Pub Date : 2005-12-21DOI: 10.1109/ISSPIT.2005.1577201
A. Fadeev, N. Eltonsy, G. Tourassi, Adel Said Elmaghraby
The purpose of this study is to evaluate a 3D volume reconstruction model for volume rendering. The model is conducted using brain MRI data of Visible Human Project. Particularly MRI T1 data were used. The quality of the developed model is compared with linear interpolation technique. By applying our morphing technique recursively, taking progressively smaller subregions within a region, a high quality and accuracy interpolation is obtained. The presented algorithm is robust and has 20 adjustable parameters for use with different modalities. The main advantages of this morphing algorithm are: 1) applicability to general configurations of planes in 3D space, 2) automated behavior, 3) applicability to CT scans with no changes in the algorithm and software. Subsequently, to visualize data, a specialized volume rendering card (TeraRecon VolumePro 1000) was used. To represent data in 3D space, special software was developed to convert interpolated CT slices to 3D objects compatible with the VolumePro card. Quantitative and visual comparison between the proposed model and linear interpolation clearly demonstrates the superiority of the proposed model. Evaluation is performed by removing slices from the original stack of 2D images and using them as reference for error comparison among alternative approaches. Error analysis using average Mean Square and Absolute error clearly demonstrates improved performance
{"title":"Quality evaluation of fast morphing interpolation model for 3D volume reconstruction","authors":"A. Fadeev, N. Eltonsy, G. Tourassi, Adel Said Elmaghraby","doi":"10.1109/ISSPIT.2005.1577201","DOIUrl":"https://doi.org/10.1109/ISSPIT.2005.1577201","url":null,"abstract":"The purpose of this study is to evaluate a 3D volume reconstruction model for volume rendering. The model is conducted using brain MRI data of Visible Human Project. Particularly MRI T1 data were used. The quality of the developed model is compared with linear interpolation technique. By applying our morphing technique recursively, taking progressively smaller subregions within a region, a high quality and accuracy interpolation is obtained. The presented algorithm is robust and has 20 adjustable parameters for use with different modalities. The main advantages of this morphing algorithm are: 1) applicability to general configurations of planes in 3D space, 2) automated behavior, 3) applicability to CT scans with no changes in the algorithm and software. Subsequently, to visualize data, a specialized volume rendering card (TeraRecon VolumePro 1000) was used. To represent data in 3D space, special software was developed to convert interpolated CT slices to 3D objects compatible with the VolumePro card. Quantitative and visual comparison between the proposed model and linear interpolation clearly demonstrates the superiority of the proposed model. Evaluation is performed by removing slices from the original stack of 2D images and using them as reference for error comparison among alternative approaches. Error analysis using average Mean Square and Absolute error clearly demonstrates improved performance","PeriodicalId":421826,"journal":{"name":"Proceedings of the Fifth IEEE International Symposium on Signal Processing and Information Technology, 2005.","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127511936","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2005-12-21DOI: 10.1109/ISSPIT.2005.1577149
P. Fines, K. Christofylaki, P. Febvre
Aeronautical communications are playing an important role in the air traffic control as well as new passenger communication services. Due to the global coverage required, satellite transponders provide the required links which are traditionally limited to narrowband throughputs (e.g. 64 kb/s) due to the propagation channel characteristics. This paper analyses the reasons that limit the throughput of the aeronautical satellite links and presents advanced signal processing techniques that allow satellite transceivers to break the narrowband barriers
{"title":"Signal processing techniques for aeronautical communications via satellite","authors":"P. Fines, K. Christofylaki, P. Febvre","doi":"10.1109/ISSPIT.2005.1577149","DOIUrl":"https://doi.org/10.1109/ISSPIT.2005.1577149","url":null,"abstract":"Aeronautical communications are playing an important role in the air traffic control as well as new passenger communication services. Due to the global coverage required, satellite transponders provide the required links which are traditionally limited to narrowband throughputs (e.g. 64 kb/s) due to the propagation channel characteristics. This paper analyses the reasons that limit the throughput of the aeronautical satellite links and presents advanced signal processing techniques that allow satellite transceivers to break the narrowband barriers","PeriodicalId":421826,"journal":{"name":"Proceedings of the Fifth IEEE International Symposium on Signal Processing and Information Technology, 2005.","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126507521","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2005-12-21DOI: 10.1109/ISSPIT.2005.1577145
