首页 > 最新文献

2007 International Conference on Signal Processing, Communications and Networking最新文献

英文 中文
Energy Aware Routing for Wireless Sensor Networks 无线传感器网络的能量感知路由
Pub Date : 2007-11-05 DOI: 10.1109/ICSCN.2007.350661
R. Vidhyapriya, P. Vanathi
Applications of sensor networks have become an emerging technology, which can monitor a specific area and collect environmental data around a place. In recent years, low power wireless communication and the availability of cheap and small micro sensor nodes lead to enhanced developments of wireless sensor network applications in real society. The energy constraint inherent in the small battery powered nodes presents a considerable problem, and much effort is being put into reducing the power consumption. We introduce a reactive routing protocol called energy aware routing that is intended to provide a reliable transmission environment with low energy consumption. This protocol efficiently utilizes both the energy available in the node and quality of the link to identify the best possible route to the destination. Simulation results show that the energy aware routing scheme outperforms the existing schemes even in the presence of high node density and overcomes simultaneous packet forwarding
传感器网络的应用已经成为一种新兴的技术,它可以监测一个特定的区域,收集一个地方周围的环境数据。近年来,低功耗无线通信和廉价、小微传感器节点的出现促进了无线传感器网络在现实社会中的应用发展。小型电池供电节点固有的能量限制提出了一个相当大的问题,人们正在努力降低功耗。我们引入了一种称为能量感知路由的无功路由协议,旨在提供低能耗的可靠传输环境。该协议有效地利用节点的可用能量和链路的质量来确定到达目的地的最佳可能路径。仿真结果表明,即使在节点密度较高的情况下,能量感知路由方案也优于现有的路由方案,并克服了同时转发数据包的问题
{"title":"Energy Aware Routing for Wireless Sensor Networks","authors":"R. Vidhyapriya, P. Vanathi","doi":"10.1109/ICSCN.2007.350661","DOIUrl":"https://doi.org/10.1109/ICSCN.2007.350661","url":null,"abstract":"Applications of sensor networks have become an emerging technology, which can monitor a specific area and collect environmental data around a place. In recent years, low power wireless communication and the availability of cheap and small micro sensor nodes lead to enhanced developments of wireless sensor network applications in real society. The energy constraint inherent in the small battery powered nodes presents a considerable problem, and much effort is being put into reducing the power consumption. We introduce a reactive routing protocol called energy aware routing that is intended to provide a reliable transmission environment with low energy consumption. This protocol efficiently utilizes both the energy available in the node and quality of the link to identify the best possible route to the destination. Simulation results show that the energy aware routing scheme outperforms the existing schemes even in the presence of high node density and overcomes simultaneous packet forwarding","PeriodicalId":257948,"journal":{"name":"2007 International Conference on Signal Processing, Communications and Networking","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128964756","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 90
Improved Adaptive Skip Algorithm for Video Shot Boundary Detection 视频镜头边界检测的改进自适应跳过算法
Pub Date : 2007-11-05 DOI: 10.1109/ICSCN.2007.350787
A. Baskar, M. Prabukumar, S. Sathishkumar
Video shot boundary (VSB) detection plays an important role in modern video archiving and summarization applications. The classical linear approach towards VSB detection is basically a sequential search, however this approach is computationally very expensive for large databases. In this work we propose a non-linear approach for VSB detection, which is an improvement of existing adaptive skip. The proposed technique compares less than 10% of frames in an entire video. Our experimental result shows that the proposed technique outperforms the other existing non-linear algorithms with better accuracy and meaningful VSBs
视频镜头边界(VSB)检测在现代视频存档和摘要应用中起着重要的作用。VSB检测的经典线性方法基本上是顺序搜索,但是这种方法对于大型数据库来说计算成本非常高。在这项工作中,我们提出了一种非线性的VSB检测方法,这是对现有自适应跳频的改进。所提出的技术对整个视频中不到10%的帧进行比较。实验结果表明,该方法优于现有的非线性算法,具有更好的精度和有意义的VSBs
