Pub Date : 2005-12-21DOI: 10.1109/ISSPIT.2005.1577099
G. Hjálmtýsson, H. Sverrisson
In spite of substantial amount of work on rapid service creation, active networking and modular routers, the convergence of routers and computers has not taken place. Instead, network nodes continue to be built either as routers or as end-systems, with new network services pushed even further out of routers and being offered over application layer overlays between end-systems. We conjecture that the inherent simplicity that end-system based overlays offer the network service creator (programmer) will continue to drive network services to end-systems. Still, end-system based overlays introduce significant management complexity, and fail to exploit underlying (hardware) capabilities, both specific hardware support and increasing agility of the lower layers. In this paper, we describe our work on router architectures and the requirements that we foresee future network nodes must satisfy to provide the simplicity that service programmers desire while effectively exploiting capabilities of the lower layers. The architecture incorporates end-systems, boundary gateways, and routers, however, isolating the details of nodal facilities from application and service programmers. The architecture is designed to self-configure and self-optimize each node, fully exploiting the hardware facilities at each node and across a network of nodes, without explicit instructions from network programmers. We discuss the elements of the architecture, the components we have constructed, and the challenges in realizing the remaining elements and ultimately in assembling them into an integrated networking system
{"title":"On requirements and challenges of future network nodes","authors":"G. Hjálmtýsson, H. Sverrisson","doi":"10.1109/ISSPIT.2005.1577099","DOIUrl":"https://doi.org/10.1109/ISSPIT.2005.1577099","url":null,"abstract":"In spite of substantial amount of work on rapid service creation, active networking and modular routers, the convergence of routers and computers has not taken place. Instead, network nodes continue to be built either as routers or as end-systems, with new network services pushed even further out of routers and being offered over application layer overlays between end-systems. We conjecture that the inherent simplicity that end-system based overlays offer the network service creator (programmer) will continue to drive network services to end-systems. Still, end-system based overlays introduce significant management complexity, and fail to exploit underlying (hardware) capabilities, both specific hardware support and increasing agility of the lower layers. In this paper, we describe our work on router architectures and the requirements that we foresee future network nodes must satisfy to provide the simplicity that service programmers desire while effectively exploiting capabilities of the lower layers. The architecture incorporates end-systems, boundary gateways, and routers, however, isolating the details of nodal facilities from application and service programmers. The architecture is designed to self-configure and self-optimize each node, fully exploiting the hardware facilities at each node and across a network of nodes, without explicit instructions from network programmers. We discuss the elements of the architecture, the components we have constructed, and the challenges in realizing the remaining elements and ultimately in assembling them into an integrated networking system","PeriodicalId":421826,"journal":{"name":"Proceedings of the Fifth IEEE International Symposium on Signal Processing and Information Technology, 2005.","volume":"222 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116162708","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2005-12-21DOI: 10.1109/ISSPIT.2005.1577098
S. Colantonio, D. Moroni, O. Salvetti
A two-stage method for left ventricle (LV) segmentation in magnetic resonance imaging (MRI) is reported as the current results of an ongoing research carried on within a project devoted to the analysis and study of the cardiac dynamics. The first stage of the proposed method for LV segmentation is focused on the identification and localization of the left ventricle cavity, by means of fuzzy clustering and temporal regions tracking. The final segmentation is accomplished by a second processing stage, devoted to identify the left ventricle contours using an artificial neural network
{"title":"MRI left ventricle segmentation and reconstruction for the study of the heart dynamics","authors":"S. Colantonio, D. Moroni, O. Salvetti","doi":"10.1109/ISSPIT.2005.1577098","DOIUrl":"https://doi.org/10.1109/ISSPIT.2005.1577098","url":null,"abstract":"A two-stage method for left ventricle (LV) segmentation in magnetic resonance imaging (MRI) is reported as the current results of an ongoing research carried on within a project devoted to the analysis and study of the cardiac dynamics. The first stage of the proposed method for LV segmentation is focused on the identification and localization of the left ventricle cavity, by means of fuzzy clustering and temporal regions tracking. The final segmentation is accomplished by a second processing stage, devoted to identify the left ventricle contours using an artificial neural network","PeriodicalId":421826,"journal":{"name":"Proceedings of the Fifth IEEE International Symposium on Signal Processing and Information Technology, 2005.","volume":"92 10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128017994","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2005-12-21DOI: 10.1109/ISSPIT.2005.1577221
B. García, J. Vicente, I. Ruiz, A. Alonso