Kate A. Remley, C. Grosvenor, R. Johnk, David R. Novotny, Paul D. Hale, M. D. McKinley, A. Karygiannis, E. Antonakakis
The proliferation of wireless devices and the availability of new wireless applications and services raise new privacy and security concerns. Although network-layer anonymity protects the identities of the communication endpoints, the physical layer of many wireless communication protocols offers no such guarantee. The electromagnetic signal transmitted over an open communication medium can be monitored, captured, and analyzed in an effort to trace and identify users of wireless devices. In this paper we present preliminary results on the feasibility of identifying wireless nodes in a network by measuring distinctive electromagnetic characteristics or "signatures" of wireless local area network (WLAN) cards
{"title":"Electromagnetic signatures of WLAN cards and network security","authors":"Kate A. Remley, C. Grosvenor, R. Johnk, David R. Novotny, Paul D. Hale, M. D. McKinley, A. Karygiannis, E. Antonakakis","doi":"10.1109/ISSPIT.2005.1577145","DOIUrl":"https://doi.org/10.1109/ISSPIT.2005.1577145","url":null,"abstract":"The proliferation of wireless devices and the availability of new wireless applications and services raise new privacy and security concerns. Although network-layer anonymity protects the identities of the communication endpoints, the physical layer of many wireless communication protocols offers no such guarantee. The electromagnetic signal transmitted over an open communication medium can be monitored, captured, and analyzed in an effort to trace and identify users of wireless devices. In this paper we present preliminary results on the feasibility of identifying wireless nodes in a network by measuring distinctive electromagnetic characteristics or \"signatures\" of wireless local area network (WLAN) cards","PeriodicalId":421826,"journal":{"name":"Proceedings of the Fifth IEEE International Symposium on Signal Processing and Information Technology, 2005.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130569209","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2005-12-21DOI: 10.1109/ISSPIT.2005.1577135
H.K. Lee, B. Li, C. Rizos
To mitigate the effects of non-line-of-sight error in terrestrial wireless location systems, a wireless signal map matching concept was recently introduced. The key concept of the wireless signal map matching is the automatic extraction of relationship between an electronic map representing ideal world and the fully-populated anonymous user distribution representing the distorted world. This paper introduces an implementation procedure of the wireless signal map matching method. A simulation results demonstrates performance improvement that can be obtained by the proposed method
{"title":"Implementation procedure of wireless signal map matching for location-based services","authors":"H.K. Lee, B. Li, C. Rizos","doi":"10.1109/ISSPIT.2005.1577135","DOIUrl":"https://doi.org/10.1109/ISSPIT.2005.1577135","url":null,"abstract":"To mitigate the effects of non-line-of-sight error in terrestrial wireless location systems, a wireless signal map matching concept was recently introduced. The key concept of the wireless signal map matching is the automatic extraction of relationship between an electronic map representing ideal world and the fully-populated anonymous user distribution representing the distorted world. This paper introduces an implementation procedure of the wireless signal map matching method. A simulation results demonstrates performance improvement that can be obtained by the proposed method","PeriodicalId":421826,"journal":{"name":"Proceedings of the Fifth IEEE International Symposium on Signal Processing and Information Technology, 2005.","volume":"195 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114098167","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2005-12-21DOI: 10.1109/ISSPIT.2005.1577176
A. Sharma, S.P. Singh, V. Kumar
Speaker identification is recognizing the voice of someone familiar, and matches it to speaker's name. This is done by speech signal processing and extracting relevant information. This paper documents such a speaker identification technique using a MLP (multilayer perceptron) using backpropagation learning rule for text-independent speaker recognition for a closed set of speaker whose speech content are present in the repository
