首页 > 最新文献

2007 International Conference on Signal Processing, Communications and Networking最新文献

英文 中文
Improved Adaptive Skip Algorithm for Video Shot Boundary Detection 视频镜头边界检测的改进自适应跳过算法
Pub Date : 2007-11-05 DOI: 10.1109/ICSCN.2007.350787
A. Baskar, M. Prabukumar, S. Sathishkumar
Video shot boundary (VSB) detection plays an important role in modern video archiving and summarization applications. The classical linear approach towards VSB detection is basically a sequential search, however this approach is computationally very expensive for large databases. In this work we propose a non-linear approach for VSB detection, which is an improvement of existing adaptive skip. The proposed technique compares less than 10% of frames in an entire video. Our experimental result shows that the proposed technique outperforms the other existing non-linear algorithms with better accuracy and meaningful VSBs
视频镜头边界(VSB)检测在现代视频存档和摘要应用中起着重要的作用。VSB检测的经典线性方法基本上是顺序搜索,但是这种方法对于大型数据库来说计算成本非常高。在这项工作中,我们提出了一种非线性的VSB检测方法,这是对现有自适应跳频的改进。所提出的技术对整个视频中不到10%的帧进行比较。实验结果表明,该方法优于现有的非线性算法,具有更好的精度和有意义的VSBs
{"title":"Improved Adaptive Skip Algorithm for Video Shot Boundary Detection","authors":"A. Baskar, M. Prabukumar, S. Sathishkumar","doi":"10.1109/ICSCN.2007.350787","DOIUrl":"https://doi.org/10.1109/ICSCN.2007.350787","url":null,"abstract":"Video shot boundary (VSB) detection plays an important role in modern video archiving and summarization applications. The classical linear approach towards VSB detection is basically a sequential search, however this approach is computationally very expensive for large databases. In this work we propose a non-linear approach for VSB detection, which is an improvement of existing adaptive skip. The proposed technique compares less than 10% of frames in an entire video. Our experimental result shows that the proposed technique outperforms the other existing non-linear algorithms with better accuracy and meaningful VSBs","PeriodicalId":257948,"journal":{"name":"2007 International Conference on Signal Processing, Communications and Networking","volume":"57 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124321069","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Computer Aided Medical Diagnosis for the Identification of Malaria Parasites 疟疾寄生虫鉴定的计算机辅助医学诊断
Pub Date : 2007-11-05 DOI: 10.1109/ICSCN.2007.350655
S.F. Toha, U. K. Ngah
This paper presents one of the applications of digital image processing in artificial intelligence particularly in the field of medical diagnosis system. Currently in Malaysia the traditional method for the identification of Malaria parasites requires a trained technologist to manually examine and detect the number of the parasites subsequently by reading the slides. This is a very time consuming process, causes operator fatigue and is prone to human errors and inconsistency. An automated system is therefore needed to complete as much work as possible for the identification of Malaria parasites. The integration both soft computing tools has been successfully designed with the capability to improve the quality of the image, analyze and classify the image as well as calculating the number of Malaria parasites
本文介绍了数字图像处理技术在人工智能特别是医疗诊断系统中的应用。目前在马来西亚,鉴定疟疾寄生虫的传统方法需要一名训练有素的技术人员随后通过阅读幻灯片手工检查和检测寄生虫的数量。这是一个非常耗时的过程,会导致操作员疲劳,并且容易出现人为错误和不一致。因此,需要一个自动化系统来完成尽可能多的工作,以鉴定疟疾寄生虫。成功地设计了两种软件计算工具的集成,具有提高图像质量、分析和分类图像以及计算疟疾寄生虫数量的能力
{"title":"Computer Aided Medical Diagnosis for the Identification of Malaria Parasites","authors":"S.F. Toha, U. K. Ngah","doi":"10.1109/ICSCN.2007.350655","DOIUrl":"https://doi.org/10.1109/ICSCN.2007.350655","url":null,"abstract":"This paper presents one of the applications of digital image processing in artificial intelligence particularly in the field of medical diagnosis system. Currently in Malaysia the traditional method for the identification of Malaria parasites requires a trained technologist to manually examine and detect the number of the parasites subsequently by reading the slides. This is a very time consuming process, causes operator fatigue and is prone to human errors and inconsistency. An automated system is therefore needed to complete as much work as possible for the identification of Malaria parasites. The integration both soft computing tools has been successfully designed with the capability to improve the quality of the image, analyze and classify the image as well as calculating the number of Malaria parasites","PeriodicalId":257948,"journal":{"name":"2007 International Conference on Signal Processing, Communications and Networking","volume":"82 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130285141","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 32
