Pub Date : 2008-12-16DOI: 10.1109/ICCT.2008.4716081
Ziqiang Wang, Xia Sun
With the fast expansion of the Internet globally in the last decade, the spam e-mail has become a main problem of the email service for Internet service providers, corporate and private users. To efficiently solve the spam filtering problems, a spam mail filtering method based on locality pursuit projection (LPP) and nearest feature line (NFL) classifier is proposed in this paper. Experimental results show that the proposed algorithm achieves much better performance than other traditional spam filtering methods.
{"title":"An efficient LPP-based spam filtering algorithm","authors":"Ziqiang Wang, Xia Sun","doi":"10.1109/ICCT.2008.4716081","DOIUrl":"https://doi.org/10.1109/ICCT.2008.4716081","url":null,"abstract":"With the fast expansion of the Internet globally in the last decade, the spam e-mail has become a main problem of the email service for Internet service providers, corporate and private users. To efficiently solve the spam filtering problems, a spam mail filtering method based on locality pursuit projection (LPP) and nearest feature line (NFL) classifier is proposed in this paper. Experimental results show that the proposed algorithm achieves much better performance than other traditional spam filtering methods.","PeriodicalId":259577,"journal":{"name":"2008 11th IEEE International Conference on Communication Technology","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123821427","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2008-12-16DOI: 10.1109/ICCT.2008.4716220
Tianding Chen
Texts provide highly condensed information about the contents of images or video sequences. It proposes a text localization method using discrete wavelet transform and neural network. Because of the property of Harr wavelet transform, the proposed approach can localize large font size text by merging 4 small block wavelet coefficients into large one. Then the morphological dilation operation and the neural network are employed to raise the recall rate and precision rate. Experimental results show that the proposed method can successfully locate text region from complex images. Its precision rate is better than that of other methods.
{"title":"Text localization using DWT fusion algorithm","authors":"Tianding Chen","doi":"10.1109/ICCT.2008.4716220","DOIUrl":"https://doi.org/10.1109/ICCT.2008.4716220","url":null,"abstract":"Texts provide highly condensed information about the contents of images or video sequences. It proposes a text localization method using discrete wavelet transform and neural network. Because of the property of Harr wavelet transform, the proposed approach can localize large font size text by merging 4 small block wavelet coefficients into large one. Then the morphological dilation operation and the neural network are employed to raise the recall rate and precision rate. Experimental results show that the proposed method can successfully locate text region from complex images. Its precision rate is better than that of other methods.","PeriodicalId":259577,"journal":{"name":"2008 11th IEEE International Conference on Communication Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128762660","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2008-12-16DOI: 10.1109/ICCT.2008.4716228
Xingguang Song, Yuting Su, Yu Liu, Zhong Ji
To achieve copyright protection by noticing the serious problem of copyright piracy, a novel watermarking algorithm based on motion vector of AVS (audio video coding standard) was proposed. During the inter prediction step of AVS video compression standard, watermark embedding is implemented by modifying the resolution of the motion vectors of partition blocks in different macroblock partitions. The modulation is based on the mapping rules between the motion vector resolution and the watermark bits. At last, the prediction modes of current macroblock is determined using standard AVS coding algorithm which will ensures that the best prediction mode is selected for current watermarked macroblock. The experimental results show that the presented watermarking method achieves comparatively high embedding rate without complicated computation, and has almost no impact on video bitrate and video quality subjectively as well as objectively.
{"title":"A video watermarking scheme for AVS based on motion vectors","authors":"Xingguang Song, Yuting Su, Yu Liu, Zhong Ji","doi":"10.1109/ICCT.2008.4716228","DOIUrl":"https://doi.org/10.1109/ICCT.2008.4716228","url":null,"abstract":"To achieve copyright protection by noticing the serious problem of copyright piracy, a novel watermarking algorithm based on motion vector of AVS (audio video coding standard) was proposed. During the inter prediction step of AVS video compression standard, watermark embedding is implemented by modifying the resolution of the motion vectors of partition blocks in different macroblock partitions. The modulation is based on the mapping rules between the motion vector resolution and the watermark bits. At last, the prediction modes of current macroblock is determined using standard AVS coding algorithm which will ensures that the best prediction mode is selected for current watermarked macroblock. The experimental results show that the presented watermarking method achieves comparatively high embedding rate without complicated computation, and has almost no impact on video bitrate and video quality subjectively as well as objectively.","PeriodicalId":259577,"journal":{"name":"2008 11th IEEE International Conference on Communication Technology","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127675076","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2008-12-16DOI: 10.1109/ICCT.2008.4716195
Y.Z. Yu, W. Dou
The characteristics of millimeter-wave Bessel beams generated by axicons are analyzed in our paper. The analysis method is to combine a two-dimension finite-difference time-domain (2-D FDTD) method for rigorous electromagnetic computation with a Stratton-Chu formulas for determining electromagnetic fields in the far field. The analysis results and conclusions are given.