{"title":"Improved Adaptive Skip Algorithm for Video Shot Boundary Detection","authors":"A. Baskar, M. Prabukumar, S. Sathishkumar","doi":"10.1109/ICSCN.2007.350787","DOIUrl":"https://doi.org/10.1109/ICSCN.2007.350787","url":null,"abstract":"Video shot boundary (VSB) detection plays an important role in modern video archiving and summarization applications. The classical linear approach towards VSB detection is basically a sequential search, however this approach is computationally very expensive for large databases. In this work we propose a non-linear approach for VSB detection, which is an improvement of existing adaptive skip. The proposed technique compares less than 10% of frames in an entire video. Our experimental result shows that the proposed technique outperforms the other existing non-linear algorithms with better accuracy and meaningful VSBs","PeriodicalId":257948,"journal":{"name":"2007 International Conference on Signal Processing, Communications and Networking","volume":"57 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124321069","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Design and Implementation of High Bit Rate Satellite Image Data Ingest and Processing System 高比特率卫星图像数据采集与处理系统的设计与实现
Pub Date : 2007-11-05 DOI: 10.1109/ICSCN.2007.350720
T. C. Sarmal, C. Srinivas
Remote sensing satellites orbit around the Earth around 600-900 kilometers in sun synchronous polar orbit. Each satellite transmits the image data in X-band and the data reception is carried out through a parabolic antenna along with the associated systems. The entire data acquisition system is complex and expensive as it has to meet the requirements of the fast orbiting remote sensing satellites. During the visibility of the satellite, the data is acquired at the acquisition systems, frame synchronized band separated and displayed in the monitor in real-time. The authors of this paper used the concept of archiving the RAW data directly to redundant array of inexpensive disks (RAID) in real-time and also to provide on the fly sub-sampled video image display using generic PC Based Linux Servers available in the industry. Handling of high speed image data from satellite involves de-randomization, decryption and decompression in real time. Innovative multiplexing techniques are used for digital correlation to increase the operating speed. Effective system design strategies rely on appropriate matching of systems hardware, software and environment. This needs the proper evaluation of the system environment. Schedulers for a realtime system are concerned with maximizing resource utilization subject to meeting system timing constraints. Priority-driven presumptive schedulers used in realtime systems require predictable cache performance. The design involved shared memory concepts, cache memory handling, image data handling and transfer to RAID while each system handles the data of around 500 GB per day. The paper deals with a generalized design of such system using a common platform as a part of Indian Remote Sensing Satellite Program and supplied to many users around the world. These systems are working error free all over
遥感卫星在太阳同步极轨道上绕地球运行600-900公里。每颗卫星在x波段传输图像数据,数据接收与相关系统一起通过抛物面天线进行。整个数据采集系统要满足快速轨道遥感卫星的要求,结构复杂,成本昂贵。在卫星可见期间,数据在采集系统采集,帧同步带分离并实时显示在监视器上。本文的作者采用了直接将RAW数据实时归档到冗余廉价磁盘阵列(RAID)的概念,并使用业界可用的基于PC的Linux服务器提供动态的子采样视频图像显示。高速卫星图像数据的处理涉及到实时的去随机化、解密和解压缩。采用创新的多路复用技术进行数字相关,提高运算速度。有效的系统设计策略依赖于系统硬件、软件和环境的适当匹配。这需要对系统环境进行适当的评估。实时系统的调度器关注的是在满足系统时间约束的前提下最大化资源利用率。实时系统中使用的优先级驱动的假定调度器需要可预测的缓存性能。该设计涉及共享内存概念、缓存内存处理、图像数据处理和传输到RAID,同时每个系统每天处理大约500 GB的数据。作为印度遥感卫星计划的一部分,并提供给世界各地的许多用户,本文讨论了使用通用平台的这种系统的一般设计。这些系统的工作完全没有错误
{"title":"Design and Implementation of High Bit Rate Satellite Image Data Ingest and Processing System","authors":"T. C. Sarmal, C. Srinivas","doi":"10.1109/ICSCN.2007.350720","DOIUrl":"https://doi.org/10.1109/ICSCN.2007.350720","url":null,"abstract":"Remote sensing satellites orbit around the Earth around 600-900 kilometers in sun synchronous polar orbit. Each satellite transmits the image data in X-band and the data reception is carried out through a parabolic antenna along with the associated systems. The entire data acquisition system is complex and expensive as it has to meet the requirements of the fast orbiting remote sensing satellites. During the visibility of the satellite, the data is acquired at the acquisition systems, frame synchronized band separated and displayed in the monitor in real-time. The authors of this paper used the concept of archiving the RAW data directly to redundant array of inexpensive disks (RAID) in real-time and also to provide on the fly sub-sampled video image display using generic PC Based Linux Servers available in the industry. Handling of high speed image data from satellite involves de-randomization, decryption and decompression in real time. Innovative multiplexing techniques are used for digital correlation to increase the operating speed. Effective system design strategies rely on appropriate matching of systems hardware, software and environment. This needs the proper evaluation of the system environment. Schedulers for a realtime system are