Radiation Characteristics of Photonic Antenna for Optical Wireless Communication using Beam Propagation Method 波束传播光无线通信光子天线的辐射特性
Pub Date : 2007-11-05 DOI: 10.1109/ICSCN.2007.350750
L. Suresh, S. Sundaravadivelu
The optical wireless communication is the only solution to the emerging next generation wireless communication. The photonic antennas play major role in the development of optical wireless communications. This photonic antenna transfers light energy from optical waveguide to free-space with high directionality and act as a matching device between optical source and channel (atmosphere). The analysis of light propagation through waveguide structures is indispensable in designing complex photonic devices. The optical waveguide grating structures with multiple longitudinal reflecting interfaces are analyzed to form photonic antennas. The multilayer triangular grating structure is analyzed using beam propagation method for its ability and suitability to optical wireless communication. The beam propagation method (BPM), extensively used tool for computer simulation of light propagation in optical waveguide structures, has been developed for analyzing optical waveguides with discontinuities in transmission, reflection and radiations. The discontinuities comprise changes in core thickness and effective refractive index. The optical powers radiated and transmitted at an abrupt discontinuity in waveguide gratings are calculated numerically by means of BPM for TE modes, and applied to the eigen mode and propagating beam analysis of that structure. The current method achieves soaring precision and converging time is significantly abridged and it is proportional to the log of the total number of periods in the waveguide than that in the conventional time-domain method. This paper intends a novel integrated photonic antenna with snooty directional efficiency and radiation which can be tattered for protracted distance optical wireless communication. The consequences confirm that it is promising to curtail radiation loss under sturdy mode coupling conditions. This method can be used for modeling of laser beam propagation in non-homogeneous atmosphere
光无线通信是新兴的下一代无线通信的唯一解决方案。光子天线在光无线通信的发展中起着重要的作用。这种光子天线将光能从光波导传输到具有高方向性的自由空间,并充当光源与信道(大气)之间的匹配装置。在设计复杂的光子器件时,光在波导结构中的传播分析是必不可少的。分析了具有多个纵向反射界面的光波导光栅结构构成的光子天线。用光束传播法分析了多层三角形光栅结构在光无线通信中的性能和适用性。光束传播方法(BPM)是一种用于分析具有传输、反射和辐射不连续的光波导的方法,是光在光波导结构中传播的计算机模拟工具。不连续性包括磁芯厚度和有效折射率的变化。利用BPM方法对TE模式进行了数值计算,并应用于该结构的本征模式和传播光束分析。与传统的时域方法相比,该方法的精度大大提高,收敛时间明显缩短,且与波导总周期数的对数成正比。本文设计了一种新型的定向效率高、辐射强的集成光子天线,可用于长距离光无线通信。结果证实,在强模耦合条件下,它有望减少辐射损失。该方法可用于模拟激光在非均匀大气中的传播
{"title":"Radiation Characteristics of Photonic Antenna for Optical Wireless Communication using Beam Propagation Method","authors":"L. Suresh, S. Sundaravadivelu","doi":"10.1109/ICSCN.2007.350750","DOIUrl":"https://doi.org/10.1109/ICSCN.2007.350750","url":null,"abstract":"The optical wireless communication is the only solution to the emerging next generation wireless communication. The photonic antennas play major role in the development of optical wireless communications. This photonic antenna transfers light energy from optical waveguide to free-space with high directionality and act as a matching device between optical source and channel (atmosphere). The analysis of light propagation through waveguide structures is indispensable in designing complex photonic devices. The optical waveguide grating structures with multiple longitudinal reflecting interfaces are analyzed to form photonic antennas. The multilayer triangular grating structure is analyzed using beam propagation method for its ability and suitability to optical wireless communication. The beam propagation method (BPM), extensively used tool for computer