Pub Date : 2008-12-08DOI: 10.1109/ICOSP.2008.4697575
Ye Yuan, Yue Li, Lijie Yu, Haoyuan Guo
The nonlinearity in normal and epileptic electroencephalogram (EEG) signals is investigated in this paper by the delay vector variance (DVV) method, which determines the degree of nonlinearity of the tested time series by comparing the target variances of the tested time series to those of the corresponding surrogate time series. The results of numerical experiments show that both normal and epileptic EEG signals are of nonlinearity, whereas epileptic EEG signals are of higher degree of nonlinearity than normal EEG signals. Based on this, it is proposed that degree of nonlinearity could provide useful information for epileptic seizure characterization. Moreover, the degree of nonlinearity of epileptic EEG time series fluctuates more briskly than that of normal EEG time series.
{"title":"Analysis of nonlinearity in normal and epileptic EEG signals","authors":"Ye Yuan, Yue Li, Lijie Yu, Haoyuan Guo","doi":"10.1109/ICOSP.2008.4697575","DOIUrl":"https://doi.org/10.1109/ICOSP.2008.4697575","url":null,"abstract":"The nonlinearity in normal and epileptic electroencephalogram (EEG) signals is investigated in this paper by the delay vector variance (DVV) method, which determines the degree of nonlinearity of the tested time series by comparing the target variances of the tested time series to those of the corresponding surrogate time series. The results of numerical experiments show that both normal and epileptic EEG signals are of nonlinearity, whereas epileptic EEG signals are of higher degree of nonlinearity than normal EEG signals. Based on this, it is proposed that degree of nonlinearity could provide useful information for epileptic seizure characterization. Moreover, the degree of nonlinearity of epileptic EEG time series fluctuates more briskly than that of normal EEG time series.","PeriodicalId":445699,"journal":{"name":"2008 9th International Conference on Signal Processing","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127598406","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2008-12-08DOI: 10.1109/ICOSP.2008.4697680
Jin Wei, Xudong Wang, V. Syrmos
Recently, a two-tier hierarchical wireless sensor network (WSN) was proposed to address the problem of multi-target tracking (MTT). The WSN estimated the multi-target states well, but kept no record of target identities. In this paper, the performance of the WSN is improved by activating certain sensors instead of all the sensors in the first level of the hierarchy at each time step. Furthermore, a track-to-estimate association scheme is also proposed to incorporate individual target identities and produce estimates of individual target tracks. The proposed tracking algorithm works well even when the target dynamics and/or measurement process is severely nonlinear. The efficiency of the algorithm is demonstrated in the application of bearing and signal strength tracking.
{"title":"Efficient multi-target tracking with a two-tier hierarchical Wireless Sensor Network","authors":"Jin Wei, Xudong Wang, V. Syrmos","doi":"10.1109/ICOSP.2008.4697680","DOIUrl":"https://doi.org/10.1109/ICOSP.2008.4697680","url":null,"abstract":"Recently, a two-tier hierarchical wireless sensor network (WSN) was proposed to address the problem of multi-target tracking (MTT). The WSN estimated the multi-target states well, but kept no record of target identities. In this paper, the performance of the WSN is improved by activating certain sensors instead of all the sensors in the first level of the hierarchy at each time step. Furthermore, a track-to-estimate association scheme is also proposed to incorporate individual target identities and produce estimates of individual target tracks. The proposed tracking algorithm works well even when the target dynamics and/or measurement process is severely nonlinear. The efficiency of the algorithm is demonstrated in the application of bearing and signal strength tracking.","PeriodicalId":445699,"journal":{"name":"2008 9th International Conference on Signal Processing","volume":"95 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126460798","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2008-12-08DOI: 10.1109/ICOSP.2008.4697414
Chen Xianfu, L. Youming, Huang Guanhua, Hu Qianmiao
Crosstalk is the major limiting factor affecting the achieve rate of VDSL/VDSL2 system. Several crosstalk precoder and canceller methods have been proposed respectively for downstream and upstream transmission, which are based on the assumption that we known the crosstalk channel matrix on each tone. In practice, however, these matrices are estimated from training data. Without estimating the crosstalk channel matrix, a novel crosstalk cancellation algorithm is proposed in this paper. In this algorithm, the crosstalk cancellation filter is derived from the transmitted and received signals. Furthermore, an updating algorithm is derived for reducing the complexity of the proposed algorithm. Computer simulation results based on measured channels verified the analysis.
