Pub Date : 2005-12-06DOI: 10.1109/ICICS.2005.1689230
Tianxiao Ye, Y. Tang, P. Xue
An enhancement of the H.264/AVC transcoding is proposed in this paper. The drift problem in the transcoder is addressed by including spatial intra prediction in image reconstruction. A two-step adaptive intra-mode decision algorithm based on angle information and SATD ranking is introduced to reduce the complexity. Experiment results show that the proposed enhancement significantly increases the speed of intra mode-decision while maintaining a similar PSNR and a slight increase of rate
{"title":"Enhanced H.263 to H.264/AVG Video Transcoding with Adaptive Intra-mode Decision","authors":"Tianxiao Ye, Y. Tang, P. Xue","doi":"10.1109/ICICS.2005.1689230","DOIUrl":"https://doi.org/10.1109/ICICS.2005.1689230","url":null,"abstract":"An enhancement of the H.264/AVC transcoding is proposed in this paper. The drift problem in the transcoder is addressed by including spatial intra prediction in image reconstruction. A two-step adaptive intra-mode decision algorithm based on angle information and SATD ranking is introduced to reduce the complexity. Experiment results show that the proposed enhancement significantly increases the speed of intra mode-decision while maintaining a similar PSNR and a slight increase of rate","PeriodicalId":425178,"journal":{"name":"2005 5th International Conference on Information Communications & Signal Processing","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127966158","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2005-12-06DOI: 10.1109/ICICS.2005.1689077
Y. Ozturk, E. Lafon
This paper presents a new family of tools developed for application performance analysis via TCP flow analysis in N-tier application domains. Given the application flow signature the DAFA (distributed application flow analyzer) monitors TCP flows and maps the transactions observed over the network to the application flow signature provided. The DAFA offers the groundwork for application flow signature discovery by mapping the interconnected TCP sessions of an N-tier application. The DAFA also provides unique statistical data pertaining to the network traffic generated by these networked applications. The ability to map TCP flows over the application signature enables one to better estimate the bottlenecks in network and application deployment
{"title":"DAFA: Distributed Application Flow Analyzer","authors":"Y. Ozturk, E. Lafon","doi":"10.1109/ICICS.2005.1689077","DOIUrl":"https://doi.org/10.1109/ICICS.2005.1689077","url":null,"abstract":"This paper presents a new family of tools developed for application performance analysis via TCP flow analysis in N-tier application domains. Given the application flow signature the DAFA (distributed application flow analyzer) monitors TCP flows and maps the transactions observed over the network to the application flow signature provided. The DAFA offers the groundwork for application flow signature discovery by mapping the interconnected TCP sessions of an N-tier application. The DAFA also provides unique statistical data pertaining to the network traffic generated by these networked applications. The ability to map TCP flows over the application signature enables one to better estimate the bottlenecks in network and application deployment","PeriodicalId":425178,"journal":{"name":"2005 5th International Conference on Information Communications & Signal Processing","volume":"70 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128001476","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2005-12-06DOI: 10.1109/ICICS.2005.1689283
Zuling Chang, Qiao-yan Wen
In this paper, properties and constructions of the class of PS bent functions are considered, which is one special class of bent functions having good algebraic structure and is useful for studying the general structure of bent functions. It is an open problem to characterize the algebraic normal forms of PS bent functions. To construct the bent functions of class PS, we must divide F2 n into 2n/2+1 subspace of dimension n/2 firstly. In this paper, we will study this problem and give one generalized method to divide F2 n, so we can construct PS bent functions easily. Also the algebraic normal forms of PS bent functions are provided
{"title":"On PS Bent Functions","authors":"Zuling Chang, Qiao-yan Wen","doi":"10.1109/ICICS.2005.1689283","DOIUrl":"https://doi.org/10.1109/ICICS.2005.1689283","url":null,"abstract":"In this paper, properties and constructions of the class of PS bent functions are considered, which is one special class of bent functions having good algebraic structure and is useful for studying the general structure of bent functions. It is an open problem to characterize the algebraic normal forms of PS bent functions. To construct the bent functions of class PS, we must divide F2 n into 2n/2+1 subspace of dimension n/2 firstly. In this paper, we will study this problem and give one generalized method to divide F2 n, so we can construct PS bent functions easily. Also the algebraic normal forms of PS bent functions are provided","PeriodicalId":425178,"journal":{"name":"2005 5th International Conference on Information Communications & Signal Processing","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133303884","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2005-12-06DOI: 10.1109/ICICS.2005.1689199