simulation of light propagation in optical waveguide structures, has been developed for analyzing optical waveguides with discontinuities in transmission, reflection and radiations. The discontinuities comprise changes in core thickness and effective refractive index. The optical powers radiated and transmitted at an abrupt discontinuity in waveguide gratings are calculated numerically by means of BPM for TE modes, and applied to the eigen mode and propagating beam analysis of that structure. The current method achieves soaring precision and converging time is significantly abridged and it is proportional to the log of the total number of periods in the waveguide than that in the conventional time-domain method. This paper intends a novel integrated photonic antenna with snooty directional efficiency and radiation which can be tattered for protracted distance optical wireless communication. The consequences confirm that it is promising to curtail radiation loss under sturdy mode coupling conditions. This method can be used for modeling of laser beam propagation in non-homogeneous atmosphere","PeriodicalId":257948,"journal":{"name":"2007 International Conference on Signal Processing, Communications and Networking","volume":"154 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134124349","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Tracebacking the Spoofed IP Packets in Multi ISP Domains with Secured Communication 基于安全通信的多ISP域欺骗IP报文溯源
Pub Date : 2007-11-05 DOI: 10.1109/ICSCN.2007.350668
V. Murali Bhaskaran, A. Natarajan, S. Sivanandam
Internet protocol (IP) packet traceback system identifies the origin of the sequence of IP packets when the source addresses of these packets are spoofed. IP packet traceback is usually performed with the help of routers and gateways. Several approaches have been proposed to trace IP packets to their origin. The packet marking approach enables routers to probabilistically mark packets with partial path information and tries to reconstruct the complete path from the marked packets. In most of these approaches, routers and victims (affected systems) are considerably overloaded for marking the packet and reconstructing the trace path and requires more marked packets. This paper focuses on tracing the approximate source of attack instead of tracing the entire path in multi domain system without computation, by victim and also implementing security for authentication and confidentiality. It is assumed that Internet topology has been grouped as ISP domains
当IP报文的源地址被欺骗时,IP报文回溯系统可以识别IP报文序列的来源。IP报文回溯通常在路由器和网关的帮助下进行。已经提出了几种方法来跟踪IP数据包的来源。数据包标记方法使路由器能够对具有部分路径信息的数据包进行概率标记,并尝试从标记的数据包中重建完整的路径。在大多数这些方法中,路由器和受害者(受影响的系统)在标记数据包和重建跟踪路径方面的负荷相当大,并且需要更多标记的数据包。本文的重点是在多域系统中,不需要计算就可以跟踪攻击的整个路径,而是通过受害者来跟踪攻击的大致来源,并实现认证和保密的安全性。假设Internet拓扑结构已被分组为多个ISP域
{"title":"Tracebacking the Spoofed IP Packets in Multi ISP Domains with Secured Communication","authors":"V. Murali Bhaskaran, A. Natarajan, S. Sivanandam","doi":"10.1109/ICSCN.2007.350668","DOIUrl":"https://doi.org/10.1109/ICSCN.2007.350668","url":null,"abstract":"Internet protocol (IP) packet traceback system identifies the origin of the sequence of IP packets when the source addresses of these packets are spoofed. IP packet traceback is usually performed with the help of routers and gateways. Several approaches have been proposed to trace IP packets to their origin. The packet marking approach enables routers to probabilistically mark packets with partial path information and tries to reconstruct the complete path from the marked packets. In most of these approaches, routers and victims (affected systems) are considerably overloaded for marking the packet and reconstructing the trace path and requires more marked packets. This paper focuses on tracing the approximate source of attack instead of tracing the entire path in multi domain system without computation, by victim and also implementing security for authentication and confidentiality. It is assumed that Internet topology has been grouped as ISP domains","PeriodicalId":257948,"journal":{"name":"2007 International Conference on Signal Processing, Communications and Networking","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126278838","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Multi-user Detection for the Optical CDMA: One Stage Optical Parallel Interference Cancellation 光CDMA的多用户检测:一级光并行干扰消除
