首页 > 最新文献

2007 IEEE International Conference on Signal Processing and Communications最新文献

英文 中文
Security of Mobile Communications 移动通信安全
Pub Date : 2009-07-27 DOI: 10.1201/9780849379420
N. Boudriga
Mobile communications offer wireless connectivity that enables mobility and computing in many different communication environments. The huge demands from social markets are driving the growing development of mobile communications more rapidly than ever before. Consequently, a large set of new advanced techniques have emerged brought up by a larger bandwidth, more powerful processing capability, and advances in computing technology. Many new services are provided, or will be provided to potential users, and delivered with high level quality by usage of GSM, 3G networks and wireless mesh networks in public, home, and corporate scenarios. The exceptional growth in mobile and wireless communications gives rise to serious problems of security at the level of the subscriber, network operator, and service provider. The causes of such rise, typically due to the fragility of the wireless link nature, the mobility features, and the variety of the provided services, can be classified into the following six categories: a) the physical weaknesses and limitations of mobile and communications; b) the architecture limitations; c) the complexity of services; d) the user requirements; e) the contents of provided services; and f) the evolution of hacking techniques. Many studies have addressed carefully the mobile subscriber authentication, radio-path encryption, and secure mobility, but the so-called "security of mobile communications" does no involve only these relative independent domains. It indeed needs a more systematic approach to build up a framework layout capable of allowing: 1) the risk analysis of threats and vulnerabilities of a mobile communication system; 2) the assessment of a mobile communication system in terms of provided QoS, roaming capabilities, and security; and 3) the protection of a service provided via mobile communication systems. The major goals of this tutorial consist in five issues: 1) analyzing and discussing the security proposals made available by the mobile cellular and ad-hoc communications systems; 2) discussing the security attacks and hacking techniques; 3) discussing security policies and security practices to help better addressing the security problem; 4) discussing the role of the network operator, the service provider, and customer in securing mobile communications; and 5) analyzing the promises, requirements, and limits of service provision in terms of security needs.
移动通信提供无线连接,在许多不同的通信环境中实现移动性和计算。社交市场的巨大需求正以前所未有的速度推动着移动通信的发展。因此,随着更大的带宽、更强大的处理能力和计算技术的进步,一大批新的先进技术应运而生。通过在公共、家庭和企业场景中使用GSM、3G网络和无线网状网络,已经或将向潜在用户提供许多新服务,并以高质量交付。移动和无线通信的飞速发展给用户、网络运营商和服务提供商带来了严重的安全问题。这种增长的原因通常是由于无线链路性质的脆弱性、移动性特征和所提供服务的多样性,可分为以下六类:a)移动和通信的物理弱点和限制;B)架构限制;C)服务的复杂性;D)用户要求;E)所提供服务的内容;f)黑客技术的进化。许多研究对移动用户认证、无线路径加密和安全移动性进行了细致的研究,但所谓的“移动通信安全”并不仅仅涉及这些相对独立的领域。它确实需要一个更系统的方法来建立一个框架布局,能够允许:1)对移动通信系统的威胁和漏洞进行风险分析;2)根据所提供的QoS、漫游能力和安全性对移动通信系统进行评估;以及3)对通过移动通信系统提供的服务的保护。本教程的主要目标包括五个方面:1)分析和讨论移动蜂窝和自组织通信系统提供的安全建议;2)讨论了安全攻击和黑客技术;3)讨论保安政策和保安措施,以协助更好地解决保安问题;4)讨论网络运营商、服务提供商和用户在确保移动通信安全方面的作用;5)从安全需求的角度分析服务提供的承诺、要求和限制。
{"title":"Security of Mobile Communications","authors":"N. Boudriga","doi":"10.1201/9780849379420","DOIUrl":"https://doi.org/10.1201/9780849379420","url":null,"abstract":"Mobile communications offer wireless connectivity that enables mobility and computing in many different communication environments. The huge demands from social markets are driving the growing development of mobile communications more rapidly than ever before. Consequently, a large set of new advanced techniques have emerged brought up by a larger bandwidth, more powerful processing capability, and advances in computing technology. Many new services are provided, or will be provided to potential users, and delivered with high level quality by usage of GSM, 3G networks and wireless mesh networks in public, home, and corporate scenarios. The exceptional growth in mobile and wireless communications gives rise to serious problems of security at the level of the subscriber, network operator, and service provider. The causes of such rise, typically due to the fragility of the wireless link nature, the mobility features, and the variety of the provided services, can be classified into the following six categories: a) the physical weaknesses and limitations of mobile and communications; b) the architecture limitations; c) the complexity of services; d) the user requirements; e) the contents of provided services; and f) the evolution of hacking techniques. Many studies have addressed carefully the mobile subscriber authentication, radio-path encryption, and secure