Pub Date : 2005-12-21DOI: 10.1109/ISSPIT.2005.1577221
B. García, J. Vicente, I. Ruiz, A. Alonso
In the last few years there have been great advances in speech processing techniques, frequently oriented to speech recognition, musical effects or vocal encoding. This paper, though many of its contents deal with speech processing, is focused on the developing of hardware devices with DSP's, which implement algorithm for evaluation and improvement of pathological voices. Thus, the control of actual systems, such as a digital home or a voice controlled operator, will be possible
{"title":"Multiplatform interface adapted to pathological voices","authors":"B. García, J. Vicente, I. Ruiz, A. Alonso","doi":"10.1109/ISSPIT.2005.1577221","DOIUrl":"https://doi.org/10.1109/ISSPIT.2005.1577221","url":null,"abstract":"In the last few years there have been great advances in speech processing techniques, frequently oriented to speech recognition, musical effects or vocal encoding. This paper, though many of its contents deal with speech processing, is focused on the developing of hardware devices with DSP's, which implement algorithm for evaluation and improvement of pathological voices. Thus, the control of actual systems, such as a digital home or a voice controlled operator, will be possible","PeriodicalId":421826,"journal":{"name":"Proceedings of the Fifth IEEE International Symposium on Signal Processing and Information Technology, 2005.","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127549486","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2005-12-21DOI: 10.1109/ISSPIT.2005.1577173
M. V. Mauco, M. Leonardi
Natural language requirements models are useful during the first stages of software development. Formal methods help to increase software quality and reliability. In order to take advantage of both of them, we propose a requirements definition strategy which integrates them. We present in this paper the formalisation of a semiautomatic strategy to derive the types of a first initial specification in the RAISE specification language (RSL) from the Language Extended Lexicon (LEL), a natural language oriented model, which models the vocabulary of a domain. The strategy consists of a set of RSL-based derivation rules which provide a systematic and consistent way of transforming the information contained in the LEL into abstract and concrete RSL types
{"title":"Formalising a derivation strategy for formal specifications from natural language requirements models","authors":"M. V. Mauco, M. Leonardi","doi":"10.1109/ISSPIT.2005.1577173","DOIUrl":"https://doi.org/10.1109/ISSPIT.2005.1577173","url":null,"abstract":"Natural language requirements models are useful during the first stages of software development. Formal methods help to increase software quality and reliability. In order to take advantage of both of them, we propose a requirements definition strategy which integrates them. We present in this paper the formalisation of a semiautomatic strategy to derive the types of a first initial specification in the RAISE specification language (RSL) from the Language Extended Lexicon (LEL), a natural language oriented model, which models the vocabulary of a domain. The strategy consists of a set of RSL-based derivation rules which provide a systematic and consistent way of transforming the information contained in the LEL into abstract and concrete RSL types","PeriodicalId":421826,"journal":{"name":"Proceedings of the Fifth IEEE International Symposium on Signal Processing and Information Technology, 2005.","volume":"125 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131996812","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2005-12-21DOI: 10.1109/ISSPIT.2005.1577197
J. Doi, W. Sato
This paper proposes a practical, accurate, topologically robust and ranging error resistive shape modeling procedure that approximates a real object, with the matrix-format data structure, for the resulting 3D shape processing. Examples of the shape processing are based on the premise of the virtual manipulation of the 3D shape, such as local shape modification and blending. A geometric model with the desired meshing is directly reconstructed based on a solid modeling approach. The radial distance of each scanning point from the axis of the cylindrical coordinates is measured by laser triangulation. The angular and vertical positions of the laser beam are two other coordinate values of the scanning. A face array listing (topology), which defines the vertex (sampling point) connectivity and the shape of the mesh, is assigned to meet the desired meshing. Topologically stable meshing, and hence, an accurate approximation, free from the shape ambiguity unavoidable in the so-called ICP (iterative closest point) modeling, is then accomplished. This proposal allows not only the versatile and automatic shape reconstruction, but also virtual shape manipulation for various trainings and restorations