concerned with maximizing resource utilization subject to meeting system timing constraints. Priority-driven presumptive schedulers used in realtime systems require predictable cache performance. The design involved shared memory concepts, cache memory handling, image data handling and transfer to RAID while each system handles the data of around 500 GB per day. The paper deals with a generalized design of such system using a common platform as a part of Indian Remote Sensing Satellite Program and supplied to many users around the world. These systems are working error free all over","PeriodicalId":257948,"journal":{"name":"2007 International Conference on Signal Processing, Communications and Networking","volume":"61 6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124323477","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Tracebacking the Spoofed IP Packets in Multi ISP Domains with Secured Communication 基于安全通信的多ISP域欺骗IP报文溯源
Pub Date : 2007-11-05 DOI: 10.1109/ICSCN.2007.350668
V. Murali Bhaskaran, A. Natarajan, S. Sivanandam
Internet protocol (IP) packet traceback system identifies the origin of the sequence of IP packets when the source addresses of these packets are spoofed. IP packet traceback is usually performed with the help of routers and gateways. Several approaches have been proposed to trace IP packets to their origin. The packet marking approach enables routers to probabilistically mark packets with partial path information and tries to reconstruct the complete path from the marked packets. In most of these approaches, routers and victims (affected systems) are considerably overloaded for marking the packet and reconstructing the trace path and requires more marked packets. This paper focuses on tracing the approximate source of attack instead of tracing the entire path in multi domain system without computation, by victim and also implementing security for authentication and confidentiality. It is assumed that Internet topology has been grouped as ISP domains
当IP报文的源地址被欺骗时,IP报文回溯系统可以识别IP报文序列的来源。IP报文回溯通常在路由器和网关的帮助下进行。已经提出了几种方法来跟踪IP数据包的来源。数据包标记方法使路由器能够对具有部分路径信息的数据包进行概率标记,并尝试从标记的数据包中重建完整的路径。在大多数这些方法中,路由器和受害者(受影响的系统)在标记数据包和重建跟踪路径方面的负荷相当大,并且需要更多标记的数据包。本文的重点是在多域系统中,不需要计算就可以跟踪攻击的整个路径,而是通过受害者来跟踪攻击的大致来源,并实现认证和保密的安全性。假设Internet拓扑结构已被分组为多个ISP域
{"title":"Tracebacking the Spoofed IP Packets in Multi ISP Domains with Secured Communication","authors":"V. Murali Bhaskaran, A. Natarajan, S. Sivanandam","doi":"10.1109/ICSCN.2007.350668","DOIUrl":"https://doi.org/10.1109/ICSCN.2007.350668","url":null,"abstract":"Internet protocol (IP) packet traceback system identifies the origin of the sequence of IP packets when the source addresses of these packets are spoofed. IP packet traceback is usually performed with the help of routers and gateways. Several approaches have been proposed to trace IP packets to their origin. The packet marking approach enables routers to probabilistically mark packets with partial path information and tries to reconstruct the complete path from the marked packets. In most of these approaches, routers and victims (affected systems) are considerably overloaded for marking the packet and reconstructing the trace path and requires more marked packets. This paper focuses on tracing the approximate source of attack instead of tracing the entire path in multi domain system without computation, by victim and also implementing security for authentication and confidentiality. It is assumed that Internet topology has been grouped as ISP domains","PeriodicalId":257948,"journal":{"name":"2007 International Conference on Signal Processing, Communications and Networking","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126278838","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Radiation Characteristics of Photonic Antenna for Optical Wireless Communication using Beam Propagation Method 波束传播光无线通信光子天线的辐射特性
Pub Date : 2007-11-05 DOI: 10.1109/ICSCN.2007.350750
L. Suresh, S. Sundaravadivelu