mobility, but the so-called \"security of mobile communications\" does no involve only these relative independent domains. It indeed needs a more systematic approach to build up a framework layout capable of allowing: 1) the risk analysis of threats and vulnerabilities of a mobile communication system; 2) the assessment of a mobile communication system in terms of provided QoS, roaming capabilities, and security; and 3) the protection of a service provided via mobile communication systems. The major goals of this tutorial consist in five issues: 1) analyzing and discussing the security proposals made available by the mobile cellular and ad-hoc communications systems; 2) discussing the security attacks and hacking techniques; 3) discussing security policies and security practices to help better addressing the security problem; 4) discussing the role of the network operator, the service provider, and customer in securing mobile communications; and 5) analyzing the promises, requirements, and limits of service provision in terms of security needs.","PeriodicalId":425397,"journal":{"name":"2007 IEEE International Conference on Signal Processing and Communications","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134251381","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 38
An Improved ICI Reduction Method in OFDM Communication System in Presence of Phase Noise 存在相位噪声的OFDM通信系统中改进的ICI降低方法
Pub Date : 2007-12-04 DOI: 10.1109/PIMRC.2007.4394766
Orthogonal frequency division multiplexing (OFDM) is a promising technique for the broadband wireless communication system. However, the inter-sub-carrier-interference (ICI) produced by the phase noise of transceiver local oscillator is a serious problem. Bit error rate (BER) performance is degraded because the orthogonal properties between the sub-carriers are broken down. In this paper, the number of sub-carriers is chosen according to the consideration of the trade off between the amount of ICI and data rate of the system. ICI self-cancellation of Mapping Method introduced here is also studied to reduce ICI effectively. Then the system performance of the Mapping Method is compared with those of the original OFDM and the conventional data-conversion method.
正交频分复用(OFDM)技术是宽带无线通信系统中一种很有发展前途的技术。然而,由收发器本振相位噪声引起的子载波间干扰是一个严重的问题。由于子载波之间的正交特性被破坏,导致误码率性能下降。在本文中,子载波的数量的选择是根据考虑ICI的数量和系统的数据速率之间的权衡。本文还研究了映射的ICI自抵消方法,以有效地降低ICI。然后将该映射方法与原有OFDM和传统数据转换方法的系统性能进行了比较。
{"title":"An Improved ICI Reduction Method in OFDM Communication System in Presence of Phase Noise","authors":"N. M. Moghaddam, A. Falahati","doi":"10.1109/PIMRC.2007.4394766","DOIUrl":"https://doi.org/10.1109/PIMRC.2007.4394766","url":null,"abstract":"Orthogonal frequency division multiplexing (OFDM) is a promising technique for the broadband wireless communication system. However, the inter-sub-carrier-interference (ICI) produced by the phase noise of transceiver local oscillator is a serious problem. Bit error rate (BER) performance is degraded because the orthogonal properties between the sub-carriers are broken down. In this paper, the number of sub-carriers is chosen according to the consideration of the trade off between the amount of ICI and data rate of the system. ICI self-cancellation of Mapping Method introduced here is also studied to reduce ICI effectively. Then the system performance of the Mapping Method is compared with those of the original OFDM and the conventional data-conversion method.","PeriodicalId":425397,"journal":{"name":"2007 IEEE International Conference on Signal Processing and Communications","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126225212","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Modified Hilbert Space-Filling Curve for Ellipsoidal Coverage in Wireless Ad Hoc Sensor Networks 无线自组织传感器网络椭球覆盖的改进Hilbert空间填充曲线
Pub Date : 2007-12-01 DOI: 10.1109/ICSPC.2007.4728592
Sensor nodes are deployed to sense an environment for observing the physical world. The sensing field (an area of interest) can be represented as an ellipse. This paper proposes an algorithm for covering an elliptical shaped area of interest within wireless sensor network fields by modifying the Hilbert-space filling curve. Conventionally, an area is partitioned into 2n times 2n square grid (Hilbert cells). Hilbert space-filling curve is modified to map only specific area of interest. To cover the entire area of interest, the algorithm requires a mobility pattern for a sink node in order to collect data for a specific mission. This is done by traversing the area from an entry point and finishing at an exit point from the square grids. Simulation results show that modified Hilbert space-filling curve achieves its best Hilbert-covering for an ellipse that is almost circular as opposed to a narrow ellipse.