K. Yok-Khiong, X.J.H. Yap, Lim Woo Lip
In order to prevent inter-slot interference and enhance the system capacity in wideband code division multiple access (WCDMA) time division duplex (TDD) mode of communication, synchronization between node Bs (NBs) are necessary. Although the most straightforward way of achieving synchronization is by using the Global Positioning System (GPS), 3GPP hopes to achieve a completely independent and self-reliant communication system. Therefore 3GPP proposed using concatenated sequences for synchronizing time division duplex (TDD) Node Bs in order to compensate the timing difference among Node Bs. 3GPP suggested using the concatenated extended complementary (CEC) sequences and CEC sequences with multiple code offsets for this synchronization purpose. In this paper, we propose using cyclically extended sequences using integer numbers (mod 4) for NB synchronization. The proposed sequences have comparable autocorrelation and cross correlation properties than the CEC sequences. The purpose of using better security sequences is to prevent intentional sabotage
{"title":"Synchronization of WCDMA TDD Node B using Better Security Sequences","authors":"K. Yok-Khiong, X.J.H. Yap, Lim Woo Lip","doi":"10.1109/ICICS.2005.1689199","DOIUrl":"https://doi.org/10.1109/ICICS.2005.1689199","url":null,"abstract":"In order to prevent inter-slot interference and enhance the system capacity in wideband code division multiple access (WCDMA) time division duplex (TDD) mode of communication, synchronization between node Bs (NBs) are necessary. Although the most straightforward way of achieving synchronization is by using the Global Positioning System (GPS), 3GPP hopes to achieve a completely independent and self-reliant communication system. Therefore 3GPP proposed using concatenated sequences for synchronizing time division duplex (TDD) Node Bs in order to compensate the timing difference among Node Bs. 3GPP suggested using the concatenated extended complementary (CEC) sequences and CEC sequences with multiple code offsets for this synchronization purpose. In this paper, we propose using cyclically extended sequences using integer numbers (mod 4) for NB synchronization. The proposed sequences have comparable autocorrelation and cross correlation properties than the CEC sequences. The purpose of using better security sequences is to prevent intentional sabotage","PeriodicalId":425178,"journal":{"name":"2005 5th International Conference on Information Communications & Signal Processing","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134232990","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2005-12-06DOI: 10.1109/ICICS.2005.1689042
F. Liberal, A. Ferro, J. O. Fajardo
In last years there have been some governmental initiatives aimed at the regulation of quality of service evaluation in telecommunications services. However this has proven to be a complex task especially for Internet services, where it is difficult to objectively assess the quality of a service and to identify whether one or more of the provider agents are responsible of final dissatisfaction of users. This paper affords the cited problem and intends to provide a methodology to asses the quality of service as perceived by end users. The aims of the proposed model are twofold: the evaluation of perceived quality of service (PQoS) based on subjective and objective measurements and the identification of responsibilities of the different agents involved in a service provision
{"title":"Application of a PQoS Based Quality Management Model to Identify Relative Importance of the Agents","authors":"F. Liberal, A. Ferro, J. O. Fajardo","doi":"10.1109/ICICS.2005.1689042","DOIUrl":"https://doi.org/10.1109/ICICS.2005.1689042","url":null,"abstract":"In last years there have been some governmental initiatives aimed at the regulation of quality of service evaluation in telecommunications services. However this has proven to be a complex task especially for Internet services, where it is difficult to objectively assess the quality of a service and to identify whether one or more of the provider agents are responsible of final dissatisfaction of users. This paper affords the cited problem and intends to provide a methodology to asses the quality of service as perceived by end users. The aims of the proposed model are twofold: the evaluation of perceived quality of service (PQoS) based on subjective and objective measurements and the identification of responsibilities of the different agents involved in a service provision","PeriodicalId":425178,"journal":{"name":"2005 5th International Conference on Information Communications & Signal Processing","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134353113","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2005-12-06DOI: 10.1109/ICICS.2005.1689204
Jing-Ming Guo
In this paper, the well known least-mean-square (LMS) method is applied for designing an adaptive filter used to produce a high quality halftone image. The experimental results show that the proposed LMS-designed halftoning achieves the extra benefit of edge enhancement and eliminates the annoying worm effect in error-diffused image. In addition, we provide two data hiding applications, named direct embedding LMS-designed halftone technique (DELDH) and information sharing LMS-designed halftone technique (ISLDH) to demonstrate the performance of the proposed LMS-designed halftoning. As the experimental results demonstrated, both techniques achieve excellent image quality and decoded visual patterns