{"title":"Training based crosstalk cancellation with updating implementation","authors":"Chen Xianfu, L. Youming, Huang Guanhua, Hu Qianmiao","doi":"10.1109/ICOSP.2008.4697414","DOIUrl":"https://doi.org/10.1109/ICOSP.2008.4697414","url":null,"abstract":"Crosstalk is the major limiting factor affecting the achieve rate of VDSL/VDSL2 system. Several crosstalk precoder and canceller methods have been proposed respectively for downstream and upstream transmission, which are based on the assumption that we known the crosstalk channel matrix on each tone. In practice, however, these matrices are estimated from training data. Without estimating the crosstalk channel matrix, a novel crosstalk cancellation algorithm is proposed in this paper. In this algorithm, the crosstalk cancellation filter is derived from the transmitted and received signals. Furthermore, an updating algorithm is derived for reducing the complexity of the proposed algorithm. Computer simulation results based on measured channels verified the analysis.","PeriodicalId":445699,"journal":{"name":"2008 9th International Conference on Signal Processing","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125439702","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2008-12-08DOI: 10.1109/ICOSP.2008.4697544
Yang Xiao, Kiseon Kim
Active queue manage networks belong to nonlinear large scale systems. There are many uncertain factors such access number of subscribers, traffic types, link capacities and round trip time, impact on the networkspsila behaviors. However, the existing nonlinear fluid models for AQM networks have not considered the hybrid traffic flows: TCP/UDP ones, they only are valid for TCP traffic flows. This paper establishes a general linear time-delay model for the bottleneck networks with TCP/UDP AQM, considering the uncertainty of access number of subscribers, traffic types, link capacities and round trip time. The proposed time-delay system model is derived from linearization processing for fluid-based model at equilibrium points. Resort to the time-delay system model, the stability analysis of the AQM networks with uncertainty can be analyzed in 2-D s-z domain. At equilibrium points, the bottleneck networks are described by uncertain linear time-delay systems, then 2-D (two-dimensional) Laplace-z transform has been applied for the stability test of the network. The stability implies the congestion conditions of the AQM networks. Simulations verify the stability analysis for AQM network to be valid, the AQM network approaches to full utilization without PI controller of.
{"title":"Linear time-delay system model and stability of AQM bottleneck networks","authors":"Yang Xiao, Kiseon Kim","doi":"10.1109/ICOSP.2008.4697544","DOIUrl":"https://doi.org/10.1109/ICOSP.2008.4697544","url":null,"abstract":"Active queue manage networks belong to nonlinear large scale systems. There are many uncertain factors such access number of subscribers, traffic types, link capacities and round trip time, impact on the networkspsila behaviors. However, the existing nonlinear fluid models for AQM networks have not considered the hybrid traffic flows: TCP/UDP ones, they only are valid for TCP traffic flows. This paper establishes a general linear time-delay model for the bottleneck networks with TCP/UDP AQM, considering the uncertainty of access number of subscribers, traffic types, link capacities and round trip time. The proposed time-delay system model is derived from linearization processing for fluid-based model at equilibrium points. Resort to the time-delay system model, the stability analysis of the AQM networks with uncertainty can be analyzed in 2-D s-z domain. At equilibrium points, the bottleneck networks are described by uncertain linear time-delay systems, then 2-D (two-dimensional) Laplace-z transform has been applied for the stability test of the network. The stability implies the congestion conditions of the AQM networks. Simulations verify the stability analysis for AQM network to be valid, the AQM network approaches to full utilization without PI controller of.","PeriodicalId":445699,"journal":{"name":"2008 9th International Conference on Signal Processing","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127931666","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2008-12-08DOI: 10.1109/ICOSP.2008.4697055
M. Nakamoto, S. Fujimoto, A. Doi, T. Hinamoto
For copyright protection, the bit pattern is embedded in discrete wavelet transform (DWT) domain by using a secret key sequence. For security, it is desirable to be hard to counterfeit the key sequence. In this work, we consider a watermarking method with a key sequence which is difficult to counterfeit. Additionally, we show the design method of the key sequence based on the genetic algorithm (GA) so that the robustness of the watermark is strong. Finally, we show the robustness against JPEG attack by computer simulation.