传感器节点用于感知环境以观察物理世界。感测场(感兴趣的区域)可以用椭圆表示。本文提出了一种通过修改希尔伯特空间填充曲线来覆盖无线传感器网络场中感兴趣的椭圆区域的算法。通常,一个区域被划分为2n乘以2n个正方形网格(希尔伯特单元)。希尔伯特空间填充曲线被修改为只映射感兴趣的特定区域。为了覆盖整个感兴趣的区域,该算法需要一个汇聚节点的移动模式,以便为特定任务收集数据。这是通过从入口点遍历该区域并在从方形网格的出口点完成的。仿真结果表明,与窄椭圆相比,改进的Hilbert空间填充曲线对近似圆形的椭圆具有最佳的Hilbert覆盖效果。
{"title":"Modified Hilbert Space-Filling Curve for Ellipsoidal Coverage in Wireless Ad Hoc Sensor Networks","authors":"M. Kamat, A. Ismail, S. Olariu","doi":"10.1109/ICSPC.2007.4728592","DOIUrl":"https://doi.org/10.1109/ICSPC.2007.4728592","url":null,"abstract":"Sensor nodes are deployed to sense an environment for observing the physical world. The sensing field (an area of interest) can be represented as an ellipse. This paper proposes an algorithm for covering an elliptical shaped area of interest within wireless sensor network fields by modifying the Hilbert-space filling curve. Conventionally, an area is partitioned into 2n times 2n square grid (Hilbert cells). Hilbert space-filling curve is modified to map only specific area of interest. To cover the entire area of interest, the algorithm requires a mobility pattern for a sink node in order to collect data for a specific mission. This is done by traversing the area from an entry point and finishing at an exit point from the square grids. Simulation results show that modified Hilbert space-filling curve achieves its best Hilbert-covering for an ellipse that is almost circular as opposed to a narrow ellipse.","PeriodicalId":425397,"journal":{"name":"2007 IEEE International Conference on Signal Processing and Communications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129699080","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
A Real-Time H.264 BP Decoder based on a DM642 DSP 基于DM642 DSP的实时H.264 BP解码器
Pub Date : 2007-12-01 DOI: 10.1109/ICECS.2007.4511223
In this paper, the implementation of a baseline profile H.264 decoder based on a DM 642 digital signal processor is described. An initial standard compliant raw-C decoder has been optimized in speed for the target processor. The parallelism between algorithm execution and data movement has been fully exploited using DMA. Also, critical parts of the algorithm have been encoded directly in assembly code to increase the number of instructions per cycle. The decoder has been tested in simulation with actual (transcoded) DVD and digital TV streams. According to these tests, standard definition real time decoding can be obtained with a DM 642@600 MHz.
本文介绍了一种基于dm642数字信号处理器的基线轮廓H.264解码器的实现。一个初始标准兼容的raw-C解码器已经优化了目标处理器的速度。算法执行和数据移动之间的并行性在DMA中得到了充分的利用。此外,算法的关键部分已直接在汇编代码中编码,以增加每个周期的指令数量。该解码器已在实际(转码)DVD和数字电视流的模拟中进行了测试。根据这些测试,使用DM 642@600 MHz可以获得标准清晰度实时解码。
{"title":"A Real-Time H.264 BP Decoder based on a DM642 DSP","authors":"F. Pescador, M. Garrido, C. Sanz, E. J. Martínez, Manuel César Rodríguez Lacruz, D. S. Martínez","doi":"10.1109/ICECS.2007.4511223","DOIUrl":"https://doi.org/10.1109/ICECS.2007.4511223","url":null,"abstract":"In this paper, the implementation of a baseline profile H.264 decoder based on a DM 642 digital signal processor is described. An initial standard compliant raw-C decoder has been optimized in speed for the target processor. The parallelism between algorithm execution and data movement has been fully exploited using DMA. Also, critical parts of the algorithm have been encoded directly in assembly code to increase the number of instructions per cycle. The decoder has been tested in simulation with actual (transcoded) DVD and digital TV streams. According to these tests, standard definition real time decoding can be obtained with a DM 642@600 MHz.","PeriodicalId":425397,"journal":{"name":"2007 IEEE International Conference on Signal Processing and Communications","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116051700","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Online Acoustic Feedback Path Modeling in Multichannel (1 × 2 × 2) Active Noise Control Systems 多通道(1 × 2 × 2)主动噪声控制系统的在线声反馈路径建模
Pub Date : 2007-12-01 DOI: 10.1109/ICSPC.2007.4728397
This paper proposes a method for online feedback path modeling in multichannel active noise control (ANC) systems. Previously we have proposed a method for online feedback path molding for single-channel ANC system. Here we modify and extend this method to multichannel ANC systems, in particular, we consider a 1 × 2 × 2 system comprising one reference microphone, two secondary loudspeakers and two error microphones. The computational complexity of the proposed method is lower than the existing methods. Computer simulations are used to demonstrate the effectiveness of the proposed method.