{"title":"Solid model approximation for successive three-dimensional shape processing","authors":"J. Doi, W. Sato","doi":"10.1109/ISSPIT.2005.1577197","DOIUrl":"https://doi.org/10.1109/ISSPIT.2005.1577197","url":null,"abstract":"This paper proposes a practical, accurate, topologically robust and ranging error resistive shape modeling procedure that approximates a real object, with the matrix-format data structure, for the resulting 3D shape processing. Examples of the shape processing are based on the premise of the virtual manipulation of the 3D shape, such as local shape modification and blending. A geometric model with the desired meshing is directly reconstructed based on a solid modeling approach. The radial distance of each scanning point from the axis of the cylindrical coordinates is measured by laser triangulation. The angular and vertical positions of the laser beam are two other coordinate values of the scanning. A face array listing (topology), which defines the vertex (sampling point) connectivity and the shape of the mesh, is assigned to meet the desired meshing. Topologically stable meshing, and hence, an accurate approximation, free from the shape ambiguity unavoidable in the so-called ICP (iterative closest point) modeling, is then accomplished. This proposal allows not only the versatile and automatic shape reconstruction, but also virtual shape manipulation for various trainings and restorations","PeriodicalId":421826,"journal":{"name":"Proceedings of the Fifth IEEE International Symposium on Signal Processing and Information Technology, 2005.","volume":"337 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134454344","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2005-12-21DOI: 10.1109/ISSPIT.2005.1577174
Aijuan Dong, Honglin Li
Educational documentary videos play an important role in enriching learning experience. However, due to unstructured and linear features, documentary videos are much more difficult to access than text-based documents and have not been effectively utilized. In this paper, we propose a multimodal, hierarchical documentary video segmentation procedure based on image, audio and text understanding. The coincidence of scene-level audio breaks and text (transcript) breaks from domain independent text segmentation determines documentary video scenes/paragraphs. Each video scene/paragraph is further segmented into video shots based on video visual features. To effectively utilize composite documentary video learning materials generated, we propose a documentary video access platform that supports hierarchical organization of video content, multimodal presentation of information, augmented video content and multi-level flexible search. A prototype platform is implemented to demonstrate the idea
{"title":"Educational documentary video segmentation and access through combination of visual, audio and text understanding","authors":"Aijuan Dong, Honglin Li","doi":"10.1109/ISSPIT.2005.1577174","DOIUrl":"https://doi.org/10.1109/ISSPIT.2005.1577174","url":null,"abstract":"Educational documentary videos play an important role in enriching learning experience. However, due to unstructured and linear features, documentary videos are much more difficult to access than text-based documents and have not been effectively utilized. In this paper, we propose a multimodal, hierarchical documentary video segmentation procedure based on image, audio and text understanding. The coincidence of scene-level audio breaks and text (transcript) breaks from domain independent text segmentation determines documentary video scenes/paragraphs. Each video scene/paragraph is further segmented into video shots based on video visual features. To effectively utilize composite documentary video learning materials generated, we propose a documentary video access platform that supports hierarchical organization of video content, multimodal presentation of information, augmented video content and multi-level flexible search. A prototype platform is implemented to demonstrate the idea","PeriodicalId":421826,"journal":{"name":"Proceedings of the Fifth IEEE International Symposium on Signal Processing and Information Technology, 2005.","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124060157","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2005-12-21DOI: 10.1109/ISSPIT.2005.1577136
D. Arora, P. Agathoklis
A semi-analytical framework for capacity analysis of a downlink channel in the presence of fading and interference from other users is presented. The users are selected for service based on the selection criteria such as RR, greedy and scheduling algorithm proposed in D. Arora and P. Agathoklis, 2005. The fading is modelled using a Nakagami model. The results obtained show that by explicitly taking into consideration for the selection of users served simultaneously both, the angular location of mobile users around the base station and the instantaneous SNR at the MAC layer, an improved system capacity is achieved. This improvement is due to the reduced interference that simultaneously served users cause on each other. The results show that jointly addressing the PHY and MAC layer issues in an integrated cross-layer framework is important for improving system performance
提出了在存在衰落和其他用户干扰的情况下下行信道容量分析的半解析框架。用户的选择基于RR、贪心和调度算法(D. Arora and P. Agathoklis, 2005)等选择准则。衰落是用Nakagami模型来建模的。结果表明,通过明确考虑同时服务用户的选择、移动用户在基站周围的角度位置和MAC层的瞬时信噪比,提高了系统容量。这种改进是由于减少了同时服务的用户对彼此造成的干扰。结果表明,在集成的跨层框架中共同解决物理层和MAC层问题对于提高系统性能具有重要意义
{"title":"Capacity analysis of a cross layer downlink model in the presence of fading and interference","authors":"D. Arora, P. Agathoklis","doi":"10.1109/ISSPIT.2005.1577136","DOIUrl":"https://doi.org/10.1109/ISSPIT.2005.1577136","url":null,"abstract":"A semi-analytical framework for capacity analysis of a downlink channel in the presence of fading and interference from other users is presented. The users are selected for service based on the selection criteria such as RR, greedy and scheduling algorithm proposed in D. Arora and P. Agathoklis, 2005. The fading is modelled using a Nakagami model. The results obtained show that by explicitly taking into consideration for the selection of users served simultaneously both, the angular location of mobile users around the base station and the instantaneous SNR at the MAC layer, an improved system capacity is achieved. This improvement is due to the reduced interference that simultaneously served users cause on each other. The results show that jointly addressing the PHY and MAC layer issues in an integrated cross-layer framework is important for improving system performance","PeriodicalId":421826,"journal":{"name":"Proceedings of the Fifth IEEE International Symposium on Signal Processing and Information Technology, 2005.","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127840737","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2005-12-21DOI: 10.1109/ISSPIT.2005.1577093