{"title":"Characteristics of millimeter-wave Bessel beams generated by axicons","authors":"Y.Z. Yu, W. Dou","doi":"10.1109/ICCT.2008.4716195","DOIUrl":"https://doi.org/10.1109/ICCT.2008.4716195","url":null,"abstract":"The characteristics of millimeter-wave Bessel beams generated by axicons are analyzed in our paper. The analysis method is to combine a two-dimension finite-difference time-domain (2-D FDTD) method for rigorous electromagnetic computation with a Stratton-Chu formulas for determining electromagnetic fields in the far field. The analysis results and conclusions are given.","PeriodicalId":259577,"journal":{"name":"2008 11th IEEE International Conference on Communication Technology","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127977177","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Multicast is an efficient and natural way of communicating information via Internet, but its security is identified as one of the most important problems to solve for the successful deployment of group communication applications. First of all, in secure multicast group members must be able to verify that the data received is indeed sent by an authorized sender, and this is called dasiadata origin authenticationpsila. This paper introduces the main schemes for authenticating multicast data origin, and evaluates their performances with computation overhead, communication overhead and some other parameters. The result shows there are no ideal solutions to satisfy all multicast applications.
{"title":"Survey on multicast data origin authentication","authors":"Jinxin He, Gaochao Xu, Xiaodong Fu, Zhiguo Zhou, Jianhua Jiang","doi":"10.1109/ICCT.2008.4716234","DOIUrl":"https://doi.org/10.1109/ICCT.2008.4716234","url":null,"abstract":"Multicast is an efficient and natural way of communicating information via Internet, but its security is identified as one of the most important problems to solve for the successful deployment of group communication applications. First of all, in secure multicast group members must be able to verify that the data received is indeed sent by an authorized sender, and this is called dasiadata origin authenticationpsila. This paper introduces the main schemes for authenticating multicast data origin, and evaluates their performances with computation overhead, communication overhead and some other parameters. The result shows there are no ideal solutions to satisfy all multicast applications.","PeriodicalId":259577,"journal":{"name":"2008 11th IEEE International Conference on Communication Technology","volume":"15 12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127651694","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2008-12-16DOI: 10.1109/ICCT.2008.4716243
C. Wang, V. Fusco, Lingling Sun
A V band (43- 68 GHz) MMIC broad band power amplifier (PA) for 60 GHz high data rate indoor wireless communication system has been designed and tested. The amplifier has been designed in conjunction with other transceiver MMIC in the 0.15 mum GaAs pHEMT process of UMS (PH15). The measurement results matched very well with the simulation ones based on the extensive circuit and EM co-simulations. The compact amplifier, which is only approx. 1.9 times 0.9 mm2, gives out a gain of 17 dB and, 4 dB noise figure and 13 dBm P1dB with 250 mW DC power consuming. It is well matched in the band 43 - 68 GHz.
{"title":"43–68 GHz broad band low noise MMIC medium power amplifier","authors":"C. Wang, V. Fusco, Lingling Sun","doi":"10.1109/ICCT.2008.4716243","DOIUrl":"https://doi.org/10.1109/ICCT.2008.4716243","url":null,"abstract":"A V band (43- 68 GHz) MMIC broad band power amplifier (PA) for 60 GHz high data rate indoor wireless communication system has been designed and tested. The amplifier has been designed in conjunction with other transceiver MMIC in the 0.15 mum GaAs pHEMT process of UMS (PH15). The measurement results matched very well with the simulation ones based on the extensive circuit and EM co-simulations. The compact amplifier, which is only approx. 1.9 times 0.9 mm2, gives out a gain of 17 dB and, 4 dB noise figure and 13 dBm P1dB with 250 mW DC power consuming. It is well matched in the band 43 - 68 GHz.","PeriodicalId":259577,"journal":{"name":"2008 11th IEEE International Conference on Communication Technology","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127858278","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2008-12-16DOI: 10.1109/ICCT.2008.4716265
Liu Fen-hao, Xu Jun-ming, Qin Hui-bin
The technology of MD multicasting and its application on E-Government MPLS VPN are studied. MD can easily be implemented on E-Government MPLS network. Using MD multicasting method, every site on PE belongs to the same VPN is added to one multicasting domain; these sites can send and receive packets across service provider network. The realization of MD multicasting is only little changes on the original network and the configuration is simple. With this method, Provincial E-Government MPLS VPN with MD multicasting is realized and tested.