提出了一种多通道主动噪声控制系统的在线反馈路径建模方法。在此之前,我们提出了一种单通道ANC系统的在线反馈路径成型方法。本文将此方法改进并扩展到多通道ANC系统中,特别考虑了一个由一个参考麦克风、两个辅助扬声器和两个误差麦克风组成的1 × 2 × 2系统。该方法的计算复杂度低于现有方法。计算机仿真验证了该方法的有效性。
{"title":"Online Acoustic Feedback Path Modeling in Multichannel (1 × 2 × 2) Active Noise Control Systems","authors":"M. Akhtar, M. Abe, M. Kawamata, M. Tufail","doi":"10.1109/ICSPC.2007.4728397","DOIUrl":"https://doi.org/10.1109/ICSPC.2007.4728397","url":null,"abstract":"This paper proposes a method for online feedback path modeling in multichannel active noise control (ANC) systems. Previously we have proposed a method for online feedback path molding for single-channel ANC system. Here we modify and extend this method to multichannel ANC systems, in particular, we consider a 1 × 2 × 2 system comprising one reference microphone, two secondary loudspeakers and two error microphones. The computational complexity of the proposed method is lower than the existing methods. Computer simulations are used to demonstrate the effectiveness of the proposed method.","PeriodicalId":425397,"journal":{"name":"2007 IEEE International Conference on Signal Processing and Communications","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134463939","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Wavelength Selective WDM Network Design: How Bad is Shortest Path Routing? 波长选择性WDM网络设计:最短路径路由有多糟糕?
Pub Date : 2007-12-01 DOI: 10.1109/ICSPC.2007.4728373
Given a collection of lightpath requests, we consider the problem of allocating fibers to the links of a WDM network at minimum cost, such that all lightpath requests can be simultaneously realized. It is known that, under modular fiber capacity assumptions, shortest path routing may not minimize the total fiber cost. In this paper, we extend our previous work for wavelength convertible networks, and theoretically quantify the increase in fiber cost due to shortest path routing in networks without wavelength converters. In particular, we prove that shortest path routing is asymptotically cost-optimal in heavily loaded networks, and asymptotically near-optimal in large, sparse networks that support all-to-all communication.
给定一组光路请求,我们考虑以最小成本将光纤分配到WDM网络链路的问题,从而使所有光路请求可以同时实现。已知,在模块化光纤容量假设下,最短路径路由可能不会使光纤总成本最小化。在本文中,我们扩展了之前波长转换网络的工作,并从理论上量化了在没有波长转换器的网络中由于最短路径路由而增加的光纤成本。特别是,我们证明了最短路径路由在重载网络中是渐近成本最优的,在支持全对全通信的大型稀疏网络中是渐近最优的。
{"title":"Wavelength Selective WDM Network Design: How Bad is Shortest Path Routing?","authors":"M. Saad, Z. Luo","doi":"10.1109/ICSPC.2007.4728373","DOIUrl":"https://doi.org/10.1109/ICSPC.2007.4728373","url":null,"abstract":"Given a collection of lightpath requests, we consider the problem of allocating fibers to the links of a WDM network at minimum cost, such that all lightpath requests can be simultaneously realized. It is known that, under modular fiber capacity assumptions, shortest path routing may not minimize the total fiber cost. In this paper, we extend our previous work for wavelength convertible networks, and theoretically quantify the increase in fiber cost due to shortest path routing in networks without wavelength converters. In particular, we prove that shortest path routing is asymptotically cost-optimal in heavily loaded networks, and asymptotically near-optimal in large, sparse networks that support all-to-all communication.","PeriodicalId":425397,"journal":{"name":"2007 IEEE International Conference on Signal Processing and Communications","volume":"95 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132633284","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Arabic Diacritics based Steganography 基于阿拉伯语变音符的隐写术
Pub Date : 2007-11-27 DOI: 10.1109/ICSPC.2007.4728429
New steganography methods are being proposed to embed secret information into text cover media in order to search for new possibilities employing languages other than English. This paper utilizes the advantages of diacritics in Arabic to implement text steganography. Diacritics - or Harakat - in Arabic are used to represent vowel sounds and can be found in many formal and religious documents. The proposed approach uses eight different diacritical symbols in Arabic to hide binary bits in the original cover media. The embedded data are then extracted by reading the diacritics from the document and translating them back to binary.