{"title":"A New Digital Haiftoning and Data Hiding Designed with LMS Optimization","authors":"Jing-Ming Guo","doi":"10.1109/ICICS.2005.1689204","DOIUrl":"https://doi.org/10.1109/ICICS.2005.1689204","url":null,"abstract":"In this paper, the well known least-mean-square (LMS) method is applied for designing an adaptive filter used to produce a high quality halftone image. The experimental results show that the proposed LMS-designed halftoning achieves the extra benefit of edge enhancement and eliminates the annoying worm effect in error-diffused image. In addition, we provide two data hiding applications, named direct embedding LMS-designed halftone technique (DELDH) and information sharing LMS-designed halftone technique (ISLDH) to demonstrate the performance of the proposed LMS-designed halftoning. As the experimental results demonstrated, both techniques achieve excellent image quality and decoded visual patterns","PeriodicalId":425178,"journal":{"name":"2005 5th International Conference on Information Communications & Signal Processing","volume":"13 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134132497","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2005-12-06DOI: 10.1109/ICICS.2005.1689195
Li Kang, Xiaohu Tang
In 2004, Chang et al. proposed a signature scheme without employing one-way hash functions and message redundancy schemes. Later, Zhang and Fu et al., presented the forgery attack on Chang's digital signature and claimed that message redundancy schemes should still be used to resist some attacks. In this letter, we will point out a fatal flaw of Chang's scheme and propose a new digital signature scheme, where neither one-way hash functions nor message redundancy schemes are used
{"title":"A New Digital Signature Scheme without One-Way Hash Functions and Message Redundancy","authors":"Li Kang, Xiaohu Tang","doi":"10.1109/ICICS.2005.1689195","DOIUrl":"https://doi.org/10.1109/ICICS.2005.1689195","url":null,"abstract":"In 2004, Chang et al. proposed a signature scheme without employing one-way hash functions and message redundancy schemes. Later, Zhang and Fu et al., presented the forgery attack on Chang's digital signature and claimed that message redundancy schemes should still be used to resist some attacks. In this letter, we will point out a fatal flaw of Chang's scheme and propose a new digital signature scheme, where neither one-way hash functions nor message redundancy schemes are used","PeriodicalId":425178,"journal":{"name":"2005 5th International Conference on Information Communications & Signal Processing","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132290074","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2005-12-06DOI: 10.1109/ICICS.2005.1689293
H. Thapliyal, M. Srinivas
In recent years, reversible logic has emerged as a promising computing paradigm having application in low power CMOS, quantum computing, nanotechnology, and optical computing. The classical set of gates such as AND, OR, and EXOR are not reversible. This paper utilizes a new 4*4 reversible gate called TSG gate to build the components of a primitive reversible/quantum ALU. The most significant aspect of the TSG gate is that it can work singly as a reversible full adder, that is reversible full adder can now be implemented with a single gate only. A Novel reversible 4:2 compressor is also designed from the TSG gate which is later used to design a novel 8times8 reversible Wallace tree multiplier. It is proved that the adder, 4:2 compressor and multiplier architectures designed using the TSG gate are better than their counterparts available in literature, in terms of number of reversible gates and garbage outputs. This is perhaps, the first attempt to design a reversible 4:2 compressor and a reversible Wallace tree multiplier as far as existing literature and our knowledge is concerned. Thus, this paper provides an initial threshold to build more complex systems which can execute complicated operations using reversible logic
{"title":"Novel Reversible `TSG' Gate and Its Application for Designing Components of Primitive Reversible/Quantum ALU","authors":"H. Thapliyal, M. Srinivas","doi":"10.1109/ICICS.2005.1689293","DOIUrl":"https://doi.org/10.1109/ICICS.2005.1689293","url":null,"abstract":"In recent years, reversible logic has emerged as a promising computing paradigm having application in low power CMOS, quantum computing, nanotechnology, and optical computing. The classical set of gates such as AND, OR, and EXOR are not reversible. This paper utilizes a new 4*4 reversible gate called TSG gate to build the components of a primitive reversible/quantum ALU. The most significant aspect of the TSG gate is that it can work singly as a reversible full adder, that is reversible full adder can now be implemented with a single gate only. A Novel reversible 4:2 compressor is also designed from the TSG gate which is later used to design a novel 8times8 reversible Wallace tree multiplier. It is proved that the adder, 4:2 compressor and multiplier architectures designed using the TSG gate are better than their counterparts available in literature, in terms of number of reversible gates and garbage outputs. This is perhaps, the first attempt to design a reversible 4:2 compressor and a reversible Wallace tree multiplier as far as existing literature and our knowledge is concerned. Thus, this paper provides an initial threshold to build more complex systems which can execute complicated operations using reversible logic","PeriodicalId":425178,"journal":{"name":"2005 5th International Conference on Information Communications & Signal Processing","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133715577","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2005-12-06DOI: 10.1109/ICICS.2005.1689110