P.R.R. Hasanzadeh, A. Shahmirzaie, A. Rezaie
In attention to general motion detection methods, differential sequences of frames make some convenience which expand it's usability for lots of applications. In practice, differential sequences of frames have been affected by environmental noises and CCD cameras structure that make it difficult to detect objects. In this method using differential histogram equalization, we try to enhance and increase the contrast between data and noise histogram levels. The new threshold levels adaptively obtained by simple algorithm and without knowing the probability distribution function of the noise
{"title":"Motion detection using differential histogram equalization","authors":"P.R.R. Hasanzadeh, A. Shahmirzaie, A. Rezaie","doi":"10.1109/ISSPIT.2005.1577093","DOIUrl":"https://doi.org/10.1109/ISSPIT.2005.1577093","url":null,"abstract":"In attention to general motion detection methods, differential sequences of frames make some convenience which expand it's usability for lots of applications. In practice, differential sequences of frames have been affected by environmental noises and CCD cameras structure that make it difficult to detect objects. In this method using differential histogram equalization, we try to enhance and increase the contrast between data and noise histogram levels. The new threshold levels adaptively obtained by simple algorithm and without knowing the probability distribution function of the noise","PeriodicalId":421826,"journal":{"name":"Proceedings of the Fifth IEEE International Symposium on Signal Processing and Information Technology, 2005.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129182201","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2005-12-21DOI: 10.1109/ISSPIT.2005.1577132
M. Shoeb, F. Ahmad, M. Amin
This paper demonstrates the effectiveness of narrowband source localization techniques in indoor environments. Experiments are conducted using multiple antennas and a network analyzer. An active RF source is placed at different locations in a medium-sized office. Three sensors, placed at known positions, are used to estimate the location of the source using time of arrival (TOA) information. Trilateration is first utilized to obtain an initial estimate for the source location. Constrained optimization is then applied to improve estimation accuracy. In the experiment setup, only one sensor has a line-of-sight (LOS) communication path to the source, while the other two sensors are restricted to a non-line-of-sight setting. Different obstructed line-of-sight (OLOS) biases are physically introduced to demonstrate a real-life situation, where several moving objects may exist between the source and the sensors
{"title":"Narrowband source localization for indoor wireless environments","authors":"M. Shoeb, F. Ahmad, M. Amin","doi":"10.1109/ISSPIT.2005.1577132","DOIUrl":"https://doi.org/10.1109/ISSPIT.2005.1577132","url":null,"abstract":"This paper demonstrates the effectiveness of narrowband source localization techniques in indoor environments. Experiments are conducted using multiple antennas and a network analyzer. An active RF source is placed at different locations in a medium-sized office. Three sensors, placed at known positions, are used to estimate the location of the source using time of arrival (TOA) information. Trilateration is first utilized to obtain an initial estimate for the source location. Constrained optimization is then applied to improve estimation accuracy. In the experiment setup, only one sensor has a line-of-sight (LOS) communication path to the source, while the other two sensors are restricted to a non-line-of-sight setting. Different obstructed line-of-sight (OLOS) biases are physically introduced to demonstrate a real-life situation, where several moving objects may exist between the source and the sensors","PeriodicalId":421826,"journal":{"name":"Proceedings of the Fifth IEEE International Symposium on Signal Processing and Information Technology, 2005.","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115863447","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2005-12-21DOI: 10.1109/ISSPIT.2005.1577116
A. El Bouziri, A. Boulmakoul, M. Chala, H. Mouncif
The convergence of wireless communication, mobile positioning and geographic information system (GIS) has given rise to a new class of location based applications and services, which deliver real-time information to mobile users in accordance with their current locations. The mobile applications deal with tracking and management of mobile objects, and need to pose spatio-temporal queries. In this paper, we propose a data model of mobile object on a transportation network according to open OGC simple feature specification, and present a query language with a powerful set of predicates. We also give with the new emerging RT-UML specification an object oriented model of transportation information system (TIS) as a prototype to using the mobile object in a real-time context for location based services