The optical wireless communication is the only solution to the emerging next generation wireless communication. The photonic antennas play major role in the development of optical wireless communications. This photonic antenna transfers light energy from optical waveguide to free-space with high directionality and act as a matching device between optical source and channel (atmosphere). The analysis of light propagation through waveguide structures is indispensable in designing complex photonic devices. The optical waveguide grating structures with multiple longitudinal reflecting interfaces are analyzed to form photonic antennas. The multilayer triangular grating structure is analyzed using beam propagation method for its ability and suitability to optical wireless communication. The beam propagation method (BPM), extensively used tool for computer simulation of light propagation in optical waveguide structures, has been developed for analyzing optical waveguides with discontinuities in transmission, reflection and radiations. The discontinuities comprise changes in core thickness and effective refractive index. The optical powers radiated and transmitted at an abrupt discontinuity in waveguide gratings are calculated numerically by means of BPM for TE modes, and applied to the eigen mode and propagating beam analysis of that structure. The current method achieves soaring precision and converging time is significantly abridged and it is proportional to the log of the total number of periods in the waveguide than that in the conventional time-domain method. This paper intends a novel integrated photonic antenna with snooty directional efficiency and radiation which can be tattered for protracted distance optical wireless communication. The consequences confirm that it is promising to curtail radiation loss under sturdy mode coupling conditions. This method can be used for modeling of laser beam propagation in non-homogeneous atmosphere
光无线通信是新兴的下一代无线通信的唯一解决方案。光子天线在光无线通信的发展中起着重要的作用。这种光子天线将光能从光波导传输到具有高方向性的自由空间,并充当光源与信道(大气)之间的匹配装置。在设计复杂的光子器件时,光在波导结构中的传播分析是必不可少的。分析了具有多个纵向反射界面的光波导光栅结构构成的光子天线。用光束传播法分析了多层三角形光栅结构在光无线通信中的性能和适用性。光束传播方法(BPM)是一种用于分析具有传输、反射和辐射不连续的光波导的方法,是光在光波导结构中传播的计算机模拟工具。不连续性包括磁芯厚度和有效折射率的变化。利用BPM方法对TE模式进行了数值计算,并应用于该结构的本征模式和传播光束分析。与传统的时域方法相比,该方法的精度大大提高,收敛时间明显缩短,且与波导总周期数的对数成正比。本文设计了一种新型的定向效率高、辐射强的集成光子天线,可用于长距离光无线通信。结果证实,在强模耦合条件下,它有望减少辐射损失。该方法可用于模拟激光在非均匀大气中的传播
{"title":"Radiation Characteristics of Photonic Antenna for Optical Wireless Communication using Beam Propagation Method","authors":"L. Suresh, S. Sundaravadivelu","doi":"10.1109/ICSCN.2007.350750","DOIUrl":"https://doi.org/10.1109/ICSCN.2007.350750","url":null,"abstract":"The optical wireless communication is the only solution to the emerging next generation wireless communication. The photonic antennas play major role in the development of optical wireless communications. This photonic antenna transfers light energy from optical waveguide to free-space with high directionality and act as a matching device between optical source and channel (atmosphere). The analysis of light propagation through waveguide structures is indispensable in designing complex photonic devices. The optical waveguide grating structures with multiple longitudinal reflecting interfaces are analyzed to form photonic antennas. The multilayer triangular grating structure is analyzed using beam propagation method for its ability and suitability to optical wireless communication. The beam propagation method (BPM), extensively used tool for computer simulation of light propagation in optical waveguide structures, has been developed for analyzing optical waveguides with discontinuities in transmission, reflection and radiations. The discontinuities comprise changes in core thickness and effective refractive index. The optical powers radiated and transmitted at an abrupt discontinuity in waveguide gratings are calculated numerically by means of BPM for TE modes, and applied to the eigen mode and propagating beam analysis of that structure. The current method achieves soaring precision and converging time is significantly abridged and it is proportional to the log of the total number of periods in the waveguide than that in the conventional time-domain method. This paper intends a novel integrated photonic antenna with snooty directional efficiency and radiation which can be tattered for protracted distance optical wireless communication. The consequences confirm that it is promising to curtail radiation loss under sturdy mode coupling conditions. This method can be used for modeling of laser beam propagation in non-homogeneous atmosphere","PeriodicalId":257948,"journal":{"name":"2007 International Conference on Signal Processing, Communications and Networking","volume":"154 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134124349","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Application Level IDS using Protocol Analysis 使用协议分析的应用层IDS
Pub Date : 2007-11-05 DOI: 10.1109/ICSCN.2007.350762
K. Rajkumar, V. Vaidehi, S. Pradeep, N. Srinivasan, M. Vanishree