Pub Date : 2007-11-05 DOI: 10.1109/ICSCN.2007.350749
N. Elfadel, E. Idriss, A. Mohammed, A. Aziz, N. Saad
The need for high speed networks has motivated the telecommunication community to investigate the potential of optical code division multiple access (OCDMA) in local area networks. However, multiple access interference (MAI), which increases with the number of simultaneous users, severely limits the capacity of the system. Optical parallel interference cancellation (OPIC) has been used to reduce the effect of MAI. The drawback of OPIC is that, it increases the demand for hardware complexity, resulting into higher processing time and cost. To overcome these difficulties, an efficient method is presented in this paper called, one stage optical parallel interference cancellation (OS-OPIC) which is based mainly on OPIC. Performance analysis of the proposed design is done using optical orthogonal code (OOC) as signature sequence and new expression for error probability is demonstrated. It is shown that, the proposed method is effective to reduce the hardware complexity, processing time and cost while maintaining the same bit error probability at the cost of increasing threshold value
对高速网络的需求促使电信界研究光码分多址(OCDMA)在局域网中的潜力。然而,随着用户数量的增加,多址干扰严重限制了系统的容量。光学平行干涉消除技术(OPIC)被用于降低MAI的影响。OPIC的缺点是,它增加了对硬件复杂性的需求,从而导致更高的处理时间和成本。为了克服这些困难,本文提出了一种基于单级光并行干涉消除(OS-OPIC)的有效方法。采用光学正交码(OOC)作为签名序列对设计方案进行了性能分析,并给出了错误概率的新表达式。结果表明,该方法在以提高阈值为代价保持相同误码概率的情况下,有效地降低了硬件复杂度、处理时间和成本
{"title":"Multi-user Detection for the Optical CDMA: One Stage Optical Parallel Interference Cancellation","authors":"N. Elfadel, E. Idriss, A. Mohammed, A. Aziz, N. Saad","doi":"10.1109/ICSCN.2007.350749","DOIUrl":"https://doi.org/10.1109/ICSCN.2007.350749","url":null,"abstract":"The need for high speed networks has motivated the telecommunication community to investigate the potential of optical code division multiple access (OCDMA) in local area networks. However, multiple access interference (MAI), which increases with the number of simultaneous users, severely limits the capacity of the system. Optical parallel interference cancellation (OPIC) has been used to reduce the effect of MAI. The drawback of OPIC is that, it increases the demand for hardware complexity, resulting into higher processing time and cost. To overcome these difficulties, an efficient method is presented in this paper called, one stage optical parallel interference cancellation (OS-OPIC) which is based mainly on OPIC. Performance analysis of the proposed design is done using optical orthogonal code (OOC) as signature sequence and new expression for error probability is demonstrated. It is shown that, the proposed method is effective to reduce the hardware complexity, processing time and cost while maintaining the same bit error probability at the cost of increasing threshold value","PeriodicalId":257948,"journal":{"name":"2007 International Conference on Signal Processing, Communications and Networking","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114858105","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A Clustering Technique using Density Difference 一种基于密度差的聚类技术
Pub Date : 2007-11-05 DOI: 10.1109/ICSCN.2007.350675
B. Borah, D. Bhattacharyya
Finding clusters with widely differing sizes, shapes and densities in presence of noise and outliers is a challenging job. The DBSCAN algorithm is a versatile clustering algorithm that can find clusters with differing size and shape in databases containing noise and outliers. But it cannot find clusters with different densities. We extend the DBSCAN algorithm so that it can also detect clusters that differ in densities. While expanding a cluster local density is taken into consideration. Starting with a core object a cluster is extended by expanding only those density connected core objects whose neighbourhood sizes are within certain ranges as determined by their neighbours already existing in the cluster. Our algorithm detects clusters even if they are not separated by sparse regions. The computational complexity of the modified algorithm (O(n log n)) remains same as the original DBSCAN
