the effect of transmitter/receiver antennas and human body are examined. The pulse distortion is considered by using the percentage of the correlation coefficient between the transmitted signal and the received signal. As the results, the distortion of UWB pulse increases as the T-R separation distance increases, especially when the fully shadowing is observed","PeriodicalId":425178,"journal":{"name":"2005 5th International Conference on Information Communications & Signal Processing","volume":"148 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128183715","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Accurate Range for Variable Fractional-Delay Filtering 可变分数延迟滤波的精确范围
2005 5th International Conference on Information Communications & Signal Processing Pub Date : 2005-12-06 DOI: 10.1109/ICICS.2005.1689008
T. Deng
{"title":"Accurate Range for Variable Fractional-Delay Filtering","authors":"T. Deng","doi":"10.1109/ICICS.2005.1689008","DOIUrl":"https://doi.org/10.1109/ICICS.2005.1689008","url":null,"abstract":"To perform variable fractional-delay (VFD) filtering, the VFD parameter p is assumed to take fractional numbers in pisin[0,1] and pisin[-0.5, 0.5] in the literature, but it needs to be clarified that which range should be adopted for achieving high-accuracy VFD filtering. In this paper, we first analyze the accurate range qualitatively, and then utilize interpolation examples to demonstrate that range pisin [-0.5, 0.5] is the better choice for accurate VFD filtering","PeriodicalId":425178,"journal":{"name":"2005 5th International Conference on Information Communications & Signal Processing","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128645695","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
On the Weight Enumerator and BER Bounds of Shortened Block and Product Codes 缩短块码和产品码的权重枚举数和误码率界
2005 5th International Conference on Information Communications & Signal Processing Pub Date : 2005-12-06 DOI: 10.1109/ICICS.2005.1689279
K. C. Lim, Y. Guan
{"title":"On the Weight Enumerator and BER Bounds of Shortened Block and Product Codes","authors":"K. C. Lim, Y. Guan","doi":"10.1109/ICICS.2005.1689279","DOIUrl":"https://doi.org/10.1109/ICICS.2005.1689279","url":null,"abstract":"Code shortening is commonly performed in practice but its analytical decoding performance is not well understood. In this paper, we present tight expressions for estimating the weight enumerator and hence BER (bit error rate) performance of linear shortened and shortened-extended block/product codes operating in AWGN and Rayleigh fading channels. The expressions are easy to use as they are expressed in terms of the original (un-shortened) code properties, which are widely reported. Asymptotic coding loss expressions associated with code shortening are also derived","PeriodicalId":425178,"journal":{"name":"2005 5th International Conference on Information Communications & Signal Processing","volume":"103 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127073239","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Automatic Enhancement and Subjective Evaluation of Dental X-ray Images using the SMQT SMQT在口腔x线图像自动增强和主观评价中的应用
2005 5th International Conference on Information Communications & Signal Processing Pub Date : 2005-12-06 DOI: 10.1109/ICICS.2005.1689298
M. Nilsson, F. Sattar, H. K. Chng, I. Claesson
{"title":"Automatic Enhancement and Subjective Evaluation of Dental X-ray Images using the SMQT","authors":"M. Nilsson, F. Sattar, H. K. Chng, I. Claesson","doi":"10.1109/ICICS.2005.1689298","DOIUrl":"https://doi.org/10.1109/ICICS.2005.1689298","url":null,"abstract":"This paper investigates the successive mean quantization transform (SMQT) for enhancement of dental X-ray images. The aim is to provide an automatic tool for enhancing the dental X-rays that would aid an interpreter, who is typically a specialist in dentistry. The evaluation is performed based on a subjective test by a clinical expert/endodontist that has vast experience in dental X-ray analysis and diagnosis. Based on the subjective test for a number of dental images, this SMQT based enhancement method is found to provide a useful tool for enhancing the diagnostic value of dental X-ray images","PeriodicalId":425178,"journal":{"name":"2005 5th International Conference on Information Communications & Signal Processing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130977514","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信