Pub Date : 2005-12-06DOI: 10.1109/ICICS.2005.1689177
M.L. Miller
This paper discusses an approach to quantization for lossy compression, termed greedy perceptual coding, in which the quantizer uses a perceptual model to determine the amount by which a work of media can be distorted, and then greedily tries to find the distortion that minimizes the number of bits that will be output by a subsequent lossless coder. The chief advantage of this approach is that the decoder does not need to know any distortion parameters used during compression, such as quantization step sizes or perceptual model parameters. As a result, the perceptual model can be arbitrarily complex. Since greedy perceptual coding changes the distribution of image values to be encoded, the best lossless codes for undistorted images are not the best to use in this context. A method is presented here for designing simple codes to use in the greedy-perceptual-coding context, and a preliminary compression system is implemented using these ideas
{"title":"Greedy perceptual coding","authors":"M.L. Miller","doi":"10.1109/ICICS.2005.1689177","DOIUrl":"https://doi.org/10.1109/ICICS.2005.1689177","url":null,"abstract":"This paper discusses an approach to quantization for lossy compression, termed greedy perceptual coding, in which the quantizer uses a perceptual model to determine the amount by which a work of media can be distorted, and then greedily tries to find the distortion that minimizes the number of bits that will be output by a subsequent lossless coder. The chief advantage of this approach is that the decoder does not need to know any distortion parameters used during compression, such as quantization step sizes or perceptual model parameters. As a result, the perceptual model can be arbitrarily complex. Since greedy perceptual coding changes the distribution of image values to be encoded, the best lossless codes for undistorted images are not the best to use in this context. A method is presented here for designing simple codes to use in the greedy-perceptual-coding context, and a preliminary compression system is implemented using these ideas","PeriodicalId":425178,"journal":{"name":"2005 5th International Conference on Information Communications & Signal Processing","volume":"117 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124339668","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2005-12-06DOI: 10.1109/ICICS.2005.1689076
Yihjia Tsai, Cheng-Chin Lin, Ching-Chang Lin
In recent years, network models have been extensively studied. Most of those models are based on the binary status of the existence of a communication link, the intensity of the communication pattern for a given pair of nodes is not taken into consideration. In this paper, we study the statistics of commonly used Email communication and take into account communication frequencies. The resulting weighted Email communication network showed a rather different statistical behavior than the unweighted one. We compare the link and node weight distribution under different assumptions. Finally, weighted clustering coefficient and group growth are introduced and analyzed in the network
{"title":"Characteristics of Weighted Email Communications","authors":"Yihjia Tsai, Cheng-Chin Lin, Ching-Chang Lin","doi":"10.1109/ICICS.2005.1689076","DOIUrl":"https://doi.org/10.1109/ICICS.2005.1689076","url":null,"abstract":"In recent years, network models have been extensively studied. Most of those models are based on the binary status of the existence of a communication link, the intensity of the communication pattern for a given pair of nodes is not taken into consideration. In this paper, we study the statistics of commonly used Email communication and take into account communication frequencies. The resulting weighted Email communication network showed a rather different statistical behavior than the unweighted one. We compare the link and node weight distribution under different assumptions. Finally, weighted clustering coefficient and group growth are introduced and analyzed in the network","PeriodicalId":425178,"journal":{"name":"2005 5th International Conference on Information Communications & Signal Processing","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124501693","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2005-12-06DOI: 10.1109/ICICS.2005.1689224
D. Engel, A. Uhl
We present improvements in lightweight transparent JPEG 2000 encryption with lifting parameterized biorthogonal wavelet filters. Security is further enhanced by a combination with the wavelet packet transform. Different methods for the selection of a suitable wavelet packet basis are presented, which also make a certain amount of control in the trade-off between security and computational complexity possible. The combined approach of parameterized filters and wavelet packets is evaluated with regard to compression performance, complexity and security
