Pub Date : 1995-09-05DOI: 10.1109/CCECE.1995.526426
S.N. Subramanian, T. Le-Ngoc
Proposes a new model for characterizing the data traffic in a multi-media environment. The authors model the data traffic by a two-state doubly stochastic Poisson process, with sojourn times in each state having an independent and identical heavy tailed distribution, such as the Pareto distribution. The simulation results from the new data traffic model are presented. The new model is versatile in capturing the self-similar characteristics of traffic found in the traffic measurements. The authors also suggest that the other two types of multi-media traffic namely, voice and video may each be characterized by a 2-state doubly stochastic Poisson process with exponential sojourn times (i.e., a Markov modulated Poisson process or MMPP).
{"title":"Traffic modeling in a multi-media environment","authors":"S.N. Subramanian, T. Le-Ngoc","doi":"10.1109/CCECE.1995.526426","DOIUrl":"https://doi.org/10.1109/CCECE.1995.526426","url":null,"abstract":"Proposes a new model for characterizing the data traffic in a multi-media environment. The authors model the data traffic by a two-state doubly stochastic Poisson process, with sojourn times in each state having an independent and identical heavy tailed distribution, such as the Pareto distribution. The simulation results from the new data traffic model are presented. The new model is versatile in capturing the self-similar characteristics of traffic found in the traffic measurements. The authors also suggest that the other two types of multi-media traffic namely, voice and video may each be characterized by a 2-state doubly stochastic Poisson process with exponential sojourn times (i.e., a Markov modulated Poisson process or MMPP).","PeriodicalId":158581,"journal":{"name":"Proceedings 1995 Canadian Conference on Electrical and Computer Engineering","volume":"198 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1995-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122527360","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1995-09-05DOI: 10.1109/CCECE.1995.526413
A. Shaikh, E. Garant, A. Okapuu-von Veh, A. Malowany, A. Daigle, P. Desbiens, J. Rizzi, R. Marceau, R. Gauthier
The importance of training simulators in the power industry has been recognised due to the risks involved for a professional in this field. However more work is needed on the training user interface. The virtual reality (VR) training simulator ESOPE-VR has been developed as a functional VR system which serves as an extension to the traditional simulator. Many issues were confronted during this development. One major issue is the man-machine strategy and interface to be used. This issue is critical since it influences the level of immersion or realism that can be achieved. This paper discusses three different hand controlled manipulation devices, their integration and some test data showing the effectiveness of their manipulation strategies.
{"title":"Alternative manipulation strategies in a virtual reality training system","authors":"A. Shaikh, E. Garant, A. Okapuu-von Veh, A. Malowany, A. Daigle, P. Desbiens, J. Rizzi, R. Marceau, R. Gauthier","doi":"10.1109/CCECE.1995.526413","DOIUrl":"https://doi.org/10.1109/CCECE.1995.526413","url":null,"abstract":"The importance of training simulators in the power industry has been recognised due to the risks involved for a professional in this field. However more work is needed on the training user interface. The virtual reality (VR) training simulator ESOPE-VR has been developed as a functional VR system which serves as an extension to the traditional simulator. Many issues were confronted during this development. One major issue is the man-machine strategy and interface to be used. This issue is critical since it influences the level of immersion or realism that can be achieved. This paper discusses three different hand controlled manipulation devices, their integration and some test data showing the effectiveness of their manipulation strategies.","PeriodicalId":158581,"journal":{"name":"Proceedings 1995 Canadian Conference on Electrical and Computer Engineering","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1995-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117176683","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1995-09-05DOI: 10.1109/CCECE.1995.526299
Y. Hegazy, M. Salama
This paper presents a method for analysing the probabilistic behaviour of the randomly varying harmonic currents produced by distribution systems loads. First, a probabilistic model of some distribution system loads is developed. Then, the probability density function of the summation of the real and imaginary components of the harmonic currents is formulated. Simulation results are presented and discussed.
{"title":"Probabilistic modeling of distribution systems loads for harmonic studies","authors":"Y. Hegazy, M. Salama","doi":"10.1109/CCECE.1995.526299","DOIUrl":"https://doi.org/10.1109/CCECE.1995.526299","url":null,"abstract":"This paper presents a method for analysing the probabilistic behaviour of the randomly varying harmonic currents produced by distribution systems loads. First, a probabilistic model of some distribution system loads is developed. Then, the probability density function of the summation of the real and imaginary components of the harmonic currents is formulated. Simulation results are presented and discussed.","PeriodicalId":158581,"journal":{"name":"Proceedings 1995 Canadian Conference on Electrical and Computer Engineering","volume":"119 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1995-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116614567","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1995-09-05DOI: 10.1109/CCECE.1995.528115
M. Alie, J. Belzile, C. Thibeault
The authors propose a modification of the M-path convolutional code decoding algorithm in order to improve its performance. Due to nonexhaustive exploration of the trellis, the M-path algorithm is a suboptimal decoding algorithm. On the other hand, this elimination of certain paths from the trellis reduces its complexity in comparison with the Viterbi algorithm. The proposed modification adds to the traditional calculation of the branch metric an algebraic metric representing an estimate of the number of future symbol errors. By this new metric the performance of the M-path decoder is improved by about 0.5 dB.