In the last few years there have been great advances in speech processing techniques, frequently oriented to speech recognition, musical effects or vocal encoding. This paper, though many of its contents deal with speech processing, is focused on the developing of hardware devices with DSP's, which implement algorithm for evaluation and improvement of pathological voices. Thus, the control of actual systems, such as a digital home or a voice controlled operator, will be possible
{"title":"Multiplatform interface adapted to pathological voices","authors":"B. García, J. Vicente, I. Ruiz, A. Alonso","doi":"10.1109/ISSPIT.2005.1577221","DOIUrl":"https://doi.org/10.1109/ISSPIT.2005.1577221","url":null,"abstract":"In the last few years there have been great advances in speech processing techniques, frequently oriented to speech recognition, musical effects or vocal encoding. This paper, though many of its contents deal with speech processing, is focused on the developing of hardware devices with DSP's, which implement algorithm for evaluation and improvement of pathological voices. Thus, the control of actual systems, such as a digital home or a voice controlled operator, will be possible","PeriodicalId":421826,"journal":{"name":"Proceedings of the Fifth IEEE International Symposium on Signal Processing and Information Technology, 2005.","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127549486","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2005-12-21DOI: 10.1109/ISSPIT.2005.1577174
Aijuan Dong, Honglin Li
Educational documentary videos play an important role in enriching learning experience. However, due to unstructured and linear features, documentary videos are much more difficult to access than text-based documents and have not been effectively utilized. In this paper, we propose a multimodal, hierarchical documentary video segmentation procedure based on image, audio and text understanding. The coincidence of scene-level audio breaks and text (transcript) breaks from domain independent text segmentation determines documentary video scenes/paragraphs. Each video scene/paragraph is further segmented into video shots based on video visual features. To effectively utilize composite documentary video learning materials generated, we propose a documentary video access platform that supports hierarchical organization of video content, multimodal presentation of information, augmented video content and multi-level flexible search. A prototype platform is implemented to demonstrate the idea
{"title":"Educational documentary video segmentation and access through combination of visual, audio and text understanding","authors":"Aijuan Dong, Honglin Li","doi":"10.1109/ISSPIT.2005.1577174","DOIUrl":"https://doi.org/10.1109/ISSPIT.2005.1577174","url":null,"abstract":"Educational documentary videos play an important role in enriching learning experience. However, due to unstructured and linear features, documentary videos are much more difficult to access than text-based documents and have not been effectively utilized. In this paper, we propose a multimodal, hierarchical documentary video segmentation procedure based on image, audio and text understanding. The coincidence of scene-level audio breaks and text (transcript) breaks from domain independent text segmentation determines documentary video scenes/paragraphs. Each video scene/paragraph is further segmented into video shots based on video visual features. To effectively utilize composite documentary video learning materials generated, we propose a documentary video access platform that supports hierarchical organization of video content, multimodal presentation of information, augmented video content and multi-level flexible search. A prototype platform is implemented to demonstrate the idea","PeriodicalId":421826,"journal":{"name":"Proceedings of the Fifth IEEE International Symposium on Signal Processing and Information Technology, 2005.","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124060157","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2005-12-21DOI: 10.1109/ISSPIT.2005.1577136
D. Arora, P. Agathoklis
A semi-analytical framework for capacity analysis of a downlink channel in the presence of fading and interference from other users is presented. The users are selected for service based on the selection criteria such as RR, greedy and scheduling algorithm proposed in D. Arora and P. Agathoklis, 2005. The fading is modelled using a Nakagami model. The results obtained show that by explicitly taking into consideration for the selection of users served simultaneously both, the angular location of mobile users around the base station and the instantaneous SNR at the MAC layer, an improved system capacity is achieved. This improvement is due to the reduced interference that simultaneously served users cause on each other. The results show that jointly addressing the PHY and MAC layer issues in an integrated cross-layer framework is important for improving system performance
提出了在存在衰落和其他用户干扰的情况下下行信道容量分析的半解析框架。用户的选择基于RR、贪心和调度算法(D. Arora and P. Agathoklis, 2005)等选择准则。衰落是用Nakagami模型来建模的。结果表明,通过明确考虑同时服务用户的选择、移动用户在基站周围的角度位置和MAC层的瞬时信噪比,提高了系统容量。这种改进是由于减少了同时服务的用户对彼此造成的干扰。结果表明,在集成的跨层框架中共同解决物理层和MAC层问题对于提高系统性能具有重要意义