{"title":"Text-independent speaker identification using backpropagation MLP network classifier for a closed set of speakers","authors":"A. Sharma, S.P. Singh, V. Kumar","doi":"10.1109/ISSPIT.2005.1577176","DOIUrl":"https://doi.org/10.1109/ISSPIT.2005.1577176","url":null,"abstract":"Speaker identification is recognizing the voice of someone familiar, and matches it to speaker's name. This is done by speech signal processing and extracting relevant information. This paper documents such a speaker identification technique using a MLP (multilayer perceptron) using backpropagation learning rule for text-independent speaker recognition for a closed set of speaker whose speech content are present in the repository","PeriodicalId":421826,"journal":{"name":"Proceedings of the Fifth IEEE International Symposium on Signal Processing and Information Technology, 2005.","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128666044","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2005-12-21DOI: 10.1109/ISSPIT.2005.1577207
M. H. Sazli, C. Isik
In this paper, we show that the BCJR algorithm (or Bahl algorithm) can be implemented as a feedforward neural network structure based on a reformulation of the algorithm using matrix algebra. We verified through computer simulations that this novel neural network implementation yields identical results with the BCJR algorithm
{"title":"Neural network implementation of the BCJR algorithm based on reformulation using matrix algebra","authors":"M. H. Sazli, C. Isik","doi":"10.1109/ISSPIT.2005.1577207","DOIUrl":"https://doi.org/10.1109/ISSPIT.2005.1577207","url":null,"abstract":"In this paper, we show that the BCJR algorithm (or Bahl algorithm) can be implemented as a feedforward neural network structure based on a reformulation of the algorithm using matrix algebra. We verified through computer simulations that this novel neural network implementation yields identical results with the BCJR algorithm","PeriodicalId":421826,"journal":{"name":"Proceedings of the Fifth IEEE International Symposium on Signal Processing and Information Technology, 2005.","volume":"569 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134238460","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2005-12-21DOI: 10.1109/ISSPIT.2005.1577208
R. Parra-Hernandez, E. M. Laxdal, N. Dimopoulos, P. Alexiou
In this paper, we present a mechanism to obtain a neural network-based model that predicts an enzyme inhibitory activity of a group of compounds. The mechanism selects the compounds, among a sparse set of, that should be used to obtain models of the inhibitory activity of interest. That is, the mechanism is aimed to the selection of a training set of compounds which will ensure that the training of a neural network-based model will result in a system capable of generalization
{"title":"A new neural network ensemble heuristic for a predictor of the aldose reductase inhibitory activity","authors":"R. Parra-Hernandez, E. M. Laxdal, N. Dimopoulos, P. Alexiou","doi":"10.1109/ISSPIT.2005.1577208","DOIUrl":"https://doi.org/10.1109/ISSPIT.2005.1577208","url":null,"abstract":"In this paper, we present a mechanism to obtain a neural network-based model that predicts an enzyme inhibitory activity of a group of compounds. The mechanism selects the compounds, among a sparse set of, that should be used to obtain models of the inhibitory activity of interest. That is, the mechanism is aimed to the selection of a training set of compounds which will ensure that the training of a neural network-based model will result in a system capable of generalization","PeriodicalId":421826,"journal":{"name":"Proceedings of the Fifth IEEE International Symposium on Signal Processing and Information Technology, 2005.","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133951485","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2005-12-21DOI: 10.1109/ISSPIT.2005.1577219
A. Hirvonen, T. Leppanen
Mobile devices like PDAs and mobile phones include advanced multimedia processing capabilities especially in the area of audio, imaging and video. High performance graphics processing is emerging to the mobile devices in near future. Recent development in 3D graphics acceleration hardware has brought higher performance but also versatile and programmable 3D acceleration architectures. These programmable architectures can be utilized also for other purposes than graphics processing. In this paper we describe how graphics hardware can be used for video decoding based on the h.263 standard. In our implementation we have used OpenGL graphics API to program the graphics hardware. It is shown that programmable graphics hardware can be used for video processing with some limitations