{"title":"Genetic algorithm approach for wavelet-based image watermarking","authors":"M. Nakamoto, S. Fujimoto, A. Doi, T. Hinamoto","doi":"10.1109/ICOSP.2008.4697055","DOIUrl":"https://doi.org/10.1109/ICOSP.2008.4697055","url":null,"abstract":"For copyright protection, the bit pattern is embedded in discrete wavelet transform (DWT) domain by using a secret key sequence. For security, it is desirable to be hard to counterfeit the key sequence. In this work, we consider a watermarking method with a key sequence which is difficult to counterfeit. Additionally, we show the design method of the key sequence based on the genetic algorithm (GA) so that the robustness of the watermark is strong. Finally, we show the robustness against JPEG attack by computer simulation.","PeriodicalId":445699,"journal":{"name":"2008 9th International Conference on Signal Processing","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121763628","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2008-12-08DOI: 10.1109/ICOSP.2008.4697730
Juan Song, Lide Wang, Yunli Mu
The paper presents a novel WTB controller design method using SOPC (system on programmable chip) technology. The WTB Access IP (intellectual property), which is designed in Verilog HDL (hardware description language), achieves the function of encoding, decoding, FCS (frame check sequence) and bit stuffing. Finally the CPU and WTB controller are combined into one Alterapsilas Cyclone II EP2C8, so this method save PCB space and reduce total power consumption. The paper describes each modulepsilas function and design method specifically. Simultaneously the simulation and two different experimentspsila results are given.
本文提出了一种利用SOPC (system on programmable chip)技术设计WTB控制器的新方法。WTB Access IP(知识产权)采用Verilog硬件描述语言HDL设计,实现了编码、解码、帧校验序列(FCS)和位填充等功能。最后将CPU和WTB控制器组合成一个Alterapsilas Cyclone II EP2C8,这样既节省了PCB空间,又降低了总功耗。文中详细介绍了各模块的功能和设计方法。同时给出了仿真和两种不同的实验结果。
{"title":"Design and implementation of WTB controller using SOPC technology","authors":"Juan Song, Lide Wang, Yunli Mu","doi":"10.1109/ICOSP.2008.4697730","DOIUrl":"https://doi.org/10.1109/ICOSP.2008.4697730","url":null,"abstract":"The paper presents a novel WTB controller design method using SOPC (system on programmable chip) technology. The WTB Access IP (intellectual property), which is designed in Verilog HDL (hardware description language), achieves the function of encoding, decoding, FCS (frame check sequence) and bit stuffing. Finally the CPU and WTB controller are combined into one Alterapsilas Cyclone II EP2C8, so this method save PCB space and reduce total power consumption. The paper describes each modulepsilas function and design method specifically. Simultaneously the simulation and two different experimentspsila results are given.","PeriodicalId":445699,"journal":{"name":"2008 9th International Conference on Signal Processing","volume":"209 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132328792","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2008-12-08DOI: 10.1109/ICOSP.2008.4697306
Guo Lei, He Zhiming
Projection on convex sets (POCS) is an algorithm which produces high-resolution image from a set of low-resolution images, but doesnpsilat perform very well on the reconstruction of high frequency information and depressing noise. In this paper, wavelet transform is utilized to extract high frequency hidden information and depress the noise in the low resolution images based on POCS, thus the detailed information of images and SNR are better than the results of normal POCS. The results of simulation confirm that the method in this paper is more effective than POCS algorithm.
{"title":"A projection on Convex Sets super-resolution algorithm using wavelet transform","authors":"Guo Lei, He Zhiming","doi":"10.1109/ICOSP.2008.4697306","DOIUrl":"https://doi.org/10.1109/ICOSP.2008.4697306","url":null,"abstract":"Projection on convex sets (POCS) is an algorithm which produces high-resolution image from a set of low-resolution images, but doesnpsilat perform very well on the reconstruction of high frequency information and depressing noise. In this paper, wavelet transform is utilized to extract high frequency hidden information and depress the noise in the low resolution images based on POCS, thus the detailed information of images and SNR are better than the results of normal POCS. The results of simulation confirm that the method in this paper is more effective than POCS algorithm.","PeriodicalId":445699,"journal":{"name":"2008 9th International Conference on Signal Processing","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132408142","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2008-12-08DOI: 10.1109/ICOSP.2008.4697533
S. Reddy, P. Aparna, S. David
In this paper we present the simulation results of the video coding system based on the principle of distributed source coding. Unlike conventional video coding system, this system exploits source statistics at the decoder, thus reversing the complexity model. Current implementation uses LDPC codes for syndrome coding.