在存在噪声和异常值的情况下,寻找大小、形状和密度差异很大的集群是一项具有挑战性的工作。DBSCAN算法是一种通用的聚类算法,可以在包含噪声和离群值的数据库中发现大小和形状不同的聚类。但是它找不到密度不同的星团。我们扩展了DBSCAN算法,使它也可以检测密度不同的群集。在扩展集群时,考虑了局部密度。从一个核心对象开始,只扩展那些密度相连的核心对象,这些核心对象的邻居大小在一定范围内,这是由它们在集群中已经存在的邻居决定的。我们的算法检测聚类,即使它们没有被稀疏区域分开。改进算法的计算复杂度为O(n log n),与原DBSCAN算法保持一致
{"title":"A Clustering Technique using Density Difference","authors":"B. Borah, D. Bhattacharyya","doi":"10.1109/ICSCN.2007.350675","DOIUrl":"https://doi.org/10.1109/ICSCN.2007.350675","url":null,"abstract":"Finding clusters with widely differing sizes, shapes and densities in presence of noise and outliers is a challenging job. The DBSCAN algorithm is a versatile clustering algorithm that can find clusters with differing size and shape in databases containing noise and outliers. But it cannot find clusters with different densities. We extend the DBSCAN algorithm so that it can also detect clusters that differ in densities. While expanding a cluster local density is taken into consideration. Starting with a core object a cluster is extended by expanding only those density connected core objects whose neighbourhood sizes are within certain ranges as determined by their neighbours already existing in the cluster. Our algorithm detects clusters even if they are not separated by sparse regions. The computational complexity of the modified algorithm (O(n log n)) remains same as the original DBSCAN","PeriodicalId":257948,"journal":{"name":"2007 International Conference on Signal Processing, Communications and Networking","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122452967","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 27
Application Level IDS using Protocol Analysis 使用协议分析的应用层IDS
Pub Date : 2007-11-05 DOI: 10.1109/ICSCN.2007.350762
K. Rajkumar, V. Vaidehi, S. Pradeep, N. Srinivasan, M. Vanishree
As network attacks have increased in number and severity over the past few years, intrusion detection systems have become a necessary addition to the security infrastructure of most organizations. From a security perspective, firewalls and SSL offer little protection. Web traffic often contains attacks such as cross-site scripting and SQL injection that enter through port 80 and are not blocked by the firewall. Among the Web applications HTTP holds the majority share of the traffic transported through Web. In this paper, implementation of an application level IDS has been presented which uses combination of pattern matching and protocol analysis approaches. The first method of detection relies on a multi pattern matching within the protocol fields, the second one provides an efficient decision tree adaptive to the application traffic characteristics to limit the number of patterns to be checked. The proposed IDS can be effectively implemented in a high performance semantic processor
在过去的几年中,随着网络攻击的数量和严重程度的增加,入侵检测系统已经成为大多数组织安全基础设施的必要补充。从安全角度来看,防火墙和SSL提供的保护很少。Web流量通常包含跨站点脚本和SQL注入等攻击,这些攻击通过端口80进入,不会被防火墙阻止。在Web应用程序中,HTTP占有通过Web传输的流量的大部分份额。本文提出了一种结合模式匹配和协议分析方法的应用层入侵检测系统的实现方法。第一种检测方法依赖于协议字段内的多模式匹配,第二种检测方法提供了一种适应应用程序流量特征的有效决策树,以限制要检查的模式数量。所提出的IDS可以在高性能语义处理器中有效实现
{"title":"Application Level IDS using Protocol Analysis","authors":"K. Rajkumar, V. Vaidehi, S. Pradeep, N. Srinivasan, M. Vanishree","doi":"10.1109/ICSCN.2007.350762","DOIUrl":"https://doi.org/10.1109/ICSCN.2007.350762","url":null,"abstract":"As network attacks have increased in number and severity over the past few years, intrusion detection systems have become a necessary addition to the security infrastructure of most organizations. From a security perspective, firewalls and SSL offer little protection. Web traffic often contains attacks such as cross-site scripting and SQL injection that enter through port 80 and are not blocked by the firewall. Among the Web applications HTTP holds the majority share of the traffic transported through Web. In this paper, implementation of an application level IDS has been presented which uses combination of pattern matching and protocol analysis approaches. The first method of detection relies on a multi pattern matching within the protocol fields, the second one provides an efficient decision tree adaptive to the application traffic characteristics to limit the number of patterns to be checked. The proposed IDS can be effectively implemented in a high performance semantic processor","PeriodicalId":257948,"journal":{"name":"2007 International Conference on Signal Processing, Communications and Networking","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123800858","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Comprehensive Simulation of Dispersion Management in Long-Haul WDM Light Wave Systems Operating in Quasi-Linear Regime 准线性长程WDM光波系统色散管理的综合仿真