{"title":"Capacity analysis of a cross layer downlink model in the presence of fading and interference","authors":"D. Arora, P. Agathoklis","doi":"10.1109/ISSPIT.2005.1577136","DOIUrl":"https://doi.org/10.1109/ISSPIT.2005.1577136","url":null,"abstract":"A semi-analytical framework for capacity analysis of a downlink channel in the presence of fading and interference from other users is presented. The users are selected for service based on the selection criteria such as RR, greedy and scheduling algorithm proposed in D. Arora and P. Agathoklis, 2005. The fading is modelled using a Nakagami model. The results obtained show that by explicitly taking into consideration for the selection of users served simultaneously both, the angular location of mobile users around the base station and the instantaneous SNR at the MAC layer, an improved system capacity is achieved. This improvement is due to the reduced interference that simultaneously served users cause on each other. The results show that jointly addressing the PHY and MAC layer issues in an integrated cross-layer framework is important for improving system performance","PeriodicalId":421826,"journal":{"name":"Proceedings of the Fifth IEEE International Symposium on Signal Processing and Information Technology, 2005.","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127840737","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2005-12-21DOI: 10.1109/ISSPIT.2005.1577093
P.R.R. Hasanzadeh, A. Shahmirzaie, A. Rezaie
In attention to general motion detection methods, differential sequences of frames make some convenience which expand it's usability for lots of applications. In practice, differential sequences of frames have been affected by environmental noises and CCD cameras structure that make it difficult to detect objects. In this method using differential histogram equalization, we try to enhance and increase the contrast between data and noise histogram levels. The new threshold levels adaptively obtained by simple algorithm and without knowing the probability distribution function of the noise
{"title":"Motion detection using differential histogram equalization","authors":"P.R.R. Hasanzadeh, A. Shahmirzaie, A. Rezaie","doi":"10.1109/ISSPIT.2005.1577093","DOIUrl":"https://doi.org/10.1109/ISSPIT.2005.1577093","url":null,"abstract":"In attention to general motion detection methods, differential sequences of frames make some convenience which expand it's usability for lots of applications. In practice, differential sequences of frames have been affected by environmental noises and CCD cameras structure that make it difficult to detect objects. In this method using differential histogram equalization, we try to enhance and increase the contrast between data and noise histogram levels. The new threshold levels adaptively obtained by simple algorithm and without knowing the probability distribution function of the noise","PeriodicalId":421826,"journal":{"name":"Proceedings of the Fifth IEEE International Symposium on Signal Processing and Information Technology, 2005.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129182201","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2005-12-21DOI: 10.1109/ISSPIT.2005.1577132
M. Shoeb, F. Ahmad, M. Amin
This paper demonstrates the effectiveness of narrowband source localization techniques in indoor environments. Experiments are conducted using multiple antennas and a network analyzer. An active RF source is placed at different locations in a medium-sized office. Three sensors, placed at known positions, are used to estimate the location of the source using time of arrival (TOA) information. Trilateration is first utilized to obtain an initial estimate for the source location. Constrained optimization is then applied to improve estimation accuracy. In the experiment setup, only one sensor has a line-of-sight (LOS) communication path to the source, while the other two sensors are restricted to a non-line-of-sight setting. Different obstructed line-of-sight (OLOS) biases are physically introduced to demonstrate a real-life situation, where several moving objects may exist between the source and the sensors
{"title":"Narrowband source localization for indoor wireless environments","authors":"M. Shoeb, F. Ahmad, M. Amin","doi":"10.1109/ISSPIT.2005.1577132","DOIUrl":"https://doi.org/10.1109/ISSPIT.2005.1577132","url":null,"abstract":"This paper demonstrates the effectiveness of narrowband source localization techniques in indoor environments. Experiments are conducted using multiple antennas and a network analyzer. An active RF source is placed at different locations in a medium-sized office. Three sensors, placed at known positions, are used to estimate the location of the source using time of arrival (TOA) information. Trilateration is first utilized to obtain an initial estimate for the source location. Constrained optimization is then applied to improve estimation accuracy. In the experiment setup, only one sensor has a line-of-sight (LOS) communication path to the source, while the other two sensors are restricted to a non-line-of-sight setting. Different obstructed line-of-sight (OLOS) biases are physically introduced to demonstrate a real-life situation, where several moving objects may exist between the source and the sensors","PeriodicalId":421826,"journal":{"name":"Proceedings of the Fifth IEEE International Symposium on Signal Processing and Information Technology, 2005.","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115863447","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2005-12-21DOI: 10.1109/ISSPIT.2005.1577116
A. El Bouziri, A. Boulmakoul, M. Chala, H. Mouncif
The convergence of wireless communication, mobile positioning and geographic information system (GIS) has given rise to a new class of location based applications and services, which deliver real-time information to mobile users in accordance with their current locations. The mobile applications deal with tracking and management of mobile objects, and need to pose spatio-temporal queries. In this paper, we propose a data model of mobile object on a transportation network according to open OGC simple feature specification, and present a query language with a powerful set of predicates. We also give with the new emerging RT-UML specification an object oriented model of transportation information system (TIS) as a prototype to using the mobile object in a real-time context for location based services