As network attacks have increased in number and severity over the past few years, intrusion detection systems have become a necessary addition to the security infrastructure of most organizations. From a security perspective, firewalls and SSL offer little protection. Web traffic often contains attacks such as cross-site scripting and SQL injection that enter through port 80 and are not blocked by the firewall. Among the Web applications HTTP holds the majority share of the traffic transported through Web. In this paper, implementation of an application level IDS has been presented which uses combination of pattern matching and protocol analysis approaches. The first method of detection relies on a multi pattern matching within the protocol fields, the second one provides an efficient decision tree adaptive to the application traffic characteristics to limit the number of patterns to be checked. The proposed IDS can be effectively implemented in a high performance semantic processor
在过去的几年中,随着网络攻击的数量和严重程度的增加,入侵检测系统已经成为大多数组织安全基础设施的必要补充。从安全角度来看,防火墙和SSL提供的保护很少。Web流量通常包含跨站点脚本和SQL注入等攻击,这些攻击通过端口80进入,不会被防火墙阻止。在Web应用程序中,HTTP占有通过Web传输的流量的大部分份额。本文提出了一种结合模式匹配和协议分析方法的应用层入侵检测系统的实现方法。第一种检测方法依赖于协议字段内的多模式匹配,第二种检测方法提供了一种适应应用程序流量特征的有效决策树,以限制要检查的模式数量。所提出的IDS可以在高性能语义处理器中有效实现
{"title":"Application Level IDS using Protocol Analysis","authors":"K. Rajkumar, V. Vaidehi, S. Pradeep, N. Srinivasan, M. Vanishree","doi":"10.1109/ICSCN.2007.350762","DOIUrl":"https://doi.org/10.1109/ICSCN.2007.350762","url":null,"abstract":"As network attacks have increased in number and severity over the past few years, intrusion detection systems have become a necessary addition to the security infrastructure of most organizations. From a security perspective, firewalls and SSL offer little protection. Web traffic often contains attacks such as cross-site scripting and SQL injection that enter through port 80 and are not blocked by the firewall. Among the Web applications HTTP holds the majority share of the traffic transported through Web. In this paper, implementation of an application level IDS has been presented which uses combination of pattern matching and protocol analysis approaches. The first method of detection relies on a multi pattern matching within the protocol fields, the second one provides an efficient decision tree adaptive to the application traffic characteristics to limit the number of patterns to be checked. The proposed IDS can be effectively implemented in a high performance semantic processor","PeriodicalId":257948,"journal":{"name":"2007 International Conference on Signal Processing, Communications and Networking","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123800858","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Number Theory Based Image Compression Encryption and Application to Image Multiplexing 基于数论的图像压缩加密及其在图像复用中的应用
Pub Date : 2007-11-05 DOI: 10.1109/ICSCN.2007.350696
V. Jagannathan, A. Mahadevan, R. Hariharan, S. Srinivasan
Image compression and image encryption are pivotal to proper storage and transmission of images. Simultaneous image compression and encryption aims at achieving enhanced bandwidth utilization and security at the same time. The proposed number theory based image compression encryption (NTICE) algorithm employs number theoretic paradigm-Chinese remainder theorem, to solve congruencies and hence realize the twin ideals of compression and encryption simultaneously. The NTICE algorithm has been implemented on color images. The image coding results, calculated from actual image size and encoded image file, are comparable to the results obtained through much more sophisticated and computationally complex methods. In addition, the algorithm has been applied to the scenario of image multiplexing in order to obtain enhanced level of security along with compression
图像压缩和图像加密是保证图像存储和传输的关键。同时进行图像压缩和加密的目的是同时提高带宽利用率和安全性。本文提出的基于数论的图像压缩加密算法(NTICE)采用数论范式——中国剩余定理来求解图像的同余性,从而同时实现压缩和加密的双重理想。在彩色图像上实现了NTICE算法。根据实际图像大小和编码图像文件计算的图像编码结果与通过更复杂和计算复杂的方法获得的结果相当。此外,该算法已应用于图像复用场景,在压缩的同时获得更高的安全性