{"title":"Syndrome coding of video with LDPC codes","authors":"S. Reddy, P. Aparna, S. David","doi":"10.1109/ICOSP.2008.4697533","DOIUrl":"https://doi.org/10.1109/ICOSP.2008.4697533","url":null,"abstract":"In this paper we present the simulation results of the video coding system based on the principle of distributed source coding. Unlike conventional video coding system, this system exploits source statistics at the decoder, thus reversing the complexity model. Current implementation uses LDPC codes for syndrome coding.","PeriodicalId":445699,"journal":{"name":"2008 9th International Conference on Signal Processing","volume":"114 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130196551","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2008-12-08DOI: 10.1109/ICOSP.2008.4697263
J. Lerdsinmongkol, K. Chaisaowong, S. Roongruangsorakarn, T. Kraus, T. Aach
Pleural thickenings as biomarker of exposure to asbestos may evolve into malignant pleural mesothelioma. The diagnosis is based on a visual investigation of CT images, which is a time consuming and subjective procedure. Our image processing system identifies the pleural contours and detects pleural thickenings. In two algorithm steps, namely the detection of the thorax and the removal of air and trachea, 3D morphological operations were implemented and tested, in order to find an optimum of its application in the aspect of calculation expense and accuracy. After an evaluation, we obtained an experimental optimum for both algorithm steps.
{"title":"Efficient application of 3D morphological operations in the framework of a computer-assisted diagnosis system","authors":"J. Lerdsinmongkol, K. Chaisaowong, S. Roongruangsorakarn, T. Kraus, T. Aach","doi":"10.1109/ICOSP.2008.4697263","DOIUrl":"https://doi.org/10.1109/ICOSP.2008.4697263","url":null,"abstract":"Pleural thickenings as biomarker of exposure to asbestos may evolve into malignant pleural mesothelioma. The diagnosis is based on a visual investigation of CT images, which is a time consuming and subjective procedure. Our image processing system identifies the pleural contours and detects pleural thickenings. In two algorithm steps, namely the detection of the thorax and the removal of air and trachea, 3D morphological operations were implemented and tested, in order to find an optimum of its application in the aspect of calculation expense and accuracy. After an evaluation, we obtained an experimental optimum for both algorithm steps.","PeriodicalId":445699,"journal":{"name":"2008 9th International Conference on Signal Processing","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130235164","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2008-12-08DOI: 10.1109/ICOSP.2008.4697064
Fan Yang, Ruizhen Zhao, Shaohai Hu
A new image denoising algorithm based on contourlet transform is presented in this paper. The new approach takes the correlations of inter-scale contourlet coefficients into account in the process of shrinkage, and assumes that the noise-free contourlet coefficients are correlated to their parent coefficients which locate at a different scale. By computing the relativity coefficients across scales, we consider those with smaller values are more likely the noisy coefficients. And then we remove those coefficients whose magnitudes and corresponding relativity coefficients are both small. Experimental results demonstrate that the proposed algorithm can not only maintain the edges of an image, but obtain higher PSNR and better visual quality.
{"title":"Image denoising based on correlations of inter-scale coefficients in contourlet domain","authors":"Fan Yang, Ruizhen Zhao, Shaohai Hu","doi":"10.1109/ICOSP.2008.4697064","DOIUrl":"https://doi.org/10.1109/ICOSP.2008.4697064","url":null,"abstract":"A new image denoising algorithm based on contourlet transform is presented in this paper. The new approach takes the correlations of inter-scale contourlet coefficients into account in the process of shrinkage, and assumes that the noise-free contourlet coefficients are correlated to their parent coefficients which locate at a different scale. By computing the relativity coefficients across scales, we consider those with smaller values are more likely the noisy coefficients. And then we remove those coefficients whose magnitudes and corresponding relativity coefficients are both small. Experimental results demonstrate that the proposed algorithm can not only maintain the edges of an image, but obtain higher PSNR and better visual quality.","PeriodicalId":445699,"journal":{"name":"2008 9th International Conference on Signal Processing","volume":"206 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133973500","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}