为了寻找使用英语以外语言的新可能性,正在提出将秘密信息嵌入文本封面媒体的新隐写方法。本文利用阿拉伯语变音符的优势实现文本隐写。变音符-或Harakat -在阿拉伯语中用来表示元音,可以在许多正式和宗教文件中找到。该方法使用8种不同的阿拉伯语变音符符号来隐藏原始封面媒体中的二进制位。然后通过从文档中读取变音符符并将其转换回二进制来提取嵌入的数据。
{"title":"Arabic Diacritics based Steganography","authors":"Mohammed A. Aabed, Sameh Awaideh, Abdul-Rahman M. Elshafei, A. Gutub","doi":"10.1109/ICSPC.2007.4728429","DOIUrl":"https://doi.org/10.1109/ICSPC.2007.4728429","url":null,"abstract":"New steganography methods are being proposed to embed secret information into text cover media in order to search for new possibilities employing languages other than English. This paper utilizes the advantages of diacritics in Arabic to implement text steganography. Diacritics - or Harakat - in Arabic are used to represent vowel sounds and can be found in many formal and religious documents. The proposed approach uses eight different diacritical symbols in Arabic to hide binary bits in the original cover media. The embedded data are then extracted by reading the diacritics from the document and translating them back to binary.","PeriodicalId":425397,"journal":{"name":"2007 IEEE International Conference on Signal Processing and Communications","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122961557","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 96
Pareto-Optimal Macroblock Classification for Fast Mode Decision in H.264 H.264中快速模式决策的Pareto-Optimal Macroblock分类
Pub Date : 2007-11-27 DOI: 10.1109/ICSPC.2007.4728600
This paper presents a novel fast mode decision algorithm for H.264/AVC based on a Pareto-optimal macroblock classification strategy. Previously published H.264 low complexity schemes mostly concentrated on improving class decision metrics, but did not justify the choice of MD classes. Herein, we use Pareto analysis to derive the optimal set of MD classes and to define efficient class decision metrics. For each MD class only rate-distortion optimal complexity settings are used. Experimental results show that the proposed algorithm outperforms previously published algorithms, providing a 57-73% reduction in total computational complexity with some reduction in bit rate and acceptable visual quality.
提出了一种基于pareto最优宏块分类策略的H.264/AVC快速模式决策算法。先前发布的H.264低复杂度方案主要集中在改进类决策指标上,但没有证明MD类的选择是合理的。在此,我们使用帕累托分析来导出最优的MD类集,并定义有效的类决策指标。对于每个MD类,只使用速率失真最优复杂性设置。实验结果表明,该算法优于先前发表的算法,总计算复杂度降低了57-73%,比特率和可接受的视觉质量也有所降低。
{"title":"Pareto-Optimal Macroblock Classification for Fast Mode Decision in H.264","authors":"Y. Ivanov, C. Bleakley","doi":"10.1109/ICSPC.2007.4728600","DOIUrl":"https://doi.org/10.1109/ICSPC.2007.4728600","url":null,"abstract":"This paper presents a novel fast mode decision algorithm for H.264/AVC based on a Pareto-optimal macroblock classification strategy. Previously published H.264 low complexity schemes mostly concentrated on improving class decision metrics, but did not justify the choice of MD classes. Herein, we use Pareto analysis to derive the optimal set of MD classes and to define efficient class decision metrics. For each MD class only rate-distortion optimal complexity settings are used. Experimental results show that the proposed algorithm outperforms previously published algorithms, providing a 57-73% reduction in total computational complexity with some reduction in bit rate and acceptable visual quality.","PeriodicalId":425397,"journal":{"name":"2007 IEEE International Conference on Signal Processing and Communications","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115723971","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Signal Processing Aspects of the Low Frequency Array 低频阵列的信号处理
Pub Date : 2007-11-25 DOI: 10.1109/ICSPC.2007.4728390
In the Northern part of the Netherlands ASTRON is building the largest radio telescope in the world for low frequencies. The telescope is based on phased array principles and is known as the LOw Frequency ARray (LOFAR). LOFAR is optimized for detecting astronomical signals in the 30-80 MHz and 120-240 MHz frequency window. LOFAR detects the incoming radio signals by using an array of simple omni-directional antennas. The antennas are grouped in so called stations mainly to reduce the amount of data generated. More than fifty stations will be built, mainly within a circle of 150 kilometres in diameter but also internationally. The signals of all the stations are distributed to the central processor facility, where all the station signals are correlated with each other. In this paper the signal processing aspects on system level will be presented mainly for the astronomical application.