{"title":"Multicast domain on E-Government MPLS VPN","authors":"Liu Fen-hao, Xu Jun-ming, Qin Hui-bin","doi":"10.1109/ICCT.2008.4716265","DOIUrl":"https://doi.org/10.1109/ICCT.2008.4716265","url":null,"abstract":"The technology of MD multicasting and its application on E-Government MPLS VPN are studied. MD can easily be implemented on E-Government MPLS network. Using MD multicasting method, every site on PE belongs to the same VPN is added to one multicasting domain; these sites can send and receive packets across service provider network. The realization of MD multicasting is only little changes on the original network and the configuration is simple. With this method, Provincial E-Government MPLS VPN with MD multicasting is realized and tested.","PeriodicalId":259577,"journal":{"name":"2008 11th IEEE International Conference on Communication Technology","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117058285","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2008-12-16DOI: 10.1109/ICCT.2008.4716099
Shaodong Feng, Hongpeng Zhu, Guang-xia Li
Our governmentpsilas whitepaper ldquoChina Spaceflight from 2006rdquopointed out that the large GEO multimedia satellites and broadband multimedia technology should be developed urgently. Satellites system can provide a high quality broadband communication services for subscribers especially in the internet access and disaster recovery. The development of satellite communication is reviewed; some design issues of Satellite system have been discussed. Based on the analysis and discussion a novel design concept for Multimedia Satellite System is proposed from internet point of view. A possible deign scheme has also been proposed which adopt the DVB-S2 and DVB-RCS from ETSI.
{"title":"Design concepts for multimedia satellite system","authors":"Shaodong Feng, Hongpeng Zhu, Guang-xia Li","doi":"10.1109/ICCT.2008.4716099","DOIUrl":"https://doi.org/10.1109/ICCT.2008.4716099","url":null,"abstract":"Our governmentpsilas whitepaper ldquoChina Spaceflight from 2006rdquopointed out that the large GEO multimedia satellites and broadband multimedia technology should be developed urgently. Satellites system can provide a high quality broadband communication services for subscribers especially in the internet access and disaster recovery. The development of satellite communication is reviewed; some design issues of Satellite system have been discussed. Based on the analysis and discussion a novel design concept for Multimedia Satellite System is proposed from internet point of view. A possible deign scheme has also been proposed which adopt the DVB-S2 and DVB-RCS from ETSI.","PeriodicalId":259577,"journal":{"name":"2008 11th IEEE International Conference on Communication Technology","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117231684","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2008-12-16DOI: 10.1109/ICCT.2008.4716182
Zhe Li, Sheng Fang, Xujian Li, Ke Xu
In this paper, we propose a new wavelet video coding based on MCTF-WZ through introducing Wyner-Ziv coding, which is a new coding structure. Low and high frequency frames in temporal domain are encoded through the distinct coding manner, where the former is encoded by the BISK algorithm after spatial analysis. But the latter is encoded by two distinct ways according to the correlation between the reference and current frames. In this way, regions which have high correlations are coded by Wyner-Ziv coding, and regions which only have short correlations are coded by BISK after discrete wavelet transform. The coding efficiency of this scheme is close to H.264 and MC-EZBC or even better.
{"title":"A new paradigm of coding for scalable video coding with wavelet-based","authors":"Zhe Li, Sheng Fang, Xujian Li, Ke Xu","doi":"10.1109/ICCT.2008.4716182","DOIUrl":"https://doi.org/10.1109/ICCT.2008.4716182","url":null,"abstract":"In this paper, we propose a new wavelet video coding based on MCTF-WZ through introducing Wyner-Ziv coding, which is a new coding structure. Low and high frequency frames in temporal domain are encoded through the distinct coding manner, where the former is encoded by the BISK algorithm after spatial analysis. But the latter is encoded by two distinct ways according to the correlation between the reference and current frames. In this way, regions which have high correlations are coded by Wyner-Ziv coding, and regions which only have short correlations are coded by BISK after discrete wavelet transform. The coding efficiency of this scheme is close to H.264 and MC-EZBC or even better.","PeriodicalId":259577,"journal":{"name":"2008 11th IEEE International Conference on Communication Technology","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124318838","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2008-12-16DOI: 10.1109/ICCT.2008.4716291
Pu Junjie, Shang Junna, Shen Lei
Due to its low power spectral density, the WCDMA signal always floods in the background noise, bringing difficulties to the signalpsilas reconnaissance. The detection method based on the second-order moment of WCDMA signal and its modified method are proposed. Experimental results show that the detection performance of these two methods is better than that of the double frequency method and spectrum-reprocessing method. When the false alarm probability is 1%, the detection probability of presented methods reaches above 90% at SNR -19 dB. The proposed methods donpsilat involve extensive matrix operations, their computation complexities are low, and they are easy to implement.
{"title":"Detection methods of WCDMA signal based on the second-order moment","authors":"Pu Junjie, Shang Junna, Shen Lei","doi":"10.1109/ICCT.2008.4716291","DOIUrl":"https://doi.org/10.1109/ICCT.2008.4716291","url":null,"abstract":"Due to its low power spectral density, the WCDMA signal always floods in the background noise, bringing difficulties to the signalpsilas reconnaissance. The detection method based on the second-order moment of WCDMA signal and its modified method are proposed. Experimental results show that the detection performance of these two methods is better than that of the double frequency method and spectrum-reprocessing method. When the false alarm probability is 1%, the detection probability of presented methods reaches above 90% at SNR -19 dB. The proposed methods donpsilat involve extensive matrix operations, their computation complexities are low, and they are easy to implement.","PeriodicalId":259577,"journal":{"name":"2008 11th IEEE International Conference on Communication Technology","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124496497","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}