{"title":"Modeling and querying mobile object on transportation network for mobile applications","authors":"A. El Bouziri, A. Boulmakoul, M. Chala, H. Mouncif","doi":"10.1109/ISSPIT.2005.1577116","DOIUrl":"https://doi.org/10.1109/ISSPIT.2005.1577116","url":null,"abstract":"The convergence of wireless communication, mobile positioning and geographic information system (GIS) has given rise to a new class of location based applications and services, which deliver real-time information to mobile users in accordance with their current locations. The mobile applications deal with tracking and management of mobile objects, and need to pose spatio-temporal queries. In this paper, we propose a data model of mobile object on a transportation network according to open OGC simple feature specification, and present a query language with a powerful set of predicates. We also give with the new emerging RT-UML specification an object oriented model of transportation information system (TIS) as a prototype to using the mobile object in a real-time context for location based services","PeriodicalId":421826,"journal":{"name":"Proceedings of the Fifth IEEE International Symposium on Signal Processing and Information Technology, 2005.","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115268942","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2005-12-21DOI: 10.1109/ISSPIT.2005.1577166
F. Zargari, O. Fatemi
Wavelet transform (WT), which is used in Motion JPEG 2000 for image transform, concentrates most of the energy of transformed image in LL sub-band. Hence, transmission error in LL sub-band of motion JPEG 2000 stream deteriorates the quality of the transmitted images to a grate extent. In this paper, a novel error concealment (EC) method is introduced for damaged LL sub-band of Motion JPEG 2000 image sequences. In the first step of this method, inverse wavelet transform is applied to LH, HL and HH (high frequency) sub-bands (HF-IWT). In the second step the motion estimation techniques are applied to the HF-IWT images of the damaged frame and the previous frame. The resulted motion vectors are used for determining the best matching point from the LL subband of previous correct frame for the points in the damaged LL sub-band. The matching point for any damaged point is accepted for EC if it satisfies the constraints which are set by the received value for the damaged point and number of lost bit planes. The proposed method outperforms the previous inter and intra mode EC methods for any number of lost bit planes in LL sub-band
{"title":"Error concealment of damaged LL sub-band in motion JPEG 2000","authors":"F. Zargari, O. Fatemi","doi":"10.1109/ISSPIT.2005.1577166","DOIUrl":"https://doi.org/10.1109/ISSPIT.2005.1577166","url":null,"abstract":"Wavelet transform (WT), which is used in Motion JPEG 2000 for image transform, concentrates most of the energy of transformed image in LL sub-band. Hence, transmission error in LL sub-band of motion JPEG 2000 stream deteriorates the quality of the transmitted images to a grate extent. In this paper, a novel error concealment (EC) method is introduced for damaged LL sub-band of Motion JPEG 2000 image sequences. In the first step of this method, inverse wavelet transform is applied to LH, HL and HH (high frequency) sub-bands (HF-IWT). In the second step the motion estimation techniques are applied to the HF-IWT images of the damaged frame and the previous frame. The resulted motion vectors are used for determining the best matching point from the LL subband of previous correct frame for the points in the damaged LL sub-band. The matching point for any damaged point is accepted for EC if it satisfies the constraints which are set by the received value for the damaged point and number of lost bit planes. The proposed method outperforms the previous inter and intra mode EC methods for any number of lost bit planes in LL sub-band","PeriodicalId":421826,"journal":{"name":"Proceedings of the Fifth IEEE International Symposium on Signal Processing and Information Technology, 2005.","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115322430","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2005-12-21DOI: 10.1109/ISSPIT.2005.1577106
Chen Zhenxue, Wang Guoyou, Liu Chenyun
This paper presents a method for vehicle flow detection statistic at traffic crossing based on computer vision and image processing. It can effectively use optical flow to detect traffic parameter by analyzing vehicle and scene information extracted from images. The experimental results show that this method is correct and efficient
{"title":"Vehicle flow detection statistic algorithm based on optical flow","authors":"Chen Zhenxue, Wang Guoyou, Liu Chenyun","doi":"10.1109/ISSPIT.2005.1577106","DOIUrl":"https://doi.org/10.1109/ISSPIT.2005.1577106","url":null,"abstract":"This paper presents a method for vehicle flow detection statistic at traffic crossing based on computer vision and image processing. It can effectively use optical flow to detect traffic parameter by analyzing vehicle and scene information extracted from images. The experimental results show that this method is correct and efficient","PeriodicalId":421826,"journal":{"name":"Proceedings of the Fifth IEEE International Symposium on Signal Processing and Information Technology, 2005.","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122003558","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}