{"title":"Security Enhancement for Lightweight JPEG 2000 Transparent Encryption","authors":"D. Engel, A. Uhl","doi":"10.1109/ICICS.2005.1689224","DOIUrl":"https://doi.org/10.1109/ICICS.2005.1689224","url":null,"abstract":"We present improvements in lightweight transparent JPEG 2000 encryption with lifting parameterized biorthogonal wavelet filters. Security is further enhanced by a combination with the wavelet packet transform. Different methods for the selection of a suitable wavelet packet basis are presented, which also make a certain amount of control in the trade-off between security and computational complexity possible. The combined approach of parameterized filters and wavelet packets is evaluated with regard to compression performance, complexity and security","PeriodicalId":425178,"journal":{"name":"2005 5th International Conference on Information Communications & Signal Processing","volume":"168 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114744590","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2005-12-06DOI: 10.1109/ICICS.2005.1689289
Y. Le Moullec, S. S. Christensen, W. Chenpeng, P. Koch, S. Bilavarn
In this paper a new methodology for accelerating the development cycle of DSP applications is presented. This methodology is composed of three steps 1) algorithm design with Matlab (mathworks), 2) algorithmic-level characterization and parallelism exploration using Design-Trotter SoC framework (LESTER/CISS) and 3) FPGA hardware synthesis with DK Design Suite (Celoxica). We have applied the proposed methodology to explore the design space of a RAKE receiver. The results show that by using this methodology, designers can rapidly converge from specification phases to the final synthesis of the system. The parallelism information provided by Design-Trotter has been shown extremely useful to develop the Handel-C description of the application, enabling a rapid synthesis of the system with DK Design Suite. The time-to-market factor is thus significantly reduced
{"title":"Design Space Exploration for Rapid Development of DSP Applications","authors":"Y. Le Moullec, S. S. Christensen, W. Chenpeng, P. Koch, S. Bilavarn","doi":"10.1109/ICICS.2005.1689289","DOIUrl":"https://doi.org/10.1109/ICICS.2005.1689289","url":null,"abstract":"In this paper a new methodology for accelerating the development cycle of DSP applications is presented. This methodology is composed of three steps 1) algorithm design with Matlab (mathworks), 2) algorithmic-level characterization and parallelism exploration using Design-Trotter SoC framework (LESTER/CISS) and 3) FPGA hardware synthesis with DK Design Suite (Celoxica). We have applied the proposed methodology to explore the design space of a RAKE receiver. The results show that by using this methodology, designers can rapidly converge from specification phases to the final synthesis of the system. The parallelism information provided by Design-Trotter has been shown extremely useful to develop the Handel-C description of the application, enabling a rapid synthesis of the system with DK Design Suite. The time-to-market factor is thus significantly reduced","PeriodicalId":425178,"journal":{"name":"2005 5th International Conference on Information Communications & Signal Processing","volume":"571 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116296545","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2005-12-06DOI: 10.1109/ICICS.2005.1689239
Teh Hong, W. Chee, R. Budiarto
Digital video broadcasting (DVB) defines the carriage of multimedia and Internet information to client by means of MPEG-2 transport stream. The DVB standards also allow the same system to transmit Internet protocol (IP) data. This data broadcasting technology enables the broadcast of large amount of data to the personal computer over satellite or other broadcasting network. This allows the MPEG-2 TS bearer become a hop in IP network. The intention of this paper is to compare the existing multi-protocol encapsulation and ultra lightweight encapsulation methods for IP transmission over DVB networks