{"title":"M-path decoder with algebraic metric calculation","authors":"M. Alie, J. Belzile, C. Thibeault","doi":"10.1109/CCECE.1995.528115","DOIUrl":"https://doi.org/10.1109/CCECE.1995.528115","url":null,"abstract":"The authors propose a modification of the M-path convolutional code decoding algorithm in order to improve its performance. Due to nonexhaustive exploration of the trellis, the M-path algorithm is a suboptimal decoding algorithm. On the other hand, this elimination of certain paths from the trellis reduces its complexity in comparison with the Viterbi algorithm. The proposed modification adds to the traditional calculation of the branch metric an algebraic metric representing an estimate of the number of future symbol errors. By this new metric the performance of the M-path decoder is improved by about 0.5 dB.","PeriodicalId":158581,"journal":{"name":"Proceedings 1995 Canadian Conference on Electrical and Computer Engineering","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1995-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121576476","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1995-09-05DOI: 10.1109/CCECE.1995.526612
M. Zilovic, R. Ramachandran, R. Mammone
A common problem in speaker identification systems is that a mismatch in the training and testing conditions sacrifices much performance. The authors attempt to alleviate this problem by proposing new features that show less variation when speech is corrupted by convolutional noise (channel) and/or additive noise. The conventional feature used is the linear predictive (LP) cepstrum that is derived from an all-pole transfer function which in turn achieves a good approximation to the spectral envelope of the speech. Previously, a new cepstral feature based on a pole-zero function (called the adaptive component weighted or ACW cepstrum) was introduced. The present authors propose two additional new cepstral features based on pole-zero transfer functions. One is an alternative way of doing adaptive component weighting and is called the ACW2 cepstrum. The other (known as the PFL1 cepstrum) is based on a pole-zero postfilter used in speech enhancement. Experiments involving a closed set, text-independent and vector quantizer based speaker identification system are done to compare the various features. The King database is used. The ACW and PFL1 features are generally the best. The corresponding spectra show a clear emphasis of the formants and no spectral tilt. To enhance robustness, it is important to emphasize the formants. An accurate description of the spectral envelope is not required.
{"title":"The use of robust cepstral features obtained from pole-zero transfer functions for speaker identification","authors":"M. Zilovic, R. Ramachandran, R. Mammone","doi":"10.1109/CCECE.1995.526612","DOIUrl":"https://doi.org/10.1109/CCECE.1995.526612","url":null,"abstract":"A common problem in speaker identification systems is that a mismatch in the training and testing conditions sacrifices much performance. The authors attempt to alleviate this problem by proposing new features that show less variation when speech is corrupted by convolutional noise (channel) and/or additive noise. The conventional feature used is the linear predictive (LP) cepstrum that is derived from an all-pole transfer function which in turn achieves a good approximation to the spectral envelope of the speech. Previously, a new cepstral feature based on a pole-zero function (called the adaptive component weighted or ACW cepstrum) was introduced. The present authors propose two additional new cepstral features based on pole-zero transfer functions. One is an alternative way of doing adaptive component weighting and is called the ACW2 cepstrum. The other (known as the PFL1 cepstrum) is based on a pole-zero postfilter used in speech enhancement. Experiments involving a closed set, text-independent and vector quantizer based speaker identification system are done to compare the various features. The King database is used. The ACW and PFL1 features are generally the best. The corresponding spectra show a clear emphasis of the formants and no spectral tilt. To enhance robustness, it is important to emphasize the formants. An accurate description of the spectral envelope is not required.","PeriodicalId":158581,"journal":{"name":"Proceedings 1995 Canadian Conference on Electrical and Computer Engineering","volume":"8 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1995-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123526185","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1995-09-05DOI: 10.1109/CCECE.1995.526421
A. Grzeszczak, M. Mandal, S. Panchanathan
This paper presents a VLSI implementation of discrete wavelet transform (DWT). The architecture is systolic in nature and performs both high-pass and low-pass coefficient calculations with only one set of multipliers. The architecture is simple, modular, and cascadable, and has been implemented in VLSI. Simulation results show that real-time coefficient calculation on a 512/spl times/612 pixels monochrome video input can be achieved.
{"title":"VLSI implementation of discrete wavelet transform","authors":"A. Grzeszczak, M. Mandal, S. Panchanathan","doi":"10.1109/CCECE.1995.526421","DOIUrl":"https://doi.org/10.1109/CCECE.1995.526421","url":null,"abstract":"This paper presents a VLSI implementation of discrete wavelet transform (DWT). The architecture is systolic in nature and performs both high-pass and low-pass coefficient calculations with only one set of multipliers. The architecture is simple, modular, and cascadable, and has been implemented in VLSI. Simulation results show that real-time coefficient calculation on a 512/spl times/612 pixels monochrome video input can be achieved.","PeriodicalId":158581,"journal":{"name":"Proceedings 1995 Canadian Conference on Electrical and Computer Engineering","volume":"530 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1995-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124249681","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1995-09-05DOI: 10.1109/CCECE.1995.528198
S. Huang
This paper discusses the importance of MPEG-2 video decoder compliance test and possible methods of implementing the test. According the features of MPEG-2 standard and its application requirements, three grades of compliance test configurations have been designed.