Pub Date : 2007-11-05 DOI: 10.1109/ICSCN.2007.350748
A. Sangeetha, K. Anusudha
A comprehensive simulation on the optimization of the management of the non linear effects in long haul light wave systems has been carried out by chirped RZ format as the format has significant advantages over the NRZ modulation format in WDM systems We have tried to demonstrate that a system reach of long-haul light wave link could be significantly improved by optimizing the dispersion map in transmission path and pre-chirping input pulses. Input powers were reduced to provide quasi-linear regime. There is a need for the optimization of the length of compensation fiber on both terminal sides to maximize the effect for channel away from zero-dispersion wavelength
由于啁啾RZ格式在WDM系统中比NRZ调制格式具有明显的优势,因此对远程光波系统中非线性效应管理的优化进行了全面的仿真。我们试图证明,通过优化传输路径中的色散映射和预啁啾输入脉冲,可以显着提高远程光波链路的系统距离。输入功率被减小以提供准线性状态。为了使通道远离零色散波长的效果最大化,需要对两端补偿光纤的长度进行优化
{"title":"Comprehensive Simulation of Dispersion Management in Long-Haul WDM Light Wave Systems Operating in Quasi-Linear Regime","authors":"A. Sangeetha, K. Anusudha","doi":"10.1109/ICSCN.2007.350748","DOIUrl":"https://doi.org/10.1109/ICSCN.2007.350748","url":null,"abstract":"A comprehensive simulation on the optimization of the management of the non linear effects in long haul light wave systems has been carried out by chirped RZ format as the format has significant advantages over the NRZ modulation format in WDM systems We have tried to demonstrate that a system reach of long-haul light wave link could be significantly improved by optimizing the dispersion map in transmission path and pre-chirping input pulses. Input powers were reduced to provide quasi-linear regime. There is a need for the optimization of the length of compensation fiber on both terminal sides to maximize the effect for channel away from zero-dispersion wavelength","PeriodicalId":257948,"journal":{"name":"2007 International Conference on Signal Processing, Communications and Networking","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130136384","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Simulation and Analysis of Performance Models of Broadband Intelligent Mobile Networks 宽带智能移动网络性能模型仿真与分析
Pub Date : 2007-11-05 DOI: 10.1109/ICSCN.2007.350667
K. Yashwanth Reddy, N.V. Deepa Gandhi, K. Balachander
The present thrust is to develop a broadband intelligent network system which is able to sustain a large number of users and a varying amount of data while maintaining high availability of resources and acceptable performance. In such a scenario, scalability is an important aspect. In this paper we consider the impact of increasing the number of users supported by a network node and show that the network is scalable. Also congestion control is necessary to protect the broadband service control point during overload situations. Existing algorithms do not operate optimally with respect to important performance criteria such as responsiveness, efficiency and fairness. Here we try to identify their shortcomings and propose few enhancements. We also show that the proposed enhanced call-gapping algorithm performs consistently better than the existing automatic call-gapping algorithm in terms of above-mentioned criteria. The effectiveness of this analysis are shown using NS-2 simulator
目前的重点是发展一种宽带智能网络系统,该系统能够维持大量用户和不同数量的数据,同时保持资源的高可用性和可接受的性能。在这种情况下,可伸缩性是一个重要方面。在本文中,我们考虑了增加网络节点支持的用户数量的影响,并证明了网络是可扩展的。此外,拥塞控制是必要的,以保护宽带业务控制点在过载情况下。现有算法在响应性、效率和公平性等重要性能标准方面不能达到最佳。在这里,我们试图找出它们的缺点,并提出一些改进建议。我们还表明,在上述标准下,所提出的增强调用间隔算法的性能始终优于现有的自动调用间隔算法。利用NS-2仿真器验证了该分析的有效性