{"title":"H.263 video decoding on programmable graphics hardware","authors":"A. Hirvonen, T. Leppanen","doi":"10.1109/ISSPIT.2005.1577219","DOIUrl":"https://doi.org/10.1109/ISSPIT.2005.1577219","url":null,"abstract":"Mobile devices like PDAs and mobile phones include advanced multimedia processing capabilities especially in the area of audio, imaging and video. High performance graphics processing is emerging to the mobile devices in near future. Recent development in 3D graphics acceleration hardware has brought higher performance but also versatile and programmable 3D acceleration architectures. These programmable architectures can be utilized also for other purposes than graphics processing. In this paper we describe how graphics hardware can be used for video decoding based on the h.263 standard. In our implementation we have used OpenGL graphics API to program the graphics hardware. It is shown that programmable graphics hardware can be used for video processing with some limitations","PeriodicalId":421826,"journal":{"name":"Proceedings of the Fifth IEEE International Symposium on Signal Processing and Information Technology, 2005.","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132830182","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2005-12-21DOI: 10.1109/ISSPIT.2005.1577140
B. Zerlin, J. Nossek
We study the crosslayer problem of joint optimization of radio parameters in a multiuser MISO system with partial channel state information at the transmitter. The central optimization problem within is formulated as a power minimization subject to a set of QoS constraints. Based upon analytical models for all regarded sublayers and the formulation of the resulting channel outage probability of the MISO system, the mode of operation and the MISO transmit processing are optimized jointly in an fast converging iterative scheme. With these results service requests from different users can be met with a significantly lower amount of resources, resulting in a higher system capacity
{"title":"An approach to crosslayer QoS management in MISO systems","authors":"B. Zerlin, J. Nossek","doi":"10.1109/ISSPIT.2005.1577140","DOIUrl":"https://doi.org/10.1109/ISSPIT.2005.1577140","url":null,"abstract":"We study the crosslayer problem of joint optimization of radio parameters in a multiuser MISO system with partial channel state information at the transmitter. The central optimization problem within is formulated as a power minimization subject to a set of QoS constraints. Based upon analytical models for all regarded sublayers and the formulation of the resulting channel outage probability of the MISO system, the mode of operation and the MISO transmit processing are optimized jointly in an fast converging iterative scheme. With these results service requests from different users can be met with a significantly lower amount of resources, resulting in a higher system capacity","PeriodicalId":421826,"journal":{"name":"Proceedings of the Fifth IEEE International Symposium on Signal Processing and Information Technology, 2005.","volume":"112 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124070631","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2005-12-21DOI: 10.1109/ISSPIT.2005.1577157
C. Andersson, J. Camenisch, S. Crane, S. Fischer-Hübner, R. Leenes, Siani Pearson, J. Pettersson, Dieter Sommer
The PRIME project develops privacy enhancing identity management systems that allow users in various application areas such as e-commerce to regain control over their personal spheres. This paper introduces the PRIME technical architecture that also includes special trust-enhancing mechanisms, and shows how PRIME technologies can enhance privacy and trust of e-shopping customers. It also discusses the socio-psychological factors and HCI aspects influencing the end user's trust in privacy enhancing identity management, and shows why HCI research, user studies, and socio-psychological research, are necessary efforts to accompany system design
{"title":"Trust in PRIME","authors":"C. Andersson, J. Camenisch, S. Crane, S. Fischer-Hübner, R. Leenes, Siani Pearson, J. Pettersson, Dieter Sommer","doi":"10.1109/ISSPIT.2005.1577157","DOIUrl":"https://doi.org/10.1109/ISSPIT.2005.1577157","url":null,"abstract":"The PRIME project develops privacy enhancing identity management systems that allow users in various application areas such as e-commerce to regain control over their personal spheres. This paper introduces the PRIME technical architecture that also includes special trust-enhancing mechanisms, and shows how PRIME technologies can enhance privacy and trust of e-shopping customers. It also discusses the socio-psychological factors and HCI aspects influencing the end user's trust in privacy enhancing identity management, and shows why HCI research, user studies, and socio-psychological research, are necessary efforts to accompany system design","PeriodicalId":421826,"journal":{"name":"Proceedings of the Fifth IEEE International Symposium on Signal Processing and Information Technology, 2005.","volume":"218 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130406095","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}