{"title":"Number Theory Based Image Compression Encryption and Application to Image Multiplexing","authors":"V. Jagannathan, A. Mahadevan, R. Hariharan, S. Srinivasan","doi":"10.1109/ICSCN.2007.350696","DOIUrl":"https://doi.org/10.1109/ICSCN.2007.350696","url":null,"abstract":"Image compression and image encryption are pivotal to proper storage and transmission of images. Simultaneous image compression and encryption aims at achieving enhanced bandwidth utilization and security at the same time. The proposed number theory based image compression encryption (NTICE) algorithm employs number theoretic paradigm-Chinese remainder theorem, to solve congruencies and hence realize the twin ideals of compression and encryption simultaneously. The NTICE algorithm has been implemented on color images. The image coding results, calculated from actual image size and encoded image file, are comparable to the results obtained through much more sophisticated and computationally complex methods. In addition, the algorithm has been applied to the scenario of image multiplexing in order to obtain enhanced level of security along with compression","PeriodicalId":257948,"journal":{"name":"2007 International Conference on Signal Processing, Communications and Networking","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123976198","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
A 1 GHz Pipelined Low Power Floating Point Arithmetic Unit with Modified Scheduling for High Speed Applications 一种适用于高速应用的1ghz流水线低功耗浮点运算单元
Pub Date : 2007-11-05 DOI: 10.1109/ICSCN.2007.350766
K.M. Mukund, S. Seshadri, J. Devarajulu, M. Kannan
This paper proposes an architecture for a pipelined 1 GHz floating point arithmetic unit incorporated with the concept of modified dynamic scheduling which enables the unit to accept an input instruction every clock cycle until there is an output clash, in which case the outputs are sent out based on the first in first out concept. The architecture proposed has three independent functional units, which can be issued with instructions either one at a time using a small control word or in parallel using a large control word based on the dependency of input operations. The entire design has been simulated using Cadence NcSim. Synthesis and advanced flows such as low power, design for testability and multi Vt flows have been carried out with Cadence RTL compiler to ensure low power and maximum frequency of operation
本文提出了一种采用改进动态调度概念的流水线1ghz浮点运算单元架构,该架构使该单元能够在每个时钟周期内接受一个输入指令,直到出现输出冲突,在这种情况下,输出根据先进先出的概念发送出去。所提出的体系结构有三个独立的功能单元,它们可以使用一个小控制字一次发出指令,也可以根据输入操作的依赖性使用一个大控制字并行发出指令。整个设计已经使用Cadence NcSim进行了模拟。使用Cadence RTL编译器进行低功耗、可测试性设计和多Vt流等综合和高级流程,以确保低功耗和最大运行频率
{"title":"A 1 GHz Pipelined Low Power Floating Point Arithmetic Unit with Modified Scheduling for High Speed Applications","authors":"K.M. Mukund, S. Seshadri, J. Devarajulu, M. Kannan","doi":"10.1109/ICSCN.2007.350766","DOIUrl":"https://doi.org/10.1109/ICSCN.2007.350766","url":null,"abstract":"This paper proposes an architecture for a pipelined 1 GHz floating point arithmetic unit incorporated with the concept of modified dynamic scheduling which enables the unit to accept an input instruction every clock cycle until there is an output clash, in which case the outputs are sent out based on the first in first out concept. The architecture proposed has three independent functional units, which can be issued with instructions either one at a time using a small control word or in parallel using a large control word based on the dependency of input operations. The entire design has been simulated using Cadence NcSim. Synthesis and advanced flows such as low power, design for testability and multi Vt flows have been carried out with Cadence RTL compiler to ensure low power and maximum frequency of operation","PeriodicalId":257948,"journal":{"name":"2007 International Conference on Signal Processing, Communications and Networking","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122735343","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Simulation and Analysis of Performance Models of Broadband Intelligent Mobile Networks 宽带智能移动网络性能模型仿真与分析
Pub Date : 2007-11-05 DOI: 10.1109/ICSCN.2007.350667
K. Yashwanth Reddy, N.V. Deepa Gandhi, K. Balachander
The present thrust is to develop a broadband intelligent network system which is able to sustain a large number of users and a varying amount of data while maintaining high availability of resources and acceptable performance. In such a scenario, scalability is an important aspect. In this paper we consider the impact of increasing the number of users supported by a network node and show that the network is scalable. Also congestion control is necessary to protect the broadband service control point during overload situations. Existing algorithms do not operate optimally with respect to important performance criteria such as responsiveness, efficiency and fairness. Here we try to identify their shortcomings and propose few enhancements. We also show that the proposed enhanced call-gapping algorithm performs consistently better than the existing automatic call-gapping algorithm in terms of above-mentioned criteria. The effectiveness of this analysis are shown using NS-2 simulator