{"title":"A Comparison of IP Datagrams Transmission using MPE and ULE over Mpeg-2/DVB Networks","authors":"Teh Hong, W. Chee, R. Budiarto","doi":"10.1109/ICICS.2005.1689239","DOIUrl":"https://doi.org/10.1109/ICICS.2005.1689239","url":null,"abstract":"Digital video broadcasting (DVB) defines the carriage of multimedia and Internet information to client by means of MPEG-2 transport stream. The DVB standards also allow the same system to transmit Internet protocol (IP) data. This data broadcasting technology enables the broadcast of large amount of data to the personal computer over satellite or other broadcasting network. This allows the MPEG-2 TS bearer become a hop in IP network. The intention of this paper is to compare the existing multi-protocol encapsulation and ultra lightweight encapsulation methods for IP transmission over DVB networks","PeriodicalId":425178,"journal":{"name":"2005 5th International Conference on Information Communications & Signal Processing","volume":"90 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116325816","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2005-12-06DOI: 10.1109/ICICS.2005.1689055
D. Climie, S. Chen, A. Bermak, D. Martinez
This paper presents a VLSI architecture of a frame-based adaptive quantization technique based on the fast boundary adaptation rule (FBAR). The adaptive quantization algorithm is integrated together with a 128times128 pixel CMOS image sensor array. The pixel operation is based on biologically inspired time-to-first spike encoding scheme. System and circuit level simulations show the successful operation of the proposed architecture
{"title":"Frame Based Adaptation for CMOS Imager","authors":"D. Climie, S. Chen, A. Bermak, D. Martinez","doi":"10.1109/ICICS.2005.1689055","DOIUrl":"https://doi.org/10.1109/ICICS.2005.1689055","url":null,"abstract":"This paper presents a VLSI architecture of a frame-based adaptive quantization technique based on the fast boundary adaptation rule (FBAR). The adaptive quantization algorithm is integrated together with a 128times128 pixel CMOS image sensor array. The pixel operation is based on biologically inspired time-to-first spike encoding scheme. System and circuit level simulations show the successful operation of the proposed architecture","PeriodicalId":425178,"journal":{"name":"2005 5th International Conference on Information Communications & Signal Processing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125850977","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2005-12-06DOI: 10.1109/ICICS.2005.1689165
A. Pradabphon, W. Doungdeun, M. Chamchoy, P. Supanakoon, S. Promwong
In this paper, the distortion of ultra-wideband (UWB) pulse due to the human body shadowing is investigated. The frequency responses of the radio channels are acquired by using a vector network analyzer (VNA) over the frequency bandwidth of 3 GHz to 11 GHz. The experimental channels are taken for several T-R separation distances in the indoor environment. Consequently, the characteristics of the UWB pulse distortion including the effect of transmitter/receiver antennas and human body are examined. The pulse distortion is considered by using the percentage of the correlation coefficient between the transmitted signal and the received signal. As the results, the distortion of UWB pulse increases as the T-R separation distance increases, especially when the fully shadowing is observed
{"title":"Investigation of Ultra-Wideband Pulse Distortion Due to the Body Shadowing","authors":"A. Pradabphon, W. Doungdeun, M. Chamchoy, P. Supanakoon, S. Promwong","doi":"10.1109/ICICS.2005.1689165","DOIUrl":"https://doi.org/10.1109/ICICS.2005.1689165","url":null,"abstract":"In this paper, the distortion of ultra-wideband (UWB) pulse due to the human body shadowing is investigated. The frequency responses of the radio channels are acquired by using a vector network analyzer (VNA) over the frequency bandwidth of 3 GHz to 11 GHz. The experimental channels are taken for several T-R separation distances in the indoor environment. Consequently, the characteristics of the UWB pulse distortion including the effect of transmitter/receiver antennas and human body are examined. The pulse distortion is considered by using the percentage of the correlation coefficient between the transmitted signal and the received signal. As the results, the distortion of UWB pulse increases as the T-R separation distance increases, especially when the fully shadowing is observed","PeriodicalId":425178,"journal":{"name":"2005 5th International Conference on Information Communications & Signal Processing","volume":"148 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128183715","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2005-12-06DOI: 10.1109/ICICS.2005.1689008
T. Deng