J. Hao, Gang Li
This paper deals with optimal state-space realizations of digital systems implemented with finite word length (FWL). A pole modulus sensitivity based stability related measure is derived and the optimal realizations are defined as those that maximize the proposed measure. Based on a polynomial operator approach, a new sparse realization is developed. This is a very efficient structure containing some free parameters which provide more degrees of freedom to reduce the FWL effects. The problem of finding optimal sparse realizations is solved. Two numerical examples are given to illustrate the design procedure and to compare the performance of different realizations
{"title":"An Efficient Structure for Finite Precision Implementation of Digital Systems","authors":"J. Hao, Gang Li","doi":"10.1109/ICICS.2005.1689110","DOIUrl":"https://doi.org/10.1109/ICICS.2005.1689110","url":null,"abstract":"This paper deals with optimal state-space realizations of digital systems implemented with finite word length (FWL). A pole modulus sensitivity based stability related measure is derived and the optimal realizations are defined as those that maximize the proposed measure. Based on a polynomial operator approach, a new sparse realization is developed. This is a very efficient structure containing some free parameters which provide more degrees of freedom to reduce the FWL effects. The problem of finding optimal sparse realizations is solved. Two numerical examples are given to illustrate the design procedure and to compare the performance of different realizations","PeriodicalId":425178,"journal":{"name":"2005 5th International Conference on Information Communications & Signal Processing","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132626882","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2005-12-06DOI: 10.1109/ICICS.2005.1689148
S. Easanuruk, S. Mitatha, S. Intajag, S. Chitwong
One of important tasks of radar image processing is reducing speckle noise as preprocessing to enhance performance of other processing such as segmentation, classification, etc. In this paper, we then apply the fuzzy morphology together with anisotropic diffusion to reduce speckled noise of SAR image. Anisotropic diffusion is designed based on additive noise model, but the form of speckled image is in multiplicative speckle model. To transform additive noise model into multiplicative speckle model, logarithmic transformation is then used. Our algorithm performs in log-domain. Finally, de-speckled image being in log-domain is converted into spatial domain by using exponential transformation. Simulated image as speckled image is performed with our algorithm to show and compare results with recent reports in term of both signal to noise ratio (SNR) and the equivalent number of looks (ENL). Also, real SAR image is performed to confirm results in term of ENL only. Results from our experiment are shown that de-speckled image can smooth out in homogeneous area and preserve edge in heterogeneous area. Both visual image and numerical results are used to show all results
{"title":"Speckle Reduction Using Fuzzy Morphological Anisotropic Diffusion","authors":"S. Easanuruk, S. Mitatha, S. Intajag, S. Chitwong","doi":"10.1109/ICICS.2005.1689148","DOIUrl":"https://doi.org/10.1109/ICICS.2005.1689148","url":null,"abstract":"One of important tasks of radar image processing is reducing speckle noise as preprocessing to enhance performance of other processing such as segmentation, classification, etc. In this paper, we then apply the fuzzy morphology together with anisotropic diffusion to reduce speckled noise of SAR image. Anisotropic diffusion is designed based on additive noise model, but the form of speckled image is in multiplicative speckle model. To transform additive noise model into multiplicative speckle model, logarithmic transformation is then used. Our algorithm performs in log-domain. Finally, de-speckled image being in log-domain is converted into spatial domain by using exponential transformation. Simulated image as speckled image is performed with our algorithm to show and compare results with recent reports in term of both signal to noise ratio (SNR) and the equivalent number of looks (ENL). Also, real SAR image is performed to confirm results in term of ENL only. Results from our experiment are shown that de-speckled image can smooth out in homogeneous area and preserve edge in heterogeneous area. Both visual image and numerical results are used to show all results","PeriodicalId":425178,"journal":{"name":"2005 5th International Conference on Information Communications & Signal Processing","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133139145","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}