{"title":"MPEG-2 video decoder compliance test methodology","authors":"S. Huang","doi":"10.1109/CCECE.1995.528198","DOIUrl":"https://doi.org/10.1109/CCECE.1995.528198","url":null,"abstract":"This paper discusses the importance of MPEG-2 video decoder compliance test and possible methods of implementing the test. According the features of MPEG-2 standard and its application requirements, three grades of compliance test configurations have been designed.","PeriodicalId":158581,"journal":{"name":"Proceedings 1995 Canadian Conference on Electrical and Computer Engineering","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1995-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124389434","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1995-09-05DOI: 10.1109/CCECE.1995.528166
J.H. Weigelt, M.H. Rahman
Investigates the feasibility of the addition of security services directly into the B-ISDN protocol stack. A complete design of a security system for B-ISDN based networks is proposed. This design is validated through simulation. Based upon the simulation results and the current standards, the addition of a security system within the B-ISDN protocol stack is demonstrated as a viable method of securing the ATM traffic.
{"title":"Securing asynchronous transfer mode based networks through the use of encryption","authors":"J.H. Weigelt, M.H. Rahman","doi":"10.1109/CCECE.1995.528166","DOIUrl":"https://doi.org/10.1109/CCECE.1995.528166","url":null,"abstract":"Investigates the feasibility of the addition of security services directly into the B-ISDN protocol stack. A complete design of a security system for B-ISDN based networks is proposed. This design is validated through simulation. Based upon the simulation results and the current standards, the addition of a security system within the B-ISDN protocol stack is demonstrated as a viable method of securing the ATM traffic.","PeriodicalId":158581,"journal":{"name":"Proceedings 1995 Canadian Conference on Electrical and Computer Engineering","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1995-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129511277","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1995-09-05DOI: 10.1109/CCECE.1995.528066
M. El-Tarhuni, A. Sheikh
The performance of a direct sequence spread spectrum (DS-SS) code division multiple access (CDMA) communications systems is highly dependent upon the set of spreading sequences used in these systems. The multiple access interference could become very large if the spreading sequences are not carefully selected. A new numerical optimization procedure is proposed for the selection of spreading sequences based on minimizing the interference parameter among the sequences. The improvement in the average output signal-to-noise ratio or CDMA capacity improvement is used to compare the performance of the optimized code set with that of the set of Gold codes of the same length. An improvement of about 26% in the system capacity is obtained. Also, construction of different optimized code sets suitable for use in cellular systems applications is considered.
{"title":"Numerical optimization for CDMA spreading sequences","authors":"M. El-Tarhuni, A. Sheikh","doi":"10.1109/CCECE.1995.528066","DOIUrl":"https://doi.org/10.1109/CCECE.1995.528066","url":null,"abstract":"The performance of a direct sequence spread spectrum (DS-SS) code division multiple access (CDMA) communications systems is highly dependent upon the set of spreading sequences used in these systems. The multiple access interference could become very large if the spreading sequences are not carefully selected. A new numerical optimization procedure is proposed for the selection of spreading sequences based on minimizing the interference parameter among the sequences. The improvement in the average output signal-to-noise ratio or CDMA capacity improvement is used to compare the performance of the optimized code set with that of the set of Gold codes of the same length. An improvement of about 26% in the system capacity is obtained. Also, construction of different optimized code sets suitable for use in cellular systems applications is considered.","PeriodicalId":158581,"journal":{"name":"Proceedings 1995 Canadian Conference on Electrical and Computer Engineering","volume":"34 6","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1995-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113967498","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1995-09-05DOI: 10.1109/CCECE.1995.526310
G. Zhao, F. Ghannouchi, F. Beauregard
The input average power and peak power for different numbers of multiple channels are estimated for power amplifiers operated in CDMA-based PCS down-link transmitters. Multiple QPSK spread spectrum signals have been simulated, using SPW software (signal processing worksystem). The simulation results for N/spl les/64 are given. The obtained dynamic range requirements are useful for linear power amplifiers designed for CDMA-PCS application.
{"title":"Dynamic range requirements for CDMA-based PCS power amplifiers","authors":"G. Zhao, F. Ghannouchi, F. Beauregard","doi":"10.1109/CCECE.1995.526310","DOIUrl":"https://doi.org/10.1109/CCECE.1995.526310","url":null,"abstract":"The input average power and peak power for different numbers of multiple channels are estimated for power amplifiers operated in CDMA-based PCS down-link transmitters. Multiple QPSK spread spectrum signals have been simulated, using SPW software (signal processing worksystem). The simulation results for N/spl les/64 are given. The obtained dynamic range requirements are useful for linear power amplifiers designed for CDMA-PCS application.","PeriodicalId":158581,"journal":{"name":"Proceedings 1995 Canadian Conference on Electrical and Computer Engineering","volume":"610 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1995-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114091262","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}