To perform variable fractional-delay (VFD) filtering, the VFD parameter p is assumed to take fractional numbers in pisin[0,1] and pisin[-0.5, 0.5] in the literature, but it needs to be clarified that which range should be adopted for achieving high-accuracy VFD filtering. In this paper, we first analyze the accurate range qualitatively, and then utilize interpolation examples to demonstrate that range pisin [-0.5, 0.5] is the better choice for accurate VFD filtering
{"title":"Accurate Range for Variable Fractional-Delay Filtering","authors":"T. Deng","doi":"10.1109/ICICS.2005.1689008","DOIUrl":"https://doi.org/10.1109/ICICS.2005.1689008","url":null,"abstract":"To perform variable fractional-delay (VFD) filtering, the VFD parameter p is assumed to take fractional numbers in pisin[0,1] and pisin[-0.5, 0.5] in the literature, but it needs to be clarified that which range should be adopted for achieving high-accuracy VFD filtering. In this paper, we first analyze the accurate range qualitatively, and then utilize interpolation examples to demonstrate that range pisin [-0.5, 0.5] is the better choice for accurate VFD filtering","PeriodicalId":425178,"journal":{"name":"2005 5th International Conference on Information Communications & Signal Processing","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128645695","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2005-12-06DOI: 10.1109/ICICS.2005.1689279
K. C. Lim, Y. Guan
Code shortening is commonly performed in practice but its analytical decoding performance is not well understood. In this paper, we present tight expressions for estimating the weight enumerator and hence BER (bit error rate) performance of linear shortened and shortened-extended block/product codes operating in AWGN and Rayleigh fading channels. The expressions are easy to use as they are expressed in terms of the original (un-shortened) code properties, which are widely reported. Asymptotic coding loss expressions associated with code shortening are also derived
{"title":"On the Weight Enumerator and BER Bounds of Shortened Block and Product Codes","authors":"K. C. Lim, Y. Guan","doi":"10.1109/ICICS.2005.1689279","DOIUrl":"https://doi.org/10.1109/ICICS.2005.1689279","url":null,"abstract":"Code shortening is commonly performed in practice but its analytical decoding performance is not well understood. In this paper, we present tight expressions for estimating the weight enumerator and hence BER (bit error rate) performance of linear shortened and shortened-extended block/product codes operating in AWGN and Rayleigh fading channels. The expressions are easy to use as they are expressed in terms of the original (un-shortened) code properties, which are widely reported. Asymptotic coding loss expressions associated with code shortening are also derived","PeriodicalId":425178,"journal":{"name":"2005 5th International Conference on Information Communications & Signal Processing","volume":"103 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127073239","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2005-12-06DOI: 10.1109/ICICS.2005.1689298
M. Nilsson, F. Sattar, H. K. Chng, I. Claesson
This paper investigates the successive mean quantization transform (SMQT) for enhancement of dental X-ray images. The aim is to provide an automatic tool for enhancing the dental X-rays that would aid an interpreter, who is typically a specialist in dentistry. The evaluation is performed based on a subjective test by a clinical expert/endodontist that has vast experience in dental X-ray analysis and diagnosis. Based on the subjective test for a number of dental images, this SMQT based enhancement method is found to provide a useful tool for enhancing the diagnostic value of dental X-ray images
{"title":"Automatic Enhancement and Subjective Evaluation of Dental X-ray Images using the SMQT","authors":"M. Nilsson, F. Sattar, H. K. Chng, I. Claesson","doi":"10.1109/ICICS.2005.1689298","DOIUrl":"https://doi.org/10.1109/ICICS.2005.1689298","url":null,"abstract":"This paper investigates the successive mean quantization transform (SMQT) for enhancement of dental X-ray images. The aim is to provide an automatic tool for enhancing the dental X-rays that would aid an interpreter, who is typically a specialist in dentistry. The evaluation is performed based on a subjective test by a clinical expert/endodontist that has vast experience in dental X-ray analysis and diagnosis. Based on the subjective test for a number of dental images, this SMQT based enhancement method is found to provide a useful tool for enhancing the diagnostic value of dental X-ray images","PeriodicalId":425178,"journal":{"name":"2005 5th International Conference on Information Communications & Signal Processing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130977514","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}