{"title":"Simulation and Analysis of Performance Models of Broadband Intelligent Mobile Networks","authors":"K. Yashwanth Reddy, N.V. Deepa Gandhi, K. Balachander","doi":"10.1109/ICSCN.2007.350667","DOIUrl":"https://doi.org/10.1109/ICSCN.2007.350667","url":null,"abstract":"The present thrust is to develop a broadband intelligent network system which is able to sustain a large number of users and a varying amount of data while maintaining high availability of resources and acceptable performance. In such a scenario, scalability is an important aspect. In this paper we consider the impact of increasing the number of users supported by a network node and show that the network is scalable. Also congestion control is necessary to protect the broadband service control point during overload situations. Existing algorithms do not operate optimally with respect to important performance criteria such as responsiveness, efficiency and fairness. Here we try to identify their shortcomings and propose few enhancements. We also show that the proposed enhanced call-gapping algorithm performs consistently better than the existing automatic call-gapping algorithm in terms of above-mentioned criteria. The effectiveness of this analysis are shown using NS-2 simulator","PeriodicalId":257948,"journal":{"name":"2007 International Conference on Signal Processing, Communications and Networking","volume":"359 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122760277","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Number Theory Based Image Compression Encryption and Application to Image Multiplexing 基于数论的图像压缩加密及其在图像复用中的应用
Pub Date : 2007-11-05 DOI: 10.1109/ICSCN.2007.350696
V. Jagannathan, A. Mahadevan, R. Hariharan, S. Srinivasan
Image compression and image encryption are pivotal to proper storage and transmission of images. Simultaneous image compression and encryption aims at achieving enhanced bandwidth utilization and security at the same time. The proposed number theory based image compression encryption (NTICE) algorithm employs number theoretic paradigm-Chinese remainder theorem, to solve congruencies and hence realize the twin ideals of compression and encryption simultaneously. The NTICE algorithm has been implemented on color images. The image coding results, calculated from actual image size and encoded image file, are comparable to the results obtained through much more sophisticated and computationally complex methods. In addition, the algorithm has been applied to the scenario of image multiplexing in order to obtain enhanced level of security along with compression
图像压缩和图像加密是保证图像存储和传输的关键。同时进行图像压缩和加密的目的是同时提高带宽利用率和安全性。本文提出的基于数论的图像压缩加密算法(NTICE)采用数论范式——中国剩余定理来求解图像的同余性,从而同时实现压缩和加密的双重理想。在彩色图像上实现了NTICE算法。根据实际图像大小和编码图像文件计算的图像编码结果与通过更复杂和计算复杂的方法获得的结果相当。此外,该算法已应用于图像复用场景,在压缩的同时获得更高的安全性
{"title":"Number Theory Based Image Compression Encryption and Application to Image Multiplexing","authors":"V. Jagannathan, A. Mahadevan, R. Hariharan, S. Srinivasan","doi":"10.1109/ICSCN.2007.350696","DOIUrl":"https://doi.org/10.1109/ICSCN.2007.350696","url":null,"abstract":"Image compression and image encryption are pivotal to proper storage and transmission of images. Simultaneous image compression and encryption aims at achieving enhanced bandwidth utilization and security at the same time. The proposed number theory based image compression encryption (NTICE) algorithm employs number theoretic paradigm-Chinese remainder theorem, to solve congruencies and hence realize the twin ideals of compression and encryption simultaneously. The NTICE algorithm has been implemented on color images. The image coding results, calculated from actual image size and encoded image file, are comparable to the results obtained through much more sophisticated and computationally complex methods. In addition, the algorithm has been applied to the scenario of image multiplexing in order to obtain enhanced level of security along with compression","PeriodicalId":257948,"journal":{"name":"2007 International Conference on Signal Processing, Communications and Networking","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123976198","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
期刊
2007 International Conference on Signal Processing, Communications and Networking
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1