目前的重点是发展一种宽带智能网络系统,该系统能够维持大量用户和不同数量的数据,同时保持资源的高可用性和可接受的性能。在这种情况下,可伸缩性是一个重要方面。在本文中,我们考虑了增加网络节点支持的用户数量的影响,并证明了网络是可扩展的。此外,拥塞控制是必要的,以保护宽带业务控制点在过载情况下。现有算法在响应性、效率和公平性等重要性能标准方面不能达到最佳。在这里,我们试图找出它们的缺点,并提出一些改进建议。我们还表明,在上述标准下,所提出的增强调用间隔算法的性能始终优于现有的自动调用间隔算法。利用NS-2仿真器验证了该分析的有效性
{"title":"Simulation and Analysis of Performance Models of Broadband Intelligent Mobile Networks","authors":"K. Yashwanth Reddy, N.V. Deepa Gandhi, K. Balachander","doi":"10.1109/ICSCN.2007.350667","DOIUrl":"https://doi.org/10.1109/ICSCN.2007.350667","url":null,"abstract":"The present thrust is to develop a broadband intelligent network system which is able to sustain a large number of users and a varying amount of data while maintaining high availability of resources and acceptable performance. In such a scenario, scalability is an important aspect. In this paper we consider the impact of increasing the number of users supported by a network node and show that the network is scalable. Also congestion control is necessary to protect the broadband service control point during overload situations. Existing algorithms do not operate optimally with respect to important performance criteria such as responsiveness, efficiency and fairness. Here we try to identify their shortcomings and propose few enhancements. We also show that the proposed enhanced call-gapping algorithm performs consistently better than the existing automatic call-gapping algorithm in terms of above-mentioned criteria. The effectiveness of this analysis are shown using NS-2 simulator","PeriodicalId":257948,"journal":{"name":"2007 International Conference on Signal Processing, Communications and Networking","volume":"359 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122760277","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Geometric Model and Projection Based Algorithms for Tilt Correction and Extraction of Acsenders / Descenders for Cursive Word Recognition 基于几何模型和投影的倾斜校正算法及草书词识别的上行/下行点提取
Pub Date : 2007-11-05 DOI: 10.1109/ICSCN.2007.350786
P. Nagabhushan, S. Angadi, B. Anami
Cursive word recognition requires tilt correction before extraction of features such as ascenders and descenders. Skew and slant are the two types of tilts found in cursive word images. This paper presents new algorithms for skew and slant correction using geometric model and image projections. A new algorithm for extraction of ascenders/descenders based on fitting top line and base line references using horizontal histogram projection of the image is also presented. The algorithms are tested on a large sample of 'area' name images drawn from postal addresses. The tilt correction algorithms have been tested on a large sample of images and the results are encouraging. The ascenders/descenders are correctly extracted from 87.86% of test images
草书词识别需要在提取上升和下降等特征之前进行倾斜校正。歪斜和倾斜是草书文字图像中的两种倾斜类型。本文提出了一种利用几何模型和图像投影进行倾斜和倾斜校正的新算法。提出了一种基于图像水平直方图投影拟合顶线和基准线的上升/下降点提取算法。这些算法在从邮政地址中抽取的大量“地区”名称图像样本上进行了测试。倾斜校正算法已经在大量图像样本上进行了测试,结果令人鼓舞。从87.86%的测试图像中正确提取了上升/下降点
{"title":"Geometric Model and Projection Based Algorithms for Tilt Correction and Extraction of Acsenders / Descenders for Cursive Word Recognition","authors":"P. Nagabhushan, S. Angadi, B. Anami","doi":"10.1109/ICSCN.2007.350786","DOIUrl":"https://doi.org/10.1109/ICSCN.2007.350786","url":null,"abstract":"Cursive word recognition requires tilt correction before extraction of features such as ascenders and descenders. Skew and slant are the two types of tilts found in cursive word images. This paper presents new algorithms for skew and slant correction using geometric model and image projections. A new algorithm for extraction of ascenders/descenders based on fitting top line and base line references using horizontal histogram projection of the image is also presented. The algorithms are tested on a large sample of 'area' name images drawn from postal addresses. The tilt correction algorithms have been tested on a large sample of images and the results are encouraging. The ascenders/descenders are correctly extracted from 87.86% of test images","PeriodicalId":257948,"journal":{"name":"2007 International Conference on Signal Processing, Communications and Networking","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128909939","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
期刊
2007 International Conference on Signal Processing, Communications and Networking
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1