{"title":"Modeling and querying mobile object on transportation network for mobile applications","authors":"A. El Bouziri, A. Boulmakoul, M. Chala, H. Mouncif","doi":"10.1109/ISSPIT.2005.1577116","DOIUrl":"https://doi.org/10.1109/ISSPIT.2005.1577116","url":null,"abstract":"The convergence of wireless communication, mobile positioning and geographic information system (GIS) has given rise to a new class of location based applications and services, which deliver real-time information to mobile users in accordance with their current locations. The mobile applications deal with tracking and management of mobile objects, and need to pose spatio-temporal queries. In this paper, we propose a data model of mobile object on a transportation network according to open OGC simple feature specification, and present a query language with a powerful set of predicates. We also give with the new emerging RT-UML specification an object oriented model of transportation information system (TIS) as a prototype to using the mobile object in a real-time context for location based services","PeriodicalId":421826,"journal":{"name":"Proceedings of the Fifth IEEE International Symposium on Signal Processing and Information Technology, 2005.","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115268942","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2005-12-21DOI: 10.1109/ISSPIT.2005.1577166
F. Zargari, O. Fatemi
Wavelet transform (WT), which is used in Motion JPEG 2000 for image transform, concentrates most of the energy of transformed image in LL sub-band. Hence, transmission error in LL sub-band of motion JPEG 2000 stream deteriorates the quality of the transmitted images to a grate extent. In this paper, a novel error concealment (EC) method is introduced for damaged LL sub-band of Motion JPEG 2000 image sequences. In the first step of this method, inverse wavelet transform is applied to LH, HL and HH (high frequency) sub-bands (HF-IWT). In the second step the motion estimation techniques are applied to the HF-IWT images of the damaged frame and the previous frame. The resulted motion vectors are used for determining the best matching point from the LL subband of previous correct frame for the points in the damaged LL sub-band. The matching point for any damaged point is accepted for EC if it satisfies the constraints which are set by the received value for the damaged point and number of lost bit planes. The proposed method outperforms the previous inter and intra mode EC methods for any number of lost bit planes in LL sub-band
{"title":"Error concealment of damaged LL sub-band in motion JPEG 2000","authors":"F. Zargari, O. Fatemi","doi":"10.1109/ISSPIT.2005.1577166","DOIUrl":"https://doi.org/10.1109/ISSPIT.2005.1577166","url":null,"abstract":"Wavelet transform (WT), which is used in Motion JPEG 2000 for image transform, concentrates most of the energy of transformed image in LL sub-band. Hence, transmission error in LL sub-band of motion JPEG 2000 stream deteriorates the quality of the transmitted images to a grate extent. In this paper, a novel error concealment (EC) method is introduced for damaged LL sub-band of Motion JPEG 2000 image sequences. In the first step of this method, inverse wavelet transform is applied to LH, HL and HH (high frequency) sub-bands (HF-IWT). In the second step the motion estimation techniques are applied to the HF-IWT images of the damaged frame and the previous frame. The resulted motion vectors are used for determining the best matching point from the LL subband of previous correct frame for the points in the damaged LL sub-band. The matching point for any damaged point is accepted for EC if it satisfies the constraints which are set by the received value for the damaged point and number of lost bit planes. The proposed method outperforms the previous inter and intra mode EC methods for any number of lost bit planes in LL sub-band","PeriodicalId":421826,"journal":{"name":"Proceedings of the Fifth IEEE International Symposium on Signal Processing and Information Technology, 2005.","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115322430","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2005-12-21DOI: 10.1109/ISSPIT.2005.1577106
Chen Zhenxue, Wang Guoyou, Liu Chenyun
This paper presents a method for vehicle flow detection statistic at traffic crossing based on computer vision and image processing. It can effectively use optical flow to detect traffic parameter by analyzing vehicle and scene information extracted from images. The experimental results show that this method is correct and efficient
{"title":"Vehicle flow detection statistic algorithm based on optical flow","authors":"Chen Zhenxue, Wang Guoyou, Liu Chenyun","doi":"10.1109/ISSPIT.2005.1577106","DOIUrl":"https://doi.org/10.1109/ISSPIT.2005.1577106","url":null,"abstract":"This paper presents a method for vehicle flow detection statistic at traffic crossing based on computer vision and image processing. It can effectively use optical flow to detect traffic parameter by analyzing vehicle and scene information extracted from images. The experimental results show that this method is correct and efficient","PeriodicalId":421826,"journal":{"name":"Proceedings of the Fifth IEEE International Symposium on Signal Processing and Information Technology, 2005.","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122003558","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}