在荷兰北部,ASTRON正在建造世界上最大的低频射电望远镜。该望远镜基于相控阵原理,被称为低频阵列(LOFAR)。LOFAR最适合探测30- 80mhz和120- 240mhz频率窗内的天文信号。LOFAR通过使用一组简单的全向天线来检测传入的无线电信号。将天线分组在所谓的站中主要是为了减少产生的数据量。将建造50多个站点,主要是在直径150公里的圆圈内,但也有国际站点。所有台站的信号被分配到中央处理器设施,在中央处理器设施中,所有台站的信号相互关联。本文主要从天文应用的角度介绍系统级的信号处理方面。
{"title":"Signal Processing Aspects of the Low Frequency Array","authors":"A. Gunst, M. Bentum","doi":"10.1109/ICSPC.2007.4728390","DOIUrl":"https://doi.org/10.1109/ICSPC.2007.4728390","url":null,"abstract":"In the Northern part of the Netherlands ASTRON is building the largest radio telescope in the world for low frequencies. The telescope is based on phased array principles and is known as the LOw Frequency ARray (LOFAR). LOFAR is optimized for detecting astronomical signals in the 30-80 MHz and 120-240 MHz frequency window. LOFAR detects the incoming radio signals by using an array of simple omni-directional antennas. The antennas are grouped in so called stations mainly to reduce the amount of data generated. More than fifty stations will be built, mainly within a circle of 150 kilometres in diameter but also internationally. The signals of all the stations are distributed to the central processor facility, where all the station signals are correlated with each other. In this paper the signal processing aspects on system level will be presented mainly for the astronomical application.","PeriodicalId":425397,"journal":{"name":"2007 IEEE International Conference on Signal Processing and Communications","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132154052","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
Blind Identification of Frequency Selective Channel using Higher Order Statistics 基于高阶统计量的频率选择信道盲识别
Pub Date : 2007-11-24 DOI: 10.1109/ICSPC.2007.4728283
The present paper deals with blind identification of frequency selective communication channel. The problem of frequency selectivity is more encountered in mobile communication channel. In this manuscript, we have considered two channels as the Proakis's `B' channel and the Macchi's channel, in order to identify these channel we propose an algorithm based on Higher Order Statistics (HOS). The simulation results in noisy environment and for different data input channel, demonstrate that the proposed method could estimate the phase and magnitude of these channels blindly and without any information about the input, except that the input excitation is i.i.d (Identically and Independent Distributed) and non-Gaussian.
本文研究了频率选择通信信道的盲识别问题。频率选择问题在移动通信信道中更为常见。在本文中,我们考虑了两个通道作为Proakis的“B”通道和Macchi的通道,为了识别这些通道,我们提出了一种基于高阶统计量(HOS)的算法。在噪声环境和不同数据输入通道下的仿真结果表明,该方法可以在不需要输入信息的情况下盲估计这些通道的相位和幅值,只需要输入激励为非高斯激励。
{"title":"Blind Identification of Frequency Selective Channel using Higher Order Statistics","authors":"S. Safi, M. Frikel, M. M'Saad, A. Zeroual","doi":"10.1109/ICSPC.2007.4728283","DOIUrl":"https://doi.org/10.1109/ICSPC.2007.4728283","url":null,"abstract":"The present paper deals with blind identification of frequency selective communication channel. The problem of frequency selectivity is more encountered in mobile communication channel. In this manuscript, we have considered two channels as the Proakis's `B' channel and the Macchi's channel, in order to identify these channel we propose an algorithm based on Higher Order Statistics (HOS). The simulation results in noisy environment and for different data input channel, demonstrate that the proposed method could estimate the phase and magnitude of these channels blindly and without any information about the input, except that the input excitation is i.i.d (Identically and Independent Distributed) and non-Gaussian.","PeriodicalId":425397,"journal":{"name":"2007 IEEE International Conference on Signal Processing and Communications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125474584","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2007 IEEE International Conference on Signal Processing and Communications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1